content
stringlengths
1
15.9M
\section{\label{sec:level1}Introduction} String theory, at its most familiar conceptual level, is the study of one-dimensional “strings” that vibrate and move through spacetime according to relativistic principles. This motion can be said to trace out a surface in spacetime, called a worldsheet, which contains all positions of a string throughout time. The equations that govern the motion of strings may be derived, as shown in \cite{zwiebach}, from a reasonable assumption that the local relativistic area measured on the worldsheet be minimized. The term ‘area’ is used liberally here to describe the two-dimensional manifold in spacetime that is swept out by the string position throughout time. In this paper we present the equations that describe relativistic string behavior, and the development and testing of a program which enables us to visualize this behavior. In order to focus on representing non-quantum spacetime dynamics, this work did not seek to explore the more recent and more realistic string theories, such as superstring theory and M-theory which dominate discourse in the field. Classical relativistic strings were considered exclusively, analogous to a relativistic point particle such as an electron, but without inclusion of probabilistic quantum effects. It should further be noted that the light-cone gauge string solution technique, detailed in Section II.A, is a significant step towards one string quantization paradigm (known as light-cone gauge quantization) that reflects important results from modern string theory such as graviton states. The mode expansion technique of string solution introduced in Chapter 9 of \cite{zwiebach}, allows for the development of MATLAB software for the generation of string solutions. This software calculates the Virasaro mode coefficients given input parameters and mode coefficients for transverse oscillations, and generates data points for the position functions of the worldsheet, which are plotted. After an overview of relevant theory in Section II, these developments are detailed in Section III alongside examples for demonstration of functionality. More physical aspects of examples are detailed in a companion paper \cite{partii}. \section{Theory} The Nambu-Goto action action $\mathbf{S_{NG}}$, a functional of each possible trajectory in some environment, is a path integral of the Lagrangian for the system: \begin{equation} \label{eq:ngaction} \mathbf{S_{NG}} = \frac{1}{2\pi\alpha'}\int d\tau\,d\sigma\,\sqrt{(\dot{X}\cdot X')^{2} - (\dot{X})^{2}(X')^{2}}. \end{equation} $\tau$ and $\sigma$ are linearly independent parameters of the string worldsheet, representing evolution of the string and the length along the string respectively. X is a vector function giving the spacetime location of the worldsheet as a function of $\tau$ and $\sigma$, with derivatives denoted by $\dot{X}$ and $X'$ respectively. $\alpha'$ is the slope parameter, a commonly used expression of the single free constant of string theory which must be specified rather than derived from other principles. In this paper the speed of light c is set equal to 1 (unitless) for the sake of descriptive ease. The above action can be shown to be proportional to the relativistic area of the string's worldsheet \cite{zwiebach}, setting string theory in the familiar context of a variational problem. A very important property \cite{zwiebach} of the Nambu-Goto action is that it is reparameterization invariant; the parameters $\tau$ and $\sigma$ may be selected as desired so long as they remain linearly independent on the worldsheet manifold. The chosen parameterization for $\tau$ is called the static gauge, and simply sets $\tau$ equal to time. The $\sigma$-parameterization is then selected so that \begin{equation} \label{eq:cons1} \frac{dX}{d\tau}\cdot\frac{dX}{d\sigma}=0. \end{equation} This parameterization is also chosen so that the energy density of the string is constant along sigma, and for this reason is sometimes called the energy parameterization. In this setup, the equations of motion derived from the action \cite{zwiebach} reduce to the wave equation: \begin{equation} \label{eq:wave1} \frac{d^2X}{d\sigma^2}-\frac{1}{c^2}\frac{d^2X}{d\tau^2}=0 \end{equation} with additional parameterization constraint: \begin{equation} \label{eq:cons2} \bigg(\frac{dX}{d\sigma}\bigg)^2+\frac{1}{c^2}\bigg(\frac{dX}{d\tau}\bigg)^2=1. \end{equation} Together with \eqref{eq:cons1}, the constraint \eqref{eq:cons2} may be rewritten as: \begin{equation} \label{eq:constogether} \bigg(\frac{dX}{d\sigma}\pm\frac{1}{c^2}\frac{dX}{d\tau}\bigg)^2=1. \end{equation} General solutions of the above wave equation for open strings with free boundary conditions take the form: \begin{equation} \label{eq:opengen} X(\tau,\sigma)=\frac{1}{2}[F(ct+\sigma)+F(ct-\sigma)] \end{equation} where $F$ is known to be quasiperiodic (periodic with constant translation), and $\dot{F}$ is known to be a unit vector. Similarly, for closed strings, general solutions take the form \begin{equation} \label{eq:closedgen} X(\tau,\sigma)=\frac{1}{2}[F(ct+\sigma)+G(ct-\sigma)] \end{equation} where both $F$ and $G$ have the same properties of quasiperiodicity and unit vector derivative. $F$ and $G$ may be considered as independent left- and right-moving waves on the closed string; an open string results when these waveforms coincide. \subsection{Light-Cone Gauge Mode Expansion} Mode expansion refers to the general technique of solving differential equations by expressing the solution as a sum of complex-exponential functions with coefficients to be selected, similar to a Fourier series expansion. This technique was found to be very useful for the generation of a general class of string solutions. Beginning with the general open-string solution form of \eqref{eq:opengen}, the mode expansion is derived \cite{zwiebach} to be: \begin{equation} \label{eq:xmudef} X^{\mu}(\tau,\sigma) = x^{\mu}_{0} + \sqrt{2\alpha'}\alpha^{\mu}_{0}\tau + i\sqrt{2\alpha'}\displaystyle\sum_{n\neq0} \frac{1}{n}\alpha^{\mu}_{n}e^{-in\tau}cos(n\sigma) \end{equation} $x^{\mu}_{0}$ represents the initial string position, and $\alpha^{\mu}_{0}$ represents the initial string momentum, scaled to be a unitless quantity. All the $\alpha^{\mu}_{n}$ are complex coefficients of the string oscillatory modes. These are also defined in such a way that they are unitless, for which reason the $\sqrt{2\alpha'}$ coefficient, which has units of inverse energy \cite{zwiebach}, is included. To fully determine the general string solution in terms of the $\alpha^{\mu}_{n}$ mode coefficients, the constraint given in \eqref{eq:cons2} must also be expressed in terms of the mode expansion. This is shown in Equation \eqref{eq:cons2} to be: \begin{equation} \label{eq:consnew} \bigg(\frac{d\vec{X}}{d\sigma}\pm\frac{1}{c^2}\frac{d\vec{X}}{d\tau}\bigg)^2=2\alpha'\bigg(\displaystyle\sum_{n \in \mathbb{Z}} \alpha^{\mu}_{n} e^{-i n(\tau\pm\sigma)}\bigg)^2=1. \end{equation} The number of cross-terms of this equation goes as $n^2$, and proves very unwieldy for efficiently producing string solutions. Turning to the Light-Cone Gauge (LCG) formalism for string solutions eliminates this constraint by incorporating it into the mode coefficients which make up the solution terms. The light-cone coordinates, simply a rotated coordinate frame for Minkowski space, are defined by: \begin{equation} \label{eq:lcrelate} x^{+} = \frac{1}{\sqrt{2}}(x^{0}+x^{1}) \qquad and \qquad x^{-} = \frac{1}{\sqrt{2}}(x^{0}-x^{1}). \end{equation} To construct the LCG for string solutions, new parameterizations for both $\tau$ and $\sigma$ are defined as follows: \begin{equation} \label{eq:lcdef} X^{+}(\tau,\sigma) = \beta\alpha'p^{+}\tau \qquad and \qquad p^{+}\sigma = \frac{2\pi}{\beta}\int_0^{\sigma}d\tilde{\sigma}\mathcal{P}^{\tau+}(\tau,\tilde{\sigma}) \end{equation} where $\beta$ is a constant that is set to 1 for closed strings or 2 for open strings, and ${P}^{\tau+}$ may be interpreted as energy-momentum density in the $x^{+}$ direction. As in the static gauge \eqref{eq:cons1}, $\tau$ is inherently linear, while $\sigma$ is proportional to a cumulative energy density along "slices" of the worldsheet. The distinction is that these slices are now orthogonal to the $x^{+}$ direction rather than the $x^0$ direction. Applying \eqref{eq:lcrelate} and \eqref{eq:lcdef} to the constraint given in \eqref{eq:cons2}, the following simplification is derived \cite{zwiebach}: \begin{equation} \label{eq:consLC} \bigg(\frac{dX^{-}}{d\sigma}\pm\frac{1}{c^2}\frac{dX^{-}}{d\tau}\bigg)=\frac{1}{\beta\alpha'}\frac{1}{2p^{+}}\bigg(\frac{dX^{I}}{d\sigma}\pm\frac{1}{c^2}\frac{dX^{I}}{d\tau}\bigg)^2 \end{equation} All $X^+$ terms have vanished from this constraint due to the chosen proportionality of $X^+$ to $\tau$ by \eqref{eq:lcdef}, fully specified by $p^{+}$. Therefore, by fixing $p^{+}$ and $X^{I}$, all $\frac{dX^{-}}{d\sigma}$ and $\frac{dX^{-}}{d\tau}$ are determined, so determining $X^{-}$ up to initial position $x^{-}_0$. Thus any selection of the transverse mode coefficients $\alpha^{\mu}_{n}$ must produce a valid string solution. Also, as the transverse coordinates are not changed in LCG as compared to the static gauge, their mode-expansion remains identical \eqref{eq:xmudef}: \begin{equation} \label{eq:xIdef1} x^{I}(\tau,\sigma) = x^{I}_{0} + \sqrt{2\alpha'}\alpha^{I}_{0}\tau + i\sqrt{2\alpha'}\displaystyle\sum_{n\neq0} \frac{1}{n}\alpha^{I}_{n}e^{-in\tau}cos(n\sigma) \end{equation} However, the mode coefficients of $X^{-}$ are no longer independent, due to the constraint stated above \eqref{eq:consLC}. These mode coefficients, $L_{n}^{\perp}$, instead must be expressed in terms of the transverse mode coefficients and $p^{+}$, and in this form are known as the Virasaro modes: \begin{equation} \label{eq:virmode} L_{n}^{\perp}=\frac{1}{2}\displaystyle\sum_{p} \alpha_{p}^{I}\alpha_{n-p}^{I} \end{equation} where the indices $I$ are summed over. Then the functional form of $X^{-}$ may be written as: \begin{equation} \label{eq:xndef1} X^{-}(\tau,\sigma) = x^{-}_{0} + \frac{1}{p^{+}}L^{\perp}_{0}\tau + \frac{i}{p^{+}}\displaystyle\sum_{n\neq0} \frac{1}{n}L^{+}_{n}e^{-in\tau}cos(n\sigma) \end{equation} The corresponding mode expansion for closed strings is also derived in \cite{zwiebach}, with the only significant change in structure being the presence of two full sets of modes, denoting left- and right- moving solutions. \section{\label{sec:level1}MATLAB Implementation} As has been described, all possible string worldsheets may be described by a single set of coordinate expressions, once a finite set of parameters and countably infinite set of mode expansion coefficients are specified. Because of the lack of constraints upon these parameters (any real value may be specified for the parameters, and any complex value for the mode expansion coefficients), this method of generating solutions lends itself well to software implementation. MATLAB was selected as the development platform due to its high potential for parallelizability. In addition, MATLAB has high-level plotting and visual effects capacity, which are valuable in the visualization of generated string worldsheets. The MATLAB script produced is referred to as the Light-Cone Gauge Euclidean Minimal Surface Generator (LEGen), as the original motivation of this work was the investigation of minimal surfaces in Euclidean space by applying string methods. The design of the underlying algorithms, as well as code debugging, will now be discussed in order of the flow of the LEGen script. \subsection{LEGen Design and Debugging} LEGen is modular in design; distinct scripts provide for the generation of open and closed strings from chosen mode-coefficients. Additionally, string solutions may be generated by inputting a general functional form of the left and right travelling waves, a feature which will be relevant to the study of string cusps and kinks in Paper II: Examples and Applications. All these scripts make use of a shared body of functions, both for calculating worldsheet data from inputs and for visualizing the resultant worldsheets. \subsubsection{Parameter Extraction} In order to facilitate user-input, an efficient and readable formatting for input text files was constructed. The required parameters are the dimensionality $D$, light-cone energy $p^+$, initial positions $x^{-}_{0}$ and $x^{I}_{0}$, and transverse mode coefficients $\alpha^I_n$. These are stored row-by-row in the text file, represented as ordered pairs of polar coordinates for each complex value. For $D>3$ string calculations, the higher-dimensional vector for $\alpha^I_n$ is represented by space-separated ordered pairs in the same row. An example solution for a rotating straight string in three space dimensions is described by the following input file: \begin{verbatim} 4 dimensionality (1,0) p+ momentum (0,0) x- initial position (0,0) xI transverse initial position (0,0) (0,0) aIn transverse modes n=0 (1,0) (1,0) n=1 (1,0) (1,0) n=2 \end{verbatim} This format conveniently allows for in-line comments without corrupting the input, which aid in easy interpretation of the input parameters by users. \subsubsection{Virasaro Mode Calculation} As detailed in Section II.A, the transverse mode coefficients are sufficient, in the light-cone gauge, to describe all oscillatory string motion. The Virasaro modes $L_{n}^{\perp}$ of the $x^{-}$ direction may be calculated explicitly from the transverse modes $\alpha^I_{n}$ \eqref{eq:virmode}. An arbitrary string solution may have an infinite number of nonzero transverse modes. However for the purposes of this paper, we assume that only a finite set of modes are nonzero. As in Fourier analysis this assumption serves as a low-pass filter, excluding solutions with rapid oscillatory terms. A variety of simplifications are set forth in \cite{krijn_mode} and \cite{kraai_mode}, which identify cases wherein the properties of the transverse modes eliminate some terms of the above definition. These ideas were expanded into a functioning algorithm, which forms the centerpoint of this MATLAB script. One essential step is the calculation of a limit to values of p which must be considered in \eqref{eq:virmode} to ensure all nonzero $\alpha^I_{n}$ are accounted for. Assuming that there is some value m for which: \begin{equation} \label{eq:mlimit} \forall n \:|\: (\mid n \mid \:> m \: \& \: n \in \mathbb{Z}) : \:\: \alpha_{n}^{I} = 0. \end{equation} From this, it was derived that to calculate the nth Virasaro mode $L_{n}^{\perp}$, p in the range: \begin{equation} \label{eq:prange} \frac{n}{2} - limit \leq p \leq \frac{n}{2} + limit \end{equation} need only be considered, where $limit$ is defined by: \begin{equation} \label{eq:limit} limit = m - \frac{\mid n \mid}{2} . \end{equation} \subsubsection{Numerical Worldsheet Calculation and Output Plots} With the Virasaro modes identified, spacetime values for the string worldsheet in all light-cone coordinates may be calculated by \eqref{eq:lcdef}, \eqref{eq:xndef1}, and \eqref{eq:xIdef1}. Applying the light-cone coordinate relations \eqref{eq:lcrelate} to the resultant arrays, the worldsheet is expressed in standard Minkowski coordinates. For a quantity of $\tau$ and $\sigma$ values set by the user, where $\tau$ may cover any desired real domain, and $\sigma$ customarily ranges between 0 and $2\pi$, LEGen calculates the coordinates of the string worldsheet using the above equations. Plotting is then performed for a given worldsheet by MATLAB's native "surf" function, which generates a three-dimensional colorized and shaded surface. This surface may be rotated and otherwise manipulated by the viewer for added ease of use, and is set to include grid lines on the surface between plotted points. These grid lines are a very valuable feature, as they correspond to the equivalence curves of $\tau$ and $\sigma$. Key visualization tools which were implemented include animation of string propagation over time, plotting of arbitrary worldsheet sub-regions for more careful analysis, and tagging of string regions of physical interest. In particular, non-differentiable points on the string known as cusps and kinks are identified automatically, and are explored in Paper II: Examples and Applications. \subsection{Demonstration Examples} A diverse selection of test input parameters were run on LEGen, both as a part of the debugging process and for demonstrating various aspects of functionality. Open-string examples which were key to confirming proper operation of the model are given in this subsection; more thorough and physically-interesting examples are developed in Paper II of this work, and demonstrate the full capabilities of this software. Figure \ref{fig:4rotator} was generated using a sample derivation from \cite{krijn_mode}, in order to confirm correct operation of the software for a very simple case. This is the only four-dimensional example considered in this report, and serves to demonstrate that the software is functional for any arbitrary spacetime dimensions. The solution describes a static, straight open string which rotates in the two transverse dimensions, $x^{2}$ and $x^{3}$. It is defined by the following parameters, where all transverse modes of \eqref{eq:xIdef1} not mentioned (or whose conjugates are not mentioned) are set to be 0: \begin{equation} \label{eq:xndef} p^{+} = 1 ; \qquad x^{I}_{0} = x^{-}_{0} = 0 ; \qquad \alpha^{I}_1 = (4, 4i). \end{equation} \newpage \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{4rotator_plot.jpg} \caption{D = 4, rotating static string solution} \label{fig:4rotator} \end{figure} In the above figure and all those to follow, $x^0$ denotes time. Figure \ref{fig:3straight} shows one of the most fundamental strings as described using the light-cone mode expansion, with only the first transverse mode being nonzero. It is defined by the following parameters: \begin{equation} \label{eq:xndef} p^{+} = 1 ; \qquad x^{I}_{0} = x^{-}_{0} = 0 ; \qquad \alpha^{I}_1 = 4. \end{equation} \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{3straight_plot.jpg} \caption{D = 3, single transverse-mode string solution} \label{fig:3straight} \end{figure} Figure \ref{fig:asymm3} shows a solution which is enriching because of its many asymmetries despite being composed of only two transverse mode oscillations. Its aesthetic beauty is also noted to be striking. This solution is defined by the following parameters: \begin{equation} \label{eq:xndef} p^{+} = 1 ; \qquad x^{I}_{0} = x^{-}_{0} = 0 ; \qquad \alpha^{I}_1 = 4, \qquad \alpha^{I}_2 = 4i. \end{equation} \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{3asymm_z_plot.jpg} \caption{D = 3, asymmetric string solution, top view} \label{fig:asymm3} \end{figure} \newpage \subsection{Parameter Analysis} After examining some arbitrary but simple examples, the string solution input parameters were further examined for their correlation with the shape properties of the worldsheet. The most trivial of these were the initial position parameters: $x^{-}_{0}$ and $x^{I}_{0}$, which impact only the translated position of the worldsheet. A much more intriguing parameter is $p^{+}$, referred to in \cite{zwiebach} as the light-cone energy. Simulations with LEGen showed a qualitative correlation between $p^{+}$ and the "speed" of the string, visibly recognizable in many of the above plots as a linear slope between the $x^{1}$ and $x^{0}$ coordinate directions. To investigate this further, the momentum slope p' was defined as: \begin{equation} \label{eq:slopedef} p' = \frac{p^0}{p^1} = \frac{p^{+}+p^{-}}{p^{+}-p{-}}. \end{equation} In the light-cone gauge, $p^{-}$ is not treated as an independent parameter, as it is dependent on the $p^{+}$ and the zeroth Virasaro mode by the expression: \begin{equation} \label{eq:slopesolve} 2p^{+}p^{-} = \frac{1}{\alpha'}L^{\perp}_{0}. \end{equation} The two plots shown in Figure \ref{fig:p_pvary} are the same bimodal string solution, with only the value of $p^{+}$ varied (set to 1 on the left and 2 on the right). The right plot was translated for visual comparison effect; otherwise the worldsheets would have identical initial positions. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{2realmode_varyp-p_plot.jpg} \caption{D = 3, double-mode solution, with $p^{+}$ varied} \label{fig:p_pvary} \end{figure} It was postulated that by further increasing $p^{+}$, a string solution must be able to be generated which "points" directly in the $x^0$ direction. This may be more physically interpreted as being a string which does not translate over time, but statically oscillates. Repeated guesses of $p^{+}$, with full resimulations, seemed to place the desired value near 5, but no worldsheet produced was precisely vertical. By setting p' to a desired value of $\infty$, corresponding to vertical slope, and substituting \eqref{eq:slopedef} into \eqref{eq:slopesolve}, the necessary value of $p^{+}$ was found to be $\sqrt{32}$. A plot of the resultant worldsheet, which was indeed a static oscillating string, is given in Figure \ref{fig:vert}. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{vertical_plot.jpg} \caption{D = 3, non-translating single-mode solution} \label{fig:vert} \end{figure} \newpage The zero-transverse mode $\alpha^{I}_0$ was also observed to have a characteristic effect upon worldsheet shape. This parameter is constrained to be real, due to the reality condition upon \eqref{eq:xIdef1}, in which it contributes to a term linearly with $\tau$. Indeed, from this term, it was predicted that the value of $\alpha^{I}_0$ would correlate with the "slope" of the worldsheet in the transverse directions perpendicular to its overall momentum. The three plots shown in Figure \ref{fig:a0vary} are the same unimodal string solution, with only the value of $\alpha^{I}_0$ varied (set to -1 on the left, 0 in the middle, and 1 on the right). Viewed from the side (along x2), these worldsheets align perfectly, and so the observed leaning occurs only in x2 and x0. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{3straight_var_a-0_plot.jpg} \caption{D = 3, single-mode solution, with $a^{I}_0$ varied} \label{fig:a0vary} \end{figure} Lastly, the effect of complex rotation of a single mode coefficient was observed. The six plots shown in Figure \ref{fig:phasevary} are the same unimodal string solution, with only the value of $\alpha^{I}_1$ varied (set to 4 on the left, and rotated in the complex plane by $\frac{\pi}{10}$ for each subsequent plot). It is clear that this complex angle corresponds to the phase angle of the string solution; for the rightmost plot, a mode coefficient of $4i$ corresponds to exactly a quarter-wavelength phase shift, as would be expected. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{3straight_var-phase_plot.jpg} \caption{D = 3, single-mode solution, with $\angle a^{I}_1$ varied} \label{fig:phasevary} \end{figure} \section{\label{sec:level1}Conclusion} In this paper, we present the development of the LEGen software using the light-cone gauge mode expansion technique for visualization of string solutions. Test outputs of LEGen were evaluated as proof of valid operation, and were analyzed for the properties of their input parameters, the coefficients of the mode expansion. Prospects for further development of LEGen include extending it for the visualization of superstring solutions, as well as strings winding around compact dimensions. The examples detailed in Section III.B serve only as an overview of LEGen's capabilities, which are demonstrated more fully in Part II of this work. \subsection{Acknowledgements} We wish to thank Professor Matthew Kleban (NYU), and Logan Boyd for helpful discussions and suggestions. \subsection{About the Authors} Neil Comins earned his undergraduate degree at Cornell University and his PhD at University College Cardiff, Cardiff, Wales (now Cardiff University). Graham Van Goffrier earned his undergraduate degree at the University of Maine and will enter MASt study at the University of Cambridge, Cambridge, England in Fall 2018. \medskip
\section{Conclusions} \label{sec:conclusion} BACH was organized to promote research on CAD systems for automatic breast cancer histology image analysis. Despite the complexity of the task, the challenge received a large number of high quality solutions that achieve similar performance to human experts. Namely, the best performing methods achieved 0.87 accuracy in classifying high resolution microscopy images in Normal, Benign, \textit{In situ} carcinoma and Invasive carcinoma classes and a 0.69 score in labeling entire WSI. Proper experiment design seems to be essential to achieve high performance in the breast cancer histology image analysis. Specifically, the conducted study allows to infer that \begin{inparaenum}[1)] \item generically, using the latest CNN designs allows to positively impact the system's performance given that fine-tuning is properly performed; \item CNNs seem to be robust to small color variations of H\&E images and thus color normalization was not essential to attain high accuracies; \item proper training splitting is essential to infer the generalization capability of the model, since CNNs may overfit to patient/acquisition details, and \item using large context images as the network input allows for overall high performance even if the input image (and thus the overall quality of the information) has to be downsampled. \end{inparaenum} On the other hand, current deep learning solutions still have issues dealing with large, high resolution images and further investment on development of methods for WSI analysis should be done. \par It is the organizaners' hope that the comprehensive analysis herein presented will motivate more challenges on medical imaging and specially pave the way for the development of new breast cancer CAD methods that contribute to the early detection of this pathology, with clear benefits for our societies. \section{Discussion} BACH accounted for a large number of final submissions in comparison to other medical image challenges. Despite this, there is a similar significant difference between the number of registrations and effective submissions. This stems from common factors such as \begin{inparaenum}[1)] \item{registrations to inspect the data before deciding to participate or to get the data for other purposes,} \item{difficulty in downloading the data, which is specially true in countries with Internet accessibility limitations}, and \item{high complexity of the task, specially of part B.} \end{inparaenum} The verified drop on the submission rate is common on biomedical imaging challenges \footnote{\url{https://grand-challenge.org/challenges}}, which points to a need to revise future challenge designs to keep the participants' interest throughout its entire duration. BACH, similarly to other medical image challenges, partially addressed this issue by partnering with the ICIAR conference, which empirically motivated participants by providing an opportunity to show their developed work to the scientific community. For future challenge organizations, it will be needed to further promote participation not only by improving data access but also, for instance, establishing intermediary benchmark timepoints in which participants can compare their performance to motivate themselves to further improve their methods. The vast majority of the submitted methods used deep learning for solving both tasks A and B. This follows the common trend on the field of medical image analysis, where deep learning approaches are complementing or even replacing the standard manual feature engineering approaches since they allow to achieve high performances while significantly reducing the need for field-knowledge~\cite{Litjens2017}. As known, deep learning approaches require large amounts of training data to produce a generalizable model, which are usually not available for medical image analysis due to complexity and high cost of the annotation process. As a consequence, it is a common practice to initialize the models with filters trained on large datasets of natural images, such as ImageNet, and fine-tune them to the specific problem \cite{Tajbakhsh2016}. In fact, as shown in Table~\ref{tab:partA}, all of the top performing methods are composed by one or more deep CNNs architectures such as Inception~\cite{Szegedy2015}, DenseNet~\cite{Huang2017}, VGG~\cite{Simonyan2014} or ResNet~\cite{He2016} pre-trained on ImageNet. The difference in performance is thus mainly a consequence of design and training details. For \pA{}, and unlike previous approaches for the analysis of breast histology cancer images \cite{Araujo2017}, the results of BACH suggest that training the models with a large portion/entire image (even if resized to fit the standard input size of the network) is better than using local patches. This indicates that the overall nuclei and tissue organization may be more relevant than nuclei-scale features, such as nuclei texture, for distinguishing different types of breast cancer. Interestingly this matches the importance that clinical pathologists give to tissue architecture features in the diagnostic task. In fact, unlike small patch-based approaches, using large portions of the images eases the integration of both local and global context in the decision process. Besides, patch-based approaches have to handle the problem of patch-label attribution based on the image-level label. Although more sophisticated methods, such as Multiple Instance Learning-based ones could be applied, the vast majority of the teams attributes the label of the image to the patch, which has obvious limitations since the patch may contain only normal tissue, for instance, and be labeled with a different class. \par For \pB{}, the large image size inhibits the direct application of standard segmentation networks, such as U-Net \cite{Ronneberger2015}, to the entire image. Consequently, participants dealt with the issue by analyzing local patches and performing a posterior fusion of the outputs to produce the final probability mapping. In fact, following the same trend of \pA{}, these methods preferred a large receptive field that guarantees the integration of contextual and local features during prediction and thus eases the generation of the final class map. \par \subsection{Performance in \pA{}} A significant number of submitted methods surpassed the performance of \etal{Ara\'{u}jo}~\cite{Araujo2017}, which reported an overall 4-class accuracy of 77.8\%. Indeed, BACH provided a larger and more representative dataset which, when combined with advances on architectures and transfer-learning techniques, has enabled the development of methods with higher generalization ability. Specifically, these architectures show a high sensitivity for cancer (specially Invasive) cases, which are of great relevance in terms of clinical application (faster automated diagnosis in the cases demanding more urgent attention). Also, as depicted in Table~\ref{tab:pA_sens}~and~\ref{tab:pA_sens_2}, the approaches proposed by the participants outperform simple fine-tuning solutions, indicating that there was a clear effort to improve network performance by changing relevant design and training details. Even though the performance of the top-10 methods is not statistically different (see Fig~\ref{fig:kappa_pA}), a careful design of the experimental setting, including train-validation split, data agumentation, architecture combination and parameter tuning, are essential to increase the performance of deep learning systems. Despite their high accuracy, the submitted methods still failed on correctly predicting images of the more subtle Benign and \textit{In situ} classes. In fact, Fig. 5b shows that the Benign class is the one that affects the most the performance of the methods, which is to be expected since the presence of normal elements and usual preservation of tissue architecture associated with benign lesions makes this class specially hard to distinguish from normal tissue. Furthermore, the Benign class is the one that presents greater morphological variability and thus discriminant features are more difficult to learn. \par The generalization capacity of the methods is also affected by the image acquisition pipeline. Specifically, during the acquisition of field images, pathologists focus on capturing regions that contain representative features (tissue architecture, cytological features, \textit{etc.}) for the given label. As a consequence, whenever those features are subtle, as it is common on normal tissue, specialists tend to capture non-relevant structures, such as fat cells. Likewise, for \textit{in situ} carcinomas it is common to center the images on mammary ducts, where the cancer is contained. Fig.~\ref{fig:most_erroneous1}~and~Fig.~\ref{fig:most_erroneous1_train} show two images from the test and training sets, respectively. Fig.~\ref{fig:most_erroneous1_train}, labeled as \textit{In situ}, is centered on a duct and surrounded on the left by non-relevant fat tissue. Fig.~\ref{fig:most_erroneous1} has, by coincidence, the same acquisition scheme of Fig.~\ref{fig:most_erroneous1_train} and despite being correctly classified as Benign by 100\% of the experts, 60\% of the top-10 methods classified it as \textit{In situ} and 10\% as Normal. Likewise, Fig.~\ref{fig:most_erroneous2} shows a full-consensus Benign test image that was classified by 70\% of the top-10 as Invasive. Once again, this image has a similar overall tissue organization as training cases of other classes, as shown in the invasive tissue depicted in Fig.~\ref{fig:most_erroneous2_train}. The differences, which lie in the cytological features (nuclei size, color and variability), are clear and yet the approaches failed to correctly capture these discriminant characteristics. This suggests that the networks may be partially modeling \textit{how} images were acquired instead of focusing on \textit{what} leads to the classification \cite{Abramoff2016}. \par Finally, Fig.~\ref{fig:reported_performance} shows the difference between the top-10 participants' results reported at the submission time via splitting of the training data (\textit{e.g.} cross-split as train-validation-test) with the achieved performance on the independent test set. The majority of the methods has a 10\% difference over the expected accuracy, showing how important a proper design of a method’s evaluation design is (and how cross-validation scores can be overly optimistic). Namely, this difference may be due to: \begin{inparaenum}[1)] \item patient-wise overfit to the training data, \textit{i.e.}, the authors did not had in account the origin of the images when doing the split and, due to the lack of staining normalization, the networks may have memorized specific staining patterns. In fact, Kwok~\cite{Kwok2018} was the only top-10 performer to report a lower expected accuracy. As described in Section~\ref{sec:partAB}, the author performed patient-wise division by clustering images of similar colors, which may contributed to the robustness of the method; \item over-optimistic train-validation-test split by doing a single split round; and/or \item excessive hyper parameter-tuning to increase the performance on the split test set, reducing generalization capability. \end{inparaenum} With this in mind, future versions of BACH will provide guidelines on data splitting to reduce this discrepancy and improve the overall scientific correctness of the reported results. \subsubsection{Inter-observer analysis} The \pA{} BACH dataset was manually annotated by two medical experts and images with dubious diagnosis were discarded. As expected, the annotator of the dataset tends to be better than his/her peers, which were not capable of correctly classifying, in average, more than 82\% of all images. Consequently, in the best scenario the performance of the automatic methods is expected to be equal to that of the observers. Taking into account the average expert accuracy of 85$\pm10\%$, one can see that the performance obtained by the competing solutions (Table~\ref{tab:partA}) is in line with this value, being the highest accuracy of 87$\%$. The human-level performance of the algorithms is further corroborated by the partial lack of statistically differences of the methods in comparison to the expert pathologists, as shown in Fig~\ref{fig:kappa_pA}. This is specially true for the scenario of pathology detection, where the participants even outperform one of the experts. However, this difference tends to reduce when considering abnormality detection. In fact, similarly to the automatic methods (recall Fig.~\ref{fig:misclassifications}), the human observers, as shown in Fig.~\ref{fig:conf_A}, have a high agreement level for Invasive cases but tend to disagree on the other classes. Fig~\ref{fig:kappa_pA}~and~\ref{fig:conf_A}, together with Tables~\ref{tab:pA_sens}~and~\ref{tab:pA_sens_2}, suggest that specialists rely not only on objective markers, but also on their experience, intuition and personal assessment of cost of failure to perform the diagnosis, as assessable on the kappa score of the Pathological and Cancer-wise classifications. Also, similarly to the deep learning models, the specialists had more difficulty in distinguishing between the Normal and Benign classes in comparison with the cancerous classes. This further corroborates the hypothesis that the participants tended to fail Benign images due to the previously discussed complexity of this class. \par Overall, the results in Table~\ref{tab:pA_sens}~and~~\ref{tab:pA_sens_2}, as well as the comparison of the quadratic Cohen's kappa score (Fig~\ref{fig:kappa_pA}) between the different pathologists \textit{vs} ground-truth and the automatic methods \textit{vs} the ground-truth, show that deep learning models trained on properly annotated data can achieve human performance in complex medical tasks and may in the near future play an important role as second-opinion systems. \subsection{Performance in \pB{}} In general, \pB{} is much more challenging than \pA{} due to the large amount of information to process and need to integrate a wide range of scales. The pixel-wise sensitivity and specificity of the methods from \pB{} detailed in Tables~\ref{tab:pB_sens}~and~\ref{tab:pB_sens_2}, shows that the Invasive class tends to be the easiest to detect as the methods achieved an average sensitivity of 0.4. This is to be expected, since Invasive carcinoma is characterizable by an abnormal and non-confined nuclei density and thus methods tend to require less contextual information for the prediction. In fact, this is corroborated by the results in \pA{} that indicate that Invasive is the easiest of the pathological classes (see discussion of Fig.~\ref{fig:misclassifications}). On the other hand, \textit{In situ} has the lowest detection sensitivity (average of 0.06 and maximum value of 0.18) of the pathological classes. Unlike the Invasive carcinoma, classification as \textit{in situ} is reliant on the location of the pathological cells -- which means that without proper global and local context, which is complex to achieve due to the large size of the images, this class becomes non-trivial to classify. On the other hand, the methods of \pA{} did not tend to fail on images from the \textit{in situ} class. This indicates that the microscopy images provide enough local and global context to perform the labeling and thus that human experience had an essential role during the acquisition and annotation of these images. \par Fig.~\ref{fig:pb_pred} shows examples of predictions from the top-3 performing participants. In general, one can observe the overestimation of invasive (blue) regions, and more difficulty in predicting the \textit{in situ} (green) and benign (red) ones, which can also be seen in Table~\ref{tab:pB_sens}, where the sensitivity of the solutions for the invasive class is clearly superior to the others. Fig.~\ref{fig:pb_pred} shows this tendency, where two of the top performing teams fail to predict the \textit{in situ} and benign regions and tend estimate them as invasive or as background. \subsection{Diversity in the Solutions of the BACH Challenge} Challenge designs should also promote a higher diversity of methodologies. However, BACH submissions followed the recent computer vision trend with deep learning vastly being the preferred approach. Specifically, pre-trained deep networks on natural images are relatively easy to set up and allow to achieve high performance while significantly reducing the need for field-knowledge, easing the participation on this and other challenges. Although the raw high performance of these methods is of interest, the scientific novelty of the approaches is reduced and usually limited to hyperparameter setup or network ensemble. Also, the black-box behavior of deep learning approaches hinders their application on the medical field, where specialists need to understand the reasoning behind the system's decision. It is the authors' belief that medical imaging challenges should further promote advances on the field by incentivating participants to propose significantly novel solutions that move from \textit{what?} to \textit{why?}. For instance, it would be of interest on future editions to ask participants to produce an automatic explanation of the method's decision. This will require the planning of new ground-truths and metrics that benefit systems that, by providing proper decision reasoning, are more capable of being used in the clinical practice. \subsubsection{Limitations of the BACH Challenge} While an effort has been made in creating a relevant, stimulating and fair challenge, capable of advancing the state-of-the-art, the authors are aware of some limitations, namely: \begin{inparaenum}[1)] \item The regional origin and relatively small size of the provided training dataset (specially for deep learning standards) may have limited the generalization capability of the solutions. Likewise, the relatively small test set does not allow to extensively evaluate the behaviour of the algorithms to different tissue structures and staining deviations. Increasing the diversity of the dataset would allow to draw even more relevant conclusions regarding the performance of image analysis systems for breast cancer diagnosis. \item The reference labels for both \pA{} and \pB{} were obtained via manual annotation of two medical experts. Even though images where the observers disagreed were discarded, the labeling process is still reliant on the subjectivity and experience of the annotators (specially on Normal \textit{vs} Benign labeling since no immunohistochemistry analysis is useful), limiting the performance of the submitted methods to that of the human expert. Increasing the number of annotators would allow to further increase the reliability of the dataset. \item Patient-wise labels were only partially available for the training set. Participants could have used data with known patients for training and the remaining for method validation or use alternative approaches (such as clustering) to estimate the origin of the images. Despite this, the availability of this information for all images would allow a more fair patient-wise split for training and evaluating the algorithms, and could eventually lead to a smaller discrepancy between the training set cross-validated and the test set results. \item The pixel-wise annotations of the WSI are not highly detailed and thus the delineated regions may include normal tissue regions besides the class assigned to that region. \item Automatic evaluation of the participants' algorithms would have ease the submission procedure, allowing to an almost real-time feedback of the teams' performance. In this scenario, a scheme of multiple submissions could have been implemented, in which teams would be allowed to submit results on the website during the challenge running period, up to a maximum number of submissions. This would probably also boost the number of final submissions out of the challenge registrations. \end{inparaenum} \section{Introduction} \label{sec:intro} Breast cancer is one of most common cancer-related death causes in women of all age~\cite{Siegel2017}, but early diagnosis and treatment can significantly prevent the disease's progression and reduce its morbidity rates~\cite{Smith2005}. Because of this, women are recommended to do self check-ups via palpation and regular screenings via ultrasound or mammography; if an abnormality is found, a breast tissue biopsy is performed~\cite{NationalBreastCancerFoundation2015}. Usually, the collected tissue sample is stained with hematoxylin and eosin (H\&E), which allows to distinguish the nuclei from the parenchyma, and is observed via an optic microscope. Complementarily, these samples can also be scanned to giga-pixel size images, referred as whole-slide image (WSI), for posterior digital processing. During assessment, pathologists search for signs of cancer on microscopic portions of the tissue by analyzing its histological properties. This procedure allows to distinguish malignant regions from non-malignant (benign) tissue, which present changes in normal structures of breast parenchyma that are not directly related with progression to malignancy. These malignant lesions can be further classified as \textit{in situ} carcinoma, where the cancerous cells are restrained inside the mammary ductal-lobular system, or invasive if the cancer cells are spread beyond the ducts. Due to the importance of correct diagnosis in patient management the search for precise, robust and automated systems has increased. The differentiation of breast samples into normal, benign and malignant (either \textit{in situ} or invasive) brings relevant changes in the treatment of the patients making the accurate diagnosis essential. For instance, benign lesions can usually be followed clinically without the need for surgery, but malignancy almost always require surgery with or without the addition of chemotherapy. \par The analysis of breast cancer WSIs is non-trivial due to the large amount of data to visualize and the complexity of the task~\cite{Elmore2015}. On this setting, computer-aided diagnosis (CAD) systems can alleviate the procedure by providing a complementary and objective assessment to the pathologist. Despite the high performance of these systems for the binary classification (healthy \textit{vs} malignant) of microscopy~\cite{Kowal2013,Filipczuk2013,George2014,Belsare2015} and whole-slide images~\cite{Cruz-Roa2014,Cruz-roa2018a}, the previously referred standard clinical classification procedure has now only started to be explored~\cite{Araujo2017,Fondon2018,Han2017,Bejnordi2017}. \subsection{Related work} Automatic methods for breast cancer assessment in histology images can be divided according to the type of image in study (namely microscopy images and WSI) and number of classes, \textit{i.e.}, abnormality types, they consider. \subsubsection{Microscopy images} The classification of breast histology microscopy images as benign-malignant for referral purposes is a vastly addressed topic. Over the past decade, these methods have focused on the extraction of nuclei features, which requires the detection of these regions-of-interest. For example, nuclei have been segmented via color-based clustering \cite{Kowal2013} or by nuclei candidate detection using the circular Hough transform, followed by feature-based candidate reduction and refinement via watersheds \cite{George2014}. These segmentations allow to extract features, usually related to morphology, topology and texture. The computed features can then be used for training one or more classifiers and allow to achieve accuracies of 84-93$\%$ \cite{Kowal2013} and 72-97$\%$ \cite{George2014}. A viable alternative to the design and extraction of hand-crafted features is to use deep learning approaches, namely convolutional neural networks (CNNs), since these allow to significatly reduce the need for field-knowledge while achieving similar or better results. For instance, \cite{Spanhol2016} used CNNs to classify patches of microscopy images, and combined the predictions into an image label through sum, product and maximum rules. The method was evaluated on the BreaKHis dataset \cite{Spanhol2016a} , which contains images of different magnifications, and achieved an accuracy of 84\% for a 200$\times$ magnification. The more complex 3-class problem of considering normal tissue, \textit{in situ} carcinoma and invasive carcinoma has also been addressed by the scientific community. Due to the increased complexity of the task, using nuclei-related features is usually not sufficient to achieve a reasonable classification performance. Namely, distinguishing \textit{in situ} and invasive carcinomas requires assessing both the nuclei and their organization on the tissue. For instance, \cite{Zhang2011} used a cascade classification approach, where features based on the curvelet transform and local binary patterns were randomly chosen as input to a set of parallel suport-vector machines (SVMs). The images where no agreement was found were analysed by a set of NNs using another random feature set, resulting in an accuracy of 97$\%$. Despite the successes for 2-class and 3-class classifications, few works have addressed the 4 classification problem (normal tissue, benign lesion, \textit{in situ} and invasive carcinoma) of histology images. Recently \cite{Fondon2018} proposed a handcrafted feature-based approach, considered three major sets of features, related with the nuclei, color regions and textures accounting for local and global image properties, which were then used for training a SVM. By their turn, \cite{Araujo2017} proposed a CNN-based approach, training a VGG-like network using patches extracted from the histology images. In the design of the network the authors had in consideration the effective receptive fields at each network layer in order to ensure that information is captured at different scales, allowing that both nuclei organization and the overall tissue structure could be considered. The features extracted by the CNN were then used to train a SVM, and majority voting was used for obtaining the final image label from the individual patch classifications. These methods have been developed in the context of the Bioimaging 2015 challenge\footnote{\url{http://www.bioimaging2015.ineb.up.pt/challenge_overview.html}}. \cite{Fondon2018} and \cite{Araujo2017} have achieved accuracies in the 4-class problem of around 68 $\%$ and 78$\%$, respectively, on a test set of 36 images from which approximately a half correspond to extremely hard cases to classify, accordingly to two specialists. \subsubsection{Whole-slide image analysis} The recent advances on the acquisition systems have enabled the digitization of entire slides, avoiding loss of biopsy tissue and providing extra context for pathology assessment by the medical experts. However, automatic analysis of these images is challenging due to their giga-pixel size and wide-variety of local tissue behavior. Because of this, supervised WSI analysis has been mainly performed by assessing patches of different magnifications. For instance, the detection of invasive cancer regions can be performed by training a CNN with small patches and predicting over an entire slide. A properly trained CNN can achieve balanced accuracies (the average of specificity and sensitivity) of 84$\%$, outperforming handcrafted-feature approaches by more than 5$\%$ \cite{Cruz-Roa2014,Cruz-Roa2017}. The majority of the solutions applied to WSIs are computationally expensive and deal only with small regions of interest (ROIs) and not the complete WSI, since this would require estimating an incredibly high number of parameters. Thus, efforts have been made for developing methods which can deal with these large sized images without the need for ROI selection or extremely high computational power while yielding a good performance. For instance, \cite{Cruz-roa2018a} proposed the combination of CNNs and an adaptive sampling method which relies on the quasi-Monte Carlo sampling and a gradient-based adaptive strategy aiming at focusing sampling on areas of the image of higher uncertainty. The method was evaluated on 195 studies, achieving a Dice coefficient of 76 $\%$ and yielded comparable results to those from a dense sampling while greatly increasing the computational efficiency (1500$\times$ faster). Similarly to microscopy images, the scientific community is now starting to explore multi-class classification on WSI, mainly using deep learning approaches. In \cite{Bejnordi2017}, a context aware stack of 2 CNNs was used for detecting normal/benign tissue as well as \textit{in situ} and invasive carcinomas. The first CNN was trained for classifying small high-resolution patches of the WSIs, thus learning celular-level characteristics. This fully-convolutional model was then used for predicting a set of feature maps from patches of higher size, which serve as input for a second CNN. This scheme allows to integrate both local and global features related to tissue organization, achieving accuracies of 82$\%$ and a Cohen's kappa value of 0.7. By its turn, \cite{Gecer2018} considered 5 classes for the detection and classification of cancer in WSIs: non proliferative changes only, proliferative changes, atypical ductal hyperplasia, \textit{in situ} and invasive carcinoma. The classification was performed by combining the prediction of two steps. First, four CNNs were used sequentially to detect ROIs in a multiscale fashion. Specifically, the output of each CNN is a set of ROIs for the next, thus increasing the magnification of the analyzed region. Then, the output of the fourth model is classified by a CNN trained with high magnification patches. The outputs of the classification and ROI-proposal CNNs are then combined via majority voting, allowing to obtain a slide-level accuracy of 55$\%$, which revealed no statistical difference from 45 pathologists' performance. \subsection{Challenges} Challenges are known to enable advances on the medical image analysis field by promoting the participation of multiple researchers of different backgrounds on a competitive, but scientifically constructive, setting. Over the past years, the scientific community has been promoting challenges on different imaging modalities and topics. Related to breast cancer, CAMELYON \footnote{\url{https://camelyon17.grand-challenge.org/}} is a two-edition challenge aimed at cancer metastases detection on WSI of lymph node sections. To further promote and complement the research on the breast cancer image analysis field, the Grand Challenge on BreAst Cancer Histology images (BACH) was organized as part of the ICIAR 2018 conference (15th International Conference on Image Analysis and Recognition)\footnote{\url{https://www.aimiconf.org/iciar18/}}. BACH is a biomedical image challenge built on top of the Bioimaging 2015 challenge, with a much larger dataset of H\&E stained microscopy images for classification and a new set of WSI breast cancer tissue images for segmentation. Specifically, the participants of BACH were asked to predict the type of these tissue samples as \begin{inparaenum}[1)] \item Normal, \item Benign \item \textit{In~situ} carcinoma and \item Invasive carcinoma, \end{inparaenum} with the goal of providing pathologists a tool to reduce the diagnosis workload. The rest of the paper is organized as follows. Section~\ref{sec:challenge} details the challenge in terms of organization, dataset and participant's evaluation. Then, Section~\ref{sec:methods} describes the approaches of the best performing methods, and the corresponding performance is provided on Section~\ref{sec:results}. Finally, Section~\ref{sec:conclusion} summarizes the findings of this study. \section{Challenge description} \label{sec:challenge} \subsection{Organization} The BACH challenge was organized into different stages, providing a well structured workflow to potentiate the success of the initiative (Fig.~\ref{fig:challenge_overal}). The challenge was hosted on \textit{Grand Challenge}\footnote{\url{https://grand-challenge.org/}}, which allowed for an easy platform set-up. At the time of this writing, \textit{Grand Challenge} accounts for more than 12~000 registered users and, alongside Kaggle\footnote{\url{https://www.kaggle.com/}}, it is one of the preferred platforms for medical imaging-related challenges. The BACH was also announced via the \textit{Sci-diku-imageworld} mailing list\footnote{\url{https://list.ku.dk/listinfo/sci-diku-imageworld}}. Participants were asked to register on the \textit{Grand Challenge} to access most of the contents of the BACH webpage. All registrations were manually validated by the organization to minimize spam and anonymous participation. Once accepted, participants could download the data by filling a form asking for their name, institution and e-mail address. Once the form was submitted, an e-mail containing an unique set of credentials (username, password) and the dataset download link was automatically sent to the provided e-mail address. This allowed the organization to better limit the dataset access to non-participants as well as collect a list of the institutions/companies interested in the challenge. \par BACH was divided in two parts, \textbf{A} and \textbf{B}. \pA{} consisted in automatically classifying H\&E stained breast histology microscopy images in four classes: \begin{inparaenum}[1)] \item Normal, \item Benign, \item \textit{In situ} carcinoma and \item Invasive carcinoma. \end{inparaenum} \pB{} consisted in performing pixel-wise labeling of whole-slide breast histology images in the same four classes. Participants were allowed to participate on a single part of the challenge. Also, to promote participation (thus more competition and higher quality of the methods), the ICIAR 2018 conference sponsored the challenge by awarding monetary prizes to the first and second best performing methods, for both challenge parts. The prize awarding was contingent of the acceptance and presentation of the methodology at the ICIAR 2018 conference. \par The BACH website\footnote{\url{https://iciar2018-challenge.grand-challenge.org/}} was first made publicly available on the $1^{st}$ November 2017 with the release of the labeled training set. The registered participants had up to $1^{st}$ February 2018 (4 months) to submit the source code of their methods and a paper describing their approach. To promote the dissemination of the methods, participants were also required to submit their paper to the ICIAR conference. The test set was released on the $5^{th}$ February 2018 and submissions were open for a week. Results were announced a month after, at the $12^{th}$ March 2018. \begin{figure*}[t] \centering \includegraphics[width=\textwidth]{figures/bach_pipeline} \caption{Workflow of the BACH challenge.} \label{fig:challenge_overal} \end{figure*} \subsection{Datasets} The BACH challenge made available two labeled training datasets for the registered participants. The first dataset is composed of microscopy images annotated image-wise by two expert pathologists from the Institute of Molecular Pathology and Immunology of the University of Porto (IPATIMUP) and from the Institute for Research and Innovation in Health (i3S). The second dataset contains pixel-wise annotated and non-annotated WSI images. For the WSI, annotations were performed by a pathologist and revised by a second expert. The training data is publicly available at \url{https://iciar2018-challenge.grand-challenge.org/}. \subsubsection{Microscopy images dataset} The microscopy dataset is composed of 400 training and 100 test images, with the four classes equally represented (see Fig.~\ref{fig:micros}). All images were acquired in 2014, 2015 and 2017 using a Leica DM 2000 LED microscope and a Leica ICC50 HD camera and all patients are from the Porto and Castelo Branco regions (Portugal). Cases are from Ipatimup Diagnostics and come from three different hospitals (Hospital CUF Porto, Centro Hospitalar do T\^{a}mega e Sousa and Centro Hospitalar Cova da Beira). The annotation was performed by two medical experts. Images where there was disagreement between the Normal and Benign classes were discarded. The remaining doubtful cases were confirmed via imunohistochemical analysis. The provided images are on RGB \texttt{.tiff} format and have a size of $2048 \times 1536$ pixels and a pixel scale of 0.42 $\mu$m $\times$ 0.42 $\mu$m. The labels of the images were provided in \texttt{.csv} format. Participants were provided with a partial patient-wise distribution of the images of the training set. The test data was collected from a completely different set of patients, ensuring a fairer evaluation of the methods. Note that the training set is an extension of the one used for developing the approach in~\cite{Araujo2017}. \begin{figure*}[tb] \begin{subfigure}{0.22\textwidth} \includegraphics[width=\textwidth]{figures/normal} \caption{Normal} \end{subfigure} \hfill \begin{subfigure}{0.22\textwidth} \includegraphics[width=\textwidth]{figures/benign} \caption{Benign} \end{subfigure} \hfill \begin{subfigure}{0.22\textwidth} \includegraphics[width=\textwidth]{figures/in_situ} \caption{\textit{In situ}} \end{subfigure} \hfill \begin{subfigure}{0.22\textwidth} \includegraphics[width=\textwidth]{figures/invasive} \caption{Invasive} \end{subfigure} \caption{Examples of microscopy images from the BACH dataset.} \label{fig:micros} \end{figure*} \subsubsection{Whole-slide images dataset} Whole-slide images (WSI) are high resolution images containing the entire sampled tissue. Because of that, each WSI can have multiple pathological regions. The BACH's \pB{} dataset is composed of 30 WSI for training and 10 WSI for algorithm testing. Specifically for training, the organization provided 10 pixel-wise annotated regions for the Benign, \textit{In situ} carcinoma and Invasive carcinoma classes and 20 potentially pathological WSIs that were not annotated by the experts. The provided annotations aim at identifying regions of interest for the diagnosis on the lowest magnification setting and thus may include non-tissue and normal tissue regions, as depicted in Fig.~\ref{fig:wsi}. The distribution of the labels is shown in Table~\ref{tab:labels_pB}. The WSI images were acquired in 2013–2015 from patients from the Castelo Branco region (Portugal) with a Leica SCN400 (from Centro Hospitalar Cova da Beira), and were made available on \textit{.svs} format, with a pixel scale of 0.467 $\mu$m/pixel and variable size with width~$\in$~[39980~62952] and height~$\in$~[27972~44889] (pixels). The ground-truth was released as the coordinates of the points that enclose each labeled region via a \texttt{.xml} file. \begin{figure} \centering \includegraphics[width=\columnwidth]{figures/A08_thumb} \caption{Example of a pixel-wise annotated whole-slide image from the training set . {\color{red}$\blacksquare$}$~$benign; {\color{green}$\blacksquare$}$~$\textit{in situ}; {\color{blue}$\blacksquare$}$~$invasive. \label{fig:wsi}} \end{figure} \begin{table} \centering \caption{Relative distribution (\%) of the labels for the training and test sets of \pB{}. \label{tab:labels_pB}} \begin{tabular}{cccc}\hline &\textbf{Benign}&\textit{\textbf{In situ}}& \textbf{Invasive} \\\hline \textbf{Train} & 9 & 3 & 88 \\ \textbf{Test} & 31 & 6 & 63\\\hline \end{tabular} \end{table} \subsection{Performance Evaluation} The methods developed by the participants were evaluated on independent test sets for which the ground-truth was hidden. Specifically, for \pA{} participants were requested to submit a \texttt{.csv} containing row-wise pairs of (image name, predicted label) for the 100 microscopy images. Performance on the microscopy images was evaluated based on the overall prediction accuracy, \textit{i.e.}, the ratio between correct samples and the total number of evaluated images. For \pB{} it was required the submission of $4\times$~downsampled WSI \texttt{.png} masks with values 0~--~Normal, 1~--~Benign, 2~--~\textit{In situ} carcinoma and 3~--~Invasive carcinoma. Possible mismatches between the prediction's and ground truth's sizes were corrected by padding or cropping the prediction masks. The performance on the WSI images was evaluated based on the custom score $s$: \begin{equation} s = 1-\frac{\sum_{i=1}^N{|\texttt{pred}_i-\texttt{gt}_i|}}{\displaystyle\sum_{i=1}^N max(\texttt{gt}_i,|\texttt{gt}_i-3|) \times [1-(1-\texttt{pred}_{i,bin})(1-\texttt{gt}_{i,bin})]+a} \label{eq:score} \end{equation} where $\texttt{pred}$ is the predicted class (0, 1, 2 or 3), and $\texttt{gt}$ is the ground truth class, $i$ is the linear index of a pixel in the image, $N$ is the total number of pixels in the image, $X_{bin}$ is the binarized value of $X$, \textit{i.e.}, is 0 if the label is 0 and 1 otherwise, and $a$ is a very small number that avoids division by zero. Fig.~\ref{fig:score_examples} illustrates the results of this metric on a set of predictions which are gradually farther from the ground truth. This score is based on the accuracy metric, aiming at penalizing more the predictions that are farther from the ground truth value. The reasoning behind this metric is the following: in the numerator, the absolute distance between the predicted class and the ground truth is measured for all samples $i$, which is indicative of how far the prediction is from the ground truth, \textit{e.g.}, if $\texttt{gt} = 1$ and $\texttt{pred} = 3$, the distance is 2, whereas if $\texttt{pred} = 2$ the distance is 1. To normalize these distances, in the first factor of the denominator we consider, for each sample, the largest distance possible having in account the true label, \textit{e.g.}, if $\texttt{gt} = 0$ the maximum distance possible is 3 ($max(0,|0-3|)=3$), while if $\texttt{gt} = 2$ the maximum distance is 2 ($max(2,|2-3|)=2$). Also, the cases in which the prediction and ground truth are both 0 (Normal class) are not counted, since these can be seen as true negative cases. This is allowed by the second factor of the multiplication of the denominator, which is equal to zero if $\texttt{pred} = 0$ and $\texttt{gt} = 0$, and equal to 1 otherwise. \begin{center} \centering \includegraphics[width=\columnwidth]{figures/equation_results.pdf} \captionof{figure}{Examples of the custom score metric. {$\square$}\,$|$\,0$~$normal; {\color{red}$\blacksquare$}\,$|$\,1$~$benign; {\color{green}$\blacksquare$}\,$|$\,2$~$\textit{in$~$situ}; {\color{blue}$\blacksquare$}\,$|$\,3$~$invasive. \label{fig:score_examples}} \end{center} Note that this custom evaluation score was preferred over both the Intersection over Union (IoU) and the quadratic weighted Cohen’s Kappa statistic~\cite{Cohen1960}. Namely, the custom score allows to ignore correct Normal class predictions (highly dominant) while penalizing wrong Normal predictions, whereas for Kappa the Normal class would have either to be completely considered or ignored. Likewise, the custom metric is not only able to assess if the methods were properly capable of detecting pathological regions on whole-slide images (as would the IoU, if applied class-wise), but also of indicating how far that prediction is from the ground-truth. Given the complexity of the task, the direct computation of the IoU could over-penalize methods that are capable of finding abnormal regions but fail to correctly classify them. By assessing the distance of the predictions, the custom metric has a higher clinical relevance than analyzing region overlaps. For instance, mispredicting Normal tissue as Benign should be considered less severe than predicting it as Invasive. \iffalse \begin{table}[tb] \begin{tabular}{llllllll} \cline{2-6} \multicolumn{1}{l|}{g.t.} & \multicolumn{1}{l|}{\textbf{3}} & \multicolumn{1}{l|}{\textbf{2}} & \multicolumn{1}{l|}{\textbf{0}} & \multicolumn{1}{l|}{\textbf{1}} & \multicolumn{1}{l|}{\textbf{2}} & & \\ \cline{2-6} & & & & & & & \\ \cline{2-6} \multicolumn{1}{l|}{pred1} & \multicolumn{1}{l|}{3} & \multicolumn{1}{l|}{2} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{1} & \multicolumn{1}{l|}{2} & & s=1.0 \\ \cline{2-6} & & & & & & & \\ \cline{2-6} \multicolumn{1}{l|}{pred2} & \multicolumn{1}{l|}{3} & \multicolumn{1}{l|}{1} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{1} & \multicolumn{1}{l|}{2} & & s=0.89 \\ \cline{2-6} & & & & & & & \\ \cline{2-6} \multicolumn{1}{l|}{pred3} & \multicolumn{1}{l|}{2} & \multicolumn{1}{l|}{1} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{2} & \multicolumn{1}{l|}{3} & & s=0.56 \\ \cline{2-6} & & & & & & & \\ \cline{2-6} \multicolumn{1}{l|}{pred4} & \multicolumn{1}{l|}{2} & \multicolumn{1}{l|}{3} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{1} & & s=0.56 \\ \cline{2-6} & & & & & & & \\ \cline{2-6} \multicolumn{1}{l|}{pred5} & \multicolumn{1}{l|}{1} & \multicolumn{1}{l|}{2} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{3} & \multicolumn{1}{l|}{0} & & s=0.33 \\ \cline{2-6} & & & & & & & \\ \cline{2-6} \multicolumn{1}{l|}{pred6} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{2} & \multicolumn{1}{l|}{3} & \multicolumn{1}{l|}{0} & & s=0.08 \\ \cline{2-6} & & & & & & & \\ \cline{2-6} \multicolumn{1}{l|}{pred7} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{0} & \multicolumn{1}{l|}{3} & \multicolumn{1}{l|}{3} & \multicolumn{1}{l|}{0} & & s=0 \\ \cline{2-6} \end{tabular} \end{table} \fi \section{Acknowledgments} Guilherme Aresta is funded by the FCT grant contract \\ SFRH/BD/120435/2016. Teresa Ara\'{u}jo is funded by the FCT grant contract SFRH/BD/122365/2016. Aur\'{e}lio Campilho is with the project "NanoSTIMA: Macro-to-Nano Human Sensing: Towards Integrated Multimodal Health Monitoring and Analytics/NORTE-01-0145-FEDER-000016", financed by the North Portugal Regional Operational Programme (NORTE 2020), under the PORTUGAL 2020 Partnership Agreement, and through the European Regional Development Fund (ERDF). Quoc Dang Vu, Minh Nguyen Nhat To, Eal Kim and Jin Tae Kwak are supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2016R1C1B2012433). The authors would like to thank the pathologists Dr$^{a}$ Ana Ribeiro, Dr$^{a}$ Rita Canas Marques e Dr$^{a}$ Ierec\^{e} Aymor\'{e} for their help in labeling the microscopy images. \\\par The authors would also like to thank all the other BACH Challenge participants that registered, submitted their method and were accepted at the 15$^{\text{th}}$ International Conference on Image Analysis and Recognition (ICIAR 2018): Kamyar Nazeri, Azad Aminpour, and Mehran Ebrahimi; Nick Weiss, Henning Kost, and Andr\'{e} Homeyer; Alexander Rakhlin, Alexey Shvets, Vladimir Iglovikov, and Alexandr A. Kalinin; Zeya Wang, Nanqing Dong, Wei Dai, Sean D. Rosario, and Eric P. Xing; Carlos A. Ferreira, T\^{a}nia Melo, Patrick Sousa, Maria In\^{e}s Meyer, Elham Shakibapour and Pedro Costa; Hongliu Cao, Simon Bernard, Laurent Heutte, and Robert Sabourin; Ruqayya Awan, Navid Alemi Koohbanani, Muhammad Shaban, Anna Lisowska, and Nasir Rajpoot; Sulaiman Vesal, Nishant Ravikumar, AmirAbbas Davari, Stephan Ellmann, and Andreas Maier; Yao Guo, Huihui Dong, Fangzhou Song, Chuang Zhu, and Jun Liu; Aditya Golatkar, Deepak Anand, and Amit Sethi; Tomas Iesmantas and Robertas Alzbutas; Wajahat Nawaz, Sagheer Ahmed, Ali Tahir, and Hassan Aqeel Khan; Artem Pimkin, Gleb Makarchuk, Vladimir Kondratenko, Maxim Pisov, Egor Krivov, and Mikhail Belyaev; Auxiliadora Sarmiento, and Irene Fond\'{o}n; Quoc Dang Vu, Minh Nguyen Nhat To, Eal Kim, and Jin Tae Kwak; Yeeleng S. Vang, Zhen Chen, and Xiaohui Xie; Chao-Hui Huang, Jens Brodbeck, Nena M. Dimaano, John Kang, Belma Dogdas, Douglas Rollins, and Eric M. Gifford (authors are ordered according to conference proceedings). \bibliographystyle{model2-names}\biboptions{authoryear} \input{mendeley.bbl} \end{document} \section{Competing solutions} \label{sec:methods} This section provides a comprehensive description of the participating approaches. Table~\ref{tab:partA} and Table~\ref{tab:partB} summarize the methods that achieved an accuracy $\geq 0.7$ and score $\geq 0.5$ on \pAB{}, respectively. The most relevant methods in terms of performance and applicability are detailed on the next sections. For methods that solve \pAB{} jointly, refer to Section~\ref{sec:partAB}, and for \pA{} or \pB{} exclusively refer to Sections~\ref{sec:partA}~and~\ref{sec:partB}, respectively. \input{table_partA} \input{table_partB} \subsection{Introduction to Convolutional Neural Networks} The vast majority of \pA{} and all of \pB{} participants proposed a convolutional neural network (CNN) approach to solve BACH. CNNs are now the state-of-the-art approach for computer vision problems and show high promise in the field of medical image analysis \cite{Litjens2017,Tajbakhsh2016} because they are easy to set up, require little applied field knowledge (specially when compared with handcrafted feature approaches) and allow to migrate base features from generic natural image applications~\cite{Deng2009}. \par CNN performance is highly dependent on the architecture of the network as well as on the hyper-parameter optimization (learning rate, for instance). The large number of parameters in CNNs make them prone to overfit to the training data, specially when a relatively low number of training images is available. Because of that, it is a common practice in medical image analysis to fine-tune networks trained on medical images. In BACH, participants opted mainly for pre-trained networks that have historically achieved high performance in the ImageNet natural image analysis challenge~\cite{Russakovsky2015}. From those, VGG~\cite{Simonyan2014}, Inception~\cite{Szegedy2015}, ResNet~\cite{He2016} and DenseNet~\cite{Huang2017} were the ones that achieved the overall higher results. A brief description of these networks is provided bellow. \par VGG (Visual Geometry Group) was one of the first networks to show that increasing model depth allows higher prediction performance. This network is composed of blocks of 2-3 convolutional layers with a large number of filters that are followed by a max pooling layer. The output of the last layer is then connected to a set of fully-connected layers to produce the final classification. However, despite the success of this model on the ImageNet challenge, the linear structure of VGG and large number of parameters (approximately 140M for 16 layers) does not allow to significantly increase the depth of the model and increases tendency to overfit. \par The Inception network follows the theory that most activations in a (deep-)CNN are either unnecessary or redundant and thus the number of parameters can be reduced by using locally sparse building blocks (\textit{a.k.a.} inception blocks). At each inception block, the number feature maps of the previous block is reduced via an $1\times 1$ convolution. The projected features are then convolved in parallel by kernels of increasing size, allowing to combine information at multiple scales. Finally, replacing the the fully-connected layers by a global average pooling allows to significantly reduce the model parameters (23M parameters with 159 layers) and makes the network fully convolutional, enabling its application to different input sizes. \par Increasing network depth leads to vanishing gradient problems as a result of the large number of multiplication operations. Consequently, the error gradient will be vanishingly small preventing effective updates of the weights in the initial layers of the model. The recent versions of Inception tackle this issue by using Batch Normalization \cite{Ioffe2015}, which allows to reestablish the gradient by normalizing the intermediary activation maps with the statistics of the training batch. Alternatively, ResNet uses residual blocks to stabilize the value of the error gradient during training. In each residual block the input activation map is summed to the output of a set of convolutional layers, thus stopping the gradient from vanishing and easing the flow of information. A ResNet with 50 residual blocks (169 layers) has approximately 25M parameters. \par The high performance of models like Inception or ResNet have strengthened the deep learning design principle that "deeper networks are better" by improving on the feature redundancy and gradient vanishing problems. Recently, an even deeper network, DenseNet, has addressed these same issues by using dense blocks. Dense blocks introduce short connections between convolutional layers, \textit{i.e.}, for each layer, the activations of all preceding layers are used as inputs. By doing so, DenseNet promotes feature re-use, reducing the feature redundancy and thus allowing to decrease the number of feature maps per layer. Specifically, a DenseNet with 201 layers has approximately 20M parameters to optimize. As already mentioned, fine-tuning of high performance networks trained in natural images is the preferred approach for medical image analysis. Fine-tuning for classification is usually performed as follows: \begin{inparaenum}[1)] \item the network is initialized with weights trained to solve a natural image classification problem such as the ImageNet classification task; \item the classification head, usually a fully-connected layer, is replaced by a new one with randomly initialized parameters; \item initially, the new classification head is trained for a fixed number of iterations by inputting the medical images and inhibiting the filters of the pre-trained model to change; \item then, different blocks of the pre-trained model are progressively allowed to learn and adapt to the new features, allowing the model to move to new local optima and increase the overall performance of the network. \end{inparaenum} \par \subsection{\pA{} \label{sec:partA}} \subsubsection{\etal{Chennamsetty} (team 216)} \cite{Chennamsetty2018} used an ensemble of ImageNet pre-trained CNNs to classify the images from \pA{}. Specifically, the algorithm is composed of a ResNet-101\cite{He2016} and two DenseNet-161~\cite{Huang2017} networks fine-tunned with images from varying data normalization schemes. Initializing the model with pre-trained weights alleviates the problem of training the networks with limited amount of high quality labeled data. First, the images were resized to $224\times224$ pixels via bilinear interpolation and normalized to zero mean and unit standard deviation according to statistics derived either from ImageNet or \pA{} datasets, as detailed below. \par During training, the ResNet-101 and a DenseNet-161 were fine-tuned with images normalized from the breast histology data whereas the other DenseNet-161 was fine-tuned with the ImageNet normalization. Then, for inference, each model in the ensemble predicts the cancer grade in the input image and a majority voting scheme is posteriorly used for assigning the class associated with the input. \subsubsection{\etal{Brancati} (team 1)} \cite{Brancati2018} proposed a deep learning approach based on a fine-tuning strategy by exploiting transfer learning on an ensemble of ResNet~\cite{He2016} models. ResNet was preferred to other deep network architectures because it has a small number of parameters and shows a relatively low complexity in comparison to other models. The authors opted by further reducing the complexity of the problem by down-sampling the image by factor $k$ and using only the central patch of size $m\times m$ as input to the network. In particular, $k$ was fixed to 80\% of the original image size and $m$ was set equal to the minimum size between the width and high of the resized image. \par The proposed ensemble is composed of 3 ResNet configurations: 34, 50 and 101. Each configuration was trained on the images from \pA{} and the classification of a test image is obtained by computing the highest class probability provided by the three configurations. \subsubsection{\etal{Wang} (team 157)} \cite{Wang2018} proposed the direct application of VGG-16~\cite{Simonyan2014} to solve \pA{}. Prior to fine-tuning the model, all images from \pA{} were resized to $256\times 256$ and normalized to zero mean and unit standard deviation. To account for the model input size, training is performed by cropping patches of $224\times 224$ pixels at random locations of the input image. First, the model is trained using a Sample Pairing~\cite{Inoue2018} data augmentation scheme. Specifically, a random pair of images of different labels is independently augmented (translations, rotations, etc.) and then superimposed with each other. The resulting mixed patch receives the label of one of the initial images and is afterwards used to train the classifier. The learned weights are then used as a starting point to train the network with the initial (\textit{i.e.} non mixed) dataset. \subsubsection{Kone \textit{et. al} (team 19)} \cite{Kone2018} proposed a hierarchy of 3 ResNeXt50~\cite{Xie2017} models in a binary tree like structure (one parent and two child nodes) for the 4-class classification of \pA{}. The top CNN classifies images in two high level groups: \begin{inparaenum} \item carcinoma, which includes the \textit{in situ} and the invasive classes and \item non-carcinoma, which includes normal and benign. \end{inparaenum} Then, each of children CNNs sub-classifies the images in the respective 2 classes. \par The training is performed in two steps. First, the parent ResNeXt50 pre-trained on ImageNet is fine tunned with the images from \pA{}. The learned filters are then used as the starting point for the child networks. The authors also divide the ResNeXt50 layers into three groups and assign them different learning rates based on the optimal one found during training. \subsection{\pB{} \label{sec:partB}} \subsubsection{\etal{Galal} (team 264)} \cite{Galal2018} proposed Candy Cane, a fully convolutional network based on DenseNets~\cite{Huang2017} for the segmentation of WSIs. Candy Cane was designed following an auto-encoder scheme of downsampling and upsampling paths with skip connections between corresponding down and up feature maps to preserve low level feature information. Accounting for GPU memory restrictions, the authors propose a downsampling path much longer than the upsampling counter-part. Specifically, Candy Cane operates on $2048\times 2048$ slice images and outputs the corresponding labels at a size of $256\times256$ pixels. Similarly to an expert that looks at a microscope in few adjacent regions to examine the tissue but then identifies regions in the larger context of the tissue, the large input size of the model allows the network to have both microscopy and tissue organization contexts. The output of the system is then resized to the original size. \subsection{\pAB{} \label{sec:partAB}} \subsubsection{\etal{Kwok} (team 248)} \cite{Kwok2018} used a two-stage approach to take advantage of both microscopy and WSI images. To account for the partially missing patient-wise origin on \pA{}, images which origin was not available were clustered based on color similarity. The data was then split accordingly. For stage 1, $5600$ patches of $1495\times1495$ pixels were extracted from \pA's images with a stride of 99 pixels. These patches were then resized to $299\times299$ pixels and used for fine-tuning a 4 class Inception-Resnet-v2~\cite{Szegedy2017} trained on ImageNet. This network was then used for analyzing the WSIs. Specifically, WSI foreground masks were computed via a threshold on the L*a*b color space. Then, patches were extracted from the WSIs in the same way as for \pA{}. This second patch dataset was refined by discarding images with $<5\%$ foreground and posteriorly labeled using the CNN trained on \pA. Finally, $5900$ patches from the top 40\% incorrect predictions (evenly sampled from each of the 4 classes) were selected as hard examples for stage 2. \par For stage 2, the CNN was retrained by combing the patches extracted from \pA{} ($5600$) and \pB{} ($5900$). The resulting model was used for labeling both microscopy images and WSIs. Prediction results were aggregated from patch-wise predictions back onto image-wise predictions (for \pA{}) and WSI-wise heatmaps (for \pB{}). Specifically for \pB{}, the patch-wise predictions were mapped to hard labels (Normal=0, Benign=1, \textit{in situ}=2 and Invasive=3) and combined into a single image based on the patch coordinates and the network's stride. The resulting map was then normalized to $[0\,1]$ and multi-thresholded at $\{0, 0.35,$ $0.7, 0.75\}$ to bias the predictions more towards Normal/Benign and less to \textit{in situ} and Invasive carcinomas. \subsubsection{\etal{Marami} (team 16)} \cite{Marami2018} proposed a classification scheme based on an ensemble of four modified Inception-v3~\cite{Szegedy2016} CNNs that aims at increasing the generalization capability of the method by combining different networks trained on random subsets of the data. Specifically, the networks were adapted by adding an adaptive pooling before a set of custom fully connected layers, allowing higher robustness to small scale changes. Each of these CNNs was trained via a 4 fold cross-validation approach on 512$\times$512 images extracted at 20$\times$ magnification from both microscopy images from \pA{} and WSI from \pB{}, as well as with benign tissue images from the BreakHis public dataset~\cite{Spanhol2016}. \par Predictions on unseen data are inferred by averaging the output probabilities of the trained ensemble network for each class, making the system more robust to potential inconsistencies and corruption in the labeled data. For \pA{}, the final label was obtained by majority voting of 12 overlapping 512$\times$512 regions. For the WSIs, local predictions were generated by using a 512$\times$512 sliding window of stride 256 pixels. The resulting output map was then refined using a ResNet34\cite{He2016} to separate tissue regions from the background and regions with artifacts, reducing potential misclassifications due to ink and other artifacts in whole slide images. \subsubsection{\etal{Kohl} (team 54)} \cite{Kohl2018} used an ImageNet pretrained DenseNet~\cite{Huang2017} to approach both parts of the challenge. For \pA{}, the 400 training images were downsampled by a factor 10 and normalized to zero mean and unit standard deviation. The network was then trained on two steps: \begin{inparaenum}[1)] \item fine-tuning the fully-connected portion of the network by 25 epochs to avoid over-fitting and \item training the entire network for 250 epochs. \end{inparaenum} \par For \pB{}, the authors extracted patches of $330{\mu m} \times 330{\mu m}$ ($157 \times 157$ pixels) from the annotated WSIs. This patch dataset was then refined by removing patches consisting of at least 80\% background pixels, similarly to \etal{Litjens}~\cite{Litjens2016}). Due to the very limited amount of data in the benign and \textit{in situ} carcinoma classes, the authors did not perform WSI-wise split for validation purposes and instead used a randomly split dataset. Also, 16 of the 20 originally non-annotated WSIs were also annotated with the help of a trained pathologist and thus in total $41506$ image patches ($25230$ normal, $1723$ benign, $1759$ \textit{in situ} and $12794$ invasive carcinomas) were used. Network training was similar for \pA{} and \pB{}: 25 epochs for training the fully-connected layers followed by 250 epochs for training the whole network in case of \pA{}, and 6 epochs for training the fully-connected layers followed by 100 epochs for training the whole network using log-balanced class weights in case of \pB{}. \subsubsection{\etal{Vu} (team 166)} \cite{Vu2018} proposed to use an encoder-decoder network to solve both \pA{} and \pB{}. For \pA{}, the authors use the encoder part of the model. The encoder is composed of five convolutional processing blocks that integrate dense skip connections, group and dilated convolutions, and self-attention mechanism for dynamic channel selection following the design trends of DenseNet, Squeeze-Excitation Network (SENet) and ResNext~\cite{Huang2017,Jegou2016,Yu2015,Hu2017,Xie2017}. For classifying the microscopy images, the model has a head composed of a global average pooling and a fully-connected softmax layer. Training is performed by downsampling the images $4\times$ and online data augmentation is used. \par For \pB{} the full encoder-decoder scheme is used. This segmentation network follows the U-Net~\cite{Ronneberger2015} structure with skip connections between the downsample and upsample, the decoder is composed by the same convolutional blocks and the upsample is performed considering the nearest neighbor. Also, to ease network convergence, the encoder is initialized with the weights learned from \pA{}. For training, the WSI are first downscaled by a factor of 4 and sub-regions containing the labels of interest are collected. Specifically, the authors collect $6129$ sub-regions of size $1000\times 1000$ from which the central regions of $630\times 630$ are used as input to the model. The corresponding output segmentation map has a size of $204\times 204$. To prioritize the detection of pathological regions, the segmentation network is trained with two categorical crossentropy loss terms, where the main loss targets for the four histology classes and the auxiliary loss is computed for normal and benign \textit{vs} \textit{in situ} carcinoma and invasive carcinoma groups. \section{Results} \label{sec:results} \begin{figure*}[t] \centering \begin{subfigure}{0.48\textwidth} \includegraphics[width=\textwidth]{figures/registrations} \caption{Registrations.} \end{subfigure} \hfill \begin{subfigure}{0.48\textwidth} \includegraphics[width=\textwidth]{figures/submissions} \caption{Submissions.} \end{subfigure} \hfill \caption{Geographical distribution of the BACH participants. a) registered on the website; b) submitted for the test set. \label{fig:participants}} \end{figure*} The BACH had worldwide participation, with a total of 677 registrations and 64 submissions for both part A (51) and B (13), as shown on Fig.~\ref{fig:participants}. \subsection{Performance in \pA{}} Participants of the \pA{} of the challenge were ranked in terms of accuracy. As in \etal{Ara\'{u}jo}~\cite{Araujo2017}, these submissions were further evaluated in terms of sensitivity and specificity: \begin{equation} \text{sensitivity} = \frac{TP}{TP+FN} \end{equation} \begin{equation} \text{specificity} = \frac{TN}{TN+FP} \end{equation} \noindent where $TP$, $TN$, $FP$ and $FN$ are the class-wise true-positive, true-negative, false-positive and false-negative predictions, respectively. For benchmarking purposes, a simple fine-tuning experiment on the BACH \pA{} was conducted. Specifically, the classification parts of VGG16, Inception~v3, ResNet50 and DenseNet169 were replaced by a pair of untrained fully-connected layers with 1024 and 4 neurons. These networks were then trained on two steps, first by updating only the new fully-connected layers until the validation loss stopped improving and posteriorly training the entire model until the same stop criteria was met. Adam~\cite{Kingma2015} was used as optimizer and the loss was the categorical cross-entropy. \par Finally, to further evaluate the performance of the methods submitted to \pA{}, four pathologists (E1--E4) were asked to classify the field images from the BACH test set. E1 and E3 are breast cancer specialists and E2 and E4 are experienced pathologists. Also, E1 was one of the two experts involved in the construction of training and testing sets from BACH, and the remaining three were external to the process. The difference in the annotation process was that in the BACH sets construction the pathologists had access to other regions of the patient tissue (and potentially imunohistochemical analysis), whether in this second phase they could only see the field image, \textit{i.e.}, they only had access to the same information of the automated classification algorithms. \par The class-wise performance of the methods is shown in Table~\ref{tab:pA_sens}. Table~\ref{tab:pA_sens_2} shows the performance for two binary cases: \begin{inparaenum}[1)] \item a referral scenario, \textit{Pathological}, where the objective is to distinguish Normal images from the remaining classes and, \item a cancer detection scenario, \textit{Cancer}, where the Normal and Benign classes are grouped \textit{vs} the \textit{In situ} and Invasive classes. \end{inparaenum} \par \begin{table}[t] \centering \caption{Class-wise sensitivity and specificity of \pA{} approaches for the classes in study. Benchmarking results via fine-tuning are also shown. Acc - accuracy; Se - sensitivity; Sp - specificity. Expert 1 annotated the BACH dataset. \label{tab:pA_sens}} \setlength{\tabcolsep}{0.15em} \footnotesize \begin{tabular}{c|c||c|c|c|c|c|c|c|c}\hline \multicolumn{2}{c|}{}& \multicolumn{2}{|c}{\textbf{Normal}}& \multicolumn{2}{c}{\textbf{Benign}} & \multicolumn{2}{c}{\textbf{\textit{In situ}}} & \multicolumn{2}{c}{\textbf{Invasive}}\\\hline \textbf{Team} & \textbf{Acc} & Se. & Sp. & Se. & Sp.& Se. & Sp.& Se. & Sp.\\\hline \textbf{216} &0.87 & 0.96& 0.88& 0.8& 0.96& 0.84& 1.0& 0.88& 0.99\\ \textbf{248} &0.87 & 0.96& 0.93& 0.72& 0.96& 0.88& 0.97& 0.92& 0.96\\ \textbf{1} &0.86 & 0.96& 0.91& 0.68& 0.97& 0.84& 0.99& 0.96& 0.95\\ \textbf{16} &0.84 & 0.92& 0.95& 0.64& 0.96& 0.84& 0.99& 0.96& 0.89\\ \textbf{54} &0.83 & 0.96& 0.92& 0.52& 0.97& 0.88& 0.92& 0.96& 0.96\\ \textbf{157} &0.83 & 0.96& 0.91& 0.64& 0.99& 0.92& 0.91& 0.8& 0.97\\ \textbf{186} &0.81 & 0.96& 0.92& 0.68& 0.96& 0.76& 0.95& 0.84& 0.92\\ \textbf{19} &0.81 & 1.0& 0.95& 0.4& 0.99& 0.92& 0.92& 0.92& 0.89\\ \textbf{36} &0.81 & 0.88& 0.92& 0.6& 0.96& 0.88& 0.95& 0.88& 0.92\\ \textbf{412} &0.8 & 0.92& 0.96& 0.48& 0.97& 0.84& 0.92& 0.96& 0.88\\\hline VGG & 0.58 & 0.84 & 0.84 & 0.64 & 0.84 & 0.72 & 0.87 & 0.36 & 0.97 \\ Inception & 0.77 & 0.92 & 0.93 & 0.44 & 0.96 & 0.88 & 0.87 & 0.84 & 0.93 \\ ResNet & 0.76 & 0.88 & 0.92 & 0.52 & 0.95 & 0.8 & 0.87 & 0.84 & 0.95 \\ DenseNet & 0.79 & 0.92 & 0.96 & 0.36 & 0.99 & 0.92 & 0.83 & 0.96 & 0.95 \\ \hline Expert 1 & 0.96 & 0.96 & 0.99 & 0.92 & 0.97 & 1.0 & 1.0 & 0.96 & 0.99 \\ Expert 2 & 0.94 & 0.96 & 0.99 & 0.88 & 0.96 & 1.0 & 1.0 & 0.92 & 0.97 \\ Expert 3 & 0.78 & 0.88 & 0.99 & 0.76 & 0.79 & 0.56 & 0.97 & 0.92 & 0.96 \\ Expert 4 & 0.73 & 0.40 & 0.99 & 0.84 & 0.71 & 0.76 & 0.97 & 0.92 & 0.97 \\ \hdashline \parbox{5em}{\centering\textbf{Experts}\\\textbf{(avg.)}} & \splito{0.85$\pm$}{0.10} & \splito{0.80$\pm$}{0.23} & \splito{0.99$\pm$}{0.00} & \splito{0.85$\pm$}{0.06} & \splito{0.86$\pm$}{ 0.11} & \splito{0.83$\pm$}{0.18} & \splito{0.99$\pm$}{0.01} & \splito{0.93$\pm$}{0.02} & \splito{0.97$\pm$}{0.01} \\\hline \end{tabular} \end{table} \begin{table}[t] \centering \caption{Class-wise sensitivity and specificity of \pA{} approaches. \textbf{Patho.} refers to Benign, \textit{in situ} and Invasive \textit{vs} Normal, and \textbf{Cancer} refers to \textit{in situ} and Invasive \textit{vs} Normal and Benign classes. Benchmarking results via fine-tuning are also shown. Acc - accuracy ($\pm$ the confidence interval); Se - sensitivity; Sp - specificity. Expert 1 annotated the BACH dataset. \label{tab:pA_sens_2}} \setlength{\tabcolsep}{0.35em} \footnotesize \begin{tabular}{c|c|c|c||c|c|c}\hline \multicolumn{1}{c}{}&\multicolumn{3}{c}{\textbf{Patho.}} & \multicolumn{3}{c}{\textbf{Cancer}} \\\hline \textbf{Team} & Acc. & Se. & Sp. & Acc.& Se. & Sp.\\\hline \textbf{216} & 0.9& 0.88& 0.96& 0.92 & 0.86& 0.98\\ \textbf{248} &0.94 & 0.93& 0.96& 0.92 & 0.92& 0.92\\ \textbf{1} & 0.92 & 0.91& 0.96& 0.9 & 0.9& 0.9\\ \textbf{16} & 0.94 & 0.95& 0.92&0.9 &0.94& 0.86\\ \textbf{54} & 0.93 & 0.92& 0.96& 0.89 & 0.94& 0.84\\ \textbf{157} & 0.92 & 0.91& 0.96& 0.94 & 0.96& 0.92\\ \textbf{186} & 0.93 & 0.92& 0.96& 0.9 & 0.9& 0.9\\ \textbf{19} & 0.96 & 0.95& 1.0& 0.86 & 0.96& 0.76\\ \textbf{36} & 0.91 & 0.92& 0.88& 86 & 0.9& 0.82\\ \textbf{412} & 0.95 & 0.96& 0.92& 0.86 & 0.96& 0.76\\\hline VGG16 & 0.84& 0.84 & 0.84 &0.66 & 0.66 & 0.88 \\ Inception V3 & 0.93 & 0.93 & 0.92 &0.92 & 0.92 & 0.76 \\ ResNet 50 & 0.92 & 0.92 & 0.88 & 0.86 & 0.86 & 0.76 \\ DenseNet 169 & 0.96 & 0.96 & 0.92 & 0.96 & 0.96 & 0.68 \\ \hline Expert 1 & 0.98 & 0.99 & 0.96 & 0.98 & 0.98 & 0.98 \\ Expert 2 & 0.98 & 0.99 & 0.96 & 0.96 & 0.96 & 0.96 \\ Expert 3 & 0.96 & 0.99 & 0.88 & 0.82 & 0.74 & 0.90 \\ Expert 4 & 0.84 & 0.99 & 0.40 & 0.90 & 0.86 & 0.94 \\\hdashline \parbox{5em}{\centering\textbf{Experts}\\\textbf{(avg.)}} & \splito{0.94$\pm$}{0.06} & \splito{0.99$\pm$}{0.00} & \splito{0.80$\pm$}{0.24} & \splito{0.91$\pm$}{0.06} & \splito{0.88$\pm$}{0.09} & \splito{0.95$\pm$}{0.03}\\\hline \end{tabular} \end{table} Fig.~\ref{fig:reported_performance} depicts, for the top-10 participants, the difference between the reported performances on the training set (cross-validation) and the achieved performances on the hidden test set. Also, a class-wise study of these methods shows that the Benign and \textit{In situ} classes are the most challenging to classify (Fig.~\ref{fig:misclassifications}). In particular, Fig.~\ref{fig:most_erroneous1}~and~\ref{fig:most_erroneous2} show two images with 100\% inter-observer agreement that were misclassified by the majority (at least 80\%) of the top-10 approaches. \begin{figure*}[htpb!] \centering \begin{subfigure}{0.4\textwidth} \centering \includegraphics[width=\textwidth]{figures/reported_performance} \caption{Reported performance during the method submission and respective test accuracy for the top-10 performing teams. \label{fig:reported_performance}} \end{subfigure} \qquad \begin{subfigure}{0.4\textwidth} \includegraphics[width=\textwidth]{figures/misclassifications} \caption{Cumulative number of unique misclassifications per class for the top-10 performing teams. Higher values are indicative of a more challenging classification.\label{fig:misclassifications}} \end{subfigure} \begin{subfigure}{0.4\textwidth} \includegraphics[width=\textwidth]{figures/benign_most_classif_in_situ} \caption{Case of Benign mostly misclassified as \textit{In situ}\label{fig:most_erroneous1}} \end{subfigure} \qquad \begin{subfigure}{0.4\textwidth} \includegraphics[width=\textwidth]{figures/benign_most_classif_invasive} \caption{Case of Benign mostly misclassified as Invasive\label{fig:most_erroneous2}} \end{subfigure} \begin{subfigure}{0.4\textwidth} \includegraphics[width=\textwidth]{figures/train_insitu} \caption{Example of an \textit{In situ} case from the training set\label{fig:most_erroneous1_train}} \end{subfigure} \qquad \begin{subfigure}{0.4\textwidth} \includegraphics[width=\textwidth]{figures/train_invasive} \caption{Example of an Invasive case from the training set\label{fig:most_erroneous2_train}} \end{subfigure} \caption{Examples of images misclassified by the top-10 methods of \pA{} and similar examples in the training set.\label{fig:most_erroneous}} \end{figure*} \subsubsection{Inter-observer analysis} \begin{figure*}[htpb!] \centering \includegraphics[width=\textwidth]{figures/kappa_confusion.pdf} \caption{Inter-observer, inter-method and observer-method quadratic-weighted kappa score \pA{}. E1--E4 are four expert pathologists, GT is the ground-truth and the numbers indicate the respective team. Expert 1 annotated the BACH dataset one month before participating in the inter-observer study. \textbf{4 classes} considers the 4 classes used in this study. \textbf{Patho.} refers to Benign, \textit{In situ} and Invasive \textit{vs} Normal, and \textbf{Cancer} refers to \textit{In situ} and Invasive \textit{vs} Normal and Benign classes. {\color{red}$\Box$}$~$the prediction is statistically different according to the McNemar's test.} \label{fig:kappa_pA} \end{figure*} \begin{figure} \centering \includegraphics[width=\columnwidth]{figures/conf_matrix.pdf} \caption{Confusion matrices of the 4 expert annotators (E\#) for the 100 test images of \pA{}. \textbf{N} - Normal; \textbf{B} - Benign; \textbf{i} - \textit{in situ}; \textbf{I} - Invasive.} \label{fig:conf_A} \end{figure} The accuracies of the three external pathologists are of 94$\%$, 78$\%$ and 73$\%$, and the accuracy of the pathologist from BACH is 96$\%$. Note that this pathologist annotated the images after one month from the first annotation, in order to avoid the influence of past knowledge regarding the patients' exams. For comparison purposes, Fig.~\ref{fig:kappa_pA} shows the inter-observer, inter-method and observer-method agreement via the quadratic-weighted Cohen's kappa score and their corresponding statistical differences, and Fig.~\ref{fig:conf_A} shows the confusion matrices of the experts. \iffalse \begin{table}[tb] \centering \caption{Quadratic Kappa of the automatic methods and medical experts ($\pm$ standard deviation) in comparison with the ground-truth labels for \pA{}. \textbf{Patho.} refers to Benign, \textit{in situ} and Invasive \textit{vs} Normal, and \textbf{Cancer} refers to \textit{in situ} and Invasive \textit{vs} Normal and Benign classes. \hlo{Expert 1 annotated the BACH dataset.}~\label{tab:kappa_pA} } \footnotesize \begin{tabular}{c|c|c|c}\hline \textbf{Team} & \textbf{4 classes} & \textbf{Patho.} & \textbf{Cancer} \\ \hline \textbf{216} & 0.83 & 0.76 & 0.84 \\ \textbf{248} & 0.88 & 0.85 & 0.84 \\ \textbf{1} & 0.84 & 0.8 & 0.8 \\ \textbf{16} & 0.83 & 0.84 & 0.8 \\ \textbf{54} & 0.88 & 0.82 & 0.78 \\ \textbf{157} & 0.88 & 0.8 & 0.88 \\ \textbf{186} & 0.83 & 0.82 & 0.8 \\ \textbf{19} & 0.83 & 0.9 & 0.72 \\ \textbf{36} & 0.76 & 0.77 & 0.72 \\ \textbf{412} & 0.82 & 0.87 & 0.72 \\\hline Expert 1 & 0.96 & 0.95 & 0.96 \\ Expert 2 & 0.93 & 0.95 & 0.92 \\ Expert 3 & 0.85 & 0.89 & 0.64 \\ Expert 4 & 0.84 & 0.48 & 0.8 \\ \textbf{Experts (avg.)} & 0.90$\pm$ 0.05 & 0.82 $\pm$ 0.20 & 0.83 $\pm$ 0.12 \\\hline \end{tabular} \end{table} \fi \subsection{Performance in \pB{}} The overall challenge performance and main approaches of the participating teams are shown in Table~\ref{tab:partB}. Similarly to \pA{}, please refer to Tables~\ref{tab:pB_sens}~and~\ref{tab:pB_sens_2} for the team-wise sensitivity and specificity of the methods. For reference purposes, Table~\ref{tab:pB_sens} also shows the quadratic-weighted kappa scores for each method. Examples of pixel-wise predictions for \pB{} are shown in Fig.~\ref{fig:pb_pred}. The correct identification of invasive regions was more successful, as opposed to benign and \textit{in situ} regions. \begin{table}[tb] \centering \caption{Class-wise sensitivity and specificity of \pB{} approaches for the classes in study, along with the challenge score and the quadratic-weighted kappa score ($\pm$ the confidence interval). Se - sensitivity; Sp - specificity; Score - challenge score $s$ (Eq.~\ref{eq:score}); $k$ - kappa score. \label{tab:pB_sens}} \footnotesize \begin{tabular}{c|c|c||c|c|c|c|c|c|c}\hline \multicolumn{3}{c|}{}& \multicolumn{2}{|c}{\textbf{Benign}}& \multicolumn{2}{c}{\textbf{\textit{In situ}}} & \multicolumn{2}{c}{\textbf{Invasive}} \\\hline \textbf{Team} & \textbf{Score} & $k$ & Se. & Sp. & Se. & Sp.& Se. & Sp.\\\hline \textbf{248}& 0.69$\pm0.07$ &0.44$\pm0.18$ &0.36& 0.7& 0.03& 0.59& 0.4& 0.96\\ \textbf{16} & 0.55$\pm0.11$ &0.51$\pm0.15$ &0.09& 0.99& 0.05& 0.95& 0.45& 0.92 \\ \textbf{296} & 0.52$\pm0.16$&0.48$\pm0.19$ & 0.07& 0.99& 0.03& 0.95& 0.39& 0.93\\ \textbf{137} & 0.52$\pm0.15$&0.51$\pm0.18$ & 0.04& 1& 0.02& 0.92& 0.53& 0.89\\ \textbf{91} & 0.50$\pm0.10$&0.28$\pm0.12$ & 0.05& 0.8& 0.18& 0.53& 0.13& 0.89\\ \textbf{264}& 0.50$\pm0.13$ &0.29$\pm0.17$ &0.05& 0.88& 0.08& 0.52& 0.47& 0.74 \\ \textbf{166}& 0.49$\pm0.11$&0.28$\pm0.15$ & 0.14& 0.9& 0.05& 0.63& 0.44& 0.76\\ \textbf{94}& 0.47$\pm0.15$&0.39$\pm0.18$ & 0.16& 0.95& 0.05& 0.76& 0.5& 0.78\\ \textbf{256}& 0.46$\pm0.14$&0.17$\pm0.14$ & 0.18& 0.58& 0& 0 & 0.58& 0.47\\ \textbf{15}& 0.46$\pm0.13$&0.27$\pm0.15$ & 0.11& 0.78& 0.02& 0.46& 0.4& 0.68\\ \textbf{54} & 0.42$\pm0.14$&0.34$\pm0.15$ & 0.03& 0.98& 0.06& 0.75& 0.52& 0.74\\ \textbf{183} & 0.39$\pm0.10$&0.12$\pm0.13$ & 0.31& 0.81& 0.15& 0.47& 0.15& 0.71\\ \textbf{252}& 0.33$\pm0.12$&0.13$\pm0.09$ & 0.02& 0.98& 0& 0.85& 0.2& 0.88\\ \hline \end{tabular} \end{table} \begin{table}[tb] \centering \caption{Class-wise sensitivity and specificity of \pB{} approaches. \textbf{Patho.} refers to Benign, \textit{In situ} and Invasive \textit{vs} Normal, and \textbf{Cancer} refers to \textit{In situ} and Invasive \textit{vs} Normal and Benign classes. Se - sensitivity; Sp - specificity. \label{tab:pB_sens_2}} \footnotesize \begin{tabular}{c|c|c|c|c}\hline \multicolumn{1}{c}{} & \multicolumn{2}{|c|}{\textbf{Patho.}} & \multicolumn{2}{c}{\textbf{Cancer}} \\\hline \textbf{Team} & Se. & Sp.& Se. & Sp. \\\hline \textbf{248}& 0.78& 0.59& 0.46& 0.93\\ \textbf{16} & 0.6& 0.95& 0.52& 0.93\\ \textbf{296}& 0.53& 0.95& 0.43& 0.93\\ \textbf{137}& 0.63& 0.92& 0.58& 0.89\\ \textbf{91}&0.71& 0.53& 0.55& 0.71\\ \textbf{264} &0.81& 0.52& 0.61& 0.58\\ \textbf{166} & 0.68& 0.63& 0.52& 0.72\\ \textbf{94}& 0.7& 0.76& 0.58& 0.78\\ \textbf{256} & 0.9& 0 & 0.68& 0.48\\ \textbf{15}& 0.82& 0.46& 0.56& 0.65\\ \textbf{54} & 0.68& 0.75& 0.57& 0.74\\ \textbf{183} & 0.8& 0.47& 0.45& 0.61\\ \textbf{252}& 0.3& 0.85& 0.29& 0.87\\ \hline \end{tabular} \end{table} \begin{figure*}[tb] \centering \begin{subfigure}{0.45\textwidth} \includegraphics[width=\textwidth]{figures/gt_9} \caption{Ground-truth (image 10). } \end{subfigure} \hfill \begin{subfigure}{0.45\textwidth} \includegraphics[width=\textwidth]{figures/248_9} \caption{Prediction from team 248. $s=0.897$} \end{subfigure} \begin{subfigure}{0.45\textwidth} \includegraphics[width=\textwidth]{figures/16_9} \caption{Prediction from team 16. $s=0.842$} \end{subfigure} \hfill \begin{subfigure}{0.45\textwidth} \includegraphics[width=\textwidth]{figures/296_9} \caption{Prediction from team 296. $s=0.905$} \end{subfigure} \caption{Examples of test set predictions for \pB{} from the top performing teams. {\color{red}$\blacksquare$}$~$benign; {\color{green}$\blacksquare$}$~$\textit{in situ}; {\color{blue}$\blacksquare$}$~$invasive. The original WSIs were converted to grayscale and the teams' predictions overlayed (background was removed, appearing in black). The obtained $s$ scores (Eq.~\ref{eq:score}) are also shown. \label{fig:pb_pred}} \end{figure*} \subsection{Statistical analysis} The top-10 methods of \pA{} and the annotations of the medical experts are statistically compared via an adaption of McNemar's test~\cite{Edwards1948, Dietterich1993}. The McNemar test is based on the chi-squared distribution and allows to assess the performance of two classifiers based on their accuracy on an independent test set. Let A and B be two methods to compare. The chi-squared ($\chi^2$) distribution with 1 degree of freedom is defined by Eq.~\ref{eq:mcnemar}: \begin{equation} \chi^2 = \frac{(\,|\,n_{01}-n_{10}\,|-1\,)^2}{n_{01}+n_{10}} \label{eq:mcnemar} \end{equation} \noindent where $n_{01}$ is the number of misclassified test samples by B but not by A and $n_{10}$ is the number of samples misclassified by A but not by B. The null assumption that A and B have equal classification performance is rejected if $\chi^2>3.841$, corresponding to a p-value of 0.05. The statistical analysis for \pA{} is summarized in Fig.~\ref{fig:kappa_pA}. The \pB's submissions are statistically assessed by the confidence intervals of their average performance in terms of the BACH score $s$ and quadratic-weighted kappa score. Namely, assuming that the scores belong to a Gaussian distribution, the confidence interval $ci$ is computed as in Eq.~\ref{eq:conf_inter}: \begin{equation} ci_m = \pm 1.96\frac{\sigma_m}{\sqrt{n}} \label{eq:conf_inter} \end{equation} \noindent where 1.96 is the critical value of the confidence interval for $p=0.05$, $\sigma_m$ is the standard deviation of one of the studied scores for method $m$ and $n$ is the size of the population (10 for this study).
\section{Introduction} Magnetic resonance imaging (MRI) is an excellent non-invasive diagnostic tool to accurately assess pathologies in several anatomies. However, MRI is fundamentally constrained in optimizing for either high-resolution, high signal-to-noise ratio (SNR), or low scan durations. Enhancing one of the three outcomes necessarily degrades one or both of the others. Additionally, unlike other imaging modalities, MR images are qualitative in nature and do not directly correlate to the underlying tissue physiology. While quantitative MRI may help in assessing tissue biochemistry and longitudinal changes, biomarker accuracy is extremely sensitive to image SNR. Consequently, it is challenging to develop a single MRI method to produce high-resolution morphological images with high quantitative biomarker accuracy in a reasonable scan time, which is tolerable for patients and which ultimately limits cost of the procedure. \subsection{Background} The double-echo in steady-state (DESS) pulse sequence can generate high-resolution images with diagnostic contrast as well as the quantitative biomarker of T$_2$ relaxation time, in only five-minutes of scan time \cite{chaudhari2017five}. The T$_2$ relaxation time has shown to be sensitive to collagen matrix organization and tissue hydration levels, and is useful for assessing degradation of tissues such as cartilage, menisci, tendons, and ligaments \cite{mosher2004cartilage}. DESS intrinsically produces two images with independent contrasts. The first echo of DESS (S$_1$) has a T$_1$/T$_2$ weighting while the second echo of DESS (S$_2$) has a high T$_2$ weighting. \begin{figure}[tbp] \begin{center} \includegraphics[width=4.8in]{figures/DESS_Example.pdf} \end{center} \vspace*{-5mm} \caption{Compared to the single-contrast DESS, dual-contrast DESS provides additional morphological information and automatic quantitative T$_2$ relaxation time maps. The separate DESS contrasts (S$_1$ and S$_2$) and T$_2$ maps are useful in assessing the cartilage (dashed arrow), the menisci (dotted arrow), and inflammation (solid arrow). The T$_2$ maps are not affected by noisy fat-suppression of bony signal.} \label{fig:dess} \end{figure} In previous applications of DESS, the S$_1$ and S$_2$ scans are combined during the reconstruction process to produce an output with a singular contrast (herein referred as \textit{single-contrast DESS}) \cite{Peterfy2008}. However, separating the two echoes can provide considerable diagnostic utility since both echoes are sensitive to varying pathologies. Additionally, the two independent-contrast images (herein referred as \textit{dual-contrast DESS}) can be used to analytically determine the tissue T$_2$ relaxation time, which is a promising biomarker for tissue degradation and OA progression \cite{mosher2004cartilage,Sveinsson2017}. Example images comparing the output of single-contrast DESS and dual-contrast DESS are shown in Fig.\ref{fig:dess}. Dual-contrast DESS has shown to be useful in diagnostic musculoskeletal imaging of knee as well as in research studies for evaluating OA progression \cite{chaudhari2017five,Monu2016}. \subsection{Motivation} While promising, the dual-contrast DESS is limited in acquiring slices with 1.5mm section-thickness to maintain adequate SNR for T$_2$ measurements of the cartilage and menisci. Compared to an in-plane resolution of 0.4x0.4mm, such a high-section thickness precludes multi-planar reformations, which are essential for evaluating thin knee tissues in arbitrary planes, due to excessive image blurring. An ideal acquisition would provide sub-millimeter section thickness without biasing T$_2$ measurements. Advances in convolutional neural networks (CNNs) and 3D super-resolution (SR) methods may enable acquisition of slices with a thickness of 1.5mm followed by retrospectively achieving sub-millimeter resolution, while maintaining SNR for T$_2$ measurements \cite{vdsr}. However, unlike the single-contrast DESS that has hundreds of datasets publicly available, the dual-contrast DESS is a newer sequence with very limited amounts of high-resolution data available, which makes it challenging to create a SR CNN from scratch. In such scenarios, transfer learning methods may be helpful in overcoming the limitations of a paucity of high-resolution ground-truth dual-contrast DESS training data. Specifically, it may be possible to train a SR CNN initially using single-contrast DESS datasets and subsequently adapt the network to enhance dual-contrast DESS images using limited training data. Consequently, this study aimed to answer: \textbf{1.} Can transfer learning enhance through-plane MRI resolution for the clinically-relevant dual-contrast DESS sequence and \textbf{2.} Can transfer learning enable accurate quantitative imaging of the T$_2$ relaxation time by overcoming SNR limitations commonly faced in high-resolution imaging? The overall goal of this study was to evaluate whether there can be an efficient methodology to create a SR CNN for dual-contrast DESS to produce high-resolution morphological and quantitative images. \section{Related Work} Sparse-coding SR (ScSR) is a state-of-the-art non-deep-learning method that has been used for 2D MRI SR \cite{wang2014sparse}. CNN-based 3D SR MRI has previously shown to transform MRI images with a high section-thickness (low slice-direction resolution) into images with lower section-thickness (high slice-direction resolution) \cite{srcnn_blinded}. However, this initial training was performed on single-contrast DESS sequence that does not produce quantitative biomarkers. These scans were originally acquired with a section thickness of 0.7mm and retrospectively downsampled by a factor of 2x to a section thickness of 1.4mm to exactly duplicate a faster, lower-resolution acquisition. The SR network was then utilized to evaluate whether the original 0.7mm scans could be recovered from the 1.4mm slices. We build upon these results and to extend SR to MRI sequences that can simultaneously produce multiple diagnostic contrasts and quantitative biomarkers. \section{Methods} \subsection{Imaging Methodology} We utilized a CNN termed Magnetic Resonance Super-Resolution (MRSR) to extend the SR capabilities of the network initially trained for single-contrast DESS scans. The dual-contrast DESS datasets used in this study were acquired with a slice thickness of 0.7mm (imaging parameters: TE$_1$/TE$_2$/TR = 7/39/23 ms, matrix size = 416x416, field of view = 160mm, flip angle = 20$^\circ$, scan time = 5 minutes, phase encoding parallel imaging = 2x, slices = 160). A slice thicknesses of 0.7mm was maintained for the single-contrast and dual-contrast DESS scans. A pre-trained network for performing SR with a slice downsampling factor of 2x for the single-contrast DESS sequence was utilized to simultaneously enhance both images from the dual-contrast DESS. This pre-training was performed on image patches with input and output sizes of 32x32x32 using convolutional filters of size 3x3x3 and a feature map length of 64. This SR CNN network transforms an input low-resolution image into a residual image through a series of 20 convolutions and rectified linear unit (ReLU) activations \cite{srcnn_blinded}. An approximate high-resolution image is generated through the sum of the low-resolution input and the resultant residual using the L2-norm between the approximate and true high-resolution images as the loss function. \subsection{Transfer Learning Training for Dual-Contrast DESS} \vspace*{-2mm} Since dual-contrast DESS contains an extra image contrast, the initial single-contrast DESS weights for the first convolution layer were duplicated to account for the dual-echoes. Similarly, the final layer output weights were modified to output two echo images instead of one, as shown in Fig. \ref{fig:schematic}. In such a manner, the single-contrast DESS MRSR architecture was modified and subsequently fine-tuned to simultaneously enhance dual-contrast DESS images. \begin{figure}[tbp] \begin{center} \includegraphics[width=4.85in]{figures/MRSR_Transfer_Learning.png} \end{center} \vspace*{-5mm} \caption[Schematic for the MRSR network]{The schematic of the Magnetic Resonance Super-Resolution (MRSR) network demonstrates how the low-resolution (LR) dual-contrast DESS images are simultaneously transformed into the super-resolution (SR) images.} \label{fig:schematic} \end{figure} All data processing steps for the single-contrast DESS and MRSR networks were were kept unchanged. This included data normalization between 0 and 1, simulation of thicker slices with a 48$^{th}$-order anti-aliasing filter, a mini-batch size of 50, and a learning rate of 0.0001. All input patches had a size of 32x32x32x2 with a stride of 16 in the first three directions. Thus, an input image of dimensions 416x416x160 was divided into 5625 patches. The MRSR network was trained for 10 epochs using 4 NVIDIA Titan 1080Ti graphical processing units. 30 dual-contrast DESS 3D datasets were used for training and 10 for validation. All datasets were collected from patients referred for a clinical MRI following institutional review board approval and informed consent, for ensuring unbiased representation of healthy and pathologic tissues. Two unique datasets, described below, were tested using the MRSR transfer learning network because it is not currently possible to acquire a single high-resolution dataset that also has high-SNR for accurate quantitative imaging of the T$_2$ relaxation time. The goal of this two-fold testing was to acquire separate reference high-resolution and high-SNR scans. The dual-contrast DESS could therefore have intermediate SNR for accurate T$_2$ measurements and the intermediate resolution of the acquisition could be enhanced using MRSR. \vspace*{-6mm} \subsubsection{Image Quality: Test Cohort 1} This dataset had identical scan parameters to the training dataset. Following the simulation of 2x thicker slices, image quality enhancements were evaluated by comparing the structural similarity (SSIM), peak SNR (pSNR), and root mean square error (RMSE) between the ground truth high-resolution and MRSR images, along with tricubic interpolated (TCI), Fourier interpolated (FI), and sparse coding super-resolution (ScSR) images. \begin{figure}[tbp] \begin{center} \includegraphics[width=4.85in]{figures/fig3.png} \end{center} \vspace*{-5mm} \caption[Example coronal MRSR echo S$_1$ images compared to the ground-truth and the MRSR input]{MRSR coronal reformatted images demonstrate better resolution in the slice-direction (left-right) than the input TCI images, compared to the ground-truth.} \label{fig:cor} \end{figure} \vspace*{-0mm} \begin{figure}[tbp] \begin{center} \includegraphics[width=4.85in]{figures/fig4.png} \end{center} \vspace*{-5mm} \caption[Example axial MRSR images compared to the ground-truth and the MRSR input]{Example axial reformatted MRSR images, depict finer image details considerably better than the input TCI image compared to the ground-truth.} \label{fig:ax} \end{figure} \vspace*{-6mm} \subsubsection{T$_2$ Accuracy: Test Cohort 2} The second dataset had thicker slices (1.6mm) to maintain a higher SNR for accurate T$_2$ quantification, since T$_2$ has a high sensitivity to noise \cite{chaudhari2017five}. Accuracy of the T$_2$ maps was evaluated by comparing the T$_2$ values in two combined adjacent slices in the medial femoral cartilage of the MRSR, TCI, FI, and ScSR outputs to the ground-truth thick-slice sequences. Segmentation was performed by a reader with 5 years of experience in knee MRI segmentation. T$_2$ relaxation time differences, coefficients of variation (CV\%), and concordance correlation coefficients (CCC) assessed T$_2$ variations between the methods, compared to the ground truth. Mann-Whitney U-Tests assessed variations between morphological enhancement metrics as well as T$_2$ variations for all enhancement methods. \section{Results} Each epoch training duration was approximately 3 hours for the total of 170,000 training patches. The SSIM, pSNR, and RMSE values between the MRSR, TCI, FI, and ScSR images to the ground-truth are shown in Table \ref{tab:morph}, where MRSR was significantly superior compared to TCI, FI, and ScSR. Comparisons for T$_2$ values computed with all methods are shown in Table \ref{tab:t2}. MRSR had the best image quality metrics, as well as the closest matches for the T$_2$ values. Despite being compared on a pixel-wise basis, which can have a high sensitivity to noise, the MRSR T$_2$ values had the lowest inter-method CV of 3\% and an excellent CCC of 0.93. There were no statistically significant variations for T$_2$ for any method compared to the ground truth, likely due to a limited sample size. \begin{figure}[bp] \begin{center} \includegraphics[width=4.85in]{figures/fig5.png} \end{center} \vspace*{-5mm} \caption[Example MRSR T$_2$ relaxation time maps compared to the ground-truth]{MRSR T$_2$ relaxation time maps appear similar and provide a similar spatial distribution of T$_2$ values compared to the ground-truth. The difference map has no discernible structure, suggesting minimal systematic bias. (note the different color scale).} \label{fig:t2} \end{figure} Example coronal and axial images of the resolution enhancement are shown in Fig.\ref{fig:cor} and Fig.\ref{fig:ax}. The medial collateral ligament (solid arrow, approximately 1mm thick) is completely blurred out in the input image (Fig. \ref{fig:cor}), but can be delineated well with MRSR. Similarly, the ligament bundles (dashed arrow) and the synovium (dotted arrow) appeared blurrier in the input image than the MRSR. Fig. \ref{fig:ax} shows that signal irregularities in medial synovium (solid arrow) delineated better using MRSR than in the input image. The lateral synovial membrane (dotted arrow) also appears thickened in the blurred input image but not in the ground-truth or MRSR, which may incorrectly lead to a diagnosis of synovitis. The patellar cartilage (dashed arrow) appears blurred with diffuse signal heterogeneity in the input image, which may lead to an incorrect cartilage lesion diagnosis. Example T$_2$ map comparisons (shown in Fig.\ref{fig:t2}) show minimal differences between the ground-truth and MRSR images, and that the per-pixel difference map has no organized structure, suggesting minimal systematic bias. \begin{table}[t] \centering \caption{Quantitative image quality metrics for both DESS echoes comparing the ground-truth to MRSR, TCI, FI, and ScSR images for test cohort 1. * indicates a significant difference (p$<$0.05) compared to MRSR. $^{\dagger}$ indicates that all displayed values are multiplied by 10$^{3}$.} \vspace*{-4mm} \label{tab:morph} \begin{center} \renewcommand{\arraystretch}{1.25} \begin{tabular}[h] {> {\centering\arraybackslash}m{0.60in} | >{\centering\arraybackslash}p{0.55in} | >{\centering\arraybackslash}p{0.85in} | >{\centering\arraybackslash}p{0.85in} | >{\centering\arraybackslash}p{0.85in} | >{\centering\arraybackslash}p{0.85in}} \hline \textbf{Metric} & \textbf{Image} & \textbf{MRSR} & \textbf{TCI} & \textbf{FI} & \textbf{ScSR} \\ \hline \multirow{2}{*}{SSIM} & S$_1$ & 0.98 $\pm$ 0.01 & 0.95 $\pm$ 0.02* & 0.92 $\pm$ 0.02* & 0.97 $\pm$ 0.01* \\ & S$_2$ & 0.98 $\pm$ 0.01 & 0.96 $\pm$ 0.02* & 0.95 $\pm$ 0.02* & 0.97 $\pm$ 0.01 \\ \hline \multirow{2}{*}{pSNR} & S$_1$ & 37.7 $\pm$ 1.5 & 32.5 $\pm$ 3.6* & 32.4 $\pm$ 2.8* & 36.6 $\pm$ 1.1 \\ & S$_2$ & 38.7 $\pm$ 2.0 & 33.6 $\pm$ 4.2 & 33.6 $\pm$ 3.5* & 37.5 $\pm$ 1.6 \\ \hline \multirow{2}{*}{RMSE$^{\dagger}$} & S$_1$ & 0.18 $\pm$ 0.06 & 0.72 $\pm$ 0.56* & 0.69 $\pm$ 0.47* & 0.22 $\pm$ 0.05 \\ & S$_2$ & 0.13 $\pm$ 0.04 & 0.51 $\pm$ 0.40 & 0.47 $\pm$ 0.34* & 0.16 $\pm$ 0.05 \\ \hline \end{tabular} \end{center} \end{table} \vspace*{-10mm} \begin{table}[t] \centering \caption{Cartilage T$_2$ relaxation times for MRSR, TCI, FI, and ScSR compared to the ground-truth using differences and coefficients of variation (CV\%) in test cohort 2.} \vspace*{-4mm} \label{tab:t2} \begin{center} \renewcommand{\arraystretch}{1.25} \begin{tabular}[h]{ > {\centering\arraybackslash}p{0.7in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} } \hline \textbf{Subject} & \textbf{Ground-Truth} & \textbf{MRSR} & \textbf{TCI} & \textbf{FI} & \textbf{ScSR}\\ \hline 1 & 35.2 & 35.8 & 36.4 & 36.1 & 42.4 \\ 2 & 42.6 & 44.1 & 44.4 & 44.5 & 50.1 \\ 3 & 27.9 & 29.1 & 29.8 & 29.4 & 35.9 \\ 4 & 35.3 & 38.5 & 39.5 & 39.0 & 58.3 \\ 5 & 36.6 & 38.0 & 39.0 & 39.2 & 46.7 \\ \hline\rule{0pt}{13pt} \textbf{Average} & \textbf{35.5$\pm$5.2} & \textbf{37.1$\pm$5.4} & \textbf{37.8$\pm$5.3} & \textbf{37.6$\pm$5.5} & \textbf{46.7$\pm$8.4} \\ \textbf{CV \%} & N/A & \textbf{3.1$\pm$1.8} & \textbf{4.5$\pm$2.2} & \textbf{4.1$\pm$2.0} & \textbf{18.8$\pm$9.3}\\ \textbf{Difference} & N/A & \textbf{1.6$\pm$1.0} & \textbf{2.3$\pm$1.1} & \textbf{2.1$\pm$1.1} & \textbf{11.2$\pm$6.7}\\ \textbf{CCC} & N/A & \textbf{0.93} & \textbf{0.87} & \textbf{0.89} & \textbf{0.21}\\ \end{tabular} \end{center} \end{table} \vspace*{6mm} \section{Discussion and Conclusion} In this study, we demonstrated that transfer learning can be effectively used to perform SR on MRI sequences with varied contrasts that are used clinically and in epidemiological studies, even with a small training dataset. The dual-contrast DESS sequence was able to maintain a considerably higher resolution and detail than the comparison methods. It is important to note that since the SR was carried out only in one dimension of the 3D dataset, the image enhancements in Fig.\ref{fig:cor} and Fig.\ref{fig:ax} are more prominent in the left-right direction anatomically, which is also the same direction of the displayed images. The MRSR approach maintained comparable T$_2$ relaxation times between the ground-truth. A pixel-wise CV of 3\% has shown to be adequate for use in OA studies and a CCC of over 0.90 indicated excellent reproducibility compared to the ground-truth \cite{Baum2013}. With MRSR, slices can be acquired with a higher section thickness for accurate T$_2$ measurement, while enabling super-resolution for performing high-resolution MRI scans, which was not possible previously due to SNR limitations. Interestingly enough, all methods over-estimated T$_2$ values, likely because the thin cartilage has two major divisions (deep and superficial), where the deep cartilage has lower signal. Blurring from the superficial cartilage would increase signal in the deeper layer, leading to a higher T$_2$ value. Performing layer-wise T$_2$ values will be important in future studies. In conclusion, we demonstrated how SR enhanced through-plane resolution in MRI and maintained quantitative accuracy of the T$_2$ relaxation time biomarker. MRSR outperforms conventional and state-of-the-art resolution enhancement methods and has potential for use in clinical and research studies. \section{Introduction} Magnetic resonance imaging (MRI) is an excellent non-invasive diagnostic tool to accurately assess pathologies in several anatomies. However, MRI is fundamentally constrained in optimizing for either high-resolution, high signal-to-noise ratio (SNR), or low scan durations. Enhancing one of the three outcomes necessarily degrades one or both of the others. Additionally, unlike other imaging modalities, MR images are qualitative in nature and do not directly correlate to the underlying tissue physiology. While quantitative MRI may help in assessing tissue biochemistry and longitudinal changes, biomarker accuracy is extremely sensitive to image SNR. Consequently, it is challenging to develop a single MRI method to produce high-resolution morphological images with high quantitative biomarker accuracy in a reasonable scan time, which is tolerable for patients and which ultimately limits cost of the procedure. \subsection{Background} The double-echo in steady-state (DESS) pulse sequence can generate high-resolution images with diagnostic contrast as well as the quantitative biomarker of T$_2$ relaxation time, in only five-minutes of scan time \cite{chaudhari2017five}. The T$_2$ relaxation time has shown to be sensitive to collagen matrix organization and tissue hydration levels, and is useful for assessing degradation of tissues such as cartilage, menisci, tendons, and ligaments \cite{mosher2004cartilage}. DESS intrinsically produces two images with independent contrasts. The first echo of DESS (S$_1$) has a T$_1$/T$_2$ weighting while the second echo of DESS (S$_2$) has a high T$_2$ weighting. \begin{figure}[tbp] \begin{center} \includegraphics[width=4.8in]{figures/DESS_Example.pdf} \end{center} \vspace*{-5mm} \caption{Compared to the single-contrast DESS, dual-contrast DESS provides additional morphological information and automatic quantitative T$_2$ relaxation time maps. The separate DESS contrasts (S$_1$ and S$_2$) and T$_2$ maps are useful in assessing the cartilage (dashed arrow), the menisci (dotted arrow), and inflammation (solid arrow). The T$_2$ maps are not affected by noisy fat-suppression of bony signal.} \label{fig:dess} \end{figure} In previous applications of DESS, the S$_1$ and S$_2$ scans are combined during the reconstruction process to produce an output with a singular contrast (herein referred as \textit{single-contrast DESS}) \cite{Peterfy2008}. However, separating the two echoes can provide considerable diagnostic utility since both echoes are sensitive to varying pathologies. Additionally, the two independent-contrast images (herein referred as \textit{dual-contrast DESS}) can be used to analytically determine the tissue T$_2$ relaxation time, which is a promising biomarker for tissue degradation and OA progression \cite{mosher2004cartilage,Sveinsson2017}. Example images comparing the output of single-contrast DESS and dual-contrast DESS are shown in Fig.\ref{fig:dess}. Dual-contrast DESS has shown to be useful in diagnostic musculoskeletal imaging of knee as well as in research studies for evaluating OA progression \cite{chaudhari2017five,Monu2016}. \subsection{Motivation} While promising, the dual-contrast DESS is limited in acquiring slices with 1.5mm section-thickness to maintain adequate SNR for T$_2$ measurements of the cartilage and menisci. Compared to an in-plane resolution of 0.4x0.4mm, such a high-section thickness precludes multi-planar reformations, which are essential for evaluating thin knee tissues in arbitrary planes, due to excessive image blurring. An ideal acquisition would provide sub-millimeter section thickness without biasing T$_2$ measurements. Advances in convolutional neural networks (CNNs) and 3D super-resolution (SR) methods may enable acquisition of slices with a thickness of 1.5mm followed by retrospectively achieving sub-millimeter resolution, while maintaining SNR for T$_2$ measurements \cite{vdsr}. However, unlike the single-contrast DESS that has hundreds of datasets publicly available, the dual-contrast DESS is a newer sequence with very limited amounts of high-resolution data available, which makes it challenging to create a SR CNN from scratch. In such scenarios, transfer learning methods may be helpful in overcoming the limitations of a paucity of high-resolution ground-truth dual-contrast DESS training data. Specifically, it may be possible to train a SR CNN initially using single-contrast DESS datasets and subsequently adapt the network to enhance dual-contrast DESS images using limited training data. Consequently, this study aimed to answer: \textbf{1.} Can transfer learning enhance through-plane MRI resolution for the clinically-relevant dual-contrast DESS sequence and \textbf{2.} Can transfer learning enable accurate quantitative imaging of the T$_2$ relaxation time by overcoming SNR limitations commonly faced in high-resolution imaging? The overall goal of this study was to evaluate whether there can be an efficient methodology to create a SR CNN for dual-contrast DESS to produce high-resolution morphological and quantitative images. \section{Related Work} Sparse-coding SR (ScSR) is a state-of-the-art non-deep-learning method that has been used for 2D MRI SR \cite{wang2014sparse}. CNN-based 3D SR MRI has previously shown to transform MRI images with a high section-thickness (low slice-direction resolution) into images with lower section-thickness (high slice-direction resolution) \cite{srcnn_blinded}. However, this initial training was performed on single-contrast DESS sequence that does not produce quantitative biomarkers. These scans were originally acquired with a section thickness of 0.7mm and retrospectively downsampled by a factor of 2x to a section thickness of 1.4mm to exactly duplicate a faster, lower-resolution acquisition. The SR network was then utilized to evaluate whether the original 0.7mm scans could be recovered from the 1.4mm slices. We build upon these results and to extend SR to MRI sequences that can simultaneously produce multiple diagnostic contrasts and quantitative biomarkers. \section{Methods} \subsection{Imaging Methodology} We utilized a CNN termed Magnetic Resonance Super-Resolution (MRSR) to extend the SR capabilities of the network initially trained for single-contrast DESS scans. The dual-contrast DESS datasets used in this study were acquired with a slice thickness of 0.7mm (imaging parameters: TE$_1$/TE$_2$/TR = 7/39/23 ms, matrix size = 416x416, field of view = 160mm, flip angle = 20$^\circ$, scan time = 5 minutes, phase encoding parallel imaging = 2x, slices = 160). A slice thicknesses of 0.7mm was maintained for the single-contrast and dual-contrast DESS scans. A pre-trained network for performing SR with a slice downsampling factor of 2x for the single-contrast DESS sequence was utilized to simultaneously enhance both images from the dual-contrast DESS. This pre-training was performed on image patches with input and output sizes of 32x32x32 using convolutional filters of size 3x3x3 and a feature map length of 64. This SR CNN network transforms an input low-resolution image into a residual image through a series of 20 convolutions and rectified linear unit (ReLU) activations \cite{srcnn_blinded}. An approximate high-resolution image is generated through the sum of the low-resolution input and the resultant residual using the L2-norm between the approximate and true high-resolution images as the loss function. \subsection{Transfer Learning Training for Dual-Contrast DESS} \vspace*{-2mm} Since dual-contrast DESS contains an extra image contrast, the initial single-contrast DESS weights for the first convolution layer were duplicated to account for the dual-echoes. Similarly, the final layer output weights were modified to output two echo images instead of one, as shown in Fig. \ref{fig:schematic}. In such a manner, the single-contrast DESS MRSR architecture was modified and subsequently fine-tuned to simultaneously enhance dual-contrast DESS images. \begin{figure}[tbp] \begin{center} \includegraphics[width=4.85in]{figures/MRSR_Transfer_Learning.png} \end{center} \vspace*{-5mm} \caption[Schematic for the MRSR network]{The schematic of the Magnetic Resonance Super-Resolution (MRSR) network demonstrates how the low-resolution (LR) dual-contrast DESS images are simultaneously transformed into the super-resolution (SR) images.} \label{fig:schematic} \end{figure} All data processing steps for the single-contrast DESS and MRSR networks were were kept unchanged. This included data normalization between 0 and 1, simulation of thicker slices with a 48$^{th}$-order anti-aliasing filter, a mini-batch size of 50, and a learning rate of 0.0001. All input patches had a size of 32x32x32x2 with a stride of 16 in the first three directions. Thus, an input image of dimensions 416x416x160 was divided into 5625 patches. The MRSR network was trained for 10 epochs using 4 NVIDIA Titan 1080Ti graphical processing units. 30 dual-contrast DESS 3D datasets were used for training and 10 for validation. All datasets were collected from patients referred for a clinical MRI following institutional review board approval and informed consent, for ensuring unbiased representation of healthy and pathologic tissues. Two unique datasets, described below, were tested using the MRSR transfer learning network because it is not currently possible to acquire a single high-resolution dataset that also has high-SNR for accurate quantitative imaging of the T$_2$ relaxation time. The goal of this two-fold testing was to acquire separate reference high-resolution and high-SNR scans. The dual-contrast DESS could therefore have intermediate SNR for accurate T$_2$ measurements and the intermediate resolution of the acquisition could be enhanced using MRSR. \vspace*{-6mm} \subsubsection{Image Quality: Test Cohort 1} This dataset had identical scan parameters to the training dataset. Following the simulation of 2x thicker slices, image quality enhancements were evaluated by comparing the structural similarity (SSIM), peak SNR (pSNR), and root mean square error (RMSE) between the ground truth high-resolution and MRSR images, along with tricubic interpolated (TCI), Fourier interpolated (FI), and sparse coding super-resolution (ScSR) images. \begin{figure}[tbp] \begin{center} \includegraphics[width=4.85in]{figures/fig3.png} \end{center} \vspace*{-5mm} \caption[Example coronal MRSR echo S$_1$ images compared to the ground-truth and the MRSR input]{MRSR coronal reformatted images demonstrate better resolution in the slice-direction (left-right) than the input TCI images, compared to the ground-truth.} \label{fig:cor} \end{figure} \vspace*{-0mm} \begin{figure}[tbp] \begin{center} \includegraphics[width=4.85in]{figures/fig4.png} \end{center} \vspace*{-5mm} \caption[Example axial MRSR images compared to the ground-truth and the MRSR input]{Example axial reformatted MRSR images, depict finer image details considerably better than the input TCI image compared to the ground-truth.} \label{fig:ax} \end{figure} \vspace*{-6mm} \subsubsection{T$_2$ Accuracy: Test Cohort 2} The second dataset had thicker slices (1.6mm) to maintain a higher SNR for accurate T$_2$ quantification, since T$_2$ has a high sensitivity to noise \cite{chaudhari2017five}. Accuracy of the T$_2$ maps was evaluated by comparing the T$_2$ values in two combined adjacent slices in the medial femoral cartilage of the MRSR, TCI, FI, and ScSR outputs to the ground-truth thick-slice sequences. Segmentation was performed by a reader with 5 years of experience in knee MRI segmentation. T$_2$ relaxation time differences, coefficients of variation (CV\%), and concordance correlation coefficients (CCC) assessed T$_2$ variations between the methods, compared to the ground truth. Mann-Whitney U-Tests assessed variations between morphological enhancement metrics as well as T$_2$ variations for all enhancement methods. \section{Results} Each epoch training duration was approximately 3 hours for the total of 170,000 training patches. The SSIM, pSNR, and RMSE values between the MRSR, TCI, FI, and ScSR images to the ground-truth are shown in Table \ref{tab:morph}, where MRSR was significantly superior compared to TCI, FI, and ScSR. Comparisons for T$_2$ values computed with all methods are shown in Table \ref{tab:t2}. MRSR had the best image quality metrics, as well as the closest matches for the T$_2$ values. Despite being compared on a pixel-wise basis, which can have a high sensitivity to noise, the MRSR T$_2$ values had the lowest inter-method CV of 3\% and an excellent CCC of 0.93. There were no statistically significant variations for T$_2$ for any method compared to the ground truth, likely due to a limited sample size. \begin{figure}[bp] \begin{center} \includegraphics[width=4.85in]{figures/fig5.png} \end{center} \vspace*{-5mm} \caption[Example MRSR T$_2$ relaxation time maps compared to the ground-truth]{MRSR T$_2$ relaxation time maps appear similar and provide a similar spatial distribution of T$_2$ values compared to the ground-truth. The difference map has no discernible structure, suggesting minimal systematic bias. (note the different color scale).} \label{fig:t2} \end{figure} Example coronal and axial images of the resolution enhancement are shown in Fig.\ref{fig:cor} and Fig.\ref{fig:ax}. The medial collateral ligament (solid arrow, approximately 1mm thick) is completely blurred out in the input image (Fig. \ref{fig:cor}), but can be delineated well with MRSR. Similarly, the ligament bundles (dashed arrow) and the synovium (dotted arrow) appeared blurrier in the input image than the MRSR. Fig. \ref{fig:ax} shows that signal irregularities in medial synovium (solid arrow) delineated better using MRSR than in the input image. The lateral synovial membrane (dotted arrow) also appears thickened in the blurred input image but not in the ground-truth or MRSR, which may incorrectly lead to a diagnosis of synovitis. The patellar cartilage (dashed arrow) appears blurred with diffuse signal heterogeneity in the input image, which may lead to an incorrect cartilage lesion diagnosis. Example T$_2$ map comparisons (shown in Fig.\ref{fig:t2}) show minimal differences between the ground-truth and MRSR images, and that the per-pixel difference map has no organized structure, suggesting minimal systematic bias. \begin{table}[t] \centering \caption{Quantitative image quality metrics for both DESS echoes comparing the ground-truth to MRSR, TCI, FI, and ScSR images for test cohort 1. * indicates a significant difference (p$<$0.05) compared to MRSR. $^{\dagger}$ indicates that all displayed values are multiplied by 10$^{3}$.} \vspace*{-4mm} \label{tab:morph} \begin{center} \renewcommand{\arraystretch}{1.25} \begin{tabular}[h] {> {\centering\arraybackslash}m{0.60in} | >{\centering\arraybackslash}p{0.55in} | >{\centering\arraybackslash}p{0.85in} | >{\centering\arraybackslash}p{0.85in} | >{\centering\arraybackslash}p{0.85in} | >{\centering\arraybackslash}p{0.85in}} \hline \textbf{Metric} & \textbf{Image} & \textbf{MRSR} & \textbf{TCI} & \textbf{FI} & \textbf{ScSR} \\ \hline \multirow{2}{*}{SSIM} & S$_1$ & 0.98 $\pm$ 0.01 & 0.95 $\pm$ 0.02* & 0.92 $\pm$ 0.02* & 0.97 $\pm$ 0.01* \\ & S$_2$ & 0.98 $\pm$ 0.01 & 0.96 $\pm$ 0.02* & 0.95 $\pm$ 0.02* & 0.97 $\pm$ 0.01 \\ \hline \multirow{2}{*}{pSNR} & S$_1$ & 37.7 $\pm$ 1.5 & 32.5 $\pm$ 3.6* & 32.4 $\pm$ 2.8* & 36.6 $\pm$ 1.1 \\ & S$_2$ & 38.7 $\pm$ 2.0 & 33.6 $\pm$ 4.2 & 33.6 $\pm$ 3.5* & 37.5 $\pm$ 1.6 \\ \hline \multirow{2}{*}{RMSE$^{\dagger}$} & S$_1$ & 0.18 $\pm$ 0.06 & 0.72 $\pm$ 0.56* & 0.69 $\pm$ 0.47* & 0.22 $\pm$ 0.05 \\ & S$_2$ & 0.13 $\pm$ 0.04 & 0.51 $\pm$ 0.40 & 0.47 $\pm$ 0.34* & 0.16 $\pm$ 0.05 \\ \hline \end{tabular} \end{center} \end{table} \vspace*{-10mm} \begin{table}[t] \centering \caption{Cartilage T$_2$ relaxation times for MRSR, TCI, FI, and ScSR compared to the ground-truth using differences and coefficients of variation (CV\%) in test cohort 2.} \vspace*{-4mm} \label{tab:t2} \begin{center} \renewcommand{\arraystretch}{1.25} \begin{tabular}[h]{ > {\centering\arraybackslash}p{0.7in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} | > {\centering\arraybackslash}p{0.78in} } \hline \textbf{Subject} & \textbf{Ground-Truth} & \textbf{MRSR} & \textbf{TCI} & \textbf{FI} & \textbf{ScSR}\\ \hline 1 & 35.2 & 35.8 & 36.4 & 36.1 & 42.4 \\ 2 & 42.6 & 44.1 & 44.4 & 44.5 & 50.1 \\ 3 & 27.9 & 29.1 & 29.8 & 29.4 & 35.9 \\ 4 & 35.3 & 38.5 & 39.5 & 39.0 & 58.3 \\ 5 & 36.6 & 38.0 & 39.0 & 39.2 & 46.7 \\ \hline\rule{0pt}{13pt} \textbf{Average} & \textbf{35.5$\pm$5.2} & \textbf{37.1$\pm$5.4} & \textbf{37.8$\pm$5.3} & \textbf{37.6$\pm$5.5} & \textbf{46.7$\pm$8.4} \\ \textbf{CV \%} & N/A & \textbf{3.1$\pm$1.8} & \textbf{4.5$\pm$2.2} & \textbf{4.1$\pm$2.0} & \textbf{18.8$\pm$9.3}\\ \textbf{Difference} & N/A & \textbf{1.6$\pm$1.0} & \textbf{2.3$\pm$1.1} & \textbf{2.1$\pm$1.1} & \textbf{11.2$\pm$6.7}\\ \textbf{CCC} & N/A & \textbf{0.93} & \textbf{0.87} & \textbf{0.89} & \textbf{0.21}\\ \end{tabular} \end{center} \end{table} \vspace*{6mm} \section{Discussion and Conclusion} In this study, we demonstrated that transfer learning can be effectively used to perform SR on MRI sequences with varied contrasts that are used clinically and in epidemiological studies, even with a small training dataset. The dual-contrast DESS sequence was able to maintain a considerably higher resolution and detail than the comparison methods. It is important to note that since the SR was carried out only in one dimension of the 3D dataset, the image enhancements in Fig.\ref{fig:cor} and Fig.\ref{fig:ax} are more prominent in the left-right direction anatomically, which is also the same direction of the displayed images. The MRSR approach maintained comparable T$_2$ relaxation times between the ground-truth. A pixel-wise CV of 3\% has shown to be adequate for use in OA studies and a CCC of over 0.90 indicated excellent reproducibility compared to the ground-truth \cite{Baum2013}. With MRSR, slices can be acquired with a higher section thickness for accurate T$_2$ measurement, while enabling super-resolution for performing high-resolution MRI scans, which was not possible previously due to SNR limitations. Interestingly enough, all methods over-estimated T$_2$ values, likely because the thin cartilage has two major divisions (deep and superficial), where the deep cartilage has lower signal. Blurring from the superficial cartilage would increase signal in the deeper layer, leading to a higher T$_2$ value. Performing layer-wise T$_2$ values will be important in future studies. In conclusion, we demonstrated how SR enhanced through-plane resolution in MRI and maintained quantitative accuracy of the T$_2$ relaxation time biomarker. MRSR outperforms conventional and state-of-the-art resolution enhancement methods and has potential for use in clinical and research studies.
\section{Introduction}\label{Sec: Introduction} Radio source counts above mJy flux densities are dominated by radio galaxies and quasars powered by active galactic nuclei (AGN). Below mJy flux densities, there is an observed upturn far in excess of those predicted by extrapolating source counts of high luminosity radio galaxies and quasars. This upturn is found to comprise an increasing fraction of active star forming galaxies and faint ‘non-jetted’ or radio-quiet AGN plus a decreasing fraction of classical radio-loud sources \citep[see][and references therein]{prandoni2001,Huynh2015,Padovani2016}. The majority of extragalactic radio surveys are carried out at arc-second resolutions (corresponding to galactic/$\sim$10's kpc physical scales at $z\geq0.1$) where it can be difficult to distinguish between the sub-kpc scale AGN activity and the kpc star-formation related emission based purely on their radio morphologies. This is particularly important if we are to characterise the properties of radio-quiet AGN whose radio emission in local systems are confined within the host galaxy \citep[see][and references therein]{Orienti:2015sk}. As a result, these surveys rely on multi-wavelength diagnostics, such as radio-excess, SED fitting, X-ray emission etc., in order to identify any AGN activity \citep[e.g.][]{Bonzini2013:cd,Smolcic:2017ef}. These diagnostics are often incomplete with dust masking the signatures of AGN activity. For example, X-rays often do not detect Compton-thick AGN which are estimated to account for over a third of the total AGN population \citep[][]{Mateos:2017fm}. These hidden AGN can be found using high resolution, dust-independent radio observations. Indeed, surveys using e-MERLIN, such as the \textbf{e-MER}lin \textbf{G}alaxy \textbf{E}volution (e-MERGE) survey (Muxlow et al. in prep., \citet{muxlow2005high}), and Very Long Baseline Interferometry (VLBI) \citep[e.g.][]{Middelberg:2011bx,Middelberg:2013hy,Ruiz:2017ur} have shown that deep, sub-arcsecond and sub-kpc observations can effectively isolate AGN activity from compact star-forming related emission in distant galaxies. VLBI observations detect bright, compact objects with brightness temperatures in excess of $10^{5}$\,K. In nearby galaxies, these brightness temperatures can be typically reached by either AGN, supernovae (SNe) and their remnants (SNRs). However, in more distant galaxies ($z > 0.1$), these brightness temperatures can typically only be attained by AGN-related emission processes \citep[e.g.][]{kewley2000compact}, thus making VLBI a unique and invaluable tool to survey distant galaxies for AGN activity. However, until the last decade, there have been many factors preventing VLBI from being used as a survey instrument. Conventional wide-field VLBI observations mapped a significant proportion of the primary beam by using a single correlation pass at a ultra-fine temporal and frequency resolution in order to limit time and bandwidth smearing towards the edge of the primary beam \citep{garrett2001agn}. As a result, the observer would receive a single large and unwieldy (often $\sim$TB size) data set. With the ever increasing number of VLBI-ready telescopes along with widening bandwidths, the bit rates of modern VLBI arrays are rapidly increasing and this method of correlation has become computationally infeasible. Software correlators established the `multiple simultaneous phase centre observing' approach to correlation \citep{deller2011difx,MorganVLBI2011,keimpema2015sfxc} which substantially reduces the computational load. Here, the observer defines a number of sub-fields (also referred to as phase centres) which can be either sources of interest or can be arranged to cover the entire primary beam. When correlated, these data are split and each sub-section is correlated at the ultra high temporal and frequency resolution required to restrain smearing. It is then copied and phase shifted to the various sub-fields of interest and averaged to a small field-of-view (typically 30-60\arcsec). The result is a small ($\sim$GB) dataset per sub-field which is easily manageable and parallelisable when calibrating and imaging. By combining multi-phase centre correlation with advanced calibration techniques such as in-beam phase referencing \citep{garrett2001agn,Garrett:2005fj,LencVLBI2008} and multi-source self-calibration \citep{Middelberg:2013hy,radcliffeMSSC2016}, wide-field VLBI surveys of milliarcsecond scale extragalactic radio sources to $\mu$Jy flux densities have become increasing feasible \citep[e.g.][]{,Middelberg:2011bx,Middelberg:2013hy,chi2013deep,Morgan2013M31,CaoVLBI2014,deller2014mjive,2015MNRAS.452...32R,Ruiz:2017ur}. We here present a new wide-field VLBI survey targeting the well studied Great Observatories Origin Deep survey North (GOODS-N) field using the European VLBI Network (EVN). The GOODS-N field covers 160 arcmin$^2$ with complementary deep multi-wavelength data including \textit{Chandra}, \textit{Spitzer}, \textit{Herschel}, UBVRIJHK photometry and spectroscopy. Previous wide-field VLBI observations targeted the Hubble Deep Field (HDF) and Flanking Fields (HFF) for which the GOODS-N field encompasses. \citet{garrett2001agn} used the EVN to target MERLIN sources within a 3.5\arcmin~ radius from the EVN pointing centre to r.m.s. sensitivities of 33\,$\rm\mu Jy\,beam^{-1}$. This resulted in the detection of 3 sources. These observations were substantially expanded upon by \citet{chi2013deep} who used Global VLBI to target the 92 VLA-MERLIN sources of \citet{muxlow2005high} within a $10\arcmin \times 10\arcmin$ field to r.m.s. sensitivities of 7.3\,$\rm\mu Jy\,beam^{-1}$. This resulted in 12 compact radio source detections (including the 3 detected by \citet{garrett2001agn}) thus beginning the characterisation of the faint compact radio population in GOODS-N. However, these surveys were invariably limited because computational limitations prevented imaging of the entire primary beam at that time. Our survey aims to substantially expand upon this sample, encompassing and surpassing the field-of-view and sensitivities of previous VLBI surveys in GOODS-N by targeting sources within a $30\arcmin\times30\arcmin$ area to $1\sigma$ central sensitivity of $\sim 2\mbox{-}3~{\rm \mu Jy\,beam^{-1}}$ with the completion of this survey. In this paper, we present our initial catalogue of the 31 compact sources detected in the first data release to a $1\sigma$ sensitivity of $\sim 9~{\rm \mu Jy\,beam^{-1}}$ (corresponding to $\sim$ 17.5hr on source) along with derived radio properties of these objects using complementary 1-2\,GHz VLA data. In paper II, we compare our VLBI-selected population to other AGN detection diagnostics used in other wavebands. A future publication, paper III, will describe the final data release which will include an additional 48 hours of observations which comprise of the first wide-field VLBI observations using a combined eMERLIN-EVN array. For this paper, we adopt a spatially-flat 6-parameter $\mathrm{\Lambda CDM}$ cosmology with $H_0 = 67.8\pm0.9~\mathrm{km\,s^{-1}\,Mpc}$, $\Omega_{m} = 0.308\pm0.012$ and $\Omega_{\Lambda} =0.692\pm0.012$ \citep{Planck2016}. We assume $S_\nu \propto \nu^{\alpha}$ throughout, where $S_\nu$ is the radio integrated flux density and $\alpha$ is the intrinsic source spectral index. The paper is organised as follows. Section 2 outlines our observations, source selection strategy, calibration and source detection methodology. Section 3 details the primary beam correction method used for the EVN. Section 4 describes the VLBI catalogue accompanying this paper while a formatted version is presented in Tables 2 and 3. Section 5 presents our results and associated discussion, including redshifts, astrometry, comparisons with other VLBI surveys and the radio properties of the VLBI-selected population. We conclude our findings in Section 6. \section{Observations \& data reduction}\label{Sec: observations and data reduction} \subsection{EVN observations}\label{SSec:Observations} The EVN observed the \object{GOODS-N} field at 1.6 GHz for 24 hours in total on the 5\mbox{-}6th June 2014 (EVN code EG078B). The pointing centre used was the Hubble Deep Field-North (HDF-N), J2000 12:36:50.0 62:12:58.0. Ten telescopes, including the 100m Effelsberg and the 76m Lovell (Jodrell Bank) telescopes, were involved in the observation. In order to attain a uniform sensitivity profile, the Effelsberg and Lovell telescopes were nodded between 5 different pointing centres over the course of the observation while smaller telescopes remained pointed at the HDF-N centre. The observing strategy and participating telescopes are summarised in Table~\ref{table:telescopes}. These data were recorded at a bit rate of 1024 Mbits/s (8 $\times$ 16MHz bands) in both right and left hand circular polarizations. The fringe finders used were 3C345 and DA193. The observations were made using the standard phase referencing mode. Two phase calibrators were used; a strong, $\sim$0.4\,\mbox{Jy}, primary calibrator J1241+602 lying approximately $2^\circ$ from the target centre, and a weaker, 17\,\mbox{mJy}, secondary calibrator J1234+619 lying 23.5\arcmin~from the target centre. The primary calibrator was observed for 1.5 min on source every $\sim$$27$ minutes. To permit more accurate phase corrections, the secondary calibrator was observed more frequently (1.5 min on source every $\sim$$7.5$\,min). In total, the on-source integration time on the GOODS-N field was approximately 17.5 hr. \begin{table} \caption{EG078B observing strategy} \label{table:telescopes} \centering \begin{tabular}{lll} \hline\hline Telescopes & Country & Diameter (Derived) / m \\ \hline Ef & Germany & 100 (78) \\ Wb & Netherlands & 25 \\ On & Sweden & 25 \\ Nt & Italy & 32 \\ Tr & Poland & 32 \\ Sv & Russia & 32 \\ Bd & Russia & 32 \\ Zc & Russia & 32 \\ Sh & China & 25 (22.5)\\ Jb1 & United Kingdom & 76 (67)\\ \hline \noalign{\smallskip} \end{tabular} \begin{tabular}{llll} \hline\hline Target Fields & R.A. (J2000) & Dec. (J2000) & Telescopes \\ \hline HDF-N & 12:36:50.0 & +62:12:58.0 & All \\ EFJB-P1 & 12:37:20.0 & +62:16:28.0 & Ef, Jb1 \\ EFJB-P2 & 12:36:20.0 & +62:16:28.0 & Ef, Jb1 \\ EFJB-P3 & 12:36:20.0 & +62:09:28.0 & Ef, Jb1 \\ EFJB-P4 & 12:37:20.0 & +62:09:28.0 & Ef, Jb1 \\ \hline \end{tabular} \tablefoot{{\it Upper panel:} Telescopes used in the EVN observations. Abbreviations, Ef: Effelsberg, Wb: WSRT (single dish), On: Onsala, Nt: Noto, Tr: Torun, Sv: Svetloe, Bd: Badary, Zc: Zelenchukskaya, Sh: Shanghai, Jb1: Jodrell Bank (Lovell Telescope). The fitted HPBW of telescopes with primary beam estimates are in brackets. \\{\it Lower panel:} Pointing centres used for the duration of the observation. Ef and Jb1 were nodded between all 5 pointing centres, whilst the rest of the array were pointed at the HDF-N pointing centre.} \end{table} \subsubsection{Source selection \& correlation}\label{SSec:Source selection and correlation} These data were correlated using the SFXC correlator \citep{keimpema2015sfxc} at the Joint Institute for VLBI ERIC, Dwingeloo, the Netherlands. The correlation implemented the multiple simultaneous phase centre observing technique \citep[see][]{deller2007difx, deller2011difx, keimpema2015sfxc} to target 699 sub-fields/phase centres. Two source selection strategies were implemented and the criteria are as follows: \begin{enumerate}[label=(\alph*)] \item A survey designed to completely cover the central 7.\!\arcmin5 radius area with VLBI coverage whilst restraining bandwidth and time smearing to $<$10\%. This is designed to complement the 1.5\,GHz eMERGE survey (Muxlow et al. in prep.) for use in integrated imaging. This comprises of 582 phase centres split into three main categories: \begin{enumerate}[label=\roman*.] \item 339 1.5\,GHz eMERLIN-VLA sources complete to \textasciitilde$11\,\mathrm{\mu Jy\,beam^{-1}}$ from the upcoming eMERGE survey (Muxlow et al. in prep.). \item 151 SCUBA-2 850\,$\rm \mu m$ sources (Smail priv. comm.). \item 92 other positions, denoted `legacy', which cover gaps in coverage across the field. \end{enumerate} \item A targeted survey of 117 1.4\,GHz VLA radio-bright sources outside the central 7.\!\arcmin5 radius area with integrated VLA flux densities, $S_{\mathrm{i,VLA}}$, $>0.1~\mathrm{mJy}$ \citep{morrison2010very}. These are split into: \begin{enumerate}[label=\roman*.] \item 91 sources with $0.1 < S_{\mathrm{i,VLA}} < 1$ mJy targeted to a radius of 12\arcmin~from the central pointing centre. \item 26 sources with $ S_{\mathrm{i,VLA}} > 1$ mJy targeted to the edge of the \citet{morrison2010very} VLA survey.We note that 4/26 of these sources are within the 15\arcmin and were accidental double entries in the correlation catalogue. These are kept in for clarity in-case these data are re-reduced in the future. \end{enumerate} \end{enumerate} \noindent The source positions targeted are shown in Figure~\ref{Fig:Source positions}. With source positions determined, correlation proceeded as follows. Short sub-integrations of data were correlated at the required high spectral and temporal resolutions in order to reduce time and bandwidth smearing. In this observation, each sub-integration had a frequency resolution of 1.953\,kHz and a time resolution of 13.056\,ms in order to restrain time and bandwidth smearing to below 1\% on the longest baseline ($\sim 8400 $ km) at 5\arcmin\,from the pointing centre. At the end of each sub-integration, the visibilities were phase shifted to every desired source position to create a separate data set per position. Each data set was averaged to a temporal resolution of 3s and a frequency spacing of ${\rm 0.5\,MHz}$ (corresponding to a 10\% time and bandwidth smearing at 30\arcsec\,from the assigned source position) and then added to previous sub-integrations until the entire data set was correlated. As a result, 699 separate, narrow field-of-view (FoV) data sets were produced, one per source position. Attached to one data set, containing source J123462+621331, were the scans of the phase calibrators, J1241+602 and J1234+619, and the fringe finders, 3C345 and DA193 used for calibration. The phase referencing calibration and flagging tables derived for this data set can then be easily copied to the other data sets. Despite the total size being 3.79\,TB, calibration of this data set is easily parallelised and computationally less intensive than previous wide-field VLBI projects \citep[e.g.][]{chi2013deep}. For further clarification, we will refer to the target field as the GOODS-N field as a whole, while the sub-fields are the small FoV phase centres within the GOODS-N field whose coordinates were correlated upon. \begin{figure}[!tb] \centering \includegraphics[width=\hsize]{positions.pdf} \caption{Sources / sub-fields targeted by these observations. The central 7.\!\arcmin5 radius area complements the eMERGE survey and targets eMERLIN detected sources (red circles), SCUBA sub-mm sources (yellow inverted triangles) and legacy positions (green stars) which aim to fill in the gaps in coverage. The outer annulus targets only the brightest sources detected by the VLA in \citet{morrison2010very}. Those with integrated flux densities $0.1 < S_{\mathrm{i,VLA}} < 1$ mJy (blue heptagons) are targeted to a radius of 12\arcmin~and bright sources $S_{\mathrm{i,VLA}} > 1$ mJy (black crosses) are targeted to the edge of the \citet{morrison2010very} survey. } \label{Fig:Source positions} \end{figure} \begin{figure}[!tb] \centering \includegraphics[width=\hsize]{rms_pbcor.pdf} \caption{R.m.s. sensitivity for our 1.6~GHz EVN observations after primary beam correction. These data were optimally weighted for sensitivity (AIPS task \texttt{IMAGR: UVWTFN=`NA'}). The central r.m.s. is approximately \textasciitilde9~$\mu \mathrm{Jy\,beam^{-1}}$. The red dashed circles correspond to the HPBW of the Effelsberg telescope at 1.6\,GHz ($\sim7.\!\arcmin5$) at the pointing centres specified in Table~\ref{table:telescopes}, and coloured markers correspond to the sub-fields. Contours start at 15\,$\rm \mu Jy\,beam^{-1}$ in increments of 5\,$\rm \mu Jy\,beam^{-1}$ in order to illustrate the rapid sensitivity losses outside the primary beams of the large telescopes.} \label{Fig:rms_natural} \end{figure} \subsubsection{Data reduction}\label{SSec:Data reduction} These data were reduced using the Astronomical image processing (AIPS) software developed by NRAO\footnote{www.aips.nrao.edu} \citep{Greisen:2003wo}, and its Python interface, Parseltongue \citep{kettenis2006parseltongue}. Before describing the data reduction, we note that there was an error found in the position of the secondary phase calibrator (J1234+619) when we tested phase referencing from the primary calibrator (J1241+602) to the secondary phase calibrator. This incorrect position originated from the \citet{chi2013deep} observations. The correct position was found to be J2000 12:34:11.7413(57) +61:58:32.478(07). Independent 5\,GHz e-MERLIN observations of J1234+619 using multiple phase calibrators verified that this new position is correct (see Appendix~\ref{appendix}). The model of J1234+619 derived from initial phase referencing tests were then used when fringe fitting in order to ensure the correct position is used. With this issue established and solved, these data were calibrated as follows. Gains were calibrated using the system temperature, $T_{\mathrm{sys}}$, measurements from each antenna and the data were edited to remove any Radio Frequency Interference (RFI) using the AIPS tasks \texttt{SPFLG} and \texttt{CLIP}. Instrumental phase offsets between the spectral windows\footnote{We use the term `spectral windows' to describe the sub-bands in frequency. They are synonymous with the term IFs used in the AIPS data reduction package.} were then removed by solving for the phase and delays on a two minute integration of 3C345, using the task \texttt{FRING}. This allowed the spectral windows to be combined when the data is fringe fitted. We note that the dispersive delays were not corrected for, however we are confident that this is a minimal contribution as the fully calibrated data shows no phase deviations across the frequency band in excess of 10\mbox{-}15 degrees on all baselines. The group delays for the phase calibrators and fringe finders were calibrated using \texttt{FRING} (using a model of J1234+619 created when investigating the positional offsets), edited (using \texttt{SNEDT}) and smoothed (using \texttt{SNSMO}) to remove noisy and spurious solutions. With the delays calibrated, the phase and rates were then calibrated, edited and smoothed and applied to the data. We note that fringe fitting was conducted on both phase calibrators. This is because the Lovell Telescope (Jb) did not observe the primary phase calibrator due to a restriction on the number source changes per hour. With fringe fitting complete, the bandpass response was calibrated using AIPS task \texttt{BPASS}. 3C345 was used for bandpass calibration on all telescopes. The primary phase calibrator (and furthest from the target), J1241+602, underwent three rounds of phase only self calibration (with solution intervals of five, one, and one minute(s) respectively) and one round of amplitude and phase self-calibration with a five minute solution interval. These solutions were applied to the closer, secondary phase calibrator, J1234+619. Three rounds of phase only self-calibration (with solution intervals of five, four, and two\,minutes respectively) were conducted on J1234+619 and these solutions were then applied to the sub-field containing J123462+621331. Spectral windows were not combined when self-calibration was performed on J1241+602, or during the first round of self-calibration on J1234+619. This would effectively correct any residual dispersive delay errors caused by a variable ionosphere by approximating the true phase correction (smoothly variable with frequency) with one that is a stepwise constant (one value per subband per solution interval). The calibration solutions and flagging tables derived and applied to J123642+621331 were then applied to the other 698 sub-fields. All sub-fields were then imaged using AIPS task \texttt{IMAGR} using both natural (\texttt{UVWTFN=`NA'}) and uniform weighting schemes and these images were searched for emission. A detection threshold of $6\sigma$ was used to reduce the chance of false positives \citep[see][for more in depth discussion]{radcliffeMSSC2016}. To reduce residual phase errors arising from atmospheric inhomogeneities between the phase calibrator and target field, we utilised the Multi-source Self-calibration (MSSC) technique developed by \citet{2013A&A...551A..97M} and \citet{radcliffeMSSC2016}. The nine brightest sources were used in MSSC. These sources were detected when imaged with both uniform and natural weighting schemes. If a source was detected in both images, it is highly suggestive that the source can be detected on all baselines. As a conservative precaution, we excluded sources outside the primary beam of the large telescopes (Effelsberg and Lovell) because we would expect considerable phase and gain errors to be induced by the attenuation of the primary beam. These errors would not be the same for each sub-field and will simply add noise into the solutions for MSSC when the individual sub-fields are combined. By performing this we ensure that the dominant error is from differing atmospheric paths between the phase calibrator and the target field. Three rounds of phase-only MSSC were performed using a solution interval of 2 min and the corrections derived were applied to all sub-fields. A primary beam correction scheme (outlined in Section~\ref{SSec:PBCOR}) was then applied to the central 7.\!\arcmin5 radius field and the sub-fields were searched for emission. The following section describes the method used to detect sources once MSSC and the primary beam correction was applied. \begin{figure*}[!tb] \centering \includegraphics[width=\hsize]{Chi_Update_Plot_PBCOR_v7.pdf} \caption{Composite image of 1.4\,GHz WSRT radio-KPNO optical overlay of the GOODS-N field, centred on the HDF-N \citep{garrett2000wsrt}, surrounded by postage stamp images of the 1.6\,GHz 31 VLBI detected sources presented in this paper. Those VLBI sources without adjoining red lines are located outside the WSRT central figure. The VLBI contours are $\pm1\sigma$ noise and then linearly spaced between $1\sigma$ noise and the peak pixel brightness. This image is an update on Figure 1 from \citet{chi2013deep}.} \label{Fig:All_sources} \end{figure*} \subsection{Source detection methodology}\label{SSec:source detection} To determine accurate peak brightnesses and integrated flux densities, we tested multiple source detection algorithms namely AIPS task \texttt{SAD}, \texttt{BLOBCAT} \citep{hales2012blobcat} and \texttt{PYBDSF} \citep{Mohan2015:py}. It has been noted that Gaussian fitting routines, namely \texttt{SAD} and \texttt{PYBDSF}, were found to routinely over estimate integrated flux densities in the low signal-to-noise (S/N) regime where noise fluctuations across the extent of a source can induce sub-optimal fitting \citep[see][]{Middelberg:2013hy}. In the low S/N regime (S/N $\sim 6\mbox{-}10$), the measured integrated flux densities were on average $\sim16\%$ and $\sim22\%$ higher than the \texttt{BLOBCAT} measured values when using \texttt{SAD} and \texttt{PYBDSF} respectively. In the high S/N regime, the effects are less pronounced with both \texttt{SAD} and \texttt{PYBDSF} reporting fluxes only 4\mbox{-}5\% larger than \texttt{BLOBCAT}. We therefore used \texttt{BLOBCAT} to measure peak brightnesses and integrated flux densities of our sources. Initially, \texttt{BANE} \citep{Hancock2012:ag} was used to generate a r.m.s. map of each field which is in turn input to \texttt{BLOBCAT}. All parameters were set to default apart from the surface brightness error which was assumed to be $\sim$ 10\% which is caused by amplitude calibration errors (\texttt{-{}-pasbe=0.1}), the minimum S/N detection threshold (\texttt{-{}-dSNR = 6}) and, as our point spread function (psf or synthesised beam) is vastly oversampled, the peak brightness pixellation error was set to 1\% (\texttt{-{}-ppe=0.01}; see Appendix A of \citet{hales2012blobcat} for more information). The surface brightness error included an additional error factor which is proportional to the value of the primary beam correction. Note that \texttt{BLOBCAT} does not provide any size information therefore source sizes were measured using \texttt{PYBDSM}\footnote{As part of these observations we have developed a generalised wrapper for source detection in multi-phase centre VLBI observations that is publicly available. It can generate catalogues using \texttt{SAD}, \texttt{BLOBCAT} and \texttt{PYBDSF} (see \url{https://github.com/jradcliffe5/General_VLBI_cataloger})}. For the central 7.\!\arcmin5 radius field, each sub-field was imaged using natural weighting only (to optimise sensitivity) and then the method outlined above was used to search for detections. Detections were then imaged with uniform weighting (whose r.m.s. is $~1.6\times$ the naturally weighted r.m.s.) in order to obtain the highest resolution image possible. To optimise the number of detections, we used a different strategy to image sub-fields outside the central 7.\!\arcmin5 radius field which are beyond the half-power beam widths (HPBWs) of the large telescopes (Effelsberg and Lovell). Two images were made for each sub-field. For the first image, the large telescopes on all pointings apart from the closest pointing centre to the sub-field were flagged. This was performed because while the large telescopes retain significant sensitivity well beyond the HPBW of their primary beam, the retention of the more distant pointing centres would induce significant amplitude errors which would outweigh any sensitivity gains. This method produced an additional 6 detections, the majority of which (4/6) are within a 12\arcsec~radius of the pointing centre. For the second image, all of the large telescopes are flagged, so that sources up to the HPBW of the smaller 32m and 25m telescopes could be detected without being affected by amplitude errors from the large telescopes still present in these data. This method produced just one additional detection and none of the 6 sources detected with the larger telescopes included were detected with this method. This is likely due to the significant sensitivity reduction when the large telescopes are removed. Additionally, we note that the primary beam models are poorly constrained outside the HPBW, therefore these sub-fields do not have primary beam correction applied. Once detections were identified, each sub-field was re-imaged with both uniform weighting ($\sim5.3\times4.5$ mas) and natural weighting ($\sim 16\times16$ mas) schemes and re-catalogued resulting in a total of 31 detections (24 from the central field and 7 from the targeted survey beyond the 7.\!\arcmin5 radius field). These detections are shown in Figure~\ref{Fig:All_sources} which is an update on Fig. 1 from \citet{chi2013deep}. We note that \citet{radcliffeMSSC2016} only stated an initial 20 sources, however this study invariably missed detections because the majority of the annulus sub-fields were not included. The derived peak brightnesses, flux densities and positions of our objects are described in Table ~\ref{Table:Source_catalog}. \subsection{VLA observations}\label{SSec:VLA Observations} In addition to the EVN observations, archival L-band Karl. G. Jansky Very Large Array (VLA) A-array data (P.I. F. Owen) were reduced to provide a zero\mbox{-}spacing flux density for our VLBI sources and forms part of the eMERGE survey data (Muxlow et al. in prep.). This section briefly describes the data reduction process. The VLA observed the GOODS-N field between the 7th August-11th September 2011 for a total of 38 hours, in the A-array configuration. These data were flagged using the \texttt{AOFlagger} software \citep{Offringa:2012eo} and calibrated using the VLA CASA calibration pipeline\footnote{\url{https://casa.nrao.edu}} (packaged with CASA version 4.3.1). These data were transferred to AIPS and two sources (J123452+620236 and J123538+621932) were peeled. Due to the large fractional bandwidth ($\sim$68\%) and large data size, postage stamps centred on each VLBI detection were produced using the multi-term multi frequency algorithm within CASA task \texttt{tclean} \citep{Rau2011:mfs}. These images were primary beam corrected using the CASA routine \texttt{widebandpbcor}, which also corrects for the induced spectral index caused by the varying primary beam attenuation across the bandwidth. The resulting images have a r.m.s. of $\sim 2\mbox{-}5~\mathrm{\mu Jy\,beam^{-1}}$ with a restoring beam of $1.54\arcsec\times1.34\arcsec$. Flux densities were extracted using \texttt{BLOBCAT} \citep{hales2012blobcat} and we conservatively assign a standard 10\% surface brightness error originating from calibration. \section{EVN primary beam correction}\label{SSec:PBCOR} For these observations, we used and developed one of first primary beam models European VLBI Network (Keimpema et al. in prep.). We followed a similar prescription to primary beam modelling as described in \citet{Strom2004:PB} and \citet{CaoVLBI2014}. Due to the lack of accurate primary beam models for many EVN telescopes, the primary beam power response of each telescope can be approximated by using a normalised, symmetric, 2D Gaussian of the form, \begin{equation} P(\theta, \phi) \approx \exp\left(-{\frac{(\theta- \theta_0)^2 + (\phi - \phi_0)^{2}}{2\sigma^2}}\right), \end{equation} \noindent where $P(\theta,\phi)$ is the relative primary beam power response. $\theta$ and $\phi$ are the respective azimuthal and polar angular distances from the antennas' pointing centres. The azimuthal and polar coordinates of the telescope's pointing centers are defined by $\theta_0$ and $\phi_0$ respectively. The standard deviation, $\sigma$, can be related to the FWHM of the primary beam, $\theta_{1/2}$, through the expression, \begin{equation} \sigma^2 = \frac{\theta_{1/2}^2}{8\ln{2}}, \end{equation} \noindent where the FWHM of the primary beam is defined as, \begin{equation}\label{eqn. beam} \theta_{1/2} = K\frac{\lambda_{\mathrm{c}}}{D}. \end{equation} \noindent Here, $\lambda_{\mathrm{c}}$, is the observing wavelength, and $D$ is the aperture diameter (Keimpema 2015, unpublished). A small correction factor, $K = 1.05$, was used to take into account any aperture blockages (Wrigley et al., in prep.). For some telescopes (namely Effelsberg, Jodrell Bank and Shenzhen in these observations) accurate beam models are available and therefore replace $D/K$ in Eqn.\,\ref{eqn. beam} with the fitted HPBW of these telescopes. We note that there are some uncertainties associated with the derived HPBW of Jodrell Bank because this is derived from a modelled aperture distribution rather than more accurate methods such as holographic scans \citep{Wrigley:thesis}. The fitted aperture diameters are summarised in Table~\ref{table:telescopes}. $P(\theta, \phi)^{-1/2}$, that is the inverse primary beam voltage response, was calculated for each telescope at every time integration step, each spectral window and each sub-field. These were recorded into an AIPS SN table (one per sub-field) which were then be applied to the corresponding $uv$ data set using AIPS task \texttt{CLCAL}. The application of this calibration table multiplies the visibility amplitudes of each baseline by a correction factor which is the inverse product of the primary beam voltage responses, ($P_i(\theta, \phi)^{-1/2} \times P_j(\theta, \phi)^{-1/2}$) of the two telescopes $i,j$ that form the baseline. The application of this table also adjusts the weights by the inverse of this correction factor. The simultaneous adjustment of weights means this primary beam correction will also correctly weight multiple pointings, thus permitting mosaicking using the EVN array. We note that the use of a Gaussian model for our primary beam model implies heavy tapering of EVN telescopes, however these telescopes were designed for single dish observations so we would expect a large amount of tapering. In addition, we tested multiple models (1D Gaussian, 2D Gaussian, Airy disk, and a polynomial) when fitting to these beam models and found that differences between the models are only significant towards the primary beam null and these models are indistinguishable within the HPBW. However, because of the lack of available primary beam models for many EVN telescopes (most notably the Lovell telescope for this observation), there are considerable uncertainties on the derived peak brightnesses and integrated fluxes. Incorporating this model to include higher order corrections, such as beam squint and more physically motivated models would be simple. Nevertheless, if we are to significantly improve EVN primary beam correction, beam measurements for all individual EVN stations are required, because uncertainties towards the edge of the primary beam are dominated by the lack of information on the primary beams' HPBWs. As a result of this, sub-fields which lie outside the central 7.\!\arcmin5 radius area were not primary beam corrected because, the Effelsberg and Lovell telescope corrections are beyond the FWHM of the Gaussian models derived, and errors due to incorrect beam models will rapidly increase. Figure~\ref{Fig:rms_natural} shows the r.m.s. sensitivity of our observations after primary beam correction using natural weighting. The central r.m.s. is approximately 9 $\mathrm{\mu Jy\,beam^{-1}}$. We note that this primary beam correction is constantly under-development and will be updated with the latest EVN beam models. The code is publicly available and can be found at \url{https://github.com/jradcliffe5/EVN_pbcor}. \section{Catalogue description}\label{Sec:Catalog} \begin{figure}[!tb] \centering \includegraphics[width=\hsize,clip]{VLBI_spec_phot_redshift_distribution.pdf} \caption{Redshift distribution for our detected VLBI sources. There are 20 spectroscopic redshifts (dark grey) and 11 photometric redshifts (light grey) for these objects. The over-density of sources at $z\sim2$ are briefly discussed in Section~\ref{SSec:redshifts}. Optimal bin widths were calculated using the prescription in \citet{Knuth2006:his}.} \label{Fig:Redshifts} \end{figure} In this section we describe the VLBI catalogue of 31 compact radio sources which accompanies this paper (see Tables~\ref{Table:Source_catalog} and \ref{Table:Derived_properties}). The designated column numbers correspond to the associated machine-readable version of the catalogue. The column descriptors are as follows: \begin{enumerate}[leftmargin=2\parindent] \item[Col. 1:] \textit{Source ID}. Radio name adopted in this paper which is of the form Jhhmmss+ddmmss based upon the J2000 Right Ascension (in hours) and Declination (in degrees). Note that some source identifiers are slightly different to that of \citet{morrison2010very} because of the improved astrometric accuracy. \item[2-4:] \textit{z}. The redshifts for the 31 VLBI detected sources can be found in Column 2. The 68\% lower and upper confidence intervals are in Columns 3-4. A description of how these redshifts were compiled can be found in Section~\ref{SSec:redshifts}. \item[5,6:] \textit{z type/ref}. Column 5 describes how these redshifts were determined. Spectroscopic redshifts are denoted with `S' in the $z$ type column while photometric redshifts are denoted with `P'. Column 6 contains the reference for which the redshift was acquired \item[7:] \textit{R.A. (J2000)} Right Ascension (J2000) in hours with the format hh:mm:ss.ssss. \item[8:] \textit{Dec. (J2000)} Declination (J2000) in degrees with the format dd:mm:ss.sss. \item[9-10:] \textit{VLBI $P$}. Peak brightness (Column 9) and associated error in $\mu\mathrm{Jy\,beam^{-1}}$ (Column 10). This is determined using the flood-filling algorithm \texttt{BLOBCAT} \citep{hales2012blobcat}. Errors derive from source fitting, calibration, and primary beam correction. Peak brightnesses of those sources without primary beam correction are merely lower limits (denoted by -99.0 in the error column in the machine-readable table). \item[11-12:] \textit{VLBI $I$}. Integrated flux density (Column 11) and associated error in $\mu\mathrm{Jy}$ (Column 12). This is determined when deriving the peak brightness. Errors originate from source fitting, calibration, and primary beam correction. Integrated flux densities of those sources without primary beam correction are merely lower limits (denoted by -99.0 in the error column in the machine-readable table). \item[13:] \textit{S/N}. Signal-to-noise ratio. \item[14-16:] \textit{Beam}. Major axes (Column 14), minor axes (Column 15) and position angle (Column 16) of the CLEAN restoring beam in milliarcseconds. The two restoring beams of $\sim 16 \times 16$ mas and $\sim 5.3 \times 4.5$ mas correspond to natural weighting and uniform weighting schemes respectively. The VLBI peak brightnesses and integrated flux densities presented in Columns 9-10 and 11-12 respectively have been derived using the beam sizes specified in these columns. \item[17-18:] \textit{VLA $P$}. Peak brightness (Column 17) and associated errors (Column 18) of the 1.5\,GHz VLA observations described in Section~\ref{SSec:VLA Observations}. Errors are determined from calibration ($\sim 10\%$) and source fitting. \item[19-20:] \textit{VLA $I$}. Integrated flux density (Column 19) and associated errors (Column 20) of the 1.5\,GHz VLA observations. Errors originate from calibration ($\sim 10\%$) and source fitting. \item[21:] \textit{$\alpha$}. Spectral index between the 5.5\,GHz VLA observations of \citet{Guidetti:2017wt} and 1.5\,GHz VLA observations presented in this paper. \item[22-23:] \textit{$L_{\mathrm{1.5GHz}}$}. Monochromatic rest-frame radio luminosity in $\rm W\,Hz^{-1}$ (Column 22) and its associated error (Column 23). Values were derived using the 1.5\,GHz VLA integrated flux densities and k-corrected using the spectral index. Associated errors originate primarily from those sources with photometric redshift errors. The median spectral index of $-0.56$ were used to determine the radio luminosities of sources without spectral index information. \item[24-26:] \textit{$T_b$}. Brightness temperatures, in $\rm K$, calculated using Eqn.~\ref{equation:brightness temperature} (Column 24). Column 25 is a flag to denote lower limits (set as 1 in machine readable version to denote lower limits) and Column 26 corresponds to whether the brightness temperature was calculated using uniform or natural weighting. This is denoted as U or N respectively in the machine-readable table and in Table~\ref{Table:Derived_properties} brightness temperatures derived using natural weighting are italicised. See Section~\ref{SSSec:Brightness temperatures} for further details. \item[27-30:] \textit{Angular sizes}. Columns 27 and 29 describe the major and minor axes of the deconvolved projected angular size of the VLBI source in milliarcseconds. Columns 28 and 30 contain flags to denote upper limits (hence unresolved source sizes) for the major and minor axes respectively (set as 1 in machine readable version to denote upper limits). Sizes were fitted using \texttt{PYBDSF} \citep{Mohan2015:py} and see Section~\ref{SSSec:Brightness temperatures} for further details. \item[31-34:] \textit{Linear size}. Columns 31 and 33 describe the major and minor axes of the deconvolved projected linear size of the VLBI source in parsecs and Columns 32 and 34 contain flags to denote upper limits for the major and minor axes respectively (set as 1 in machine readable version to denote upper limits). \end{enumerate} \section{Results and discussion} \subsection{Redshifts}\label{SSec:redshifts} The VLBI positions were matched to the many spectroscopic and photometric catalogues to within a radius of one arc-second from the VLBI position. In order to prevent mis-identifications potential matches were visually compared to the HST optical/near-IR images of \citet{Skelton_HST3D_2014} to ensure the correct redshift is assigned. Redshift information was found for all 31 objects. This comprises of 20 spectroscopic redshifts \citep[][L. Cowie priv. comm.]{Cowie2004z,Smail2004:sz,Chapman:2005wh,Barger_specz_2008,Murphy:2017ja} and and 11 photometric redshifts \citep{Skelton_HST3D_2014,Yang_photz_2014,Cowie2017z}. The redshift distribution is shown in Figure~\ref{Fig:Redshifts}. The median redshift is 1.146 and ranges from 0.11 to 3.44. The redshift distribution shows an abundance of sources around $\sim 2$ which could be an imprint from the previously identified $z=1.99$ proto-cluster in GOODS-N \citep{Blain2004:smg,Chapman2009:sm}. This proto-cluster has approximate redshift bounds of $1.982 < z < 2.010$, and two VLBI sources (J123618+625541 and J123621+621708) are associated this proto-cluster \citep{Casey2016:sm}. It is expected that this structure is extended spatially beyond the limited field-of-view of the GOODS-N survey as the deep spectra does not extend much outside of the HST coverage. It has been suggested that J123642+621331 ($z=2.018$) could also member of this proto-cluster \citep{Murphy:2017ja}, and it is also possible that J123721+621130 ($z=2.02$) could be associated, however an accurate spectroscopic redshift would need to be acquired. This raises possibility that, with deep VLBI surveys and improved number densities of sources, over-densities of VLBI-detected AGN could act as a tracer of proto-clusters for which there is evidence of enhanced AGN activity in multiple wavebands including the radio \citep[e.g.][]{,Wylezalek2013:agn,Krishnan2017:pc}. \subsection{Astrometry} \defcitealias{muxlow2005high}{M05} In order to check the astrometry of these observations, we compared these VLBI observations to the MERLIN-VLA observations from \citet{muxlow2005high}, hereafter \citetalias{muxlow2005high}), and the reprocessed wide-field images of the same data by \citet{Wrigley:thesis}. The positions were not compared to the global VLBI observations of \citet{chi2013deep} due to the known positional uncertainty on the phase calibrator used in those observations (see Appendix A), plus there is a larger number of concordant sources between these EVN observations and \citetalias{muxlow2005high}. Due to computational limitations at the time, \citetalias{muxlow2005high} targeted 92 radio sources within a $10\arcmin\times10\arcmin$~square field with VLA-only flux densities $> 40~\mathrm{\mu Jy}$ in the HDF-N field to a central r.m.s. of $3.3 \mathrm{\mu Jy\,beam^{-1}}$. These data were re-processed by \citep{Wrigley:thesis} and a primary beam corrected $18\arcmin\times16\arcmin$ image was used for the subsequent analyses. We used \texttt{BLOBCAT} (with a detection threshold of 6$\sigma$) to generate a catalogue of 155 MERLIN-VLA detected sources (with a restoring beam of 0.2\arcsec). These were then cross matched with the EVN positions to within 1 arcsecond. A total of 25/31 sources were matched to an MERLIN-VLA detected source with the remaining unmatched sources beyond the sky area considered by \citet{Wrigley:thesis}. We estimate a conservative 5 mas error for the astrometry of these new observations, due to uncertainties on the position of the secondary phase calibrator J1234+619, and a 10 mas error on the VLA-MERLIN data arising from calibration and source fitting errors. As Figure~\ref{Fig:astrometry} shows, there is a small systematic offset of 5.5 mas in RA and 0.4 mas in Dec. Note that all sources apart from wide-angle tail FR-I source, J123726+621129, are within 60 mas of the MERLIN-VLA positions. This source was excluded from the derivation of the systematic astrometric offset and Figure~\ref{Fig:astrometry}. The systematic offsets can originate from core-jet blending of the radio emission, standard errors associated with source fitting and calibration, and also errors originating from repeated use of the AIPS task UVFIX when peeling bright sources from the VLA-MERLIN data \citep[e.g. see][]{MorganVLBI2011}. The astrometric scatter is expected to be dominated by blending in the MERLIN-VLA data as substructure such as AGN jets will blend with AGN core emission thus causing an offset in position of peak brightness. These errors should have orientations which are randomly distributed, hence the median 5\,mas astrometry offset indicates that we are in fairly good agreement with the MERLIN-VLA positions. \begin{figure}[!tb] \centering \includegraphics[width=\hsize]{astrometry_blobcat_M05_VLBI.pdf} \caption{Relative astrometric precision between \citet{muxlow2005high} and these observations. The blue dashed line is the mean RA and Dec shifts corresponding to 5.5 and -0.4 milliarcseconds respectively. The black dot-dashed line corresponds to $\Delta$RA=0 and $\Delta$Dec=0. The red cross indicates the typical error per data point (which does not include core-jet blending uncertainties).} \label{Fig:astrometry} \end{figure} \subsection{Comparison to other VLBI surveys} As previously stated, the GOODS-N field has been targeted by two previous wide-field VLBI surveys by \citet{garrett2001agn} and \citet{chi2013deep}. It is worth noting that surveys had restricted field-of-views which are encompassed by the field-of-view of these new EVN observations, therefore we would expect that we should be able to detect all previous identified sources. This survey recovers 11/12 of the \citet{chi2013deep} detections and all three of the \citet{garrett2001agn} detections. The missing source, J123642+621545, illustrates significant radio variability and has an e-MERLIN integrated flux density of only 60 $\mu$Jy during the period of these observations, whereas \citet{chi2013deep} detects an integrated flux density of 343 $\mu$Jy. We compared our results with other wide-field VLBI surveys to ensure that our observations and detection fractions are consistent. In order to calculate the detection fraction, we used the VLA-A array observations provided by \citet{morrison2010very} and cross-matched these with to our VLBI survey. For this analysis, we only consider the central area where we have contiguous imaging and where our primary beam model is most reliable. Within this region, our EVN data were used to image the locations of the 314 VLA sources. Of these sources, 94 were theoretically detectable assuming that they are unresolved on VLBI angular scales with a flux density greater than our 6$\sigma$ VLBI detection threshold (based upon the VLBI r.m.s. noise distribution, as shown in Fig.~\ref{Fig:rms_natural}). Of this sample 24 sources were detected with VLBI, thus giving a detection threshold of $25.5$$\substack{+5 \\ -4}$\% (24/94). Errors were determined using the Bayesian binomial estimator of \citet{Cameron2011:st}. This is consistent with previous wide-field VLBI surveys. For example, the Chandra Deep Field-South \citep[$55~\mu$Jy\,beam$^{-1}$ r.m.s.,][]{Middelberg:2011bx} has a detection fraction of $20\substack{+5 \\ -4}\%$, the Lockman Hole/XMM \citep[$24~\mu$Jy\,beam$^{-1}$ r.m.s.,][]{2013A&A...551A..97M} detects $30\pm3\%$ and the COSMOS survey \citep[$10~\mu$Jy\,beam$^{-1}$ r.m.s.,][]{Ruiz:2017ur} detects $20\pm1\%$. The mJIVE survey has a detection fraction of $20\pm1\%$ to a an r.m.s. of $60\mu$Jy$\,$beam$^{-1}$ \citep{deller2014mjive}. Note that there are some caveats because our VLBI sample is surface brightness limited due to the resolution and flux sensitivity of our EVN observations. For the fainter sources in our targeted sample (e.g. $S_{\rm VLBI}$ $\lesssim$100 $\mu$Jy), we can only detect those VLA sources with relatively large VLBI-VLA flux density ratios. For example, as the median flux density ratio is \textasciitilde0.6 for this sample (see Section~\ref{SSec:vlbi_vla}), most VLA sources with integrated flux densities $\lesssim$ 100 $\mu$Jy will go undetected. This motivates deeper VLBI observations in the future as the improved r.m.s. noise levels will recover these sources. \subsection{Radio properties of the VLBI selected population}\label{Sec:Radio Properties of the VLBI Selected Population} \subsubsection{VLBI-VLA flux densities}\label{SSec:vlbi_vla} We compared the 1.5\,GHz VLA flux densities to our 1.6\,GHz EVN observations in order to investigate the origin of the radio emission. To do this we can use the VLBI to VLA flux density ratio ($R$) to establish whether a source is dominated by milliarcsecond-scale emission from AGN cores or arc-second scale emission from AGN jets/lobes or star-formation related processes. Note that for this comparison, we only use the VLBI sources which have been primary beam corrected (24/31). As both the VLBI and VLA observations have complete 24hr $uv$ coverage, we use the integrated flux density measurements to define the VLA-VLBI flux density ratio ($R \equiv S_{\rm i,VLBI}/{S_{\rm i,VLA}}$). We find that the 18/24 (66.7\%) VLBI sources have over 50\% of their radio emission originating from a milli-arcsecond scale component. 2/24 (8\%) has $R>1$ which is most likely due to AGN variability because the observation times of VLA (2011) and VLBI (2014) data vary by a few years. Excluding the two known variable sources with $R>1$, we find that the median VLBI-VLA ratio of our observations is 0.625. This is largely in agreement with the COSMOS VLBI survey which find a median VLBI-VLA ratio of 0.6 \citep{Ruiz:2017ur}. We note that, at low flux densities, our VLBI observations are expected to preferentially detect core-dominated systems, with the majority of VLA arcsecond-scale emission confined to a high brightness temperature core which is detectable by VLBI observations. This is consistent as only a small fraction ($\sim10\%$) of our VLBI-detected sources exhibit large-scale radio jets or lobes, while the remaining sources are compact. An evolution towards more core-dominated systems as we approach $\mathrm{\mu Jy}$ flux densities has been hinted at in other VLBI surveys, most notably the mJIVE-20 and COSMOS VLBI surveys \citep[][]{deller2014mjive,Ruiz:2017ur}. There is some evidence that suggests that this evolution may be true. It has been shown that a population of radio sources with core fraction of $\sim$0.3 below a 1.4 GHz luminosity of $10^{25}~\mathrm{W\,Hz^{-1}}$ are required by empirical simulations in order to accurately extrapolate the established populations from low-frequency ($< 5$\,GHz) surveys to the $>$ 10\,GHz source populations \citep{Whittam:2017sk}. This could be equivalent to the postulated population of `FR0' sources in the local universe which have core dominated, compact radio emission extending to at most just 3\,kpc \citep{Baldi:2015jt}. These wide-field VLBI surveys could be beginning to detect the high-$z$ analogues to this population of radio sources. \subsubsection{Luminosities}\label{SSec:Luminosities} \begin{figure}[!tb] \centering \includegraphics[width=\hsize]{Radio_power_vs_redshift_JVLA_sp_idx_histogram.pdf} \caption{Radio power vs. redshift for our VLBI sources. 1$\sigma$ uncertainties on radio power and redshifts are plotted. The bold black curve represents the theoretical radio power that these VLBI observations are sensitive to (assuming all the VLA flux is contained in a milliarcsecond core) corresponding to 54${\,\rm \mu Jy\,beam^{-1}}$ or $6~\times$ VLBI central r.m.s. The region above the blue shaded area represents the AGN dominated regime defined using the selection criteria of \citet{Magliocchetti2018:rl}. The histogram shows the distribution of the radio powers of which peak between $10^{24}$ and $10^{25}$ ${\rm W\,Hz^{-1}}$.} \label{Fig:Radio_power_histogram} \end{figure} The radio luminosity of an object can be used to determine the probability that the radio emission of a source is dominated by AGN activity or star-formation. The monochromatic 1.5\,GHz radio power can be calculated using: \begin{equation} L_{\mathrm{1.5GHz}} = \frac{4\pi d_{L}^2}{(1+z)^{1+\alpha}}S_{\mathrm{obs}}, \end{equation} where $\alpha$ is the source spectral index, $z$ is the redshift, $d_L$ is the luminosity distance and $S_{\mathrm{obs}}$ is the measured source flux density (ideally, the zero spacing flux density). Integrated flux densities for all 31 sources were derived using the VLA-A array data outlined in Section \ref{SSec:VLA Observations}. Spectral indices for 24/31 sources were derived using the 5.5 GHz integrated flux densities from the VLA 5.5\,GHz survey of \citet{Guidetti:2017wt}. For the seven remaining sources, we used the median spectral index of $-0.56$ from the sources with 5.5\,GHz detections, but we note in passing that these redshift based k-corrections only contribute a small factor to the resulting luminosities. As Figure~\ref{Fig:Radio_power_histogram} shows, we sample a large range of radio powers from $\sim10^{22}\mbox{-}10^{26}~\mathrm{W\,Hz^{-1}}$ which have a median luminosity of $2.7 \times 10^{24}~\mathrm{W\,Hz^{-1}}$. As expected, in the low redshift range ($0 < z < 1$), we detect lower luminosity AGN of the order $10^{22}\mbox{-}10^{24}~\mathrm{W\,Hz^{-1}}$ which is typical of objects such as Seyfert galaxies. Higher luminosity sources are not detected at low redshift due to the combination of a low density of high power sources plus a smaller cosmic volume surveyed due to the restricted field-of-view. At higher redshifts, these observations preferentially detect higher luminosity objects of the order $10^{24}\mbox{-}10^{26} \mathrm{W\,Hz^{-1}}$ which is a consequence of the sensitivity (illustrated by the VLBI sensitivity limit plotted in Fig.~\ref{Fig:Radio_power_histogram}). This corresponds to radio-loud AGN systems such as FR-I, radio galaxies and quasars \citep{OwenLedlow:1994fr,2017A&A...602A...6S}. Only three of these sources are lobe-dominated (J123644+621133, J123726+621128 and J123636+615659) with extended morphologies in the lower resolution VLA data while the remaining objects are core dominated, with any jets unresolved or of low luminosity undetectable by the VLA. We used the selection criteria of \citet{Magliocchetti2018:rl} to illustrate the radio populations that this survey is probing. Their criteria defines the crossover point, $P_\mathrm{cross}$, as where AGN related emission is dominant over star-formation related emission in a radio-selected population. At $z\leq1.8$, their selection is based upon the radio luminosity functions of \citet{McAlpine2013:RLF}. In this regime, $P_\mathrm{cross}$ approximately scales with redshift as $10^{\log_{10}(P_{0,\mathrm{cross}}) + z}$ where $P_{0,\mathrm{cross}} = 10^{21.7}\,\mathrm{W\,Hz^{-1}\,sr^{-1}}$ which is the crossover point from the local universe. Above $z=1.8$, the radio luminosity function for star forming galaxies drops off rapidly and $P_{\mathrm{cross}}$ is kept constant at $10^{23.5}\,\mathrm{W\,Hz^{-1}\,sr^{-1}}$. This selection criteria was found to keep contaminants from star-forming galaxies to below 10\% at $z>1.8$ \citep[see Appendix of][]{Magliocchetti2018:rl}. As Figure~\ref{Fig:Radio_power_histogram} shows, these VLBI observations clearly probe the AGN dominated regime with all radio luminosities at least $3\times P_{\mathrm{cross}}$. For VLBI surveys to truly detect statistically significant samples of hybrid systems with both AGN and star-formation related emission, and provide valuable information regarding feedback, either ultra-wide surveys should be used to probe the tail of star-forming galaxies within the AGN dominated luminosity regime (e.g. \citet{Ruiz2016:rq} investigated radio-quiet AGN using the 2 square degree VLBA survey of COSMOS), or ultra-deep surveys should to used to probe the star-formation dominated luminosity regime which is potentially achievable using the EVN and SKA-VLBI. Nevertheless, we undoubtedly have uncovered hybrid AGN-starburst systems, as we will show in Paper II. \subsubsection{Brightness temperatures}\label{SSSec:Brightness temperatures} \begin{figure}[!tb] \centering \includegraphics[width=\hsize]{Brightness_temperatures_vs_Redshift_histogram_theo_detectable.pdf} \caption{Brightness temperature distribution with respect to redshift. The black circles and red squares correspond to those sources detected with a $\sim5.3\times4.5$ mas restoring beam and those detected with a $\sim 16\times16$ mas beam respectively. Arrows correspond to the lower limits for sources classified as unresolved (that is either $\theta_{\mathrm{maj}}$ or $\theta_{\mathrm{min}}$ is less than the minimum resolvable size). The histogram shows the distribution of brightness temperatures which is colour coded with the markers. The majority of brightness temperatures are between $10^{6}$ and $10^{8}$\,K.} \label{Fig:Brightness temperatures} \end{figure} Brightness temperatures were calculated for the VLBI detected objects which were primary beam corrected (24/31). For these measurements, we used \texttt{PYBDSF} \citep{Mohan2015:py} to fit an elliptical Gaussian model to each source. We adopted a different selection criterion compared to our detection methodology. In this criterion, referred to as the size measurement detection threshold, sources would be excluded if their S/N ratio were less than ten. This S/N cut-off was chosen because, when using randomly distributed model sources injected onto a noise field from our VLBI data, \texttt{PYBDSF} does not detect all of the injected sources when their $\mathrm{S/N} < 10$. In addition, below this threshold, the variance of fitted sizes is often larger than 20\% of the full-width half-maximum of the psf. As we are concerned with only compact emission, we attempted to exclude emission from radio jets or compact star formation by fitting to the uniformly weighted images (with a restoring beam $\sim5.3\times4.5$ mas) if possible. If the S/N of the uniformly weighted image was less than 10, then the naturally weighted images (with restoring beam $\sim16\times16$ mas) would be used to calculate the brightness temperatures. Sources with $S/N < 10$ in both weighting regimes would be excluded completely. Using this selection criteria, 18 sources were selected, 9 using uniform weighting and 9 with natural weighting. For the calculation, we assume the brightness temperature distribution of a source at redshift $z$ is can be modelled as an elliptical Gaussian radio emission region with major axis $\theta_{\mathrm{maj}}$, minor axis, $\theta_{\mathrm{min}}$, and position angle of the major axis $\phi$. Here in our case, $\theta_{\mathrm{maj}}$, $\theta_{\mathrm{min}}$ and $\phi$ are the deconvolved major and minor axes and their position angle of the deconvolved elliptical Gaussian model. The brightness temperature, $T_{b}$ can then approximated using, \begin{equation}\label{equation:brightness temperature} T_{b} = 1.22 \times 10^{12}(1+z)\left(\frac{S_{\mathrm{\nu}}}{1\mathrm{Jy}}\right) \left(\frac{\nu}{1\mathrm{GHz}}\right)^{-2} \left(\frac{\theta_{\mathrm{maj}}\theta_{\mathrm{min}}}{1\mathrm{mas}^2}\right)^{-1}~\mathrm{K}, \end{equation} \noindent where $S_{\mathrm{\nu}}$ is the observed flux density and $\nu$ is the observing frequency \citep[][]{condon1982temperatures,Ulvestad2005}. In addition, we took into account the resolution limit for both $\theta_{\mathrm{maj}}$ and $\theta_{\mathrm{min}}$ using the prescription described in \citet{lobanov2005}. The following expression for the minimum resolvable size, $\theta_{\mathrm{lim},\psi}$, along each axes of the fitted Gaussian can be calculated using the following equation, \begin{equation} \theta_{\mathrm{lim},\psi} = 2^{2-\beta/2}b_\psi \left[\frac{\ln(2)}{\pi}\ln{\left(\frac{\mathrm{S/N}}{\mathrm{S/N}-1}\right)}\right]^{1/2}, \end{equation} \noindent where $b_\psi$ is the measured FWHM of the psf along the direction of the axis for which the resolution limit is being calculated. S/N is the signal to noise of the image and $\beta$ is a constant that takes into account the weighting of the visibilities ($\beta=0$ for uniform weighting and $\beta=2$ for natural weighting). If $\theta_{\mathrm{maj}}$ or $\theta_{\mathrm{min}}$ were lower than the corresponding minimum resolvable size along each axes, then $\theta_{\mathrm{lim},\psi}$ was used instead to calculate the source frame brightness temperature. A source is classified as unresolved if either axes was below the minimum resolution limit. In this case, the size of the radio emitting region cannot be constrained and only lower limits to the brightness temperature can be derived. Figure~\ref{Fig:Brightness temperatures} shows the brightness temperature distribution of our VLBI selected sources. Lower limits are derived for those sources which are unresolved or are unresolved in one axis. Sources detected with a 5.3$\times$4.5 mas restoring beam have brightness temperatures of the order $10^7\mbox{-}10^9$ K and, as expected, sources detected with only a 16$\times$16 mas restoring beam have lower brightness temperatures in the range ($10^5\mbox{-}10^6$ K). In both weighting regimes, it is highly unlikely that the radio emission is caused by star-formation related processes as typical star-burst galaxies exhibit brightness temperatures of $<10^5 \mathrm{K}$ \citep{Condon:1991gi}. Note that the majority of the uniformly weighted sources (8/9) are unresolved, hence emission in these objects come from a compact component. In the naturally weighted sources, all of these are classified as resolved. This is most likely caused by the improved surface brightness sensitivity as a result of the increased weighting of the sensitive, but crucially shorter, central European baselines (especially the Effelsberg to Lovell baseline). As the uniformly weighted images have approximately 1.5 $\times$ the noise of the naturally weighted images, sources detected in natural weighting will most likely have a compact component with higher brightness temperatures, however this component is currently below the size measurement detection threshold (10\,$\sigma$) with uniform weighting. Indeed 6/9 sources do have a compact component in the uniformly weighted images which is above the source detection threshold of 6$\sigma$. The remaining three sources do not have a compact component above $6\sigma$ indicating that some flux may be resolved between the two weighting schemes. \section{Conclusions}\label{Sec:Conclusions} We present a catalogue of 31 faint VLBI detected sources in GOODS-N to \textasciitilde$9~\mu {\rm Jy\,beam^{-1}}$ 1$\sigma$ r.m.s. noise levels and radio luminosities of the order $10^{22}~{\rm W\,Hz^{-1}}$. This has substantially increased the number of VLBI detected sources over previous GOODS-N surveys by \citet{chi2013deep} and \citet{garrett2001agn}, providing a valuable addition to the understanding of the AGN content in this well studied field. We also present a primary beam correction scheme developed for the European VLBI Network. This is publicly available and will be constantly updated. Additional ancillary information about the radio properties of these objects were derived using VLA\,1.5 and 5\,GHz data. The detected objects have radio luminosities of the order $10^{22}\mbox{-}10^{26}~{\rm W\,Hz^{-1}}$ and brightness temperatures in the range $10^6\mbox{-}10^9~{\rm K}$. The high fraction of compact emission (as defined by the VLBI/VLA flux density ratio) may be hinting at the existence of radio-loud but core-dominated systems at high redshift which may be equivalent to the population of FR0 objects in the local universe \citep{Baldi:2015jt,Baldi2018:em}. With previous VLBI surveys effectively characterising the $>$50~$\rm \mu Jy$ radio sky, the scheduled 48 hours of remaining observations will enable us to reach limiting r.m.s. sensitivities of $\sim2~{\rm \mu Jy\,beam^{-1}}$, thus providing the next step in analysing the faint radio-selected AGN population in GOODS-N. The final data release will be able to test whether the increasing fraction of star-forming galaxies at these low flux densities are influenced by AGN activity as postulated in lower resolution surveys. This will be presented in a future publication. In addition, the last 24 hours of these observations will include the first ever wide-field VLBI observations using an integrated EVN-eMERLIN array, providing valuable surface brightness sensitivity improvements with the addition of intermediate length baselines. \longtab[1]{ \begin{landscape} \begin{longtable}{ccccccccc|cc} \caption{1.6\,GHz VLBI and 1.5\,GHz VLA properties of the VLBI detected sources}\label{Table:Source_catalog} \\ \hline\hline Source ID & $z$ & $z$ type\tablefootmark{c}/ref & R.A. (J2000) & Dec. (J2000) & VLBI $P$ & VLBI $I$ & S/N & Beam & VLA $P$ & VLA $I$ \\ & & & & & [$\rm\mu Jy\,beam^{-1}$] & [$\rm \mu Jy$] & & [mas$\times$mas (deg)] & [$\rm\mu Jy\,beam^{-1}$] & [$\rm\mu Jy$] \\ (1) & (2\mbox{-}4) & (5,6) & (7) & (8) & (9,10) & (11,12) & (13) & (14\mbox{-}16) & (17,18) & (19,20) \\ \hline J123555+620902\tablefootmark{a} & 1.8750 & S\tablefootmark{d} & 12:35:55.1267 & +62:09:01.738 & 100.0$\pm$18.2 & 100.0$\pm$18.2 & 7.4 & 16.0$\times$15.2 (87.1) & 165$\pm$17 & 192$\pm$19 \\ J123607+620951 & 0.6380 & S\tablefootmark{d} & 12:36:06.6120 & +62:09:51.159 & 118.0$\pm$22.8 & 118.0$\pm$21.2 & 6.1 & 5.3$\times$4.6 (3.0) & 169$\pm$17 & 205$\pm$21 \\ J123608+621036\tablefootmark{a} & 0.6790 & S\tablefootmark{d} & 12:36:08.1193 & +62:10:35.906 & 122.0$\pm$16.8 & 140.0$\pm$18.2 & 11.1 & 16.0$\times$15.4 (86.8) & 202$\pm$20 & 236$\pm$24 \\ J123618+621541 & 1.9930 & S\tablefootmark{e} & 12:36:17.5546 & +62:15:40.765 & 177.0$\pm$25.0 & 192.0$\pm$26.0 & 10.1 & 5.4$\times$4.6 (10.6) & 226$\pm$23 & 275$\pm$28 \\ J123620+620844 & 1.0164 & S\tablefootmark{d} & 12:36:20.2620 & +62:08:44.268 & 185.0$\pm$25.8 & 185.0$\pm$24.0 & 10.3 & 5.3$\times$4.6 (3.3) & 141$\pm$14 & 156$\pm$16 \\ J123621+621708\tablefootmark{a} & 1.9920 & S\tablefootmark{f} & 12:36:21.2684 & +62:17:08.459 & 96.5$\pm$14.5 & 135.0$\pm$17.3 & 8.9 & 15.6$\times$15.3 (-8.2) & 138$\pm$14 & 190$\pm$19 \\ J123623+620654\tablefootmark{a} & $1.94\substack{+0.12 \\ -0.12}$ & P\tablefootmark{g} & 12:36:22.5086 & +62:06:53.844 & 114.0$\pm$19.0 & 144.0$\pm$21.4 & 8.2 & 16.1$\times$15.3 (86.3) & 222$\pm$22 & 249$\pm$25 \\ J123624+621643 & 1.9180 & S\tablefootmark{e} & 12:36:23.5437 & +62:16:42.746 & 222.0$\pm$28.2 & 383.0$\pm$42.0 & 12.8 & 5.4$\times$4.5 (10.6) & 384$\pm$39 & 411$\pm$41 \\ J123641+621833 & 1.1456 & S\tablefootmark{d} & 12:36:40.5661 & +62:18:33.081 & 141.0$\pm$26.3 & 141.0$\pm$25.7 & 7.5 & 5.3$\times$4.5 (9.4) & 293$\pm$30 & 302$\pm$30 \\ J123642+621331 & 2.0180 & S\tablefootmark{h} & 12:36:42.0899 & +62:13:31.428 & 97.4$\pm$18.0 & 233.0$\pm$27.9 & 6.5 & 5.4$\times$4.5 (12.6) & 432$\pm$44 & 477$\pm$48 \\ J123644+621133 & 1.0128 & S\tablefootmark{d} & 12:36:44.3860 & +62:11:33.170 & 410.0$\pm$44.8 & 411.0$\pm$44.7 & 25.9 & 5.3$\times$4.5 (11.4) & 737$\pm$74 & 1710$\pm$171 \\ J123646+621405 & 0.9610 & S\tablefootmark{d} & 12:36:46.3307 & +62:14:04.692 & 191.0$\pm$24.9 & 192.0$\pm$24.8 & 12.3 & 5.4$\times$4.5 (12.7) & 260$\pm$26 & 280$\pm$28 \\ J123650+620738\tablefootmark{a} & 1.6095 & S\tablefootmark{d} & 12:36:49.6399 & +62:07:37.844 & 77.3$\pm$17.3 & 98.7$\pm$19.9 & 6.5 & 15.4$\times$14.8 (80.9) & 267$\pm$27 & 301$\pm$30 \\ J123653+621444\tablefootmark{a} & 0.3208 & S\tablefootmark{d} & 12:36:52.8827 & +62:14:44.069 & 109.0$\pm$15.1 & 117.0$\pm$15.6 & 11.0 & 14.8$\times$14.7 (9.6) & 188$\pm$19 & 215$\pm$22 \\ J123659+621833 & $2.17\substack{+0.08 \\ -0.07}$ & P\tablefootmark{g} & 12:36:59.3327 & +62:18:32.566 & 2530.0$\pm$328.9 & 4430.0$\pm$572.7 & 88.2 & 5.3$\times$4.5 (8.5) & 4250$\pm$427 & 4640$\pm$464 \\ J123700+620910 & $2.58\substack{+0.07 \\ -0.06}$ & P\tablefootmark{g} & 12:37:00.2460 & +62:09:09.779 & 153.0$\pm$23.4 & 163.0$\pm$24.1 & 9.4 & 5.3$\times$4.5 (8.0) & 272$\pm$27 & 319$\pm$32 \\ J123709+620838 & 0.9070 & S\tablefootmark{l} & 12:37:09.4300 & +62:08:37.587 & 125.0$\pm$21.4 & 127.0$\pm$21.5 & 7.3 & 5.3$\times$4.5 (6.4) & 155$\pm$16 & 163$\pm$16 \\ J123714+621826 & $3.44\tablefootmark{m}$ & P\tablefootmark{i} & 12:37:13.8694 & +62:18:26.301 & 501.0$\pm$56.8 & 629.0$\pm$69.4 & 25.6 & 5.3$\times$4.6 (6.9) & 575$\pm$58 & 637$\pm$64 \\ J123715+620823 & 0.9335 & S\tablefootmark{j} & 12:37:14.9391 & +62:08:23.223 & 2680.0$\pm$272.9 & 2810.0$\pm$284.0 & 103.0 & 5.3$\times$4.6 (5.4) & 1940$\pm$195 & 2090$\pm$209 \\ J123716+621512 & 0.5605 & S\tablefootmark{d} & 12:37:16.3730 & +62:15:12.343 & 125.0$\pm$20.3 & 125.0$\pm$19.7 & 7.9 & 5.4$\times$4.6 (9.9) & 165$\pm$17 & 178$\pm$18 \\ J123717+621733 & 1.1460 & S\tablefootmark{d} & 12:37:16.6800 & +62:17:33.310 & 150.0$\pm$23.8 & 269.0$\pm$32.7 & 8.2 & 5.4$\times$4.6 (7.5) & 308$\pm$31 & 356$\pm$36 \\ J123720+620741\tablefootmark{a} & $0.91\substack{+0.05 \\ -0.03}$ & P\tablefootmark{k} & 12:37:20.0139 & +62:07:41.410 & 94.8$\pm$14.6 & 112.0$\pm$15.8 & 8.8 & 15.9$\times$15.4 (67.2) & 122$\pm$13 & 132$\pm$13 \\ J123721+621130 & $2.02\substack{+0.06 \\ -0.06}$ & P\tablefootmark{g} & 12:37:21.2517 & +62:11:29.961 & 328.0$\pm$38.3 & 364.0$\pm$41.6 & 20.2 & 5.3$\times$4.5 (8.8) & 338$\pm$34 & 385$\pm$39 \\ J123726+621129\tablefootmark{a} & 0.9430 & S\tablefootmark{j} & 12:37:25.9475 & +62:11:28.699 & 124.0$\pm$16.7 & 142.0$\pm$18.2 & 12.2 & 15.4$\times$15.1 (52.6) & 1190$\pm$120 & 5210$\pm$521 \\ \textit{J123649+620439}\tablefootmark{b} & 0.1130 & S\tablefootmark{d} & 12:36:48.9965 & +62:04:38.850 & $>$92.6 & $>$102.0 & 10.5 & 12.5$\times$11.6 (1.2) & 608$\pm$61 & 834$\pm$83 \\ \textit{J123701+622109}\tablefootmark{b} & 0.8001 & S\tablefootmark{d} & 12:37:01.1023 & +62:21:09.623 & $>$111.0 & $>$154.0 & 11.5 & 12.4$\times$11.0 (3.2) & 285$\pm$29 & 390$\pm$39 \\ \textit{J123739+620505}\tablefootmark{b} & $2.99\substack{+0.81 \\ -1.51}$ & P\tablefootmark{k} & 12:37:39.3204 & +62:05:05.489 & $>$154.0 & $>$194.0 & 11.6 & 12.1$\times$10.9 (5.6) & 223$\pm$23 & 258$\pm$26 \\ \textit{J123751+621919}\tablefootmark{b} & $1.20\substack{+0.11 \\ -0.05}$ & P\tablefootmark{k} & 12:37:51.2327 & +62:19:19.012 & $>$111.0 & $>$181.0 & 8.8 & 11.9$\times$10.5 (0.5) & 136$\pm$14 & 155$\pm$16 \\ \textit{J123523+622248}\tablefootmark{b} & $1.42\substack{+0.10 \\ -0.11}$ & P\tablefootmark{k} & 12:35:22.6144 & +62:22:48.028 & $>$92.5 & $>$144.0 & 7.3 & 12.1$\times$10.6 (7.0) & 1260$\pm$126 & 1690$\pm$169 \\ \textit{J123510+622202}\tablefootmark{b} & $2.33\substack{+0.52 \\ -0.24}$ & P\tablefootmark{k} & 12:35:10.2698 & +62:22:02.067 & $>$88.9 & $>$91.4 & 7.9 & 12.1$\times$10.6 (7.0) & 931$\pm$94 & 1280$\pm$128 \\ \textit{J123656+615659}\tablefootmark{b} & $0.39\substack{+0.05 \\ -0.04}$ & P\tablefootmark{k} & 12:36:55.8230 & +61:56:58.917 & $>$518.0 & $>$528.0 & 12.7 & 9.6$\times$9.0 (39.0) & 3590$\pm$361 & 26700$\pm$2670 \\ \hline \hline\end{longtable} \tablefoot{z: redshift, R.A.: Right Ascension (J2000), Dec.: Declination (J2000), VLBI $P$: VLBI peak brightness ($\mathrm{\mu Jy\,beam^{-1}}$), VLBI $I$: VLBI integrated flux density ($\mathrm{\mu Jy}$), N: noise ($\mathrm{\mu Jy\,beam^{-1}}$), S/N: signal-to-noise, Beam: restoring beam in milliarcseconds and beam angle in degrees (major axis $\times$ minor axis (beam angle)), VLA $P$: VLA 1.5\,GHz peak brightness, VLA $I$: VLA 1.5\,GHz integrated flux densities. Italiscised source IDs correspond to sources with no-primary beam correction applied. The row of numbers below the column titles correspond to the columns in the machine-readable table that accompanies this paper.\\ \tablefoottext{a}{Sources detected using naturally weighted taper (\texttt{UVWTFN=`NA'} in AIPS task \texttt{IMAGR})} \tablefoottext{b}{Not primary beam corrected.} \tablefoottext{c}{S: spectroscopic redshift, P: photometric redshift.} Redshift references: \tablefoottext{d}{\citet{Barger_specz_2008}}, \tablefoottext{e}{\citet{Smail2004:sz}},\tablefoottext{f}{\citet{Chapman:2005wh}},\tablefoottext{g}{\citet{Skelton_HST3D_2014}},\tablefoottext{h}{\citet{Murphy:2017ja}},\tablefoottext{i}{\citet{Cowie2017z}},\tablefoottext{j}{Cowie priv. comm.},\tablefoottext{k}{\citet{Yang_photz_2014}},\tablefoottext{l}{\citet{Cowie2004z}}. \tablefoottext{m}{Unknown photometric error, conservatively set to $\pm0.5$ in calculations of derived properties}} \end{landscape}} \longtab[1]{ \begin{longtable}{cccccc} \caption{Derived VLA \& VLBI radio properties of the 31 GOODS-N AGN.}\label{Table:Derived_properties} \\ \hline\hline Source ID & $\alpha$& $L_\mathrm{{1.5GHz}}$ & $T_b$ & Angular sizes & Linear sizes \\ & & [$\rm W\,Hz^{-1}$] & [$\rm K$] & [mas] & [parsec] \\ (1) & (21) & (22,23) & (24\mbox{-}26) & (27\mbox{-}30) & (31\mbox{-}34) \\ \hline J123555+620902 & - & $(2.7\pm 0.3) \times 10^{{24}}$ & - & - & - \\ J123607+620951 & $-1.02$ & $(3.1\pm 0.3) \times 10^{{23}}$ & - & - & - \\ J123608+621036 & $-0.46$ & $(3.3\pm 0.4) \times 10^{{23}}$ & $ \mathit{1 \times 10^{6}}$ & 11.1$\times$6.3 & 80.8$\times$45.8 \\ J123618+621541 & $-0.62$ & $(4.5\pm 0.4) \times 10^{{24}}$ & $>3 \times 10^{7}$ & 3.7$\times$$<$2.8 & 31.5$\times$$<$23.8 \\ J123620+620844 & $-0.28$ & $(4.9\pm 0.6) \times 10^{{23}}$ & $>2 \times 10^{7}$ & $<$3.2$\times$$<$2.8 & $<$26.3$\times$$<$22.9 \\ J123621+621708 & $-0.78$ & $(3.3\pm 0.3) \times 10^{{24}}$ & - & - & - \\ J123623+620654 & $0.06$ & $(2.0\pm 0.7) \times 10^{{24}}$ & - & - & - \\ J123624+621643 & $-0.52$ & $(6.3\pm 0.7) \times 10^{{24}}$ & $2 \times 10^{7}$ & 5.9$\times$4.0 & 50.8$\times$34.2 \\ J123641+621833 & $-0.94$ & $(2.2\pm 0.2) \times 10^{{24}}$ & $ \mathit{3 \times 10^{6}}$ & $<$12.3$\times$5.0 & 104.4$\times$42.6 \\ J123642+621331 & $-1.05$ & $(1.4\pm 0.1) \times 10^{{25}}$ & $ \mathit{3 \times 10^{6}}$ & 12.1$\times$8.5 & 103.4$\times$73.2 \\ J123644+621133 & $-0.56$ & $(3.1\pm 0.3) \times 10^{{24}}$ & $>1 \times 10^{8}$ & 2.1$\times$$<$1.7 & 17.6$\times$$<$13.9 \\ J123646+621405 & $-0.40$ & $(8.7\pm1.0) \times 10^{{23}}$ & $>2 \times 10^{7}$ & $<$2.9$\times$$<$2.5 & $<$23.9$\times$$<$20.1 \\ J123650+620738 & $-0.56$ & $(3.1\pm 0.3) \times 10^{{24}}$ & - & - & - \\ J123653+621444 & $-0.11$ & $(5.3\pm 0.7) \times 10^{{22}}$ & $ \mathit{2 \times 10^{6}}$ & 9.2$\times$4.8 & 44.1$\times$23.0 \\ J123659+621833 & $-1.19$ & $(2.0\pm 0.1) \times 10^{{26}}$ & $>1 \times 10^{9}$ & 6.2$\times$$<$0.9 & 52.2$\times$$<$7.7 \\ J123700+620910 & $-0.89$ & $(1.3\pm 0.1) \times 10^{{25}}$ & $ \mathit{5 \times 10^{6}}$ & $<$9.5$\times$7.2 & 78.3$\times$59.1 \\ J123709+620838 & $0.15$ & $(3.2\pm 0.5) \times 10^{{23}}$ & $ \mathit{2 \times 10^{6}}$ & 7.8$\times$6.1 & 63.0$\times$49.1 \\ J123714+621826 & $-0.66$ & $(3.9\pm1.2) \times 10^{{25}}$ & $>2 \times 10^{8}$ & 3.8$\times$$<$1.7 & 28.5$\times$$<$12.9 \\ J123715+620823 & $-0.04$ & $(4.8\pm 0.7) \times 10^{{24}}$ & $>3 \times 10^{9}$ & $<$1.0$\times$$<$0.8 & $<$7.9$\times$$<$6.9 \\ J123716+621512 & $-0.19$ & $(1.5\pm 0.2) \times 10^{{23}}$ & $ \mathit{2 \times 10^{6}}$ & 10.4$\times$6.5 & 69.1$\times$43.4 \\ J123717+621733 & $-0.89$ & $(2.2\pm 0.2) \times 10^{{24}}$ & $ \mathit{7 \times 10^{6}}$ & 6.8$\times$5.1 & 57.6$\times$43.2 \\ J123720+620741 & $-0.28$ & $(3.4\pm 0.6) \times 10^{{23}}$ & - & - & - \\ J123721+621130 & $0.01$ & $(3.5\pm 0.8) \times 10^{{24}}$ & $>9 \times 10^{7}$ & 2.8$\times$$<$1.9 & 24.0$\times$$<$16.5 \\ J123726+621129 & $-1.23$ & $(6.6\pm 0.4) \times 10^{{24}}$ & $ \mathit{2 \times 10^{6}}$ & 8.7$\times$6.9 & 71.0$\times$56.1 \\ \textit{J123649+620439} & - & $(2.0\pm 0.4) \times 10^{{22}}$ & - & 8.3$\times$6.0 & 17.7$\times$12.7 \\ \textit{J123701+622109} & - & $(7.0\pm 0.7) \times 10^{{23}}$ & - & 9.4$\times$7.3 & 72.8$\times$56.8 \\ \textit{J123739+620505} & - & $(9.7\pm8.9) \times 10^{{24}}$ & - & 8.6$\times$7.2 & 67.9$\times$56.7 \\ \textit{J123751+621919} & - & $(8.2\pm1.6) \times 10^{{23}}$ & - & - & - \\ \textit{J123523+622248} & - & $(1.1\pm 0.2) \times 10^{{25}}$ & - & - & - \\ \textit{J123510+622202} & - & $(2.4\pm 1.0) \times 10^{{25}}$ & - & - & - \\ \textit{J123656+615659} & - & $(1.7\pm 0.5) \times 10^{{24}}$ & - & 7.3$\times$$<$2.4 & 39.7$\times$$<$13.2 \\ \hline \end{longtable} \tablefoot{$\alpha$: 1.5GHz\mbox{-}5.5\,GHz spectral index, $L_\mathrm{{1.5GHz}}$: monochromatic 1.5\,GHz radio luminosity, $T_b$: brightness temperature (italicised indicates that natural weighting was used to derive $T_b$), Angular size: projected angular size using elliptical Gaussian fitting, Linear size: projected linear size in parsecs. Italiscised source IDs correspond to sources with no-primary beam correction applied. Row of numbers below the column titles correspond to the columns in the machine-readable table that accompanies this paper.} } \begin{acknowledgements}\label{Sec:Acknowledgements} We thank the anonymous referee for their comments which helped improve this manuscript. The authors gratefully acknowledge Len Cowie and Amy Barger for allowing us to use unpublished data and for their useful comments. We would also like to thank P. Padovani and R. Windhorst for their useful discussions. \\ This research made use of Astropy, a community-developed core Python package for Astronomy \citep{Astropy,Astropy2018}. \\ The research leading to these results has received funding from the European Commission Seventh Framework Programme (FP/2007-2013) under grant agreement No 283393 (RadioNet3).\\ The European VLBI Network is a joint facility of European, Chinese, South African, and other radio astronomy institutes funded by their national research councils. \\ e-MERLIN is a National Facility operated by the University of Manchester at Jodrell Bank Observatory on behalf of STFC.\\ The National Radio Astronomy Observatory is a facility of the National Science Foundation operated under cooperative agreement by Associated Universities, Inc.\\ \end{acknowledgements} \bibliographystyle{aa} \section{Source cataloguing}~\ref{Appendix:source_cataloguing}
\section{Introduction} In many applications, one wishes to make inference concerning the causal effect of a treatment or condition. Examples include healthcare and assessing the impact of public policies amongst many others. The available data are often observational rather than the result of a carefully planned experiment or trial. The notion of ``causal'' then needs to be carefully defined and the statistical analysis must take into account other possible explanations for the observed outcomes. A common framework for causal inference is the potential outcome setup \cite{imbens2015,robins1986}. In this framework, every individual possesses two ``potential outcomes'', corresponding to the individual's outcomes with and without treatment. The treatment effect, which we wish to estimate, is thus the difference between these two potential outcomes. Since we only observe one out of each pair of outcomes, and not the corresponding ``counterfactual'' outcome, we do not directly observe samples of the treatment effect. Because in practice, particularly in observational studies, individuals are assigned treatments in a biased manner, a simple comparison of actual cases (i.e.\ treated individuals) and controls may be misleading due to selection bias. A typical way to overcome this is to gather the values of covariate variables that influence both outcome and treatment assignment (``confounders'') and apply a correction based on the ``propensity score'', which is the conditional probability that a subject is treated as a function of the covariate values. Under the assumption that outcome and treatment assignment are independent given the covariates, the causal effect of treatment can be identified from the data. Popular estimation methods include ``propensity score matching'' \cite{rubin1978,rosenbaum1983} and ``double robust methods'' \cite{robins1986,robins1995,rotnitzky1995,seaman2018}. In this paper we follow the approach of nonparametrically modelling the propensity score function and posing the estimation of the treatment effect as a problem of estimation of a functional on a semiparametric model \cite{BKRW,vandervaart1991,vandervaart1998}. Our methodological novelty is to follow a semiparametric Bayesian approach, putting nonparametric priors on the propensity score and/or on the unknown response function and the covariate distribution, possibly incorporating an initial estimator of the first function. For notational simplicity we in fact consider the missing data model which is mathematically equivalent to observing one arm of the causal setup. The model is also standard and widely-studied on its own in biostatistical applications, where response variables are frequently missing, and is a template for a number of other models \cite{robins2008,vandervaart2014}. For a recent review on estimating an average treatment effect over a (sub)population, a problem that has received considerable attention in the econometrics, statistics and epidemiology literatures, see Athey et al. \cite{athey2017}. Suppose that we observe $n$ i.i.d.\ copies $X_1,\dots,X_n$ of a random variable $X = (Z,R,RY)$, where $R$ and $Y$ take values in the two-point set $\{0,1\}$ and are conditionally independent given $Z$. We think of $Y$ as the outcome of a treatment and are interested in estimating its expected value $\mathbb{E} Y$. The problem is that the outcome $Y$ is observed only if the indicator variable $R$ takes value 1, as otherwise the third component of $X$ is equal to 0. Whether the outcome is observed or not may well be dependent on its value, which precludes taking a simple average of the observed outcomes as an estimator for $\mathbb{E} Y$. The covariate $Z$ is collected to correct for this problem; it is assumed to contain exactly the information that explains why the response $Y$ is not observed except for purely random causes, so that the outcome $Y$ and missingness indicator $R$ are conditionally independent given $Z$, i.e.\ the outcomes are \textit{missing at random} (relative to $Z$). The connection to causal inference is that we may think of $Y$ as a ``counterfactual" outcome if a treatment were assigned ($R=1$) and its mean as ``half'' the treatment effect under the assumption of unconfoundedness. More precisely, if $Y^1$ and $Y^0$ denote the potential outcomes when treated or not treated, then in the causal model one would observe $(Z, R, Y^1R, Y^0(1-R))$ and be interested in estimating $\mathbb{E} Y^1-\mathbb{E} Y^0$ under the assumption that $Y^0,Y^1$ are conditionally independent of $R$ given $Z$. One can think of the missing data problem as simplifying this to observing $(Z, R, Y^1R)$ and estimating $\mathbb{E} Y^1$. To estimate the causal effect one could apply the missing data problem a second time, to the data $(Z, R, Y^0(1-R))$, to estimate $\mathbb{E} Y^0$, or do a simultaneous analysis. In the nonparametric setup there will be no essential difference between the two. The model for a single observation $X$ can be described by the distribution of $Z$ and the two conditional distributions of $Y$ and $R$ given $Z$. In this paper we model these three components nonparametrically. We investigate a Bayesian approach, putting a nonparametric prior on the three components, in particular Gaussian process and Dirichlet process priors. We then consider the mean response $\mathbb{E} Y$ as a functional of the three components and study the induced marginal posterior distribution of $\mathbb{E} Y$ from a frequentist perspective. The aim is to derive conditions under which this marginal posterior distribution satisfies a Bernstein--von Mises theorem in the semiparametric sense, thus yielding recovery of the mean response at a $\sqrt n$-rate and asymptotic efficiency in the semiparametric sense. In recent years Bayesian approaches have become increasingly popular due to their excellent empirical performance for such problems \cite{hill2011,heckman2014,taddy2014,zigler2014,hahn2016,hahn2017,alaa2017b,futoma2017,alaa2018}. However, despite their increasing use in practice, there have been few corresponding theoretical results. Indeed, early work on semiparametric Bayesian approaches to this specific missing data problem produced negative results, proving that many common classes of priors, or more generally likelihood-based procedures, produce inconsistent estimates assuming no smoothness on the underlying parameters, see the results and discussion in \cite{robins1997,ritov2014}. We attempt to shed light on this apparent gap between the excellent empirical performance observed in practice and the potentially disastrous theoretical performance. The structured nature of the model, with three parameters (response function, propensity score and covariate distribution), requires careful consideration of prior distributions. As the likelihood factorizes over the three parameters, choosing these a priori independent will lead to a product posterior. We show that this can lead to efficient estimation of $\mathbb{E} Y$, but only under unnecessarily harsh smoothness requirements on the parameters. This is in agreement with the discussion in \cite{robins1997,ritov2014}, which applies to likelihood-based methods in general, including semiparametric maximum likelihood \cite{murphy}. Within our Bayesian setup it is possible to correct this (partly) by modelling the response function and propensity score as a priori dependent, thus allowing the components to share information, despite the factorisation in the likelihood. In particular, we propose a novel Gaussian process prior that incorporates an estimate of the propensity score function, and show that it performs efficiently under strictly weaker conditions than for standard product priors (see \cite{RaySzabo} for an empirical investigation). Unlike for these latter priors, extra regularity of the binary regression function can compensate for low regularity of the propensity score, that is one direction of so-called ``double robustness" \cite{rotnitzky1995,RobinsRotnitzky2001}. A related construction using Bayesian additive regression trees (BART) has been shown to work well empirically \cite{hahn2017}. It can thus be both practically and theoretically advantageous to employ propensity score-dependent priors. For the estimation of $\mathbb{E} Y$ at $\sqrt n$-rate, smoothness of the distribution of the covariate $Z$ is not needed. In our main result, we therefore model this distribution by the standard nonparametric prior for a distribution: the Dirichlet process. In our concrete examples the prior modelling thus consists of a combination of Gaussian and Dirichlet processes. In the supplementary material we also consider modelling the covariate density, for instance by an exponentiated Gaussian process. Our result seems to indicate that even when the smoothness of the density is modelled correctly, this approach can induce a non-vanishing bias in the posterior distribution of $\mathbb{E} Y$, an effect that becomes more pronounced with increasing covariate dimension. The papers \cite{robins2008,robins2017} consider estimation of $\mathbb{E} Y$ under minimal smoothness conditions on the parameters. Using estimating equations, the authors construct estimators that attain an optimal rate of convergence slower than $\sqrt n$ in cases where the component parameters have low smoothness. Furthermore, they construct estimators that attain a $\sqrt n$-rate under minimal smoothness conditions, less stringent than in earlier literature, using higher order estimating equations. It is unclear whether similar results can be obtained using a Bayesian approach. The constructions in the present paper can be compared to the estimators obtainable for linear (or first order) estimating equations. It remains to be seen whether Bayesian modelling is capable of performing the bias corrections necessary to handle true parameters of low smoothness levels in a similar manner as higher order estimating equations. For smooth parametric models, the theoretical justification for posterior based inference is provided by the Bernstein--von Mises theorem or property (hereafter BvM). This property says that as the number of observations increases, the posterior distribution is approximately a Gaussian distribution centered at an efficient estimator of the true parameter and with covariance equal to the inverse Fisher information, see Chapter 10 of \cite{vandervaart1998}. While such a result does not hold in full generality in infinite dimensions \cite{freedman1999}, semiparametric analogues can establish the BvM property for the marginal posterior of a finite-dimensional parameter in the presence of an infinite-dimensional nuisance parameter \cite{castillo2012,rivoirard2012,bickel2012,castillo2015}. In such cases, care is required in the choice of prior assigned to the nonparametric part, as oversmoothing may induce a bias in the posterior distribution of the finite-dimensional parameter. Our main results are two theorems for general priors on the response function and/or propensity score, followed by corollaries for Gaussian process priors. In both cases we combine these with a Dirichlet process prior on the covariate distribution. While the first theorem is in the spirit of earlier work, it is novel in its extension to a structured semiparametric model and its combination with the Dirichlet process, in both a modelling and a technical sense. The second theorem is innovative in its investigation of ``half of double-robustness'', as indicated in the preceding, and by showing that incorporating a prior perturbation in the least favourable direction can remove potential bias from the posterior. The latter device takes care of the usual ``prior invariance condition'' and has consequences beyond the model in this paper. The corollaries for Gaussian process priors illustrate the conditions of the main results, and give concrete examples of inference. In the supplementary material we present a third theorem, which covers the case that the covariate density, rather than the distribution, is modelled, which is again illustrated by Gaussian process priors. An important consequence of the semiparametric BvM is that credible sets for the functional are asymptotically confidence regions with the same coverage level. The Bayesian approach thus automatically provides access to uncertainty quantification once one can sample from the posterior distribution. Obtaining confidence statements for average treatment effects is a current area of research and there has been recent progress in this direction, for example using random forests and regression trees \cite{athey2016,wager2017}. Our results show that Bayesian approaches can also yield valid frequentist uncertainty quantification in this setting. The paper is structured as follows. In Section~\ref{sec:model}, we provide a review of the model, including the relevant semiparametric theory. Section~\ref{sec:results} contains the two main theorems and their corollaries, with discussion in Section~\ref{sec:discussion} and the main proofs in Section~\ref{sec:proofs}. The remaining sections are given in the supplement of the paper. Section~\ref{sec:general_prior_f} gives the third theorem, with a joint prior on the propensity score, response function and covariate density. Technical results, auxiliary results and posterior contraction results are deferred to Sections~\ref{SectionTechnicalResults}, \ref{sec:auxiliary_results} and~\ref{sec:contraction}, respectively. \subsection{Notation} The notation $\lesssim$ denotes inequality up to a multiplicative constant that is fixed throughout and $\lfloor x\rfloor$ is the largest integer strictly smaller than $x$. The symbol $\Psi$ is used for the logistic function given by $\Psi(x)=1/(1+e^{-x})$. We abbreviate $\int f\, dP$ by $Pf$. For probability densities $f$ and $g$ with respect to some dominating measure $\nu$, $h(f,g) = (\int (f^{1/2}-g^{1/2})^2 d\nu)^{1/2}$ is the Hellinger distance, $K(f,g)$ is the Kullback-Leibler divergence and $V(f,g) = \int (\log (f/g))^2\, dF$. We denote by $H^s=H^s([0,1]^d)$ and $C^s=C^s([0,1]^d)$ the $L^2$-Sobolev and H\"older spaces, respectively. For i.i.d. random variables $X_1,\dots,X_n$ with common law $P$ the notations $\P_n [h]= n^{-1} \sum_{i=1}^n h(X_i)$ and $\mathbb{G}_n[h]=\sqrt n(\P_n- Ph)$ are the empirical measure and process, respectively. The notation $\L(Z)$ denotes the law of a random element $Z$. We often drop the index $n$ in the product measure $P_\eta^n$, writing $P_\eta$, and write $P_0$ instead of $P_{\eta_0}$, where $\eta_0$ is the true parameter for the data generating distribution. The $\varepsilon$-covering number of a set $\Theta$ for a semimetric $d$, denoted $N(\Theta,d,\varepsilon)$, is the minimal number of $d$-balls of radius $\varepsilon$ needed to cover $\Theta$, and $N_{[]}(\Theta,d,\varepsilon)$ is the minimal number of brackets of size $\varepsilon$ needed to cover a set of functions $\Theta$. \section{Model details}\label{sec:model} Recall that we observe i.i.d.\ copies $X_1,\dots,X_n$ of a random variable $X = (Z,R,RY)$, where $R$ and $Y$ take values in the two-point set $\{0,1\}$ and are conditionally independent given $Z$, which itself takes values in a given measurable space $\mathcal{Z}$. Denote the full sample by $X^{(n)} = (X_1,\dots,X_n)$. This model can be parameterized via the marginal distribution $F$ of $Z$ and the conditional probabilities $a(z)^{-1}=P(R=1|Z=z)$, called the \textit{propensity score}, and $b(z) = P(Y=1|Z=z)$, the regression of $Y$ on $Z$. The distribution of an observation $X$ is thus fully described by the triple $(a,b,F)$. If $F$ has a density $f$, then we may also use the triple $(a,b,f)$. For prior construction it will be useful to transform the parameters by a link function. Most smooth maps from $\mathbb{R}$ to $(0,1)$ may be used, but for definiteness we choose the logistic function $\Psi(t) = 1/(1+e^{-t})$, and consider the reparametrization \begin{align}\label{eq:paramtrization} \eta^a = \Psi^{-1}(1/a),\quad \quad \eta^b = \Psi^{-1}(b), \end{align} and write $\eta = (\eta^a,\eta^b)$. If a density $f$ of $Z$ exists, then we define in addition $$\eta^f = \log f,$$ and write by a slight abuse of notation $\eta=(\eta^a,\eta^b,\eta^f)$. The density $p_{(a,b,f)} = p_\eta$ of $X$ can now be given as \begin{align}\label{eq:likelihood_full} p_\eta (x) = \Bigl(\frac{1}{a(z)}\Bigr)^{r} \Bigl(1-\frac{1}{a(z)}\Bigr)^{1-r} b(z)^{ry} (1-b(z))^{r(1-y)}\, f(z) . \end{align} Note that this factorizes over the parameters. If the covariate is not assumed to have a density and $\eta=(\eta^a,\eta^b)$, we use the same notation $p_\eta$, but then the factor $f(z)$ is understood to be 1, and the expression is the conditional density of $(R, RY)$ given $Z=z$. Since $p_\eta$ factorizes over the three (or two) parameters, the log-likelihood based on $X^{(n)}$ separates as \begin{equation} \label{EqLogLikelihood} \ell_n(\eta) = \sum_{i=1}^n\log p_{(a,b,f)}(X_i)=\ell_n^a (\eta^a) + \ell_n^b (\eta^b) + \ell_n^f (\eta^f), \end{equation} where each term is the logarithm of the factors involving only $a$ or $b$ or $f$, and $\ell_n^f (\eta^f)$ is understood to be absent when existence of a density $f$ is not assumed. The functional of interest is the \textit{mean response} $\mathbb{E}_\eta Y = \mathbb{E}_\eta b(Z)$, which can be expressed in the parameters as \begin{equation*} \chi (\eta) = \int b\, dF= \int \Psi(\eta^b)(z)\, e^{\eta^f(z)}\, dz, \end{equation*} where the second representation is available if $F$ has a density. Estimators that are $\sqrt{n}$-consistent and asymptotically efficient for $\chi(\eta)$ have been constructed using various methods, but only if $a$ or $b$ (or both) are sufficiently smooth. In the present context, under the assumption that $a\in C^\alpha$ and $b\in C^\beta$, Robins et al.\ \cite{robins2017} have constructed estimators that are $\sqrt{n}$-consistent if $(\alpha+\beta)/2 \geq d/4$, where $d$ is the dimension of the covariates. They have also shown that the latter condition is sharp: the minimax rate becomes slower than $1/\sqrt{n}$ when $(\alpha+\beta)/2 < d/4$ (see \cite{robins2009}). The estimators in \cite{robins2017} employ higher order estimating equations to obtain better control of the bias. First-order estimators, based on linear estimators or semiparametric maximum likelihood, have been shown to be $\sqrt n$-consistent only under the stronger condition \begin{align}\label{eq:double_robust_smoothness} \frac{\alpha}{2\alpha+d} + \frac{\beta}{2\beta+d} \geq \frac{1}{2}, \end{align} see e.g. \cite{robins1995,rotnitzky1995}. In both cases the conditions show a trade-off between the smoothness levels of $a$ or $b$: higher $\alpha$ permits lower $\beta$ and vice-versa. This trade-off results from the multiplicative form of the bias of linear or higher-order estimators. So-called \emph{double robust} estimators are able to exploit this structure, and work well if either $a$ or $b$ is sufficiently smooth. (More generally, it suffices that the parameters $a$ and $b$ can be estimated well enough, where the combined rates are relevant. The inequalities even remain valid with $\alpha=0$ or $\beta=0$ interpreted as the existence of $\sqrt n$-consistent estimators of $a$ or $b$, as would be the case given a correctly specified finite-dimensional model.) We shall henceforth also assume that the parameters $a$ and $b$ are contained in H\"older spaces $C^\alpha$ and $C^\beta$, respectively. See \cite{seaman2018} for a recent discussion of double robustness. For estimation of $\mathbb{E} Y$ at $\sqrt n$-rate the covariate density $f$ need not be smooth, which makes sense intuitively, as the functional can be written as an integral relative to the corresponding distribution $F$. (Counter to this intuition \cite{robins2009,robins2017} show this to be false for optimal estimation at slower than $\sqrt n$-rate.) This may motivate modelling $F$ nonparametrically, in the Bayesian setting for instance with a Dirichlet process prior. All these observations are valid only if the estimation problem is not affected by the parameters $a$, $b$ or $f$ taking values on the boundary of their natural ranges. For simplicity we make the following assumption throughout. \begin{assumption} The true functions $1/a_0$ and $b_0$ are bounded away from 0 and 1 and $f_0$ is bounded away from 0 and $\infty$. \end{assumption} \subsection{Semiparametric information and least favourable direction} We finish by reviewing the tangent space and information distance of the model, which is well known to play an important role in semiparametric estimation theory \cite{BHHW,BKRW,vandervaart1991}, and enters the Bayesian derivations through the ``least favourable submodel''. (See \cite{castillo2012} or Chapter~12 of \cite{vandervaartbook2017} for general reviews in the context of Bayesian estimation.) With regards to the parame\-tri\-zation \eqref{eq:paramtrization}, consider the one-dimensional submodels $t\mapsto \eta_t$ induced by the paths $$\frac1{a_t}= \Psi(\eta^a + t\mathfrak{a}),\qquad b_t = \Psi (\eta^b + t\mathfrak{b}),\qquad dF_t = dF\, e^{t\mathfrak{f}} \bigl({\textstyle\int} e^{t\mathfrak{f}}\,dF\bigr)^{-1}$$ for given directions $(\mathfrak{a},\mathfrak{b},\mathfrak{f})$ with $\int \mathfrak{f}\,dF = 0$, and given ``starting'' point $\eta=\eta_0$. Inserting these paths in the likelihood \eqref{eq:likelihood_full}, and computing the derivative ${\tfrac{d}{dt}}_{|t=0} \log p_{\eta_t}(x)$ of the log likelihood, we obtain the ``score function'' at $\eta=\eta_0$ in the direction $(\mathfrak{a},\mathfrak{b},\mathfrak{f})$. This can be easily computed to be the sum of the score functions when varying the three parameters separately, which are given by \begin{equation*} \begin{split} & B_\eta^a \mathfrak{a}(X) = (R-\tfrac{1}{a(Z)}) \mathfrak{a}(Z),\\ & B_\eta^b \mathfrak{b}(X) = R(Y-b(Z))\mathfrak{b}(Z),\\ & B_\eta^f \mathfrak{f} (X) = \mathfrak{f}(Z). \end{split} \end{equation*} The operators $B_\eta^a$, $B_\eta^b$, $B_\eta^f$ are the \textit{score operators} for the three parameters. The overall score $B_\eta (\mathfrak{a},\mathfrak{b},\mathfrak{f})(X)$ when perturbing the three parameters simultaneously is the sum of the three terms in the previous display. The \emph{efficient influence function} of the functional $\chi$ at the point $\eta$ is known to take the form (see Example~25.43 of \cite{vandervaart1998} with $\dot\chi_Q(y)$ the current $y-\chi(\eta)$ and $\phi(y,0)$ the current $(R,Z)$, or the derivation below) \begin{equation*}\label{eq:infl_fcn} \widetilde{\chi}_{\eta} (X) = Ra(Z)(Y-b(Z)) + b(Z) - \chi (\eta). \end{equation*} We can verify that this is the correct formula by verifying that this function has the two properties defining an efficient influence function (\cite{vandervaart1998}, page~426). First, the derivative at $t=0$ of the functional along a path $t\mapsto\eta_t=(a_t,b_t,f_t)$ as previously, is the inner product of the influence function with the score function of that path: ${\tfrac{d}{dt}}_{|t=0} \chi(\eta_t) = P_\eta \widetilde{\chi}_\eta(X) B_\eta(\mathfrak{a},\mathfrak{b},\mathfrak{f})(X)$ for every path $t \mapsto p_{\eta_t}$ of the above form. Second, the function $\widetilde{\chi}_{\eta}$ is contained in the closed linear span of the set of all score functions. Indeed, in the present case we have, for all $x$, \begin{equation} \label{EqEIF} \widetilde{\chi}_\eta(x)= B_\eta \xi_\eta (x)=B_\eta^ba(x)+B_\eta^f\bigl(b-\textstyle{\int} b\,dF\bigr)(x), \end{equation} where $\xi_\eta$ is the \textit{least favourable direction} given by \begin{equation*} \xi_\eta = (0,\xi_\eta^b,\xi_\eta^f) = \bigl(0,a,b-\textstyle{\int} b\,dF \bigr). \end{equation*} The function $\xi_\eta$ is the score function for the submodel $t\mapsto \eta_t$ corresponding to the perturbations in the directions of $(0,a, b-\int b\,dF)$ on $(a,b,F)$. The latter submodel is called \textit{least favourable}, since $t\mapsto p_{\eta_t}$ has the smallest information about the functional of interest at $t=0$. According to semiparametric theory (e.g.\ Chapter 25 of \cite{vandervaart1998}, in particular formula (25.22)) a sequence of estimators $\widehat{\chi}_n=\widehat{\chi}_n (X^{(n)})$ is asymptotically efficient for estimating $\chi(\eta)$ at the true parameter $\eta_0$ if and only if \begin{equation} \label{EqEffcieintEstimator} \widehat{\chi}_n = \chi(\eta_0) + \frac{1}{n} \sum_{i=1}^n \widetilde{\chi}_{\eta_0}(X_i)+o_{P_{\eta_0}}(n^{-1/2}). \end{equation} The sequence $\sqrt n\bigl(\widehat{\chi}_n -\chi(\eta_0)\bigr)$ is then asymptotically normal with mean zero and variance $P_{\eta_0} \widetilde{\chi}_{\eta_0}^2$, which is the smallest possible in a local minimax sense. For a direction $v = (\mathfrak{a},\mathfrak{b},\mathfrak{f})$, the \emph{information norm} corresponding to the score operator (or LAN norm in the language of \cite{castillo2012,rivoirard2012,castillo2015}) equals \begin{equation*} \begin{split} \| v\|_\eta^2 & := P_{\eta} [(B_{\eta}v)]^2 = \int \Bigl[ \frac{1}{a}\bigl(1-\frac{1}{a}\bigr) \mathfrak{a}^2 + \frac{b(1-b)}{a} \mathfrak{b}^2 + (\mathfrak{f}-F\mathfrak{f}) ^2 \Bigr]\,dF\\ & =:\|\mathfrak{a}\|_{a}^2 + \|\mathfrak{b}\|_b^2 + \|\mathfrak{f}\|_F^2 . \end{split} \end{equation*} It may be noted that the three components of the score operator are orthogonal, which is a consequence of the factorization of the likelihood. The minimal asymptotic variance $P_{\eta_0} \widetilde{\chi}_{\eta_0}^2$ for estimating $\chi(\eta)$ can be written in terms of the information norm as \begin{equation} \begin{split} \|\xi_{\eta_0}\|_{\eta_0}^2 &= P_{\eta_0} (B_{\eta_0} \xi_{\eta_0})^2 = P_{\eta_0}\widetilde{\chi}_{\eta_0}^2 \label{EqEfficientVariance}\\ &= \int a_0b_0(1-b_0)\,dF_0 + \int b_0^2 \,dF_0 - \chi(\eta_0)^2. \end{split} \end{equation} \section{Results}\label{sec:results} We put a prior probability distribution $\Pi$ on the parameter $(\eta^a,\eta^b,F)$ or $\eta=(\eta^a,\eta^b,\eta^f)$, and consider the posterior distribution $\Pi(\cdot|X^{(n)})$ based on the observation $X^{(n)}=(X_1,\dots,X_n)$. This induces posterior distributions on all measurable functions of $\eta$, including the functional of interest $\chi(\eta)$. We write $\mathcal{L}_\Pi(\sqrt{n}(\chi(\eta) -\widehat{\chi}_n) |X^{(n)})$ for the marginal posterior distribution of $\sqrt{n}(\chi(\eta)-\widehat{\chi}_n)$, where $\widehat{\chi}_n$ is any random sequence satisfying \eqref{EqEffcieintEstimator}. We shall be interested in proving that this distribution asymptotically looks like a centered normal distribution with variance $\|\xi_{\eta_0}\|_{\eta_0}^2$. For a precise statement of this approximation, let $d_{BL}$ be the bounded Lipschitz distance on probability distributions on $\mathbb{R}$ (see Chapter 11 of \cite{dudley2002}). \begin{definition} \label{DefBvM} Let $X^{(n)}=(X_1,\dots,X_n)$ be i.i.d. observations with $X_i = (Z_i,R_i,R_iY_i)$ arising from the density $p_{\eta_0}$ in \eqref{eq:likelihood_full}, whose distribution we denote by $P_0 = P_{\eta_0}$. We say that the posterior satisfies the \textit{semiparametric Bernstein--von Mises (BvM)} if, for $\widehat{\chi}_n$ satisfying \eqref{EqEffcieintEstimator} and $\|\xi_{\eta_0}\|_{\eta_0}$ given by \eqref{EqEfficientVariance}, as $n\rightarrow \infty$, \begin{align*} d_{BL} \Bigl( \mathcal{L}_\Pi\bigl(\sqrt{n}(\chi(\eta) -\widehat{\chi}_n\bigr) |X^{(n)}), N(0,\|\xi_{\eta_0}\|_{\eta_0}^2 ) \Bigr) \rightarrow^{P_0} 0. \end{align*} \end{definition} In Sections~\ref{SubsectionGeneralabDir} and~\ref{SectionPropensityScorePriors} we present two general results for priors on the parameters $(a, b)$, combined with an independent Dirichlet process prior on $F$. In Section~\ref{SubsectionGeneralabDir} the prior on the pair $(a,b)$ is general, whereas in Section~\ref{SectionPropensityScorePriors} we construct a prior on $b$ using an estimator of the propensity score $1/a$, thus linking the two parameters. Following these general results we specialize to Gaussian process priors and obtain concrete results in Section~\ref{SectionGaussianPriors}. An alternative to using the Dirichlet process on $F$ is to put a prior on the triple $(a,b,f)$, for $f$ a density of $F$. A general result can be found in Section~\ref{sec:general_prior_f} below, but it requires stronger conditions for the BvM theorem to hold. Putting a prior on $f$ introduces the additional bias term\eqref{eq:no_bias_f}, whose vanishing becomes more restrictive as the covariate dimension increases and can be problematic in even moderate dimensions. Thus it appears preferable to directly model the distribution $F$. \subsection{Posterior distribution relative to Dirichlet process prior} Since the covariates $Z_1,\ldots, Z_n$ are fully observed and the functional of interest $\chi(\eta)$ is an integral relative to their distribution $F$, intuitively the estimation problem should not depend too much on properties of the covariate distribution. For $\sqrt n$-estimation this intuition is shown to be correct in \cite{robins2017}. In our Bayesian setup this suggests to put a prior on $F$ that does not limit this distribution. The standard ``nonparametric prior'' on the set of probability distributions on a (Polish) sample space is the Dirichlet process prior \cite{Ferguson1974}. This distribution is characterized by a base measure $\nu$, which can be any finite measure on the sample space. It is well known that in the model consisting of sampling $F$ from the Dirichlet process prior and next sampling observations $Z_1,\ldots, Z_n$ from $F$, the posterior distribution of $F$ given $Z_1,\ldots, Z_n$ is again a Dirichlet process with updated base measure $\nu+n\mathbb{F}_n$, where $\mathbb{F}_n$ is the empirical distribution of $Z_1,\ldots, Z_n$. (For full definitions and properties, see the review in Chapter 4 of \cite{vandervaartbook2017}.) We utilize the Dirichlet process prior on $F$ together with an independent prior on the remaining parameters $(a,b)$, constructed from a prior on $(\eta^a,\eta^b)$ using the logistic link function \eqref{eq:paramtrization}. Because the Dirichlet process prior does not give probability one to a dominated set of measures $F$, the resulting posterior distribution of $(a,b,F)$ cannot be derived using Bayes's formula. However, we can obtain a representation as follows. The parameters and the data are generated through the hierarchical scheme: \begin{itemize} \item $F\sim DP (\nu)$ independent from $\eta=(a,b)\sim \Pi$. \item Given $(F,a,b)$ the covariates $Z_1,\ldots,Z_n$ are i.i.d.\ $F$. \item Given $(F,a,b,Z_1,\ldots,Z_n)$ the pairs $(R_i,Y_i)$ are independent from products of binomial distributions with success probabilities $1/a(Z_i)$ and $b(Z_i)$. \item The observations are $X^{(n)}=(X_1,\ldots, X_n)$ with $X_i=(Z_i, R_i, R_iY_i)$. \end{itemize} From this scheme it follows that $F$ and $(R^{(n)}, Y^{(n)})$ are independent given $(Z^{(n)}, a,b)$, and also that $F$ and $(a,b)$ are conditionally independent given $X^{(n)}$. We can then conclude that the posterior distribution of $F$ given $X^{(n)}$ is the same as the posterior distribution of $F$ given $Z^{(n)}$, which is the $DP(\nu+n\mathbb{F}_n)$ distribution. Furthermore, the posterior distribution of $(a,b)$ given $(F, X^{(n)})$ can be derived by Bayes's rule from the binomial likelihood of $(R^{(n)}, R^{(n)}Y^{(n)})$ given $Z^{(n)}$, which is dominated. Thus the posterior distribution is given by \begin{equation}\label{EqDirichletPosterior} \begin{split} &\Pi\bigl((a,b)\in A, F\in B|X^{(n)}\bigr)\\ &\qquad\qquad=\int_B \frac{\int_A \prod_{i=1}^n p_{(a,b)}(R_i,R_iY_i\given Z_i)\,d\Pi(a,b)} {\int \prod_{i=1}^n p_{(a,b)}(R_i,R_iY_i\given Z_i)\,d\Pi(a,b)}\,d\Pi(F\given Z^{(n)}), \end{split} \end{equation} where $p_{(a,b)}$ is the conditional density of $(R,RY)$ given $Z$, given by \eqref{eq:likelihood_full} with $f$ deleted or taken equal to 1, and $\Pi(F\in\cdot\given Z^{(n)})$ is the $DP(\nu+n\mathbb{F}_n)$-distribution. This formula remains valid if $\nu=0$, which yields the Bayesian bootstrap, see Chapter 4.7 of \cite{vandervaartbook2017}, and is also covered in the theorems below. We suspect that the theorems extend to other exchangeable bootstrap processes, as considered in \cite{PraestgaardWellner} (see \cite{vdVWPreservation}, Section~3.7.2). \subsection{General prior on $(a, b)$ and Dirichlet process prior on $F$} \label{SubsectionGeneralabDir} Define $\eta_t(\eta)=\eta_t(\eta; n,\xi_{\eta_0})$ to be a perturbation of $\eta=(\eta^a,\eta^b)$ in the least favourable direction, restricted to the components corresponding to $a$ and $b$: \begin{equation}\label{eq:LFD_F_no_den} \eta_t(\eta) = \Bigl(\eta^a, \eta^b - \frac{t}{\sqrt n}\xi_{\eta_0}^b\Bigr). \end{equation} \begin{theorem}\label{thm:general_F} Consider a prior $\Pi$ consisting of an arbitrary prior on $\eta = (\eta^a,\eta^b)$ and an independent Dirichlet process prior on $F$. Assume that there exist measurable sets $\mathcal{H}_n$ of functions $\eta=(\eta^a,\eta^b)$ satisfying \begin{align} \Pi(\eta\in \mathcal{H}_n \given X^{(n)}) &\rightarrow^{P_0} 1,\label{EqPriorConcentration2}\\ \sup_{b=\Psi(\eta^b):\eta\in \mathcal{H}_n} \|b-b_0\|_{L^2(F_0)} &\rightarrow 0,\label{EqConsistencyb2}\\ \sup_{b=\Psi(\eta^b): \eta \in \mathcal{H}_n} |\mathbb{G}_n[b-b_0]| &\rightarrow^{P_0} 0 \label{eq:prob_sup2}. \end{align} If for the path $\eta_t(\eta)$ in \eqref{eq:LFD_F_no_den} and every $t$, \begin{align}\label{eq:prior_shift_cond2} \frac{\int_{\mathcal{H}_n} \prod_{i=1}^n p_{\eta_t(\eta)}(R_i,R_iY_i\given Z_i) \, d\Pi(\eta)} {\int_{\mathcal{H}_n} \prod_{i=1}^n p_{\eta}(R_i,R_iY_i\given Z_i)\, d\Pi(\eta)} \rightarrow^{P_0}1, \end{align} then the posterior distribution \eqref {EqDirichletPosterior} satisfies the BvM theorem. \end{theorem} Conditions \eqref{EqPriorConcentration2}--\eqref{eq:prob_sup2} permit to control the remainder terms in an expansion of the likelihood. They require that the posterior distribution of $b$ concentrates on shrinking neighbourhoods about the true parameter $b_0$ (with no similar requirement for $a$), and hence mostly require consistency. The uniformity in $b$ required in \eqref{eq:prob_sup2} is unpleasant, as it will typically require that the class of $b$ supported by the posterior distribution is not unduly large. The condition is linked to using the likelihood and similar conditions arise in maximum likelihood based estimation procedures, although \eqref{eq:prob_sup2} seems significantly weaker, as the uniformity is required only on the essential support of the posterior distribution, which might be much smaller than the full parameter space. The use of estimating equations can avoid uniformity conditions by sample splitting \cite{robins2017}. In the Bayesian framework one might similarly base posterior distributions of different parameters on given subsamples, but this is unnatural so that we do not pursue this route here. Under \eqref{EqConsistencyb2} a sufficient condition for \eqref{eq:prob_sup2} is that the class of functions $b$ in the condition is contained in a fixed $F_0$-Donsker class (see Lemma~3.3.5 of \cite{vandervaart1996}). In particular, it suffices that the posterior concentrates on a bounded set in $H^s$ for $s>d/2$. While this condition is easy to establish for certain priors, such as uniform wavelet priors \cite{gine2011}, for the Gaussian process priors considered below we employ relatively complicated arguments using metric entropy bounds to verify the condition. Condition \eqref{eq:prior_shift_cond2} measures the invariance of the prior for the full nuisance parameter under a shift in the least favourable direction $\xi_{\eta_0}^b$. It is a structural condition on the combination of prior and model, and if not satisfied may destroy the $\sqrt n$-rate in the BvM theorem (see \cite{castillo2012} or \cite{vandervaartbook2017} for further discussion). Although we shall verify the condition for several priors of interest below, this condition may impose smoothness conditions on the parameters, and prevent so-called ``double robustness''. We shall remove this condition for special priors in Theorem~\ref{thm:dep_prior_gen_EB} below. The invariance involves the component $\xi_0^b$ only, and not the other nonzero component $\xi_0^f$ of the least favourable direction. In contrast, in Theorem~\ref{thm:general_f}, which puts a prior on the covariate density $f$, the invariance involves the full least favourable direction (see \eqref{eq:LFD_f_den}). Intuitively, the Dirichlet process is a fully nonparametric prior that never causes this type of bias. Since $\xi_{\eta_0}^b = a_0$, Theorem~\ref{thm:general_F} implicitly requires conditions on $a_0$ through \eqref{eq:prior_shift_cond2}, even though $a$ does not appear in the functional $\chi(\eta)$. Such conditions become explicit for concrete priors below. \begin{remark} If the quotient on the left side of \eqref{eq:prior_shift_cond2} is asymptotic to $e^{\mu_nt}(1+o_{P_0}(1))$ for some possibly random sequence of real numbers $\mu_n$, then the assertion of the BvM theorem is still true, but the normal approximation $N(0,\|\xi_{\eta_0}\|_{\eta_0}^2 ) $ must be replaced by $N(\mu_n,\|\xi_{\eta_0}\|_{\eta_0}^2 )$. See \cite{castillo2015,rivoirard2012} for further discussion. The same is true for all other results in the following. \end{remark} \begin{remark} If the supremum in \eqref{eq:prob_sup2}, or similar variables below, is not measurable, then we interpret this statement in terms of outer probability. \end{remark} Formula \eqref{EqDirichletPosterior} shows that a draw from the posterior distribution of the functional of interest $\chi(\eta)=\int b\,dF$ is obtained by independently drawing $b$ from its posterior distribution and $F$ from the $DP(\nu+n\mathbb{F}_n)$-distribution, and next forming the integral $\int b\,dF$. The posterior distribution of $b$ is constructed from the conditional likelihood of $(R^{(n)}, R^{(n)}Y^{(n)})$ given $Z^{(n)}$ without involving $F$ or its prior distribution. Instead of a Bayesian-motivated or bootstrap type choice for $F$, which requires randomization given $Z^{(n)}$, one could also directly plug in an estimator of $F$ based on $Z^{(n)}$ and randomize only $b$ from its posterior distribution. The empirical distribution $\mathbb{F}_n$ is an obvious choice. The proof of Theorem~\ref{thm:general_F} suggests that for this choice, under the conditions of the theorem, \begin{align*} d_{BL} \Bigl( \mathcal{L}_\Pi\bigl(\sqrt{n}(\chi(\eta) - \widehat{\chi}_n) |X^{(n)}\bigr), N(0,\|\xi_{\eta_0}^{b_0}\|_{b_0}^2 ) \Bigr) \rightarrow^{P_0} 0. \end{align*} Compared to the BvM theorem this suggests a normal approximation with the same centering, but a smaller variance, since the variance in the BvM theorem is the sum $\|\xi_{\eta_0}^{b_0}\|_{b_0}^2+ \|\xi_{\eta_0}^{f_0}\|_{F_0}^2$. The lack of posterior randomization of $F$ thus results in an underestimation of the asymptotic variance. Using credible sets resulting from this `posterior' would give overconfident (wrong) uncertainty quantification. Since our focus is on the Bayesian approach, we do not purse such generalizations further. \subsection{Propensity score-dependent priors} \label{SectionPropensityScorePriors} To reduce unnecessary regularity conditions, it can be useful to use a preliminary estimate $\hat{a}_n$ of the inverse propensity score \cite{robins2017,robins1995,rotnitzky1995}. In a Bayesian setting, \cite{hahn2017} suggest adding an estimate of the propensity score evaluated at the data as an additional covariate when using BART for causal inference \cite{hill2011}. In this section we employ preliminary estimators $\hat a_n$ to augment the prior on $b$ with the aim of weakening the conditions required for a semiparametric BvM. Suppose we have a sequence of estimators $\hat{a}_n$ of the inverse propensity score satisfying \begin{align}\label{eq:estimator_prop} \|\hat{a}_n-a_0\|_{L^2(F_0)} = O_{P_0}(\rho_n), \end{align} for some sequence $\rho_n \rightarrow 0$. Since the propensity score is just a (binary) regression function of $R$ onto $Z$, standard (adaptive) smoothing estimators satisfy this condition with rate $\rho_n=n^{-{\alpha}/({2\alpha+d})}$ if the propensity score is assumed to be contained in $C^\alpha([0,1]^d)$, which is the minimax rate over this space (note that $\hat a_n-a_0=\hat a_n a_0(1/a_0-1/\hat a_n)$ will attain at least the rate of an estimator of the propensity score $1/a_0$ itself). Consider the following prior on $b$: \begin{equation}\label{eq:prior_dep_EB} b(z) = \Psi\bigl(W_z^b + \lambda \hat{a}_n(z)\bigr), \end{equation} where $W^b$ is a continuous stochastic process independent of the random variable $\lambda$, which follows a prior $N(0,\sigma_n^2)$ distribution for given variance $\sigma_n^2$ (potentially varying with $n$, but fixed is allowed). The additional parameter $\lambda$ has the role of making the prior link between the parameters $b$ and $a$ flexible; the variance $\sigma_n^2$ will be required not too small below. We assume that $\hat{a}_n$ is based on observations that are independent of $X_1,\ldots,X_n$, the observations used in the likelihood to obtain the posterior distribution. Otherwise, the prior \eqref{eq:prior_dep_EB} becomes data-dependent, which significantly complicates the technical analysis. This independence seems, however, unnecessary in practice. The analogous prior to \eqref{eq:prior_dep_EB} for a continuous regression model is investigated empirically in the companion paper \cite{RaySzabo}, where it performs well when $1/\hat a_n$ is trained on the same data as the posterior. We may think of $\hat a_n$ as a degenerate prior on $a$, and then by the factorization of the likelihood the part of the likelihood involving $a$ cancels from the posterior distribution \eqref {EqDirichletPosterior} if marginalized to $(b,F)$ (and hence $\chi(\eta)$). Of course the same will happen if we assign an independent prior to $a$. Thus in both cases it is unnecessary to further discuss a prior on $a$. \begin{theorem}\label{thm:dep_prior_gen_EB} Given independent estimators $\hat{a}_n$ satisfying \eqref{eq:estimator_prop} and having $\|\hat{a}_n\|_\infty = O_{P_0}(1)$, consider the prior \eqref{eq:prior_dep_EB} for $b$ with the stochastic process $W^b$ and random variable $\lambda\sim N(0,\sigma_n^2)$ independent, and assign $F$ an independent Dirichlet process prior. Assume that there exist measurable sets $\mathcal{H}_n^b$ of functions satisfying, for every $t\in\mathbb{R}$ and some numbers $u_n, \varepsilon_n^b\rightarrow 0$, \begin{align} \Pi\bigl(\lambda: |\lambda|\le u_n\sigma_n^2\sqrt{n}|X^{(n)}\bigr)&\rightarrow^{P_0} 1, \label{eq:dep_prior_lambda_cond}\\ \Pi \bigl( (w,\lambda): w+(\lambda + tn^{-1/2})\hat{a}_n\in \mathcal{H}_n^b|X^{(n)}\bigr)&\rightarrow^{P_0} 1, \label{EqPriorConcentration3}\\ \sup_{b=\Psi(\eta^b):\eta^b\in \mathcal{H}_n^b} \|b-b_0\|_{L^2(F_0)} &\le \varepsilon_n^b,\label{EqConsistencyb3}\\ \sup_{b=\Psi(\eta^b): \eta^b \in \mathcal{H}_n^b} \bigl|\mathbb{G}_n[b-b_0]\bigr| &\rightarrow^{P_0} 0 \label{eq:prob_sup3}. \end{align} If $n\sigma_n^2\rightarrow \infty$ and $\sqrt{n}\rho_n\varepsilon_n^b \rightarrow 0$, then the posterior distribution satisfies the semiparametric BvM theorem. \end{theorem} The advantage of this theorem over Theorem~\ref{thm:general_F} is that \eqref{eq:prior_shift_cond2} does not appear in its conditions. (The theorem adds \eqref{eq:dep_prior_lambda_cond} and \eqref{EqPriorConcentration3}, but these are relatively mild.) As noted above, condition \eqref{eq:prior_shift_cond2} requires a certain invariance of the prior of $b$ in the the least favourable direction $\xi_{\eta_0}^b = a_0$, and typically leads to smoothness requirements on $a$. In contrast we show below that Theorem~\ref{thm:dep_prior_gen_EB} can yield the BvM theorem for propensity scores $1/a$ of arbitrarily low regularity. Thus the theorem is able to achieve what could be named \emph{single robustness}. Whether ``double robustness'', the ability of also handling response functions $b$ of arbitrarily low smoothness, is also achieved remains unclear. Specifically, we have not been able to verify condition \eqref{eq:prob_sup3} without assuming that the smoothness of $b$ is above the usual threshold ($d/2$ in $d$ dimensions). The single robustness is achieved by perturbing the prior process for $b$ in the least favourable direction using the auxiliary variable $\lambda$. Since the least favourable direction $a_0$ is unknown, this is replaced with an estimate $\hat{a}_n$. Condition \eqref{eq:dep_prior_lambda_cond} puts a lower bound on the variability of the perturbation, i.e.\ on the standard deviation $\sigma_n$ of $\lambda$. An easy method to ascertain this condition is to show that the prior mass of the set $\lambda$ in the left side is exponentially small and next invoke Lemma~\ref{lem:small_prior_prob}. Specifically, by the univariate Gaussian tail bound the prior mass of $\{\lambda: |\lambda|> u_n\sigma_n^2\sqrt{n}\}$ is bounded above by $e^{-u_n^2\sigma_n^2n/2}$. If the Kullback-Leibler neighbourhood in Lemma~\ref{lem:small_prior_prob} has prior probability at least $e^{-n(\varepsilon_n^b)^2}$, then the lemma gives the sufficient condition $u_n^2\sigma_n^2\gtrsim (\varepsilon_n^b)^2$ for \eqref{eq:dep_prior_lambda_cond}, i.e.\ $\sigma_n\gg \varepsilon_n^b$. \subsection{Specialization to Gaussian process priors} \label{SectionGaussianPriors} In this section we specialize Theorems~\ref{thm:general_F} and \ref{thm:dep_prior_gen_EB} to Gaussian process priors. In all examples the priors on the three parameters $a$, $b$ and $F$ are independent. Since $a$ does not appear in $\chi(\eta)$ and the likelihood \eqref{eq:likelihood_full} factorizes over $a$, $b$ and $F$, the $a$ terms cancel from the marginal posterior distribution of $\chi(\eta)$. Thus the prior on $a$ is irrelevant, and it is not necessary to consider it. For simplicity we take the covariate space to be the unit cube $\mathcal{Z}=[0,1]^d$. Given a mean-zero Gaussian process $W^b= (W_z^b: z\in [0,1]^d)$, we consider both the propensity score-dependent prior for $b$ given by \eqref{eq:prior_dep_EB} and the more simple prior \begin{align}\label{eq:prior_b} b(z) &= \Psi(W_z^b ). \end{align} There are a great variety of Gaussian processes, and their success in nonparametric estimation is known to depend on their sample smoothness, as measured through their small ball probability (see \cite{vandervaart2008,vdVvZRescaling,vdVvZGamma,vdVvZGaussianLearning}). We derive a proposition on general Gaussian processes and consider the following specific examples. \begin{example}[Riemann-Liouville] In dimension $d=1$, the \textit{Riemann-Liouville} process released at zero of regularity $\bar{\beta}>0$ is defined by \begin{align}\label{eq:RL_process} W^b_z= \sum_{k=0}^{\lfloor \bar{\beta}\rfloor +1} g_k z^k + \int_0^z (z-s)^{\bar{\beta}-1/2}\, dB_s, \qquad z\in[0,1], \end{align} where the $(g_k)$ are i.i.d.\ standard normal random variables and $B$ is an independent Brownian motion. This process is appropriate for nonparametric modelling of $C^{\bar{\beta}}([0,1])$-functions. We shall investigate the effect of the smoothness parameter $\bar\beta$ on the BvM theorem. \end{example} \begin{example}[Gaussian series] Another commonly used Gaussian process prior consists of a finite series expansion with Gaussian coefficients. Let $\{\psi_{jk}: j\geq 1, k =0,\dots,2^{jd}-1\}$ denote a sufficiently regular boundary-adapted Daubechies wavelet basis of $L^2([0,1]^d)$. We assume it is regular enough for the decay of the wavelet coefficients to characterize all the relevant Besov $B_{\infty\infty}^s$-norms (which are equal to the $C^s$-H\"older norms for $s\not\in\mathbb{N}$. For details on such wavelets and Besov spaces, see Chapter 4.3 of \cite{gine2016}.) Consider the prior \begin{equation}\label{eq:series_prior} W_z^b = \sum_{j=1}^{J_{\bar{\beta}}} \sum_{k=0}^{2^{jd}-1} \sigma_j g_{jk} \psi_{jk}(z), \quad \quad g_{jk}\sim^{iid} N(0,1), \end{equation} where $2^{J_{\bar{\beta}}} \sim n^{1/(2\bar{\beta}+d)}$, which tends to infinity with $n$, is the optimal dimension of a finite-dimensional model if the true parameter is known to be $\bar{\beta}$-smooth and $\sigma_j = 2^{-j(r+d/2)}$ for $r \geq 0$. Since we wish to perform the prior regularization via the truncation level $J_{\bar{\beta}}$ rather than the scaling coefficients $\sigma_j$, we restrict to considering $r \leq \beta \wedge \bar{\beta}$, for instance $r=0$. \end{example} We can view both processes as Borel-measurable maps in the Banach space $C([0,1]^d)$, equipped with the uniform norm $\|\cdot\|_\infty$. In the following proposition we consider a general zero-mean Gaussian process of this type. Such a process determines a so-called reproducing kernel Hilbert space (RKHS) $(\H^b,\|\cdot\|_{\H^b})$, and a ``concentration function'' at $\eta_0^b$, defined as, for $\varepsilon>0$, \begin{align} \label{EqConcentrationFunction} \phi_{\eta_0^b} (\varepsilon) = \inf_{h\in \H^b: \|h-\eta_0^b\|_\infty< \varepsilon} \|h\|_{\H^b}^2 - \log P(\|W^b\|_\infty < \varepsilon). \end{align} For standard statistical models, the posterior contraction rate $\varepsilon_n^b$ for such a Gaussian process prior is linked to the solution of the equation \begin{align} \phi_{\eta_0^b} (\varepsilon_n^b) \sim n (\varepsilon_n^b)^2. \label{eq:gaus_conc_rate} \end{align} For details see \cite{vandervaart2008b} and \cite{vandervaart2008}. \begin{proposition}\label{prop:gp_gen_F} Consider the prior \eqref{eq:prior_b} on $b$ for a Gaussian process $W^b$ with values in $C([0,1]^d)$ combined with an independent Dirichlet process prior on $F$. Let $\varepsilon_n^b\rightarrow 0$ satisfy \eqref{eq:gaus_conc_rate}. Suppose there exist sequences $\xi_n \in \H^{b} $ and $\zeta_n^b\rightarrow 0$ such that \begin{equation} \label{eq:RKHS_cond_b} \|\xi_n^b - \xi_{\eta_0}^b\|_\infty \leq \zeta_n^b, \quad \quad \|\xi_n^b\|_{\H^{b}} \leq \sqrt{n} \zeta_n^b, \quad \quad \sqrt{n}\varepsilon_n^b \zeta_n^b \rightarrow 0. \end{equation} Suppose further that there exist measurable sets $\mathcal{H}_n^b$ of functions $\eta^b$ such that $\Pi(\eta^b\in (\mathcal{H}_n^b -t\xi_n^b/\sqrt{n})|X^{(n)})\rightarrow^{P_0} 1$ for every $t\in \mathbb{R}$ and \eqref{eq:prob_sup2} holds. Then the posterior distribution satisfies the semiparametric BvM theorem. \end{proposition} For the examples of the Riemann-Liouville process and finite Gaussian series prior the preceding proposition implies the following. \begin{corollary}\label{cor:RL_F} Suppose $a_0\in C^\alpha([0,1]^d)$, $b_0 \in C^\beta([0,1]^d)$ and consider the prior \eqref{eq:prior_b} on $b$ with $W^b$ the random series \eqref{eq:series_prior} combined with an independent Dirichlet process prior on $F$. If $\alpha,\beta>d/2$ and $d/2<\bar{\beta}<\alpha+\beta-d/2$, then the posterior distribution satisfies the semiparametric BvM theorem. Moreover, when $d=1$ the same result holds with $W^b$ the Riemann-Liouville process \eqref{eq:RL_process} with parameter $\bar{\beta}$. \end{corollary} For $\alpha,\beta>d/2$, the parameter $\bar\beta$ can always be chosen to satisfy the remaining condition in the corollary, in which case the BvM theorem holds. The values $\alpha, \beta>d/2$ are one particular pair satisfying \eqref{eq:double_robust_smoothness}. However, when using product priors, it does not seem possible to use extra smoothness in one parameter to offset low regularity in the other as in \eqref{eq:double_robust_smoothness}. To remedy this we consider the propensity score-dependent prior \eqref{eq:prior_dep_EB}. \begin{corollary}\label{cor:RL_dep_F} Suppose $a_0\in C^\alpha([0,1]^d)$ and $b_0 \in C^\beta([0,1]^d)$. Let $\hat{a}_n$ be an independent estimator satisfying $\|\hat{a}_n\|_\infty = O_{P_0}(1)$ and \eqref{eq:estimator_prop} for some $\rho_n \rightarrow 0$. Consider the prior \eqref{eq:prior_dep_EB} for $b$, where $W^b$ is the random series \eqref{eq:series_prior} combined with an independent Dirichlet process prior on $F$. If $\beta\wedge\bar{\beta} > d/2$ and $$(n/\log n)^{-(\beta\wedge \bar{\beta})/(2\bar{\beta}+d)} \ll \sigma_n \lesssim 1, \qquad \sqrt{n}\rho_n (n/\log n)^{-(\beta \wedge\bar{\beta})/(2\bar{\beta}+d)}\rightarrow 0,$$ then the posterior distribution satisfies the semiparametric BvM. Moreover, when $d=1$ the same result holds with $W^b$ the Riemann-Liouville process \eqref{eq:RL_process} with parameter $\bar{\beta}$. \end{corollary} If $\bar{\beta}=\beta$ and $\rho_n = (\log n)^\kappa n^{-{\alpha}/{(2\alpha+1)}}$ is the minimax rate of estimation, possibly up to a logarithmic factor, then the above conditions reduce to $\beta>d/2$ and \eqref{eq:double_robust_smoothness}. If $\beta$ is near the lower limit $d/2$, then the latter condition requires that $\alpha$ be bigger than nearly $d/2$ as well, but if $\beta$ is large, then the latter condition will be satisfied for $\alpha$ close to zero. Thus the estimation method is able to exploit extra smoothness in $b_0$ to offset lower regularity in $a_0$, in particular if $0<\alpha\leq d/2$, unlike the standard product Gaussian process priors, where we required both $\alpha,\beta>d/2$. Since it is still needed that $\beta>d/2$, the preceding corollary does not give full ``double robustness'' in also taking advantage of extra regularity in $a_0$ if $0<\beta \leq d/2$. The technical reason is requirement \eqref{eq:prob_sup2}, which is present in all our theorems, and used in the proofs to establish the LAN expansion of the model. Whether this is a fundamental limitation of the Bayesian approach or a purely technical artefact is unclear. If $W^b$ is a mean-zero Gaussian process with covariance kernel $K_{W^b}(z,z') = \mathbb{E} W_z^b W_{z'}^b$, then the term $W^b + \lambda \hat{a}_n$ in \eqref{eq:prior_dep_EB} is also a mean-zero Gaussian process with data-driven covariance $$\mathbb{E}[W_z^b + \lambda \hat{a}_n(z)][W_{z'}^b + \lambda \hat{a}_n(z')] = K_{W^b}(z,z') + \sigma_n^2 \hat{a}_n(z) \hat{a}_n(z').$$ In this case, the propensity score-dependent prior corresponds to an easy to implement correction to the prior covariance function. In particular, one can use standard methods for Gaussian process posterior computation, such as Laplace or sparse approximations \cite{rasmussen2006}. In practice, we would also suggest to truncate the estimator $1/\hat{a}_n$ away from 0 for numerical stability. Computational and empirical aspects of this new prior are investigated in the continuous regression model in a companion paper \cite{RaySzabo}, where it is found that incorporating an estimator of the propensity score in this way significantly improves the performance of Gaussian process priors. \section{Discussion}\label{sec:discussion} A key technical difficulty for establishing semiparametric BvM results is controlling the ratio \eqref{eq:prior_shift_cond2} (or \eqref{eq:prior_shift_cond1}). While one can use the Cameron-Martin theorem for Gaussian priors, such results are typically more involved outside the Gaussian setting. The hyper parameter $\lambda$ in the prior \eqref{eq:prior_dep_EB} removes this obstacle, allowing results for a much wider class of priors. For instance, one may select $W^b$ in \eqref{eq:prior_dep_EB} to be a truncated prior or sieve prior, without having to establish \eqref{eq:prior_shift_cond2} directly for those priors. Such a prior construction generalizes to other models and functionals. Consider a model $\mathcal{P} = (P_\eta: \eta \in \mathcal{H})$ and a parameter $\chi(\eta)$. For a prior of the form $\eta = W+\lambda \hat{\xi}_n$, where $W$ is a continuous stochastic process, $\lambda \sim N(0,\sigma_n^2)$ and $\hat{\xi}_n$ is an estimate of the least favourable direction $\xi_{\eta_0}$ of $\chi$ at $\eta_0$ in the model $\mathcal{P}$, similar results to the above should hold. We emphasize, however, that such a prior is designed for semiparametric estimation of the specific functional $\chi$ and will not perform any better for any other functional. It is thus suitable for estimating a functional of interest in the presence of a high or infinite-dimensional nuisance parameter that can have a significant impact, as in the model we study here. \section{Proofs of the main results}\label{sec:proofs} \subsection{Proof of Theorem~\ref{thm:general_F}: General prior on $b$ and Dirichlet process prior} \begin{proof}[Proof of Theorem~\ref{thm:general_F}] The total variation distance between the posterior distributions based on the prior $\Pi$ and the prior $\Pi_n (\cdot):= \Pi(\cdot\cap \mathcal{H}_n)/\Pi(\mathcal{H}_n)$, which is $\Pi$ conditioned to $\mathcal{H}_n$, is bounded above by $2\Pi(\mathcal{H}_n^c\given X^{(n)})$ (e.g.\ page~142 of \cite{vandervaart1998}). Since this tends to zero in probability by assumption and the total variation topology is stronger than the weak topology, it suffices to show the desired result for the conditioned prior $\Pi_n$ instead of $\Pi$. Let $\widehat\chi_n=\chi(\eta_0)+\P_n\widetilde\chi_{\eta_0}$, so that it satisfies \eqref{EqEffcieintEstimator} with the remainder term identically zero. The posterior Laplace transform of the variable $\sqrt n(\chi(\eta)-\widehat\chi_n)$ is given by, for $t\in \mathbb{R}$, \begin{align*} I_n(t) &= \mathbb{E}^{\Pi_n}[e^{t\sqrt{n} (\chi(\eta)-\widehat\chi_n)}\given X^{(n)}]\nonumber\\ &= \int\! \int_{\mathcal{H}_n}\!\! \frac {e^{t\sqrt{n}\int (bdF - b_0 dF_0) -t \mathbb{G}_n [\widetilde{\chi}_{\eta_0}]+\ell_n^{b}(\eta)-\ell_n^{b}(\eta_t)}\, e^{\ell_n^{b}(\eta_t)} } {\int_{\mathcal{H}_n} e^{\ell_n^{b}(\eta')} d\Pi(\eta')} d\Pi(\eta)]\, d\Pi(F|X^{(n)}), \end{align*} in view of \eqref{EqDirichletPosterior} and the factorization of the likelihood over $a$ and $b$. This is (obviously) true for any $\eta_t$, in particular for the path $\eta_t=\eta_t(\eta)$ defined in \eqref{eq:LFD_F_no_den}. We shall show that $I_n(t)$ tends in probability to $\exp (t^2 \| \xi_{\eta_0} \|_{\eta_0}^2/2)$, which is the Laplace transform of a $N(0, \| \xi_{\eta_0} \|_{\eta_0}^2)$ distribution, for every $t$ in a neighbourhood of 0. Since convergence of conditional Laplace transforms in probability implies conditional convergence in distribution in probability (see Lemma~\ref{LemmaLaplaceTransform} below), this would complete the proof. At the end of the proof we shall show that, uniformly in $\eta\in\mathcal{H}_n$, \begin{align} \ell_n^b(\eta) - \ell_n^b(\eta_t) &= t\mathbb{G}_n[\widetilde{\chi}_{\eta_0}^b] + t\sqrt{n} \int (b_0-b)\, dF_0 +\frac{t^2}{2} \| \xi_{\eta_0}^b \|_{b_0}^2+ o_{P_0}(1), \label{eq:LAN_remainder_bb} \end{align} where $\widetilde\chi_{\eta}^b=B_\eta^ba$ is the component of the efficient influence function in the $b$ direction (see \eqref{EqEIF}). Inserting this Taylor expansion in the preceding display, we see that \begin{align*} I_n(t) & = \int\!\int_{\mathcal{H}_n} \frac {e^{t\sqrt{n}\int (bdF - b_0 dF_0) +t\sqrt{n} \int (b_0-b)dF_0}\, e^{\ell_n^{b}(\eta_t)}} {\int_{\mathcal{H}_n} e^{\ell_n^{b}(\eta')} d\Pi(\eta')}\, d\Pi(\eta) d\Pi(F\given X^{(n)})\\ &\qquad\qquad\qquad\qquad \times e^{-t \mathbb{G}_n [\widetilde{\chi}_{\eta_0}^f]+\frac{t^2}{2} \| \xi_{\eta_0}^b \|_{b_0}^2 + o_{P_0}(1)}, \end{align*} where $\widetilde{\chi}_{\eta_0}^f= \widetilde{\chi}_{\eta_0}-\widetilde{\chi}_{\eta_0}^b = b_0 - \chi(\eta_0)$. Note that the integral in the denominator is a constant relative to $\eta$ and $F$, since all variables are integrated out. By Fubini's theorem, the double integral without the normalizing constant equals \begin{align*} \int_{\mathcal{H}_n} e^{\ell_n^{b}(\eta_t)} \int e^{t\sqrt{n}\int bd(F-F_0)} \, d\Pi(F|X^{(n)})\, d\Pi(\eta). \end{align*} Let $\mathbb{F}_n = n^{-1} \sum_{i=1}^n \delta_{ Z_i}$ denote the empirical distribution of the covariates. By assumption \eqref{eq:prob_sup2} we certainly have that $\sup\{|(\mathbb{F}_n-F_0)b|: b=\Psi(\eta^b), \eta\in\mathcal{H}_n\}$ tends to zero in probability. Therefore Lemma~\ref{lem:DP_exp_laplace_trans} below yields that for every $t$ in a neighbourhood of zero, the preceding display equals \begin{align*} e^{o_{P_0}(1)} \int_{\mathcal{H}_n} e^{\ell_n^{b}(\eta_t)} e^{t\sqrt{n}\int b d(\mathbb{F}_n-F_0)} e^{\frac{t^2}2\|b-F_0b\|_{L^2(F_0)}^2}\,d\Pi(\eta). \end{align*} Since $\|b-b_0\|_{L^2(F_0)} \rightarrow 0$ uniformly on $\mathcal{H}_n$ and $\sqrt{n}\int b d(\mathbb{F}_n-F_0) = \mathbb{G}_n[b_0] + o_{P_0}(1)$ by assumption \eqref{eq:prob_sup2}, the previous display equals \begin{align*} e^{t\mathbb{G}_n[b_0] + \frac{t^2}{2}\|b_0-F_0b_0\|_{L^2(F_0)}^2 + o_{P_0}(1)} \int_{\mathcal{H}_n} e^{\ell_n^{b}(\eta_t)}\, d\Pi(\eta). \end{align*} We insert this in the expression for $I_n(t)$, combine the two exponential terms using that $\widetilde{\chi}_{\eta_0}^f=b_0 - \chi(\eta_0)$ and $\|b_0-F_0b_0\|_{L^2(F_0)} =\|\xi_{\eta_0}^f\|_{F_0}$, and invoke assumption \eqref{eq:prior_shift_cond2}, to see that $I_n(t)$ tends to $e^{t^2\|\xi_{\eta_0}\|_{\eta_0}^2/2}$ in probability. The theorem then follows by the convergence of Laplace transforms. We conclude by a proof of \eqref{eq:LAN_remainder_bb}. This entails an expansion of the log likelihood $\ell_n^b(\eta)-\ell_n^b(\eta_t)$ along the submodel $\eta_t$. We can decompose \begin{equation} \begin{split} \ell_n^b(\eta) - \ell_n^b(\eta_t) &= t \mathbb{G}_n [\widetilde{\chi}_{\eta_0}^b] + \sqrt{n}\mathbb{G}_n [\log p_\eta - \log p_{\eta_t} - \frac{t}{\sqrt{n}} \widetilde{\chi}_{\eta_0}^b]\\ &\qquad\qquad\qquad + n P_{\eta_0} [\log p_\eta - \log p_{\eta_t}]. \label{eq:lan_least_fav_dir2} \end{split} \end{equation} We shall show that the second term on the right tends to zero in probability, while the third term tends to the quadratic $t^2\|a_0\|_{b_0}^2/2$, where $a_0=\xi_{\eta_0}^b$. The definition $\eta_u := (\eta^a,\eta_u^b)$ with $\eta_u^b = \eta^b - tu\xi_{\eta_0}^b/\sqrt{n}$, for $u \in [0,1]$, gives a path from $\eta_{u=0} = \eta$ (not $\eta_0$!) to $\eta_{u=1}=\eta_t$, so that $\log p_\eta - \log p_{\eta_t}=g(0)-g(1)$ for $g(u) = \log p_{\eta_u}$. We shall replace this difference in both terms on the right of \eqref{eq:lan_least_fav_dir2} by the Taylor expansion $g(0)-g(1)=-g'(0)-g''(0)/2-\theta$, where $|\theta|\le \|g'''\|_\infty$. The expansion will be uniform in $\eta\in\mathcal{H}_n$, although the dependence of $g$ and $\theta$ on $\eta$ is not indicated in the notation. By explicit calculations the derivatives of $g$ can be seen to be \begin{align*} g'(u) &= -\frac t{\sqrt n} B_{\eta_u}^b a_{0}=-\frac t{\sqrt n} r\bigl(y-\Psi(\eta_u^b)\bigr)a_0,\\ g''(u) &= -\frac{t^2}n r \Psi'(\eta_u^b) a_{0}^2,\qquad g'''(u)=\frac{t^3}{n^{3/2}} r \Psi''(\eta_u^b) a_{0}^3,\end{align*} where we have omitted the function arguments $(r,y,z)$. Since $|\theta|\le \|g'''\|_\infty\lesssim n^{-3/2}$, it follows that both $\sqrt n\mathbb{G}_n\theta$ and $n P_0\theta$ tend to zero in probability, uniformly in $\eta\in \mathcal{H}_n$. Since $B_{\eta_0}^b a_{0} = \widetilde{\chi}_{\eta_0}^b$, \begin{align*} g'(0)&=-\frac t{\sqrt n} B_{\eta}^b a_{0}= -\frac t{\sqrt n} \widetilde{\chi}_{\eta_0}^b +\frac t{\sqrt n}r(b-b_0) a_{0},\\ g''(0)&=-\frac{t^2}n r \Psi'(\eta^b) a_{0}^2=-\frac{t^2}n r \Psi'(\eta_0^b) a_{0}^2 -\frac{t^2}n r \bigl(b(1-b)-b_0(1-b_0)\bigr) a_{0}^2 \end{align*} for $b = \Psi(\eta^b)$, since $\Psi' = \Psi(1-\Psi)$. By assumption \eqref{eq:prob_sup2} and Lemma~\ref{LemmaGCnPreservation}, applied with $\mathcal{H}_{n,1}$ the set of functions $\sqrt n(b-b_0)$ and $\mathcal{H}_{n,2}=\{r\}$, we have that $\mathbb{G}_n \bigl[r(b-b_0) a_{0}\bigr]\rightarrow 0$ in probability, uniformly in $\{ b=\Psi(\eta^b): \eta\in \mathcal{H}_n\}$, whence $\sqrt n \mathbb{G}_n g'(0)=-t\mathbb{G}_n\bigl[ \widetilde{\chi}_{\eta_0}^b ]+o_{P_0}(1)$, uniformly in $\eta\in \mathcal{H}_n$. By again assumption \eqref{eq:prob_sup2} and Lemma~\ref{LemmaGCnPreservation}, $\mathbb{G}_n \bigl[r \bigl(b(1-b)-b_0(1-b_0)\bigr) a_{0}^2\bigr]\rightarrow 0$ in probability, whence $\sqrt n\mathbb{G}_ng''(0)=O_{P_0}(n^{-1/2})\rightarrow 0$ in probability. We conclude that the second term on the right in \eqref{eq:lan_least_fav_dir2} tends to zero in probability, uniformly in $\eta\in \mathcal{H}_n$. Since $\Psi'(\eta_0^b) = b_0(1-b_0)$ and $ \int b_0(1-b_0) a_0\, dF_0=\|\xi_{\eta_0}^b\|_{b_0}^2$, \begin{align*} -nP_{\eta_0} g'(0)&=t\sqrt{n} \int (b_0-b)\,dF_0,\\ -nP_{\eta_0} g''(0)-t^2\| \xi_{\eta_0}^b \|_{b_0}^2 &= t^2P_{\eta_0}[r\big(b (1-b)- b_0(1-b_0)\bigr) a_0^2]\\ &\lesssim P_{\eta_0}[r|b-b_0|a_0^2]\le \|b-b_0\|_{L^1(F_0)}\|a_0\|_\infty. \end{align*} Therefore $nP_{\eta_0}[-g'(0)-g''(0)/2]$ is equal to $ t\sqrt{n} \int (b_0-b)\,dF_0 + t^2\| \xi_{\eta_0}^b \|_{b_0}^2/2 +o_{P_0}(1)$. The third term on the right of \eqref{eq:lan_least_fav_dir2} is equivalent to the same expression. This concludes the proof of \eqref{eq:LAN_remainder_bb}. \end{proof} The preceding proof makes use of the following lemma, which can be considered a BvM theorem for the Laplace transform of the Dirichlet posterior process. A proof of the lemma can be found in \cite{RayDP}. Let $\mathbb{F}_n$ be the empirical distribution of an i.i.d.\ sample $Z_1,\ldots,Z_n$ from a distribution $F_0$ on a Polish sample space $(\mathcal{Z},\mathcal{C})$, and given $Z_1,\ldots, Z_n$ let $F_n$ be the distribution of a draw from the Dirichlet process with base measure $\nu+ n\mathbb{F}_n$. Thus $\nu$ is a finite measure on $(\mathcal{Z},\mathcal{C})$, and $F_n\given Z_1,\dots,Z_n \sim DP(\nu + n\mathbb{F}_n)$ is the posterior distribution obtained when equipping the distribution of the observations $Z_1,Z_2,\ldots, Z_n$ with a Dirichlet process prior with base measure $\nu$. The case $\nu=0$ is allowed. \begin{lemma}\label{lem:DP_exp_laplace_trans} Suppose $\mathcal{G}_n$ are separable classes of measurable functions such that $\sup_{g\in \mathcal{G}_n}|\mathbb{F}_ng-F_0g|\rightarrow 0$ in probability and have envelope functions $G_n$ satisfying $\nu G_n=O(1)$ and $F_0G_n^{2+\delta}=O(1)$ for some $\delta>0$. Then for every $t$ in a sufficiently small neighbourhood of $0$, in probability, \begin{align*} \sup_{g\in \mathcal{G}_n}\left| \mathbb{E}\bigl[e^{t\sqrt{n}(F_ng-\mathbb{F}_ng)} \given Z_1,\ldots,Z_n\bigr] - e^{t^2 F_0(g-F_0g)^2/2} \right| \rightarrow 0. \end{align*} \end{lemma} \subsection{Proof of Theorem~\ref{thm:dep_prior_gen_EB}: propensity score-dependent prior} \begin{proof}[Proof of Theorem~\ref{thm:dep_prior_gen_EB}] For the propensity score-dependent prior \eqref{eq:prior_dep_EB} the posterior distribution for $\sqrt n(\chi(\eta)-\hat\chi_n)$ is dependent both on the data $X^{(n)}$ and the estimator $\hat a_n$, and hence the bounded Lipschitz distance between this posterior distribution and the approximating normal distribution in Definition~\ref{DefBvM} is a function $H(X^{(n)},\hat a_n)$ of this pair of stochastic variables. By the assumed stochastic independence of $X^{(n)}$ and $\hat a_n$, the expectation of this distance can be disintegrated as $\mathbb{E} H(X^{(n)},\hat a_n)=\int \mathbb{E} H(X^{(n)},a)\,dP^{\hat a_n}(a)$, where the expectation inside the integral is relative to $X^{(n)}$ only and concerns the ``ordinary'' posterior distribution relative to the prior \eqref{eq:prior_dep_EB} with $\hat a_n$ set equal to the deterministic function $a$, i.e.\ the posterior distribution for the prior of the form $\Psi(w+\lambda a)$ on $b$, for a fixed function $a$ and $(w,\lambda)$ following their prior. Since the bounded Lipschitz distance is bounded, $\mathbb{E} H(X^{(n)},\hat a_n)$ certainly tends to zero if for every $\eta>0$ there exist sets $\mathcal{A}_n$ with $\Pr(\hat a_n\in \mathcal{A}_n)>1-\eta$ such that $\mathbb{E} H(X^{(n)},a)\rightarrow 0$, uniformly in $a\in \mathcal{A}_n$. In view of \eqref{EqPriorConcentration3} there exist sets $A_n$ with $\Pr(\hat a_n\in A_n)\rightarrow 1$ and $\mathbb{E}\Pi \bigl( (w,\lambda): w+(\lambda + tn^{-1/2})a\in \mathcal{H}_n^b\given X^{(n)}\bigr)\rightarrow1$, uniformly in $a\in A_n$ (see the lemma below for details). Since we assume that $\|\hat{a}_n\|_\infty = O_{P_0}(1)$ and \eqref{eq:estimator_prop}, we can further reduce these sets to $\mathcal{A}_n=\{a\in A_n: \|a\|_\infty\le M, \|a-a_0\|_{L^2(F_0)} \le M\rho_n\}$, and then show that $\mathbb{E} H(X^{(n)},a)\rightarrow 0$ uniformly in $a\in \mathcal{A}_n$, for (every) fixed $M>0$. Thus in the remainder of the proof we fix $\hat a_n$ to be a deterministic sequence $a_n$ in $\mathcal{A}_n$. We verify the conditions of Theorem~\ref{thm:general_F}. By \eqref{eq:dep_prior_lambda_cond}--\eqref{eq:prob_sup3}, conditions \eqref{EqPriorConcentration2}--\eqref{eq:prob_sup2} are met by $\mathcal{H}_n=\{\eta: \eta^b=w+\lambda a_n, (w,\lambda)\in B_n\}$, for \begin{align*} B_n = \bigl\{ (w,\lambda) : w +\lambda {a}_n \in \mathcal{H}_n^b , |\lambda| \leq 2 u_n\sigma_n^2 \sqrt{n}\bigr\}. \end{align*} It therefore remains only to control the change of measure \eqref{eq:prior_shift_cond2}. We need only consider the $b$ part of the integrals, as the $a$ part cancels. Because the assumptions become `more true' if $u_n$ is replaced by a bigger sequence and $n\sigma_n^2\rightarrow\infty$, we may assume that $u_n\rightarrow0$ and $u_nn\sigma_n^2\rightarrow\infty$. For the $b$ term, \eqref{eq:prior_shift_cond2} equals \begin{align}\label{eq:numerator} \frac{\int_{B_n} e^{\ell_n^b(w+\lambda {a}_n-ta_0/\sqrt{n})} \phi_{\sigma_n}(\lambda)\, d\lambda \, d\Pi(w)} {\int_{B_n} e^{\ell_n^b(w+\lambda {a_n})} \phi_{\sigma_n}(\lambda)\, d\lambda \, d\Pi(w)}, \end{align} where $\phi_\sigma$ denotes the probability density function of a $N(0,\sigma^2)$ random variable. By Lemma~\ref{lem:lik_b_approx}, applied with $A_n = \{ w+\lambda {a}_n : (w,\lambda) \in B_n\}$, $\xi_n = {a}_n$, $\xi_0 = a_0$, $\zeta_n = M\rho_n$, $w_n$ the constant $M$ in the definition of $\mathcal{A}_n$ and $\varepsilon_n = \varepsilon_n^b$, \begin{align*} \sup_{(w,\lambda)\in B_n}\Bigl|\ell_n^b\bigl(w + \lambda {a}_n-\frac t{\sqrt{n}}a_0\bigr) -\ell_n^b\bigl(w + \bigl(\lambda-\frac t{\sqrt{n}}\bigr){a}_n\bigr)\Bigr| = o_{P_0}(1). \end{align*} Furthermore, for $|\lambda|\leq 2u_n\sigma_n^2\sqrt{n}$, we have for the log likelihood ratio of two normal densities $$\Bigl|\log \frac{\phi_{\sigma_n}(\lambda)}{\phi_{\sigma_n}(\lambda - t/\sqrt{n})}\Bigr| \le \frac{|t\lambda|}{\sqrt{n}\sigma_n^2} + \frac{t^2}{2n\sigma_n^2} \rightarrow 0.$$ Consequently, the numerator of \eqref{eq:numerator} equals \begin{align*} e^{o_{P_0}(1)} \int_{B_n} e^{\ell_n^b(w+(\lambda -t/\sqrt{n}) {a}_n)} \phi_{\sigma_n}(\lambda-t/\sqrt{n})\,d\lambda\, d\Pi(w). \end{align*} By the change of variables $\lambda -t/\sqrt{n} \rightsquigarrow \lambda'$ the ratio \eqref{eq:numerator} therefore equals, for $B_{n,t}=\{ (w,\lambda): (w,\lambda+t/\sqrt{n})\in B_n\}$, \begin{align*} e^{o_{P_0}(1)} \frac{\int_{B_{n,t}} e^{\ell_n^b(w+\lambda' {a}_n)} \phi_{\sigma_n}(\lambda')\, d\lambda'\, d\Pi(w)} {\int_{B_n} e^{\ell_n^b(w+\lambda {a}_n)} \phi_{\sigma_n}(\lambda)\, d\lambda \, d\Pi(w)} = e^{o_{P_0}(1)}\frac{\Pi(B_{n,t}|X^{(n)})}{\Pi(B_n|X^{(n)})}. \end{align*} Since $\Pi(B_n|X^{(n)})=1-o_{P_0}(1)$, it remains to show that $\Pi(B_{n,t}|X^{(n)})=1-o_{P_0}(1)$. The set $B_{n,t}$ is the intersection of the sets in assumptions \eqref{EqPriorConcentration3} (with $\hat a_n=a_n$) and \eqref{eq:dep_prior_lambda_cond}, except that the restriction on $\lambda$ in $B_{n,t}$ is $|\lambda+t/\sqrt{n}| \le 2u_n \sqrt{n}\sigma_n^2$, whereas in \eqref{eq:dep_prior_lambda_cond} the restriction is $|\lambda| \le u_n \sqrt{n}\sigma_n^2$. Since $t/\sqrt n\ll u_n \sqrt{n}\sigma_n^2$ by construction, the latter restriction implies the former, and hence $\Pi(B_{n,t}|X^{(n)})=1-o_{P_0}(1)$ by assumption. \end{proof} \begin{lemma} For given $v$ define $A_n(v)$ to be the set of all $a$ such that $\mathbb{E}\Pi \bigl( (w,\lambda): w+(\lambda + tn^{-1/2})a\in \mathcal{H}_n^b\given X^{(n)}\bigr)>1-v$. If \eqref{EqPriorConcentration3} holds, then there exists $v_n\downarrow 0$ such that $\Pr(\hat a_n\in A_n(v_n))\rightarrow 1$. \end{lemma} \begin{proof} For given $a$ and $x$, define $$G_n(a,x)=\Pi \bigl( (w,\lambda): w+(\lambda + tn^{-1/2})a\in \mathcal{H}_n^b\given X^{(n)}=x\bigr).$$ Then the given expectation is $H_n(a):=\mathbb{E} G_n(a, X^{(n)})$ and $A_n(v)=\{a: H_n(a)>1-v\}$. By \eqref{EqPriorConcentration3}, the dominated convergence theorem and the independence of $\hat a_n$ and $X^{(n)}$, we have $\mathbb{E} H_n(\hat a_n)=\mathbb{E} G_n(\hat a_n,X^{(n)})\rightarrow 1$. Since $0\le H_n(a)\le 1$, this implies that $H_n(\hat a_n)\rightarrow^{P}1$. Then $\Pr(H_n(\hat a_n)>1-v_n)\ra1$, for $v_n\downarrow 0$ sufficiently slowly by a standard argument. \end{proof} \subsection{Proofs for Section~\ref{SectionGaussianPriors}: Gaussian process priors} \begin{proof}[Proof of Proposition~\ref{prop:gp_gen_F}] We verify the conditions of Theorem~\ref{thm:general_F}. By Lemma~\ref{lem:contrac_prod_b} with norm $\|\cdot\|_\infty$, the posterior distribution of $b$ contracts about $b_0$ at rate $\varepsilon_n^b$ in $L^2(F_0)$. For $\mathcal{H}_n^b$ the sets as in the statement of the proposition, define $$\mathcal{H}_n = \bigl\{(\eta^a,\eta^b): \eta^b\in\mathcal{H}_n^b, \|\Psi(\eta^b)-b_0\|_{L^2} \leq \varepsilon_n^b\bigr\}.$$ Then $\Pi(\mathcal{H}_n\given X^{(n)}) \rightarrow^{P_0} 1$ as $n\rightarrow \infty$, by assumption. It follows that $\mathcal{H}_n$ satisfies conditions \eqref{EqPriorConcentration2}--\eqref{EqConsistencyb2}, while \eqref{eq:prob_sup2} is satisfied by assumption. It remains to verify \eqref{eq:prior_shift_cond2}. Following \cite{castillo2012}, we first approximate the perturbation $\eta_t^b$ by an element in the RKHS $\H^b$ and then apply the Cameron-Martin theorem. Let $\xi_n^b\in \H^b$ satisfy \eqref{eq:RKHS_cond_b}, and set $\eta_{n,t}= \eta_{n,t}(\eta^b)= \eta^b - t\xi_n^b/\sqrt{n}$. By the Cameron-Martin theorem (see Lemma~\ref{LemCM}), the distribution $\Pi_{n,t}$ of $\eta_{n,t}$ if $\eta^b$ is distributed according to the prior $\Pi$ has Radon-Nikodym density $$\frac{d\Pi_{n,t}}{d\Pi}(\eta^b)=e^{tU_n(\eta^b)/\sqrt{n} - t^2 \|\xi_n^b\|_{\H^b}^2/(2n)},$$ where $U_n(\eta^b)$ is a centered Gaussian variable with variance $\|\xi_n^b\|_{\H^b}^2$ if $\eta^b\sim \Pi$, and $\|\cdot\|_{\H^b}$ is the RKHS norm of the Gaussian process $\eta^b$. By the univariate Gaussian tail bound, \begin{equation} \label{EqUnivariateGaussian} \Pi\bigl( \eta^b: |U_n(\eta^b)| > M\sqrt{n} \varepsilon_n^b \| \xi_n^b\|_{\H^b}\bigr) \leq 2e^{-M^2n(\varepsilon_n^b)^2/2}. \end{equation} Consequently, by Lemma~\ref{lem:small_prior_prob} the posterior measure of the set in the display tends to 0 in probability, for large enough $M$. Hence the sets \begin{align*} B_n = \bigl\{\eta^b: |U_n({\eta^b})| \leq M\sqrt{n} \varepsilon_n^b \| \xi_n^b\|_{\H^b}\bigr\}\cap \mathcal{H}_n^b \end{align*} also satisfy $\Pi(B_n|X^{(n)}) \rightarrow 1$ in probability. On the sets $B_n$, in view of \eqref{eq:RKHS_cond_b}, \begin{align}\label{eq:CM} \Bigl|\log \frac{d\Pi_{n,t}}{d\Pi}(\eta^b)\Bigr|\le { M|t|\sqrt{n}\varepsilon_n^b \zeta_n^b + \frac{t^2}{2}(\zeta_n^b)^2}\rightarrow 0. \end{align} Furthermore, by Lemma~\ref{lem:lik_b_approx} applied with $A_n=B_n$, $\xi_0 = \xi_{\eta_0}^b$, $\varepsilon_n=\varepsilon_n^b$, $\zeta_n = \zeta_n^b$ and $w_n$ a sufficiently large fixed constant, we have $$\sup_{\eta^b\in B_n}|\ell_n^b(\eta_{n,t})-\ell_n^b(\eta_t^b)| = o_{P_0}(1).$$ (Note that condition \eqref{eq:sup_lem_lik_b_approx} holds by assumption \eqref{eq:prob_sup3} and Lemma~\ref{lem:prob_to_expect}.) By the last display followed by the change of integration variable $\eta^b-t\xi_n^b/\sqrt n\rightsquigarrow v$, \begin{align*} \frac{\int_{B_n} e^{\ell_n^b(\eta_{t}^b)} d\Pi(\eta^b)}{\int_{B_n} e^{\ell_n^b(\eta^b)} d\Pi(\eta^b)} =\frac{\int_{B_n} e^{\ell_n^b(\eta_{n,t})} d\Pi(\eta^b)}{\int_{B_n} e^{\ell_n^b(\eta^b)} d\Pi(\eta^b)} \,e^{o_{P_0}(1)} =\frac{\int_{B_{n,t}} e^{\ell_n^b (v)} \, d\Pi_{n,t}(v) }{\int_{B_n} e^{\ell_n^b(\eta^b)} d\Pi(\eta^b)}\,e^{o_{P_0}(1)}, \end{align*} where $B_{n,t} = B_n-t\xi_n^b/\sqrt{n}$. By \eqref{eq:CM} we can next replace $\Pi_{n,t}$ in the numerator by $\Pi$ at the cost of another multiplicative $1+o_{P_0}(1)$ term. This turns the quotient into the ratio $\Pi(B_{n,t}|X^{(n)})/\Pi(B_n|X^{(n)})$. We have already shown that $\Pi(B_n|X^{(n)})=1-o_{P_0}(1)$, so it suffices to show the same result holds true for the numerator. Now \begin{align*} B_{n,t}^c &= \bigl\{ v: v+{t\xi_n^b}/{\sqrt{n}} \not\in \mathcal{H}_n^b\bigr\} \cup \bigl\{ v: \|\Psi(v+{t\xi_n^b}/{\sqrt{n}} )-b_0\|_{L^2(F_0)} > \varepsilon_n^b \bigr\} \\ &\qquad\qquad\cup \bigl\{ v: |U_n(v+{t\xi_n^b}/{\sqrt{n}} )| > M\sqrt{n} \varepsilon_n^b \| \xi_n^b\|_{\H^b} \bigr\}. \end{align*} The posterior probability of the first set tends to zero in probability by assumption. Since $\bigl\|\Psi(\eta^b + t\xi_n^b/\sqrt{n})-\Psi(\eta^b)\bigr\|_{L^2(F_0)}\lesssim \|\xi_n^b/\sqrt n\|_{L^2(F_0)} \lesssim 1/\sqrt n$, the second set is contained in $\{ \eta^b: \|\Psi(\eta^b)-b_0\|_{L^2(F_0)} > \varepsilon_n^b -C/\sqrt{n}\}$, which has posterior probability $o_{P_0}(1)$ by Lemma~\ref{lem:contrac_prod_b}, possibly after replacing $\varepsilon_n^b$ by a multiple of itself. For the third set, we use that $U_n(\eta^b+t\xi_n^b/\sqrt{n})\sim N(-t\|\xi_n^b\|_\H^2/\sqrt n, \|\xi_n^b\|_\H^2)$ if $\eta^b$ is distributed according to the prior, by Lemma~\ref{LemCM}. Since the mean $t\|\xi_n^b\|_\H^2/\sqrt n$ of this variable is negligible relative to its standard deviation, $\Pi \bigl( |U_n(\eta^b+t\xi_n^b/\sqrt{n}) | > M\sqrt{n} \varepsilon_n^b \| \xi_n^b\|_{\H^b}\bigr)$ differs not substantially from the left side of \eqref{EqUnivariateGaussian}, whence it is also exponentially small, so that again Lemma~\ref{lem:small_prior_prob} applies to see that the posterior probability tends to zero. \end{proof} \begin{proof}[Proof of Corollary~\ref{cor:RL_F}] The proof follows by verifying the conditions of Proposition~\ref{prop:gp_gen_F}, separately for the two prior processes. \textbf{Series prior} \eqref{eq:series_prior}: Using the form of the concentration function in the proof of Theorem~4.5 of \cite{vandervaart2008}, we see that \eqref{eq:gaus_conc_rate} is satisfied for $$\varepsilon_n^b = n^{-\frac{\beta\wedge \bar{\beta}}{2\bar{\beta}+d}} \log n.$$ Condition~\eqref{eq:prob_sup2} is verified in Lemma~\ref{lem:sup_series}, under the assumption $\beta \wedge \bar{\beta} >d/2$. It thus remains only to establish \eqref{eq:RKHS_cond_b}, the approximation by elements of the RKHS. Write $J = J_{\bar{\beta}}$ and define $V_J = \text{span}(\psi_{jk}: j\leq J, k)$. Recall that the RKHS of the Gaussian series prior \eqref{eq:series_prior} equals \begin{equation}\label{eq:RKHS_series} \H^b = \Bigl\{ w\in V_J: \|w\|_{\H^b}^2 := \sum_{j\leq J} \sum_k \sigma_j^{-2} |\langle w,\psi_{jk}\rangle_{L^2}|^2 < \infty \Bigr\}. \end{equation} From the computations in Theorem 4.5 of \cite{vandervaart2008}, one gets that for $\xi_{\eta_0}^b = a_0 \in C^\alpha$ and any $\zeta_n^b \gtrsim n^{-\alpha/(2\bar{\beta}+d)}$, \begin{align}\label{RKHS_approx_b} \inf_{\xi: \|\xi-a_0\|_\infty \leq \zeta_n^b} \|\xi\|_{\H^b} \lesssim \begin{cases} (\zeta_n^b)^{-\frac{r-\alpha+d/2}{\alpha} \wedge 0} & \quad \text{if } r-\alpha+d/2 \neq 0,\\ \log (1/\zeta_n^b) & \quad \text{if } r-\alpha+d/2=0. \end{cases} \end{align} If follows that \eqref{eq:RKHS_cond_b} is satisfied if we can choose $\zeta_n^b \to 0$ so that the right side of the display is bounded above by $\sqrt n\zeta_n^b$ and $\sqrt n\varepsilon_n^b\zeta_n^b\rightarrow 0$. \begin{itemize} \item If $r-\alpha+d/2>0$, then \eqref{RKHS_approx_b} is bounded by $\sqrt{n}\zeta_n^b$ for $\zeta_n^b \gtrsim n^{-\alpha/(2r+d)}$. Since we also require $\zeta_n^b \gtrsim n^{-\alpha/(2\bar{\beta}+d)}$, we may take $\zeta_n^b \sim n^{-\alpha/(2\bar{\beta}+d)} \vee n^{-\alpha/(2r+d)} = n^{-\alpha/(2\bar{\beta}+d)}$ since $r\leq \beta \wedge \bar{\beta}$ by assumption. Then $\sqrt{n} \varepsilon_n^b \zeta_n^b \rightarrow 0$ for $\beta \wedge \bar{ \beta}>d/2 + \bar{\beta}-\alpha$. \item If $r-\alpha+d/2<0$, then \eqref{RKHS_approx_b} is bounded by $\sqrt{n}\zeta_n^b$ and also $\zeta_n^b \gtrsim n^{-\alpha/(2\bar{\beta}+d)}$ for the choice $\zeta_n^b \sim n^{-1/2} \vee n^{-\alpha/(2\bar{\beta}+d)}$. If $1/2 \leq \alpha/(2\bar{\beta}+d)$, then $\sqrt{n}\varepsilon_n^b \zeta_n^b \sim \varepsilon_n^b \to 0$. If $1/2 > \alpha/(2\bar{\beta}+d)$, then $\sqrt{n}\varepsilon_n^b \zeta_n^b \sim n^{(\bar{\beta}+d/2-\beta\wedge\bar{\beta}-\alpha)/(2\bar{\beta}+d)} (\log n)\to 0$ for $\beta \wedge \bar{ \beta}>d/2 + \bar{\beta}-\alpha$. \item If $r-\alpha+d/2=0$, then one takes $\zeta_n \sim [(\log n)^{1/2} n^{-1/2}]\vee n^{-\alpha/(2\bar{\beta}+d)}$. This is the same as the previous case apart from the extra logarithmic factor, so $\sqrt{n}\varepsilon_n^b \zeta_n^b \to 0$ under exactly the same conditions. \end{itemize} Examining all the cases, the above can be summarized as \eqref{eq:RKHS_cond_b} holds if $\beta\wedge\bar{\beta}>[\bar{\beta}-\alpha+d/2]\vee 0$. Together with the condition $\beta \wedge \bar{\beta}>d/2$ needed to verify \eqref{eq:prob_sup2} above, this is equivalent to $\alpha,\beta>d/2$ and $d/2 < \bar{\beta}<\alpha+\beta-d/2$. \textbf{Riemann-Liouville prior} \eqref{eq:RL_process}: The proof follows in much the same way. Using the form of the concentration function in Theorem~4 of Castillo \cite{castillo2008}, we see that \eqref{eq:gaus_conc_rate} is satisfied for $$\varepsilon_n^b = n^{-\frac{\beta\wedge \bar{\beta}}{2\bar{\beta}+1}} (\log n)^\kappa,$$ where $\kappa$ is function of $(\beta,\bar\beta)$, given explicitly in \cite{castillo2008}. Condition~\eqref{eq:prob_sup2} is verified in Lemma~\ref{lem:sup_RL}, under the assumption $\beta \wedge \bar{\beta} >1/2$. It thus remains to establish \eqref{eq:RKHS_cond_b}. Recall that the RKHS of the Riemann-Liouville process is the Sobolev space $H^{\bar{\beta}+1/2}$. From the computations in Theorem~4 of \cite{castillo2008}, one gets that for $\xi_{\eta_0}^b = a_0 \in C^\alpha$, as $\zeta_n^b\rightarrow 0$, \begin{align*} \inf_{\xi: \|\xi-a_0\|_\infty \leq \zeta_n^b} \|\xi\|_{\H^b} \lesssim (\zeta_n^b)^{-\frac{\bar{\beta}-\alpha+1/2}{\alpha} \wedge 0}. \end{align*} If follows that \eqref{eq:RKHS_cond_b} is satisfied if we can choose $\zeta_n^b$ so that the right side of the display is bounded above by $\sqrt n\zeta_n^b$ and $\sqrt n\varepsilon_n^b\zeta_n^b\rightarrow 0$. If $\bar{\beta}\leq\alpha -1/2$, simply set $\xi_n^b = \xi_{\eta_0}^b$ and $\zeta_n^b = n^{-1/2} \|\xi_{\eta_0}^b\|_{\H^b}$. If $\bar{\beta}>\alpha -1/2$, take $\zeta_n^b = n^{-\frac{\alpha}{2\bar{\beta}+1}}$, so that $\sqrt{n} \varepsilon_n^b \zeta_n^b \rightarrow 0$ for $\beta \wedge \bar{ \beta}>1/2 + \bar{\beta}-\alpha$. A careful analysis of all cases shows that these inequalities, together with the requirement $\beta \wedge \bar{\beta}>1/2$, are equivalent to $\alpha,\beta>1/2$ and $1/2 < \bar{\beta}<\alpha+\beta-1/2$. \end{proof} \begin{proof}[Proof of Corollary~\ref{cor:RL_dep_F}] We verify the conditions of Theorem~\ref{thm:dep_prior_gen_EB}, where we replace $\hat a_n$ by a deterministic sequence with $\|a_n\|_\infty=O(1)$ as explained in the proof of Theorem~\ref{thm:dep_prior_gen_EB}. Since $\varepsilon_n^b = n^{-(\beta\wedge \bar{\beta})/(2\bar{\beta}+d)}(\log n)^\kappa$ solves \eqref{eq:gaus_conc_rate} (see proof of Corollary \ref{cor:RL_F}), the contraction rate follows from Lemma~\ref{lem:contrac_dep_EB}. Together with Lemmas~\ref{lem:sup_RL_dep} and \ref{lem:sup_series_dep} for the Riemann-Liouville and series priors, respectively, this verifies conditions \eqref{EqPriorConcentration3}--\eqref{eq:prob_sup3}. To verify \eqref{eq:dep_prior_lambda_cond}, we use the Gaussian tail inequality to see that $\Pi(|\lambda| \geq u_n\sigma_n \sqrt{n})\leq 2e^{-u_n^2 n\sigma_n^2/2}$. This is bounded above by $e^{-Ln(\varepsilon_n^b)^2}$ for $u_n\rightarrow0$ sufficiently slowly, since $\varepsilon_n^b = o(\sigma_n)$ by assumption. Lemma~\ref{lem:small_prior_prob} now implies \eqref{eq:dep_prior_lambda_cond}. \end{proof} \noindent \textbf{Acknowledgements:} We would like to thank two referees for helpful comments and for drawing several references to our attention. The first author would also like to thank Richard Nickl for helpful conversations on symmetrization. Much of this work was done while Kolyan Ray was a postdoc at Leiden University.
\section{Introduction} \label{sec:Intro} Richard Bader's Quantum Theory of Atoms in Molecules (QTAIM) \cite{bader1994} has been recognized as the only fully quantum mechanics-based theory that enables the application of traditional chemical concepts in an unambiguous manner \cite{shahbazian2006}. This achievement stems from the decomposition of a molecule or solid's electron charge density ($\rho$) into non-overlapping proper open subsystems, each bound by a surface over which the flux in its gradient (\mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}) vanishes \cite{bader1994,nasertayoob2008}. It was assumed that these subsystems possessed a well-defined energy, though recently, Anderson \textit{et al.}\ have questioned this assumption \cite{anderson2010}. While there are an infinite number of regions over which this zero flux condition is satisfied---regions now referred to as quantum divided basins \cite{heidarzadeh2011}---Bader realized that every nucleus is bounded by a unique surface over which the flux of \mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}\ is everywhere zero, denoted as a zero flux surface. These regions Bader recognized as the atoms in molecules, which he called atomic basins, though they are also referred to as Bader atoms. Each of these atoms is characterized by a nonarbitray boundary, an unambiguous electron count, and, mindful of the concerns expressed in ref.~\citenum{anderson2010}, a well-defined energy. With a single insight Bader provided a theoretically defensible framework from which one can assess and compare atomic properties like size and energy between atomic systems. Using this framework and within the accuracy of computational or experimental methods, two researchers must arrive at the same conclusion when scrutinizing such properties. Bader became the leading advocate for the school of thought seeking to reframe all of chemistry in terms of measurable quantities and his belief was that QTAIM would be the central framework from which this new chemical perspective would evolve. The Bader atom is easily represented in terms of \mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}\ and its corresponding critical points (CPs)---the maxima, minima and saddle points where \mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}\ vanishes. An arbitrary gradient path (G) originates from a minimum---called a cage CP, which may be located at infinity---and terminates at a maximum---called a nuclear CP because it is typically coincident with an atomic nucleus. Equivalent to the zero flux surface-based definition, a Bader atom is the union of all Gs with a shared terminal nuclear CP. Bader noted that when two atoms share a polyhedral face, their nuclei are connected by a unique G he called a bond path; a ridge along which $\rho$\ is a maximum with respect to all neighboring paths. Such a path also necessitates the existence of a saddle point of index $-1$ located between bound nuclei and called a bond CP. Perhaps due to the word ``bond'' in their designations, in our opinion an unwarranted amount of attention has been focused on bond paths and bond CPs, as researchers have repeatedly discovered bond CPs between atoms whose interactions are assumed to be destabilizing \cite{poater2006,haaland2004,keyvani2016}. These researchers have argued that such points cannot reflect bonding, and recently it has been proposed that ``bond'' should be stricken from their discussion \cite{shahbazian2018}. However, these discussions are antithetical to the premise of QTAIM, because neither a bond CP nor a bond path constitutes a volume bounded by a zero flux surface, hence they do not have well defined energies, and taken singularly are not required to provide stability information. Still, the shear number and often extensive analyses of CPs, particularly bond CPs and bond paths, serve to obscure the main focus and strength of QTAIM; the partitioning of a molecule into proper open subsystems. The Bader atom was recognized as the sole proper subsystem of a molecule until the introduction of the repulsive basin of Pendas \textit{et al.}\ in 1997 (and later Popelier's \emph{cage} in 2000) \cite{martinpendas1997,popelier2000}. They argued that just as there are nuclear CP-centered basins there must be cage CP-centered basins satisfying the zero flux condition. Repulsive basins were defined as the union of gradient paths that originate at a common cage CP. The zero flux surfaces bounding repulsive basins must contain a number of nuclear CPs. Bader had originally discounted the significance of such zero flux surfaces due to the cusp in $\rho$\ at nuclear CPs resulting in undefined points in \mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}. However, the nuclear cusp is not real but rather a manifestation of the coulomb approximation to the Schr\"odinger equation. The absence of a nuclear cusp opened the door to an infinity of zero flux surface-bounded volumes. Eberhart \cite{eberhart2001} and later Jones and Eberhart \cite{jones2009,jones2010}, introduced one such volume they called the irreducible bundle; a tetrahedral volume that is the simplex of $\rho$, incorporating all four types of CPs---bond, cage, nuclear and ring (a saddle point of index $+1$). The vertices, edges, and faces of an irreducible bundle are respectively the four types of CPs, the six shortest-length Gs connecting them pairwise, and the four least-area zero flux surfaces with triplets of CPs as their corners. Like Bader atoms, irreducible bundles share vertices, edges and faces so as to fill space. The union of irreducible bundles sharing a common nuclear CP gives rise to the Bader atom. The union of irreducible bundles sharing a common cage CP gives rise to the repulsive basin. And the union of irreducible bundles sharing a common bond CP gives rise to the bond bundle---a partitioning of the charge density into unique zero flux surface-bounded volumes, each of which contains a single bond path and bond CP. Bond bundles recover traditional bond properties like bond order \cite{jones2010,goss2018}, and address issues like spurious bond CPs which have been shown to have tiny bond orders \cite{miorelli2015}. However, unlike Bader atoms and repulsive basins, which are readily apparent from an inspection of \mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}, all the boundaries of irreducible bundles are not obvious and are often difficult to locate. In correspondence with Eberhart [R.~Bader, personal communication, 2004], Bader questioned whether his theory---with only one zero flux surface and a bond path---would lose its elegance due to extensions such as the irreducible bundle, and that with boundaries defined as least area surfaces, QTAIM would become and be perceived as \textit{ad hoc}, where such definitions arise as but a means to specify some unique boundary between bonds. His point was, at least philosophically, well taken. And though Bader has passed away, through our deep respect for him we posthumously answer his question; an answer that points to a possible future research emphasis for QTAIM. \section{Condensed Charge Density Space} \label{sec:condencedRhoSpace} Developing a more satisfying means of identifying the special boundaries of QTAIM involves constructing the space of all volumes bounded by zero flux surfaces, what we call the gradient bundle condensed charge density (${\cal P}$). Specifically, we will map Gs of $\rho$\ to points in ${\cal P}$\ and show that the bond bundle is the topological analogue in ${\cal P}$\ of the Bader atom in $\rho$. Recall that every G in $\rho$\ originates from a cage CP and terminates at a nuclear CP. Sufficiently close to its terminus, Gs are radial, making it conceptually convenient to imagine every nuclear CP as the center of a sphere S$_i$ of radius $dr$ that lies within the radial region---in practice, $dr\approx 0.2$\AA\ and would never extend beyond the interatomic surface. Passing through every point on the surface of these spheres is a G. The points on a sphere may be specified by a polar and an azimuthal angle, so each of the molecule's Gs may be specified by a pair of coordinates and the index of the nuclear CP at its terminus, \textit{i.e.}\ G$_i(\theta,\phi)$. Imagine covering each S$_i$ with a set of non-intersecting differential elements of area $dA = d\theta d\phi dr^2$ (\cref{fig:dA}). The Gs passing through the points interior to each of these area elements gives rise to a family of differential volume elements whose cross sectional area---equal to $d\theta d\phi dr^2$ at S$_i$---changes down their length according to \mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}. These differential gradient bundles, $d{\rm{GB}}_i(\theta,\phi)$\ \cite{eberhart2013,morgenstern2015} (\cref{fig:dgb}), are the smallest structures bounded by zero flux surfaces and that accordingly possess well-defined energies. The union of all $d$GB$_i$ is equivalent to the union of all Gs terminating at nuclear CP $i$ and hence recovers Bader's atomic basin. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{dtheta_dphi}% \caption{Differential area element on a sphere.} \label{fig:dA} \end{figure} \begin{figure} \centering \includegraphics[width=0.4\textwidth]{ethene_gba_gb} \caption{A differential gradient bundle made from gradient paths seeded from the nodes and along the edges of an element on a triangulated sphere.} \label{fig:dgb} \end{figure} We define the gradient bundle condensed charge density, ${\cal P}_i(\theta,\phi)$,\footnote{Not to be confused with the condensed fukui functions} as the area-normalized electron density contained in each $d{\rm{GB}}_i(\theta,\phi)$, such that \begin{equation*} \text{${\cal P}$}_i(\theta,\phi)=\frac{1}{dA(dr)}\int_{\text{G}_i(\theta,\phi)}\rho(s) dA(s)ds, \end{equation*} a line integral along $\text{G}_i(\theta,\phi)$ where $s$ is arc length. ${\cal P}$\ is a scalar field with units of electrons per unit area, and maps $\rho$\ within a Bader atom onto a two-dimensional closed surface. As a visualization tool, this allows one to view what we will show to be the significant features of $\rho$\ at a glance, as in \cref{fig:etheneSphereProjection}a, for a carbon atom in an ethene molecule. \begin{figure} \centering \includegraphics[width=\textwidth]{ethene-sphere-projection} \caption{${\cal P}$\ for a carbon atom in ethene. Contour band coloring is that of a heat map throughout this paper when a legend is not present, where red and blue indicate high and low values respectively. \textbf{a)} Spherical mapping. Inset: Black, white, and red spheres respectively indicate carbon nuclear, hydrogen nuclear, and bond CPs (same scheme used when appropriate in remaining figures). \textbf{b)} Stereographic projection with C-C bond path at the origin. Axes are in units of radians, corresponding to rotation around the sphere in (a). \textit{See electronic version for color images.}} \label{fig:etheneSphereProjection} \end{figure} Borrowing terminology from differential geometry, each ${\cal P}$$_i$ is referred to as an \textit{atomic chart} and the set of all atomic charts comprising a molecule is termed its \textit{molecular atlas}. As an alternative to representing atomic charts as spheres, they may be projected onto a flat space as shown in \cref{fig:etheneSphereProjection}b where a stereographic projection of the atomic chart in \cref{fig:etheneSphereProjection}a is depicted. Every point in ${\cal P}$\ maps to a G in $\rho$, every trajectory through ${\cal P}$\ maps to a zero flux surface in $\rho$, and any closed loop in ${\cal P}$\ maps to a volume in $\rho$\ bounded by a zero flux surface and hence characterized by a well-defined energy. Such volumes are called gradient bundles \cite{morgenstern2015}, and they describe all previously noted zero flux surface-bounded volumes, \textit{e.g.}\ the atomic basin and the bond bundle. \section{Computational Methods} \label{sec:methods} All chemical simulations were performed with the Amsterdam Density Functional \cite{tevelde2001,fonsecaguerra1998,ADF2017authors} \textit{ab initio} software using the Perdew-Burke-Ernzerhof (PBE) functional \cite{perdew1996} and a triple-zeta with polarization (TZP) all-electron basis set. Calculation of ${\cal P}$\ was performed using the Gradient Bundle Analysis tool of the in house Bondalyzer package (by the Molecular Theory Group at Colorado School of Mines) within the Tecpot 360 visualization software \cite{tecplotinc.2013}. \section{The Topology of the Gradient Bundle Condensed Charge Density} \label{sec:condencedRhoTopology} Maxima in ${\cal P}$\ typically map to bond paths in $\rho$, as demonstrated in \cref{fig:etheneSphereProjection}a where the three maxima on the carbon atomic chart coincide with the intersections of the carbon-carbon and two carbon-hydrogen bond paths (black paths) with the sphere. Just as all Gs terminating at the same maxima in $\rho$\ define the atomic basin as a unique volume, all the gradient paths in ${\cal P}$\ (${\cal{G}}$ s)---\textit{i.e.}\ defined according to $\bm{\nabla}$\hspace{-1.2pt}$\cal{\bm{P}}$---terminating at the same maxima define a similarly unique gradient bundle, and hence a unique zero flux surface-bounded volume in $\rho$. As an example, shown in \cref{fig:etheneTripleProjection} are stereographic projections for the carbon atomic chart in ethene centered on each of its three maxima. Also shown are three sets of ${\cal{G}}$ s (black paths with arrows) each delineating a basin in ${\cal P}$. These basins are bounded by zero flux paths in ${\cal P}$\ (dashed and dot-dashed paths), which necessarily map to zero flux surfaces in $\rho$. The union of these zero flux surfaces partitions $\rho$\ into space-filling regions. The energy of these regions is well defined and the sum of these energies gives the molecular energy. \begin{figure} \centering \includegraphics[width=\textwidth]{ethene_triple_projection} \caption{ \textbf{Left)} Three stereographic projections of ${\cal P}$\ for a carbon atom in ethene, centered at the \bd{C}{C} bond path (center) and at each of the \bs{C}{H} bond paths (left and right). The three projections together cover the sphere. ${\cal{G}}$ s are shown delineating the three ${\cal P}$-basins. The \bd{C}{C} and the two \bs{C}{H} basins are demarcated by a dashed green path, and the two \bs{C}{H} basins by a dot-dashed orange path. \textbf{Right)} Multiple views of the same ${\cal P}$\ mapped onto a sphere. The middle left view is centered at the \bd{C}{C} bond path, top/bottom show the same region from above/below, and the right shows the opposite side of the sphere. The dashed green and dot-dashed orange paths demarcate the same regions as in the left side of the figure. \textit{See electronic version for color images.} } \label{fig:etheneTripleProjection} \end{figure} These observations invite the following definitions: i) a \textit{bond wedge}\footnote{The term ``bond wedge'' was suggested by Blanco [M.~Blanco, personal communication at the 5\textsuperscript{th} European Charge Density Meeting, 2008].} is the image in $\rho$\ of ${\cal{G}}$ s terminating at a common maximum in ${\cal P}$; ii) a \textit{bond bundle} is the union of two (or more) bond wedges that share an interatomic surface. As the Bader atom is the union of Gs in $\rho$\ terminating at a common nuclear CP, the Bader atom and the bond bundle are conceptually equivalent; one is a basin in $\rho$, and the other a basin in ${\cal P}$. For the vast majority of organic systems, the bond bundle definition provided here recovers the same regions as those resulting from the earlier definition \cite{jones2009,jones2010}. This is confirmed in \cref{fig:etheneGBABB}, where the bond bundle surfaces identified according to the earlier definition coincide with those defined by the image in $\rho$\ of the zero flux paths of ${\cal P}$\ (the green dashed lines in \cref{fig:etheneTripleProjection}). \begin{figure} \centering \includegraphics[width=0.9\textwidth]{ethene_gba_bb} \caption{ ${\cal P}$\ for carbon atom in ethene (sphere) shown with \bd{C}{C} bond bundle surfaces (blue) that were identified according to the previously defined special gradient surface criteria. Contours on bond bundle surfaces are only shown to enhance perspective. \textit{See electronic version for color images.} } \label{fig:etheneGBABB} \end{figure} \begin{figure} \centering \includegraphics[width=\textwidth]{biphenyl} \caption{ Planar biphenyl with stereographic projections of ${\cal P}$\ and ${\cal T}$\ for the ortho (cyan boxes; left) and para (orange boxes; right) H atoms. Center image shows contours of $\rho$\ on the molecular plane (corresponds to the region indicated by a dashed red box in the inset) with GBA spheres for ortho C and H atoms. Contours of ${\cal P}$\ are mapped onto the spheres. The red region shows where the ortho \bs{C}{H} bond bundle intersects the molecular plane. Stereographic projections are centered at the \bs{C}{H} bond path with the molecular plane passing horizontally through the projections. The intersection of the ortho \bs{H}{H} bond path with the GBA sphere is indicated by a red dot. The bottom-left projection includes the boundaries of two gerrymandered districts in ${\cal T}$, both of which contain the bond path intersection point. \textit{See electronic version for color images.}} \label{fig:biphenyl} \end{figure} Note that this definition does not require the presence of a bond path, though in organic molecules a maximum in ${\cal P}$\ is typically accompanied by a bond path in $\rho$. There are some noteworthy exceptions, however, as in the case of \bs{H}{H} bonding. One system in which this occurs is planar biphenyl, where conventional QTAIM analysis reveals bond CPs between ortho hydrogen atoms that are not found in its twisted, lower energy conformation. The chemical significance of these (and similar) bond CPs is a subject of debate. Appealing to total molecular and Pauli repulsion energy, molecular orbital analysis, and energy decomposition analysis \cite{poater2006,poater2006a}, antagonists argue that the higher energy of planer biphenyl is primarily a result of destabilizing, steric repulsion between ortho H atoms. The other side argues that the \bs{H}{H} bond path in fact lowers the energy of the meta-stable configuration, and that ortho H Bader atoms are stabilized relative to the relaxed conformation \cite{matta2003,hernandez-trujillo2007,garcia-ramos2018}. When analyzed within the new bond bundle perspective, the \bs{H}{H} bond paths of biphenyl (\cref{fig:biphenyl}) do not map to maxima in ${\cal P}$. The bond paths in question lie within the ortho \bs{C}{H} bond bundles. Obviously the existence of a bond CP and its corresponding bond path is not a sufficient condition for the formation of a bond bundle. The lack of a \bs{H}{H} bond bundle aside, one could attempt to indirectly scrutinize the energy of the region around the \bs{H}{H} bond path by assessing the energies of the C and H atomic basins or the \bs{C}{H} bond bundles (or their constituent C and H bond wedges). Being faithful to the QTAIM canons, there are no other unambiguous partitionings that contain the \bs{H}{H} interaction. We can appeal to the virial theorem \cite{slater1933,bacskay2018} to assess the energy distribution of the H bond wedge. As Bader has shown, the virial theorem is satisfied within zero flux surface-bounded regions \cite{bader1994}, \textit{e.g.}\ gradient bundles. Hence, in such regions for stable or meta-stable systems, the total kinetic energy equals minus the total energy. In addition, the noninteracting kinetic energy accounts for the vast majority of the total kinetic energy \cite{rodriguez2009}. \cref{fig:biphenyl} includes stereographic projections of the gradient bundle condensed (noninteracting) kinetic energy (${\cal T}$). Recall that \emph{any} closed loop in ${\cal P}$\ corresponds to a zero flux surface-bounded region in $\rho$, and that its energy is well-approximated by ${\cal T}$. For the ortho H atom, two regions have been defined such that the \bs{H}{H} bond path lies within each (dashed orange outlines at the bottom-left of \cref{fig:biphenyl}). Depending on which region is used, the \bs{H}{H} interactions could be argued to have a smaller or a larger energetic contribution to the system, but this amounts to nothing more than energy gerrymandering. Forgoing this type of subjective appropriation of energetic significance in discerning chemical phenomena \emph{is fundamental to QTAIM}. Nothing said here detracts from the relevance of \bs{H}{H} interactions in biological systems, organic crystals, or anywhere else they play a role. However, if one wishes to perpetuate Bader's well-articulated original vision, then the \emph{unambiguous} zero flux surface-partitioning of the subject region is not optional. \begin{figure} \centering \includegraphics[width=0.5\textwidth]{bondConstraints} \caption{ Simple representation of the two closest $d$GB s to a bond path and a line separating the bond path and interatomic surface regions. } \label{fig:bondConstrants} \end{figure} A maximum basin in ${\cal P}$\ requires, in addition to a bond path in $\rho$,\footnote{Excepting non-bonding cases, \textit{e.g.}\ lone electron pair regions.} constraints on the relative eigenvalues of the Hessian ($H$\hspace{-0.13em}\TWrho) along and near the bond path and interatomic surface. The nature of these constraints can be illustrated by considering a bond path's two nearest neighboring $d$GB s, one of which ($d$GB$_1$) contains the bond path, thus coinciding with the interatomic surface, as shown in \cref{fig:bondConstrants}. If $d$GB$_1$ is to map to a maximum in ${\cal P}$, it must contain more electrons than $d$GB$_2$, which in turn will be mediated by the relative charge densities in these $d$GB s over two regions. First, the region (I) along the bond path where the curvature perpendicular to the bond path is negative. Over this region the density contained in $d$GB$_1$ is always greater than the density in $d$GB$_2$---the greater the negative curvature the more pronounced will be this difference. In the second region (II), which runs along the interatomic surface, the curvature of the charge density perpendicular to the interatomic surface is positive. So, in this region the density contained in $d$GB$_2$ will be greater than that in $d$GB$_1$. This difference is minimized by a less curved charge density perpendicular to the interatomic surface. Combining the two constraints, bond paths will map to maxima in ${\cal P}$\ when the curvature perpendicular to the bond path is large and negative and that perpendicular to the interatomic surface is small and positive. To the extent that $H$\hspace{-0.13em}\TWrho\ at the bond CP captures the behavior of $\rho$\ over a wider region, a bond bundle will form when the curvature of $\rho$\ at the bond CP is flatter parallel to the bond path and steeper (negatively) perpendicular. Such behavior will be indicated by a large negative value of the laplacian ($\nabla^2$\hspace{-0.6pt}\TWrho) at the bond CP. Bader, arguing from a totally different perspective, came to this conclusion years ago \cite{bader1969} when he asserted that bond energy---or the degree of covalence---was given by $\nabla^2$\hspace{-0.6pt}\TWrho\ at a bond CP. \section{Summary} \label{sec:summary} It is an established consequence of DFT that chemical phenomena are dictated by $\rho$\ and its redistribution through a physical or chemical process, and though the ability to recover and predict chemical behavior directly from $\rho$\ would be transformative, this goal is as yet unrealized. QTAIM, as originally formulated, made some progress toward a full charge density representation of chemical phenomena by providing a framework through which to quantify charge redistribution between atoms and to describe the topological changes associated with bond breaking and rearrangement. However, the development of a quantum mechanically rigorous and quantitative description of charge rearrangement that couples easily to the traditional concept of chemical bonding has yet to be achieved. It seems to us that as we seek the energy mediated traces of chemical behavior, the natural place to look is within a space over which energy is well-defined. The gradient bundle condensed charge density is one such space, and consequently, images in ${\cal P}$\ reflect the energetically constrained behavior of $\rho$\ by the full, and only, region to which this behavior corresponds. The gradient bundle condensed charge density space also allows for a QTAIM-appropriate definition of the bond bundle by revealing the observable bond as the analog of the observable (Bader) atom. For where the Bader atom is an attractor in \mbox{$\bm{\nabla}$\hspace{-1.2pt}$\bm{\rho}$}, the bond bundle is an attractor in $\bm{\nabla}$\hspace{-1.2pt}$\cal{\bm{P}}$. Together these observations imply that ${\cal P}$\ is an appropriate space in which to describe the energetics of bond breaking and rearrangement. Investigation to explore the evolution of ${\cal P}$\ accompanying physical and chemical processes, across all classes of materials and molecules, will open the door to explanations of chemical phenomena as the manifestation of charge density redistribution within and among observable bonds and atoms. \section*{Acknowledgments} Support of this work under ONR Grant No. N00014-10-1-0838 is gratefully acknowledged. \bibliographystyle{unsrturl}
\section{Introduction} Object categories inherently form a hierarchy with different levels of concept abstraction, in which nodes closer to the root of the hierarchy refer to more abstract concepts while nodes closer to the leaves refer to finer-grained concepts. This hierarchy organization is especially important and obvious for fine-grained categories. For example, the fine-grained categories of birds (Aves) can be organized with a four-level hierarchy of order, family, genus and species, where an order consists of several families while a family consists of several genera, and so on. This category hierarchy provides very rich semantic correlations among categories across different levels, which can effectively regularize semantic space and provide extra guidance to attend more subtle regions for better recognition. For example, to recognize the fine-grained category of a given object (e.g., the species of a bird), we might first recognize its superclass (e.g., genus). Then, we prefer to concentrate on the fine-grained categories that are subject to this superclass and fixate on object parts that are more distinguishable among these fine-grained categories. Existing methods on fine-grained image recognition (FGIR) primarily focus on classifying categories of one particular level, e.g., categorizing 200 species of birds ~\cite{lin2015bilinear,zheng2017learning} or 431 models of cars ~\cite{hu2017deep}, and usually overlook this correlation information. In this work, we simultaneously predict categories of all levels in the hierarchy, and integrate this structured correlation information into the deep neural network to progressively regularize label prediction and guide representation learning. To this, we formulate a novel Hierarchical Semantic Embedding (HSE) framework that orderly predicts the score vector of each level, from highest to lowest. At each level, it incorporates the predicted score vector of the higher level as prior knowledge to learn finer-grained feature representation. This is implemented by a semantic guided attentional mechanism that learns to fixate on more discriminative regions for better distinguishing. During training, we also utilize the predicted score vector of the higher level as soft targets to regularize the label prediction, thus that the predicted result at this level finely accords with that predicted at the higher level. Caltech-UCSD birds dataset ~\cite{wah2011caltech} is the most widely used benchmark for evaluating the FGIR task. To evaluate our proposed HSE framework on this benchmark, we organize the 200 bird categories with a four-level hierarchy of 13 orders, 37 families, 122 genera, and 200 species according to the ornithological systematics ~\cite{salvador2017taxonomy,remsen2016revised}. In addition, we also create a new large-scale butterfly (namely Butterfly-200) dataset that also covers four-level categories for multi-granularity image recognition. Currently, this dataset consists of 200 prevalent species of butterflies, which are grouped into 116 genera, 23 sub-families, and 5 families according to the insect taxonomy ~\cite{verovnik2013annotated,sambhu2018butterflies}. It contains 25,279 images in total and at least 30 images per species. It's worth noting that these category hierarchies can be obtained from the literature of taxonomy ~\cite{salvador2017taxonomy,verovnik2013annotated} or directly retrieved from Wikipedia conveniently, thus the methods of embedding this structured information can be easily adapted to various domains. The major contributions of this work are concluded to three folds: 1) We formulate a novel Hierarchical Semantic Embedding (HSE) framework that integrates semantically structured information of category hierarchy into the deep neural network for FGIR. To our knowledge, this is the first work that explicitly incorporates this structured information to aid FGIR. 2) We introduce a four-level category hierarchy for the Caltech-UCSD birds dataset ~\cite{wah2011caltech} and construct a new large-scale butterfly dataset that also covers four-level categories for evaluation. To our knowledge, these two datasets are the first that involves in four-level categories in FGIR and they may benefit research on multi-granularity image recognition. 3) We conduct experiments on the two and the VegFru ~\cite{hou2017vegfru} datasets, and demonstrate the effectiveness of our proposed HSE framework over the baseline and existing state-of-the-art methods. Moreover, we also conduct ablative studies to carefully evaluate and analyze the contribution of each component of the proposed framework. \emph{The code, trained models, and dataset are available online: \url{https://github.com/HCPLab-SYSU/HSE}}. \section{Related Work} \subsection{Fine-grained image recognition} Recent progress on image classification mainly benefited from the advancement of deep Convolutional Neural Networks (CNNs) ~\cite{lecun1998gradient,krizhevsky2012imagenet,simonyan2014very,he2016deep,chen2018learning,chen2016disc} that learned powerful feature representation via stacking multiple nonlinear transformations. To adapt the deep CNNs for handling the FGIR task, a bilinear model ~\cite{lin2015bilinear} was proposed to compute high-order image representation that captured local pairwise interactions between features generated by two independent sub-networks, but the bilinear feature is extremely high-dimensional, making it impractical for subsequent analysis. To reduce the feature dimension while keeping comparable performance on FGIR task, Gao et al. ~\cite{gao2016compact} developed a compact model that approximates bilinear feature with the polynomial kernels. Kong et al. ~\cite{kong2016low} proposed classifier co-decomposition to further compress the bilinear model. To better capture subtle visual difference among sub-ordinate categories, a series works ~\cite{zhang2014part,huang2016part,zhang2016spda} were also proposed to leverage extra supervision of bounding boxes and parts to locate discriminative regions. However, the heavy involvement of manual annotations prevents these methods from application to large-scale real-world problems. Recently, visual attention models ~\cite{mnih2014recurrent,chen2018recurrent,wang2017multi,liu2018crowd} were intensively proposed to automatically search the informative regions and various works successfully applied this technique to FGIR ~\cite{liu2016fully,fu2017look,zheng2017learning,jaderberg2015spatial}. Liu et al. ~\cite{liu2016fully} formulated a reinforcement learning framework to adaptively glimpse local regions regarding discriminative object parts and trained the framework using a greedy reward strategy with image-level labels. Zheng et al. ~\cite{zheng2017learning} introduced a multi-attention convolutional neural network that learned channel grouping for parts localization, and aggregated features from the located regions as well as the global object for classification. These works learned to locate informative regions merely based on image content by the self-attention mechanism. In contrast, some works also introduced extra guidance to learn more meaningful and semantic-related regions to aid FGIR. For example, Liu et al., ~\cite{liu2017localizing,chen2018knowledge} introduce part-based attribute to guide learning more discriminative features for fine-grained bird recognition. Similarly, He et al. ~\cite{he2017fine} further utilized more detailed language descriptions to help mine discriminative parts or characteristics. Our framework is also related to some existing works that exploit category hierarchy. For example, Srivastava et al. ~\cite{srivastava2013discriminative} exploited class hierarchy prior to transfer knowledge among similar lower-level classes for transfer learning. Jia et al. ~\cite{deng2014large} proposed a probabilistic classification model based on a hierarchy and exclusion graph to capture label relations of mutual exclusion, overlap, and subsumption for object classification. Works ~\cite{wang2016cnn,chen2018recurrent} utilized an RNN to model label co-occurrence dependencies for multi-label recognition. In contrast to these methods that merely model dependencies on label space, our HSE framework introduces the hierarchical information to progressively regularize label prediction and simultaneously guide learning finer-grained feature representation. Besides, using predicted results of the higher level as soft targets for label regularization can distill knowledge learned from the high level to lower level, which is also original compared with these methods. \begin{figure*}[!t] \centering{} \includegraphics[width=0.90\linewidth]{./framework.pdf} \caption{An overall pipeline of our proposed hierarchical semantic embedding framework. It employs a trunk network to extract image features and subsequently utilizes a branch network to predict the categories of each level. At each level, it incorporates the predicted score vector to guide learning finer-grained feature and simultaneously regularizes label prediction during training.} \label{fig:framework} \end{figure*} \subsection{Fine-grained image datasets} In the past decade, datasets of FGIR have intensively emerged across various domains ranging from man-made objects to natural plants or animals, including FGVC-Aircraft ~\cite{maji2013fine}, Stanford Cars ~\cite{krause20133d}, Caltech-UCSD birds ~\cite{wah2011caltech}, Stanford Dogs ~\cite{khosla2011novel}, Oxford Flowers ~\cite{nilsback2008automated}, to name a few. As a representative dataset that was widely used in previous FGIR works ~\cite{liu2017localizing,gao2016compact,he2017fine}, Caltech-UCSD birds dataset contained 11,788 images and covered 200 species of birds. These datasets significantly evolved the research of FGIR, but they primarily focus on categories of one certain level, e.g., Caltech-UCSD birds with 200 species of birds and Stanford Dogs with 120 breeds of dogs. More recently, there also released some datasets that involved categories of multiple levels, like CompCars ~\cite{yang2015large}, Boxcars ~\cite{sochor2016boxcars}, Cars-333 ~\cite{xie2014hyper} with three-level car categories of make, model, and year, and VegFru ~\cite{hou2017vegfru} with 25 upper-level categories and 292 sub-ordinate classes of vegetables and fruits. These datasets mainly include man-made vehicles ~\cite{yang2015large,sochor2016boxcars,xie2014hyper} and domestic food materials ~\cite{hou2017vegfru}. To better evaluate our proposed frameworks and increase the diversity of dataset with categories of multiple levels, we further organize the 200 bird species with four-level category hierarchy and construct a new butterfly dataset that also covers four-level categories. Besides the research on FGIR with categories of multiple levels, these two datasets have potential to benefit practical applications of wildlife recognition, protection, and discovery. \section{HSE Framework} In this section, we describe the proposed HSE framework in detail. Given an image, the framework first utilizes a trunk network to extract image feature maps $\mathbf{f}_I \in \mathcal{R}^{W' \times H' \times C'}$, where $W'$, $H'$ and $C'$ denote the width, height and channel number of the feature maps, respectively. Then, it orderly utilizes a small branch network to predict the score vectors of all levels, from highest to lowest. At each level, the branch network incorporates the predicted score vector of higher level as prior guidance to learn finer-grained representation via a soft attention mechanism and aggregates this representation with features learned without guidance to predict the score vector of this level. During training, we further use the predicted score vector of higher level as soft targets to regularize the label prediction, such that the predicted result at this level tends to accord with that predicted at the higher level. Since there is no guidance at the first level, we merely use the representation learned without guidance to make prediction and no label regularization is involved either. Fig. \ref{fig:framework} gives an overall illustration of the HSE framework. Before delving deep into the formulation, we first present some notations associated with our task that will be used throughout this article. Without loss of generality, we consider the FGIR task with a category hierarchy of $L$ levels. We utilize $l_1$, $l_2$, $\dots$, $l_L$ to denote each level and $\mathbf{s}_{1}$, $\mathbf{s}_{2}$, $\dots$, $\mathbf{s}_{L}$ to denote the predicted score vectors correspondingly. $n_1$, $n_2$, $\dots$, $n_L$ are used to represent the category number for each level, respectively. \subsection{Semantic embedding representation learning} As we orderly predict the score vector of each level, $\mathbf{s}_{i-1}$ is given when making prediction at level $l_i$. Generally, $\mathbf{s}_{i-1}$ encodes the category that the object of the given image belongs to with a high probability at level $l_{i-1}$, and make prediction at level $l_i$ may tend to distinguish the sub-ordinate categories of this category. As discussed above, some certain parts play key roles to distinguish the sub-ordinate categories of a superclass. In this work, we take full advantage of this information by incorporating $\mathbf{s}_{i-1}$ to guide learning finer-grained feature representation at level $l_i$. Naturally, this can be implemented by a soft mechanism that learns to fixate on the discriminative regions under the guidance of $\mathbf{s}_{i-1}$. At level $l_i$, we first map the image feature maps $\mathbf{f}_I$ to higher-level features $\hat{\mathbf{f}}_i \in \mathcal{R}^{W \times H \times C}$ via \begin{equation} \hat{\mathbf{f}}_i=\phi_i(\mathbf{f}_I), \end{equation} where $\phi_i(\cdot)$ is a transformation that is implemented by a small network. Then, at each location $(w, h)$, we introduce a shared attentional mechanism $a_i(\cdot)$ to compute the attention coefficient vector under the guidance of $\mathbf{s}_{i-1}$ by \begin{equation} \hat{\mathbf{e}}_{iwh}=a_i([\hat{\mathbf{f}}_{iwh}, \varphi_i(\mathbf{s}_{{i-1}})]), \end{equation} where $\hat{\mathbf{e}}_{iwh}=\{\hat{e}_{iwh1}, \hat{e}_{iwh2}, \dots, \hat{e}_{iwhC}\}$ denote the importance of each neuron of feature vector $\mathbf{f}_{iwh}$. In the equation, $\varphi_i(\cdot)$ is a linear transformation that transforms $s_{i-1}$ to a semantic feature vector. To make the coefficients easily comparable across different channels, we normalize the coefficients across all the locations of each channels $c$ using a softmax function \begin{equation} e_{iwhc}=\frac{\exp(\hat{e}_{iwhc})}{\sum_{w', h'}{\exp(\hat{e}_{iw'h'c})}}. \end{equation} In this way, we can obtain $\mathbf{e}_{iwh}=\{e_{iwh1}, e_{iwh2}, \dots, e_{iwhC}\}$ denoting the normalized weight of each neuron of feature vector $\mathbf{f}_{iwh}$. Finally, we perform weighted average across all locations of each channel to produce the final finer-grained features \begin{equation} \mathbf{f}_i=\sum_{w,h}{\mathbf{e}_{iwh} \odot \hat{\mathbf{f}}_{iwh}}, \end{equation} where $\odot$ denotes the element-wise multiplication operation. As the feature vector $\mathbf{f}_i$ pays much attention to the local discriminative regions that may tend to capture subtle difference for distinguishing sub-ordinate categories of a superclass. It may ignore the overall description of the object and some background information that may provide contextual cues. Thus, we further extract a feature vector directly from the image feature maps $\mathbf{f}_I$ without guidance for complementary. Similarly, we also adopt a simple transformation $\psi_i(\cdot)$ on $\mathbf{f}_I$ by \begin{equation} \hat{\mathbf{f}}'_i=\psi_i(\mathbf{f}_I), \end{equation} where $\hat{\mathbf{f}}'_i \in \mathcal{R}^{W \times H \times C}$. Similar to ~\cite{he2016deep}, we simply perform average pooling to obtain the feature vector \begin{equation} \mathbf{f}'_i=\frac{1}{WH}\sum_{w,h}{\hat{\mathbf{f}}'_{iwh}}. \end{equation} The obtained feature vectors $\mathbf{f}'_i$, $\mathbf{f}_i$ and the concatenation of them $[\mathbf{f}_i, \mathbf{f}'_i]$ are fed to three classifiers to predict the score vectors independently, which are then averaged to produce the final score vector $\mathbf{s}_i$. \noindent\textbf{Network details. }Similar to recent FGIR works ~\cite{liu2016fully,liu2017localizing}, we implement our framework based on the widely used ResNet-50 ~\cite{he2016deep}. Specifically, we implement the trunk network with the preceding 41 convolutional layers of the ResNet-50, and the transformations of $\phi_i(\cdot)$, $\psi_i(\cdot)$ with the following 9 layers of the ResNet-50. We make the trunk network be shared across different levels to better balance prediction accuracy and computational efficiency. $\varphi_i(\cdot)$ is simply implemented by a single fully connected layer that map the $c$-dim score vector to a 1,024-dimemsion features and the attention mechanism $a_i(\cdot)$ is implemented by two stacked fully connected layers, in which the first one is $c$+1,024 to 1,024 followed by the tanh non-linear function and the second one is 1,024 to $c$. As we use the identical architecture with ResNet-50, $c$ is 2,048 in this paper. \begin{figure}[!t] \centering{} \includegraphics[width=0.8\linewidth]{./lg.pdf} \caption{An illustration of the semantic guided label regularization. Top: correlations among categories of level $l_{i-1}$ and $l_i$. Bottom: $\mathbf{s}_{i-1}$ is first extended to $\mathbf{s}'_{i-1}$ according to the structured correlations and $\mathbf{s}_i$ is pulled close to $\mathbf{s}'_{i-1}$ for regularization.} \label{fig:label-regularization} \end{figure} \subsection{Semantic guided label regularization} The hierarchy encodes rich semantic correlations among categories across different levels. For example, the ground truth category at level $l_i$ is the child sub-category of the ground truth category at level $l_{i-1}$. This correlation information can effectively regularize semantic space and thus make prediction less ambiguous. These correlations should also be maintained among predicted categories of different levels. To this, we incorporate $\mathbf{s}_{i-1}$ as soft targets to regularize label prediction at level $l_i$. Given the predicted score vector $\mathbf{s}_{i-1}=\{s_{i-1,1}, s_{i-1,2}, \dots, s_{i-1,n_{i-1}}\}$, a high value $s_{i-1, c}$ denotes high confidence that the object in given image belongs to category $c$ at level $l_{i-1}$, and the predicted scores for the corresponding child sub-categories at level $l_i$ should also be assigned with high values. To this, we first extend $\mathbf{s}_{i-1}$ to $\mathbf{s}'_{i-1}$ according to the structured correlations thus that $\mathbf{s}'_{i-1}$ has the same dimension as $\mathbf{s}_i$ and pull $\mathbf{s}_i$ close to $\mathbf{s}'_{i-1}$, as shown in Fig. \ref{fig:label-regularization}. Concretely, if category $c$ at level $l_{i-1}$ has $k$ child sub-categories at level $l_i$, we duplicate the score $s_{i-1, c}$ by $k$ times. Then we orderly get these duplicated scores together and re-arrange their subscripts to obtain the extended score vector $\mathbf{s}'_{i-1}=\{s'_{i-1,1}, s'_{i-1,2}, \dots, s'_{i-1,n_{i}}\}$. To make these two vectors easily comparable, we normalize them into probability distribution using the softmax function with temperature $T$ \begin{equation} {p}'^T_{i-1,c}=\frac{\exp(\frac{s'_{i-1,c}}{T})}{\sum_{c'}{\exp(\frac{s'_{i-1,c'}}{T})}}, p^T_{i,c}=\frac{\exp(\frac{s_{i,c}}{T})}{\sum_{c'}{\exp(\frac{s_{i,c'}}{T})}}, \end{equation} where $T$ is normally set to 1, and we use a high temperature to produce softer probability distribution over classes in our experiment. In this way, we can obtain two normalized probability distributions, i.e., $\mathbf{p}'^T_{i-1}=\{{p}'^T_{i-1,1}, {p}'^T_{i-1,2}, \dots, {p}'^T_{i-1,n_{i}}\}$ and $\mathbf{p}^T_{i}=\{p^T_{i,1}, p^T_{i,2}, \dots, p^T_{i,n_{i}}\}$, and define a regularization term as the Kullback-Leibler divergence from $\mathbf{p}^T_i$ to $\mathbf{p}'^T_{i-1}$ \begin{equation} \ell_i^r=D_{KL}(\mathbf{p}'^T_{i-1} || \mathbf{p}^T_i)=-\sum_{c}{p}'^T_{i-1, c}\log{\frac{p^T_{i, c}}{{p}'^T_{i-1, c}}}. \end{equation} As $\ell_i^r$ is defined on a single sample, we simply sum up $\ell_i^r$ over the training set to define the regularization loss term $\mathcal{L}_i^r$. As suggested in ~\cite{hinton2015distilling}, when using soft targets that have high entropy, more information can be provided than hard target per training sample, and the gradient between training samples enjoy less variance. Thus, it can be trained more steadily and using much less training samples. In our experiments, $T$ is set as 4 to produce a sufficiently soft target. \subsection{Optimization} Besides the regularization term, we also employ the cross-entropy loss with the correct labels as the objective function. We first normalize the predicted score vector using exactly the same logits in softmax function but at a normal temperature of 1, expressed as \begin{equation} p_{i,c}=\frac{\exp({s_{i,c}})}{\sum_{c'}{\exp({s_{i,c'}})}}. \end{equation} Then suppose the ground truth label at level $l_i$ is $c_i$, its loss can be defined as \begin{equation} \ell_i^c=-\sum_{c}\mathbf{1}(c=c_i)\log{p_{i,c}}, \end{equation} where $\mathbf{1}(\cdot)$ is the indication function that is assigned as 1 if the expression is true, and assigned as 0 otherwise. We have define the same loss for the score vectors predicted by the three classifier, respectively. Thus, each sample has four losses, and we sum up the four losses over the training set to define the classification loss $\mathcal{L}_i^c$. The proposed framework consists of a trunk network and $L$ branch network, and it is trained using a weighted combination of the classification and regularization losses. The training process is empirically divided into two stages, i.e. level-wise training followed by joint fine tuning. \noindent\textbf{Stage 1: Level-wise training. } When training the branch network of level $l_i$, it needs the predicted score vector of level $l_{i-1}$ to define the regularization loss. Thus, we first train the branch networks in a level-wise manner, from level $l_1$ to $l_L$. As our framework is implemented based on the ResNet-50 ~\cite{he2016deep}, we initialize the parameters with those of the corresponding layers of ResNet-50 pre-trained on the ImageNet dataset ~\cite{deng2009imagenet}. Concretely, the parameters of the trunk network are initialized by those of the corresponding 41 convolutional layers and the parameters of the transformation $\phi_i(\cdot)$ and $\psi_i(\cdot)$ are initialized with those of the 9 corresponding layers. The parameters of other modules, including the attentional mechanism $a_i(\cdot)$, semantic mapper $\varphi_i(\cdot)$ and the three classifiers, are automatically initialized with the Xavier algorithm ~\cite{glorot2010understanding}. As the trunk network is shared by all branch networks, its parameters are kept fixed at this stage. We train the branch network of level $l_i$ with a weighted combination of the classification and regularization losses \begin{equation} \mathcal{L}_i=\mathcal{L}_i^c + \gamma \mathcal{L}_i^r, \end{equation} where $\gamma$ is a balance parameter. As discussed in ~\cite{hinton2015distilling}, the magnitudes of the gradients produced by $\mathcal{L}_i^r$ are scaled by $\frac{1}{T^2}$, thus it is important to multiply them by a scale of $T^2$. Thus, we set $\gamma$ as $T^2$, i.e., 16 in our experiments. Note that we merely use the classification loss $\mathcal{L}_1^c$ to train the branch network of level $l_1$, as there is no guidance to define the regularization loss term at this level. Similar to previous works ~\cite{liu2016fully,lin2015bilinear} on FGIR task, we resize the input images to $512 \times 512$ and perform randomly cropping with a size of $448 \times 448$ and their horizontal reflections for data augmentation. Then, we train the branch network using the stochastic gradient descent (SGD) algorithm with a batch size of 8, a momentum of 0.9 and a weight decay of 0.00005. The initial learning rate is set as 0.001, and it is divided by 10 when the error plateaus. \noindent\textbf{Stage 2: Joint fine tuning. }After all branch networks are trained, we jointly fine tune the entire framework by combining the loss terms over all granularities \begin{equation} \mathcal{L}=\mathcal{L}_1^c+\sum_{i=2}^L{\mathcal{L}_i}. \end{equation} We adopt the same strategies for data augmentation and hyper-parameter setting as Stage 1 except using a smaller initial learning rate 0.0001. \begin{table*}[htp] \centering \begin{tabular}{c|c|c|c|c||c|c|c|c} \hline & \multicolumn{4}{c||}{CUB} &\multicolumn{4}{c}{Butterfly-200} \\ \hline \centering Methods & $l_1$: order & $l_2$: family & $l_3$: genus & $l_4$: species & $l_1$: family & $l_2$: sub-family & $l_3$: genus & $l_4$: species\\ \hline \hline Baseline & 98.8 & 95.0 & 91.5 & 85.2 & 98.9 & 97.6 & 94.8 & 85.1 \\ Baseline+backtrack & 98.6 & 95.1 & 90.9 & 85.2 & 98.7 & 97.2 & 94.1 & 85.1 \\ \hline \hline Ours w/o SERL & 98.8 & 95.1 & 91.9 & 86.6 & 98.9 & 97.4 & 95.3 & 85.8\\ Ours w/o SGLR & 98.8 & 95.6 & 92.2 & 86.7 & 98.9 & 97.6 & 95.1 & 85.5 \\ Ours (full) & \textbf{98.8} & \textbf{95.7} & \textbf{92.7} & \textbf{88.1} & \textbf{98.9} & \textbf{97.7} & \textbf{95.4} & \textbf{86.1} \\ \hline \end{tabular} \caption{Comparison of the accuracy (in \%) of all levels of our HSE framework, two baseline methods, and two variants of our framework that removes semantic embedding representation learning (Ours w/o SERL) and that removes semantic guided label regularization (Ours w/o SGLR) on the CUB and Butterfly-200 test sets, respectively.} \label{table:result1} \end{table*} \section{Datasets} We construct a new large-scale butterfly (Butterfly-200) dataset with four-level categories and organize the 200 bird species of the Caltech-UCSD Birds (CUB) dataset also with four-level categories. We evaluate our proposed framework, the baseline methods and the existing competitors on these two and the VegFru ~\cite{hou2017vegfru} datasets. In this section, we first introduce these three datasets. \begin{figure}[!t] \centering \includegraphics[width=1.0\linewidth]{./mm-dataset.pdf} \caption{Some samples and their corresponding hierarchical labels from the family of "Pieridae" in the Butterfly-200 dataset (the first two rows) and from the order of "Passeriformes" in the CUB dataset (the last two rows).} \label{fig:dataset} \end{figure} \subsection{Butterfly-200 dataset construction} We select 200 common species of butterflies and build the hierarchical structure with 116 genera, 23 subfamilies, and 5 families according to the insect taxonomy. The butterfly images are collected from two scenarios, natural images with the butterfly in their natural living environment and standard images with the butterfly in the form of specimens, as both are widely used in the real-world applications. The natural images are collected by searching the keywords of butterfly species names on the internet including Google, Flicker, Bing, Baidu, etc. The standard images are collected by capturing the samples in Lab. In this way, a large number of candidate images for each species are collected. To ensure the dataset highly reliable, the candidate images are carefully identified by four experts on butterflies. Currently, we have collected 25,279 butterfly images of the 200 species, with each species containing 30 images at least, which are divided into training, validation, and test set for evaluation. For each species, we randomly select 20\% for training, 20\% for validation and the rest 60\% for test, resulting in a training of 5,135 images, a validation set of 5,135 images, and a test set of 15,009 images, respectively. Figure \ref{fig:dataset} shows some samples from the family of "Pieridae" and their corresponding hierarchical labels. \subsection{Caltech-UCSD birds dataset extenstion} The CUB dataset ~\cite{wah2011caltech} is the most widely used benchmark for FGIR task. It covers 200 species of birds and contains 11,788 bird images that are divided into a training set of 5,994 images and a test set of 5,794 images. In this work, we build a bird taxonomy hierarchy according to the ornithological systematics, which groups the 200 species into 122 genera, 37 families, and 13 orders. We follow the standard train/test split as ~\cite{wah2011caltech} for evaluation. Figure \ref{fig:dataset} also shows some samples from the order of "Passeriformes" and their corresponding hierarchical labels. \subsection{VegFru dataset introduction} VegFru ~\cite{hou2017vegfru} is a newly released large-scale dataset for fine-grained vegetables and fruits recognition. It covers two-level categories of 25 upper-level categories and 292 subordinate classes. The dataset contains 160,731 images in total, including a training set of 29,200 images, a validation set of 14,600 images, and a test set of 116,931 images. Similarly, we follow this standard train/val/test splits as ~\cite{hou2017vegfru} to evaluate our HSE framework and the existing methods for fair comparison. \section{Experiment} \subsection{Significance of semantic embedding} We first implement two baseline methods that use network architecture similar to ours but do not consider the structured correlations to demonstrate the effectiveness of the proposed HSE framework. \noindent\textbf{Baseline. }Similar to our framework, we utilize a trunk network to extract image features and then utilize four small networks to predict the category of all levels, separately. For fair comparison, we also implement the trunk network with the preceding 41 convolutional layers of the ResNet-50 and the small network with the following 9 layers. \noindent\textbf{Baseline+backtrack. }We utilize the baseline methods to predict the category of the finest level, and backtrack through the hierarchy to obtain the categories of the other levels. We compare the HSE with these two baseline methods on the CUB and Butterfly-200 datasets in Table \ref{table:result1}. Here, we present the accuracies of all levels for comprehensive comparisons. At level $l_1$, we find the HSE achieves comparable accuracies with those of the two baseline methods, as there is no semantic guidance at this level. However, at level $l_2$ to $l_4$, the HSE performs consistently better than the baseline methods on both datasets. For example on the CUB dataset, the HSE achieves accuracies of 95.7\%, 92.7\%, and 88.1\%, outperforming the baseline methods by 0.6\%, 1.2\%, and 2.9\%, respectively. It is noteworthy that the improvement is more obvious for predicting categories of finer levels, e.g., 1.2\% accuracy improvement at level $l_3$ while 2.9\% at level $l_4$ on the CUB dataset. This phenomenon suggests that incorporating semantic correction information benefits more to challenging tasks. To delve deep into the effect of semantic embedding on network learning, we further present the curve of loss v.s. training epoch on the training set and the curve of accuracy v.s. training epoch on the test set in Fig \ref{fig:training-curve}. These experiments are conducted on recognizing the category of $l_4$ on the CUB dataset. Compared with the baseline, the HSE can be trained more stably and converged faster. \begin{figure}[!t] \centering \subfigure[]{ \includegraphics[width=0.48\linewidth]{loss.pdf}} \subfigure[]{ \includegraphics[width=0.48\linewidth]{acc.pdf}} \caption{Analysis of the effect of semantic embedding on network learning. These experiments are conducted on categories at level $l_4$ on the CUB dataset. (a) and (b) are the curves of loss v.s. training epoch on the training set and accuracy v.s. training epoch on the test set, respectively.} \label{fig:training-curve} \end{figure} The foregoing comparisons with the baseline methods demonstrate the effectiveness of the HSE as a whole. Actually, the HSE incorporates the semantic correlation information from two aspects, i.e., semantic embedding representation learning (SERL) and semantic guided label regularization (SGLR). Here, we further conduct ablative studies to assess the actual contributions of these two components. \noindent\textbf{Contribution of semantic guided label regularization (SGLR). }We first evaluate the contribution of SGLR by comparing the performance with and without regularization loss. Specifically, we simply remove the regularization loss terms of each level with others keep fixed and re-train the model in an identical way. As shown in Table \ref{table:result1}, removing this term leads to an obvious drop in performance over all levels on both datasets. \begin{figure}[!t] \centering \subfigure[]{ \includegraphics[width=0.48\linewidth]{error_cub.pdf}} \subfigure[]{ \includegraphics[width=0.48\linewidth]{error_btf.pdf}} \caption{Sample number of inter-superclass and intra-superclass errors of our framework with and without SGLR on the (a) CUB and (b) Butterfly-200 datasets.} \label{fig:error} \end{figure} We further analyze how SGLR improves the performance. When the category of an image is wrongly predicted, we denote it as an inter-superclass error if the wrongly predicted category and ground truth category do not belong to the same superclass, and denote it as an intra-superclass error if they belong to the same superclass. As discussed before, SGLR regularizes label prediction thus that the predicted category at level $l_i$ tends to be the child sub-category of the predicted category at level $l_{i-1}$. Thus, this tends to help correct the inter-superclass error. To validate this, we present the sample number of inter-superclass and the intra-superclass errors at level $l_4$ of our HSE with and without SGLR on both datasets. As shown in Fig. \ref{fig:error}, introducing SGLR mainly reduces the sample number of inter-superclass error (17.5\% relative reduction on the CUB dataset and 13.5\% on the Butterfly-200 dataset), finely in accordance with our motivation. \noindent\textbf{Contribution of semantic embedding representation learning (SERL). }Here, we evaluate the benefit of SERL. To this, we remove the feature embedding module (i.e., $\phi_i$ and $a_i$) and simply use the feature without guidance for recognition. To ensure fair comparisons, we also re-train the model with both of the classification and regularization losses. Similarly, the performance at each level suffers from an evident drop on both datasets. As discussed before, SERL helps to attend regions that help to distinguish sub-ordinate categories of the predicted superclass of the higher level. Here, we visualize the attentional regions learned by our HSE framework in Fig. \ref{fig:vis}. At each row, we present some samples of a specific species, and the first two species belong to the same genus while the last two belong to another genus. For the samples from different species of the same genus, our framework actually attends discriminative regions to better distinguish these species. For example, to differentiate the species of ``Bohemian Waxwing'' and ``Cedar Waxwing'' that belong to the genus of ``Phoebastria'', the HSE pay much attention to the throat and wing tail regions that provide most discriminative information. \begin{figure}[!t] \centering \includegraphics[width=0.98\linewidth]{./visualization.pdf} \caption{Visualization of the attentional regions learned by the HSE framework. At each row, we present some samples of a specific species, and the first two species belong to the same genus while the last two belong to another genus.} \label{fig:vis} \end{figure} \subsection{Comparison with state-of-the-art methods} In this subsection, we compare the HSE framework with existing state-of-the-art methods on the CUB ~\cite{wah2011caltech} and VegFru ~\cite{hou2017vegfru} datasets. Here, we evaluate on recognizing the categories of the finest level (200 species on CUB and 292 subcategories on VegFru) as existing methods primarily report their results of this level. \noindent\textbf{Comparison on Caltech-UCSD birds dataset. } CUB dataset is the most widely used benchmark for FGIR task, and most works have reported their results on this dataset. We compare our HSE framework with 17 state-of-the-art methods, including Deep Localization, Alignment and Classification (DeepLAC) ~\cite{lin2015deep}, Semantic Part Detection and Abstraction (SPDA-CNN) ~\cite{zhang2016spda}, Part-RCNN ~\cite{zhang2014part}, Part Alignment-based (PA-CNN) ~\cite{krause2015fine}, Pose Normalized CNN (PN-CNN) ~\cite{branson2014bird}, Picking Deep Filter Responses (PDFR) ~\cite{zhang2016picking}, Multiple Granularity (MG-CNN) ~\cite{wang2015multiple}, Spatial Transformer (ST-CNN) ~\cite{jaderberg2015spatial}, Bilinear-CNN (B-CNN) ~\cite{lin2015bilinear}, Compact Bilinear CNN (CB-CNN) ~\cite{gao2016compact}, Two-Level Attention Network (TLAN) ~\cite{xiao2015application}, Diverse Attention Network (DAN) ~\cite{zhao2017diversified}, Fully Convolutional Attentional Network (FCAN) ~\cite{liu2016fully}, Recurrent Attention (RA-CNN) ~\cite{fu2017look}, Combine Vision and Language (CVL) ~\cite{he2017fine}, Attribute-Guided Attention Localization (AGAL) ~\cite{liu2017localizing}, Multi-Attentional CNN (MA-CNN) ~\cite{zheng2017learning}. Among these methods, some use merely image-level labels (i.e., image-level setting), and some also use bounding box/parts annotations (i.e., box-level setting); thus we also present these information for fair and direct comparisons. \begin{table}[!t] \centering \begin{tabular}{c|c|c|c} \hline \centering Methods & BA & PA & Acc. (\%) \\ \hline \hline Part-RCNN ~\cite{zhang2014part} & $\surd$ & $\surd$ & 76.4 \\ DeepLAC ~\cite{lin2015deep} & $\surd$ & $\surd$ & 80.3 \\ SPDA-CNN ~\cite{zhang2016spda} & $\surd$ & $\surd$ & 85.1 \\ PN-CNN ~\cite{branson2014bird} & $\surd$ & $\surd$ & 85.4 \\ Part Alignment-CNN ~\cite{krause2015fine} & $\surd$ & & 82.8 \\ CB-CNN w/ bbox ~\cite{gao2016compact} & $\surd$ && 84.6 \\ FCAN w/ bbox ~\cite{liu2016fully} & $\surd$ & & 84.7 \\ B-CNN w/ bbox ~\cite{lin2015bilinear} & $\surd$ & & 85.1 \\ AGAL w/ bbox ~\cite{liu2017localizing} & $\surd$ & & 85.5 \\ \hline \hline TLAN ~\cite{xiao2015application} & & & 77.9 \\ DVAN ~\cite{zhao2017diversified} & & & 79.0 \\ MG-CNN ~\cite{wang2015multiple} & & &81.7 \\ B-CNN w/o bbox ~\cite{lin2015bilinear} & & & 84.1 \\ ST-CNN ~\cite{jaderberg2015spatial} & & & 84.1 \\ FCAN w/o bbox ~\cite{liu2016fully} & & & 84.3 \\ PDFR ~\cite{zhang2016picking} & & & 84.5 \\ CB-CNN w/o bbox ~\cite{gao2016compact} &&& 85.0 \\ RA-CNN ~\cite{fu2017look} & & & 85.3 \\ AGAL w/o bbox ~\cite{liu2017localizing} & & & 85.4 \\ CVL ~\cite{he2017fine} & & & 85.6 \\ MA-CNN ~\cite{zheng2017learning} & & & 86.5\\ \hline \hline Ours & & & \textbf{88.1} \\ \hline \end{tabular} \caption{Comparisons of our HSE framework with existing state of the arts on recognizing categories of level $l_4$ on the CUB dataset. BA and PA denote bounding box annotations and part annotations, respectively. $\surd$ indicates corresponding annotations are used during training or test. } \label{table:cub-sota} \end{table} Under the box-level setting, the previous well-performing methods include PN-CNN and B-CNN that achieve accuracies of 85.4\% and 85.1\%. However, PN-CNN requires strong supervision of both human-defined bounding box and ground truth parts while B-CNN relies on a very high-dimension feature representation (250k dimensions). Under the image-level setting, most works resort to attentional model that automatically search the discriminative regions and aggregate deep features of these regions for classification. For example, MA-CNN learns to attend multiple discriminative regions, and adopt a CNN to extract the global feature from the whole and multiple part-CNNs to extract the local feature from each attentional regions. It achieves an accuracy of 86.5\%, which is the best among existing methods. Different from these methods, our HSE framework requires no bounding box and part annotations and does not use multiple CNN to extract local and global features. Instead, it embeds structure information of category hierarchy to learn fine-grained feature representation and regularize label prediction, leading to obvious performance improvement, i.e., 88.1\% in accuracy. Note that our HSE introduces extra guidance of the category hierarchy. However, this hierarchy can be easily obtained from the literature of taxonomy or retrieved from the Wikipedia. Besides, we also compare with existing methods that also rely on extra supervisions, like AGAL requiring attribute annotations and CVL depending on sentence description. Our HSE achieves an accuracy of 88.1\%, much better than theirs, i.e., 85.5\% and 85.6\%, respectively. \noindent\textbf{Comparison on VegFru dataset. }VegFru is a newly released large-scale dataset for fine-grained vegetables and fruits recognition, and some works also report their results on this dataset. Here, we also present comparisons with the baseline and existing methods on this dataset in Table \ref{table:vegfru}. As shown, the HSE also significantly outperforms all these methods. \begin{table}[htp] \centering \begin{tabular}{c|c} \hline \centering Methods & Acc. (\%) \\ \hline \hline Baseline & 87.1 \\ \hline \hline CB-CNN ~\cite{gao2016compact} & 82.2 \\ HybridNet ~\cite{hou2017vegfru} & 83.5 \\ \hline \hline Ours (full) & \textbf{89.4} \\ \hline \end{tabular} \caption{Comparison of accuracy of our HSE framework, existing state-of-the-art methods, and the baseline methods on the VegFru dataset. } \label{table:vegfru} \end{table} \section{Conclusion} Fine-grained categories naturally form a hierarchy with different levels of concept abstraction, and this hierarchy encodes rich correlations among categories across different levels. In this work, we investigate simultaneously predicting categories of all levels in the hierarchy and integrating this structured correlation information into the deep neural network by developing a novel Hierarchical Semantic Embedding (HSE) framework. Specifically, the HSE orderly predicts the score vector for each level, and at each level, it incorporates the predicted score vector of the higher level to guide learning finer-grained feature representation and simultaneously regularize label prediction during training. To evaluate the HSE framework, we extend the Caltech-UCSD birds with four-level categories and construct a butterfly dataset also with four-level categories. Extensive experiments and thorough analysis on these two and the VegFru datasets demonstrate the superiority of the proposed HSE framework over the baseline methods and existing competitors. \section*{Acknowledgement} We would like to thank Prof. Min Wang, Associate Prof. XiaoLing Fan, Dr. Haiming Xu, and Dr. Hailing Zhuang with Department of Entomology, College of Agriculture, South China Agricultural University for their assistance in butterfly image annotations. This work was supported in part by the Chinese National Science Foundation (NSFC No. 61702196), and Science and Technology Planning Project of Guangdong Province, China (No. 2017A020208041). This work is jointly supported by State Key Development Program under Grant 2018YFC0830103. \bibliographystyle{ACM-Reference-Format}
\section{Introduction}\label{sec:0} Through the current observations such as Type Ia Supernovae~\cite{SN}, cosmic microwave background (CMB) radiation~\cite{CMB}, large scale structure~\cite{LSS}, baryon acoustic oscillations (BAO)~\cite{Eisenstein:2005su} and weak lensing~\cite{Jain:2003tba}, it has been revealed that the cosmic expansion is accelerating at the present time as well as in the early universe at the inflationary stage~\cite{Inflation}. Two main approaches have been proposed in order to account for the late-time accelerated expansion of the universe. The first is the way of assuming the existence of dark energy in the framework of general relativity. The second is that of modifying the theories of gravitation at the large-scales (for recent reviews on the theories of modified gravity and the issue of dark energy, see, for instance,~\cite{M-G-Reviews}). In addition, more recently, LIGO has detected that in the coalescence phase, strong gravitational waves are emitted by the system of two black holes~\cite{Abbott:2016blz}. The first event was the emission from black holes whose masses are about 30 solar ones and the following ones are those from some-black-holes mergers~\cite{Abbott:2016nmj, Abbott:2017vtc, Abbott:2017oio, Abbott:2017gyy}. Furthermore, strong gravitational waves have been discovered from the two-neutron-stars collision~\cite{TheLIGOScientific:2017qsa}, and this fact led to the multi messenger astronomy. For $f(R)$ gravity and the scalar-tensor theories~\cite{Nojiri:2017hai}, with the Neutron Star Merger GW170817~\cite{{TheLIGOScientific:2017qsa}}, the cosmological bounds have been studied. Also, by using GW150914 and GW151226~\cite{TheLIGOScientific:2016src, Abbott:2016nmj, TheLIGOScientific:2016pea}, the observational constraints on modified gravity theories have been examined~\cite{DeLaurentis:2016jfs}. Gravitational waves in the context of modified gravity theories have been analyzed~\cite{Capozziello:2007zza, Capozziello:2008fn, Capozziello:2008rq, Bellucci:2008jt, Bogdanos:2009tn, Capozziello:2017vdi,Bamba:2018cup}. Under such current situations, it is very significant to investigate the solutions of spherically symmetric solutions that could describe black holes, which are the sources emitting gravitational waves, in modified gravity theories in detail so that we can find some clues to deduce information of fundamental physics in strong gravity regions. The various laws of conservation such that energy conservation, momentum conservation, angular momentum conservation, etc., are directly related with symmetries of a given dynamical system and provide the integrals of motion which are indeed the result of existence of some kinds of symmetry in that system. Using the Noether Symmetry Approach, it is possible to obtain conserved quantities asking for the symmetries of the Lagrangian. The existence of some kinds of symmetry for the Euler-Lagrange equations of motion possessing a Lagrangian would immediately be connected with the Noether symmetry. Even if there is no any specific theory favored by the Noether symmetry approach, the discussions from the literature \cite{noether} point out that the existence of Noether symmetries is capable of selecting suitable gravity theory and then to integrate dynamics by using the first integrals corresponding to the Noether symmetries. A consequent process with regard to the first integrals due to the Noether symmetries allows to achieve exact solutions of the dynamical equations for the gravity theory. Furthermore, it should be noted that the Noether symmetries are not only a mathematical tool to solve or reduce dynamics but also their existence allows to select observable universes/black holes/wormholes etc. and to select analytical models related to observations \cite{capo2012}. The existence of a black hole (or any astrophysical object) is due to the solution of field equations for the selected theory of gravity, which provides a non-trivial structured linkage of disappeared points in the space-time. In particular, it is possible to classify singularity behaviors of any gravity theory which may be related to Noether symmetries, and then decide which one is physical or unphysical solution. In this paper, with Noether symmetries, we investigate the exact solutions of spherically symmetric spacetimes in $f(R,\phi,X)$ gravity, where $R$ is the scalar curvature, $\phi$ is a scalar field, $X$ is the kinetic term of $\phi$, and $f(R,\phi,X)$ is a function of $R$, $\phi$ and $X$ \cite{Beltran:2015hja,Zubair:2017oir}. This theory can describe various modified gravity theories including the scalar-tensor gravity and $f(R)$ gravity. In particular, we adopt the classical Noether approach in order to find the Noether symmetry in $f(R,\phi,X)$ gravity. See \cite{noether} for some studies related to Noether symmetry approach in modified gravity. As a result, from the classical Noether theorem, it is shown that the Noether symmetry in $f(R,\phi,X)$ gravity leads to a kind of the first integral of motion, which are able to be solved, so that we need not to analyze the cyclic coordinate, as explored in detail in Ref.~\cite{capo2007}. Thus, we derive exact solutions for the field equations by using the conservation relation coming from the Noether symmetry acquired. Moreover, it is demonstrated that the approach with Noether symmetries can be regarded as a selection rule to determine the potential form $V(\phi)$ of $\phi$, which exists in some class of theories described as $f(R,\phi,X)$ gravity. One important approach in this paper will be to obtain new spherically symmetric solutions in this extended theory of gravity without assuming $R=\textrm{constant}$, as in other papers. If one assumes $R=\textrm{constant}$, one looses the higher order terms coming from $f(R)$ gravity, making the theory not so interesting. The organization of the present paper is as follows. In Sec.~II, we explain $f(R,\phi,X)$ gravity in spherically symmetric space-time. In Sec.~III, we explore the symmetry reduced Lagrangian in $f(R,\phi,X)$ gravity. In Sec.~IV, we investigate the approach with the Noether symmetry. In Sec.~V, conclusions are finally presented. \section{$f(R,\phi,X)$ gravity in spherically symmetric space-time} The action that we will consider reads~\cite{Beltran:2015hja} \begin{equation} S=\int d^4x \sqrt{-g}\left[ \frac{1}{2\kappa^2} f(R,\phi,X) + L_{\rm m} \right]\,, \label{action} \end{equation} where $\kappa^2=8\pi G$, $L_{\rm m}$ is any matter Lagrangian and $f$ is a function which depends on the scalar curvature $R$, a scalar field $\phi$ and a kinetic term being equal to \begin{eqnarray} X=-\frac{\epsilon}{2}\, \partial^{\mu}\phi\partial_{\mu}\phi\,, \end{eqnarray} where $\epsilon$ is a parameter that if is equal to 1 represents canonical scalar field and equal to $-1$ represents a phantom scalar field. Clearly, the above action has many different scalar tensor theories such as Brans-Dicke types ($f(R,\phi,X)=\gamma(\phi,X)R$) or minimally coupled scalar tensor theories ($f(R,\phi,X)=\alpha(R)+\gamma(\phi,X)$). Variations of the action \eqref{action} with respect to the metric yields \begin{equation} f_{R} G_{\mu\nu}=\frac{1}{2}\left( f-Rf_{R} \right) g_{\mu\nu} + \nabla_\nu \nabla_{\mu} f_{R}- g_{\mu \nu}\nabla_\alpha \nabla^\alpha f_{R} + \frac{\epsilon}{2}f_X \, (\nabla_\mu\phi) (\nabla_\nu \phi)\,, \label{fieldeq1} \end{equation} whereas variations with respect to the scalar field $\phi$ gives \begin{equation} \nabla_\mu \left( f_X\,\nabla^\mu\phi \right) + \epsilon f_\phi =0 \,. \label{fieldeq2} \end{equation} Here, we have assumed the vacuum case where $L_{\rm m}=0$ and $f_R=\partial f/\partial R$, $f_X=\partial f/\partial X$ and $f_\phi=\partial f/\partial \phi$. It should be noted that the Schwarzschild solution is the unique spherically symmetric vacuum solution in GR, but we will see that this no longer holds in $f(R,\phi,X)$ theory of gravity. We also mention here that the vacuum solutions do not necessarily imply a null curvature $R=0$ or $R=const.$, which lead to maximally symmetric solutions, to the contrary in GR. The trace of Eq.(\ref{fieldeq1}) yields \begin{equation} R f_R + X f_X - 2 f(R,\phi,X) + 3 \square f_R = 0, \label{trace} \end{equation} where $\square = \nabla^{\mu} \nabla_{\mu}$. The latter equation will be useful in studying various aspects of $f(R,\phi,X)$ gravity. Let us now consider that the space-time is spherically symmetric such as the metric is \begin{eqnarray} ds^2=-A(r)dt^2+B(r)dr^2+M(r)(d\theta^2 + \sin\theta^2 d\varphi^2), \label{metric} \end{eqnarray} where $A(r), B(r)$ and $M(r)$ are functions of the radial coordinate $r$. It is easy to see that in this space-time, the scalar curvature is \begin{eqnarray} R = -\frac{1}{B} \left[ \frac{A''}{A} + \frac{ 2M''}{M} - \frac{A' B'}{2 A B} + \frac{M' A'}{M A} - \frac{M' B'}{M B} - \frac{A'^2}{2 A^2} - \frac{M'^2}{2 M^2} - \frac{2 B}{M} \right]. \label{r-scalar} \end{eqnarray} For the metric \eqref{metric}, the field equations \eqref{fieldeq1} become \begin{equation} f_R \left( 2 \frac{A''}{A} - \frac{A' B'}{A B} - \frac{A'^2}{A^2} + 2 \frac{M' A'}{M A} \right) = - 2 B f + 4 \left[ f''_R + f'_R \left( \frac{M'}{M} - \frac{B'}{2 B} \right) \right], \label{feq1} \end{equation} \begin{equation} f_R \left( 2 \frac{A''}{A} + 4 \frac{M''}{M} - \frac{A' B'}{A B} - 2 \frac{M' B'}{M B} - \frac{A'^2}{A^2} - 2 \frac{M'^2}{M^2} \right) = - 2 B f + 2 f'_R \left( \frac{A'}{A} + 2 \frac{M'}{M} \right) - 2 \epsilon f_X \phi'^2, \label{feq2} \end{equation} \begin{equation} f_R \left( 2 \frac{M''}{M} - \frac{B' M'}{B M} + \frac{M' A'}{M A} - \frac{4 B}{M} \right) = - 2 B f + 4 \left[ f''_R + \frac{1}{2} f'_R \left( \frac{A'}{A} -\frac{B'}{B} + \frac{M'}{M} \right) \right], \label{feq3} \end{equation} whereas the modified Klein-Gordon equation \eqref{fieldeq2} yields \begin{eqnarray} f_X \left[ \phi'' + \frac{1}{2} \phi' \left( \frac{A'}{A} - \frac{B'}{B} + 2 \frac{M'}{M} \right) \right] + f'_X \phi' + \epsilon B f_{\phi} =0. \label{kgeq} \end{eqnarray} In above equations, primes denote differentiation with respect to $r$, therefore, the terms $f'_{R}=f_{RR}R' + f_{R\phi}\phi' + f_{RX} X'$ and $f'_{X}=f_{RX} R' + f_{X\phi}\phi' + f_{XX}X'$. \section{Symmetry reduce Lagrangian in $f(R,\phi,X)$ gravity} For simplicity let us express the scalar curvature as follows \begin{eqnarray} \bar{R} = R^{*} - \frac{A''}{AB} - \frac{2M''}{BM}\,, \label{R} \end{eqnarray} where \begin{equation} R^{*}=\frac{A' B'}{2 A B^2} -\frac{A' M'}{A B M}+\frac{A'^2}{2 A^2 B}+\frac{B' M'}{B^2 M}+\frac{M'^2}{2 B M^2}+\frac{2}{M} \end{equation} contains only first derivatives terms. One can rewrite the action into its canonical form in such a way that we can reduce the number of degrees of freedom. In our case, we have \begin{equation} S_{f(R,\phi,X)}=\int dr\mathcal{L}(A,A',B,B',M,M',R,R',\phi,\phi') \,, \label{actioncan0} \end{equation} Recall that $X$ depends on $\phi'$. Then, the action \eqref{action} in spherically symmetric space-time \eqref{metric} becomes \begin{equation} S_{f(R,\phi,X)}= \int dr\left\{ f(R,\phi,X)-\lambda_{1} \left( R - \bar{R} \right) - \lambda_{2} \left( X - \bar{X} \right) \right\} M \sqrt{AB} \label{actioncan} \end{equation} where $\bar{X} = - \frac{\epsilon}{2B}\, \phi'^2$. Here $\lambda_1$ and $\lambda_2$ are the Lagrangian multipliers that can be directly found by varying with respect to $R$ and $X$, giving $\lambda_1=f_{R}$ and $\lambda_2=f_{X}$ respectively. Then, the above canonical action can be rewritten as \begin{eqnarray} S_{f(R,\phi,X)}&=& \int dr\left\{f(R,\phi,X)-f_{R} \left[ R - \Big(R^{*}-\frac{A''}{AB}-\frac{2M''}{BM}\Big)\right] -f_{X} \left( X + \frac{\epsilon}{2B}\, \phi'^2\right)\right\} M \sqrt{AB} \,, \label{actioncan2}\\ &=& \int dr\Big\{M \sqrt{AB} \Big[f(R,\phi,X)-f_{R}(R - R^{*})\Big] + 2 M' \Big(\sqrt{\frac{A}{B}}f_{R}\Big)' + A'\Big(\frac{Mf_R}{\sqrt{AB}}\Big)' \nonumber\\ && \qquad \quad -M \sqrt{AB} f_{X} \left( X + \frac{\epsilon}{2B}\, \phi'^2\right)\Big\} \,, \label{actioncan3} \end{eqnarray} where we have integrated by parts and ignored boundary terms. Then, the symmetry reduced Lagrangian becomes \begin{eqnarray} \mathcal{L}_f= \sqrt{A B} \left[ M ( f -X f_X) + (2- M R) f_R \right] + \frac{f_R M' A'}{\sqrt{A B}} + \frac{1}{2} f_R \sqrt{\frac{A}{B}}\frac{M'^2}{ M} + \frac{M A' f'_R}{\sqrt{AB}} + 2\sqrt{\frac{A}{B}} f'_R M' - \frac{\epsilon}{2} f_X M \sqrt{\frac{A}{B}} \phi'^2\,. \qquad \label{lagr} \end{eqnarray} Note again that $f_R'=f_{RR}R'+f_{R\phi}\phi'+f_{RX}X'$. Varying the symmetry reduced Lagrangian (\ref{lagr}) with respect to the metric coefficients $A, B, M$, and the scalar field $\phi$ we obtain, respectively \begin{equation} f_R \left[ \frac{2 M''}{M} - \frac{M' B'}{M B} - \frac{M'^2}{2 M^2} - B \left( \frac{2}{M} -R \right) \right] + f'_R \left( \frac{2 M'}{M} - \frac{B'}{B} \right) + 2 f''_R - B f = 0, \label{veq-1} \end{equation} \begin{equation} f_R \left( \frac{M' A'}{M A} + \frac{M'^2}{2 M^2} \right) + f'_R \left( \frac{2 M'}{M} + \frac{A'}{A} \right) - \frac{\epsilon}{2} f_X \phi'^2 - B \left[ f + \left( \frac{2}{M} -R \right) f_R - X f_X \right] = 0, \label{veq-2} \end{equation} \begin{equation} f_R \left( \frac{A''}{A} + \frac{M''}{M} - \frac{A' B'}{2 A B} + \frac{M' A'}{2 M A} - \frac{M' B'}{2 M B} - \frac{A'^2}{2 A^2} - \frac{M'^2}{2 M^2} \right) + f'_R \left( \frac{A'}{A} - \frac{B'}{B} + \frac{M'}{M} \right) + 2 f''_R - B \left( f - R f_R \right) = 0, \label{veq-3} \end{equation} \begin{equation} \left[ M f_X \sqrt{\frac{A}{B}} \phi' \right]' + \epsilon M \sqrt{A B} f_{\phi} = 0. \label{veq-4} \end{equation} The latter equation is the modified Klein-Gordon equation given in (\ref{kgeq}). Since the equation of motion (\ref{veq-2}) describing the evolution of the metric potential $B$ does not depend on its derivative, it can be explicitly solved in terms of $B$ as a function of other coordinates such that \begin{equation} B = \frac{f_R \left( \frac{M' A'}{M A} + \frac{M'^2}{2 M^2} \right) + f'_R \left( \frac{A'}{A} + \frac{2 M'}{M} \right) - \frac{\epsilon}{2} f_X \phi'^2}{f + \left( \frac{2}{M} -R \right) f_R - X f_X} . \label{veq-2-2} \end{equation} By inserting the Ricci scalar $R$ given by (\ref{r-scalar}) into the equations (\ref{veq-1}) and (\ref{veq-3}), one get \begin{equation} f_R \left( \frac{2 M''}{M} - \frac{M' A'}{M A} - \frac{M' B'}{M B} - \frac{M'^2}{M^2} \right) - f'_R \left( \frac{A'}{A} + \frac{B'}{B} \right) + 2 f''_R + \epsilon f_X \phi'^2 = 0, \label{veq-1-2} \end{equation} and \begin{equation} f_R \left( \frac{M''}{M} + \frac{M' A'}{2 M A} - \frac{M' B'}{2 M B} - \frac{2 B}{M} \right) - f'_R \left( \frac{A'}{A} - \frac{B'}{B} + \frac{M'}{M} \right) - 2 f''_R + B f = 0, \label{veq-3-2} \end{equation} in which the Eq.(\ref{veq-1-2}) comes from the field equations (\ref{feq1}) and (\ref{feq2}), and the Eq. (\ref{veq-3-2}) is equivalent to the field equation (\ref{feq3}). The energy functional $E_{\mathcal{L}}$ or the Hamiltonian of the Lagrangian $\mathcal{L}$ is defined by \begin{eqnarray} E_{\mathcal{L}} = q'^i \frac{\partial \mathcal{L}}{\partial q'^i} -\mathcal{L}. \label{energy} \end{eqnarray} Now, we calculate the energy functional $E_{\mathcal{L}_f}$ for the Lagrangian density $\mathcal{L}_f$ which has the form \begin{eqnarray} & & E_{\mathcal{L}_f} = M \sqrt{\frac{A}{B}} \left\{ f_R \left( \frac{M' A'}{M A} + \frac{M'^2 }{2 M^2} \right) + f'_R \left( \frac{A'}{A} + 2 \frac{M'}{M} \right) - \frac{\epsilon}{2} f_X \phi'^2 - \frac{B}{M} \left[ M (f - X f_X) + (2 - MR) f_R \right] \right\} . \label{ef1} \end{eqnarray} It is explicitly seen that the energy function $E_{\mathcal{L}_f}$ vanishes due to the field equation (\ref{veq-2}) which is obtained by varying the Lagrangian (\ref{lagr}) according to the metric variable $B$. Therefore, the solution of equation $E_{\mathcal{L}_f} = 0$ in terms of $B$ is given by (\ref{veq-2-2}). We note that the Hessian determinant of the Lagrangian (\ref{lagr}), which is defined by $\| \frac{\partial^2 \mathcal{L}_f }{\partial q'^i \partial q'^j} \|$, is zero. This is because of the absence of the generalized velocity $B$ in the symmetry reduced Lagrangian (\ref{lagr}). It is known that the metric variable $B$ does not contribute to the dynamics due to the symmetry reduced Lagrangian approach, but the equation of motion for $B$ has to be considered as a further constraint equation. Thus, the new Lagrangian reads $ \mathcal{L}^*_f = \mathcal{L}^{1/2}$ with \begin{eqnarray} \mathcal{L}= \left[ M ( f -X f_X) + (2- M R) f_R \right] \left[ f_R \left( M' A' + \frac{A M'^2}{2 M} \right) + f'_R \left( M A' + 2 A M' \right) - \frac{\epsilon}{2} f_X M A \phi'^2 \right], \qquad \label{lagr2} \end{eqnarray} which is not explicitly dependent on $r$, so it is a canonical Lagrangian, and the quadratic form of generalized velocities $A', M', R', \phi'$ and $X'$ and thus coincides with the Hamiltonian. Therefore, we can consider $\mathcal{L}$ as the new Lagrangian with five degrees of freedom. The Hessian determinant of $\mathcal{L}$ is still vanishing, which comes from the selection of $X$ as a coordinate of the configuration space. This new Lagrangian has a property that if $f(R,\phi,X) = F(R)$, then the Hessian determinant of the Lagrangian is now non-vanishing as it is expected. Therefore it has to be supposed that $M ( f -X f_X) + (2- M R) f_R \neq 0$, which is necessary since the above definitions of $B$, the Eq. (\ref{veq-2-2}), and $\mathcal{L}$, the Eq. (\ref{lagr2}), lose significance. Furthermore, using the Eq. (\ref{energy}) we calculate the energy function for the new Lagrangian (\ref{lagr2}) and find that \begin{eqnarray} & & E_{\mathcal{L}} = A B \left[ M (f - X f_X) + (2 - MR) f_R \right]^2, \label{ef2} \end{eqnarray} which is explicitly non-vanishing. The new Lagrangian (\ref{lagr2}) is useful to compare the Noether symmetries obtained in this study with the results of Ref. \cite{capo2007}, where they have been selected families of $f(R)$ models in which the spherical symmetry has been imposed, and searched for exact spherically symmetric solutions in $f(R)$ gravity by requiring the existence of Noether symmetries. In order to facilitate the comparison with the results of Ref. \cite{capo2007} for the power-law form $f(R,\phi, X) = f_0 R^n$ we use the Lagrangian (\ref{lagr2}) to compute the Noether symmetries. \bigskip \section{Noether symmetry approach} In this section, we seek for the condition in order that the Lagrangian density (\ref{lagr}) or (\ref{lagr2}) would admit any Noether symmetry which has a generator of the form \begin{equation} {\bf Y} = \xi \frac{\partial}{\partial r} + \eta^i \frac{\partial}{\partial q^i}, \label{ngs-gen} \end{equation} where $q^i$ are the generalized coordinates in the $d$-dimensional configuration space ${\cal Q }\equiv \{ q^i, i=1, \ldots, d \} $ of the Lagrangian, whose tangent space is ${\cal TQ }\equiv \{q^i,q'^i\}$. The components $\xi$ and $\eta^i$ of the Noether symmetry generator ${\bf Y}$ are functions of $r$ and $q^i$. The existence of a Noether symmetry implies the existence of a vector field ${\bf Y}$ given in (\ref{ngs-gen}) if the Lagrangian $ \mathcal{L}(r, q^i, q'^i )$ satisfies \begin{equation} {\bf Y}^{[1]} \mathcal{L} + \mathcal{L} ( D_r \xi) = D_r K\, , \label{ngs-eq} \end{equation} where ${\bf Y}^{[1]}$ is the first prolongation of the generator (\ref{ngs-gen}) in such a form \begin{equation} {\bf Y}^{[1]} = {\bf Y} + \eta'^i \frac{\partial}{\partial q'^i}, \end{equation} and $K(r, q^i)$ is a gauge function, $D_r$ is the total derivative operator with respect to $r$, $D_r =\partial / \partial r + q'^i \partial / \partial q^i$, and $\eta'^i$ is defined as $\eta'^i = D_r \eta^i - q'^i D_r \xi$. The significance of Noether symmetry comes from the following first integral of motion that if ${\bf Y}$ is the Noether symmetry generator corresponding to the Lagrangian $\mathcal{L}(r, q^i, q'^i)$, then the Hamiltonian or a conserved quantity associated with the generator ${\bf Y}$ is \begin{equation} I =- \xi E_{\mathcal{L}} + \eta^i \frac{\partial \mathcal{L}}{\partial q'^i} - K , \label{con-law} \end{equation} where $I$ is a constant of motion \emph{or} Noether constant. Let us start with the Lagrangian (\ref{lagr2}), where $q^i = \{ A, M, R, \phi, X \}, i=1,\ldots, 5 $. Then the Noether symmetry condition (\ref{ngs-eq}) for this Lagrangian yields 26 partial differential equations as follows \begin{eqnarray} & & \xi_{,A} = 0, \quad \xi_{,M} = 0, \quad \xi_{,R} = 0, \quad \xi_{,\phi} = 0, \quad \xi_{,X} = 0, \quad K_{,r} = 0, \nonumber \\& & f_R \eta^2_{,r} + M \left( f_{RR} \eta^3_{,r} + f_{R\phi} \eta^4_{,r} + f_{RX} \eta^5_{,r} \right) - \frac{1}{F} K_{,A} =0, \quad f_{RX} \left( M \eta^1_{,r} + A \eta^2_{,r} \right) - \frac{1}{F} K_{,X} =0, \nonumber\\& & f_R \left( \eta^1_{,r} + \frac{A}{M} \eta^2_{,r} \right) + 2 A \left( f_{RR} \eta^3_{,r} + f_{R\phi} \eta^4_{,r} + f_{RX} \eta^5_{,r} \right) - \frac{1}{F} K_{,M} =0, \nonumber\\& & f_{RR} \left( M \eta^1_{,r} + A \eta^2_{,r} \right) - \frac{1}{F} K_{,R} =0, \quad f_{RR} \left( M \eta^1_{,r} + A \eta^2_{,r} \right) - \epsilon M A f_X \eta^4_{,r} - \frac{1}{F} K_{,\phi} =0, \nonumber \\& & f_{RR} \left( M \eta^1_{,R} + 2 A \eta^2_{,R} \right) = 0, \quad f_{RR} \left( M \eta^1_{,\phi} + 2 A \eta^2_{,\phi} \right) + f_{R\phi} \left( M \eta^1_{,R} + 2 A \eta^2_{,R} \right) = 0, \nonumber \\& & f_{RR} \left( M \eta^1_{,X} + 2 A \eta^2_{,X} \right) + f_{RX} \left( M \eta^1_{,R} + 2 A \eta^2_{,R} \right) = 0, \quad f_{RX} \left( M \eta^1_{,X} + 2 A \eta^2_{,X} \right) = 0, \nonumber\\& & f_{R\phi} \left( M \eta^1_{,X} + 2 A \eta^2_{,X} \right) + f_{RX} \left( M \eta^1_{,\phi} + 2 A \eta^2_{,\phi} \right) - \epsilon M A f_X \eta^4_{,X} = 0, \quad f_R \eta^2_{,A} + M \left( f_{RR} \eta^3_{,A} + f_{R\phi} \eta^4_{,A} + f_{RX} \eta^5_{,A} \right) = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & f_R \left( \eta^1_{,A} + \frac{A}{M} \eta^2_{,A} + \eta^2_{,M} - \xi_{,r} \right) + M \left( f_{RR} \eta^3_{,M} + f_{R\phi} \eta^4_{,M} + f_{RX} \eta^5_{,M} \right) + 2 A \left( f_{RR} \eta^3_{,A} + f_{R\phi} \eta^4_{,A} + f_{RX} \eta^5_{,A} \right) \nonumber \\& & \qquad + \frac{1}{F}\left[ f_R F_{,M} \eta^2 + \left( F f_R \right)_{,R} \eta^3 + \left( F f_R \right)_{,\phi} \eta^4 + \left( F f_R \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & \frac{f_R}{M} \eta^2_{,R} + f_{RR} \left( \eta^1_{,A} + \frac{2 A}{M} \eta^2_{,A} + \eta^3_{,R} - \xi_{,r} \right) + f_{R\phi} \eta^4_{,R} + f_{RX} \eta^5_{,R} \nonumber \\& & \qquad + \frac{1}{F} \left[ f_{RR} (F M)_{,M} \frac{\eta^2}{M} + \left( F f_{RR} \right)_{,R} \eta^3 + \left( F f_{RR} \right)_{,\phi} \eta^4 + \left( F f_{RR} \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & \frac{f_R}{M} \eta^2_{,\phi} + f_{R\phi} \left( \eta^1_{,A} + \frac{2 A}{M} \eta^2_{,A} + \eta^4_{,\phi} - \xi_{,r} \right) + f_{RR} \eta^3_{,\phi} + f_{RX} \eta^5_{,\phi} \nonumber \\& & \qquad + \frac{1}{F} \left[ f_{R\phi} (F M)_{,M} \frac{\eta^2}{M} + \left( F f_{R\phi} \right)_{,R} \eta^3 + \left( F f_{R\phi} \right)_{,\phi} \eta^4 + \left( F f_{R\phi} \right)_{,X} \eta^5 \right] = 0, \label{ngs-eq-1} \end{eqnarray} \begin{eqnarray} & & \frac{f_R}{M} \eta^2_{,X} + f_{RX} \left( \eta^1_{,A} + \frac{2 A}{M} \eta^2_{,A} + \eta^5_{,X} - \xi_{,r} \right) + f_{RR} \eta^3_{,X} + f_{R\phi} \eta^4_{,X} \nonumber \\& & \qquad + \frac{1}{F} \left[ f_{RX} (F M)_{,M} \frac{\eta^2}{M} + \left( F f_{RX} \right)_{,R} \eta^3 + \left( F f_{RX} \right)_{,\phi} \eta^4 + \left( F f_{RX} \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & f_R \left[ \frac{\eta^1}{A} + \frac{M}{F} \left( \frac{F}{M} \right)_{,M} \eta^2 + \frac{2 M}{A} \eta^1_{,M} + 2 \eta^2_{,M} - \xi_{,r} \right] + 4 M \left( f_{RR} \eta^3_{,M} + f_{R\phi} \eta^4_{,M} + f_{RX} \eta^5_{,M} \right) \nonumber \\& & \qquad + \frac{1}{F}\left[ \left( F f_R \right)_{,R} \eta^3 + \left( F f_R \right)_{,\phi} \eta^4 + \left( F f_R \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & \frac{f_R}{2 A} \left( \eta^1_{,R} + \frac{A}{M} \eta^2_{,R} \right) + f_{RR} \left[ \frac{\eta^1}{A} + \frac{F_{,M}}{F} \eta^2 + \frac{M}{2 A} \eta^1_{,M} + \eta^2_{,M} + \eta^3_{,R} - \xi_{,r} \right] + f_{R\phi} \eta^4_{,R} + f_{RX} \eta^5_{,R} \nonumber \\& & \qquad + \frac{1}{F}\left[ \left( F f_{RR} \right)_{,R} \eta^3 + \left( F f_{RR} \right)_{,\phi} \eta^4 + \left( F f_{RR} \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & \frac{f_R}{2 A} \left( \eta^1_{,\phi} + \frac{A}{M} \eta^2_{,\phi} \right) + f_{R\phi} \left[ \frac{\eta^1}{A} + \frac{F_{,M}}{F} \eta^2 + \frac{M}{2 A} \eta^1_{,M} + \eta^2_{,M} + \eta^4_{,\phi} - \xi_{,r} \right] + f_{RR} \eta^3_{,\phi} + f_{RX} \eta^5_{,\phi} \nonumber \\& & \qquad + \frac{1}{F} \left[ \left( F f_{R\phi} \right)_{,R} \eta^3 + \left( F f_{R\phi} \right)_{,\phi} \eta^4 + \left( F f_{R\phi} \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & \frac{f_R}{2 A} \left( \eta^1_{,X} + \frac{A}{M} \eta^2_{,X} \right) + f_{RX} \left[ \frac{\eta^1}{A} + \frac{F_{,M}}{F} \eta^2 + \frac{M}{2 A} \eta^1_{,M} + \eta^2_{,M} + \eta^5_{,X} - \xi_{,r} \right] + f_{RR} \eta^3_{,X} + f_{R\phi} \eta^4_{,X} \nonumber \\& & \qquad + \frac{1}{F} \left[ \left( F f_{RX} \right)_{,R} \eta^3 + \left( F f_{RX} \right)_{,\phi} \eta^4 + \left( F f_{RX} \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} \begin{eqnarray} & & f_X \left[ \frac{\eta^1}{A} + \frac{(M F)_{,M}}{M F} \eta^2 + 2 \eta^4_{\phi} - \xi_{,r} \right] - \frac{2 \epsilon}{M A} f_{R\phi} \left( M \eta^1_{,\phi} + 2 A \eta^2_{,\phi} \right) + \nonumber \\& & \qquad \qquad + \frac{1}{F} \left[ \left( F f_{X} \right)_{,R} \eta^3 + \left( F f_{R} \right)_{,\phi} \eta^4 + \left( F f_{X} \right)_{,X} \eta^5 \right] = 0, \nonumber \end{eqnarray} where $F = \left[ M ( f -X f_X) + (2- M R) f_R \right] \neq 0$. Then we solve the above system of differential equations to get the Noether symmetry ${\bf Y}= \xi \partial_r + \eta^1 \partial_A + \eta^2 \partial_M + \eta^3 \partial_R + \eta^4 \partial_{\phi} + \eta^5 \partial_X$. The above system implicitly depends on the form of the function $f(R, \phi,X)$ and so, by solving it, we also get a wide class of gravity theories related to the form of $f(R,\phi,X)$ which are compatible with spherical symmetry. We point out here that the Noether symmetries for any form of the function $f(R,\phi,X)$ are \begin{equation} {\bf Y}_1 = \partial_r, \qquad {\bf Y}_2 = r \partial_r + A \partial_A, \label{ns-12} \end{equation} which are trivial solutions of the above system in any case. In the following we will consider some forms of $f(R,\phi,X)$ to search the Noether symmetries. To do this, we will split the study in five different types of $f(R,\phi,X)$: \begin{enumerate} \item $f(R,\phi,X)=f_0 R^n$, where $f_0$ and $n$ are constants (see \ref{case1}). \item $f(R,\phi,X)= f_0 R + f_1 X^q - V(\phi)$, where $f_0,f_1$ and $q$ are constants and $V(\phi)$ is a potential (see \ref{case2}). \item $f(R,\phi,X)= f_0 \phi^m R^n + f_1 X^q - V(\phi)$, where $f_0,f_1,m,n$ and $q$ are constants and $V(\phi)$ is a potential (see \ref{case3}). \item $f(R,\phi,X)= f_0 R^n + f_1 \, \phi^m\, X^q$, where $f_0,f_1,m,n$ and $q$ are constants (see \ref{case4}). \item $f(R,\phi,X)= U(\phi, X) \, R$, where $U(\phi,X)$ is an arbitrary function which depends on the scalar field $\phi$ and the kinetic term $X$ (see \ref{case5}). \end{enumerate} In each case, some subcases where some specific parameters will be also studied. The specific cases listed above represent different classes of modified theories of gravity that can be constructed with the curvature scalar $X$, a scalar field $\phi$ and a kinetic term $X$. The first model has been widely considered in the literature and represents a power-law $f(R)$ gravity~\cite{Sotiriou:2008rp,Nojiri:2010wj,DeFelice:2010aj}. These models provide a good fitting for galactic rotation curves~\cite{Martins:2007uf}. The second model represents a generalisation of minimally coupled models (quintessence models) where the parameter $q$ gives the opportunity to have power-law kinetic terms in the action. Similar models have been studied in \cite{Capozziello:2002rd,Amendola:1999er}. The third model represents a class of non-minimally couplings between a scalar field and the Ricci scalar. The case $m=2$ and $n=1$ has been widely studied in the literature, and in cosmology, it can reproduce a late-time accelerating scenarios with the possibility of crossing the phantom barrier~\cite{Perrotta:1999am,Copeland:2006wr}. Other studies have considered other power-law parameters, see for example \cite{Sami:2012uh,Gannouji:2006jm,Elizalde:2008yf}. The fourth model is another family of coupling models where now the kinetic term is coupled with the scalar field. This model is a particular case of the $k$-essence models, which can describe late-time accelerating behaviour of the Universe and can describe inflation in a good agreement with cosmological observations~\cite{ArmendarizPicon:2000ah,Deffayet:2011gz,ArmendarizPicon:1999rj}. Moreover, these models also can achieve a unified model for dark matter and dark energy avoiding the problems of the generalized Chaplygin gas models, which are due to a non-negligible sound speed in these models~\cite{Scherrer:2004au}. Finally, the last model represents a Brans-Dicke theory, see~\cite{Brans:1961sx,Amendola:1999er} for more details about this theory. All these models have been widely studied in the literature in the context of cosmology but due to the difficulty of finding exact solutions, there are not so many studies concerning non-trivial spherically symmetric spacetimes. In this paper, we will find exact solutions to the models since they have interesting physics properties. \bigskip \subsection{\bf Case (i): $f(R,\phi,X) = f_0 R^n$.\label{case1}} This power-law form of $f(R,\phi,X)$ gives the well-known $f(R)$ theory of gravity, and Noether symmetries have been investigated in Ref. \cite{capo2007}. As an example to see how our approach works, we revisit this form of $f(R,\phi,X)$. Furthermore, the trace Eq.(\ref{trace}) in this case becomes \begin{equation} 3 n \square \left( R^{n-1} \right) + (n-2) R^n = 0, \end{equation} which gives $R= 0$ for $n=1$, $\square R = 0$ for $n=2$, etc. We find from the system (\ref{ngs-eq}) that the components of the Noether generator ${\bf Y}$ for this case are \begin{equation} \xi = c_1 r +c_2, \quad \eta^1 = \left[ c_1 + c_3 (2n -3) \right] A, \quad \eta^2 = c_3 M, \quad \eta^3 = -c_3 R, \quad \eta^4 = 0 = \eta^5, \quad K= c_4, \end{equation} which yields that ${\bf Y}_1 , \, {\bf Y}_2$ and \begin{eqnarray} \label{ngsv-1} & & {\bf Y}_3 = (2n-3) A \partial_A + M \partial_M - R \partial_R, \quad n \neq 0,1,2 \end{eqnarray} are Noether symmetries. This explicitly represents that there exist extra two Noether symmetries ${\bf Y}_1$ and ${\bf Y}_2$ in addition to the known one ${\bf Y}_3$ found in \cite{capo2007}. The first integrals of the above Noether symmetries are \begin{eqnarray} & & I_1 = - E_{\mathcal{L}}, \qquad I_2 = I_1 r + f_0^2 n M A R^{2 (n-1)} \left[ 2n + (1-n) M R \right] \left[ (n-1) \frac{R'}{R} + \frac{M'}{M} \right], \label{fint-1-1} \\& & I_3 = f_0^2 n M A R^{2 (n-1)} \left[ 2n + (1-n) M R \right] \left[ (n-1)(2n -1) \frac{R'}{R} + (2- n) \frac{A'}{A} \right] , \label{fint-1-2} \end{eqnarray} where $I_1$ is non-vanishing due to the $E_{\mathcal{L}} \neq 0$. Then, arranging the above first integrals one gets \begin{eqnarray} & & (n-1) \frac{R'}{R} \left( \frac{A'}{A} + \frac{2 M'}{M} \right) + \frac{M'}{M} \left( \frac{A'}{A} + \frac{M'}{2 M} \right) = -\frac{ I_1 R^{2 (1-n)} }{ n f_0^2 M A \left[ 2n + (1-n) M R \right] }, \nonumber \\& & (n-1) \frac{R'}{R} + \frac{M'}{M} = \frac{ (I_2 - I_1 r) R^{2 (1-n)} }{ n f_0^2 M A \left[ 2n + (1-n) M R \right] }, \label{fint-1-1-1} \\& & (2- n) \frac{A'}{A} + (n-1)(2n -1) \frac{R'}{R} = \frac{ I_3 R^{2 (1-n)} }{ n f_0^2 M A \left[ 2n + (1-n) M R \right]} , \nonumber \end{eqnarray} where $n \neq 1, 2$. Solving the third equation of (\ref{fint-1-1-1}) in terms of $A$, one finds \begin{equation} A = R^{\frac{(n-1)(2n-1)}{n-2}} \left[ A_0 + \frac{I_3}{ f_0^2 n (2-n)} \int{ \frac{ R^{\frac{(n-1)(4n-5)}{2-n}} dr }{M [2n + (1-n) M R ] } } \right], \label{i-A} \end{equation} which has same form obtained in \cite{capo2007}. Due to the previously obtained relation (\ref{veq-2-2}) of the metric function $B$, it takes the form for this case: \begin{equation} B = \frac{ n M }{ \left[ 2n + (1-n) M R \right] } \left[ (n-1) \frac{R'}{R} \left( \frac{A'}{A} + \frac{2 M'}{M} \right) + \frac{M'}{M} \left( \frac{A'}{A} + \frac{M'}{2 M} \right) \right]. \label{i-B} \end{equation} We observe here that one can find the metric functions $A$ and $B$ if the functions $M(r)$ and $R(r)$ are known one way or another. One can give so much examples of the exact solutions for the field equations using the above relations (\ref{i-A}), (\ref{fint-1-1-1}) and (\ref{i-B}). Here the Eqs. (\ref{fint-1-1-1}) are constraint equations to be satisfied. If one chooses $M(r)=r^2$ and $R=R_0 r^{p}$, one gets hypergeometric functions for both $A(r)$ and $B(r)$. There are some specific cases for $p$ where one can get analytical solutions without those hypergeometric functions. The easiest case is as it was chosen in Ref. \cite{capo2007}, where one takes $n=5/4,p =-2 ,R_0=-5$ which gives $R(r)= - \frac{5}{r^2}$. The minus sign in $R$ is due to the signature of the metric. For this case, the metric coefficients $A$ and $B$ from the relations (\ref{i-B}) and (\ref{i-A}) are obtained as \begin{equation} A(r)= \frac{1}{\sqrt{5}} \left( k_1 r + k_2 \right), \qquad B(r)= \frac{1}{ 2\left(1 + \frac{k_2}{k_1 r } \right) }, \end{equation} where $k_1 = A_0, k_2 = 32 I_2 /(225 f_0^2), I_1 = - I_2 k_1 /k_2$ and $I_3 = -I_2/2$ which comes from the constraint equations (\ref{fint-1-1-1}). The latter solution was already found in \cite{capo2007}. It should be noted that the above metric is non asymptotically flat, has a horizon at $r=-k_2/k_1$ and it was ruled out by Solar system tests~\cite{Clifton:2005aj}. Another new solution can be found by taking $M(r)=r^2, R=R_0 r^{p}$ and $p=(n-2)/(4 n^2-10 n+7)$, which gives the following metric coefficient \begin{eqnarray} A(r)&=& r^{\frac{(n-1) (2 n-1)}{4 n^2 -10 n+7}} \left[ A_0 R_0^{\frac{2 n^2-3 n+1}{n-2}} + \frac{I_3 (n-1) \left(4 n^2-10 n+7 \right) R_0^{3-2 n} }{4 f_0^2 n^3 (n-2) \left(8 n^2-19 n+12\right)} \log \left(1-\frac{2 n r^{\frac{-8 n^2+19 n-12}{4 n^2-10 n+7}}}{(n-1) R_0}\right) \right] \nonumber\\ && \quad + \frac{ I_3 \left(4 n^2-10 n+7\right) R_0^{2-2 n} }{2 f_0^2 n^2 (n-2) \left(8 n^2-19 n+12\right)}r^{\frac{-6 n^2+16 n-11}{4 n^2-10 n+7}}\,. \label{AA1} \end{eqnarray} The expression for $B(r)$ is involved but can be directly found by using Eq.~\eqref{i-B}. Another analytical solution can be found from \eqref{i-A} by taking $M(r)=r^2, R=R_0 r^{p}$ and $p=(2-n)/(4 n^2-9 n+5)$. This solution reads \begin{eqnarray} A(r)&=&r^{\frac{1-2 n}{4 n-5}} R_0^{\frac{2 n^2-3 n+1}{n-2}} \left[ A_0+\frac{I_3 (n-1) (4 n-5) R_0^{\frac{-4 n^2+9 n-5}{n-2}} \log \left((n-1) R_0 r^{\frac{8 n^2-19 n+12}{4 n^2-9 n+5}}-2 n\right)}{2 f_0^2 (n-2) n^2 (n (8 n-19)+12)} \right] \nonumber\\ &&-\frac{I_3 r^{\frac{1-2 n}{4 n-5}} R_0^{2-2 n} \log (r)}{2 f_0^2 (n-2) n^2}\,,\label{AA2} \end{eqnarray} with $B(r)$ being also too involved to write it here but it can be easily found with Eq.~\eqref{i-B}. It is possible to give some other examples to produce new solutions from the generic statements for $A$ and $B$. If we take $n= 1/2, M(r) = r^q$ and $R(r) = R_0 r^{-q}$, then it follows from \eqref{r-scalar}, \eqref{i-A} and \eqref{i-B} that $q=2/3$ and $R_0 = 1$, which gives \begin{eqnarray} & & A(r) = A_0 \left( 1 - \frac{2 k}{r^{2/3}} \right), \qquad B(r) = \frac{2}{21 r^{4/3} \left( 1 - \frac{2 k}{r^{2/3}} \right)},\label{47} \end{eqnarray} where $k = 2 I_3 / (3 A_0 f_0^2)$. This solution has an event horizon at $r = ( 2 k)^{3/2}$ and it is asymptotically flat. Furthermore, taking $M(r) = r^q$ and $R(r) = R_0 r^{-q}$, the equations \eqref{r-scalar}, \eqref{i-A} and \eqref{i-B} yield $q= 2 / 43$ and $R_0 = 1006 / 321$ for $n=3$, and $q= 4 / 167$ and $R_0 = 72 / 23$ for $n=4$, which gives rise to the solutions $A$ and $B$ \begin{eqnarray} & & A(r) = \frac{A_0 R_0^{10}}{r^{20/43}} \left[ 1 + \frac{43 k R_0^{14}}{13 (R_0 -3)} r^{13/43} \right], \quad B(r) = - \frac{r^{-84/43}}{86 \left( R_0 -3 + \frac{43}{13} k R_0^{14} r^{13/43} \right)}, \quad k = \frac{I_3}{ 6 A_0 f_0^2},\label{48} \end{eqnarray} for $n=3$, and \begin{eqnarray} & & A(r) = \frac{A_0 R_0^{21/2}}{r^{42/167}} \left[ 1 + \frac{167 k R_0^{33}}{ (3 R_0 -8)} r^{31/167} \right], \quad B(r) = - \frac{ 30752 \, r^{-330/167}}{ 27889 \left( 93 R_0 - 248 + 167 k R_0^{33} r^{31/167} \right)}, \quad k = \frac{I_3}{ 8 A_0 f_0^2}, \label{49} \end{eqnarray} for $n=4$. These two solutions are also asymptotically flat. To the best of our knowledge, the five solutions \eqref{AA1}--\eqref{49} are new spherically symmetric solutions in power-law $f(R)$ gravity. It is important to remark that in the literature, many authors have found solutions in $f(R)$ only considering $R=\textrm{constant}$, which indeed is a trivial case since all the higher order terms considered in $f(R)$ disappears. The above new solutions could be interesting since they contain some logarithmic terms that could be related to dark matter~\cite{Li:2012zx}. \bigskip For $n=1$ (the GR case), i.e., $f(R,\phi,X) = f_0 R$, the reduced Lagrangian and the constraint (\ref{veq-2-2}) for $B$ become \begin{equation} \mathcal{L}_{GR} = A M' \left( \frac{2 A'}{A} + \frac{M'}{M} \right), \qquad B_{GR} = M' \left( \frac{2 A'}{A} + \frac{M'}{M} \right) , \end{equation} which yields that the energy function is $E_{\mathcal{L}_{GR}} = A \, B_{GR}$. Then we find from the Noether symmetry condition (\ref{ngs-eq}) for the above Lagrangian the following Noether symmetries \begin{eqnarray} & & {\bf Y}_1 = \partial_r, \quad {\bf Y}_2 = r \partial_r + A \partial_A, \quad {\bf Y}_3 = A \partial_A - M \partial_M, \quad {\bf Y}_4 = \frac{1}{\sqrt{M}} \partial_A, \\& & {\bf Y}_5 = \frac{A}{\sqrt{M}} \partial_A - 2 \sqrt{M} \partial_M, \quad {\bf Y}_6 = r^2 \partial_r + 2 r M \partial_M \quad {\rm with} \,\, K = 4 M A, \\& & {\bf Y}_7 = \frac{r A}{\sqrt{M}} \partial_A - 2 r \sqrt{M} \partial_M \quad {\rm with} \,\, K = -4 A \sqrt{M}, \quad {\bf Y}_8 = \frac{r}{\sqrt{M}} \partial_A \quad {\rm with} \,\, K = 4 \sqrt{M}, \end{eqnarray} which gives rise to the following first integrals \begin{eqnarray} & & I_1 = -E_{\mathcal{L}_{GR}}, \quad I_2 = I_1 r + 2 A M', \quad I_3 = -2 M A', \quad I_4 = \frac{2 M'}{\sqrt{M}}, \quad I_5 = - 2 A \sqrt{M} \left( 2\frac{A'}{A} + \frac{M'}{M} \right), \\& & I_6 = I_1 r^2 + 4r M A \left( \frac{A'}{A} + \frac{M'}{M} - \frac{1}{r} \right), \quad I_7 = - 2 r A \sqrt{M} \left( \frac{2 A'}{A} + \frac{M'}{M} - \frac{2}{r} \right), \quad I_8 = I_4 r - 4 \sqrt{M}. \end{eqnarray} Here we point out that the Noether symmetry ${\bf Y}_3$ for GR Lagrangian has only been obtained in \cite{capo2007}. Using the above first integrals, the functions $A$ and $M$ together have the Schwarzschild form with some constraints as follows \begin{eqnarray} & & A = \frac{I_7 - I_5 r}{I_4 r -I_8}, \qquad B= -\frac{I_1}{A}, \qquad M= \frac{1}{16} \left( I_4 r - I_8 \right)^2, \\& & I_5 = \frac{ 4 I_1}{I_4}, \quad I_6 = \frac{I_2}{I_1} (I_2 - 2 I_3), \quad I_7 = \frac{4 I_2}{I_4}, \quad I_8 = \frac{I_4}{I_1} (I_2 - 2 I_3). \end{eqnarray} Thus the standard form of Schwarzschild solution is covered for $I_1 =-1, I_4 = -4, I_5 = 1, I_6 = 0, I_8 = 0$ and $I_2 = 2 I_3 = -I_7 = 8 m$, where $m$ is the Schwarzschild mass, which means that the Noether symmetry relates the first integrals $I_2, I_3$ and $I_7$ with the Schwarzschild radius or the mass of the gravitating system. For the classical Schwarzschild solution, the event horizon at $r = 2m$ corresponds to a singularity of the Schwarzschild coordinates at which $g_{00} = 0$, i.e. $A(r) = 0$, and $g_{11}= B(r)$ tends to infinity. It is known that a horizon is a null-hypersurface, and one can say that $r={\rm constant}$ is the null-hypersurface at $A(r) = 0$ which yields all the possible horizons. \bigskip For $n=2$, the Noether symmetries are ${\bf Y}_1, \, {\bf Y}_2 $ given in (\ref{ns-12}) and \begin{equation} {\bf Y}_3 = A \partial_A + M \partial_M - R \partial_R, \end{equation} with the first integrals $I_1 = - E_{\mathcal{L}}$ and \begin{equation} I_2 = I_1 r + 2 f_0^2 M A R^2 ( 4 - M R) \left( \frac{R'}{R} + \frac{M'}{M} \right), \qquad I_3 = 6 f_0^2 M A ( 4 - M R) R R', \label{fint-2} \end{equation} in which the latter first integral yields \begin{equation} A = \frac{I_3}{ 6 f_0^2 M (4 - M R) R R'} \, , \label{i-A-2} \end{equation} with $I_3 \neq 0$. Then it follows from the first integrals (\ref{fint-2}) that \begin{equation} \frac{R'}{R} + \frac{I_3}{(3 I_1 r + \alpha)} \frac{M'}{M} = 0, \end{equation} which has a solution \begin{equation} R = R_0 \left( 1 + \frac{ q}{ r} \right)^{\frac{2 I_3}{\alpha}}, \label{i-R-2} \end{equation} for $M(r) = r^2$, where $R_0$ is an integration constant, $\alpha=I_3 - 3 I_2$ and $q= \frac{ \alpha}{3 I_1}$. Thus, using (\ref{i-R-2}) in (\ref{i-A-2}) and $I_1 = -f_0^2 A B R^2 (4 - M R)^2$, we find \begin{equation} A = A_0 \left( 1 + \frac{q}{r} \right)^{1- \frac{4 I_3}{ \alpha} } \left[ R_0 r^2 \left( 1 + \frac{q}{r} \right)^{\frac{2 I_3}{ \alpha} } -4 \right]^{-1}, \quad B = \frac{4}{ \left( 1 + \frac{q}{r} \right) } \left[ 4- R_0 r^2 \left( 1 + \frac{q}{r} \right)^{\frac{2 I_3}{ \alpha} } \right]^{-1} \end{equation} where $A_0 = \frac{I_1}{4 f_0^2 R_0^2}$. So we have obtained a complete solution of the quadratic gravity ($n=2$) when $M (r)= r^2$. As far as we know, this solution is a new exact solution for the quadratic gravity. This solution is asymptotically flat if $0<I_3/\alpha<1/4$ and can describe a black hole since its horizons are at $r=-q$ and when $r^2R_0(q/r+1)^{2I_3/\alpha}=4$, which depends on the exponent $I_3/\alpha$. Thus, the above solution is a new black hole solution in quadratic gravity given by $f(R)=f_0R^2$. \subsection{{\bf Case (ii):} $f(R,\phi,X)= f_0 R + f_1 X^q - V(\phi)$.\label{case2}} In this case, the existence of a non-trivial Noether symmetry selects the form of potential function $V(\phi)$ of the theory, which means that it is possible to find out exact solutions for a given theory with the selected potential. Here the function $F$ takes the form $F = 2 f_0 + f_1 ( 1 - q) M X^q - M V(\phi)$. Further, the field Eq.~(\ref{fieldeq2}) and trace Eq.(\ref{trace}) for this case yield \begin{equation} R = \frac{2 V(\phi)}{f_0} + (q-2) \frac{f_1}{f_0} X^q, \qquad \nabla_{\mu} \left( X^{q-1} \nabla^{\mu} \phi \right) - \frac{\epsilon}{q f_1} V_{\phi} = 0. \end{equation} For the potential $V(\phi) = V_0 \left( \phi + V_1 \right)^{\frac{2 q}{1-q}}$, we find the Noether symmetries ${\bf Y}_1, \, {\bf Y}_2$ given in (\ref{ns-12}) and \begin{eqnarray} & & {\bf Y}_3 = A \partial_A - M \partial_M + \frac{ (1-q)}{2q} (\phi + V_1) \partial_{\phi} + \frac{X}{q} \partial_X, \label{ns-iii-1} \end{eqnarray} with $q \neq 1$. Further, for the potential $V(\phi) = V_0 \left( \phi + V_1 \right)^{\frac{4 q}{2-q}}$, it follows that the Noether symmetries are ${\bf Y}_1, \, {\bf Y}_2$, and \begin{eqnarray} & & {\bf Y}_3 = - \frac{A}{2 \sqrt{M}} \partial_A + \sqrt{M} \partial_M + \frac{(q -2)}{4 q \sqrt{M}} (\phi + V_1) \partial_{\phi} - \frac{X}{q \sqrt{M}} \partial_X, \label{ns-iii-2} \end{eqnarray} where $q \neq 1, 2$. For this case, the first integrals of Noether symmetries ${\bf Y}_1$ and ${\bf Y}_2$ are \begin{equation} I_1 = - E_{\mathcal{L} }, \qquad I_2 = I_1 r + f_0 A F M', \label{ns-fint-12} \end{equation} which are common for all possible subcases of this case, and give \begin{equation} A= \frac{ I_2 - I_1 r}{f_0 F M'}, \qquad B = \frac{f_0 I_1 M'}{ (I_1 r -I_2) F}. \label{sc-iii-1-1} \end{equation} The above relations require that \begin{equation} B = - \frac{ I_1 f_0^2 M'^2 }{ (I_1 r -I_2)^2 } A. \label{sc-iii-1-1b} \end{equation} The first integrals for (\ref{ns-iii-1}) and (\ref{ns-iii-2}) are , respectively \begin{equation} I_3 = - M A F \left[ f_0 \frac{A'}{A} - \frac{1}{2} f_1 \epsilon (q-1) X^{q-1} (\phi + V_1) \phi' \right], \label{sc-iii-1-2a} \end{equation} and \begin{equation} I_3 = \sqrt{M} A F \left[ f_0 \left( \frac{A'}{A} + \frac{M'}{2 M} \right) - \frac{1}{4} f_1 \epsilon (q-2) X^{q-1} (\phi + V_1) \phi' \right] \, . \label{sc-iii-1-2b} \end{equation} Using the relations given in (\ref{sc-iii-1-1}), the first integral (\ref{sc-iii-1-2a}) can be written in the form \begin{eqnarray} & & A' - \frac{I_3 M'}{ (I_1 r -I_2) M} A = \frac{ f_1 (q-1) \epsilon^q}{2^q f_0^{2 q-1} I_1^{q-1}} \left[ \frac{ I_1 r -I_2}{M'} \right]^{2(q-1)} (\phi + V_1) \phi'^{2q -1} A^{ 2-q}, \end{eqnarray} where $\epsilon^q = 1$ for even $q$, and $\epsilon^q = \epsilon$ for odd $q$. This is the Bernoulli differential equation for $A$, and it has the solution \begin{eqnarray} & & A^{q-1} = \frac{1}{\mu_1} \left[ A_0 + \frac{f_1 \epsilon^q (q-1)^2}{2^q f_0^{2q -1} I_1^{q-1}} \int{ \mu_1 \left( \frac{I_1 r -I_2}{M'} \right)^{2 (q-1)} (\phi + V_1) \phi'^{(2q -1)} dr} \right], \end{eqnarray} where $\mu_1$ is the integration factor given by $\mu_1 = \exp \left[ (1-q) I_3 \int{ M' dr / (I_1 r - I_2)M} \right]$, and $A_0$ is an integration constant. Furthermore, together with (\ref{sc-iii-1-1}), the first integral (\ref{sc-iii-1-2b}) takes the form \begin{eqnarray} & & A' + \left[ \frac{I_3 M'}{ (I_1 r -I_2) \sqrt{M}} + \frac{M'}{2 M} \right] A = \frac{ f_1 (q-2) \epsilon^q}{2^{q+1} f_0^{2 q-1} I_1^{q-1}} \left( \frac{ I_1 r -I_2}{M'} \right)^{2(q-1)} (\phi + V_1) \phi'^{(2q -1)} A^{ 2-q}, \end{eqnarray} which is also a Bernoulli differential equation and has the following solution \begin{eqnarray} & & A^{q-1} = \frac{1}{\mu_2} \left[ A_1 + \frac{f_1 \epsilon^q (q-1)(q-2) }{2^{q+1} f_0^{2q -1} I_1^{q-1}} \int{ \mu_2 \left( \frac{I_1 r -I_2}{M'} \right)^{2(q-1)} (\phi + V_1) \phi'^{(2q -1)} dr} \right], \end{eqnarray} where $\mu_2$ is the integration factor given by $\mu_2 = M^{(q-1)/2} \exp \left[ (q-1) I_3 \int{ M' dr / (I_1 r - I_2) \sqrt{M}} \right]$, and $A_1$ is an integration constant. Now, we search the Noether symmetries in the following relevant subcases for $q =1,2$. \subsubsection{{\bf Subcase (ii-a):} $q= 1$.} For this subcase, the field Eq.(\ref{fieldeq2}) and trace Eq.(\ref{trace}) for this subcase give \begin{equation} R = \frac{2 V(\phi)}{f_0} - \frac{f_1}{f_0} X, \qquad \square \phi = \frac{\epsilon}{ f_1} V_{\phi}. \end{equation} We find that there exists Noether symmetries for the potential $V= V_0 \left( \phi + V_1 \right)^4$ such that ${\bf Y}_1, \, {\bf Y}_2$ and \begin{eqnarray} & & {\bf Y}_3 = - \frac{A}{2 \sqrt{M}} \partial_A + \sqrt{M} \partial_M - \frac{ ( \phi + V_1)}{4 \sqrt{M}} \partial_{\phi}, \label{ns-iii-1-1} \end{eqnarray} Then the first integrals of this subcase are given by (\ref{ns-fint-12}) and \begin{eqnarray} & & I_3 = \frac{ I_2 - I_1 r}{ 2 \sqrt{M}} + f_0 F \sqrt{M} A', \end{eqnarray} where $F= - M (V_0 \phi + V_1)^4 + 2 f_0$. Thus, these Noether integrals give rise to the same relation with (\ref{sc-iii-1-1}), and \begin{eqnarray} \frac{F'}{F} + \frac{M''}{M'} - \frac{M'}{2 M} - \frac{1}{I_1 r -I_2} \left( I_1 + I_3 \frac{M'}{\sqrt{M}} \right) = 0, \quad M' \neq 0. \label{sc-iii-1-2} \end{eqnarray} Therefore, for $M= r^2$, we find that \begin{eqnarray} & & A= - \frac{ 1}{2 f_0 F_0 r} \left( I_1 r - I_2 \right)^{I_{13}}, \qquad B = \frac{2 f_0 I_1 r}{ F_0} \left( I_1 r - I_2 \right)^{-2+I_{13}}, \\& & \phi = \frac{1}{V_0 \sqrt{r}} \left[ 2 f_0 - F_0 \left( I_1 r - I_2 \right)^{1-I_{13} } \right]^{\frac{1}{4}} -V_1 , \end{eqnarray} where $F_0$ is an integration constant and $I_{13}=- 2 I_3/I_1$. If $I_{13}<1$, the above metric is asymptotically flat and has an horizon at $r=I_2/I_1$ with $I_{13}\neq 0$. Hence, this solution also represents a black hole solution which to the best of our knowledge is a new solution in this specific scalar field theory. \subsubsection{{\bf Subcase (ii-b):} $q= 2$.} In this subcase, the Eqs.(\ref{fieldeq2}) and (\ref{trace}) imply that \begin{equation} R = -\frac{2}{f_0} V(\phi), \qquad \nabla_{\mu} \left( X \nabla^{\mu} \phi \right) - \frac{\epsilon}{2 f_1} V_{\phi} = 0. \end{equation} For this subcase we find the Noether symmetries for the potentials $V= V_0 \left( \phi + V_1 \right)^{-4}$ and $V= V_1 e^{ - V_0 \phi}$, respectively, \begin{eqnarray} & & {\bf Y}_3 = A \partial_A - M \partial_M - \frac{ (\phi + V_1) }{4} \partial_{\phi} + \frac{X}{2} \partial_X, \label{ns-iii-2-1} \end{eqnarray} and \begin{eqnarray} & & {\bf Y}_3 = - \frac{A}{2 \sqrt{M}} \partial_A + \sqrt{M} \partial_M + \frac{1}{V_0 \sqrt{M}} \partial_{\phi} - \frac{X}{2 \sqrt{M}} \partial_X, \end{eqnarray} in addition to ${\bf Y}_1, \, {\bf Y}_2$. Here the Noether symmetry (\ref{ns-iii-2-1}) can be obtained by taking $q=2$ in (\ref{ns-iii-1}). Corresponding first integrals with the potential $V= V_0 \left( \phi + V_1 \right)^{-4}$ are given by (\ref{ns-fint-12}), and \begin{equation} I_3 = - M F \left[ f_0 A' - \frac{ f_1 (I_1 r - I_2)^2 }{ 4 I_1 f_0^2 M'^2} (\phi + V_1) \phi'^3 \right]. \end{equation} Then, using the first integrals of this subcase, we obtain the same form of $A$ and $B$ with (\ref{sc-iii-1-1}) and also the following constraint equation: \begin{eqnarray} & & A' - \frac{I_3 M' }{(I_2 - I_1 r) M} A = \frac{f_1 (I_2 - I_1 r)^2 (\phi + V_1) \phi'^3}{ 4 I_1 f_0^3 M'^2} , \label{sc-iii-2} \end{eqnarray} where $M' \neq 0$. For $M =r^2$, this equation has the following solution \begin{equation} A(r) = \left[ \frac{I_1 r - I_2}{r} \right]^{\frac{2 I_3}{I_2}} \left\{ A_0 + \frac{f_1}{16 I_1 f_0^3} \int{ \left[ \frac{I_1 r - I_2}{r} \right]^{2 (1 -\frac{I_3}{I_2})} (\phi + V_1) \phi'^3 dr} \right\}, \end{equation} where $A_0$ is a constant of integration. Then we find the metric function $B$ through (\ref{sc-iii-1-1b}) as \begin{equation} B(r) = - 4 I_1 f_0^2 \left[ \frac{I_1 r - I_2}{r} \right]^{2 (\frac{I_3}{I_2} -1)} \left\{ A_0 + \frac{f_1}{16 I_1 f_0^3} \int{ \left[ \frac{I_1 r - I_2}{r} \right]^{2 (1 -\frac{I_3}{I_2})} (\phi + V_1) \phi'^3 dr} \right\}. \end{equation} For the potential $V= V_1 e^{ - V_0 \phi}$, the first integrals $I_1$ and $I_2$ together with $E_{\mathcal{L}} = A B F^2$ gives the same relations obtained in (\ref{sc-iii-1-1}) and (\ref{sc-iii-1-1b}), where $F = 2 f_0 - f_1 M X^2 - f_2 V_1 M e^{-V_0 \phi}$. The first integral of ${\bf Y}_3$ becomes \begin{equation} I_3 = \frac{ I_2 - I_1 r}{ 2 \sqrt{M}} + \sqrt{M} A F \left[ f_0 \frac{A'}{A} + \frac{f_1}{V_0 B} \phi'^2 \right], \end{equation} which yields \begin{eqnarray} & & A' - \left[ \frac{I_3 M' }{(I_2 - I_1 r) \sqrt{M}} + \frac{M'}{M} \right] A = \frac{f_1 (I_2 - I_1 r)^2 \phi'^3}{ I_1 V_0 f_0^3 M'^2}. \label{sc-iii-3} \end{eqnarray} If $M = r^2$, then the Eq. (\ref{sc-iii-3}) gives \begin{equation} A(r) = \frac{ \left( I_1 r - I_2 \right)^{\frac{-2 I_3}{I_1}}}{r^2} \left\{ A_1 + \frac{f_1}{4 I_1 V_0 f_0^3} \int{ \left( I_1 r - I_2 \right)^{2 (1 +\frac{I_3}{I_1})} \phi'^3 dr} \right\},\label{AAA3} \end{equation} where $A_1$ is an integration constant. Thus it follows from Eq. (\ref{sc-iii-1-1b}) for $B$ that \begin{equation} B(r) = - 4 I_1 f_0^2 \left( I_1 r - I_2 \right)^{-2 (1 + \frac{I_3}{I_1} )} \left\{ A_1 + \frac{f_1}{4 I_1 V_0 f_0^3} \int{ \left( I_1 r - I_2 \right)^{2 (1 +\frac{I_3}{I_1})} \phi'^3 dr} \right\}.\label{BBB3} \end{equation} Then, if one specifies the scalar field $\phi$, one can find some exact solutions. As an example, let us take the following scalar field \begin{eqnarray} \phi(r)= \frac{3 C_1 }{I_1-2 I_3} (I_1 r - I_2)^{\frac{I_1-2 I_3}{3 I_1}}\,, \end{eqnarray} where $C_1$ is a constant and $I_3 \neq I_1 /2$. Using this scalar field, the integrands in \eqref{AAA3} and \eqref{BBB3} become $C_1^3$ and therefore, it is easy to get the following solution for the metric coefficients \begin{eqnarray} A(r)=\frac{(I_1 r-I_2)^{-\frac{2 I_3}{I_1}} }{r^2} \left( A_1 + \frac{ A_0\, r}{I_1} \right)\,,\quad B(r)=-4 f_0^2 I_1 (I_1 r-I_2)^{-2 \left(\frac{I_3}{I_1} + 1 \right)} \left( A_1 + \frac{A_0 r}{I_1} \right)\, , \label{AB-sol1} \end{eqnarray} where $A_0 = f_1 C_1^3 /(4 f_0^3 V_0)$. It is clear that for $I_1=-2I_3$, one gets for that the metric coefficients from \eqref{AB-sol1} are \begin{eqnarray} A(r)&=& A_0 + \frac{\left( A_0 I_2 - 4 A_1 I_3^2 \right) }{ 2 I_3 r} - \frac{A_1 I_2}{r^2}\,,\quad B(r)= 4 f_0^2 \left( \frac{ A_0 r - 2 A_1 I_3 }{I_2 + 2 I_3 r} \right) \,, \label{AB-sol2} \end{eqnarray} which behaves similarly as a Schwarzschild metric and additional contribution. This metric is asymptotically flat and has two horizons at the surfaces $r_1 = 2 A_1 I_3 / A_0$ and $r_2 = - I_2 /(2 I_3)$, i.e $A(r) = 0$ at these surfaces. At the surface $r= r_1$, the metric coefficient $B(r)$ vanishes, and it is infinite at the surface $r = r_2$. Therefore, the horizon at $r=r_2$ has same behaviour with the classical Schwarzschild solution. For the specific case $A_0=1, A_1 = 0, I_2 = -4 m I_3$ and $I_3= 2 f_0^2$, one gets the standard Schwarzschild solution $A(r)=1-\frac{2m}{r}$ and $B(r)=1/A(r)$ with $m= - I_2 / (4 I_3)$. Thus, the Eqs. \eqref{AB-sol2} can be understood as a generalization of the Schwarzschild solution found in General Relativity. \subsection{{\bf Case (iii):} $f(R,\phi,X)= f_0 \phi^m R^n + f_1 X^q - V(\phi)$.\label{case3}} For this case, the field Eq.(\ref{fieldeq2}) and trace Eq.(\ref{trace}) take the following form \begin{eqnarray} & & \square \left( \phi^m R^{n-1} \right) + \frac{(n-2)}{3 n} \phi^m R^n + \frac{2}{3 n f_0} \left[ \left( \frac{q}{2} -1 \right) X^q + V(\phi) \right] = 0, \\ & & \nabla_{\mu} \left( X^{q-1} \nabla^{\mu} \phi \right) + \frac{\epsilon}{q f_1} \left( m f_0 \phi^{m-1} R^n - V_{\phi} \right) = 0. \end{eqnarray} In this case the potential of the corresponding theory will be $V(\phi) = V_0 \phi^{ \frac{q (2n -m)}{n-q}}$ with $n \neq q$, and it is obtained the Noether symmetries for this potential such that ${\bf Y}_1, \, {\bf Y}_2$ given by (\ref{ns-12}) and \begin{equation} {\bf Y}_3 = \left[ \frac{m}{2 q} ( 3 - 2q ) + 2n -3 \right] A \partial_A + (1 - \frac{m}{2 q}) \left( M \partial_M - R \partial_R \right) - \frac{(n-q)}{2 q} \phi \partial_{\phi} + \frac{(m - 2n)}{2 q} X \partial_X, \label{Y3-iv} \end{equation} which have the Noether integrals \begin{eqnarray} & & I_1 = - E_{\mathcal{L} }, \qquad I_2 = I_1 r + f_0 n R^{n-1} \phi^m M A F \left[ (n-1) \frac{R'}{R} + \frac{M'}{M} \right], \label{fint-iv-1} \\ & & I_3 = M A F \left\{ f_0 n \phi^m R^{n-1} \left[ \ell \frac{A'}{A} + p \left( (n-1)\frac{R'}{R} + m \frac{\phi'}{\phi} \right) \right] + \frac{\epsilon}{2} f_1 (n - q) X^{q-1} \phi \phi' \right\}, \label{fint-iv-2} \end{eqnarray} where $\ell$ and $p$ are defined as $\ell= 2 -n + \frac{m}{2q} (q -2)$, $p= 2 n - 1 + \frac{m}{2 q}( 1 -2 q ), \, q \neq 0$, and $F = f_0 \phi^m R^{n-1} \left[ 2n + (n-1) M R \right] + f_1 (1-q) M X^q - V_0 M \phi^{\frac{q (2n-m)}{n-q}}$. The above relations give \begin{eqnarray} & & A (r) = \frac{ \left[ R^{n-1} \phi^m \right]^{-\frac{p}{\ell}} }{ R_1(r) } \left[ A_0 + \frac{ I_3 }{f_0 \ell n } \int{ \frac{ \left[ R^{n-1} \phi^m \right]^{\frac{p-\ell}{\ell}} R_1 (r)} { M F } dr} \right], \label{A-iv} \\& & B(r) = - \frac{I_1}{ A \, F^2}, \label{B-iv} \\& & (n-1) \frac{R'}{R} + \frac{M'}{M} = \frac{ (I_2 - I_1 r) R^{1-n} }{f_0 n \phi^m M A F}, \label{cnstra-iv} \end{eqnarray} where $A_0$ is an integration constant, $\ell \neq 0$, and $R_1 (r) = \exp \left[ \frac{ \epsilon f_1 (n-q)}{2 f_0 \ell n} \int{ \frac{ R^{1-n} \phi^{1-m} \phi' }{X^{1-q}} dr} \right]$. It is seen that this case is a generalization of the previous case. If $n= q =1$, i.e. $f(R,\phi, X) = f_0 R \phi^m + f_1 X - V(\phi)$, then we find the Noether symmetries ${\bf Y}_1, \, {\bf Y}_2$ given in \eqref{ns-12} and \begin{equation} {\bf Y}_3 = A \partial_A - M \partial_M , \label{Y3-iii-2} \end{equation} with vanishing potential $V(\phi) = 0$. Thus, the corresponding Noether integrals become \begin{eqnarray} & & I_1 = - E_{\mathcal{L} }, \qquad I_2 = I_1 r - I_1 f_0 M A \phi^m \left( \frac{M'}{M} + m \frac{\phi'}{\phi} \right), \qquad I_3 = I_1 f_0 M A \phi^m \left( \frac{A'}{A} + m \frac{\phi'}{\phi} \right) , \label{fint-iii-2} \end{eqnarray} where $E_{\mathcal{L} } = 4 f_0^2 A B \phi^{ 2 m}$. These first integrals give rise to the solutions \begin{eqnarray} & & A = \phi^{-m} \left[ A_0 + \frac{I_3}{I_1 f_0} \int{\frac{dr}{M} } \right], \qquad B = - \frac{ I_1 \phi^{-2 m}}{4 f_0^2 A}, \label{sol-iii-AB} \\ & & \phi^m = \frac{1}{M} \left[ \phi_0 + \frac{1}{I_1 f_0} \int{ \frac{ (I_1 r + I_2)}{A} dr } \right], \label{sol-iii-phi} \end{eqnarray} where $A_0$ and $\phi_0$ are integration constants. For the case $M=r^2$, assuming $\phi(r)= \left[ \frac{ C_1 ( A_0 f_0 I_1 r-I_3 )}{r (I_1 r+I_2)}\right]^{1/m}$, it follows from \eqref{sol-iii-AB} and \eqref{sol-iii-phi} that there are the possibilities $(a)\,\, \phi_0 = 0, A_0 = f_0^{-1}, I_2 = - I_3$ and $(b)\,\, I_2 = 0, A_0 = f_0^{-1}, I_1 = - C_1 I_3 / \phi_0$. In case $(a)$, one gets the following analytical solutions \begin{eqnarray} A(r)= \frac{A_0}{C_1 I_1} \left( I_1 r - I_3 \right)\,, \quad B(r)= \frac{A_0 I_1^2 C_1^{1- 2 m} r^{ 2 m}}{4 (I_3 -I_1 r)}\,, \quad \phi(r)^m = \frac{C_1}{r}. \label{iii-sol1} \end{eqnarray} Then, in case $(b)$, the analytical solutions are found as follows \begin{eqnarray} A(r)= \frac{A_0}{C_1} r \,, \quad B(r)= -\frac{A_0 I_1 C_1 r }{4 \left( C_1 + \frac{\phi_0}{ r} \right)^2 }\,, \quad \phi(r)^m = \frac{C_1}{r} + \frac{\phi_0}{ r^2} \,, \label{iii-sol2} \end{eqnarray} where it should be $I_1 < 0$. To the best of our knowledge, these are also new spherically symmetric solutions in this non-minimally couple theory between the scalar field and the Ricci scalar. It should be noted that the solution \eqref{iii-sol2} only depends on $m$ in the scalar field and not in the metric. The metrics \eqref{iii-sol1} and \eqref{iii-sol2} are non-asymptotically flat, and they have horizons at $r=I_3/I_1$ and $r=0$, respectively. \subsection{{\bf Case (iv):} $f(R,\phi,X)= f_0 R^n + f_1 \, \phi^m\, X^q$.\label{case4}} Here, the field Eq.(\ref{fieldeq2}) and trace Eq.(\ref{trace}) become \begin{eqnarray} & & \square \left( R^{n-1} \right) + \frac{(n-2)}{3 n} R^n + \frac{(q-2) f_1}{3 n f_0} \phi^m X^q = 0, \qquad \nabla_{\mu} \left( \phi^m X^{q-1} \nabla^{\mu} \phi \right) + \frac{\epsilon m}{q} \phi^{m-1} X^q = 0. \end{eqnarray} For this case, we have the Noether symmetries ${\bf Y}_1, \, {\bf Y}_2$ and \begin{eqnarray} & & {\bf Y}_3 = (2n -3) A \partial_A + M \partial_M - R \partial_R - \frac{(n-q)}{(m+ 2 q)} \phi \partial_{\phi} - \frac{(m + 2n)}{(m + 2q)} X \partial_X, \\& & {\bf Y}_4 = \phi^{-\frac{m}{2q}} \left( \partial_{\phi} - \frac{m \, X}{ q\, \phi} \partial_X \right), \label{Y3-v} \end{eqnarray} with $q \neq 0$. Then the first integrals corresponding to the above symmetries are \begin{eqnarray} & & I_1 = - E_{\mathcal{L} }, \quad I_2 = I_1 r + f_0 n M A F R^{n-1} \left[ (n-1) \frac{R'}{R} + \frac{M'}{M} \right], \label{fint-v-1} \\ & & I_3 = M A F \left\{ f_0 n R^{n-1} \left[ (2-n) \frac{A'}{A} + (n-1)(2 n -1) \frac{R'}{R} \right] + \frac{\epsilon f_1 (n-q)}{(m+ 2 q)} X^{q-1} \phi^{m+1} \phi' \right\}, \label{fint-v-2} \\& & I_4 = - \epsilon f_1 q M A F X^{q-1} \phi^{ \frac{ m(2 q -1)}{2 q}} \phi' \, , \quad \label{fint-v-3} \end{eqnarray} where $F = f_0 R^{n-1} \left[ 2 n + (1-n) M R \right] + f_1 (1-q) M \phi^m X^q$. Then we solve the above equation (\ref{fint-v-2}) in terms of $A$ and find \begin{eqnarray} & & A(r) = R^{ \frac{ (n-1)(2 n -1)}{n-2} } \left[ A_1 + \frac{1}{ f_0 n (2-n)} \int{ R^{ \frac{ (n-1)(4 n - 5)}{2-n}} \left( I_3 + \frac{ I_4 (n-q) \phi^{1 + \frac{m}{2q}} \phi'}{q (m + 2q) } \right) \frac{dr }{ M F_1} } \right], \end{eqnarray} where $A_1$ is an integration constant, and $F_1 \equiv f_0 [ 2 n + (1-n) M R ] + f_1 (1-q) M R^{1-n} \phi^m X^q$. This solution reduces to the solution of case (i) for $A$ given in (\ref{i-A}) if $f_1 = 0$ and so $I_4 = 0$. \subsection{{\bf Case (v):} $f(R,\phi,X)= U(\phi, X) \, R$.\label{case5}} This case gives a Brans-Dicke type action, where the coupling to the Ricci curvature also includes the kinetic term of the scalar field $\phi$. Then we select some form of the function $U(\phi, X)$ to search the Noether symmetries. \subsubsection{{\bf Subcase (v-a):} $U= f_0 X^q W(\phi)$.} The field Eq.(\ref{fieldeq2}) and trace Eq.(\ref{trace}) in this subcase have the form \begin{eqnarray} & & R = \frac{ 3 X^{-q} }{ (q-1) W(\phi)} \square \left[ X^{q} W (\phi) \right], \qquad \nabla_{\mu} \left( X^{q-1} W R \nabla^{\mu} \phi \right) + \frac{\epsilon }{q} X^{q} W_{\phi} R = 0. \end{eqnarray} For this subcase, when $W(\phi)$ is an arbitrary function of $\phi$, it is found that the Noether symmetries are ${\bf Y}_1, {\bf Y}_2$ by (\ref{ns-12}) and \begin{eqnarray} & & {\bf Y}_3 = A \partial_A + \frac{1}{(2q -1)} \left( M \partial_M - R \partial_R - X \partial_X \right), \quad q \neq \frac{1}{2} \, . \label{Y3-vi-a} \end{eqnarray} The corresponding first integrals of these symmetries become \begin{eqnarray} & & I_1 = - E_{\mathcal{L} }, \quad I_2 = I_1 r + f_0^2 X^{2 q} W^2 M A (2 - q M R) \left( \frac{M'}{M} + \frac{W'}{W} + q \frac{X'}{X} \right), \label{fint-vi-a-1} \\& & I_3 = \frac{f_0^2}{ (2q- 1)} X^{2 q} W^2 M A ( 2- q M R) \left[ (1-q) \frac{A'}{A} + (2q +1) \left( \frac{W'}{W} + q \frac{X'}{X} \right) \right], \label{fint-vi-a-2} \end{eqnarray} where $W' = W_{\phi} \phi'$. Solving the first integral (\ref{fint-vi-a-2}) in terms of $A$ it follows that \begin{eqnarray} & & A = \left( X^{ q} W \right)^{ \frac{ 2q +1}{q-1}} \left[ A_0 + \frac{ (2 q -1) I_3}{ (1-q) f_0^2} \int{ \frac{ \left( X^{q} W \right)^{ \frac{ 4q -1 }{1-q}} dr}{ M ( 2 - q M R)} } \right] , \label{a-AB} \end{eqnarray} and combining (\ref{fint-vi-a-1}) yields \begin{eqnarray} & & B = - \frac{I_1}{ f_0^2 A X^{2 q} W^2 ( 2 - q MR)^2}, \label{fint-vi-a-1-2} \\& & \frac{W'}{W} + \frac{M'}{M} + q \frac{X'}{X} = \frac{I_2 - I_1 r}{f_0^2 X^{2 q} W^2 M A (2 - q M R)} , \label{fint-vi-a-2-2} \end{eqnarray} where $A_0$ is a constant of integration. Considering these results one can derive some exact solutions of the field equations. As an example of the above solution, if we take $q= 1/4, M(r) = r^2$ and $R= \alpha/r^2$, then the relations (\ref{a-AB})-(\ref{fint-vi-a-2-2}) give \begin{eqnarray} & & A = \frac{A_0}{K_1} r^{3 - p} \left( K_1 \, r + K_2 \right)^{1 + p \ell}, \label{vi-A} \\ & & B = \frac{ 1 }{ K_1 + \frac{K_2}{r} }, \label{vi-BR} \end{eqnarray} where $p = \frac{ (8 -\alpha) I_2}{2 I_1 K_2}, \, \ell = \frac{ ( I_1 K_2 + I_2 K_1)}{ K_1 I_2}$, and $K_1, K_2$ are constants defined by $K_1 = - \frac{A_0 f_0^2 (8 - \alpha)^2}{16 I_1}$ and $K_2 = \frac{ (\alpha -8) I_3}{6 I_1}$. Considering the definition of $R$ given by (\ref{r-scalar}) to satisfy $R= \alpha/r^2$, we find that $ \ell = -1/3$ and $ K_1 = 1- \alpha/2$ for $p=3$ which means $A = \frac{A_0}{K_1}$ and $B$ by (\ref{vi-BR}), or $ \ell = -1/4$ and $ K_1 = (4- 2 \alpha)/3$ for $p=4$ which means $A = \frac{A_0}{K_1 r}$ and $B$ by (\ref{vi-BR}). \bigskip \subsubsection{{\bf Subcase (v-b):} $U= f_0 X^{1/2} V_{\phi}$, where $V_{\phi} = d V(\phi) / d\phi$.} For this subcase, the field Eq.(\ref{fieldeq2}) and trace Eq.(\ref{trace}) are as follows \begin{eqnarray} & & R = - \frac{ 6 }{ V_{\phi} \sqrt{X}} \square \left( V_{\phi} \sqrt{X} \right), \qquad \nabla_{\mu} \left( \frac{R}{ \sqrt{X}} V_{\phi} \nabla^{\mu} \phi \right) + 2 \epsilon \sqrt{X} V_{\phi \phi} R = 0. \end{eqnarray} This subcase has also Noether symmetries ${\bf Y}_1, {\bf Y}_2$ given in (\ref{ns-12}) and ${\bf Y}_3$ with \begin{eqnarray} & & {\bf Y}_3 = M \partial_M - R \partial_R - X \partial_X . \label{Y3-vi-b} \end{eqnarray} In this subcase, we find some extra Noether symmetries as follows \begin{eqnarray} & & {\bf Y}_4 = A \partial_A - \frac{ (M R -4)}{2 M} \partial_R - \frac{V}{M R V_{\phi}} \partial_{\phi} + \left( \frac{2 V V_{\phi \phi}}{M R V_{\phi}^2} - \frac{1}{2} \right) X \partial_X, \label{iv-Y4} \\& & {\bf Y}_5 = - \frac{ (M R -4)}{M} \partial_R + \frac{ (M R -2) V}{M R V_{\phi}} \partial_{\phi} + \left[ 1 + \frac{2 ( 2 -M R) V V_{\phi \phi}}{M R V_{\phi}^2} \right] X \partial_X, \label{iv-Y5} \\& & {\bf Y}_6 = A \ln M \partial_A - \frac{M}{2} \ln \left( A M^3 \right) \partial_M + \frac{2}{M} \left[ (M R +1) \ln M + \ln A \right] \partial_R - \frac{V}{M R V_{\phi}} \left[ (M R -1) \ln M + \left( 1 - \frac{M R}{2} \right) \ln A \right] \partial_{\phi} \nonumber \\& & \quad \qquad + \left[ 1 + \ln A + \frac{2 V V_{\phi \phi}}{M R V_{\phi}^2} \left( (M R -1) \ln M + \left( 1 - \frac{M R}{2} \right) \ln A \right) \right] X \partial_X, \label{iv-Y6} \\& & {\bf Y}_7 = A \ln A \left( \ln M + \frac{\ln A}{2} \right) \partial_A + M \ln M \left( \ln M + \frac{\ln A}{2} \right) \partial_M \nonumber \\& & \qquad + \frac{1}{M} \left\{ \left[ \left(\frac{3 M R}{2} - 2 \right) \ln M + (M R -2) \ln A 2 M R -8 \right] \ln M + \left[ \left( \frac{M R}{2} -2 \right) \ln A + M R -4 \right] \ln A \right\} \partial_R \nonumber \\& & \qquad + \frac{V}{M R V_{\phi}} \left\{ \left[ \left( \frac{M R}{2} - 1 \right) \ln M + 2 M R -4 - \ln A \right] \ln M + \left[ \left( \frac{M R}{4} -1 \right) \ln A + M R -2 \right] \ln A \right\} \partial_{\phi} \nonumber \\& & \qquad + \Big[ \frac{2 V V_{\phi \phi}}{M R V_{\phi}^2} \left\{ \left[ \left( 1- \frac{M R}{2} \right) \ln M + \ln A - 2 M R + 4 \right] \ln M + \left[ \left( 1 - \frac{M R}{4} \right) \ln A - M R + 2 \right] \ln A \right\} \nonumber \\& & \qquad \qquad - \left( \ln A + \frac{\ln M}{2} \right) \ln M \Big] X \partial_X, \label{iv-Y7} \end{eqnarray} \begin{eqnarray} & & {\bf Y}_8 = A \ln A \partial_A + 2 M \left( \ln M + \frac{M R}{4} \right) \partial_M - \frac{1}{M} \left[ ( 3 M R - 4) \ln M + (M R -2 )\ln A \right] \partial_R \nonumber \\& & \qquad + \frac{V}{M R V_{\phi}} \left[ (M R -2) \ln M - \ln A \right] \partial_{\phi} + \left[ \frac{2 V V_{\phi \phi}}{M R V_{\phi}^2} \left( ( 2 - M R) \ln M + \ln A \right) - \ln (M A) -2 \right] X \partial_X, \\& & {\bf Y}_9 = V \left[ A \partial_A + M \partial_M - R \partial_R + \left( \frac{3 \epsilon X V_{\phi}}{ R V} - \frac{V}{4 V_{\phi}} \right) \partial_{\phi} - \left( 2 + \frac{6 \epsilon X V_{\phi \phi}}{ R V} - \frac{V V_{\phi \phi}}{ 2 V_{\phi}^2} \right) X \partial_X \right] , \\& & {\bf Y}_{10} = \frac{4 \epsilon r}{ f_0^2 M A R ( M R -4) V_{\phi}} \left[ \partial_{\phi} - \frac{2 V_{\phi \phi}}{ V_{\phi}} X \partial_X \right] \qquad {\rm with} \quad K = V(\phi), \end{eqnarray} where the subscript $\phi$ denotes the derivative with respect to $\phi$, and $V_{\phi} \neq 0$. The Noether symmetries ${\bf Y}_1, ..., {\bf Y}_9$ have the following nonvanishing Lie brackets: \begin{eqnarray} & & \left[ {\bf Y}_1, {\bf Y}_2 \right] = {\bf Y}_1, \qquad \left[ {\bf Y}_2, {\bf Y}_6 \right] = -\frac{1}{2} {\bf Y}_3 + \frac{1}{2} {\bf Y}_5, \qquad \left[ {\bf Y}_2, {\bf Y}_7 \right] = {\bf Y}_5 + {\bf Y}_6 + {\bf Y}_8, \qquad \left[ {\bf Y}_2, {\bf Y}_8 \right] = \frac{1}{2} {\bf Y}_3 + {\bf Y}_4, \nonumber \\& & \left[ {\bf Y}_3, {\bf Y}_6 \right] =- \frac{3}{2} {\bf Y}_3 + {\bf Y}_4 - {\bf Y}_5 , \qquad \, \left[ {\bf Y}_3, {\bf Y}_7 \right] = 2 {\bf Y}_5 + {\bf Y}_8, \qquad \qquad \left[ {\bf Y}_3, {\bf Y}_8 \right] = 2 {\bf Y}_3 + {\bf Y}_5 , \label{nsv-v-b-Lb} \\& & \left[ {\bf Y}_4, {\bf Y}_6 \right] = -\frac{1}{2} {\bf Y}_3 + \frac{1}{2} {\bf Y}_5 , \qquad \qquad \left[ {\bf Y}_4, {\bf Y}_7 \right] = {\bf Y}_5 + {\bf Y}_6 + {\bf Y}_8, \qquad \left[ {\bf Y}_4, {\bf Y}_8 \right] = \frac{1}{2} {\bf Y}_3 + {\bf Y}_4 , \nonumber \\& & \left[ {\bf Y}_6, {\bf Y}_7 \right] = -{\bf Y}_7, \quad \left[ {\bf Y}_6, {\bf Y}_8 \right] = - {\bf Y}_6 - \frac{1}{2} {\bf Y}_8 , \qquad \left[ {\bf Y}_7, {\bf Y}_8 \right] = -2 {\bf Y}_7 . \nonumber \end{eqnarray} Here we do not consider the Lie brackets of Noether symmetry ${\bf Y}_{10}$ due to the gauge function $K = V(\phi)$ appeared together with this symmetry. For the Noether symmetries ${\bf Y}_{1}$ and ${\bf Y}_{10}$, the Noether first integrals are \begin{equation} I_1 = - E_{\mathcal{L} }, \qquad I_{10} = r V_{\phi} \phi' - V(\phi), \label{fint-vi-b-1} \end{equation} in which the latter first integral has a solution for $V(\phi)$ in terms of $r$ as $V(\phi) = V_0 r - V_1$, where $V_1 \equiv I_{10}$ and $V_0$ is an integration constant. Thus, using the definition of $X$ which has the form $X = - \epsilon \phi'^2 / 2 B$, we find from the first relation of (\ref{fint-vi-b-1}) for $A$ that \begin{eqnarray} & & A = \frac{ 8 \epsilon I_1}{ f_0^2 V_{0}^2 ( 4- M R)^2 }. \label{v-b-A} \end{eqnarray} For the first integrals of the Noether symmetries ${\bf Y}_2,..., {\bf Y}_9$, one can get the following relations \begin{eqnarray} & & I_2 = I_1 r + \frac{2 I_1 M }{ B (4 - M R) } \left( \frac{M'}{M} - \frac{B'}{2 B} \right), \quad I_3 = \frac{2 I_1 M }{ B (4 - M R)} \left( \frac{A'}{2A} - \frac{B'}{B} \right), \nonumber \\& & I_4 = \frac{ I_1 M}{ B ( 4- M R)} \left( \frac{A'}{2 A} + \frac{B'}{B} - \frac{M'}{M} + \frac{2 V B}{V_0 M} \right), \qquad I_5 = \frac{- 2 I_1 M}{ B ( 4- M R)} \left[ \frac{A'}{ A} + \frac{2 M'}{M} + \frac{2 V B }{V_0 M} (MR -2) \right], \nonumber \\ & & I_6 = \frac{ - I_1 M}{ B ( 4- M R)} \left[ \ln A \left( \frac{B'}{B} + \frac{M'}{M} + \frac{V B}{V_0 M} (M R -2) \right) + \ln M \left( \frac{2 B'}{ B} - \frac{3 A'}{A} - \frac{M'}{M} - \frac{ 2 V B}{V_0 M} (M R -1) \right) + \frac{ A'}{A} + \frac{2 M'}{M} \right], \nonumber \\ & & I_7 = \frac{ - I_1 M}{ B ( 4- M R)} \Big[ (\ln A)^2 \left( \frac{M'}{M} -\frac{B'}{2B} + \frac{V B}{2 V_0 } (M R -4) \right) + 2 \ln A \ln M \left( \frac{M'}{2 M} - \frac{B'}{B} - \frac{V B}{V_0} \right) \nonumber \\& & \qquad \qquad \qquad \qquad \quad + 2 (\ln M)^2 \left( \frac{3 A'}{2 A} - \frac{B'}{B} + \frac{M'}{2 M} + \frac{ V B }{2 V_0} (M R -2) \right) + 2 \ln (A M^2) \frac{ V B}{V_0} (M R -2) \Big], \label{fint-1-9} \\ & & I_8 = \frac{ 2 I_1 M}{ B ( 4- M R)} \Big[ \ln A \left( \frac{A'}{A} + \frac{B'}{B} + \frac{V B}{V_0 M} \right) - \ln M \left( \frac{3 A'}{A} - \frac{2 B'}{B} + \frac{M'}{M} + \frac{V B}{V_0 M} (M R -2) \right) \nonumber \\& & \qquad \qquad \qquad \qquad \quad - \frac{M R}{2} \left( \frac{A'}{A} - \frac{B'}{B} + \frac{M'}{M} \right) + \frac{A'}{A} - \frac{2 M'}{M} \Big], \nonumber \\ & & I_9 = \frac{ I_1 M}{ B ( 4- M R)} \left[ \frac{3 B'}{B} + \frac{3 V_0}{V} + \frac{ V B R}{2 V_0} \right], \nonumber \end{eqnarray} with $V= V_0 r - V_1$. Then, it is obtained for $B$ from the first integrals $I_2, I_3, I_4$ and $I_9$ that \begin{eqnarray} & & B = \frac{ 3 V_0 I_1 M }{ \left[ K_0 + \frac{I_1 (V_0 r - V_1)}{2 V_0} \right] M R - 4 K_0 }, \label{v-b-B} \end{eqnarray} where $K_0$ is a constant defined by $K_0 = V_1 \frac{I_1}{V_0} - I_2 + I_3 + 2 I_4 - I_9$. Thus, the first integrals $I_2$ and $I_3$ in (\ref{fint-1-9}) yield \begin{eqnarray} \left[ K_0 + \frac{I_1 (V_0 r - V_1)}{2 V_0} \right] M R - 4 K_0 & = &\frac{ 3 V_0}{M} \left( B_0 I_1 - \int{ (I_1 r - I_2) (4 - M R) M dr } \right), \label{ceq-v-b-1} \\& = & 3 V_0 M ( 4 - M R ) \left( B_1 I_1 - \frac{I_3}{2} \int{ \frac{dr}{M}} \right), \label{ceq-v-b-2} \end{eqnarray} where $B_0, B_1$ are constants of integration. Furthermore, after some algebra, we find from the first integrals (\ref{fint-1-9}) the following constraint relations \begin{eqnarray} & & I_5 = 4 \left( I_2 - I_4 - \frac{V_1}{V_0} I_1 \right), \nonumber \\& & I_6 = \frac{I_5}{2} + \frac{ 2 I_1 V (M R -2) }{ V_0 ( 4 - M R)} + \left[ \frac{ 2 I_1 M }{ B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) - I_3 - \frac{I_5}{2} - \frac{4}{3} I_9 \right] \ln A \nonumber \\& & \qquad \quad + \left[ \frac{ 2 I_1 V (M R -1) }{ V_0 ( 4 - M R)}- \frac{ 5 I_1 M }{ B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) + I_1 r - I_2 + 3 I_3 + \frac{5}{3} I_9 \right] \ln M, \nonumber \\& & I_7 = -\frac{ 2 I_1 V (M R -2) }{ V_0 ( 4 - M R)} \ln (A M^2) + \left[ \frac{ I_1 V M (M R -2) }{ V_0 ( 4 - M R)} - \frac{ I_1 M }{ 2 B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) - I_1 r + I_2 - \frac{I_9}{6} \right] (\ln A)^2 \nonumber \\& & \qquad \quad - \left[ \frac{ I_1 M }{ B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) - \frac{ 2 I_1 V }{ V_0 ( 4 - M R)} + I_1 r - I_2 - \frac{I_9}{3} \right] (\ln A) ( \ln M) \nonumber \\& & \qquad \quad + \left[ \frac{ 5 I_1 M }{ B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) - \frac{ I_1 V M (M R -2) }{ V_0 ( 4 - M R)} - I_1 r + I_2 - 3 I_3- \frac{5}{3} I_9 \right] (\ln M)^2, \label{fint-1-9-2} \\& & I_8 = 2 I_3 - (I_1 r -I_2) (M R + 4) + \left[ \frac{ 2 I_1 M }{ B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) - I_3 - \frac{2}{3} I_9 \right] M R \nonumber \\& & \qquad \quad + 2 \left[ I_3 + I_9 + \frac{ I_1 V }{ V_0 ( 4 - M R)} - \frac{ 3 I_1 M }{ B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) \right] \ln A \nonumber \\& & \qquad \quad - 2 \left[ \frac{ I_1 V (M R -2) }{ V_0 ( 4 - M R)} - \frac{ 5 I_1 M }{ B ( 4 - M R)} \left( \frac{V_0}{V} + \frac{V B R}{6 V_0} \right) + I_1 r - I_2 + 3 I_3 + \frac{5}{3} I_9 \right] \ln M. \nonumber \end{eqnarray} Now, for $M = r^2$, the constraint equation (\ref{ceq-v-b-2}) yields \begin{equation} R = \frac{ 8 \left[ 3 V_0 \left( B_1 I_1 + \frac{I_3}{2 r} \right) + \frac{K_0}{r^2} \right] }{ 2 K_0 - \frac{V_1 I_1}{V_0} + ( I_1 + 3 V_0 I_3) r + 6 V_0 B_1 I_1 r^2}, \label{v-b-R2} \end{equation} Then, using the latter $R$ in Eqs. (\ref{v-b-A}) and (\ref{v-b-B}) for $A$ and $B$, respectively, it follows that \begin{eqnarray} & & A = \frac{ \epsilon \left[ 2 K_0 - \frac{V_1 I_1}{V_0} + ( I_1 + 3 V_0 I_3) r + 6 V_0 B_1 I_1 r^2 \right]^2}{ 2 I_1 f_0^2 ( V_0 r - V_1)^2 }, \label{v-b-A2} \\& & B = \frac{ V_0 \left[ 2 K_0 - \frac{V_1 I_1}{V_0} + ( I_1 + 3 V_0 I_3) r + 6 V_0 B_1 I_1 r^2 \right]}{ 4 (V_0 r - V_1)\left( B_1 I_1 + \frac{I_3}{2 r} \right)}, \label{v-b-B2} \end{eqnarray} which is a new solution for $M = r^2$. Some other solutions could be produced from the constraint equation (\ref{ceq-v-b-2}) if we choose an integrable function of $M$ in it. Clearly, this solution is non-asymptotically flat unless $I_1=-3 V_0 I_3$ and $B_1=0$. The singularities of the solutions \eqref{v-b-A2} and \eqref{v-b-B2} can be classified in the following way: \begin{itemize} \item At $r = V_1 / V_0$, the metric coefficients $A$ and $B$ tend to infinity, but the Ricci scalar remains finite there. \item At $r=-I_3/(2B_1 I_1)$, the metric coefficient $A$ becomes finite, $B$ goes to infinity, and the Ricci scalar remains finite there. \item The algebraic equation $A(r) = 0$ from \eqref{v-b-A2} gives the solutions \begin{eqnarray} & & r_{\pm} = \frac{1}{ 12 V_0 B_1 I_1} \left[ -( I_1 + 3 V_0 I_3) \pm \sqrt{ ( 24 B_1 V_1 + 1) I_1^2 + 6 V_0 I_1 ( I_3 - 8 B_1 K_0 ) + 9 V_0^2 I_3^2 } \right]. \end{eqnarray} Here, the outer horizon $r= r_{+}$ of the metric constructed from \eqref{v-b-A2}, \eqref{v-b-B2} and $M(r)= r^2$ exhibits an event horizon. The inner horizon $r = r_{-}$ is not because in the entire region $r < r_{+}$ there are outgoing radial null geodesics which fail to reach future null infinity and the hypersurface $r = r_{-}$ is not a boundary of a region with this property. At $r=r_{\pm}$, the metric functions $A$ and $B$ vanish, but the Ricci scalar diverge to infinity, which is a true space-time singularity. \end{itemize} \section{Conclusions} In this paper we derived the Noether symmetries of spherically symmetric metric (\ref{metric}) for a Lagrangian density with the function $f(R, \phi, X)$. This analysis covers most of modified gravity models proposed in the current literature. It is important to get any exact solutions for a given theory admitting a Noether symmetry if it exists. Besides, the existence of a Noether symmetry “select" the integrable form of a model in a given class of theories. Furthermore, the existence of Noether symmetries means to find out conserved quantities according to the Noether Theorem. For each form of the function $f(R,\phi,X)$, and so for the theory of gravity, we can find out exact cosmological solutions if there exists any Noether symmetry. One can search for symmetries of the Lagrangian related to cyclic variables to reduce the dynamics. It is known that the conserved quantities are related to the existence of cyclic variables into the dynamics by the Noether symmetry (see Ref.~\cite{capo2007} for details). But it is not unique to find those of cyclic variable because of that the required equations for the change of coordinates have not unique solution, and it is usually needed a clever choice. Also, the solution of equations for the choice of coordinates is not well defined on the whole space \cite{capo2007}. Throughout this study, we deduced that it is better to use the classical Noether symmetry approach to find Noether symmetry in $f(R,\phi,X)$ theory of gravity, rather that the approach used in Ref. \cite{capo2007}. In this study we show that under the classical Noether theorem, Noether symmetry in $f(R,\phi,X)$ theory of gravity yields a rather handy conserved quantity (or the first integral of motion), which can be solved easily, and it is not required to search for the cyclic coordinate. Therefore, we directly use the conservation relation (\ref{con-law}) associated with the obtained Noether symmetry ${\bf Y}$ in order to find exact solutions for the field equations associated with the Lagrangian (\ref{lagr2}). In the previous section, we have studied different kinds of $f(R,\phi,X)$ theories, in all of which the Noether symmetry exists and find exact spherically symmetric solutions in the corresponding $f(R,\phi,X)$ theory gravity. It is important to remark that in the literature, many authors have found solutions in $f(R)$ only considering $R=\textrm{constant}$, which indeed is a trivial case since all the higher order terms considered in $f(R)$ disappears. We have found new spherically symmetric solutions in power-law $f(R)$ gravity by considering $R\neq \textrm{constant}$ which is non-trivial and in principle, without using Noether symmetries, it could have been hard to find them. In addition, we have also found other solutions in theories considering the scalar field $\phi$, a kinetic term $X$ and a potential $V(\phi)$. Some interesting new spherically symmetric solutions were found for non-minimally couplings theories between the scalar curvature and the scalar field $f(R,\phi,X)=f_0 R^n \phi^m+f_1 X^q-V(\phi)$, non-minimally couplings between the scalar field and a kinetic term $f(R,\phi,X)=f_0 R^n +f_1\phi^mX^q$ , and also in extended Brans-Dicke gravity $f(R,\phi,X)=U(\phi,X)R$. Some of these solutions also represent black hole solutions. For some class of gravity theories in this paper we found some selected potential functions of $V(\phi)$. So one can apply the Noether symmetry approach as a selection rule to determine the form of the potential function $V(\phi)$ of the theory. \begin{acknowledgments} S.B. is supported by the Comisi{\'o}n Nacional de Investigaci{\'o}n Cient{\'{\i}}fica y Tecnol{\'o}gica (Becas Chile Grant No.~72150066) and Mobilitas Pluss N$^\circ$ MOBJD423 by the Estonian government. In addition, the work of K.B. is supported in part by the JSPS KAKENHI Grant Number JP25800136 and Competitive Research Funds for Fukushima University Faculty (18RI009). The authors are thankful to the referee for his/her valuable comments to improve our manuscript. \end{acknowledgments}
\section{Introduction} A fundamental optimization model is ubiquitous in many fields such as machine learning, signal and image processing, and compressed sensing. Typically, the model is to minimize the sum of a smooth function $f$ and a convex regularizer $g$: \begin{align}\label{model} \min_{x\in\mathcal{H}} F(x):=f(x)+g(x), \end{align} where $\mathcal{H}$ is a real Hilbert space. In recent years, there has been a great deal of interest in developing algorithms to solve (\ref{model}). A classic framework to solve it is the forward-backward splitting(FBS) method \cite{combettes2005signal}, which could be formulated as follows: \begin{align}\label{approx} x_{k+1}=\mathop{\arg\min}_{x\in\mathbb{R}^n} \underbrace{f(x_k)+\langle\nabla f(x_k),x-x_k\rangle+\frac{1}{2\tau_k}\|x-x_k\|^2_2}_{\color{black}p_k(x)}+g(x). \end{align} Note that $p_{k}$ could be regarded as a second-order approximation to $f$ around $x_k$. Therefore, it is reasonable to further exploit the second-order information of $f$ like \begin{align*} q_k(x):=f(x_k)+\langle\nabla f(x_k),x-x_k\rangle+\frac{1}{2}(x-x_k)^T\nabla^2f(x_k)(x-x_k). \end{align*} Actually, this kind of approximation was used to design the proximal Newton method \cite{qi1997preconditioning,wei1996convergence}. If $\nabla^2 f$ enjoys some special structure, the proximal Newton method can be very efficient, as shown in \cite{Hsieh_Dhillon_2011} for solving the $\ell_1$-regularized inverse covariance matrix estimation problem. However, in general cases and for large-scale problems, the storage and computation of $\nabla^2 f(x_k)$ could be prohibitive. Thus, one might pursue some approximations to $\nabla^2 f$. In practice, we usually seek positive definite matrices $H_k$ to approximate $\nabla^2 f(x_k)$. This motivates the proximal successive quadratic approximation (SQA) method: \begin{align}\label{hkprob} x_{k+1}=\mathop{\arg\min}_{x\in\mathbb{R}^n} \langle\nabla f(x_k),x-x_k\rangle+\frac{1}{2}(x-x_k)^TH_k(x-x_k)+g(x). \end{align} The scheme above can be viewed as a generalization of the FBS and proximal Newton methods, as it reduces to them by setting $H_k=\frac{1}{\tau_k}I_n$ and $H_k=\nabla^2f(x_k)$, respectively. In this sense, SQA is also known as the proximal quasi-Newton method or the variable metric forward-backward splitting method. Numerically, one vital issue is how to solve the subproblems (\ref{hkprob}), whose closed-form solutions are usually hard to obtain. Therefore, iterative algorithms are needed to find inexact solutions to the subproblems. On this road, the authors of \cite{Byrd_Nocedal_Oztoprak_2016} proposed a proximal gradient-based inexactness condition for solving subproblems inexactly, along with a global convergence result. Later, the authors of \cite{yue2016family} showed superlinear and Q-quadratic convergences (with respect to outer iterations) for a family of inexact SQA methods by a delicate parameter choosing strategy for the proximal gradient-based condition. It should be noted that they employed the Luo-Tseng error bound to replace the strong convexity near optimal points. However, we observe that the inexactness condition might increase the inner iteration complexity as the outer iteration goes on, which is scarcely taken into account in previous works. This is the first motivation of our study. Besides the gradient-based inexactness condition, which might make the number of inner iterations hard to estimate, some inexactness conditions based on the decrease of function values appeared. For example, the authors of \cite{Scheinberg_Tang_2016} proposed an inexact SQA method such that the function values of $Q_k(\cdot)$ (which are modifications of the objective functions in (\ref{hkprob})) decrease to a given absolute error. With a proper parameter selection strategy and for arbitrary $\epsilon>0$, they showed that $\mathcal{O}(\frac{1}{\varepsilon}\log{\frac{1}{\varepsilon}})$ inner iterations is enough to yield an approximate solution $\bar x^\ast$ satisfying \begin{align} F(\bar x^\ast)-\inf F\leq \varepsilon. \end{align} To put a uniform upper bound on the number of inner iterations, the authors of \cite{lee2018inexact} presented another inexactness condition, which requires that the function values of $Q_k(\cdot)$ decrease to some relative error. They showed linear convergence results under the optimal set strongly convexity (OSSC), which is weaker than the strong convexity assumption. A common assumption made in these existing inexact SQA methods is that the gradient of the smooth part $f$ is Lipschitz continuous, which may fail in many problems. Therefore, it is natural to ask how inexact SQA methods behave without this assumption. This is the second motivation of our study. Before us, we note that a couple of exact gradient-type methods without this assumption have been investigated recently \cite{Cruz_On_2016,Cruz_On_2016_,bello2018q}. Among them, the author of \cite{salzo2017variable} studied a class of exact SQA methods. The main tool employed in \cite{salzo2017variable} is the quasi-Fej\'er monotone property and thus put a strong restriction on $\{H_k\}$. For inexact SQA methods, we find the line of thought in \cite{salzo2017variable} is infeasible because the inexact solving of subproblems brings essential difficulties in analyzing iteration points. Besides, we want to drop the additional restriction on $\{H_k\}$. To this end, we develop new proof methods to study inexact SQA methods under weaker conditions than the gradient-Lipschitz-continuity assumption, and make the following contributions: \begin{itemize} \item[1.] We present an algorithmic framework of inexact SQA methods with four types of backtracking line search strategies, and show its well-definedness without assuming the the gradient-Lipschitz-continuity property. \item[2.] We relax OSSC\cite{lee2018inexact} to the weaker quadratic growth condition to obtain Q-linear {\color{black} convergence of the function value sequence and R-linear convergence of the iterate sequence.} \item[3.] Without the quadratic growth property, we derive a $o(k^{-1})$ convergence of the function value sequence by non-trivially modifying \cite[Lemma 6]{lee2018inexact}, which improves the $\mathcal{O}(k^{-1})$ convergence in most existing related results. The author of \cite{salzo2017variable} also presented a $o(k^{-1})$ convergence result but for exact SQA method and with stronger restrictions on $\{H_k\}_{k\geq 0}$. \item[4.] {\color{black}Finally, we show that a local gradient-Lipschitz-continuity condition could guarantee a uniform positive lower bound for stepsizes when performing backtracking line searches.} \end{itemize} The paper is organized as follows. In Section 2, we introduce notations and assumptions. In Section 3, we present the algorithmic framework of inexact SQA methods with four types of backtracking line search strategies. In Section 4, we analyze the global complexity of the algorithmic framework under mild assumptions. In Section 5, we give a short summary of this paper, along with some discussion for future work. \section{Notations \& Assumptions} {\color{black} For a nonempty closed set $\mathcal{C}\subset\mathbb{R}^n$, we denote the distance from $x$ to $\mathcal{C}$ by $\dist(x,\mathcal{C}):=\inf_{y\in\mathcal{C}}\|x-y\|$. The domain of an extended-value function $h:\mathbb{R}^n\rightarrow[-\infty,+\infty]$ is defined as $\dom h:=\{x\in\mathbb{R}^n: h(x)<+\infty\}$. We say that $h$ is proper if $h(x)>-\infty$ for every $x$ and $\dom h\neq \emptyset$. The gradient of a differentiable function $f$ is denoted by $\nabla f$. } We say that $\nabla f$ is $L$-Lipschitz continuous on a convex set $S$ if \begin{align*} \|\nabla f(x)-\nabla f(y)\|\leq L\|x-y\|,~~\forall x,y\in S. \end{align*} We say a sequence $\{x_k\}$ R-linearly converges to $x^\ast$ if \begin{align} \limsup_{k\rightarrow+\infty}\|x_k-x^\ast\|^\frac{1}{k}<1. \end{align} We modify the subproblem \eqref{hkprob} into the following form: \begin{align}\label{sqa} \min_{x\in\mathcal{H}} Q_k(x):=\langle \nabla f(x_k),x-x_k\rangle+g(x)-g(x_k)+\frac{1}{2}\|x-x_k\|_k^2, \end{align} and let $Q_k^\ast$ be the minimum. The notation $\|\cdot\|_k$ will be explained below. We denote by $\bar x_{k+1}$ the $\eta$-approximate minimizer, which satisfies \begin{align}\label{inexact} Q_k(\bar x_{k+1})\leq \eta (Q^\ast_k-Q_k(x_k))~~ \text{for given}~~ \eta\in(0,1]. \end{align} Now, we list main assumptions involved in this paper as follows: \begin{itemize} \item[A0]The set of minimizers of (\ref{model}) is nonempty, denoted by $\mathcal{X}$. The objective function $F$ attains its minimum $F^\ast=\inf_{x\in\mathcal{H}} F(x)\in\mathbb{R}$. \item[A1]$f,g:\mathcal{H}\rightarrow(-\infty,\infty]$ are two proper lower semi-continuous (lsc) convex functions with $\dom g\subset \interior(\dom f)$ and thus $\dom F=\dom g$. \item[A2] $f$ is Fr\'echet differentiable on an open set containing $\dom g$. Its gradient $\nabla f$ is continuous on $\dom g$. \item[A3]$\{\langle\cdot,\cdot\rangle_k\}$ is a sequence of inner products on $\mathcal{H}$, with induced norms $\{\|\cdot\|_k\}$ and associated positive operators $\{H_k\}$, i.e., \begin{align} \forall k\geq0,~~~~H_k:\mathcal{H}\rightarrow\mathcal{H},~~~~\langle\cdot,\cdot\rangle_k=\langle\cdot,H_k\cdot\rangle. \end{align} There exist positive constants $M, m$ such that \begin{align} \forall k\geq0,~~~~~m\|\cdot\|^2\leq\|\cdot\|^2_k\leq M\|\cdot\|^2. \end{align} \item[A4]There exists an linearly convergent algorithm for the subproblem (\ref{sqa}) with a uniform parameter $\sigma$ for all $k\geq0$ such that \begin{align*} Q_k(y_l^{(k)})-Q_k^\ast\leq -(1-\sigma)^l Q_k^\ast, \forall l\geq 0 \end{align*} where $0<\sigma<1,y_0^{(k)}:=x_k$. \end{itemize} The assumptions A0 and A1 are standard. The assumption A2 is weaker than the standard assumption that supposes $\nabla f$ to be Lipschitz continuous. We do not assume any special structures on $H_k$ in A3. Note that the auxiliary function $Q_k$ is a regularized strongly convex function. The standard proximal gradient method, as shown in \cite[Theorem 2.1]{taylor2017exact}, could satisfy A4. This assumption is used to guarantee that each subproblem could be solved to satisfy the inexactness condition (\ref{inexact}) in a fixed number of iterations. Hence, the complexity of solving subproblems could not increase as $k\rightarrow +\infty$. \section{The algorithm} \subsection{Line Search} For a directional line search method, we fix the direction $\bar x_{k+1}-x_k$, along which we search for a stepsize as large as possible. The main advantage of this kind of line search compared to \cite[Algorithm 2]{lee2018inexact} is that we only need to find an $\eta$-approximate minimizer of (\ref{sqa}) in each iteration. And then we determine the next iterate by $x_{k+1}:=x_{k}+\alpha_k(\bar x_{k+1}-x_k)$. Below, we give several line search strategies to determine $\alpha_k$. For simplicity, we define \begin{align*} \Delta_k(x):=\langle \nabla f(x_k),x-x_k\rangle+g(x)-g(x_k). \end{align*} \noindent LS1. Let $\beta,\gamma,\in(0,1), \bar \alpha\in(0,1]$ and $\forall k\geq 0$, \begin{align} \alpha_k=\max\{&\alpha>0~|~\exists i\geq0,\alpha=\bar\alpha\beta^i,F(x_k+\alpha(\bar x_{k+1}-x_k))\nonumber\\ &-F(x_k)\leq \gamma \alpha\left(\langle\nabla f(x_k),\bar x_{k+1}-x_{k}\rangle\right.+g(\bar x_{k+1})-g(x_k))\}\label{ls1}. \end{align} \noindent LS2. Let $\beta\in(0,1),\gamma\in(0,m/2),\bar\alpha\in(0,1]$ and $\forall k\geq 0$, \begin{align} \alpha_k=\max&\{\alpha>0~|~\exists i\geq0,\alpha=\bar\alpha\beta^i,\alpha\|\nabla f(x_k+\alpha(\bar x_{k+1}-x_k))\nonumber\\ &-\nabla f(x_k)\|\leq \gamma\|x_{k+1}-x_{k}\|\}\label{ls2}. \end{align} \noindent LS3. Let $\beta,\gamma\in(0,1),\bar\alpha\in(0,1]$ and $\forall k\geq 0$, \begin{align} \alpha_k=&\max\left\{\alpha\right.>0~|~\exists i\geq0,\alpha=\bar\alpha\beta^i,F(x_k+\alpha(\bar x_{k+1}-x_k))-F(x_k)\nonumber\\ &\leq \alpha\left(\langle\nabla f(x_k),\bar x_{k+1}-x_{k}\rangle+g(\bar x_{k+1})-g(x_k)+\frac{\gamma}{2}\|\bar x_{k+1}-x_k\|_k^2\right)\}\label{ls3}. \end{align} \noindent LS4. Let $\beta,\gamma\in(0,1),\bar\alpha\in(0,1]$ and $\forall k\geq 0$, \begin{align} \alpha_k=&\max\left\{\alpha\right.>0~|~\exists i\geq0,\alpha=\bar\alpha\beta^i,f(x_{k+1})-f(x_k)\nonumber\\ &\leq \alpha\left(\langle\nabla f(x_k),\bar x_{k+1}-x_{k}\rangle+\frac{\gamma}{2}\|\bar x_{k+1}-x_k\|_k^2\right)\}\label{ls4}. \end{align} \subsection{Algorithmic Framework} Now, we present the promised algorithmic framework of inexact SQA methods. \begin{algorithm}[H]\label{framework} \SetAlgoLined \textbf{Initialization}: \\ {\color{black} ~~~~Given initial iterate $x_0\in\mathcal{H}$, $\eta\in(0,1]$\;} ~~~~Choose $Linesearch(\cdot)$ from LS1-4 with proper parameters\; \For{$i=0,1,2,\cdots$}{ Choose a symmetric $H_k$\; \textbf{Solving the subproblem inexactly}: \\ ~~~~Find an $\eta$-approximation $\bar x_{k+1}$ satisfying (\ref{inexact})\; $\alpha_k:=Linesearch(x_k,\bar x_{k+1})$\; $x_{k+1}:=x_k+\alpha_k(\bar x_{k+1}-x_k)$ } \caption{Inexact Successive Quadratic Approximation with Linesearch} \end{algorithm} First of all, we state that the algorithmic framework is well defined. Its proof can be found in Appendix. \begin{lemma}\label{welld}The stepsize $\alpha_k$ of LS1-4 exists. \end{lemma} The result above indicates that LS1-4 could find $\alpha_k$ by initializing $\alpha:=\bar \alpha$ and updating $\alpha:=\beta\alpha$ in finite algorithmic steps. Next, we show a sufficient decrease property of the algorithmic framework. Actually, we can derive that \begin{align} Q_k(\bar x_{k+1})=&g(\bar x_{k+1})-g(x_k)+\langle \nabla f(x_k),\bar x_{k+1}-x_k\rangle+\frac{1}{2}\|x_k-\bar x_{k+1}\|_k^2\label{Akd}\\ \leq &\eta\left(g(J_k)-g(x_k)+\langle \nabla f(x_k),J_k-x_k\rangle+\frac{1}{2}\|x_k-J_k\|_k^2\right)\nonumber\\ \leq &\eta\left(g(y)-g(x_k)+\langle \nabla f(x_k),y-x_k\rangle+\frac{1}{2}\|x_k-y\|_k^2-\frac{1}{2}\|y-J_k\|_k^2\right)\nonumber\\ = &\eta\left(g(x_k+\lambda (x-x_k))-g(x_k)+\langle \nabla f(x_k), \lambda (x-x_k)\rangle\right.\nonumber\\ &\left.+\frac{1}{2}\|\lambda (x-x_k)\|_k^2-\frac{1}{2}\|x_k+\lambda (x-x_k)-J_k\|_k^2\right)\nonumber\\ \leq &\eta \left(\lambda(F(x)-F(x_k))+\frac{\lambda^2}{2}\|x-x_k\|^2_k\right)\label{Ak} \end{align} for any $\lambda\in[0,1],x\in\mathcal{H}$ and $y:=x_k+\lambda (x-x_k)$, where the first inequality is due to that $\bar x_{k+1}$ is an $\eta$-approximate minimizer satisfying (\ref{inexact}), the second inequality follows from the strong convexity of $Q_k(\cdot)$, and the last inequality from the convexity of $F$. With this deduction, we have the following two results, whose proofs can be found in Appendix. \begin{lemma}\label{FQ}With the proper parameters selected in LS1-4, we have \begin{itemize} \item[(i)] $F(x_{k+1})-F(x_k)\leq \gamma\alpha_kQ_k(\bar x_{k+1})$ for LS1 and \item[(ii)] $F(x_{k+1})-F(x_k)\leq \alpha_kQ_k(\bar x_{k+1})$ for LS2-4. \end{itemize} \end{lemma} \begin{lemma}\label{dec} For LS1-4, we have the sufficient decreasing property for all $k\geq 0$: \begin{align} F(x_{k+1})-F(x_k)\leq -\alpha_kc_1\|\bar x_{k+1}-x_k\|_k^2, \end{align} where $c_1$ is some positive constant. Thus, $\{F(x_k)\}$ is monotone decreasing and $\sum_{k=0}^{+\infty} \alpha_k\|\bar x_{k+1}-x_k\|^2< +\infty$. \end{lemma} \section{Complexity Analysis} In this section, we will analyze the global complexity of the proposed algorithmic framework under mild assumptions. All proofs can be found in Appendix. \subsection{Linear Convergence Results} In this subsection, we focus on convergence analysis under the quadratic growth condition. First, we introduce the optimal set strongly convexity condition (OSSC), which is presented in \cite{lee2018inexact} to get linear convergence. We say that a function $F$ satisfies OSSC if there exists $\mu>0$ such that for any $x\in\dom F$ and any $\lambda\in[0,1]$, it holds \begin{align}\label{OSSC} F(\lambda x+(1-\lambda)P_{\mathcal{X}}(x))\leq \lambda F(x)+(1-\lambda)F^\ast-\frac{\mu\lambda(1-\lambda)}{2}\|x-P_{\mathcal{X}}(x)\|^2, \end{align} where $P_{\mathcal{X}}(x):=\mathop{\arg\min}_{y\in\mathcal{X}}\|x-y\|$. Note that $\mathcal{X}$ is nonempty, convex and closed and hence $P_{\mathcal{X}}(x)$ is well-defined\cite[Theorem 1.2.3]{cegielski2012iterative}. Below, we recall the quadratic growth condition. \begin{definition}[\cite{zolezzi1977equiwellset,zhang2016new}] We say the function $F$ satisfies the $\mu$-quadratic growth (QG) condition if there exists $\mu>0$ such that \begin{align*} F(x)-F^\ast\geq\frac{\mu}{2}\|x-P_{\mathcal{X}}(x)\|^2,\forall x\in\dom F. \end{align*} \end{definition} Here, we claim that QG is strictly weaker than OSSC. For example, consider the function \begin{align*} F(x)=\left\{ \begin{array}{ll} |x| &~~~~ \text{if}~~ |x|<1 \\ x^2 &~~~~ \text{else} \\ \end{array} \right., \end{align*} where $F(x)-F(0)\geq x^2$. It satisfies QG but not OSSC. Moreover, we observe that OSSC is sufficient for a nonsmooth extension of quasi strongly convexity, which is strictly stronger than QG; for details please refer to \cite{necoara2016linear}. Now, we present the main result of this part. \begin{theorem}\label{thm1} If $F$ satisfies the $\mu$-quadratic growth condition {\color{black}and $\inf_{k\geq0} \alpha_k\geq\underline{\alpha}$ for some $\underline{\alpha}>0$}. {\color{black}T}hen \begin{itemize} \item[(i)] The function value sequence $\{F(x_k)\}$ is Q-linearly convergent to $F^\ast$. \item[(ii)] The iterate sequence $\{x_k\}$ R-linearly converges to an optimal point $x^\ast$. \end{itemize} \end{theorem} Though the inexactness condition (\ref{inexact}) is hard to verify, we could use a fixed number of iterations $N_{inner}$. With the assumption A4, $N_{inner}$ iterations achieve (\ref{inexact}) with $\eta=1-(1-\sigma)^{N_{inner}}$. Then we immediately have the following corollary. \begin{corollary}\label{cor} Assume that the conditions in Theorem \ref{thm1} holds. Fixing inner iteration number $N_{inner}$ of the algorithm that satisfies A4, Algorithm 1 attains a solver $\tilde x$ such that \begin{align*} F(\tilde x)-F^\ast\leq \varepsilon \end{align*} with $\mathcal{O}(\log(1/\varepsilon))$ inner iterations in total. \end{corollary} \subsection{Sublinear Convergence Results} In this subsection, we drop the QG assumption of $F$. In order to illustrate the convergence of $\{F(x_k)\}$, we modify lemma in \cite{lee2018inexact} as follows \begin{lemma}\label{sublemma} Assume we have three non-negative sequences $\{\delta_k\}_{k\geq 0}$, $\{\lambda_k\}_{k\geq 0}$, $\{A_k\}$ and a positive constant $c\in(0,1]$ such that \begin{align*} \delta_{k+1}\leq \delta_{k}+c\left(-\lambda_k\delta_k+\frac{A_k}{2}\lambda_k^2\right),~~~~\forall k\geq 0,\lambda_k\in[0,1]. \end{align*} (i) If $A_k\leq \bar A$ for $k\geq 0$, where $\bar A$ is a positive constant, we have \begin{align} \delta_k\sim\mathcal{O}\left(k^{-1}\right). \end{align} (ii) If $\lim_{k\rightarrow 0} A_k=0$, we have \begin{align} \delta_k\sim o\left(k^{-1}\right). \end{align} \end{lemma} The following result improves the existing convergence rate of $\{F(x_k)\}_{k\geq 0}$ from $O(k^{-1})$ to $o(k^{-1})$. Denote \begin{align*} R_0:=\sup_{x:F(x)\leq F(x_0)}\|x-P_{\mathcal{X}}(x)\|, \end{align*} and assume $R_0$ to be finite. Since $F(x_k)\leq F(x_0)$ holds for $k\geq0$, we have \begin{align}\label{r0} \dist(x_k,\mathcal{X})\leq R_0,~~~~(k\geq0). \end{align} \begin{theorem}\label{generalConvergence} Suppose there exists $\underline\alpha>0$ such that $\alpha_k\geq\underline\alpha>0$ for all $k\in\mathbb{N}$ and $R_0$ is finite. Then, $\{F(x_k)\}$ converges to $F^\ast$ sublinearly in the sense that \begin{align*} F(x_k)-F^\ast\sim\mathcal{O}\left(k^{-1}\right). \end{align*} Furthermore, if $\dist(x_k,\mathcal{X})\rightarrow 0$, then \begin{align*} F(x_k)-F^\ast\sim o\left(k^{-1}\right). \end{align*} \end{theorem} If the statement $[\forall\{x_k\}, F(x_k)\downarrow F^\ast\Rightarrow\dist(x_k,\mathcal{X})\rightarrow0]$ holds, the condition of the second conclusion in Theorem \ref{generalConvergence} will be automatically satisfied. Unfortunately, it is not true in general as the following counterexample illustrates: Consider the function $F:\mathbb{R}^2\rightarrow (-\infty,\infty]$ satisfying lsc., \begin{align} F(x,y)=\left\{ \begin{array}{cc} x+\sqrt{x^2+y^2}&~~~~\text{if}~~x+y^2\leq1,\\ \infty&~~~~\text{otherwise}. \end{array} \right. \end{align} $F$ is convex since it is the sum of two convex functions. The optimal set is $\{(x,0)\in\mathbb{R}^2|x\leq0\}$ and the minimum is $0$. Consider the sequence $\{z_k\}\subset\dom F$ where for every $k\geq 0, z_k=(-\sum_{i=0}^k{1/(i+1)},1)$. It is obvious that $F(z_k)\downarrow 0$ but $\dist(z_k,\mathcal{X})\equiv1$. Below, we propose several mild conditions, under which $F(x_k)\downarrow0$ implies $\dist(x_k,\mathcal{X})\rightarrow 0$. \begin{proposition}\label{sufficient} If one of the following statements holds, then, any $\{x_k\}\subset\dom F$ satisfying $F(x_k)\downarrow F^\ast$ implies $\dist(x_k,\mathcal{X})\rightarrow 0$. \begin{enumerate} \item[(i)] The level set $C_0:=\{x\in\mathcal{H}|F(x)\leq F(x_0)\}$ is compact. \item[(ii)] $F$ is defined on $\mathbb{R}^n$ and its lineality space is equal to its recession cone(see definitions in \cite{bertsekas2009convex}), i.e., \begin{align*} L_F=R_F. \end{align*} \item[(iii)]In particular, $F$ defined on $\mathbb{R}^n$ is level bounded, which implies \begin{align*} L_F=R_F=\emptyset. \end{align*} \end{enumerate} \end{proposition} Note that for a globally $L$-smooth function $f$, there exists a positive number $\underline\alpha$ such that $\mathop{\lim\inf}_{k\rightarrow +\infty} \alpha_k= \underline\alpha> 0$. Therefore, using Theorem \ref{generalConvergence}, we have a slightly stronger convergence rate compared with \cite[Theorem 3]{lee2018inexact}. Similar to Corollary \ref{cor}, we could use a fixed number of inner iterations in practice for general convex cases as well. \begin{corollary}Suppose there exists $\underline\alpha>0$ such that $\alpha_k\geq\underline\alpha>0$ for all $k\in\mathbb{N}$ and A4 holds. With a fixed number of inner iterations replacing the stopping criterion (\ref{inexact}), Algorithm 5 attains a solver $\tilde x$ satisfying \begin{align*} F(\tilde x)-F^\ast\leq \varepsilon \end{align*} with $\mathcal{O}(\varepsilon^{-1})$ inner iterations in total. Furthermore, the number of iterations is reduced to $o(\varepsilon^{-1})$ if $F$ is level bounded. \end{corollary} \subsection{Lower Bound for Stepsizes} In this subsection, under a local gradient-Lispchitz-continuity condition, we prove that the stepsizes have a uniform positive lower bound, which guarantees that complexity of the line searches do not increase. \begin{proposition}\label{dto0}If $\dist(x_k,\mathcal{X})\rightarrow 0$, $F(x_k)\downarrow F^\ast$ and $\nabla f$ is L-Lipschitz continuous on $\mathbb{B}_{\varepsilon}(\mathcal{X})\cap \dom F$ with $L>0,\varepsilon>0$ where \begin{align} \mathbb{B}_\varepsilon(\mathcal{X}):=\{x\in\mathcal{H}|\dist(x,\mathcal{X})\leq\varepsilon\}. \end{align} Denote $d_k:=\bar x_{k+1}-x_k$. Then \begin{align*} \lim_{k\rightarrow+\infty}\|d_k\|=0. \end{align*} \end{proposition} Equipped with the result above, the following lemma illustrates that stepsizes must have a uniform positive lower bound. \begin{theorem}\label{thm2}Under the same conditions with Proposition \ref{dto0}, we have \begin{enumerate} \item[(i)] for LS1 \begin{align} \liminf_{k\rightarrow+\infty}\alpha_k\geq \min\left\{1,\beta(1-\gamma)\frac{m(\eta+1+\sqrt{1-\eta})}{L(1+\sqrt{1-\eta})}\right\}. \end{align} \item[(ii)] For LS2 \begin{align}\label{ls2inflim} \liminf_{k\rightarrow+\infty}\alpha_k\geq\min\left\{1,\frac{\beta\gamma}{L}\right\}. \end{align} \item[(iii)] For LS3 and LS4 \begin{align} \liminf_{k\rightarrow+\infty}\alpha_k\geq\min\left\{1,\frac{\beta\gamma m}{L}\right\}. \end{align} \end{enumerate} \end{theorem} Now, from Theorems \ref{thm1}-\ref{thm2}, we can conclude that once the function value and iterate sequences are convergent, they must (sub)linearly converge under the local gradient-Lipschitz-continuity condition. \section{Conclusion \& Future Work} In this paper, we study the global complexity of an algorithmic framework of inexact SQA methods with four types of line search strategies under mild assumptions. On one hand, with the QG property and the uniform positive lower bound condition on stepsizes, we derive the Q-linear convergence of the function value sequence and the R-linear convergence of the iterate sequence. On the other hand, without the QG property, we obtain the $o(k^{-1})$ complexity, which improves existing results. Finally, we give a uniform positive lower bound of the stepsizes for LS1-4 with the local gradient-Lipschitz-continuity assumption. We believe that the new analysis developed in this paper might be extended to other related algorithms, such as inexact Bregman-type methods. We leave it as future work. \bibliographystyle{plain}
\section{Introduction} Superconductors exhibit a rich set of phenomena in a magnetic field due to the interplay of the electron orbital and spin degrees of freedoms. One of the most intriguing phenomena due to the strong Zeeman spin-splitting effect is the emergence of Fulde-Ferrel-Larkin-Ovchinnikov (FFLO) states\cite{Fulde:PRev135.1964,Larkin:JETP20.1965}, in which the Cooper pairing occurs with nonzero total momentum. In the resulted state, the order parameter is modulated along the total momentum direction. This modulation allows the system to regain a part of the Zeeman energy at the expense of the kinetic-energy loss. Although the existence of such states in clean Pauli-limited superconductors has been theoretically predicted a half-century ago, only recently indications of their experimental realization have been reported in the organic and heavy-fermion superconductors, see reviews \cite{Matsuda:JPSJ76.2007,BeyerLTP13,*WosnitzaAnnPhys18}. In most materials, the orbital effect dominates meaning that it destroys superconductivity before reaching the strong spin-splitting regime and FFLO states have no chance to develop. The relative role of the spin and orbital pair-breaking effect is standardly characterized by the Maki's parameter, $\alpha_M=\sqrt{2}H^O_{C2}/H^P_{C2}$, where $H^O_{C2}$ and $H^P_{C2}$ are the upper critical fields for the orbital and spin pair-breaking mechanism, respectively. The FFLO states may emerge only if $\alpha_M>1$. % The orbital effect is weak or absent and the Zeeman effect dominates in special situations of either quasi-one-dimensional materials or quasi-two-dimensional materials in the magnetic field applied parallel to the conducting layers. Naturally, most experimental search for the FFLO states\cite{Matsuda:JPSJ76.2007,BeyerLTP13} as well as theoretical studies of them\cite{TakadaPrThPhys1969,MachidaPhysRevB.30.122,ShimaharaPhysRevB.50.12760,BurkhardtAnnPhys94,Dupuis:PhysRevLett.70.2613,*Dupuis:PhysRevB.51.9074,*Dupuis:PhysRevB.49.8993,CroitoruPhysRevB.89.224506} have been focused on these favorable cases. % Alternatively, the conditions for the FFLO instability in the presence of the orbital effect have been investigated by Gruenberg and Gunther \cite{Gruenberg:PRL16.1966} for a clean \emph{isotropic} superconductor within \emph{the quasiclassical approach}. In this case, the emerging FFLO state is the Abrikosov vortex lattice with additional periodic modulation of the order parameter along the magnetic field. Such a state appears only for very large Maki's parameter, $\alpha_M>1.8$, corresponding to huge Zeeman energy and/or very shallow band, conditions unlikely to be realized in any isotropic single-band material\footnote{In this paper, we generalize this consideration for a \emph{layered superconductor} in the magnetic field perpendicular to the layers and found that in this case, the critical Maki's parameter is even larger, for strong anisotropy it is $4.76$.}. In spite of this limitation, rich properties of the emerging modulated vortex state have been theoretically investigated in detail % \cite{HouzetPhysRevB01,HouzetPhysRevB2006,ManivPhysRevB2008,Zhuravlev:PRB80.2009,Shimahara:PRB80.2009}. The most recent development in the field has been motivated by the discovery of iron-based superconductors \cite{Paglione:NatPhys6.2010,*StewartRevModPhys.83.1589,*Hosono:PhysC514.2015,*SiNatRevMat16}. These materials are characterized by several electron and hole bands with rather small Fermi energies which can be tuned by doping or pressure. In addition, these compounds have high transition temperatures and very high upper critical fields $H_{C2}$, up to 70 T, likely limited by the paramagnetic effect. These properties make iron-based superconductors plausible candidates for the realization of the FFLO state, which motivated generalization of the theory of this state for multiple-band materials \cite{Gurevich:PRB82.2010,*Gurevich:RPP74.2011,AdachiJPSJ15,Ptok:JLowT172.2013,*Ptok:EPJB87.2014,*Ptok:JPhysCM27.2015,*Ptok:NJPhys19.2017}. Practically all investigations of the orbital-effect influence on the FFLO transition have been done so far within the quasiclassical approximation. In pure materials, however, the superconducting instability in the magnetic field may be influenced by the orbital quantization% \cite{Rajagopal:PLett23.1966,Gruenberg:PRev176.1968,Tesanovic:PRB39.1989,Reick:PhysicaC170.1990,MacDonald:PRB45.1992,Maniv:PRB46.1992}. This influence is most pronounced in superconductors with shallow bands and high upper critical fields, i.e., for the conditions also favoring the FFLO instability. It is not widely recognized that the quantization actually may profoundly promote this instability due to the one-dimensional nature of the quasiparticle's spectrum at the Landau levels. Such quantization-induced FFLO states have been recently demonstrated in a special situation motivated by the physics of multiple-band iron-based superconductors, when one of the shallow bands is close to the extreme quantum limit so that the cyclotron frequency $\omega_c$ near $H_{C2}$ is comparable with the band's Fermi energy $ \epsilon_F$ \cite{SongHc2LifLay}. \begin{figure}[htbp] \centering \includegraphics[width=3.in]{Model.pdf} \caption{Schematic figure illustrating a layered superconductor in the out-of-plane magnetic field, open Fermi surface, and the emerging vortex state with interlayer Larkin-Ovchinnikov modulation.} \label{fig:Model} \end{figure} In this paper, we investigate the impact of Landau quantization on the FFLO instability in a generic and common case of an s-wave single-band layered material in the magnetic field applied perpendicular to the layers, see Fig.\ \ref{fig:Model}. Evaluating the quantum-oscillating correction to the Cooper-pairing kernel with the finite spin splitting, we demonstrate, that, surprisingly, the quantum effects persistently promote the FFLO states in pure materials even in the limit of large Fermi energies, where the quasiclassical approximation is supposed to work well. Even though the quantum correction is smaller than the quasiclassical pairing kernel in this limit, at low temperatures, it acquires strong oscillating dependence on the FFLO modulation wave vector. As a result, the optimal pairing in the low-temperature limit typically occurs at a finite wave vector, and the uniform-along-the-field state becomes unstable below the FFLO temperature, $T_{\mathrm{FFLO}}$. Because of the quantization, the electronic spectrum is composed of one-dimensional Landau-level branches depending on the c-axis momentum. The immediate reason for the emergence of the nonuniform state is the mismatch between the c-axis Fermi momenta for the branches with opposite spin orientation. One-dimensionality of the spectrum further enhances the instability. Contrary to the case of quasi-one-dimensional superconductors \cite{MachidaPhysRevB.30.122,Dupuis:PhysRevLett.70.2613,*Dupuis:PhysRevB.51.9074,*Dupuis:PhysRevB.49.8993,CroitoruPhysRevB.89.224506}, the optimal modulation vector is a result of an interplay between multiple branches. As for the classical FFLO states, the modulation allows to gain the Zeeman energy exceeding the loss of the condensation energy caused by a nonuniform order parameter. The specific behavior is sensitive to the relation between the spin-spitting energy $2\mu_zH$ and the Landau-level separation $\hbar \omega_c$, where $\mu_z$ is the band-electron magnetic moment. The FFLO temperature has the oscillating dependence on the field-independent ratio $2\gamma_z=2\mu_z H /(\hbar \omega_c)$, and its maximal value is given by the superconducting transition temperature squared divided by the Fermi energy, $T_{\mathrm{FFLO}}^{\mathrm{max}}\sim T_C^2/\epsilon_F$. This maximum is achieved when the ratio of the spin-spitting energy and the Landau-level separation is half-integer, $2\gamma_z\!=\!n\!+\!\tfrac{1}{2}$. On the other hand, $T_{\mathrm{FFLO}}$ vanishes, and the uniform state remains stable down to zero temperature only in the exceptional cases when this ratio is integer $2\gamma_z=n$. The modulation wave vector of the emerging FFLO state continuously grows from zero at the transition point to the low-temperature value which is proportional to the ratio of the cyclotron frequency and the interlayer hopping integral. The modulation period remains much larger than the interlayer separation. These results imply that the conditions for the onset of the FFLO state are much milder than it is generally anticipated. \emph{This state may actually appear in materials with small Zeeman energy, and, correspondingly, small Maki's parameter.} The only demanding requirement is the material's purity. The natural experimental indication of the required purity level is noticeable quantum oscillations in the normal state near the superconducting instability. We focus here on the case of the magnetic field applied perpendicular to the layers, along the c axis. In this case $\gamma_z$ is a material's parameter. It is important to note, however, that this parameter can be effectively tuned by tilting the magnetic field away from the c axis\cite{WosnitzaFSLowDSC1996}, because the Zeeman energy is determined by the total magnetic field while the Landau-level separation is mostly determined by the c-axis field component. Therefore, the FFLO-instability temperature should have strongly oscillating dependence on the tilting angle. This paper is organized as follows: In Sec.\ \ref{sec:model}, we describe our model of a layered superconductor and derive the equation describing superconducting instability in the out-of-plane magnetic field taking into account the quantum contribution to the pairing kernel and assuming a possibility of the FFLO modulation along the field. The derivation details of the quantum correction to the kernel are presented in Appendix \ref{app:OscCorr}. For completeness, we derive in Appendix \ref{app:QCFFLO} the criterion for the emergence of the FFLO state in the \emph{quasiclassical approximation} generalizing previous consideration \cite{Gruenberg:PRL16.1966} to the case of layered superconductors. % In Sec.\ \ref{sec:HT}, based on the derived equations, we investigate the influence of the quantum contributions to pairing on the interlayer FFLO transition using both analytical estimates and numerical calculations for representative parameters. In Appendix \ref{app:disorder}, we consider suppression of the quantum FFLO state by impurity scattering. Finally, the summary and discussion are presented in Sec.\ \ref{Sec:Summary}. \section{Superconducting instability in a layered superconductor}\label{sec:model} We investigate the influence of the orbital-quantization effects on the onset of superconductivity for layered materials in the out-of-plane magnetic field. We use the tight-binding model with the nearest-layer hopping term described by the Hamiltonian \begin{align} &\mathcal{H}=\sum_{ j}\int\mathrm{d}^2\mathbf{r}\Big[c^\dagger_{ j s}(\mathbf{r})\left(\xi (\hat{\mathbf{k}}) \delta_{ss'}-\mu_zH\sigma^z_{ss'}\right)c_{js'}(\mathbf{r})\notag\\ &-\!t_z c^\dagger_{j s}\!(\mathbf{r})c_{j+\!1,s}(\mathbf{r})\!+\!\text{H.c.}\!-\!Uc^\dagger_{ j\downarrow}\!(\mathbf{r})c^\dagger_{ j\uparrow}\!(\mathbf{r}) c_{ j\downarrow}\!(\mathbf{r})c_{ j\uparrow}\!(\mathbf{r})\Big], \label{eqn:modelH} \end{align} where $\mathbf{r}=(x, y)$ is the in-plane coordinate, $j$ is the layer index, and $s$ represents spin (summation over $s$ and $s'$ is assumed). Furthermore, $t _z$ is the interlayer hopping energy, $\xi(\hat{\mathbf{k}})\!=\!\hat{\mathbf{k}}^2/(2m)\!-\!\mu$ is the intralayer energy dispersion with the band mass $m$, the Fermi energy $\mu$, and the momentum operator $\hat{\mathbf{k}}\! =\!-\mathrm{i}\nabla_{\mathbf{r}}\!-e\mathbf{A}/c$ \footnote{In the technical part, we use a natural system of units in which $k_B=1$ and $\hbar=1$.}. We use the symmetric gauge for the vector potential, $\mathbf{A}=\frac{H}{2}(-y,x,0)$. We also include in the model the Zeeman spin splitting which is determined by the band electron's magnetic moment $\mu_z\!=\!g\mu_{B}/2$, where $\mu_{B}$ is the Bohr magneton and $g$ is the $g$-factor. The full three-dimensional normal-state spectrum of the model is $\xi_{3D}(\mathbf{k},k_z)=\xi(\mathbf{k})-2t_z\cos k_z$. The corresponding open Fermi surface for $\mu>2t_z$ is illustrated in Fig.\ \ref{fig:Model}. To study the superconducting pairing instabilities for the model in Eq.\ \eqref{eqn:modelH}, we follow the standard approach and write the linearized gap equation as \begin{equation}\label{eqn:gap-eqn} \Delta_{j}(\mathbf{r})\!=\!UT\sum_{\omega_n}\sum_{j' } \!\int_{\mathbf{r}'}K_{\omega_n}(\mathbf{r} j,\mathbf{r}' j')\Delta_{j'}(\mathbf{r}'), \end{equation} where $\Delta_{j}(\mathbf{r})\!=U \langle c_{ j\downarrow}(\mathbf{r})c_{j\uparrow}(\mathbf{r})\rangle$ is the gap function, we used the notation $\int_{\mathbf{r}}=\int\mathrm{d}\mathbf{r}$, $\omega_n=2\pi T(n+1/2)$ are the Matsubara frequencies, and the kernel \begin{equation} K_{\omega_n}\!(\mathbf{r} j,\mathbf{r}' j') =G^+_{\omega_n}(\mathbf{r} j,\mathbf{r}' j')\bar{G}^- _{\omega_n}(\mathbf{r}' j',\mathbf{r} j), \label{KernelDef} \end{equation} is determined by the one-particle Green's functions in the normal phase, $G^\pm_{\omega_n}(\mathbf{r} j,\mathbf{r}' j')$, in which the superscripts $+$ or $-$ describe spin orientation and the overbar of the Green's function represents the complex conjugate. These functions can be presented in the form of expansion over the exact Landau-level eigenstates as\cite{Rajagopal:PRB44.1991,Maniv:RMP73.2001} \begin{equation}\label{eqn:GreenFH} G^\pm_{\omega_n}\!=\!\frac{\exp\left(\mathrm{i}\frac{\mathrm{[\mathbf{r}\times\mathbf{r}']_z}}{2l_H^2}\right)}{2\pi l_H^2}\sum^\infty_{\ell=0}\left\langle\!\frac{\mathrm{e}^{-x/2}\mathrm{e}^{-\mathrm{i}k_z(j-j')}L_\ell(x)}{\mathrm{i}\omega_n-\xi_{\pm}(\ell\!+\frac{1}{2},k_{z})}\!\right\rangle_z, \end{equation} where $\langle\dots\rangle_z\equiv \int_{-\pi}^\pi\dots\mathrm{d}k_z/(2\pi)$, $l_H=\sqrt{c/(eH)}$ is the magnetic length, $x=|\mathbf{r}-\mathbf{r}'|^2/2l_H^2$, and $L_{\ell}(x)$ are the Laguerre polynomials. Furthermore, \begin{equation} \xi_{\pm}(\ell\!+\tfrac{1}{2},k_{z})\equiv\omega_{c}\left(\ell\!+\tfrac{1}{2}\pm\gamma_{z}\right)\!-2t_{z}\cos k_{z}\!-\mu \end{equation} with $\omega_c=eH/(mc)$ being the cyclotron frequency and $\gamma_z\!=\!\mu_zmc/e\!=\!gm/4m_0$ being the reduced spin-splitting parameter, where $m_0$ is the free electron mass. The electronic spectrum is composed of the one-dimensional Landau-level branches, see Fig.\ \ref{fig:LLBranches}. In the limit $t_z\gg \omega_c$ roughly $4t_z/\omega_c$ of these branches cross the Fermi level for each spin orientation. \begin{figure}[htbp] \centering \includegraphics[width=3.3in]{LLBranches.pdf} \caption{Illustrative plot of the spin-split Landau-level branches crossing the Fermi level. The plot also shows the relevant energy scales and the optimal modulation wave vector $Q_{\mathrm{op}}$.} \label{fig:LLBranches} \end{figure} In finite out-of-plane magnetic field, the gap parameter $\Delta_{j}(\mathbf{r})$ in the form of the \textit{lowest Landau-level} eigenfunction typically yields the leading instability. In addition, in the presence of the Zeeman splitting, the order parameter may be periodically modulated between the layers, i.e., along the magnetic field\cite{Gruenberg:PRL16.1966}. Such a modulation is the realization of the nonuniform FFLO state \cite{Fulde:PRev135.1964,Larkin:JETP20.1965} Therefore, we assume the solution in the form \begin{equation}\label{eqn:ansatz} \Delta_{j}(\mathbf{r})=\Delta _0\exp\left(-\frac{r^2}{2l^2_H}+\mathrm{i}Q_z j\right). \end{equation} The solution with the modulation vector $Q_z$ giving the maximal transition temperature, $T_{C2}$, is realized. Below this instability temperature, one has to compose a proper combination of the lowest Landau-level wavefunctions corresponding to the Abrikosov vortex lattice. The order parameter with the phase modulation along the field in Eq.\ \ \eqref{eqn:ansatz} is usually called the Fulde-Ferrel state. Alternatively, the state with the amplitude modulation, $\Delta_{j}\propto \cos (Q_z j)$, known as the Larkin-Ovchinnikov state, may emerge, see Fig.\ \ref{fig:Model}. We only investigate the instability location here, which is identical for both of these states. The gap function in Eq.\ \eqref{eqn:ansatz} is the exact eigenfunction of the kernel, \[ \sum_{j'}\int_{\mathbf{r}'}K_{\omega_{n}}(\mathbf{r}j,\mathbf{r}'j')\Delta_{j'}(\mathbf{r}')\!=\!\pi\nu\lambda_{\omega_{n},Q_{z}}\Delta_{j}(\mathbf{r}), \] where $\nu=m/2\pi$ is the density of state per layer. This allows us to reduce the gap equation, Eq.\ \eqref{eqn:gap-eqn}, to \begin{equation} \Lambda^{-1}=2\pi T\, \text{Re}\sum^\Omega_{\omega_n>0} \lambda_{\omega_n,Q_z}, \end{equation} where $\Lambda=\nu U$ is the coupling constant and $\Omega$ is the cutoff energy. Using the expansion of the one-particle Green's function over the exact Landau-level basis, Eq.\ \eqref{eqn:GreenFH}, one can derive the exact presentation for the kernel eigenvalue\cite{Gruenberg:PRev176.1968,SongHc2LifLay}, \begin{align}\label{lh} &\lambda_{\omega_n,Q_z}\!=\! -\frac{1}{2\pi\omega_c}\\ \times\!& \sum_{\ell_{1},\ell_{2}}\!\left\langle \frac{(\ell_{1}+\ell_{2})!/(2^{\ell_{1}+\ell_{2}}\ell_{1}!\ell_{2}!)}{(\mathrm{i}\bar{\omega}_{n}\!-\!\ell_{1}\!-\frac{1}{2}-\!\tilde{\gamma}_{z}\!+\!\tilde{\mu})(\mathrm{i}\bar{\omega}_{n}\!+\!\ell_{2}\!+\frac{1}{2}\!-\!\tilde{\gamma}_{z}\!+\!\tilde{\mu})}\right\rangle _z\!,\nonumber \end{align} where we introduced the following notations \begin{subequations} \begin{align} \tilde{\mu}(k_z,Q_z)&=\bar{\mu}+2\bar{t}_{z}\cos k_{z}\cos\tfrac{Q_{z}}{2}\label{tmu},\\ \tilde{\gamma}_{z}(k_z,Q_z)&=\gamma_{z}-2\bar{t}_{z}\sin k_{z}\sin\tfrac{Q_{z}}{2}\label{tg}. \end{align} \end{subequations} Here all normalized quantities marked by bars are defined as $\bar{a}\equiv a/\omega_c$ (with $a=\omega_n,\mu,t_z$). The Matsubara-frequency sums are logarithmically-divergent and have to be cut at $\omega_n\sim \Omega$. This divergence can be eliminated using the zero-field gap equation giving \begin{equation}\label{eqn:gap-regularized} \tfrac{1}{2}\ln(T/T_C)-\Upsilon_T+\Upsilon_{T_C}-\mathcal{J}(H,T,Q_z) =0, \end{equation} where $ \Upsilon_T =-\int^{\infty}_0\!\frac{\mathrm{d}s}{\pi s}\ln\tanh(\pi T s)\sin(2\mu s)J_0(4t_z s), $ \cite{SongHc2LifLay} and the field-dependent parts of the pairing-kernel eigenvalue is \begin{equation} \mathcal{J}(H,T,Q_z)\!=\!2\pi T\!\sum^\Omega_{\omega_n>0} \!\text{Re}\Big(\lambda_{\omega_n,Q_z}\!-\frac{1}{2\omega_n}\Big)\!-\!\Upsilon_T\label{Jh}, \end{equation} with $\mathcal{J}(0,T,0)\!=\!0$. Therefore, the UV cutoffs are explicitly removed and the Matsubara-frequency sum on the left-hand side in Eqs.\ \eqref{Jh} converges now in the limit of $\Omega\to\infty$. We can represent the functions $\mathcal{J} $ in this limit as \cite{SongHc2LifLay} \begin{widetext} \begin{align} \mathcal{J}(H,T,Q_{z})\! & =\frac{1}{4}\!\sum_{m=0}^{\infty}\sum_{\ell=0}^{m}\frac{m!}{2^{m}\left(m\!-\!\ell\right)!\ell!}\left\langle \frac{\mathcal{T}(\ell+\tilde{\gamma}_{z}-\!\tilde{\mu})+\mathcal{T}(m\!-\!\ell-\tilde{\gamma}_{z}-\!\tilde{\mu})-2\mathcal{T}(\frac{m}{2}-\tilde{\mu})}{m+1-2\tilde{\mu}}\right\rangle _{\!z}\nonumber \\ & -\frac{1}{2}\left\langle \int\limits _{0}^{1/2}dz\frac{\mathcal{T}(\frac{z-1}{2}-\tilde{\mu}_{0})}{z-2\tilde{\mu}_{0}}+\sum_{m=0}^{\infty}\int\limits _{-1/2}^{1/2}dz\left[\frac{\mathcal{T}(\frac{m+z}{2}-\tilde{\mu}_{0})}{m+1+z-2\tilde{\mu}_{0}}-\frac{\mathcal{T}(\frac{m}{2}-\tilde{\mu})}{m+1-2\tilde{\mu}}\right]\right\rangle _{\!z},\label{J1llSumPres} \end{align} \end{widetext} where $\tilde{\mu}_{0}(k_{z}) \!=\!\tilde{\mu}(k_{z},0) \!=\!\bar{\mu}\!+\!2\bar{t}_{z}\cos k_{z}$ and $\mathcal{T}(x)\!\equiv\!\tanh[\omega_c(x\!+\!1/2)/2T]$. We remind that the parameters $\tilde{\mu}$ and $\tilde{\gamma}_{z}$ depend on $k_z$ and $Q_z$, see Eqs.\ \eqref{tmu} and \eqref{tg}. Different terms in the above sum describe the contributions to pairing from two quasiparticle states with opposite spin orientations located at the Landau-level branches with indices $\ell$ and $m-\ell$. The c-axis momenta of the pairing states at these branches $\pm k_z+Q_z/2$ are mismatched by the modulation wave vector $Q_z$. For the fixed magnetic field, we have to obtain the transition temperature $T_{C2}(H,Q_z)$ by solving Eq.\ \eqref{eqn:gap-regularized} and then find $Q_z$ which gives its maximum. We are mostly interested in the quasiclassical limit set by the related conditions $\mu-2t_z\gg \omega_c,T_{C}$, that are satisfied in an overwhelming majority of materials. In this case, the problem can be significantly simplified. First, in the limit $\mu\gg T_{C}$, we have $-\Upsilon_{T}+\Upsilon_{T_{C}}\approx\tfrac{1}{2}\ln(T/T_{C})$ meaning that Eq.\ \eqref{eqn:gap-regularized} simplifies as $\ln(T/T_{C})-\mathcal{J}(H,T,Q_{z})=0$. Furthermore, in the limit $\mu\!-\!2t_z\!\gg \! \omega_c$ high Landau levels $\ell_{1}, \ell_{2}\gg 1$ give the dominating contribution to the sum in Eq.\ \eqref{lh}. Therefore, the main term is obtained by neglecting discreteness of the spectrum and replacing the summation over these indices by integration over in-plane energies of the pairing states, $\epsilon_{1,2}=\omega_c(\ell_{1,2}+1/2)$, which gives the quasiclassical kernel, $\mathcal{J}_{\mathrm{cl}}$, \begin{align} &\mathcal{J}_{\mathrm{cl}}(H,T,Q_z)=2\int^\infty_0\mathrm{d}s\ln\tanh\Big(\frac{\pi T}{\omega_c}s\Big)\nonumber\\ &\times\left\langle\exp(-\tilde{\mu}s^2) [\tilde{\mu}s\cos(2\tilde{\gamma}_{z}s)\!+\!\tilde{\gamma}_{z}\sin(2\tilde{\gamma}_{z}s)]\right\rangle_z, \label{eqn:J1qc} \end{align} This contribution is the famous quasiclassical Werthamer-Helfand-Hohenberg (WHH) result\cite{Helfand:PRev.1966,*Werthamer:PRev147.1966,Kogan:RPP75.2012}, which is widely used to describe the temperature dependence of the upper critical field in clean superconducting materials. This quasiclassical term usually favors the uniform state, $Q_z=0$, unless the Maki's parameter set by the Zeeman energy is anomalously large. We analyze this issue in Appendix \ref{app:QCFFLO}. The discreteness of the Landau-level spectrum leads to the quantum correction to the quasiclassical kernel, $\mathcal{J}_{\mathrm{q}}(H,T,Q_z)$, which we derive in Appendix \ref{app:OscCorr}. This correction is the sum of terms that are (i) oscillating functions of the in-plane energies of two pairing states, $\epsilon_{1,2}$, with the period equal to the cyclotron frequency $\omega_c$, $\propto \exp [i (m_1\epsilon_{1}-m_2\epsilon_{2})/\omega_c]$, and (ii) rapidly decrease with separation between the average in-plane energy $(\epsilon_1+\epsilon_2)/2$ and the average in-plane Fermi energy for the pairing states with the c-axis wave vectors $\pm k_z+Q_z/2$. Therefore, the sum over the two Landau-level indices in Eq.\ \eqref{lh} is replaced by the sum over two harmonic indices $m_{1,2}$, in which all terms have to be integrated over the two energies and averaged over $k_z$. This double sum can be further split into two contributions with qualitatively different behavior. The terms with mismatched harmonic indices $m_{1}\!\neq\! m_2$ rapidly oscillate with the ratio $\mu/\omega_c$ but weakly depend on the modulation wave vector $Q_z$. On the other hand, in the same-harmonic terms with $m_{1}\!=\! m_2$ the strong magnetic oscillations cancel but these terms have instead a pronounced dependence on $Q_z$ with typical scale given by average separation between Landau-level branches, as illustrated in Fig.\ \ref{fig:LLBranches}. This dependence appears because the modulation partially compensates the momentum mismatch at the branches caused by the spin splitting. This key property is the origin of the effects discussed in this paper. All contributions together can be presented in the following concise form \begin{align} &\mathcal{J}_{\mathrm{q}}(H,T,Q_z)=\frac{2\pi^{3/2}T}{\omega_{c}}\!\sum_{k\!=\!1}^{\infty}\!(-1)^{k}\frac{\cos\!\left(2\pi k\gamma_{z}\right)}{\sinh\left(\frac{2\pi^{2}kT}{\omega_{c}}\right)}\nonumber\\ &\times\!\left\langle \!\frac{\cos\!\left(4\pi k\bar{t}_z\sin k_{z}\!\sin\frac{Q_{z}}{2}\right) \!\sin\!\left[2\pi k\tilde{\mu}(k_{z},Q_{z})\right]} {\sqrt{\tilde{\mu}(k_{z},Q_{z})}\tan\left[2\pi\tilde{\mu}(k_{z},Q_{z})\right]}\!\right\rangle_{\!z}\!. \label{eqn:J1q} \end{align} Here the oscillating part of the factor $\sin( k \phi)/\tan \phi$ with $\phi\!=\!2\pi\tilde{\mu}(k_{z},Q_{z})$ is coming from mismatched-harmonics terms, while its average part equal to 1 for even $k$ originates from the same-harmonics terms. The oscillating contribution has a structure resembling other quantum-oscillation quantities such as the de Haas-van Alphen oscillating magnetization, see, e.g., Ref.\ \cite{ShoenbergMagnOscBook}. Namely, it is the sum of terms which are periodic functions of $1/H$ (since $\tilde{\mu}(k_{z},Q_{z}),\bar{t}_z\propto 1/H$) and exponentially decay with the temperature for $T>\omega_c$. Also, these terms contain the familiar factors $\cos\!\left(2\pi k\gamma_{z}\right)$ due to the spin splitting. The analogy, however, is not complete because, in contrast to single-electron normal-state quantities, the quantum pairing kernel is a two-electron property. In particular, the same-harmonics contribution to the pairing kernel does not have an analogue in the quantum correction to the normal-state magnetization. Therefore, in the standard quasiclassical limit $\mu-2t_z\gg \omega_c, T_C$, the total pairing kernel can be split into classical and quantum contributions $\mathcal{J}(H,T,Q_z)\approx\mathcal{J}_{\mathrm{cl}}(H,T,Q_z)\!+\!\mathcal{J}_{\mathrm{q}}(H,T,Q_z)$ and Eq.\ \eqref{eqn:gap-regularized} for the upper critical field $H_{C2}$ can be approximated as \begin{equation} \ln(T/T_C)-\mathcal{J}_{\mathrm{cl}}(H,T,Q_z)\!-\!\mathcal{J}_{\mathrm{q}}(H,T,Q_z)=0. \label{eqHc2-approx} \end{equation} The quantum contribution is expected to be small in the quasiclassical limit. We will demonstrate, however, that, while weakly influencing the absolute value of $H_{C2}$, this correction strongly promotes the formation of the FFLO state at low temperatures. \section{Interlayer FFLO transitions}\label{sec:HT} In this section, we address the problem of interlayer FFLO instability. It is well established that \emph{within the quasiclassical approximation} the FFLO state emerges only when the Maki's parameter of the material exceeds a certain critical value. In particular, for an isotropic 3D material this value was evaluated as $\sim 1.8$ in Ref.\ \cite{Gruenberg:PRL16.1966}. For completeness, in Appendix \ref{app:QCFFLO} we generalize this quasiclassical consideration to the system we analyze here, a quasi-two-dimensional layered superconductor in the magnetic field applied perpendicular to the layers. The Maki's parameter for this system is expressed via the electronic parameters as \begin{equation}\label{eqn:alpha} \alpha_{M}=\frac{\pi T_{C}\gamma_{z}}{\mu}\frac{4}{1+\sqrt{1-4t_z^2/\mu^2}}. \end{equation} We can see that this parameter may be large only if the band is not too deep and the spin-splitting factor is very large. We found that in the open-Fermi surface regime, $\mu> 2t_z$, the critical Maki's parameter is $\approx 4.76$. This result suggests that the formation of the FFLO state in layered materials requires even higher Zeeman energy than in the isotropic case. We argue, however, that this established quasiclassical picture is incomplete and only provides the correct criterion for the FFLO instability if the temperature is not too low, $T>\omega_c$. The conditions for FFLO instability at very low temperatures dramatically change when the orbital-quantization correction ($\mathcal{J}_{\mathrm{q}}$) in the pairing kernel is taken into account. To see this, we investigate the influence of this correction on the onset of the FFLO state for the case when the Zeeman spin-splitting parameter is not near the resonant values. We start with approximate analytical analysis for the common particular case $\omega_{c}\ll t_{z}\ll\mu$. The quantum correction in Eq.\ \eqref{eqn:J1q} is a sum of the oscillating terms exponentially decaying with the temperature. In the range $T\gtrsim\omega_{c}$ the dominating contribution to $\mathcal{J}_{\mathrm{q}}$ is coming from the first several terms. The first two terms can be evaluated as (see Appendix \ref{app:OscCorr} for details) \begin{subequations} \begin{align} \mathcal{J}_{\mathrm{q}}^{(1)}\! & \approx\!-\sqrt{\frac{2\pi}{t_{z}}}\!\frac{T\cos\!\left(2\pi\gamma_{z}\right)}{\sinh\left(\frac{2\pi^{2}T}{\omega_{c}}\right)}\!\sum_{ \delta_{t}=\pm 1}\! \frac{\cos\!\left(2\pi\frac{\mu+2\delta_{t}t_{z}}{\omega_{c}}\!-\!\frac{\delta_{t}\pi}{4}\right)} {\sqrt{\mu\!+\!2\delta_{t}t_{z}\cos^{2}\frac{Q_{z}}{2}}} ,\label{eq:JQ1}\\ \mathcal{J}_{\mathrm{q}}^{(2)} & \!\approx\!2\pi^{3/2}\!\frac{T\cos\!\left(4\pi\gamma_{z}\right)}{\sinh\left(\frac{4\pi^{2}T}{\omega_{c}}\right)}\Bigg[\!\frac{1}{\sqrt{\omega_{c}\mu}}J_{0}\left(4\pi\frac{2t_{z}}{\omega_{c}}\sin\frac{Q_{z}}{2}\right)\nonumber\\ &+\sum_{ \delta_{t}=\pm 1}\frac{\cos\left(4\pi\frac{\mu\!+\!2\delta_{t}t_{z}}{\omega_{c}}-\frac{\delta_{t}\pi}{4}\right)}{4\pi\sqrt{t_{z}\left(\mu\!+\!2\delta_{t}t_{z}\cos^{2}\frac{Q_{z}}{2}\right)}} \Bigg], \label{eq:JQ2} \end{align} \end{subequations} where $J_{0}(x)$ is the Bessel function. We see that the first term oscillates with the magnetic field in the same way as the normal-state magnetization (de Haas-van Alphen effect) and conductivity (Shubnikov-de Haas effect) and the second term also has such magnetic-oscillating contribution given by the second line in Eq.\ \eqref{eq:JQ2} \footnote{The ratio $(\mu\pm 2t_z)/\omega_c$ in Eqs.\ \eqref{eq:JQ1} and \eqref{eq:JQ2} can be rewritten in a more common form as $F_\pm/H$, where $F_\pm=(c/2\pi e)A_\pm$ is the de Haas-van Alphen frequency and $A_\pm$ is the area of the corresponding extremal Fermi-surface cross section, see, e.g., Ref.\ \cite{ShoenbergMagnOscBook}}. As discussed in the previous section, such terms appear from the oscillating contributions of the two pairing electronic states with opposite spins, which have mismatched periodicities in the in-plane energy dependence. In addition, the second term $\mathcal{J}_{\mathrm{q}}^{(2)}$ has qualitatively different contribution described by the first line in Eq.\ \eqref{eq:JQ2} that does not oscillate with $(\mu\pm 2t_z)/\omega_c$ but has a pronounced oscillating dependence on $Q_{z}$. It originates from the same-harmonics contributions of the two pairing electronic states, also discussed in the previous section. This crucial part of the kernel is essentially a two-particle property which does not have analogues in single-electron normal properties. For large spin splitting between the Landau-level branches, the pairing at finite $Q_z$ allows the system to mitigate this split. This enhancement of pairing is quantitatively described by this contribution, which dominates the $Q_{z}$ dependence of the \emph{total} quantum correction at temperatures $T\gtrsim\omega_{c}$. Moreover, at low temperatures this enhancement occurs to be much stronger than the suppression of the quasiclassical kernel with $Q_z$, Eq.\ \eqref{eqn:J1qc}, in the usual regime of the dominating orbital effect. Stability of the uniform state is determined by the second derivative of $\mathcal{J}_{\mathrm{q}}$ with respect to $Q_{z}$ at $Q_z=0$, $\mathcal{J}_{\mathrm{q}}^{\prime\prime}\equiv\partial^{2}\mathcal{J}_{\mathrm{q}}/\partial Q_{z}^{2}|_{Q_z=0},$ \begin{equation} \mathcal{J}_{\mathrm{q}}^{\prime\prime}\approx-\pi^{3/2}T\!\frac{\cos\!\left(4\pi\gamma_{z}\right)}{\sinh\left(\frac{4\pi^{2}T}{\omega_{c}}\right)}\!\frac{1}{\sqrt{\omega_{c}\mu}}\left(4\pi\frac{t_{z}}{\omega_{c}}\right)^{2}.\label{eq:Sec-derQuant} \end{equation} It is positive for the spin-splitting factors in the range $|2\gamma_{z}-n/2|<1/4$ with $n=1,2\ldots$ meaning that the quantum correction strongly favors the modulated state within this range. Adding the quasiclassical term $\mathcal{J}_{\mathrm{cl}}^{\prime\prime}\approx-t_{z}^{2}/\left(\omega_{c}\mu\right)$ valid in the limit $\gamma_{z}\ll\sqrt{\mu\!/\!\omega_{c}}$, we obtain the total second derivative \begin{align} &\mathcal{J}^{\prime\prime}\!\approx\!-\frac{t_{z}^{2}}{\omega_{c}\mu}\left(1\!+\!4\pi^{3/2}\cos\!\left(4\pi\gamma_{z}\right)\!\frac{\frac{4\pi^{2}T}{\omega_{c}}}{\sinh\left(\frac{4\pi^{2}T}{\omega_{c}}\right)}\sqrt{\frac{\mu}{\omega_{c}}}\right)\nonumber\\ &\approx\!-\frac{t_{z}^{2}}{\omega_{c}\mu}\left(1\!+\! \cos\!\left(4\pi\gamma_{z}\right)\!\frac{16\sqrt{\pi}\mathtt{C}_{\mathrm{E}}^{3/2}\mu^{2}T/T_{C}^{3}}{\sinh\left(4\mathtt{C}_{\mathrm{E}}\mu T/T_{C}^{2}\right)}\right),\label{eq:SecDerTot2} \end{align} where in the second line, assuming $T\ll T_{C}$, we substituted the low-temperature limit for $\omega_{c}$ at the upper critical field for $t_{z}\!\ll\!\mu$, $\omega_{c}\approx \pi^{2}T_{C}^{2}\!/\!(\mathtt{C}_{\mathrm{E}}\mu)$ with $\mathtt{C}_{\mathrm{E}}\!\approx\!\exp(0.5772)\!\approx\!1.781$ being the exponential of the Euler–-Mascheroni constant. We can see that the quantum correction exponentially decays above the temperature scale $T_{q}=\omega_{c}/4\pi^{2}=0.14T_{C}^{2}/\mu$. However, at $T\sim T_{q}$ it is already larger than the quasiclassical term by the factor $\mu/T_{C}\gg 1$. In the case $\cos\!\left(4\pi\gamma_{z}\right)<0$, this property allows us to evaluate the FFLO instability temperature from the equation $\mathcal{J}^{\prime\prime}\!=\!0$ with logarithmic accuracy, \begin{equation} T_{\mathrm{FFLO}}\approx\!\frac{T_{C}^{2}}{4\mathtt{C}_{\mathrm{E}}\mu}\ln \left(\left|\cos\!\left(4\pi\gamma_{z}\right)\right|\frac{C_{\mu}\mu}{T_{C}}\right). \label{eq:TFFLO} \end{equation} where $C_{\mu}$ is a numerical factor $\approx 100\!-\!150$. This estimate is valid until the expression under the logarithm is large, i.e., it breaks near the points $|2\gamma_{z}\!-n/2|\!=\!1/4$ where $\cos\!\left(4\pi\gamma_{z}\right)$ vanishes. For spin-splitting factors outside the ranges $|2\gamma_{z}-n/2|<1/4$, the system may still have the FFLO instability, but it realizes at temperatures much smaller than $T_q$, meaning that its evaluation requires accounting for multiple terms in the sum in Eq.\ \eqref{eqn:J1q} and lacks a simple description. In addition, even though the uniform state becomes unstable, the transition to the modulated state takes place at a noticeable fraction of the zero-field transition temperature only if the ratio $T_{C}/\mu$ is not too small. At temperatures smaller than $T_{\mathrm{FFLO}}$, the $Q_{z}$ dependence of the pairing kernel is dominated by the quantum term, Eq.\ \eqref{eq:JQ2}, and the optimal modulation vector has to be close to its maximum. As the first minimum of the Bessel function $J_{0}\left(x\right)$ is located at $x_{\mathrm{min}}\!=\!3.832$, the optimal $Q_{z}$ can be evaluated as \begin{equation} Q_{\mathrm{op}}\!\approx\!3.832\omega_{c}/(4\pi t_{z})\!\approx\!0.305\omega_{c}/t_{z}. \label{eq:Qz-Hth} \end{equation} This wave vector is close to the average separation between the neighboring opposite-spin Landau-level branches near $k_z\!=\!\pi/2$, see Fig. \ref{fig:LLBranches}. Note that, in contrast to \emph{minimum} spacing between the branches, the \emph{average} separation does not depend on $\gamma_z$. Weak dependence of the modulation wave vector on the spin splitting is an unusual feature distinguishing our state from conventional FFLO states. We remind that the above result is obtained under the assumption $\omega_{c}\!\ll\!t_{z}$, meaning that the modulation period in this regime is much larger than the distance between the layers. Strictly speaking, the result in Eq.\ \eqref{eq:Qz-Hth} is derived assuming that the $Q_z$ dependence is mostly determined by the term $\mathcal{J}_{\mathrm{q}}^{(2)}$ in Eq.\ \eqref{eq:JQ2}, which is justified for $T\gtrsim T_{q}/2$. For lower temperatures, higher-$k$ terms in Eq. \eqref{eqn:J1q} become important, which may influence the value of $Q_{\mathrm{op}}$. Further numerical checks, however, show that Eq.\ \eqref{eq:Qz-Hth} gives a good approximation for $Q_{\mathrm{op}}$ within a rather wide temperature range. \begin{figure}[htbp] \centering \includegraphics[width=3.4in]{HC2Ttz2tz4gz03mu10mu20-Break.pdf} \caption{Examples of the temperature dependences of the upper critical field for the spin-splitting factor $\gamma_z=0.3$, two Fermi energies, $\mu=10T_C$ (upper part) and $20T_C$(lower part), and two hopping energies, $t_z=2T_C$ and $4T_C$. The boundaries are color-coded by the optimal modulation wave vector $Q_{\mathrm{op}}$. The arrows mark the location of the FFLO transition temperature, $T_{\mathrm{FFLO}}$. The orange dash-dot lines show quasiclassical results.} \label{fig:HC2Tmu10mu20} \end{figure} \begin{figure}[htbp] \centering \includegraphics[width=3.2in]{QzHmu10tz2tz4gzDep.pdf} \caption{The field dependences of the optimal modulation wave vector $Q_z$ for $\mu=10T_C$, two values of $t_z$, $2T_C$ and $4T_C$, and several values of the spin-splitting parameter $\gamma_z$ near the optimal values $0.25$ and $0.75$. The curves are marked by the values of $\gamma_z$. The dashed lines show the expected low-temperature behavior, Eq.\ \eqref{eq:Qz-Hth}}. \label{fig:QzHTmu10} \end{figure} To support and verify these analytical results, we proceed with the discussion of the numerically-computed phase diagrams. We remind that the transition temperature $T_{C2}$ at fixed $H$ and $Q_z$ can be computed using exact equation, Eq.\ \eqref{eqn:gap-regularized}, with the exact result for the kernel $\mathcal{J}(H,T,Q_z)$, Eq.\ \eqref{J1llSumPres}. In the quasiclassical limit, $\mu\!-\!2t_z\gg T_C,\omega_c$, however, calculations are much easier with the approximate equation, Eq.\ \eqref{eqHc2-approx}, in which the classical and quantum contributions to the kernel are given by Eqs.\ \eqref{eqn:J1qc}, and \eqref{eqn:J1q}, respectively. The modulation vector maximizing $T_{C2}$ has to be selected. Figure \ref{fig:HC2Tmu10mu20} shows the representative upper critical field lines at low temperatures for the spin-splitting factor $\gamma_z=0.3$, two Fermi energies, $\mu=10T_C$ and $20T_C$, and two hopping energies, $t_z=2T_C$ and $4T_C$. This choice of electronic parameters corresponds to small values of the Maki's parameter. From Eq.\ \eqref{eqn:alpha}, we estimate $\alpha_M\!\sim\! 0.2$ for $\mu\!=\!10T_C$ and $\alpha_M\!\sim\! 0.1$ for $\mu\!=\!20T_C$. Nevertheless, in all shown cases the FFLO instability develops below the critical temperature, $T_\text{FFLO}$. For $\mu=10T_C$ this critical temperature is slightly above $0.1T_C$ and for $\mu=20T_C$ it is slightly above $0.05T_C$, in accidental agreement with a simple estimate $T_\text{FFLO}/T_C\sim T_C/\mu$. At somewhat lower temperature, $\sim 0.5T_\text{FFLO}$, the oscillatory upturn of $H_{C2}(T)$ develops. The optimal modulation wave vector, $Q_{\mathrm{op}}$, continuously increases below $T_\text{FFLO}$. Figure \ref{fig:QzHTmu10} shows the field dependences of $Q_{\mathrm{op}}$ for $\mu=10T_C$, two values of $t_z$, $2T_C$ and $4T_C$, and several values of the spin-splitting parameter located near the optimal values $0.25$ and $0.75$, including $\gamma_z\!=\!0.3$ used in Fig.\ \ref{fig:HC2Tmu10mu20}. The last points at these curves are typically at temperatures $0.005T_C$ and $0.01T_C$ for $t_z\!=\!2T_C$ and $4T_C$, respectively. We see that the modulation wave vector sharply increases below $T_\text{FFLO}$ and at low temperatures it starts to approximately follow the linear dependence on the magnetic field predicted by Eq.\ \eqref{eq:Qz-Hth}. The value of $Q_{\mathrm{op}}$ in this regime weakly depends on the spin-splitting parameter which only determines the field range where such a behavior is realized. \begin{figure}[htbp] \centering \includegraphics[width=3.2in]{TFFLO.pdf} \caption{The lower panel shows the dependence of the FFLO onset temperature $T_\text{FFLO}$ on the spin-splitting factor $\gamma_z$. The parameters in this plot are $t_z/\mu=0.2$ and $\mu/T_C=10$. In contrast to the quasiclassical case, the FFLO states emerge at finite $T_\text{FFLO}$ even when the $\gamma_z$ is very small. Furthermore, $T_\text{FFLO}(\gamma_z)$ oscillates and its maxima are located at $2\gamma_z=n+1/2$ corresponding to the largest minimum separation between the opposite-spin Landau levels, as illustrated in the inset for $\gamma_z=0.25$. Open squares show analytical estimates using Eq.\ \eqref{eq:SecDerTot2}. The upper panel shows $\gamma_z$ dependence of the cyclotron frequency at the upper critical field for $T=T_\text{FFLO}$. We omit the points at the resonances ($2\gamma_z=1,2,\dots$), where the spin degeneracy of the Landau levels is restored, see inset for $\gamma_z=0.5$. The FFLO transition is absent at these points. } \label{fig:TFFLO} \end{figure} The analytical estimate for the instability temperature in Eq.\ \eqref{eq:TFFLO} is valid only for the Zeeman spin-splitting parameters within certain ranges, $|2\gamma_{z}-n/2|<1/4$. Outside these ranges, no simple analytical results are available. The lower panel of Fig.\ \ref{fig:TFFLO} shows the numerically-computed $\gamma_z$ dependence of the FFLO instability temperature. We see that this dependence is oscillatory with the slowly decaying amplitude. As follows from Eq.\ \eqref{eq:SecDerTot2}, $T_\text{FFLO} \propto \omega_c$ suggesting that this slow decay is caused by an overall suppression of $\omega_c \propto H_{C2}(T_\text{FFLO})$ with $\gamma_z$. Such a suppression is indeed seen in the upper panel of Fig.\ \ref{fig:TFFLO}, which presents the $\gamma_z$ dependence of the cyclotron frequency at the instability point. We note that the ratio $T_\text{FFLO}/\omega_c$ displays much better $\gamma_z$ periodicity with slightly increasing amplitude (not shown). The dependence $T_\text{FFLO}(\gamma_z)$ within the ranges $|2\gamma_{z}-n/2|<1/4$ is in excellent agreement with the evaluation based on the analytical result, Eq.\ \eqref{eq:SecDerTot2}. When $\gamma_{z}$ is shifted outside this range, the instability temperature sharply drops and moves in the region of oscillatory $H_{C2}(T)$ behavior. Nevertheless, we see that the instability is always present unless $2\gamma_{z}$ exactly equals an integer. Therefore, both analytical and numerical analyses of this section consistently demonstrate that the quantum-oscillation contribution to the Cooper pairing favors the FFLO instability, especially in the case of strong spin splitting between the Landau-level branches. Our theory provides a quantitative description of this instability. \section{Summary and discussion}\label{Sec:Summary} In this paper, we investigate the FFLO instabilities in a clean single-band layered superconductor in the out-of-plane magnetic field taking into account the orbital-quantization effects. The quasiclassical analysis predicts the emergence of the FFLO state only at very large Maki's parameters, $\alpha_M> 4.76$. We found, however, that the quantum effects promote the formation of this state at low temperature even in the range of parameters where the quasiclassical approximation is expected to work well. Contrary to the quasiclassical predictions, the FFLO state in a clean system can emerge even in the weak Zeeman-effect regime ($\alpha_M\ll 4.76$). The instability of the uniform state is caused by the mismatch between the c-axis Fermi momenta for the one-dimensional Landau-level branches with opposite spin orientation. Correspondingly, the optimal modulation vector at low temperatures is given by the typical separation between the branches. The condensation-energy loss in the modulated state is compensated by the higher gain in the Zeeman energy. Therefore, this state is expected to have higher electronic spin polarization in comparison with the uniform state. Note that in the case of a very strong Zeeman effect, the FFLO state may emerge via the first-order phase transition \cite{HouzetPhysRevB2006,Zhuravlev:PRB80.2009}. In our case of weak Zeeman energy, the transition is known to be continuous in the quasiclassical regime, and incorporating the quantization corrections will not change this scenario, because the quantum correction to the quartic coefficient in the Ginzburg-Landau expansion is small and cannot change its sign. We mostly focused on the typical situation when many Landau-level branches cross the Fermi level near the upper critical field, which also may realize in materials with different electronic spectra. In layered superconductors, this situation corresponds to the condition $4t_z\gg \omega_c \sim T_C^2/\mu$. We note, however, that some key results also hold for extremely anisotropic layered materials, in which the miniband width $4t_z$ is comparable to or smaller than the cyclotron frequency $\omega_c$. In particular, the results for the classical and quantum contributions to the pairing kernel, Eqs.\ \eqref{eqn:J1qc} and \eqref{eqn:J1q}, are valid for arbitrary $t_z$ within the open Fermi surface regime. More importantly, the crucial contribution to the quantum kernel given by the first term in Eq.\ \eqref{eq:JQ2} remains valid for $t_z<\omega_c$. As a consequence, the FFLO instability persists for arbitrarily small interlayer hopping, and the instability temperature for the case $\cos\!\left(4\pi\gamma_{z}\right)\!<\!0$ can be still estimated from Eq.\ \eqref{eq:TFFLO}. The nature of the FFLO state developing at low temperatures, however, changes qualitatively when $4t_z$ becomes comparable with $\omega_c$. In this regime, only a few Landau-level branches cross the Fermi level. Correspondingly, the optimal modulation emerges as the result of competition between a few favorable wave vectors connecting the Fermi wave vectors of the opposite-spin branches. In this case, the low-temperature modulation period is expected to be comparable with the interlayer spacing and will have complicated magnetic-field dependence. The most demanding requirement for the observation of the quantum FFLO instability is the material's purity. The impurity scattering has detrimental effects on the quantum contributions, and strong disorder restores the quasiclassical behavior. As demonstrated in the Appendix \ref{app:OscCorr}, within the simplest lifetime approximation, the impurity scattering leads to appearance of the additional ``Dingle factors'' $\exp[-2\pi k\Gamma/\omega_c]$ in the sum for the quantum correction in Eq.\ \eqref{eqn:J1q}. Here the impurity broadening $\Gamma$ is related to the scattering time as $\Gamma=1/2\tau$. In addition to the reduction of the Landau-quantization corrections, the impurity factors make the sum in Eq.\ \eqref{eqn:J1q} convergent in zero-temperature limit for an arbitrary modulation wave vector. In Appendix \ref{app:disorder}, we consider suppression of the FFLO instability by impurities. We evaluate the critical impurity broadening $\Gamma_{\mathrm{cr}}$ above which the FFLO state is suppressed, $\Gamma_{\mathrm{cr}} \!=\!\left({\omega_{c}}/{4\pi}\right)\ln\left(4\pi^{3/2}\left|\cos\!\left(4\pi\gamma_{z}\right)\right|\!\sqrt{{\mu}/{\omega_{c}}}\right)$ for $\cos\!\left(4\pi\gamma_{z}\right)\!<\!0$. We also illustrate the evolution of superconducting instability boundaries with increasing $\Gamma$. In our consideration, we assumed fixed chemical potential and neglected its quantum magnetic oscillation $\delta\mu(H)$, which should be present if the system is not coupled to a charge reservoir. In layered metals in the limit $4 t_z/\omega_c\gg1$, the low-temperature oscillating amplitude of $\delta\mu(H)$ scales as $\omega_c\sqrt{\omega_c/t_z}$\cite{Gvozdikov:PRB68.2003}. To check if these chemical-potential oscillations have a noticeable influence on our results, we computed $\delta\mu(H)/\omega_c$ using the precise formula provided in Ref.\ \cite{Gvozdikov:PRB68.2003}. We found that for the parameters $\mu/T_C\!=\!10$ and $t_z/T_C\!=\!2$ in Fig.\ \ref{fig:HC2Tmu10mu20}, the maximum amplitude of $\delta\mu(H)/\omega_c$ is only $\sim 0.01$ near the FFLO transition. Moreover, even for the points with small $T_\text{FFLO}$ near the resonance spin splittings in Fig. \ref{fig:TFFLO}, $\delta\mu(H)/\omega_c$ does not exceed $0.05$. We conclude that the oscillating contribution to the chemical potential has a minor influence on the FFLO instability in the studied parameter range. The FFLO transition temperature ($T_\text{FFLO}$) is an oscillating function of the spin-splitting parameter $\gamma_z=\mu_zH/\omega_c$. It has maxima at $2\gamma_z=n+\frac{1}{2}$ corresponding to the largest splitting between the Landau levels with opposite spin orientations, which is the least favorable situation for the uniform state. On the other hand, the uniform state remains stable down to zero temperature at the resonances $2\gamma_z=n$ corresponding to spin-degenerate Landau levels. As pointed out in the Introduction, the effective $\gamma_z$ can be tuned by tilting the magnetic field \cite{WosnitzaFSLowDSC1996} and we expect that $T_\text{FFLO}$ will also be an oscillating function of the tilting angle. This consideration is very general meaning that, in principle, such a quantum FFLO instability may appear in any layered superconducting material provided it can be prepared sufficiently pure. Moreover, we believe that specific assumptions for the electronic spectrum and s-wave symmetry of the order parameter made in derivation are not really essential, and we expect that the predicted promotion of the FFLO state by the quantization is a general phenomenon which also takes place in more complicated situations. We note, however, that in a typical good metal with very large Fermi energy $\mu > 100 T_C$ the FFLO transition temperature becomes vanishingly small, and, correspondingly, purity requirements may be unrealistic. Therefore, the best materials for observation of the predicted behavior are superconductors with strong pairing and not-too-deep bands so that $\mu/T_{C}<30$ and $\mu/\omega_c<50$. Clearly, the predicted quantum effects become more pronounced with decreasing these ratios. Among the known materials, the possible candidates for the predicted behavior may be found in organic and iron-based superconductors. Consider, for example, the well-studied organic superconducting material, $\kappa\text{-(BEDT-TTF)}_2\text{Cu(NCS)}_2$ with $T_C=10.4$K\cite{Singleton:ContemPhys43.2002,Wosnitza:JLowTPhys146.2007,BeyerLTP13,*WosnitzaAnnPhys18} and $H_{C2}(0)\approx7$T\cite{Murata:SynMetals27.1988}. As other organic materials, it can be made exceptionally clean so that the quantum oscillations may be observed even inside the superconducting state\cite{SasakiPhysRevB.67.144521}. In addition, strong experimental support for the classical FFLO state caused by the large Zeeman energy already exists for the magnetic field \emph{oriented along the layers} \cite{BeyerLTP13,*WosnitzaAnnPhys18} and this state may realize only if impurity scattering is very weak. The band structure of this material is composed of one holelike corrugated cylindrical Fermi surface and two electronlike Fermi planar sheets. The Landau-quantization effect is relevant only for the holelike Fermi surface which is characterized by the effective mass $\sim 3.2 m_e$ \cite{MeyerEPL95} and interlayer hopping energy $t_z\approx0.04$ meV \cite{Singleton:PRL88.2002}. The ratio $\mu/\omega_c$ is equal to the ratio of the de Haas-van Alphen frequency $\sim 599$T and $H_{C2}$ giving $\approx 86$. With above effective mass this yields $\omega_c\approx 0.25$ meV, $\mu\approx 22$ meV, and $\mu/T_C=25$. The spin-splitting parameter, $\gamma_z=1.3$ has been extracted using the `spin-zero' effect in the de Haas-van Alphen oscillations \cite{MeyerEPL95} and it is actually close to the optimal value of $1.25$ for the quantum FFLO scenario. The pairing in this and similar molecular crystals may be mediated by spin fluctuations leading to the $d$-wave symmetry of the order parameter \cite{SchmalianPhysRevLett.81.4232, KurokiJPSJ06}. Several material’s properties are consistent with the $d$-wave symmetry including, NMR\cite{DeSotoPhysRevB.52.10364}, low-temperature behavior of the London penetration depth\cite{CarringtonPhysRevLett.83.4172, MilbradtPhysRevB.88.064501} and specific heat\cite{TaylorPhysRevLett.99.057001}, dependences of specific heat\cite{MalonePhysRevB.82.014522}, and thermal conductivity\cite{IzawaPhysRevLett.88.027002} on the magnetic-field direction. The consideration of this paper can be straightforwardly generalized to the d-wave case and we expect a very similar behavior. The instability temperature for this material can be estimated from Eq.\ \eqref{eq:TFFLO} as $T_\text{FFLO}\sim0.045T_C\sim 0.45 K$. From the material's parameters, we estimate $4t_z/\omega_c\approx 0.7$ meaning that the Fermi level typically crosses only one Landau-level branch for every spin direction. In this case, one can expect a large modulation wave vector which is determined by the two Fermi momenta of the opposite-spin branches. We can conclude that this organic superconductor has almost ideal electronic parameters and is a very feasible candidate for the realization of the quantum FFLO state. It is, however, a challenge to demonstrate it experimentally. An additional complicating factor is that the transition may not be described by the mean-field theory due to strong quantum fluctuations \cite{UjiPhysRevB2018} which may smear the static configuration. The described FFLO instability actually enhances these fluctuations due to the reduction of the vortex-lattice tilt stiffness. High values of transition temperatures and upper critical fields as well as small Fermi energies make \emph{iron-based superconductors} natural candidates for observing the predicted phenomenon. The weak impurity scattering limit probably cannot be achieved in compounds obtained by doping from nonsuperconducting parent materials. Fortunately, there are also several stoichiometric compounds, such as FeSe, LiFeAs, and CaKFe$_4$As$_4$, which, at least in principle, can be made pure. For example, the compound FeSe has a transition temperature $\sim 8$K\cite{Medvedev:NatMat8.2009} and a rather high low-temperature upper critical field $\sim17$T\cite{Kasahara:PNAS111.2014,Terashima:PRB90.2014}. The material can be made clean allowing for the observation of quantum oscillations down to fields $\sim 20$T \cite{Terashima:PRB90.2014,Watson:PRB91.2015,AudouardEPL2015}, only slightly above $H_{c2}$. Its band structure is composed of hole and electron pockets with very small Fermi surfaces. An analysis of the Shubnikov-de Haas oscillations \cite{Terashima:PRB90.2014} gives the smallest Fermi energy for the electron and hole bands of only 3.9 and 5.4 meV, respectively, and ARPES measurements\cite{Shimojima:PRB90.2014,*Nakayama:PRL113.2014,*Watson:PRB91.2015,*FedorovSciRep2016} are consistent with these estimates. This means that the ratios $\epsilon_F/\omega_c$ are in the range of $4-6$, clearly indicating the relevance of quantum effects. Moreover, experimental indications of a possible phase transition inside the superconducting state have been reported recently. It was demonstrated that the diagonal and Hall thermal conductivities have kinklike features near the magnetic field $H^\ast\sim15$T at $T< 1.5$K below $H_{C2}(T)$\cite{Kasahara:PNAS111.2014,Watashige:JPSJ86.2017}. It is feasible that this transition corresponds to the quantization-induced FFLO state with modulation along the magnetic field. Even if this interpretation is correct, the simple model used in this paper probably does not quantitatively describe this transition, because it is likely influenced by multiple-band effects. We conclude that the generally accepted picture of the true superconducting ground state in high magnetic fields is incomplete for clean materials. The quantization effects promote the formation of the FFLO state in which the order parameter is periodically modulated along the magnetic field. Such a state may actually realize in several existing pure materials, even though a direct experimental proof for it may be quite challenging. \begin{acknowledgements} The authors would like to thank Alexander Buzdin and Yakov Kopelevich for useful discussions. This work is supported by the U.S. Department of Energy, Office of Science, Basic Energy Sciences, Materials Sciences and Engineering Division. K.W.S. is supported by the Center for Emergent Superconductivity, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, under Award No. DEAC0298CH1088. \end{acknowledgements}
\section{Introduction} Model checking \cite{Clark:2000, Clarke:2008:BMC:1423535.1423536} is first introduced by Edmund Clarke and Allen Emerson in 1981 to solve the Concurrent Program Verification. It has a state-transition graph (denote as a model) and some logic formulas (denote as properties). The algorithm of model checking will try to claim that all paths of the model are satisfied the properties. In other words, if we write a property about mutual exclusion and the model checker says the property is unsatisfied, we can trace the error messages back to the situation and inspect whether the model or the real-world system will suffer from the race condition. Concurrent errors are hard to detect by code review or test case, because we can not guarantee the asynchronous processes executing in a specific order. Another way to ensure the correctness of concurrent programs is by proof, one example is that Lamport proves the correctness of a fast mutual exclusion algorithm in 1987 \cite{Lamport:1987:FME:7351.7352}. But, this strong guarantee requires the preliminary of proof tactic and constructs by hands. Model checking, though, has weaker guarantee but is more expeditious only if the abstract model and the real-world system are homogeneous. Furthermore, the correctness of the algorithm can not stand for the correctness of the implementation on other hardware or software mechanisms, i.e. interrupt or softirq. Holzmann \cite{Holzmann:2014:MC:2556647.2560218} indicates model checking is one of the three topics that the Mars Science Laboratory (MSL, launched by NASA) has used to reduce risk in complex software systems. He also points out that they had successfully verified several concurrent issues on key parts of the spacecraft, including Cassini, Deep Space One, and the Mars Exploration rovers. Piko/RT \cite{PikoRT}, developed at National Cheng Kung University, is a non-trivial operating system but small enough for verification purpose. One of the key features is real-time capability. It enables interrupts (exceptions) almost all the executing time to handle the incoming IRQs. Moreover, it is optimized for the ARM Cortex-M series. Until 2015 \cite{ARMProduct}, ARM had shipped 20.6 billion Cortex-M units within six years and the number is growing. It is hard to debug if such a number of devices deployed around in different areas. Not to mention the software system must not behave unexpectedly in the critical usages. In this paper, we address the problem of verifying the simple concurrent programs will not act unexpectedly (no race condition, starvation, and deadlock) under the specific conditions (preemptive scheduling and interrupt-driven mechanisms). We first construct an abstract model on the Spin model checker based on three domains: proof framework of eChronos, source code of Piko/RT, and reference manual of ARMv7-M, discussing in section 3. Next, write three properties (race condition free, starvation free, and deadlock free) and verify in Spin (section 4 and 5). Last but not least, discuss the background knowledge and summarize the conclusions in section 2 and 6. All our model\footnote{\url{https://github.com/kaizsv/pikoRT-Spin.git}} is in the public domain. \section{Background} We use Spin as our model checking tool and build an abstract scheduling model on. In this section, we discuss some topics about Spin model checker and the real-time scheduling before approaching to the model. And then, talk about several related works of this paper. \subsection{The model checker} \subsubsection{Spin} \begin{figure} \subfloat[][Finite state infinite run automata.]{\includegraphics[width=0.22\textwidth]{fsaex}\label{fig:fsaex}} \quad \subfloat[][A path of $\omega$-run]{\includegraphics[width=0.16\textwidth]{buchi}\label{fig:buchi}} \caption{Example of $\omega$-automaton} \end{figure} Spin \cite{SpinRoot, Ben-Ari:2008:PSM:1349767, Holzmann:2003:SMC:1405716} is an open-source verification tool of multi-threaded software developed in the Computing Science Research group of Bell Lab. The theory behind Spin is the $\omega$-automaton, which is the variation of classic finite state automata with acceptance conditions on infinite executions. Consider Figure \ref{fig:fsaex}, note that the termination of the automata would not necessarily be a desirable result. We can declare some state that will be visited infinitely often by labeling \textit{accept}, i.e. Run state, as a legal run. Because the states are finite, the infinite run ($\omega$-run) will anyway repeat itself at the certain degree just like Figure \ref{fig:buchi} shows. If Spin find an $\omega$-run with some state labeling \textit{accept}, it can claim that the automata is accepted. This is so called the B\"uchi acceptance. Every thread in Spin is an automata and product altogether in the verifying stage. Spin supports a meta language: PROMELA, which interpreting readable script into automata, like common condition statements, \texttt{if} or \texttt{do}. It also provides \texttt{channel} allowing the communication between two threads. And the most important one in this paper is the \textit{guard}. \textit{guard} is a true of false expression that guard the execution of the following statements only if it is true, otherwise the thread will be blocked until it becomes true. \subsubsection{Linear temporal logic} \textit{Safety and liveness}. We need to discuss these two kinds of properties before going to linear temporal logic, which are introduced by Lamport in 1977 \cite{Lamport:1977:PCM:1313313.1313439}. Safety property guarantees nothing bad ever happens, e.g., more than two processes access same critical section at the same time will never happen. Liveness property denotes as something good eventually happens, e.g., if a process wants to enter its critical section, it can eventually enter. Above is only the informal expression of two types of properties. \textit{Fairness} is another issue of temporal logic. We can not assume relative speeds of asynchronous processes, there might exist a run that when a process can execute, but never be executed. This is called the unfair processes. Two commonly used variants of fairness are: {\medbreak\indent\textit{\textbf{weak fairness}: If a statement is continuously enabled, it will eventually be executed}} {\\\indent\textit{\textbf{strong fairness}: If a statement is enabled infinitely often, it will eventually be executed}} \medbreak \begin{figure} \includegraphics[width=0.9\linewidth]{ltl} \caption{Semantics of Global and Future operators} \label{fig:ltl} \end{figure} Temporal logic allows us to formalize the properties of a run unambiguously with some special operators. Most relevant to the verification of asynchronous process systems is a specific branch of temporal logic, \textit{linear temporal logic} (LTL). LTL is sufficient to describe two operators in the scope of this paper. Let $f$ be a LTL formula. Operators in $f$ such as \texttt{not}, \texttt{and}, \texttt{or}, \texttt{implication}, and \texttt{equivalence} are still a LTL formula. Two further temporal operators \textit{global} and \textit{future} are introduced below and Figure \ref{fig:ltl}: {\medbreak\indent\textit{$\Box f$: $f$ is true now and forever in rest of the run}} {\\\indent\textit{$\Diamond f$: $f$ is true eventually in the future run}} \medbreak \begin{figure} \includegraphics[width=0.7\linewidth]{mutex} \caption{Mutual exclusion} \label{fig:mutex} \end{figure} Let us consider an example of mutual exclusion. Figure \ref{fig:mutex} contains two processes and \textit{CS} is the critical section of that process. Each process is first in non-critical section. If one process wants to access its shared variables in critical section, it must try to gain lock first at \textit{Try-CS} state and leave the critical section as soon as possible. We can write down the LTL formula about mutual exclusion free, starvation free, and deadlock free as follows: {\medbreak\indent\textit{\textbf{mutual exclusion free}: $\Box\neg(\text{CS}_1\wedge\text{CS}_2)$}} {\\\indent\textit{\textbf{starvation free}: $\Box\Diamond \text{Try-CS}_1\rightarrow\Box\Diamond\text{CS}_1$}} {\\\indent\textit{\textbf{deadlock free}: $\Box\Diamond(\text{Try-CS}_1\wedge\text{Try-CS}_2)\rightarrow\Box\Diamond(\text{CS}_1\vee\text{CS}_2)$}} \medbreak The first property is simple. Both processes can not access its critical section at the same time in every state of a run. The rest are the liveness properties. Starvation free means if a process try to enter its critical section infinitely often, it will be in critical section infinitely often. And deadlock free property means if both processes try to enter each critical section infinitely often, at least one process can enter its critical section infinitely often. Note that ``infinitely often'' represents the properties are strong fairness. This is will be discuss later in section 4. To understand how Spin verifies LTL formula, consider it as a game. Spin negates the LTL formula and converts it into \textit{never claim}. The \textit{never claim} is also an automaton that can product together with the model. The Spin model checker then try to find a path that satisfied the negated formula which means there exists a counterexample in the model that violates the property. On the contrary, if \textit{never claim} never reaches the acceptance state (never finds a path that violates the formula) means the model satisfied the formula. \subsection{Real-time scheduling} A real-time system is a set of tasks which running interleaving on uniprocessor or concurrently on multi-processors that can simply classify into preemptive and non-preemptive scheduling. Non-preemptive scheduling has lower context switch latency but the interrupt handler might violate the deadline. And preemptive scheduling forces each task to process under a limited time and the task might be blocked (pending) even if within its timeslice. In this section we discuss several factors which affect the behavior of preemptive scheduling from the hardware and software aspects. The hardware is the mechanisms of ARMv7-M architecture and the software is the implementation of the case study. \subsubsection{Exception of ARMv7-M architecture} ARMv7-M architecture \cite{ARMv7-M:Manual, Yiu:2013:DGA:2602039} uses ``exception'' as a response to system event and ``interrupt'' as a peripheral request. Exception (or interrupt) with higher priority level can preempt the lower one. Moreover, synchronous exception like non-maskable interrupt (reset, hardware fault), system fault, and SVCall must execute before the context switch. This means synchronous exception can only be preempted by higher priority level exception before changing to the next task. The incoming exception will be pending if the priority level is less than or equal to the current one. Other exceptions are considered asynchronous that we can not guarantee the timing of executing, even after the context switching. \textit{Exception entry and exception return} are the mechanism before and after the exception handler take place on ARMv7-M architecture. While an exception occurs, the hardware will compare the priority of current task and the coming exception. The exception entry will push parts of the context into the stack and reset return values of current context if the coming exception is allowed to preempt according to the interrupt policy. After finishing the handler task, the exception return will choose a proper task (from the stack or the pending state) to switch to. \textit{Tail-chaining} is the further extension of the exception return. Tail-chaining can continue to process the pending exception at the exception return stage. Rather than restoring to the return context from the stack and saving it back again to the stack, tail-chaining can directly switch to the pending exception with less timing gap. \textit{Context switch} is a significant issue in this paper. Context switch typically requires processor to execute at a critical region of interrupt disabled to avoid the corruption of data during the switch, However, the busy waiting might cause pending the coming exception and violate the deadline. ARMv7-M supports interrupt enabled context switch. SVCall is a synchronous exception and triggered by the \texttt{svc} instruction from user tasks to perform supervisor call. PendSV is an asynchronous software interrupt and handles the scheduling point enabled by the systick handler. To enable interrupt during context switch, the ARMv7-M reference manual suggests to configure both exceptions with the lowest priority level so that they can not preempt each other. \subsubsection{Preemptive scheduling} Preemptive scheduling causes the task to stop and resume executing frequently. One reason is the task reaches its timeslice and does not finish yet, the scheduler need switch to the next task from the runqueue. Another reason is when a task with higher priority added into the runqueue, at any scheduling point the system needs to guarantee the priority of current task is always the highest one in the runqueue. The following lists several aspects which will influence the behavior of the preemptive scheduling. \textit{Bitmap scheduler} has 32 priority levels and two priority arrays, active and expired, which can be swapped in constant time. The scheduler always chooses the highest priority task from the active priority runqueue and selected in round-robin way if multiple tasks exist in the same priority level. The implementation of array data structure and the bitwise operations make time complexity in constant time. \textit{Softirq and tasklet}. Interrupt handlers are asynchronous and often timing-critical so there are several limitations, such as respond rapidly and cannot be blocked. Softirq is the mechanism that moves the execution of the non-critical job (bottom half task) from interrupt handlers to the user task (softirq process). Moreover, softirq maintains a bitmap scheduler with only one runqueue to manage the different bottom half tasks, called tasklet. \textit{Mutual exclusion} is one of the solutions to prevent race condition and has different implementations. In this paper, we focus on a pair of load-link/store-conditional instructions, \texttt{ldrex} and \texttt{strex}, supported by a state machine \textit{exclusive monitor} provided by ARMv7-M architecture. Each processor has a exclusive monitor called local monitor (we only consider uniprocessor situation here), which will mark a segment of memory address (register) as \textit{exclusive} by the calling of \texttt{ldrex} instruction. One local monitor can only mark one register at the same time, \texttt{ldrex} will load a value from the address to the register and clear the previous mark and mark the address as exclusive. \texttt{strex} conditionally stores the value back to the address if the address is marked as exclusive and clear the mark at the same time, otherwise the store will fail notifying by the return value. In brief, no matter how many times \texttt{ldrex} mark the address, only one can update the value of that address by \texttt{strex}. And finally, all mark will be cleared at every exception return stage. This make sure the atomic operations of the mutex variables. \textit{Condition variable} is an extension of mutual exclusion. It will temporary release the lock and move itself out of the runqueue if the condition is not satisfied (condition wait). While others get the lock and satisfy the condition statement, it signals the blocked one by returning the lock and enqueuing the blocked one again (condition signal). This is more efficient than busy waiting because the blocked one will temporarily gives up the processor's resources and turns to the process. \subsection{Related work} \textit{eChronos} \cite{DBLP:conf/itp/AndronickLMMR16} is a tiny real-time OS running on ARM Cortex-M3 platform developed by Data61 in Australia. They provide a framework and prove the property ``the running task is always in the highest priority'' on the Isabelle/HOL proof assistant based on the Owicki-Gries \cite{Owicki:1976:APT:2696887.2697004} method. The OG method is the parallel version of Hoare logic, known as the pre- and post- condition style, guaranteeing the shared variables are not interleaving by the parallel programs. Their framework is delicate and scalable that simulates both software and hardware behaviors in one model. But the challenge of their work is the exhausting hand constructed proof and the lack of implementation details. The reason of the later one is the proof strategy that they do not declare the explicit interrupt policy, causing all exceptions can preempt each other. Instead, they have proved a larger range of the exception behavior is correct that can implicate to the limited and real one. \textit{OSEK-Spin}, Zhang, et al. \cite{10.1007/978-3-319-17581-2_16} use Spin to verify the application of a standard automobile OS, OSEK/VDX, which is widely adopted by many automobile manufacturers. To enhance the user experience, different applications are developed based on the OS. To check whether the applications can run correctly, the researcher provide a Spin-based model that can replicate the executions on OSEK. The correctness means under the concurrent running task, synchronous event, and context switch, the user application will not suffer from race condition or priority inversion. They also developed bounded model checking to verify more complex applications. However, the model considered only the software aspect and did not contain the specific hardware behavior. The two researches list above are the most related to our paper. Moreover, there are lots of corresponding work about verifying software or hardware by mathematical proof, for example, seL4 \cite{Klein:2009:SFV:1629575.1629596}. However, the design of seL4 kernel is optimized for the formal verification, there are some limitations. Although seL4 had analyzed the WCET \cite{6121451}, its kernel code only has few interrupt points, others with interrupt disabled. This is different from the common design of RTOS. \section{The model} \begin{figure*} \includegraphics[width=0.7\linewidth]{model} \caption{The schema of the model (2 user tasks, 2 interrupts)} \label{fig:model} \end{figure*} In section 2, we had discussed several factors of scheduling. In this section, we show how we model those factors by PROMELA. The model consists of three static processes (SVC, PendSV, and softirq) and an amount of user tasks and interrupts (number of interrupt must contain one systick). Figure \ref{fig:model} is a schema of 2 user tasks and 2 interrupts. The model can separate into three parts: user task for the orange box, exception for the blue one, and two special exceptions SVC and PendSV for the green one. Each process has a PID listed at the top of Figure \ref{fig:model}. \subsection{Overview} We had mentioned that each process are executed in asynchronous order, we use this feature to simulate the incoming of the IRQs. But to determine which process is the legal one to occupy the resource of processor, eChronos introduced a guard called \textit{AWAITS} to control the executing of the processes. Another variable \textit{AT} (active task) records which process is the legal on to be executed. Every statement in the model will be wrap by \textit{AWAITS} and can be executed only if the \textit{AT} becomes its PID, otherwise, the statement will be blocked until AT becomes its PID again. There is also an \textit{A\_AWAITS} statement which do the same thing as \textit{AWAITS}, because there are two atomic statements in PROMELA, \texttt{d\_step} and \texttt{atomic}. Both statements guarantee no other processes can interleave within the scope of the statement. The difference is that in verification stage, the \texttt{d\_step} is seen as one step while the \texttt{atomic} is depend on the statements inside. Note that each statement in the code segment surrounding by a frame is wrapped by the \textit{AWAITS} or \textit{A\_AWAITS} statements which are the unit operation in our model. Starting from SVC handler first, we modeled five system calls, including, mutex lock, mutex unlock, condition wait, condition signal, and pthread yield. Consider that SVC is synchronous, we use a synchronous channel called rendezvous channel in PROMELA to perform the behavior of calling the system call. It is something like the client/server model that the SVC handler is the server and serves several user tasks. The difference is that other processes remain blocked during the communication. Recall the interrupt enabled context switch, PendSV is asynchronous and used to respond the scheduling request from the systick. Simultaneously, the systick handler will insert its bottom half task into the tasklet runqueue waiting to be executed in softirq process. Another interrupt handler do nothing in the model. Last, we choose the classic consumer/producer program as our application to verify and the softirq will discuss later. \subsection{Exceptions of ARMv7-M architecture} Figure \ref{fig:model} shows that every exception is starts with \textit{ITake} or \textit{PendSVTake} and ends with \textit{IRet} (except SVC is synchronous) which models exception entry and exception return. There are two situations in \textit{ITake}. First, we refer to the manual of ARMv7-M to implement the interrupt policy, including the priority and the pending state to determine whether the incoming IRQs can preempt the current process. \textit{PendSVTake} is a simplified \textit{ITake} and only affects to the PendSV process. An array \textit{ATStack} stores the preempted processes that has not finished its job yet. \textit{IRet} elects the next running task from the top element of \textit{ATStack} or the highest priority of pending state when the current interrupt handler is finished. If the exception priority of the top of the \textit{ATStack} is higher, pop the exception directly to the \textit{AT}. If not, remember that the exception in pending state has not been executed yet, an additional variable \textit{ghost\_direct\_AT} is introduced to record this situation and can be detected by the second condition of \textit{ITake}. The choosing of pending state running first is similar to the tail-chaining mechanism in ARMv7-M The design of \textit{ATStack} is an array data structure that the last element in it must be user task, others are exceptions in priority order. The formalization of context switch is to change the last element in \textit{ATStack}. Because context switch only occurs in SVC or PendSV processes, the only element in \textit{ATStack} must be current user task and the \textit{AT} must be the PID of SVC or PendSV. We add several assert to check this scene and change the last element in \textit{ATStack} to reproduce the behavior of context switch. \subsection{Preemptive scheduling} Two priority runqueues, which contain an unsigned map and a queue, form the structure of bitmap scheduler. One key difference between the model and the source code is the swap of two priority runqueues. The source code uses pointer to swap each other, however, the model uses bitwise operations to do that. Two priority runqueues \textit{sched\_bm[2]} are defined in the model. Another global bit \textit{SCHED\_STATE\_SWAP} is helped to distinguish each runqueue. To swap the runqueues, just \texttt{xor} the swap bit. Additionally, the \textit{ACTIVE} and \textit{EXPIRED} thread state are designed in the same way. {\medbreak\indent\textit{\textbf{ACTIVE}: $(0 | \text{SCHED\_STATE\_SWAP})$}} {\\\indent\textit{\textbf{EXPIRED}: $(1 \oplus \text{SCHED\_STATE\_SWAP})$}} \medbreak In short, the \textit{softirq} is a user process which executes the bottom half task of the interrupts. And the \textit{tasklet} is a one priority runqueue managing which bottom half tasks take place first. If no more bottom half task can be executed, the softirq process will give up the processor's resource by calling the pthread yield system call. But notice that if the softirq has higher priority than other user processes, the system call still choose softirq as next process. The lock and unlock of \textit{mutex} can split into two stages: non-privilege and privilege because of the supporting of load-link/store-conditional (LL/SC) instructions. Take mutex lock for example, if the lock is free then gain lock directly in the non-privilege mode by the mechanism of LL/SC, otherwise, calling the mutex lock system call to give up the execution (moving itself out of the runqueue). Another point to note that, there must have a place to store the tasks moving out of the runqueue by mutex. The implementation of the source code is a linked list structure, we use an array structure in PROMELA, instead. However, to reduce the size of the model, there is only one slot in the array currently and scalable depending on the applications. Implementation of \textit{condition variable} is based on the mutex that will temporarily release the lock and gain lock again if the condition is satisfied. Nonetheless, this is difficult to implement in PROMELA. In source code, every process performing context switch in SVC or PendSV handlers which will stop at a specific point in the handler and resuming when switching back. If we want to emulate this behavior in PROMELA model, the SVC and PendSV handler must duplicate times of the number of user task. This is a great effort for model checking that we need to share the SVC and PendSV handler within each user task. This leads to another problem that we can not place two scheduling points in one exception handler and the scheduling point must establish just before the \textit{IRet}. This limits the modeling of condition wait system call that we need to use two system calls (condition wait and mutex lock) and wrap together with \textit{atomic} statement to complete the one system call's job. \section{Strategy of verification} \begin{table*} \caption{Options of Spin model checker} \label{tab:spinv} \begin{tabular}{rccc} \toprule \multicolumn{4}{c}{Spin Version 6.4.8 - 2 March 2018} \\ \midrule & \textbf{Spin options} & \textbf{Verification options} & \textbf{Runtime options} \\ \cmidrule{2-4} Safety properties & \texttt{-a} & \texttt{-DXUSAFE}, \texttt{-DCOLLAPSE}, & \texttt{-m100000000} \\ & & \texttt{-DSAFETY}, \texttt{-DNOCLAIM}, & (\texttt{-m<changeable>}) \\ & & (\texttt{-DMA=24}), \texttt{-DNOFAIR}, & \\ & & \texttt{-DMEMLIM=<changeable>} & \\ \cmidrule{2-4} LTL acceptance & \texttt{-a}, & \texttt{-DXUSAFE}, \texttt{-DCOLLAPSE}, & \texttt{-m100000000}, \\ cycles & \texttt{-DLTL} & (\texttt{-DMA=24}), \texttt{-DNOFAIR}, & \texttt{-a}, \\ & & \texttt{-DMEMLIM=<changeable>} & \texttt{-N <ltl name>} \\ \bottomrule \end{tabular} \end{table*} We had talked about the model, now discussing the properties and how we verify the model by Spin model checker. \subsection{The properties} These two methods are used to verify the correctness of the model: \begin{enumerate*}[label={\roman*)},font={\bfseries}] \item \textit{assert} for safety property, \item \textit{LTL} for liveness properties. \end{enumerate*} The \textit{assert} is not only the safety property but also a useful tool to check whether the model is correct during the process of modeling. We use \textit{assert} in the following ways. \begin{itemize} \item The insertion of the queue will not induce buffer overflow and the deletion of the queue must succeed. \item If the value of map is not zero, there must be some elements in the queue. \item If the scheduler chooses idle as next thread, the current thread must not be idle. \item The modification of IRQ pending state must be the interrupt process. \item The tail-chaining only happens when no other exception priority in pending state is higher than itself. \item The \textit{ATStack} will not have buffer overflow. \item PendSV can only preempt the user task. \item The consumer/producer will not suffer from race condition using two global bits \textit{cs\_c} and \textit{cs\_p} to record the entrance of critical section. \item Only user tasks can perform the system call when there is no pending exception. \item Only user tasks can perform context switch when there is no other active exception (excluding SVC and PendSV). \item The last element in \textit{ATStack} is a user task; others are \textit{UNKNOWN}\footnote{ARMv7-M resets the register with UNKNOWN value} during the context switch. \item Mutex list (array) must not be empty if the value of mutex is larger than zero. \item The value of mutex must not smaller than -1. \end{itemize} For LTL, we label the condition loop as \textit{want}, it means that the process wants to enter its critical section but blocked at the condition loop. The $@$ symbol means the execution is at the statement with specific label. Note that we apply the strong fairness in the LTL formula. If not, the model checker will consider the situation that the systick preempt itself forever. But this is impossible that the duration of systick is 1ms in the real-world system. {\smallbreak\indent\textit{\textbf{consumer starvation free}: $\Box\Diamond\text{consumer@want} \rightarrow\Box\Diamond\text{cs\_c}$}} {\\\indent\textit{\textbf{producer starvation free}: $\Box\Diamond\text{producer@want} \rightarrow\Box\Diamond\text{cs\_p}$}} {\\\indent\textit{\textbf{deadlock free}: $\Box\Diamond(\text{consumer@want}\wedge\text{producer@want})\rightarrow\Box\Diamond(\text{cs\_c}\vee\text{cs\_p})$}} \subsection{Spin options} The hardware environment in this paper is a 1TB memory machine with Xeon 6134M 3.2GHz processors. Table \ref{tab:spinv} is the Spin options for Safety and LTL verifications. The search algorithm in this paper is the DFS. Looking at \textbf{Spin options} first, \texttt{-a} is needed to generate the verification code and \texttt{-DLTL} is a custom macro that used to load the LTL properties. In \textbf{Verification options}, \texttt{-DXUSAFE}, \texttt{-DCOLLAPSE}, and \texttt{-DNOFAIR} are used in both properties, the first one is to disable the usage of xr and xs assertions, the second one is to compress each state to reduce the memory usage, the third one is to disable the weak fairness provided by Spin (we use strong fairness in LTL formula). \texttt{-DNOCLAIM} is to disable the usage of never claim, but enables while verifying the LTL properties. \texttt{-DSAFETY} is used in safety property only. \texttt{-DMEMLIM} is the maxima memory that Spin can use and \texttt{-DMA} is the algorithm of minima automata which saving the memory but spending lots of running time. Next, the \texttt{-m<changeable>} is the maxima depth for the DFS algorithm and \texttt{-N} used to choose which LTL property to verify. Spin model checker will provide statistics if the verification is completed under the memory and maxima depth boundary. It also provides a list of unreached statements in the model but never be executed. To analyze this list, there are eight scheduling points in the model. We copy the macro of scheduling points eight times with different names. With this setting, we can tell the difference between the eight scheduling points by the different lines of code and analyze them later. \section{Discussion} We verify a classic concurrent program--consumer/producer in this paper and use a bit to denote the data buffer. This application is also one of the test case of Piko/RT (cond\_3). Table \ref{tab:verification} shows the results of the four verifications. Note that the \textbf{Safety} case uses only \textit{assert} to verify race condition, which is more efficient than other liveness cases. Because the previous one only checks the specific variable at the point, however, the \textit{LTL} checks the variables along every $\omega$-runs (Figure \ref{fig:buchi}). Moreover, the meaning of \textbf{depth} and \textbf{states} in Table \ref{tab:verification} are that the former represents the longest depth of the $\omega$-run and the later is the number of states that Spin had verified. The state is the set of all global variables in the model, each statement in the model might causes the migration from one state to another. The most interesting point is that the usage of memory is extreme high, is it really worth it to consume such effort to build the verifications? Remember we had mentioned about \textit{AWAITS} statement, it is the watershed separating the atomic and concurrent executing. Between each \textit{AWAITS} (or \textit{A\_AWAITS}) statement is an interrupt point that allowed every non-blocked process to be executed in different order. There are total 67 \textit{AWAITS} (and \textit{A\_AWAITS}) statements in our model, and this is not counting the repeated ones (the \texttt{inline} function of PROMELA will be expended like macro in C language). For example, there are nine scheduling points in the model (8 in SVC and 1 in PendSV) which means we have to multiple nine times the number of interrupt points under the \texttt{inline} function of scheduling point. It is hard for us to consider such amount of scheduling points at the same time by code review or test cases, how can we check a vulnerability at the depth of 50 million steps? However, with the help of the Model Checking and the powerful machine, we can verify those properties within sustainable time. All we have to do is to construct an elegant model which can use less steps to represent the real-world system. \begin{table} \caption{The 4 verification results} \label{tab:verification} \begin{tabular}{rcccc} \toprule & \textbf{Depth} & \textbf{States} & \textbf{Memory} & \textbf{Time} \\ \cmidrule{2-5} Safety & 23,619,898 & 5.84e+09 & 314 GB & 3.2 hours \\ \cmidrule{2-5} consu\_starv & 49,295,820 & 1.01e+10 & 707 GB & 10.4 hours \\ \cmidrule{2-5} produ\_starv & 49,678,300 & 1.01e+10 & 707 GB & 10.4 hours \\ \cmidrule{2-5} Deadlock & 40,484,755 & 8.11e+09 & 477.2 GB & 6.75 hours \\ \bottomrule \end{tabular} \end{table} Moreover, Spin also provides us an unreached statement list to analyze. The followings reasons are certain for the unreached statements. Note that both priority runqueues are not empty at the scheduling points (never switch to idle thread) in this paper. \begin{itemize} \item The scheduling point in PendSV needs to insert current task to the expired runqueue, while the scheduling point in SVC don't. This causes the unreached statements. \item If the active runqueue always has some elements, the scheduler does not need to perform swap statements and the condition of next thread equals idle will not be checked. This is because there is an enqueue point just before the scheduling point. \item If the active runqueue is empty and the expired runqueue has some elements, the condition of next thread equals idle will not be checked. \item If the next task is equal to the current task, need not to perform context switch. This happens only in the pthread yield system call. \item Two scheduling points in mutex unlock system call never been executed. \end{itemize} The last reason is complicated that we need to consider two conditions about the mutex unlock system call. First is the system call from the condition of LL/SC. The second is called via the condition wait system call. In the first situation, consider that the current process has the lock, the thread state must not be \textit{BLOCKED}. The first scheduling point in mutex unlock system call is guarded by the thread state equals \textit{BLOCKED} condition will never be executed under first situation. However, the first scheduling point will always be approached in the second situation. Because the conditional statement in mutex unlock system call is deterministic while the second scheduling point in mutex unlock system call will never be executed. Those are the reason why there are two scheduling point not be executed. \section{Conclusions} We adapt an existing machine-assisted framework to fit the requirement of model checking and verify several properties of a simple concurrent program under the specific conditions. The model contains the simulation of hardware and software aspects. Moreover, we do not construct any mathematical proof, the PROMELA language is C-like that anyone can rebuild at any stages of the system life cycle by their own (the effort of this paper is about 7 man-months and the Piko/RT is still in development) and the verification time is within one day (3 hours for safety property). This means model checking have its advantage on verifying a real-world system at the early stage comparing to the system optimized for formal verification. However, there are still some defects in this paper that need to be accomplished. \begin{enumerate} \item The cost (time and memory usage) of adding one process to verify is too expensive in checking the OS source code. There are two possible ways to deal with. First, split the model into several layers and verify each layer one by one. Another way is to construct proof by hand, Delzanno et al. \cite{EPTCS161.13} has proved that using a limited number of process can represent the situation of n processes in Spin. \item How to claim the abstract model and the real-world system are truly homogeneous. One possible way is to construct a mechanism that extract the PROMELA model from the C source code automatically rather than builds by human. \end{enumerate} For the second point, we can not claim the model in this paper is totally correct, yet. But we can tell the behave is similar to the target system by adding \textit{assert}, analyzing the unreached statements or error message, and applying the test cases. In this paper, we use condition variable to deal with the mutual exclusion problem. We also adapted a mutex test case before, and currently, we are trying to deal with the idle thread problem to look inside the behavior of the model.
\section{Introduction} Image reconstruction is an important issue in the field of image computing, which covers a broad scope including image restoration, image inpaiting, image denoising, image super-resolution, etc. It has been widely investigated for a long period. Deep convolutional networks \cite{he2016deep,krizhevsky2012imagenet,simonyan2014very} made great progress in recent years in the field of computer vision. Nowadays, as deep learning has been widely used, a general idea may arise to let the machine learn how to reconstruct images with deep learning. The advantage is that the image can be reconstructed through learning from a large amount of samples without specific analysis for different types of image recovery respectively. Many good results have been achieved using this strategy \cite{dong2016image,levin2004colorization,larsson2016learning,cho2016natural,yeh2017semantic,levin2008closed,burger2012image}. \begin{figure}[] \includegraphics[width=1.65in]{global_compare2.pdf} \includegraphics[width=1.65in]{global_compare1.pdf} \caption{Various benchmarks for image reconstruction. The first row shows the corrupted images, the second row shows the reconstructions by our method, and the third row shows the real images accordingly. } \end{figure} Generative adversarial networks (GANs) \cite{goodfellow2014generative} have brought new ideas for deep learning since 2014. GANs are a framework for producing a generative model by way of a two-player minimax game. Although it has succeeded in a lot of practical applications, such as synthesizing interior decorations, human faces, and street scenes, it is not an easy task for generative adversarial networks to obtain high-quality training samples because a lot of work has to be spent on time-consuming manual annotation, which is a common drawback of modern deep convolutional neural networks. There are many developments in image reconstruction using generative adversarial networks, such as super-resolution \cite{dong2016image}, matting\cite{cho2016natural,levin2008closed}, inpainting \cite{pathak2016context,yeh2017semantic}, colorization \cite{levin2004colorization,xu2013sparse,larsson2016learning}, denoising \cite{burger2012image,liu2016learning}. Because a large number of high-quality images can be obtained as training samples, we can easily train a high-quality network model. To recover image from as few pixels as possible in the presence of moderate noise is the goal of our work. We aim to use the distribution of least pixels and the 'imagination' with the GANs to reconstruct the image to the maximal extent. This can be a challenge of image reconstruction, and definitely is of great significance in CT reconstruction, image compression and transmission, and so on. A common problem of GANs network is that it can only handle relatively small images due to network capacity. Therefore, a more stable and faster training method is required for larger images, because the network training may become more difficult to converge when the size of image increases. Furthermore, unfavorable results may occur when dealing with more complex conditions, such as too much information missing in the source images. It seems impossible to recover the image in the severe absence of original information. Under such condition, we still want to obtain a stable result that is consistent with people's perception, both at the coarse level of overview and the fine level with local detail. This puts high demands on our network structure and training methods. The image reconstruction framework addressed in this paper mainly includes the following aspects: Firstly, only a small number of discrete samples are used to reconstruct the original image, also called image interpolation. Unlike Ruohan Gao et al.'s goal to reconstruct 64x64 or 128x128 images with more than 25\% discrete points \cite{gao2017demand}, we try to challenge even harder problem where more than 80\% of a 256x256 image are corrupted. Faced with the problem of restoring a small amount of random discrete points, the predecessors have done many useful explorations, such as the use of nonparametric probabilities, density function estimation methods, and other attempts. Previous papers \cite{gao2017demand,yeh2017semantic} solved the problem to some extent. In order to pursue the use of fewer known discrete points and achieve better and more stable results, we consider using an improved counter-neural network to solve this problem. We re-assembled the network model, combining some of the previous experience. We have chosen some more appropriate network frameworks and modified the network so that our network can restore the original image better. Experimental results show that that neural networks have their own unique advantages in solving such problems. After learning a large number of data samples, we are able to associate the mapping relationship between discrete points and corresponding images. This form of GANs network has also achieved good results on recovering problems using very few discrete points (discrete points less than 20\%). Secondly, in order to further compress the number of known discrete points, we consider that scattering discrete points in a specific area can benefit image restoration. So we use the sobel \cite{sobel2014history} or canndy operator to extract the edge of the image, in order to distribute the discrete points in positions around high gradients. Our experiments discovered that using the Sobel operator to specify images with discrete points can better restore the image at the same percentage of sample points, and restore the details and edges of the image more clearly, which accords with the human's visual system. Finally, we design more complex scenarios to challenge the ability of network training. We try to recover from images with random colored noise (no longer a white or gray noise background) or from images with cluttered blocks in the original image. These extremely complex situations further increase the difficulty of network design and training. Because the network needs to peel off interference information in a large number of color points to find useful point information that constitutes the original image and the image can be restored from it. We can even handle such complex situation that the correct information from the source is less tan 20\%. Our main contributions are as the follows: (1) We propose X-GANs network, which using multi-dimensional loss functions architecture to counteract the problem of missing or obfuscated images and blocks of random discrete points in the network, and achieve better result than before; (2) The loss function is carefully designed for the problem of complex discrete point picture restoration with color noise interference, which improves the network's ability to recover discrete points, even with very little original image information. The image can be reconstructed with high quality; (3) By specifying the distribution of discrete points, the bound of network resilience can be explored. This allows the network to recover images with fewer discrete samples. This method also helps in high-ratio compression and transmission of images or videos. \section{Related Work} Reconstructing missing image parts \cite{pathak2016context, yeh2017semantic, gao2017demand} has long been a focus in the field of image computing. Early approaches mainly use traditional image processing techniques to restore images from different level of degradation. In recent years. as deep neural networks become widely studied, many attempts based on deep neural networks are made to do image restoration. Among these approaches, the performance of generative adversarial network image restoration is particularly impressive. Therefore, GANs have become an attractive solution to solve related problems. \subsection{Image Reconstruction} Image restoration from discrete sampling points is an important reconstruction problem. The noise to be removed is in the form of the same color, or with random arbitrary colors. Both cases can be understood as removing noise of a corrupted image to restore the corresponding real image. We corrupt real images by adding noise drawn from a zero-mean normal distribution with variance s (the noise level). Many related work have been done, such as \cite{gao2017demand, pathak2016context,yeh2017semantic,burger2012image,liu2016learning}, etc. The main difficulty in recovering from discrete point images is when the size of the restored image is too large, or when the number of discrete points is too small, the noise image is difficult to restore back to the ideal effect. Generally, when the image size is larger than 128, the existing network tends to cause problems such as unstable image generation and unclear image detail generation. When the discrete points are less than 25\%, there are often too few discrete points in the image, resulting in the inability to find relationships between them during the training process. It is impossible to extrapolate the relationship between the discrete points in the global perspective. In the case where the discrete points can no longer generate a unique definite image, and when the noise is of random color, the difficulty of using the network to recover the image becomes greater, and the discrete points of the original image will be dispersed in the color noise. Therefore, the network needs a larger receptive field to find useful discrete points and their associated information in the noise, and to assemble it back to the original image. Since the conditional GANs was proposed \cite{mirza2014conditional}, many improved conditional GANs have attempted to solve such problems as image inpainting. However, the training of the network for such problems is generally not easy, because the size and position of the mask patches are usually not fixed. Perhaps it is easier for the network to find the areas to be reconstructed (usually the isolated areas with a pure color), but it is not easy to recover the missing areas in combination with the existing information. Many related works have been done \cite{gao2017demand,pathak2016context,yeh2017semantic}, and left some prevalent problems. On one hand, it is difficult to train ideally for images bigger than 128. On the other hand, the occluded parts of the input image are not easily restored with high quality. An ideal network should not only be able to restore larger-size images, but also be able to retain as much of the occluded parts of the input image as possible. In addition, to the best of our knowledge, the problem of image inpainting is generally to restore the image of a blocked patch of a certain color. We further improved the difficulty of the problem by replacing the solid color patches with random images and then to perform image restoration. \subsection{GANs} GANs is a framework for training generative parametric models \cite{goodfellow2014generative}, and have been shown to produce high quality images \cite{iizuka2017globally, wang2017high, levin2004colorization}. This framework trains two networks with a generator $G$ and a discriminator $D$. $G$ maps a random vector z, sampled from a prior distribution $p_{\rm{z}}$, to the image space while $D$ maps an input image to a likelihood. The purpose of $G$ is to generate realistic images, while $D$ plays an adversarial role, discriminating between the image generated from $G$, and the real image sampled from the data distribution $p$ data . The $G$ and $D$ networks are trained by optimizing the following loss function $V\left ( D,G \right )$: \begin{align} \underset{G}{min}\, \underset{D}{max}\, V\left ( D,G \right )=\mathbb{E}_{{\rm{x}} \sim p_{data} \left ( \rm{x} \right )}\left [ \log D\left ( \rm{x} \right ) \right ]+ \nonumber\\ \mathbb{E}_{{\rm{z}} \sim p_{\rm{z}}\left ( \rm{z} \right )}\left [ \log \left ( 1-D\left ( G\left (\rm{z} \right ) \right ) \right ) \right ], \end{align} where x is the sample from the $p_{data}$ distribution; z is a random encoding on the latent space. With some user interaction, GANs have been applied in interactive image editing \cite{zhu2016generative}. However, GANs can not be applied to the the problem of inpainting directly, because they produce an entirely unrelated image with high probability, unless constrained by previously given corrupted image. \section{X-GANs network} \subsection{Pix2pix Baseline} The pix2pix method \cite{isola2017image} is a conditional GANs framework for image-to-image translation. It consists of a generator and a discriminator. Unlike the normal GANs, the conditional GANs associate the input image with the generated image and input the discriminator together. It allows the network to learn the correlation between the input image and the output image. For our task, the objective of the generator is to translate the discrete point map to realistic-looking images, while the discriminator aims to distinguish real images from the translated ones. The framework operates in a supervised setting. In other words, the training dataset is given as a set of image pairs. For each pair, one image is a discrete point map and the other is the corresponding real photo. Conditional GANs aim to model the conditional distribution of real images given the input discrete point map via a minimax game. \subsection{Architecture} Our network consists of a generator and a multi-scale discriminator with multi-dimensional loss functions. These loss functions include an adversarial loss, a VGG perceptual loss, an adversarial perceptual loss, and a customized corresponding point loss. The target image is obtained by the generator, the input image is then concatenated with the target image and the real image respectively, and the discriminator network is used to calculate adversarial perceptual loss and adversarial loss. After that, the target image and the real image are calculated by the perceptual loss through the VGG network. Then the input image is used to mask the target image, and the result is compared with the input image to calculate the L2 loss value. Finally, several losses are weighted and are back propagated to the generator. \begin{figure} \includegraphics[width=3.2in]{architecture.pdf} \caption{Framework of the our network using GANs. We use a multi-dimensional loss functions architecture to help improve the quality of image reconstruction.} \end{figure} \subsection{Generator} Generator is an important part of the network. Because the image to be reconstructed is generally obtained by the generator, it directly determines the final quality of image reconstruction. It is the main challenge to recover high-quality image with fast training speed and preserve the details of the images. In the selection of generators, we refer to the work by Johnson et. al \cite{johnson2016perceptual}. Because this network has been proven to be effective in the generation of large-scale images. This network is composed of downsampling \cite{long2015fully,noh2015learning}, residual blocks \cite{he2016deep}, and upsampling \cite{long2015fully,noh2015learning}. The use of residual blocks, which refers to the residual learning and batch normalization \cite{ioffe2015batch}, can greatly benefit the CNN learning as it can not only speed up the training but also boost the denoising performance \cite{zhang2017beyond}. So we design the structure of the multiple blocks to link the downsampling modules and the upsampling modules as in \cite{johnson2016perceptual}, and both the downsampling and the upsampling modules use a deconvolution structure without the unpooling module. It has such benefit as the relative low computational cost and the effective receptive field sizes \cite{johnson2016perceptual}, each of which contains two 3x3 convolutional layers. We use three convolution -Batchnorm-ReLu to get smaller size feature map, then use nine residual blocks to capture feature representations. We take the Batchnorm layers and Leaky ReLU after both the convolution operation and the deconvolution layers. The final outputs have been normalized to the interval [-1,1] using the Tanh activation to generate a 256x256 output image. \subsection{Multi-scale Discriminators} GANs are reputably difficult to train. Especially, for the reconstruction of large-scale image with few known discrete points, the stability of GANs should be guaranteed. In order to solve this problem, we refer to the structure in \cite{durugkar2016generative}. We use 3-discriminator extension to the GANs framework that have an identical network structure to process the image. The generator trains using feedback aggregated over multiple discriminators. If $F := max$ , $G$ trains against the best discriminator.High-resolution image synthesis poses a great challenge to the GANs discriminator design \cite{wang2017high}. For random discrete point images (especially when the number of discrete points is small) the network requires a large receptive field. In this way, the network can find the relationship between discrete points that are far away from each other. In order to increase the receptive field of the network, deeper networks or larger convolution kernels are usually needed, but doing so often increases the instability of network training. Based on the above reasons, we use multi-scale discriminators. Multi-scale discriminators have been proved to be able to deal well with large-size image problems in the pix2pixHD network. The discriminators $D1$, $D2$ and $D3$ are then trained to differentiate real and synthesizing images at 3 different scales, respectively. We treat multiple $D$s for images of different sizes so that the network does not need to add more layers, and in the case of a wider convolutional core, the goal of increasing the network receptive field can be achieved. \begin{equation} \underset{G}{min}\underset{D1,D2,D3}{max}\sum_{k=1,2,3}\mathcal{L}_{\rm{GAN}}\left ( G,D_{k} \right ) \end{equation}. \subsection{Loss Functions} \textbf{Adversarial matching loss:} To allow for generators to produce natural statistics at multiple scales discriminator, we add the feature matching loss to the overall loss function \cite{wang2017high}. The feature matching loss is processed similarly to the perceptual loss \cite{johnson2016perceptual,dosovitskiy2016generating,gatys2016image}, which has been shown to be useful for image super-resolution \cite{ledig2016photo} and style transfer \cite{johnson2016perceptual}. Specifically, feature matching loss extracts features from multiple layers of the discriminator, and learns to match these intermediate representations between the real image and the synthesized image. \begin{equation} \mathcal{L}_{\rm{FM}}\left ( G,D_k \right )=\mathbb{E}_{\left ( \rm{s},\rm{x} \right )} \sum_{i=1}^{T} \frac{1}{N_i} \left [ \left \| D_{k}^{\left ( i \right )}\left ( \rm{s},\rm{x} \right )-D_{k}^{\left ( i \right )}\left ( \rm{s},G\left ( \rm{s} \right ) \right ) \right \|_{1} \right ] \end{equation} It denotes the feature value of the i-th layer in the k-th $D$ of the real image, and then subtracts this value from the generated image, and calculates the L1 value. \begin{equation} \underset{G}{min}\left ( \left ( \underset{D1,D2,D3}{max}\sum_{k=1,2,3}\mathcal{L} _{\rm{GAN}}\left (G,D_{k} \right ) \right )+\lambda \sum_{k=1,2,3}\mathcal{L}_{\rm{FM}}\left ( G,D_{k} \right ) \right ) \end{equation} Get the largest $D$ among multiple $D$s and sum them up with feature matching loss, and then figure out the value $G$ when the smallest value is achieved. In other words, let the $G$ have the smallest value. \textbf{VGG perceptual loss:} When comparing GANs generated images with real images, despite their perceptual similarity they are actually very different as measured by per-pixel losses. \cite{johnson2016perceptual} shows that training with a perceptual loss allows the model to reconstruct fine details and edges. So, we use VGG19 as a kind of perceptual loss. The specific approach is to train the generated image and the real image through the VGG network, and take out the results of each dimension to calculate the loss difference \cite{johnson2016perceptual,dosovitskiy2016generating}. The VGG network is a widely used network for region detection. The loss in each layer of the VGG19 represents the details of different properties of the image such as shape, color, texture, etc. The network can learn the image by using various perceptual loss of the VGG network. Multiple dimensions of information make the overall effect of reconstruction more realistic. We define \begin{equation} \lambda \sum_{i=1}^{N}\frac{1}{M_{i}}\left [ \left \| F^{\left ( i \right )}\left ( \rm{x} \right )-F^{\left ( i \right )}\left ( G\left ( \rm{s} \right ) \right ) \right \|_1 \right ] \end{equation} as our objective, where $\lambda$ represents a scale factor, $F^{\left ( i \right )}$ denotes the $i$-th layer with $M_i$ elements of the VGG network, x represents the real image, s represents the input of the generator, and $G\left ( \rm{s} \right )$ denotes the image generated from the generator. \begin{figure} \includegraphics[width=2.9in]{point_loss.pdf} \caption{Illustration of point loss. It is used in the reconstruction of image inpainting or interpolation in a pixel-to-pixel way.} \label{fig:pointloss} \end{figure} \textbf{Corresponding point loss:} Different numbers of discrete points often lead to significantly different qualities of restoration. Fewer discrete points generally make image reconstruction more difficult. On one hand, the fewer the discrete points, the smaller the loss value of L2 becomes. In other words, unsuitable L2 loss may lead to excessive punishment for the images with fewer discrete points; on the other hand, the discrete points from the source image should appear in the corresponding position of the reconstructed image. We hope that the neural network can learn the mapping relationship between the input image and the generated image \cite{isola2017image}. In view of the above reasons, we changed the L2 loss function of GANs from calculating the loss value of the generated image with the target image to computing the L2 loss value between the discrete point x and the generated image with mask $G\left ( \rm{s} \right )$ as follows: \begin{equation} \left \| \mathrm{s}-Mask\left ( G\left ( \rm{s} \right ),\rm{s} \right ) \right \|_{2}^{2}. \end{equation} The workflow of the L2 loss for reconstruction can be seen in Fig. \ref{fig:pointloss}. This can solve the problem of unbalanced punishment, and also solve the problem that the target image does not contain the discrete points of the source image. Through experiments, we find that the use of the new L2 loss function on the basis of the original network is better than without this loss function, and the improvements on PSNR can be observed at each level. Adaptive L2 loss has obvious advantages on image generation where there is a certain correlation between the source image and the target image. \section{Experiment result} In our experiment, two data sets are used to train the network, CelebFaces Attributes(CelebA) \cite{liu2015deep} and SUN397 Scenes \cite{xiao2016sun}. All images are resized to 256x256 resolution. CelebFaces Attributes is a face data set. It tests the network's ability to reconstruct a single type of scene. CelebA contains 10,177 identities, and a total of 202,599 pictures. We train 100,000 pictures and use another 500 for verification. SUN397 Scenes is a complex data set of various scenes. It contains 108,754 images in 397 categories. Similarly, the training network is conducted using 100,000 images and 500 proofs were used. We explore the network's ability to restore images of different scenes through this dataset. When performing random discrete point reconstruction, we create a 256x256 integer matrix with a discrete uniform distribution in the range [0,99], then set the assigned percentage of entries bigger than a threshold to be white. The generation of discrete points in terms of \cite{sobel2014history} is to obtain an edge detection map by employing a Sobel operator. We calculate the probability of occurrence of each point based on this edge detection map, generate a probability map, and finally select the specified point in the original image based on this probability map and the number of discrete points required. The method for generating the color noise is similar to the generation of random discrete point or the salt-pepper noise, except that the found positions are set to random RGB colors. The white block is used to cut a 128x128 square block in the middle region of the CelebA image. The color blocks are generated by randomly tailing 16x16 to 128x128 color blocks from SUN397 and fill in the data generated by the training and validation set of CelebA. We enable corresponding point loss only for reconstruction of discrete point and white block task, while disable it for color discrete points and color block task. We train our networks with a batch size 1 for 100,000 iterations, giving 50 epochs over the training data. We use Adam\cite{kingma2014adam} with a learning rate of 2x$10^{-4}$. We use dropout to train out generator with 0.5 probability of an element to be zeroed. Training takes roughly 6 days on a single Tesla P40 GPU. More experimental results can be found in the supplemental material. \subsection{Recovery from discrete points} \begin{figure} \includegraphics[width=3.4in]{white_one_person_arrow.pdf} \caption{Image reconstruction from varying ratio of discrete samples from 1\% $-$ 20\%. The first row is the discrete samples as the source image, the second row is generated by our method, and the third row is generated by \cite{gao2017demand}. Our method can synthesize better results.} \label{fig:whiteratio} \end{figure} For the image restoration of random discrete points, our experiment mainly focuses on the known discrete points varying from 1\% to 20\%. From Fig. \ref{fig:whiteratio}, we can see that even if only 1\% random discrete points remain, the overall of the image can be restored. When 4\%-6\% of the known discrete points remain, the network can make a good restoration. When the proportion of known discrete points exceeds 10\%, even tiny local details of the image can be recovered. \subsection{Recovery from color-noise} \begin{figure} \includegraphics[width=3.2in]{color_CelebA1.pdf} \caption{Reconstruction of human face from random color noise image from CelebA dataset (valid information varying from 5\%$-$15\%, i.e. color noise varying from 95\%$-$85\%). The first column is the random color noise as the source image, the second column is generated by our method, and the third column is generated by \cite{gao2017demand}. Our method can synthesize better results.} \label{fig:noiserecoveryface} \end{figure} In Fig. \ref{fig:noiserecoveryface}, we demonstrate the recovery from color-noise image of our method in comparison with \cite{gao2017demand}. For the original image containing a large amount of random color noise, our network exhibits good denoising performance. Even when the random color noise accounts for 95\%, we can restore the main content of the image. When the noise drops to 90\%, some details gradually show up. When the noise continues to drop to 85\%, the details of the character's face can be restored very well. \begin{figure} \includegraphics[width=3.2in]{color_SUN_arrow.pdf} \caption{Reconstruction of natural scene from random color noise image from SUN397 dataset (valid information varying from 5\%$-$15\%, i.e. color noise varying from 95\%$-$85\%). The first column is the random color noise as the source image, the second column is generated by our method, and the third column is the ground truth. Our method can synthesize good results.} \label{fig:noiserecoveryscene} \end{figure} In Fig. \ref{fig:noiserecoveryscene}, we also demonstrate the recovery from color-noise image of natural scene by our method. We can see our synthesized results are close to the ground truth. \subsection{Recovery from missing block} \begin{figure} \includegraphics[width=3.3in]{white_block_compare1_word.pdf} \caption{Reconstruction from missing block. Column (a) shows the missing block as the source image, column (b) is generated by our method, column (c) is generated by \cite{gao2017demand}, and column (d) is the ground truth. Our method can synthesize better results.} \label{fig:blockrecovery} \end{figure} In fig. \ref{fig:blockrecovery}, we demonstrate the reconstruction from the missing block. For the missing block in a image (exhibited by white block or constant color block), our method can achieve good inpainting result. The overall of image generated looks harmonious, the character's expression is vivid and can fit closely to the ground truth. The skin color and the pose of the face also match the ground truth well. The illumination of the face is also consistent with the surrounding environment. \subsection{Recovery from cluttered block} \begin{figure} \includegraphics[width=3.4in]{color_block_compare_word.pdf} \caption{Reconstruction from cluttered color block. The first column (a) is the cluttered color block as the source image, column (b) is generated by our method, column (c) is generated by \cite{gao2017demand}, and column (d) is the ground truth. We highlight the better results by our method.} \label{fig:colorblockrecovery} \end{figure} If the missing block is replaced with a cluttered color block, the network not only needs to recover the original information of a image, but also to determine which part of the image should be restored. This increases the difficulty on the network. We highlight our recovery of the image with cluttered block in Fig. \ref{fig:colorblockrecovery}. \subsection{Extension} \label{subsection_feature} \begin{figure}[] \includegraphics[width=3.2in]{white_compare_sobel_arrow_word.pdf} \caption{Various benchmarks for image reconstruction from very sparse sampling. (a) row shows the random sampling of source image and its reconstruction by our method in (b), (c) row shows the real images, (d) row shows the reconstruction from feature-based sampling of original image in (e). } \label{fig:sobelcomparison} \end{figure} Our network can also be extended to handle image compression and transmission. To realize high-ratio image compression, the samples of a image should be as sparse as possible. Our method can rebuild the image and obtain tolerable result from only 1\% sample points of the original image (see Fig. \ref{fig:sobelcomparison}). To improve the quality of reconstruction, we also propose a sampling strategy according to the cue of edges in the image, which can be considered as important features that should be carefully preserved. We show reconstruction results from very sparse source and compare to the real images in Fig. \ref{fig:sobelcomparison}. From this figure, we can see that scattering more sampling points around the edge results in better reconstruction, and is able to recover fine details of the original image. \section{Quantitative Comparisons and Analysis} \begin{table}[] \centering \caption{Comparison of reconstruction quality. Our method always has higher PSNR and SSIM value than Gao et.al \cite{gao2017demand}. } \label{my-label} \begin{tabular}{c|cc|cc} \hline \multirow{2}{*}{} & \multicolumn{2}{c|}{Gao et.al \cite{gao2017demand}} & \multicolumn{2}{c}{Ours} \\ \cline{2-5} & PSNR & SSIM\cite{wang2004image} & PSNR & SSIM\cite{wang2004image} \\ \hline White Block 128x128 & 21.88dB & 0.68 & 24.99dB & 0.85 \\ Color Block 128x128 & 21.83dB & 0.67 & 23.16dB & 0.82 \\ \hline \end{tabular} \label{PSNR} \end{table} \subsection{Quantitative comparison} In Table \ref{PSNR}, we make quantitative comparison with other methods to evaluate the quality of reconstruction with missing white block or cluttered color block(128x128). Image reconstruction is tested on CelebA dataset as the source, and the data of cluttered block come from SUN397 dataset. Our method obtains higher value on both measures of PSNR and SSIM. It implies that our quality of reconstruction is better than the opponent. \begin{figure}[] \includegraphics[width=3.2in]{points_compare.pdf} \caption{Comparisons of reconstruction quality using two different types of datasets: CelebA and SUN397. The reconstruction is conducted using discrete samples and the quality is evaluated using PSNR.} \label{fig:compareplot} \end{figure} The performance of the reconstruction from a discrete point set is shown in Fig. \ref{fig:compareplot}, where the "feature points" represents the extra processing on point distribution as discussed in subsection \ref{subsection_feature}. We can see that the overall quality of reconstruction using CelebA dataset is better than using SUN397. This is because the CelebA is specific for human face while SUN397 is more general on the contrary. The reconstruction using the feature point generally has the best quality when compared to those images restored from the random discrete points or the results from \cite{gao2017demand}. \begin{figure}[] \includegraphics[width=3.2in]{color_noise.pdf} \caption{For the color-noise task, Our network has a distinct advantage over Gao et.al \cite{gao2017demand}'s network in both CelebA and SUN397 datasets.} \label{fig:compareplotcolornoise} \end{figure} We also compare different approaches for the reconstruction quality when dealing with color noise images in Fig. \ref{fig:compareplotcolornoise}. Our method can also obtain good results. \begin{figure}[] \includegraphics[width=3.2in]{L2L1wo_compare.pdf} \caption{By comparing the PSNR values of the images restored at different percentages for each loss function, we find that L2 loss is the best.} \label{fig:compareplotL1L2} \end{figure} For corresponding point loss we compare the strategies with L2 loss, L1 loss, and neither of them. The result in Fig. \ref{fig:compareplotL1L2} shows that L2 loss is the best one among them. \subsection{Analysis} The generalization performance of the GANs model addressed in this paper is still restricted by the types of scene, the noise model, and the size of images. That is, different scenes, noise levels, or image sizes may more or less degrade the performance. We are attempting to use the same random training points as the ones in \cite{gao2017demand} to prevent the trained network from producing common artifacts of deep networks like the checkerboard artifacts. In addition, to achieve the best reduction of small-scale data, discrete sampling points should be scattered in parts of people's attention, such as faces in the image. Saliency maps can also be used for region-of-interests detection, so that the image can be processed further for compression. \subsection{Discussion} \textbf{Stability of generated images:} In the GANs, stability is a problem that cannot be ignored. The use of multi-dimensional loss function design to improve the stability of the generated image is a promising solution. The four losses addressed in this paper, namely, the loss calculated by multi-scale discriminators, the adversarial matching loss, the VGG perceptual loss, and the corresponding point loss, describe different perspectives of an image and complement each other. \textbf{Network structure design:} The input image is of critical importance for a neural network to obtain information. Designing a network that is capable of catch main characteristics of the input image is a good choice. It is out of this consideration that we add corresponding point loss for image recovery. \textbf{Processed image:} In order to improve the network's ability to recover as many data as possible, it is a good idea to provide more relative information to the network. The scheme of using Sobel operation to improve the performance of image recovery may be a practical way of implementation. \section{Conclusion} We present that the conditional GANs based multi-dimensional loss functions network has the ability to solve several branches of image reconstruction, including image restoration, denoising, and inpanting. We show that this framework can restore images with very few known sampling points and obtain good results. We also explore such images with high color noise or cluttered color blocks. Through a certain training network, we can restore the original information in high-noise images. Furthermore, for common image inpanting tasks executed by GANs, we increases the difficulty of training by converting white blocks into cluttered color blocks to explore the network's resilience. Finally, we design a new loss function to help generating more realistic image from badly corrupted images.
\section*{Acknowledgments} The work of C.~Jeon and C.~Studer was supported in part by Xilinx, Inc.~and by the US National Science Foundation (NSF) under grants ECCS-1408006, CCF-1535897, CCF-1652065, CNS-1717559, and ECCS-1824379. The work of K.~Li and J.~R.~Cavallaro was supported in part by Xilinx, Inc.~and by the US NSF under grants ECCS-1408370, CNS-1717218, and CNS-1827940, for the ``PAWR Platform POWDER-RENEW: A Platform for Open Wireless Data-driven Experimental Research with Massive MIMO Capabilities.'' The authors thank T.~Goldstein for discussions on DBP, and we acknowledge the hardware support of the DGX-1 multi-GPU systems at the Nvidia Technology Center (the PSG Cluster). \appendices \input{secc-appendix.tex} \balance \bibliographystyle{IEEEtran} \section{Introduction} \label{sec:intro} \IEEEPARstart{M}{assive} multi-user (MU) multiple-input multiple-output (MIMO) will be a key technology for next-generation wireless systems~\cite{Marzetta10,mimo_overview,ABCHLAZ2014}. By equipping the infrastructure base-stations (BSs) with hundreds or thousands of active antenna elements and serving tens or hundreds of user equipments (UEs) simultaneously and in the same frequency band, massive MU-MIMO promises orders-of-magnitude improvements in spectral efficiency and energy efficiency compared to traditional, small-scale MIMO \cite{HBD11,LETM2014}. \revision{However, the large number of antennas at the BS causes significant challenges when implementing this technology in practice.} One of the most prominent challenges is the excessively high amount of fronthaul data that must be transferred from the radio-frequency (RF) antenna units at the BS antenna array to the baseband processing unit (BBU)~\cite{puglielli2015scalable,li2017decentralized,van2018efficient,jacobsson18c}. For example, the fronthaul data rates (from RF chains to the BBU) exceed $200$\,Gbit/s for a massive MU-MIMO system with $128$ BS antennas, each using two $10$\,bit analog-to-digital converters (for in-phase and quadrature components) operating at $80$\,MS/s sampling rate. Such high data rates not only exceed the bandwidth of existing high-speed interconnect standards, such as the common public radio interface (CPRI) \cite{cpri}, but will also approach the limits of existing chip input/output (I/O) interfaces in terms of bandwidth and power dissipation~\cite{puglielli2016design}. \revision{Furthermore, traditional equalization-based data-detection algorithms that achieve near-optimal spectral efficiency in the MU-MIMO uplink~\cite{HBD11}, such as zero-forcing (ZF) and linear minimum mean-square error (L-MMSE)-based equalization, rely on centralized processing in a single computing fabric, which results in excessively high complexity and power consumption for systems with large antenna arrays~\cite{WYWDCS2014,li2017decentralized}.} \subsection{Decentralized Baseband Processing} In order to mitigate the bandwidth and computing bottlenecks of centralized massive MU-MIMO architectures, existing testbeds either distribute the most critical baseband processing tasks in the frequency domain or use maximum ratio combining (MRC). \revision{Concretely, the testbeds described in~\cite{MVNKWOETL2016,lund,lund2017,YLYFTHZZ2013} parallelize the key baseband processing tasks across the subcarriers of orthogonal frequency-division multiplexing (OFDM)-based systems.} While this approach enables high parallelism, it requires that each frequency cluster obtains data from \emph{all} BS antennas, which alone does not enable one to scale such systems to thousands of antenna elements~\cite{li2017decentralized}. In contrast to frequency parallelization, MRC enables antenna parallelization that divides array into independent clusters~\cite{Marzetta10,SYALMYZ2012}; this approach significantly reduces the interconnect bandwidth between the RF chains and the BBUs. MRC, however, suffers from low spectral efficiency for realistic antenna configurations and high-rate modulation and coding schemes~\cite{HBD11}. Consequently, realizing massive MU-MIMO in practice requires solutions that reduce the interconnect and chip I/O bandwidth as well as the baseband processing complexity per computing fabric, without sacrificing spectral efficiency. Decentralized baseband processing (DBP) has been proposed in~\cite{li2017decentralized} to alleviate the fronthaul and I/O bandwidth bottlenecks, and enables parallel baseband processing across BS antennas on multiple computing fabrics, such as application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), or graphics processing units (GPUs)~\cite{LSCCGS2016,LCSGCS2016}, while achieving high spectral efficiency. The idea of DBP is to partition the BS antenna array into $C$ independent clusters, each associated with local computing fabrics that carry out the necessary RF and baseband processing tasks in a decentralized and parallel fashion. The algorithms proposed in~\cite{li2017decentralized} perform linear equalization and precoding in an iterative manner by exchanging consensus information among the clusters. However, implementation results on a GPU cluster revealed that the transfer latency of such consensus-sharing methods are limiting the achievable throughput. To avoid this drawback, references~\cite{puglielli2015scalable,bertilsson2016scalable,puglielli2016design,jeon2017achievable} recently proposed \emph{feedforward} architectures that minimize the transfer latency. \subsection{Contributions} We propose two distinct {feedforward} architectures for partially decentralized (PD) and fully decentralized (FD) equalization, which mitigate the interconnect, I/O, latency, and computation bottlenecks. For both of these architectures, we investigate the efficacy of MRC, ZF, L-MMSE, and a nonlinear equalization method that builds upon the large-MIMO approximate message passing (LAMA) algorithm~\cite{JGMS2015conf}. Our main contributions can be summarized as follows: \begin{itemize} \item We develop a framework that enables a precise analysis of the post-equalization signal-to-noise-and-interference-ratio (SINR) of decentralized equalization with feedforward architectures in the large-system limit. \item We show that the PD feedforward architecture achieves the same SINR performance as centralized solutions for equalization with MRC, ZF, L-MMSE, and PD-LAMA. \item We show that the FD feedforward architecture is able to provide near-optimal SINR performance, but further reduces the interconnect and I/O bandwidths. \item We analyze optimal antenna partitioning strategies that maximize the SINR for the FD architecture. \item We conduct error-rate simulations for a realistic 3GPP long-term evolution (LTE)-like massive MU-MIMO system that support our theoretical findings. \item We provide reference throughput and latency results for linear and nonlinear equalization in centralized, PD, and FD architectures on a multi-GPU system. \end{itemize} Our results demonstrate that feedforward equalization enables throughputs in the Gb/s regime for massive MU-MIMO systems with hundreds of antenna elements, and incurs no or only a small loss in post-equalization SINR and error-rate performance compared to that of centralized solutions. \subsection{Relevant Prior Art} DBP for massive MI-MIMO systems has been proposed in~\cite{li2017decentralized} together with consensus-sharing equalization and precoding algorithms. Distributed processing across antenna elements is also a critical component of coordinated multipoint (CoMP)~\cite{IDMGFBMTJ2011} and cloud radio access networks (CRANs) \cite{PLZW2015} for multi-cell transmission. While all these architectures and algorithms are able to reduce the raw baseband data rates and mitigate the computation bottlenecks, their performance has not been analyzed and the achievable throughput suffers from high interconnect latency caused by iterative exchange of consensus information. \revision{To avoid iterative consensus sharing among antenna clusters, we focus on decentralized \emph{feedforward} architectures that minimize the transfer latency and enable a precise theoretical performance analysis.} Feedforward architectures for decentralized massive MU-MIMO equalization have been proposed in~\cite{puglielli2015scalable,bertilsson2016scalable,puglielli2016design,jeon2017achievable}. The present paper extends our theoretical results from~\cite{jeon2017achievable} and, in contrast to~\cite{puglielli2015scalable,bertilsson2016scalable,puglielli2016design}, provides two distinct architectures and a corresponding SINR analysis for a range of linear and nonlinear equalization algorithms. In addition, we provide reference implementation results on a GPU cluster to assess the throughput and latency of our architectures and algorithms. The post-equalization SINR performance of \emph{centralized} linear equalization algorithms, such as MRC, ZF, and L-MMSE, has been analyzed in \cite{VS1999,TH1999,SV2001,ghods2017optimally} in the large-system limit. We will investigate the SINR performance of these algorithms for the two proposed decentralized feedforward architectures, and also investigate the efficacy of nonlinear equalization for decentralized massive MU-MIMO architectures. Nonlinear equalization for massive MU-MIMO systems via approximate message passing (AMP) has been studied in \cite{WKNLHG14,JGMS2015conf,JMS2016}. \revision{Message passing has also been used recently for data detection in non-orthogonal multiple access (NOMA) systems~\cite{LYGLH2019}}. A distributed version of AMP has been proposed in~\cite{ZBB2016} for compressive sensing applications \cite{donoho2006,CRT06}. \revision{The key differences of our nonlinear equalization algorithm to these results are as follows: (i) We consider decentralized feedforward architectures; (ii) the methods in~\cite{WKNLHG14,JGMS2015conf,JMS2016,LYGLH2019} are centralized; (iii) the distributed AMP-based method in~\cite{ZBB2016} requires iterative consensus sharing; (iv) we analyze the post-equalization SINR and error-rate performance in massive MU-MIMO systems.} \subsection{Notation} Lowercase and uppercase boldface letters designate vectors and matrices, respectively; uppercase calligraphic letters denote sets. The transpose and Hermitian of the matrix $\bA$ are represented by $\bA^\Tran$ and $\bA^\Herm$, respectively. The $M\times N$ all-zeros matrix is~$\bZero_{M\times N}$ and the \revision{$N$-dimensional} identity matrix is $\bI_N$. The $k$th entry of a vector $\bma$ is $a_k$. We define $\left\langle \bmx \right\rangle = \frac{1}{N}\sum_{k=1}^N x_k$. The circularly-symmetric multivariate complex-valued Gaussian probability density function (pdf) with covariance~$\bK$ is denoted by $\setC\setN(\bZero,\bK)$. $\Exop_X\!\left[\cdot\right]$ and $\Varop_X\!\left[\cdot\right]$ represent the mean and variance with respect to the random variable~$X$, respectively. \subsection{Paper Outline} The rest of the paper is organized as follows. \fref{sec:Decentarch} introduces the system model and the two feedforward architectures. \fref{sec:PDequalization} and \fref{sec:FDequalization} investigate equalization algorithms for the PD and FD architecture, respectively. \fref{sec:Results} provides theoretical and simulative results for the proposed methods. \fref{sec:gpuimplementation} details the multi-GPU implementation and provides throughput and latency results. \fref{sec:conclusions} concludes the paper. All derivations and proofs are relegated to the appendices. \section{Decentralized Equalization Architectures}\label{sec:Decentarch} We start by introducing the considered massive MU-MIMO system model and the basics of equalization-based data detection. We then discuss the two feedforward equalization architectures for DBP depicted in \fref{fig:architectures}, and detail the SINR analysis framework that we will use throughout the paper. \subsection{Uplink System Model and Equalization} We consider a narrowband massive MU-MIMO uplink system in which $U$ single-antenna UEs transmit data to a BS with $\MR$ antenna elements. To model this scenario, we use the standard input-output relation~\cite{Marzetta10} \begin{align} \label{eq:iorelation} \bmy=\bH\bms_0+\bmn. \end{align} Here, $\bmy\in\complexset^\MR$ is the receive vector at the BS, $\bH\in\complexset^{\MR\times\MT}$ represents the MIMO system matrix, which we assume is perfectly known at the BS, $\bms_0\in\setO^\MT$ contains the transmit symbols for each UE, $\setO$ is the constellation set (e.g., QPSK or 16-QAM), and $\bmn\in\complexset^\MR$ is i.i.d.\ circularly symmetric complex Gaussian noise with variance $\No$ per complex entry. We assume an i.i.d. prior $p(\bms_0)=\prod_{u=1}^{\MT} p(s_{0u})$ for the transmit vector and the following distribution for each transmit symbol: \begin{align}\label{eq:prior} p(s_{0u}) = \frac{1}{|\setO|} \sum_{a\in\setO} \delta(s_{0u} -a), \end{align} where $|\setO|$ is the cardinality of the constellation $\setO$ and $\delta(\cdot)$ is the Dirac delta function. In what follows, we assume zero-mean constellations and define the average energy per transmit symbol as $\Es=\Ex{}{|s_{0u}|^2}$, $u=1,\ldots,U$. Equalization is concerned with forming an estimate $\bmz$ of the transmit signal vector $\bms_0$ along with reliability estimates for each entry in $\bmz$. \revision{These two quantities are then used by the data detector to compute hard-output estimates for the transmit symbols or bit-wise soft information in the form of log-likelihood ratios~\cite{paulraj03,studer2011asic}. } Consider a general \emph{centralized} equalizer $\{\bmz,\boldsymbol\sigma^2\} = \setE(\bmy,\bH)$ that takes the received vector~$\bmy$ and the MIMO channel matrix~$\bH$ in order to compute (i) an estimate~$\bmz$ for the true transmit vector~$\bms_0$ and (ii) the associated error variance vector $\boldsymbol\sigma^2$. The error variance vector characterizes the post-equalization residual interference and noise variance on each entry of the estimate~$\bmz$. Mathematically, this quantity corresponds to the variances of each entry in the residual interference and noise vector defined as $\bme=\bmz-\bms_0$, i.e., $\boldsymbol\sigma^2 = \Ex{}{|\bme|^2}$ where $|\cdot|^2$ operates element-wise on vectors. The literature describes a range of linear and nonlinear equalization algorithms for small-scale and massive MU-MIMO data detection \cite{WYWDCS2014,wu2016efficient,JGMS2015conf,pan2014mimo}. Linear methods, such as MRC, ZF, and L-MMSE are among the most common algorithms, mainly due to their simplicity and low computational complexity \cite{WYWDCS2014}. \revision{Nevertheless, nonlinear equalizers, such as the LAMA algorithm put forward in \cite{JGMS2015conf}, have been shown to (often significantly) outperform linear equalizers at the cost of higher computational complexity \cite{GV2005,JGMS2015conf,JMS2016}.} \subsection{Basics of Decentralized Equalization} As in \cite{li2017decentralized}, we partition the $\MR$ BS antenna elements into $C\in\{1,2,\ldots,B\}$ independent \emph{antenna clusters}. The $c$th antenna cluster is associated with $\MR_c=w_c\MR$ BS antennas so that $w_c\in[0,1]$ and $\sum_{c=1}^{\C}w_c =1$. Each cluster contains local RF components and only requires access to local channel state information~(CSI) acquired in a local channel estimation (CHEST) unit. Without loss of generality, we partition the receive vector $\bmy=[\bmy_1^\Tran,\ldots,\bmy_\C^\Tran]^\Tran$, the channel matrix $\bH = [\bH_1^\Tran,\ldots,\bH_\C^\Tran]^\Tran$, and the noise vector $\bmn=[\bmn_1^\Tran,\ldots,\bmn_\C^\Tran]^\Tran$ in~\fref{eq:iorelation}. For this antenna partitioning scheme, the input-output relation corresponding to the local receive vector~$\bmy_c$ associated with the $c$th cluster can be written as \begin{align} \label{eq:perclusterInOutrelation} \bmy_c=\bH_c\bms_{0}+\bmn_c, \quad c=1,\ldots,C, \end{align} with $\bmy_c\in\complexset^{\MR_c}$, $\bH_c\in\complexset^{\MR_c\times\MT}$, and $\bmn_c\in\complexset^{\MR_c}$. The following subsections describe two decentralized equalization architectures that compute estimates for the transmit vector~$\bms_{0}$ by performing local computations in each antenna cluster using only information of the local receive vector $\bmy_c$ and channel matrix $\bH_c$ followed by fusion of the results from all clusters. \subsection{Partially Decentralized (PD) Equalization Architecture}\label{sec:Decentarch_CE} The partially decentralized (PD) equalization architecture is illustrated in \fref{fig:pda}. First, each cluster~$c=1,\ldots,C$ independently (and in parallel) preprocesses the local receive vector~$\bmy_c$ and channel matrix~$\bH_c$ by computing the $U$-dimensional local MRC vector $\bmymrc_c = \bH_c^\Herm\bmy_c$ and the $U\times U$ local Gram matrix $\bG_c=\bH_c^\Herm \bH_c$. Second, a \emph{feedforward} adder tree, indicated with the symbol $\oplus$ in \fref{fig:pda}, is used to compute the complete MRC vector and Gram matrix as follows: \begin{align} \label{eq:fullMRC} \bmymrc=\sum_{c=1}^C\bmymrc_c \quad \text{and} \quad \bG=\sum_{c=1}^\C \bG_c. \end{align} Third, we perform linear or nonlinear equalization in a centralized unit that computes the estimate $\bmz\in\complexset^\MT$ and the post-equalization error variance vector $\boldsymbol\sigma^2\in\complexset^\MT$. The tuple $\{\bmz,\boldsymbol\sigma^2\}$ is then used to compute hard- or soft-output estimates. In \fref{sec:PDequalization}, we will detail MRC, ZF, L-MMSE equalization, and a new LAMA-based equalization algorithm~\cite{JGMS2015conf} for the PD architecture, all of which directly operate on the $U$-dimensional fused MRC vector $\bmymrc$ and Gram matrix $\bG$. Since the MRC vector is a sufficient statistic for the transmit signal $\bms_0$~\cite{paulraj03}, we will show that the PD equalization does not incur an SINR performance loss compared to centralized MRC, ZF, L-MMSE, and LAMA equalizers. \subsection{Fully Decentralized (FD) Equalization Architecture}\label{sec:decent_fda} The PD{} architecture requires a summation of both the local MRC vectors and the local Gram matrices, which involves potentially large amounts of data to be transmitted to the central equalization unit, especially in channels with short coherence time. The fully decentralized (FD) equalization architecture illustrated in \fref{fig:fda} avoids the transmission of the local Gram matrices altogether at the cost of a (typically small) performance loss. First, each cluster $c=1,\ldots,C$ independently (and in parallel) performs CHEST, preprocessing, \emph{and} equalization, i.e., directly forms a local estimate $\bmz_c\in\complexset^\MT$ and local post-equalization error variance vector $\boldsymbol\sigma_c^2\in\complexset^\MT$. Second, a feedforward fusion tree, indicated with the symbol~$\bullet$ in \fref{fig:fda}, optimally combines the local estimates~$\bmz_c$ using information from the error variance vectors $\boldsymbol\sigma_c^2$ in order to generate the final output tuple $\{\bmz,\boldsymbol\sigma^2\}$. In \fref{sec:FDequalization}, we will detail the optimal fusion rule as well as MRC, ZF, L-MMSE, and LAMA-based equalization for the FD architecture. We will also provide an SINR performance analysis in the large-system limit. \subsection{Signal-to-Interference-and-Noise-Ratio (SINR) Analysis} \label{sec:SINRanalysis} To analyze the performance of linear and nonlinear equalization algorithms for the PD and FD architectures, we will focus on the large-system limit and Rayleigh-fading channels. Hence, we will make frequent use of the following two definitions. \begin{defi}[Large-system limit] The \emph{large-system limit} is defined by fixing the \emph{system ratio} $\beta=\MT/\MR$ and $\MT,\MR\to\infty$. \end{defi} \begin{defi}[Rayleigh fading] A MIMO channel is \emph{Rayleigh fading} if the channel matrix $\bH$ has i.i.d.\ circularly symmetric complex Gaussian entries with variance $1/\MR$ per entry. \end{defi} By considering the large-system limit and Rayleigh-fading channels, Tse and Hanly have shown in~\cite{TH1999} that linear equalizers, such as MRC, ZF, and L-MMSE, \emph{decouple} MIMO systems into parallel and independent additive white Gaussian noise (AWGN) channels. This means that the estimate $\bmz$ of such linear equalizers can be modeled on a per-UE basis in a statistically equivalent manner as follows: \begin{align} \label{eq:decoupling} z_u = s_{0u} + e_u, \quad u=1,\ldots,U, \end{align} where $e_u\in\complexset$ represents residual interference and noise. Furthermore, the quantity $e_u$ turns out to be (i) statistically independent of $s_{0u}$ and (ii) circularly symmetric complex Gaussian with \emph{decoupled noise variance} $\sigma^2$, which does not depend on the UE index~$u$. This result also implies that all entries of the error variance vector $\boldsymbol\sigma^2$ correspond to $\sigma^2$. In \fref{sec:PDequalization} and \fref{sec:FDequalization} for the PD and FD architecture, respectively, we will build upon this asymptotic analysis framework in order to theoretically characterize the per-UE post-equalization SINR of the decoupled system~\fref{eq:decoupling}: \begin{align} \label{eq:SINRdefinition} \SINR \define \frac{\Es}{\sigma^2}. \end{align} Numerical results that validate our asymptotic analysis in finite-dimensional systems will be presented in \fref{sec:Results}. \section{Partially Decentralized (PD) Equalization} \label{sec:PDequalization} We start by reviewing linear equalization algorithms for the PD architecture depicted in \fref{fig:pda}, and adapt the well-known Tse-Hanly equations~\cite{TH1999} to analyze the associated post-equalization SINR performance in the large-system limit. We then present a new, nonlinear equalization algorithm that builds upon LAMA proposed in~\cite{JGMS2015conf}, and we develop a corresponding SINR performance analysis for the PD architecture. \subsection{Linear Equalization Algorithms for the PD{} Architecture} Since the MRC output $\bmymrc$ in \fref{eq:fullMRC} is a sufficient statistic for the transmit signal vector $\bms_0$, a variety of optimal and suboptimal equalization-based data detection algorithms can be derived from this quantity~\cite{paulraj03}. For MRC-based equalization in the PD architecture, we use~\fref{eq:fullMRC} to form the estimate \begin{align*} \bmz^\text{MRC} = \mathrm{diag}(\bG)^{-1}\bmymrc, \end{align*} where the diagonal matrix $\mathrm{diag}(\bG)^{-1}$ is computed in the centralized equalization unit; see~\fref{fig:pda}. The MRC estimate~$\bmz^\text{MRC}$ can then be used to perform either hard- or soft-output data detection. For soft-output data detection, one requires the error variance vector given by \begin{align*} \boldsymbol\sigma_\text{MRC}^2 =\,\,& \mathrm{diag} \big(\mathrm{diag}(\bG)^{-1}\bG \mathrm{diag}(\bG)^{-\Herm}\No \\ & + \left(\mathrm{diag}(\bG)^{-1}\bG-\bI_U\right)\!\left(\mathrm{diag}(\bG)^{-1}\bG-\bI_U\right)^\Herm\!\Es \big) \end{align*} that contains the post-equalization SINR for each entry of~$\bmz^\text{MRC}$. Note that MRC-based equalization was shown to be optimal (i) for a fixed number of UEs and infinitely many BS antennas~\cite{Marzetta10}, which is equivalent to $\beta\to0$ in the large-system limit, or (ii) in the low-SNR regime~\cite{TH1999}. The estimate of the ZF equalizer for the PD architecture is given by \begin{align*} \bmz^\text{ZF} = \bG^{-1}\bmymrc, \end{align*} where the matrix $ \bG^{-1}$ is computed in the centralized equalization unit. The associated error variance vector is given by \begin{align*} \boldsymbol\sigma_\text{ZF}^2 = \mathrm{diag}(\bG^{-1})\No. \end{align*} For L-MMSE equalization, we have \begin{align*} \bmz^\text{L-MMSE} = (\bG+\rho\bI_U)^{-1}\bmymrc. \end{align*} where the matrix $(\bG+\rho\bI_U)^{-1}$ is computed in the centralized equalization unit. The L-MMSE regularization parameter is set to $\rho=\No/\Es$ for complex-valued constellations (e.g., QPSK or 16-QAM). The associated error variance vector is given by \begin{align*} & \boldsymbol\sigma_\text{L-MMSE}^2 = \mathrm{diag} \big( (\bG+\rho\bI_U)^{-1}\bG(\bG+\rho\bI_U)^{-\Herm}\No \\ & \quad + \left((\bG+\rho\bI_U)^{-1}\bG-\bI_U\right)\!\left((\bG+\rho\bI_U)^{-1}\bG-\bI_U\right)^\Herm\!\Es \big)\!. \end{align*} We reiterate that the MRC, ZF, and L-MMSE equalizers for the PD architecture deliver exactly the \emph{same estimates} as their centralized counterparts---the only difference is the way the involved quantities are computed. As shown in~\cite{TH1999} and outlined in \fref{sec:SINRanalysis}, centralized MRC, ZF, and L-MMSE equalizers decouple MIMO systems in the large-system limit and for Rayleigh fading channels; this implies that the entries of the error variance vectors~$\boldsymbol\sigma_\text{MRC}^2$, $\boldsymbol\sigma_\text{ZF}^2$, and $\boldsymbol\sigma_\text{L-MMSE}^2$ converge to the decoupled noise variance~$\sigma^2$ of the MRC, ZF, and L-MMSE equalizer, respectively. Since linear equalizers in the PD architecture yield exactly the same estimates as in a centralized architecture, we can directly characterize the associated decoupled noise variance~$\sigma_\text{PD}^2$ in the PD architecture using the following result. \begin{thm}[\kern-0.33em\mbox{\cite[Thm.~3.1]{TH1999}}] \label{thm:THeq} Fix the system ratio $\beta=\MT/\MR$, and assume the large-system limit and Rayleigh fading channels. Then, the decoupled noise variance $\sigma_{\text{PD}}^2$ for MRC, ZF, and L-MMSE equalization in a centralized or PD architecture, is the solution to the following fixed-point equation \begin{align} \label{eq:fixedpointequation} \sigma_{\text{PD}}^2 = \No + \beta\Psi(\sigma_{\text{PD}}^2), \end{align} where the MSE function $\Psi(\sigma^2)$ is given by \begin{align*} \Psi(\sigma^2) &= \Es, \tag{MRC}\\ \Psi(\sigma^2) &= \sigma^2, \text{ for } \beta<1,\tag{ZF} \\ \Psi(\sigma^2) & = \frac{\Es}{\Es+\sigma^2}\sigma^2, \tag{L-MMSE} \end{align*} for MRC, ZF, and L-MMSE equalization, respectively. \end{thm} \revision{We note that the expression for the ZF equalizer only holds for \mbox{$\beta<1$}, whereas the expressions for MRC and L-MMSE hold for general system ratios~$\beta\geq0$.\footnote{The asymptotic SINR performance of ZF equalization via the Moore-Penrose pseudo inverse when~$\beta \geq1$ was analyzed in \cite{EC2003}.}} From \fref{thm:THeq}, we obtain closed-form expressions for the post-equalization \SINR in \fref{eq:SINRdefinition} for MRC, ZF, and L-MMSE equalization in the PD architecture. \begin{cor}\label{cor:sinr_PD} Assume that the conditions of \fref{thm:THeq} hold. Then, the post-equalization \SINR for MRC, ZF, and L-MMSE equalization in the PD architecture are given by \begin{align*} \SINR^\textnormal{MRC}_\textnormal{PD} = \,& \frac{\Es/\No}{1+\beta\Es/\No}, \tag{MRC}\\ \SINR^\textnormal{ZF}_\textnormal{PD} = \,& \frac{\Es}{\No}(1-\beta), \text{ for } \beta<1, \tag{ZF}\\ \SINR^\textnormal{L-MMSE}_\textnormal{PD} = \,& \frac{1}{2} \Bigg( \sqrt{ \left(1 - \frac{\Es}{\No}(1-\beta)\right)^{\!\!2} + 4\frac{\Es}{\No}} \\ &- \Big(1 - \frac{\Es}{\No}(1-\beta)\Big)\! \Bigg). \tag{L-MMSE} \end{align*} \end{cor} We note that in the massive MU-MIMO regime, which corresponds to $\beta\to0$, all post-equalization SINR expressions converge to $\Es/\No$, which confirms the well-known fact that MRC is optimal in this regime~\cite{Marzetta10}. It can also be shown that $\SINR^\textnormal{L-MMSE}_\textnormal{PD}$ bounds $\SINR^\textnormal{MRC}_\textnormal{PD}$ and $\SINR^\textnormal{ZF}_\textnormal{PD}$ from above for all system ratios and in all SNR regimes. Hence, L-MMSE equalization is often the preferred choice in realistic massive MU-MIMO systems~\cite{HBD11,WYWDCS2014}. We reiterate that the SINR expressions listed in \fref{cor:sinr_PD} are also valid for centralized architectures. \subsection{LAMA for the PD{} Architecture}\label{sec:LAMA_alg} The LAMA algorithm developed in \cite{JGMS2015conf} is a nonlinear equalizer is able to achieve individually-optimal performance in the large-system limit given certain conditions on the antenna ratio $\beta$ and the noise variance $\No$ are satisfied. LAMA operates directly on the input-output relation in \fref{eq:iorelation} and is, hence, designed for centralized processing. We now develop a novel variant of LAMA that directly operates on the complete MRC output~$\bmymrc$ and the Gram matrix $\bG$ in \fref{eq:fullMRC} to enables its use in the PD architecture. Since the antenna configuration in massive MU-MIMO systems typically satisfies~\mbox{$\MT\ll\MR$}, the LAMA-PD{} algorithm operates on a lower dimension which reduces complexity while delivering exactly the same estimates as the original LAMA algorithm. We note that LAMA was derived in the large-system limit and for Rayleigh fading channels~\cite{DMM10a}, but these assumptions are not required in practice. We next summarize the LAMA-PD algorithm; the derivation can be found in \fref{app:LAMAPD_derivation}. \newtheorem{alg}{Algorithm} \begin{alg}[LAMA-PD] Initialize $s_\ell=\Exop_S[S]$ for $\ell=1,\ldots,\MT$, $\phi^{(1)} = \Varop_S[S]$, and $\bmv^{(1)}=\mathbf{0}_{\MR\times0}$. Then, for every iteration $t=1,2,\ldots,T_\text{max}$, compute the following steps:\label{alg:lamanew} \begin{align} \label{eq:LAMA_Gaussian} \bmz^t &= \bmymrc + (\bI - \bG)\bms^t + \bmv^t \\ \nonumber\bms^{t+1} &= \mathsf{F}(\bmz^t, \No+\beta\phi^t)\\ \nonumber\phi^{t+1} &= \langle\mathsf{G}(\bmz^t, \No+\beta\phi^t)\rangle\\ \nonumber\bmv^{t+1} &= \frac{\beta\phi^{t+1}}{\No+\beta\phi^t }(\bmz^t-\bms^t). \end{align} The functions $\mathsf{F}(s_\ell,\tau)$ and $\mathsf{G}(s_\ell,\tau)$ are the message mean and variance, respectively, operate element-wise on vectors, and are computed as follows: \begin{align}\label{eq:F} \mathsf{F}(z_\ell,\tau) &= \int_{s_\ell} s_\ell f(s_\ell \vert \hat{z}_\ell) \dd s_\ell\\\nonumber \mathsf{G}(z_\ell,\tau) &= \int_{s_\ell} \abs{s_\ell}^2 f(s_\ell \vert \hat{z}_\ell) \dd s_\ell - \abs{\mathsf{F}(z_\ell,\tau)}^2\!. \end{align} Here, $f(s\vert {z})$ is the posterior pdf $f(s\vert z) = \frac{1}{Z}p( z \vert s)p(s)$ with $p( z\vert s)\sim \setC\setN(s,\tau)$, $p(s)$ is given in~\fref{eq:prior}, and $Z$ is a normalization constant. The estimates and error variances of LAMA are $\bmz^t$ and $\sigma^2_{t,\textnormal{LAMA}} = \No+\beta\phi^t$, respectively. \label{alg:LAMA_alg} \end{alg} In order to analyze the post-equalization SINR of LAMA-PD{}, it is key to realize that the equalization output~$\bmz^{t}$ is equivalent to that of the original centralized LAMA algorithm in \cite{JGMS2015conf}. As shown in \cite{JGMS2015conf}, LAMA (and hence LAMA-PD) decouples the MIMO system into parallel AWGN channels. More specifically, the equalizer output \fref{eq:LAMA_Gaussian} of LAMA can be modeled as in \fref{eq:decoupling}, where the decoupled noise variance $\sigma_{t}^2$ at iteration $t$ can be tracked using the state evolution (SE) framework in the large-system limit and for Rayleigh fading channels. The following result, with proof in~\cite{BM2011}, summarizes this SE framework. \begin{thm}[\kern-0.33em\mbox{\cite[Thm. 1]{JGMS2015conf}}] Fix the system ratio $\beta=\MT/\MR$ and the signal prior \fref{eq:prior}. Assume the large-system limit and Rayleigh fading channels. Then, the decoupled noise variance~$\sigma_t^2$ of LAMA and LAMA-PD at iteration $t$ is given by the recursion: \label{thm:SE} \begin{align}\label{eq:SE_recursion} \sigma_t^2 = \No + \beta\Psi(\sigma_{t-1}^2). \end{align} Here, the MSE function is given by \begin{align}\label{eq:SE_MSEpsi} \Psi(\sigma_{t-1}^2)=\Exop_{S,Z} \!\Big[ \abs{ \mathsf{F}(S+\sigma_{t-1}Z,\sigma_{t-1}^2) - S }^2 \Big], \end{align} where the function $\mathsf{F}$ is given in \fref{eq:F}, $S\sim p(s)$ as in \fref{eq:prior}, $Z\sim\setC\setN(0,1)$, and $\sigma_1^2$ is initialized by $\sigma_1^2=\No+\beta\Es$. \end{thm} For $t\to\infty$, the SE recursion in \fref{eq:SE_recursion} converges to the same fixed-point equation of linear equalizers in \fref{eq:fixedpointequation}, where the only difference is the MSE function \fref{eq:SE_MSEpsi}. If there are multiple fixed points, then we select the largest $\sigma_{\text{PD}}^2$, which is, in general, a sub-optimal solution.\footnote{See \cite{GV2005} for more details on the existence of multiple fixed-points and on conditions for which LAMA achieves individually optimal performance.} As for linear equalizers, we can use the fixed-point equation in \fref{eq:fixedpointequation} to analyze the post-equalization SINR performance of LAMA and LAMA-PD. Unfortunately, there are no closed-form expressions known for the decoupled noise variance or the SINR for LAMA and LAMA-PD with discrete constellations, due to the specific form of the MSE function~\fref{eq:SE_MSEpsi}. Nevertheless, we can numerically compute~\fref{eq:SE_MSEpsi} and, hence, analyze the SINR. A corresponding SINR comparison with linear equalizers is given in \fref{sec:Results}. \section{Fully Decentralized (FD) Equalization} \label{sec:FDequalization} We next discuss optimal fusion for linear and nonlinear equalization in the PD architecture as depicted in \fref{fig:fda}. We then analyze the post-equalization SINR of the proposed equalizers depending on the antenna cluster allocation strategy. \subsection{Optimal Fusion for the FD{} Architecture}\label{sec:FDA_algo} As detailed in \fref{sec:decent_fda}, each cluster $c=1,\ldots,C$ in the FD{} architecture independently computes a local estimate~$\bmz_c$ and associated error variance vector~$\boldsymbol\sigma_c^2$. Then, the vectors~$\bmz_c$ and~$\boldsymbol\sigma_c^2$ for $c=1,\ldots,C$ are fused to compute the final output tuple~$\{\bmz,\boldsymbol\sigma^2\}$. Since in the large-system limit and for Rayleigh fading channels, the considered equalizers decouple MIMO systems into parallel and independent AWGN channels (see \fref{sec:SINRanalysis}), we focus on \emph{linear} fusion of the local estimates, indicated with $\bullet$ in \fref{fig:fda}. Specifically, the proposed FD architecture computes the fused estimate $\bmz$ by combining the local estimates for each UE as follows: \begin{align} \label{eq:fusionrule} z_u = \sum_{c=1}^C\nu_{c,u} z_{c,u}, \quad u=1,\ldots,U. \end{align} Here, $z_{c,u}$ is the local estimate for UE $u$ at cluster $c$ and the weights $\nu_{c,u}$, $u=1,\ldots,U$, depend on the per-cluster error variance vector~$\boldsymbol\sigma_c^2$. In what follows, we are interested in the optimal set of weights for the following criterion. \begin{defi}[Optimal fusion] \label{def:optfusion} Optimal fusion for the FD architecture maximizes the per-UE post-equalization SINR of the final estimate $z_{u}$ obtained from \fref{eq:fusionrule} while $\sum_{c=1}^C\nu_{c,u}=1$. \end{defi} In other words, optimal fusion defines a set of weights $\nu_{c,u}$, $c=1,\ldots,C$, $u=1,\ldots,U$, so that the decoupled noise variances contained in~$\boldsymbol\sigma^2$ associated with the fused estimate~$\bmz$ are minimized. The following result summarizes the optimal fusion rule; a short proof is given in \fref{app:optimal_fusion}. \begin{lem} \label{lem:optimal_fusion} Let $\sigma^2_{c,u}$, $c=1,\ldots,C$, $u=1,\ldots,U$, be a set of given error variances for UE $u$ and cluster $c$. Assume that the residual interference and noise terms are zero mean and uncorrelated among the clusters. Then, the weights that yield optimal fusion according to \fref{def:optfusion} are given by \begin{align} \nu_{c,u} = \frac{1}{\sigma_{c,u}^2} \Bigg(\sum_{c'=1}^C \frac{1}{\sigma_{c',u}^2} \Bigg)^{\!\!-1}, \label{eq:opt_fusion} \end{align} for $c=1,\ldots,C$ and $u=1,\ldots,U$. \end{lem} \subsection{SINR Analysis of Optimal Fusion in the FD Architecture} We are now interested in analyzing the post-fusion SINR for the FD architecture in the large-system limit. The following theorem analyzes the decoupled noise variance $\sigma^2_c$ for each cluster $c=1,\ldots,C$; the proof is given in \fref{app:SE_FP_Decentralized}. \begin{lem} \label{lem:SE_FP_Decentralized} Assume MRC, ZF, L-MMSE, or LAMA equalization in each cluster $c=1,\ldots,C$. Consider the large-system limit and Rayleigh fading channels. Then, the input-output relation of each cluster is decoupled into parallel channels of the form~\fref{eq:decoupling} with decoupled noise variance~$\sigma_c^2$ given by a solution to the following fixed-point equation: \begin{align*} w_c\sigma_c^2 = \No + \beta\Psi(\sigma_c^2). \end{align*} Here, $\Psi(\sigma_c^2)$ is the MSE function of the equalizer in cluster $c$. \end{lem} This result shows that the per-UE error variances $\sigma^2_{c,u}$ will become independent of the UE index~$u$ in the large-antenna limit and for Rayleigh-fading channels. Furthermore, the decoupled noise variances $\sigma_c^2$ depend on the fraction $w_c$ of BS antennas associated with cluster~$c$. The following result establishes the post-fusion SINR in the FD architecture; a short proof is given in \fref{app:postfusionvariance}. \begin{thm} \label{thm:postfusionvariance} Let the assumptions of \fref{lem:SE_FP_Decentralized} hold and $\sigma^2_{c}$, $c=1,\ldots,C$, be the per-cluster decoupled noise variances. Then, the decoupled noise variance $\sigma^2_\text{FD}$ of the fused estimate in \fref{eq:fusionrule} of the FD architecture is given by \begin{align}\label{eq:sigma_FD} \sigma^2_\text{FD} &= \left(\sum_{c=1}^{\C} \frac{1}{\sigma_c^2}\right)^{\!\!-1} \!=\No + \beta \sum_{c=1}^{\C} \nu_c \Psi(\sigma_c^2). \end{align} \end{thm} We note that this result implies that the post-fusion SINR with optimal fusion according to \fref{def:optfusion}, denoted by $\SINR_\textnormal{FD}$, corresponds to the sum of the per-cluster SINR values. Finally, we have the following intuitive result which implies that for a given equalizer, the FD{} architecture cannot outperform the PD{} architecture; the proof is given in \fref{app:LAMA_Arch2_Arch1}. \begin{lem} Let $\No>0$ and assume the large-system limit and Rayleigh-fading channels. Then, the output SINR for the FD{} and PD{} architectures satisfy \mbox{$\SINR_\textnormal{FD} \leq \SINR_\textnormal{PD}$}. Equality holds for $\beta \to 0$, $C=1$, or if MRC-based equalization is used.\label{lem:LAMA_Arch2_Arch1} \end{lem} \subsection{Antenna Partitioning Strategies for Linear Equalizers} We now analyze the post-fusion SINR performance of linear algorithms for the FD architecture, depending on the antenna allocation strategy, i.e., on the fraction of antennas $w_c$ used per cluster $c$. For the following analysis, we assume the large-system limit and Rayleigh fading channels. For MRC with the FD architecture, the post-fusion SINR is equivalent to that of the PD architecture (and that of centralized processing), as shown in \fref{lem:LAMA_Arch2_Arch1}. Hence, the antenna partitioning strategy does not affect the SINR performance. For ZF equalization in the FD architecture, we have the following result; the proof is given in \fref{app:ZF_same}. \begin{lem}\label{lem:ZF_same} Assume that the $B$ BS antennas are divided into~$C$ clusters so that $w_c \geq \beta$ holds for $c=1,\ldots,C$. Then, the post-fusion SINR for ZF equalization is given by \begin{align}\label{eq:ZF_same} \SINR_\textnormal{FD}^\textnormal{ZF} = \frac{\Es}{\No}(1 - C \beta). \end{align} \end{lem} Interestingly, we observe that the post-fusion SINR $\SINR_\textnormal{FD}^\textnormal{ZF} $ does not depend on the antenna allocation strategy; this implies that the per-cluster antenna fraction $w_c$ can be chosen arbitrarily as long as $w_c \geq \beta$ for $c=1,\ldots,C$.\footnote{The condition $w_c \geq \beta$ implies that $\sum_{c=1}^C w_c = 1 \geq C\beta$ so the SINR expression in \fref{lem:ZF_same} is well-defined.} Note, however, that equally-sized clusters are desirable in practice as they may minimize the interconnect or chip I/O bandwidth as well as the computational complexity per computing fabric. For L-MMSE equalization in the FD architecture, we have the following result; the proof is given in \fref{app:LMMSE_equalization}. \begin{lem}\label{lem:LMMSE_equalization} Assume that the $B$ BS antennas are divided into~$C$ clusters so that $\sum_{c=1}^Cw_c= 1$ holds with $w_c\geq 0$ for $c=1,\ldots,C$. Then, the post-fusion SINR of the L-MMSE equalizer is given by \begin{align} \SINR_\textnormal{FD}^\textnormal{L-MMSE} =\,& \notag \frac{1}{2}\sum_{c=1}^C \sqrt{ \left(1 - \frac{\Es}{\No}(w_c-\beta)\right)^{\!\!2} + 4\frac{\Es}{\No}w_c} \\ &- \frac{1}{2}\left(C - \frac{\Es}{\No}(1-C\beta)\right)\! \label{eq:LMMSE_equalization} \end{align} \end{lem} We see from \fref{lem:LMMSE_equalization} that the post-fusion SINR expression for L-MMSE equalization depends on the antenna allocation strategy, i.e., on the weights $w_c$, which is in contrast to ZF equalization (cf.~\fref{lem:ZF_same}). In addition, L-MMSE equalization does not require the restriction $w_c \geq \beta$ for ZF-equalization as the post-fusion SINR expression holds even for underdetermined systems~\cite{TH1999}. Hence, it is natural to ask what the optimal cluster allocation strategy is. The following result is rather disappointing; the proof is given in \fref{app:LMMSE_upper}. \begin{lem}\label{lem:LMMSE_upper} The cluster allocation strategy that maximizes the post-fusion SINR for the L-MMSE equalizer $\SINR_\textnormal{FD}^\textnormal{L-MMSE}$ is $w_c=1$ for some $c$ and $w_{c'}=0$ for $c'\neq c$. \end{lem} Clearly, without any systematic requirements on the cluster ratios $w_c$, $c=1,\ldots,C$, besides $w_c\geq0$, maximizing $\SINR_\textnormal{FD}^\textnormal{L-MMSE}$ so that $\sum_{c=1}^C w_c =1$ corresponds to a centralized architecture, i.e., all antennas should be allocated to a single cluster. Since the key idea of DBP was to mitigate interconnect and I/O bandwidth as well as computation bottlenecks, such an optimal allocation strategy is undesirable in practice. \revision{We next show that the most desirable (from a practical viewpoint) cluster allocation strategy, i.e., one for which all clusters have an equal number of antennas, yields the worst post-fusion SINR; the proof is given in \fref{app:LMMSE_uniform}.} \begin{lem}\label{lem:LMMSE_uniform} Assume that the $B$ BS antennas are divided into~$C$ clusters so that $\sum_{c=1}^Cw_c= 1$ with $w_c\geq 0$, $c=1,\ldots,C$. Then, we have the following lower bound on the post-fusion SINR: \begin{align} \SINR_\textnormal{FD}^\textnormal{L-MMSE} \geq \, & \notag \frac{1}{2} \sqrt{ \left(1 - \frac{\Es}{\No}(1-C\beta)\right)^{\!\!2} + 4\frac{\Es}{\No}C} \\ &- \frac{1}{2}\left(C - \frac{\Es}{\No}(1-C\beta)\right)\!. \label{eq:LMMSE_lower} \end{align} Furthermore, the lower bound is achieved with equality if the antennas are distributed uniformly across all clusters, i.e., where $w_c = 1/C$ for $c=1,\ldots,C$. \end{lem} We conclude by noting that even though uniform cluster sizes are the worst for L-MMSE equalization in the FD architecture, L-MMSE equalization outperforms ZF equalization for all possible partitioning schemes in terms of the post-fusion SINR. Hence, L-MMSE equalization is desirable in practice. \section{Numerical Results} \label{sec:Results} We now investigate the performance of decentralized equalization in the large-system limit and for Rayleigh-fading channels using the SINR expressions from Sections~\ref{sec:PDequalization} and~\ref{sec:FDequalization}. We show error-rate simulation results to validate our asymptotic results in finite-dimensional systems. We also provide results for an LTE-like massive MU-MIMO system to demonstrate the efficacy of our solutions in a more realistic scenario. \subsection{Achievable Rate Analysis} \label{sec:Results_Rate} We first investigate the achievable rates of our feedforward architectures with focus on the large-system limit and Rayleigh fading channels. We consider $C=2$ clusters with uniform antenna partitioning, i.e., $w_c=1/C$ for $c=1,\ldots,C$. We define the average receive signal-to-noise ratio (SNR) as \mbox{$\SNR=\beta\Es/\No$} and use an interference-free AWGN channel with variance~$\No$ as the baseline, which coincides to the large-antenna limit of massive MU-MIMO systems with $\beta\to0$. Concretely, we will use the following performance metric. \begin{defi}[SNR loss] We define the SNR loss of an equalizer as the excess SNR required to achieve the same target rate~$R$ of an interference-free AWGN channel with variance $\No$. \end{defi} In~\fref{fig:fig_fixed_rate_QPSK}, we use QPSK and a target rate of $R=1.99$ bits/UE/channel use; in~\fref{fig:fig_fixed_rate_16QAM} we use 16-QAM and a target rate of $R=3$ bits/UE/channel use. Both figures investigate the minimum required BS-to-UE ratio $\beta^{-1}$ for a given SNR loss, which characterizes how many more BS antennas are required by a given equalizer and feedforward architecture to be able to approach AWGN performance up to a given SNR gap. We observe that for a small SNR loss (i.e., when achieving similar performance as that of an interference-free AWGN channel), we require significantly more BS antennas than UEs, irrespective of the algorithm and architecture. For an SNR loss of $1$\,dB (shown by a thick vertical line in Figures~\ref{fig:fig_fixed_rate_QPSK} and~\ref{fig:fig_fixed_rate_16QAM}), we see that the PD architecture outperforms the FD architecture; this fact is more pronounced in the QPSK scenario as we are trying to achieve $99.5$\% of the maximum possible rate of~$2$ bits/UE/channel use for QPSK, whereas for 16-QAM, we are only trying to achieve $75$\% of the maximum rate. We also see that LAMA-PD significantly outperforms linear equalizers in the PD{} and FD{} architectures; MRC requires significantly higher BS-to-UE antenna ratios. Interestingly, for QPSK, LAMA-FD{} significantly outperforms linear equalization algorithms for the PD{} architecture in \fref{fig:fig_fixed_rate_QPSK} but performs strictly worse for 16-QAM in \fref{fig:fig_fixed_rate_16QAM}; this is due to the fact that the system-ratio threshold for LAMA to achieve individually-optimal performance is higher for QPSK than for 16-QAM~\cite{JGMS2015conf}. In summary, LAMA-FD{} achieves similar performance as linear equalizers with the PD{} architecture while reducing interconnect and chip I/O bandwidths. In~\fref{fig:fig_SNRloss_QPSK} and \fref{fig:fig_SNRloss_16QAM}, we fix the SNR loss to $1$\,dB and plot the minimum BS-to-UE ratio $\beta^{-1}$ and varying achievable rates for QPSK and 16-QAM, respectively. For both constellations, MRC performs equally well than all other methods in the low-rate regime; note that the low-rate regime translates to the low-SNR regime for which MRC is known to be optimal. For higher rates, however, MRC requires significantly higher BS-to-UE antenna ratios compared to L-MMSE or LAMA-based equalization. The PD architecture significantly outperforms the FD architecture for all equalizers, which implies that for high-rates the PD architecture is the preferred choice. Interestingly, the minimum BS-to-UE antenna ratio remains constant for ZF; this implies that as long as one operates below a certain antenna ratio $\beta^*$, ZF is able to support all transmission rates; see \cite{ghods2017optimally} for additional details on this behavior. Finally, we see that the minimum BS-to-UE ratio $\beta^{-1}$ decreases for LAMA-FD{} and LAMA-PD{} at high rates; this behavior is due to the fact that LAMA in overloaded systems is particularly robust at low and high values of SNR (see \cite{JGMS2015conf} for a detailed discussion). \begin{figure}[tp] \centering \includegraphics[width=0.72\columnwidth]{./tikz/256x16SEplot.pdf} \vspace{-0.1cm} \caption{Symbol error-rate (SER) comparison of equalization in the large-antenna limit (indicated with lines) vs. the simulated performance (indicated by the markers) in a $B=256$ BS antenna $U=16$ UE massive MU-MIMO system with Rayleigh-fading channels. Evaluating the SER using our analytical SINR expressions for the large-antenna limit closely matches numerical simulations in finite-dimensional systems for all considered equalizers and architectures.} \label{fig:asymptoticvsfinite} \end{figure} \subsection{Asymptotic vs.\ Finite-Dimensional Systems} \label{sec:Results_SERSE} In \fref{fig:asymptoticvsfinite}, we compare our analytical SINR expressions in the large-antenna limit to those in a finite-dimensional massive MU-MIMO scenario. Specifically, we use the SINR from \fref{eq:decoupling} in a decoupled AWGN channel to analytically compute the symbol error-rate (SER) as well as the simulated SER in an uncoded $B=256$ BS antenna, $U=16$ UE massive MU-MIMO system with Rayleigh fading channels. We consider $C=8$ clusters with uniform antenna partitioning, i.e., $w_c = 1/8$ for all $C=8$ clusters. First, we observe that the simulated results (indicated with markers) closely match our analytical expressions (indicated with lines). Second, we see that the PD architecture significantly outperforms the FD architecture for $C=8$ clusters and LAMA outperforms ZF and L-MMSE for both architectures. Third, we see that MRC yields poor SER performance, which is due to the fact that MRC requires extremely high BS-to-UE antenna ratios to support $4$\,bits/UE/channel use for 16-QAM; see also~\fref{fig:fig_SNRloss_16QAM}. \begin{figure}[tp] \centering \includegraphics[width=0.7\columnwidth]{./tikz/64x16LTESim.pdf} \label{fig:64x16} \vspace{-0.1cm} \caption{Packet error-rate (PER) of an LTE-like massive MU-MIMO-OFDM system with $B=64$, $U=16$, \revision{and 56\,k bits per OFDM packet. } LAMA for the PD and FD architectures clearly outperforms L-MMSE while meeting the $10$\% LTE minimum PER requirement. LAMA-PD or L-MMSE clearly outperform the consensus-based ADMM method from \cite{li2017decentralized} (which suffers from transfer latency), whereas LAMA-FD closely approaches the performance at minimal lower latency overheads. } \label{fig:LTE_error_rate_analysis} \end{figure} \subsection{Coded Error-rate Performance in Realistic Systems} \label{sec:Results_codedBER} \revision{Since our theoretical analysis relies on the large system limit and Rayleigh fading channels, we now investigate the efficacy of our work in a more realistic scenario.} Specifically, \fref{fig:LTE_error_rate_analysis} shows the coded packet error-rate (PER) in a realistic LTE-like massive MU-MIMO system with $B=64$ BS antennas and $U=16$ UEs. We consider $C=2$ clusters with uniform antenna partitioning. We use OFDM with $2048$ subcarriers ($1200$ used for data transmission) with 16-QAM, $14$ OFDM symbols per packet, and use a weak rate-$5/6$ convolutional code with soft-input Viterbi decoding. We consider a WINNER II channel model in an outdoor-to-indoor scenario. For LAMA-PD and FD, we use $10$ iterations and perform message damping to mitigate performance loss for finite-dimensional systems with correlated MIMO channel matrices~\cite{VSRKZ2015}. \revision{ We observe that LAMA-FD exhibits an error floor near a PER of $10^{-2}$ due to the small effective system dimension compared to that given by LAMA-PD. Nevertheless, LAMA-FD still outperforms L-MMSE-FD for the LTE minimum PER specification of 10\%.} We also compare LAMA and L-MMSE to the consensus-based ADMM method for DBP proposed in \cite{li2017decentralized}, where we use $10$ iterations. First, we see that LAMA-PD{} outperforms all other equalization algorithms by a significant margin, when considering the LTE minimum PER specification of $10$\%. Second, we observe that the consensus-sharing ADMM method performs slightly better than that of LAMA-FD{}. The ADMM-based method, however, requires iterative consensus exchange among the clusters which results in low throughput; see our GPU implementation results in \fref{sec:GPUperformance}. \section{Multi-GPU System Implementation} \label{sec:gpuimplementation} \begin{figure*}[tp] \centering \subfigure[t][$C=1$]{\includegraphics[height=0.25\linewidth]{./figs/c=1.pdf}\label{fig:arch_c1}} \hspace{0.9cm} \subfigure[t][$C=2$]{\includegraphics[height=0.25\linewidth]{./figs/c=2.pdf}\label{fig:arch_c2}} \hspace{0.9cm} \subfigure[t][$C=4$]{\includegraphics[height=0.25\linewidth]{./figs/c=4.pdf}\label{fig:arch_c4}} \hspace{0.9cm} \subfigure[t][$C=8$]{\includegraphics[height=0.25\linewidth]{./figs/c=8.pdf}\label{fig:arch_c8}} \caption{System architecture overview of the multi-GPU experimental platform. The system consists of eight Tesla Volta GPUs with high-bandwidth NvLink GPU-to-GPU interconnect. The master GPU (highlighted) gathers local equalization results and performs all centralized computations. For (a) $C=1$, (b) $C=2$, and (c) $C=4$ clusters, we use a single CPU that controls the GPUs via PCIe; (d) for $C=8$ clusters, we use two CPUs for control purposes. } \label{fig:sys_arch} \end{figure*} We now present implementation results of our algorithms and architectures on a multi-GPU system to validate the scalability, throughput, and latency in a realistic scenario. We furthermore provide a comparison to existing consensus-based DBP algorithms and centralized equalizers. In order to fully utilize the available GPU resources, we consider an OFDM-based system as in \fref{sec:Results_codedBER}, which enables us to not only parallelize across antennas but also across subcarriers. \begin{remark} As in \cite{li2017decentralized}, the provided multi-GPU implementations serve as a proof-of-concept to assess the efficacy and scalability of our solutions when implemented on real hardware. In practice, we expect that our solutions will be implemented on clusters consisting of field-programmable gate arrays (FPGAs) or application-specific integrated circuits (ASICs), which offer higher computing efficiency and lower transfer latency. \end{remark} \subsection{Experimental Platform} In Fig. \ref{fig:sys_arch}, we show the used Nvidia DGX-1 multi-GPU system~\cite{dgx1} consisting of eight Tesla V100 Volta GPUs with $300$\,GB/s bi-directional NvLink interconnect and two $20$-core Intel Xeon E5-2698 v4 CPUs. Each GPU provides 5120 CUDA cores and 16\,GB high bandwidth memory (HBM). In what follows, we use $C$ GPUs when processing $C$ antenna clusters; other partitioning schemes are possible. Our equalization algorithms and architectures are implemented with the CUDA~9.2 toolkit~\cite{cuda} and the Nvidia collective communications library~(NCCL) v2.2~\cite{nccl} software stack. The NCCL uses the message passing interface (MPI) library, which improves the efficiency of inter-GPU collective communication over NvLink~\cite{nvlink} by leveraging the CUDA-aware MPI technology~\cite{cudaaware} for direct GPU-to-GPU memory copy. \begin{table*}[tp] \caption{Latency (L) and throughput (TP) performance of decentralized feedforward equalizers ($U=16$, $B_c=32$, L in ms, TP in Gb/s)} \renewcommand{\arraystretch}{1.05} \centering \begin{tabular}{@{}lcccccc@{}} \toprule &\multicolumn{3}{c}{Partially Decentralized \revision{(PD)} Feedforward Equalizers} & \multicolumn{3}{c}{Fully Decentralized \revision{(FD)} Feedforward Equalizers }\tabularnewline \midrule $B$ & 64 & 128 & 256 & 64 & 128 & 256\tabularnewline $C$ & 2 & 4 & 8 & 2 & 4 & 8\tabularnewline \midrule Performance & L / TP & L / TP & L / TP & L / TP & L / TP & L / TP\tabularnewline \midrule LAMA, $T_\text{max}=1$ & 0.651 / 1.76 & 0.677 / 1.69 & 0.785 / 1.46 & 0.591 / 1.94 & 0.599 / 1.91 & 0.672 / 1.71\tabularnewline LAMA, $T_\text{max}=2$ & 0.777 / 1.48 & 0.803 / 1.43 & 0.912 / 1.26 & 0.718 / 1.60 & 0.727 / 1.58 & 0.799 / 1.44\tabularnewline LAMA, $T_\text{max}=3$ & 0.903 / 1.27 & 0.929 / 1.23 & 1.039 / 1.10 & 0.846 / 1.36 & 0.854 / 1.34 & 0.925 / 1.24\tabularnewline LAMA, $T_\text{max}=4$ & 1.030 / 1.11 & 1.056 / 1.09 & 1.165 / 0.98 & 0.973 / 1.18 & 0.980 / 1.17 & 1.052 / 1.09\tabularnewline LAMA, $T_\text{max}=5$ & 1.156 / 0.99 & 1.183 / 0.97 & 1.291 / 0.89 & 1.099 / 1.04 & 1.106 / 1.03 & 1.180 / 0.97\tabularnewline L-MMSE & 0.719 / 1.60 & 0.745 / 1.54 & 0.856 / 1.34 & 0.666 / 1.72 & 0.676 / 1.70 & 0.751 / 1.53 \tabularnewline ZF & 0.690 / 1.66 & 0.717 / 1.61 & 0.827 / 1.39 & 0.635 / 1.81 & 0.643 / 1.79 & 0.715 / 1.61\tabularnewline MRC & 0.411 / 2.79 & 0.421 / 2.72 & 0.499 / 2.30 & 0.411 / 2.79 & 0.421 / 2.72 & 0.499 / 2.30 \tabularnewline \bottomrule \end{tabular} \label{tbl:gpuresult} \end{table*} \begin{table}[tp] \caption{Performance of decentralized consensus-sharing equalizers developed in \cite{li2017decentralized} ($U=16$, $B_c=32$, L in ms, TP in Gb/s)} \renewcommand{\arraystretch}{1.05} \centering \begin{tabular}{@{}lccc@{}} \toprule $B$ & 64 & 128 & 256 \tabularnewline $C$ & 2 & 4 & 8 \tabularnewline \midrule Performance & L / TP & L / TP & L / TP \tabularnewline \midrule ADMM, $T_\text{max}=2$ & 0.783 / 1.47 & 0.789 / 1.45 & 0.858 / 1.34 \tabularnewline ADMM, $T_\text{max}=3$ & 0.982 / 1.17 & 0.995 / 1.15 & 1.075 / 1.07 \tabularnewline CG, $T_\text{max}=2$ & 0.808 / 1.42 & 0.815 / 1.41 & 0.880 / 1.30 \tabularnewline CG, $T_\text{max}=3$ & 0.997 / 1.15 & 1.010 / 1.14 & 1.098 / 1.04 \tabularnewline \bottomrule \end{tabular} \label{tbl:gpuconsensus} \end{table} \begin{table}[tp] \centering \caption{Performance of centralized equalizers ($U=16$, $C=1$, $B_c=B$, L in ms, TP in Gb/s)} \renewcommand{\arraystretch}{1.05} \centering \begin{tabular}{@{}lccc@{}} \toprule $B$ & 64 & 128 & 256 \tabularnewline \midrule Performance & L / TP & L / TP & L / TP \tabularnewline \midrule LAMA, $T_\text{max}=2$ & 0.766 / 1.50 & 1.182 / 0.97 & 2.004 / 0.57\tabularnewline L-MMSE~\cite{Li_DCAS15} & 0.710 / 1.62 & 1.125 / 1.02 & 1.947 / 0.59\tabularnewline ZF~\cite{Li_DCAS15} & 0.682 / 1.68 & 1.095 / 1.05 & 1.917 / 0.60\tabularnewline MRC & 0.457 / 2.51 & 0.859 / 1.34 & 1.650 / 0.70\tabularnewline \bottomrule \end{tabular} \label{tbl:gpucentral} \end{table} \iffalse \begin{table*} \caption{Latency (L) and Throughput (TP) of Reference Decentralized (D-) and Centralized (C-) Equalizers ($U=16$, 16-QAM)} \renewcommand{\arraystretch}{1.05} \centering \begin{tabular}{@{}lccc|lccc@{}} \toprule \multicolumn{4}{c}{Decentralized consensus-sharing equalizers [ L (ms) / TP (Gb/s) ]} & \multicolumn{4}{|c}{Centralized equalizers [ L (ms) / TP (Gb/s) ]}\tabularnewline \midrule $B$ & 64 & 128 & 256 & $B$ & 64 & 128 & 256\tabularnewline $C$ & 2 & 4 & 8 & $C$ & 1 & 1 & 1\tabularnewline $B_c$ & 32 & 32 & 32 & $B_c$ & 64 & 128 & 256\tabularnewline \midrule D-ADMM, $T_\text{max}=2$ \cite{li2017decentralized} & 0.783 / 1.47 & 0.789 / 1.45 & 0.858 /1.34 & C-LAMA, $T_\text{max}=2$) & 0.766 / 1.50 & 1.182 / 0.97 & 2.004 / 0.57\tabularnewline D-ADMM, $T_\text{max}=3$ \cite{li2017decentralized} & 0.982 / 1.17 & 0.995 / 1.15 & 1.075 / 1.07 & C-L-MMSE~\cite{Li_DCAS15} & 0.710 / 1.62 & 1.125 / 1.02 & 1.947 / 0.59\tabularnewline D-CG, $T_\text{max}=2$ \cite{li2017decentralized} & 0.808 / 1.42 & 0.815 / 1.41 & 0.880 / 1.30 & C-ZF~\cite{Li_DCAS15} & 0.682 / 1.68 & 1.095 / 1.05 & 1.917 / 0.60\tabularnewline D-CG, $T_\text{max}=3$ \cite{li2017decentralized} & 0.997 / 1.15 & 1.010 / 1.14 & 1.098 / 1.04 & C-MRC & 0.457 / 2.51 & 0.859 / 1.34 & 1.650 / 0.70\tabularnewline \bottomrule \end{tabular} \label{tb:gpucompare} \end{table*} \fi \subsection{Implementation Details} All decentralized feedforward equalizers proposed in Sections~\ref{sec:PDequalization} and~\ref{sec:FDequalization} are processed in the following three steps: (i) calculate local intermediate results at each antenna cluster, (ii) fuse local results at the centralized processor, and (iii) perform necessary centralized computations to obtain the final equalization outputs. We use the available CPUs to schedule the workload and initialize $C$ MPI processes, each process supervising an individual GPU for design decentralization. The proposed decentralized algorithms were implemented on the multi-GPU system using the following procedure: (i) We accelerate local computations at the $C$ antenna clusters, each using a dedicated GPU with multi-threaded CUDA kernel functions. (ii) We utilize collective inter-process communication among the $C$ GPUs via NCCL over NvLink to realize low-latency gathering of the local results at the master GPU. (iii) We complete the centralized computations at the master GPU for high efficiency. We note that equalization with the PD architecture generally requires fewer local computations, but more data for fusion and computations at the centralized master GPU, compared to equalization with the FD architecture. We now describe the PD{} and FD{} architectures in detail. To keep the discussion of the FD architecture short, we only discuss the procedure for LAMA, as the same methodology is used for the linear equalization algorithms. \revision{In order to minimize the complexity of computing the post-equalization variance and SINR~\cite{studer2011asic}, our implementations resort to the low-complexity approximation put forward in~\cite{Li_DCAS15}.} \subsubsection{PD Architecture} The local computations at each GPU include the partial MRC output $\bmymrc_c=\bH_c\bmy_c$ and the partial Gram matrix $\bG_c = \bH^\Herm_c\bH_c$. To maintain high GPU occupancy, we aggregate these workloads across a batch of subcarriers and process them in parallel. To process the batched matrix-matrix or matrix-vector multiplications required for partial MRC and Gram computations efficiently, we take advantage of the \emph{cuBLAS} library, a collection of CUDA-accelerated basic linear algebra subprograms (BLAS), and specifically, the \texttt{cublasCgemmBatched} library function for fast matrix multiplications with complex-valued floating-point entries. In a single invocation of the batched function call, we calculate $\bG_c$ for $N_\textnormal{sc}$ active subcarriers ($\texttt{batchsize}=N_\textnormal{sc}$) associated with a certain OFDM symbol, and reuse them across $N_\textnormal{sym}$ OFDM symbols within the channel coherence time to reduce complexity. In contrast to the Gram matrix calculation, we compute $\bmymrc_c$ for a total of $N_\textnormal{sc}\times N_\textnormal{sym}$ subcarriers ($\texttt{batchsize}=N_\textnormal{sc}\times N_\textnormal{sym}$) in a function call. This is necessary because $\bmymrc_c$ also depends on the receive vector~$\bmy_c$, which varies for each OFDM symbol. We finally fuse the local $\bG_c$ and $\bmymrc_c$ that results in a total message size \revision{$m_\text{PD}=U^2 \times N_\textnormal{sc}\times C+U\times N_\textnormal{sc}\times N_\textnormal{sym}\times C$} at the master GPU \revision{with the \texttt{ncclReduce} NCCL function.} For LAMA-PD{} shown in \fref{alg:lamanew}, each iteration mainly involves matrix-vector multiplication and vector operations, which include vector addition, subtraction, and dot-products. Although matrix-vector multiplications can be efficiently computed by the batched {cuBLAS} function with $\texttt{batchsize}=N_\textnormal{sc}\times N_\textnormal{sym}$, as done for preprocessing, we also designed customized multi-threaded kernel functions for the vector operations to fully exploit the on-chip memories of GPU. Specifically, for certain kernels, we combine multiple vector operations which can share intermediate results using fast local registers. Since the intermediate vectors within each LAMA iteration, such as $\bms$, $\bmv$, and $\bmz$, scale with the UE number $U$, multi-threaded computations for vector additions, subtractions, and scaling are straightforward; we launch a kernel with $N_\textnormal{sc}\times N_\textnormal{sym} \times U$ threads to process each of $U$ entries in a vector for a total of $N_\textnormal{sc}\times N_\textnormal{sym}$ subcarriers in parallel. For the vector dot-product operations, as an example, when we update~$\phi$ in \fref{alg:lamanew}, we resort to the \emph{warp shuffle} technique, where a thread can directly retrieve register values from another thread efficiently, to obtain a sum reduction of~$U$ vector entries across~$U$ threads in the same \emph{warp}. If $U>\texttt{warpsize}=32$, then we can also use the on-chip shared memory for the necessary inter-thread communication. After the last LAMA iteration $T_\text{max}$, we finally calculate the global LAMA-PD output at the master GPU. \subsubsection{FD Architecture} Preprocessing and equalization is computed in a decentralized manner at each of the $C$ GPUs. We reuse the \emph{cuBLAS} library and customized kernel functions for those local computations in LAMA-FD{}, and fuse the local result $\bmz_c$ at the master GPU using the NCCL \revision{\texttt{ncclReduce} function} with a smaller total message size \revision{$m_\text{FD}=U\times N_\textnormal{sc}\times N_\textnormal{sym}\times C$} than that of LAMA-PD. We implement optimal fusion at the master GPU. \subsection{Implementation Results} \label{sec:GPUperformance} We now present measured latency and throughput of our decentralized feedforward equalizers. In \fref{tbl:gpuresult}, we list results \revision{of different equalizers with PD and FD architectures. These results are} obtained via CPU wall clock timing that is synchronized with the start and end of all GPU computations. In what follows, we consider 16-QAM, and we fix the number of UEs to $U=16$ and BS antennas per cluster to $B_c=32$ We simulate an LTE-like system as in \fref{sec:Results_codedBER} with $N_\textnormal{sym}=14$ OFDM symbols per packet and $N_\textnormal{sc}=1200$ active subcarriers (out of 2048 subcarriers), which corresponds to a 20\,MHz LTE subframe. To compare the scalability of our proposed feedforward equalization architectures, we scale the total number of BS antennas $B=CB_c$ by increasing the number of clusters from $C=2$, $C=4$, to $C=8$. \subsubsection{Throughput and Latency} We see from~\fref{tbl:gpuresult} that all of our proposed decentralized feedforward equalizers achieve throughput in the Gb/s regime with latencies of $1$\,ms or less. Specifically, the non-linear LAMA-PD and LAMA-FD equalizers are able to reach higher throughput for a small number of iterations ($T_\text{max}=1$ or $T_\text{max}=2$). We note that for more LAMA iterations, our decentralized linear equalizers are able to outperform LAMA in terms of the throughput. This is due to the fact that linear equalizers can reuse both local Gram matrix multiplication and matrix inversion results across $N_\textnormal{sym}$ OFDM symbols, which effectively reduces complexity. Among all those feedforward equalizers, MRC (which is equivalent for MRC-PD{} and MRC-FD{}) has the highest throughput and lowest latency, but entails a significant error-rate performance loss; see the simulation results in \fref{sec:Results}. \revision{Furthermore, we see that equalization with the FD architecture generally achieves higher throughput than that of the PD architecture, mainly caused by smaller message sizes and lower data-transfer latency during the data fusion process. This advantage, however, comes at the cost of reduced error-rate performance for the FD architecture. Put simply, there exists a trade-off between throughput and error-rate performance for the FD and PD architectures. } \revision{Interestingly, the latency and throughput of our decentralized feedforward equalization implementations degrades only slightly when we increase the number of BS antennas (with a larger number of clusters $C$) as our designs benefit from direct GPU-to-GPU communication with efficient NCCL over NvLink.} This observation demonstrates that our proposed decentralized feedforward equalizers have excellent scalability to support hundreds to even thousands of BS antennas while maintaining high throughput. We now compare our proposed decentralized feedforward architectures to the decentralized consensus-based methods proposed in~\cite{li2017decentralized}. In \fref{tbl:gpuconsensus}, we show reference latency and throughput results measured on the same multi-GPU platform. As discussed in~\cite{li2017decentralized}, consensus-sharing methods, such as ADMM-based and decentralized CG-based equalizers, rely on iterative update of local variables and global consensus, which requires the data gathering for consensus calculation and consensus broadcasting \emph{in each iteration}. In contrast, the decentralized feedforward equalizers proposed in this paper significantly reduce the data transfer latency with only \emph{one-shot} (feedforward) message passing, which leads to (often significantly) higher throughput. More specifically, both LAMA-PD and LAMA-FD achieve higher throughput than D-ADMM or D-CG for the same number of iterations; the same trend continues to hold for a larger number of iterations. In~\fref{tbl:gpucentral}, we show the latency and throughput performance of several \emph{centralized} equalizers. We see that the throughput of centralized equalizers decreases quickly when increasing the number of BS antennas; this demonstrates that centralized solutions exhibit poor scalability to large BS antenna arrays. Also note that centralized solutions suffer from high interconnect and chip I/O data rates, which is not visible in this comparison. \subsubsection{\revision{Data Transfer}} \revision{The key advantages of the proposed decentralized feedforward architectures are as follows: (i) They reduce the raw front-end baseband transfer rate by a factor of $C$ at each antenna cluster compared to that of centralized architectures and (ii) they minimize the back-end message passing data among clusters. For example, given $N_\text{sc}=1200$, $N_\text{sym}=14$, $U=16$ and $C=4$, the total message passing data across $C$ GPUs with the PD architecture is $m_\text{PD} = 17.58$\,MB while the FD architecture requires only $m_\text{FD} = 8.20$\,MB. In contrast, the decentralized consensus-sharing (CS) equalizers in~\cite{li2017decentralized} require multiple iterations of message passing. Furthermore, in each each iteration the message passing data of both data gathering and consensus broadcasting doubles compared to that of the FD architecture, i.e., we have $m_\text{CS} = 2m_\text{FD} = 16.40$\,MB per iteration.} \subsubsection{\revision{Practical Considerations}} \revision{While our multi-GPU implementations exceed 1\,Gb/s throughput, the estimated total power dissipation of $C$ Tesla V100 GPUs with $300$\,W thermal design power (TDP) each can be as high as $C\times 300$\,W. To reduce the power consumption in practice, one can resort to FPGA or ASIC implementations. In fact, some of the latest massive MU-MIMO testbeds, such as the LuMaMi~\cite{lund,lund2017} testbed, are built with FPGA-driven software-defined radios and PXIe switches, and demonstrate 0.8\,Gb/s throughput for a $B=100$ antenna $U=12$ user system. However, the LuMaMi testbed processes the entire workload for different sub-bands (a small portion of the entire frequency band) on different FPGA co-processors, while each sub-band still connects to all BS antennas. Thus the PXIe switches can be saturated when further scaling up the antenna number. In contrast, the proposed feedforward architectures divide the processing workload \emph{across antennas}, which yields improved scalability and modularity. In practice, one can combine antenna domain and frequency domain decentralization to combine the best of both approaches.} \section{Conclusions}\label{sec:conclusions} % We have presented two feedforward architectures for decentralized equalization in massive MU-MIMO systems that mitigate the interconnect and I/O bandwidth bottlenecks and enable parallel processing on multiple computing fabrics. For the two proposed architectures, we have presented linear and nonlinear equalization algorithms, and we have analyzed their post-equalization SINR performance in the large-antenna limit. We have also performed numerical simulations that confirm our analysis. Our results indicate that nonlinear equalizers are able to achieve near-optimal SINR performance while enabling decentralized computations and low communication overhead among the antenna clusters. Linear equalizers perform equally well for scenarios in which the number of BS antennas is significantly larger than the number of UEs or for systems that use strong coding or low data rates. Our reference implementations on a multi-GPU system have shown that our feedforward architectures achieve throughputs in the Gb/s regime, even for massive MU-MIMO systems with hundreds of antenna elements. Specifically, our measurement results show that feedforward architectures are able to overcome the latency limits of existing decentralized baseband processing schemes, such as the consensus-sharing methods proposed in~\cite{li2017decentralized}. There are many avenues for future work. First, an implementation of our algorithms and architectures on multi-FPGA or multi-ASIC platforms would demonstrate the full capabilities of our solutions. % \revision{Second, an investigation of antenna partitioning schemes and beamforming-based methods for directional channels, such as those experienced in millimeter wave (mmWave) systems, is part of ongoing research.} % Third, a theoretical analysis of the precoding architectures and algorithms proposed recently in \cite{LJCS2018} for the massive MU-MIMO downlink is left for future work. \section{Derivations and Proofs} \subsection{Derivation of \fref{alg:LAMA_alg}}\label{app:LAMAPD_derivation} \fref{alg:LAMA_alg} builds upon the original LAMA algorithm \cite{JGMS2015conf}: \begin{align*} \bmz^t &= \bms^t + \bH^\Herm \bmr^t\\ \bms^{t+1} &= \mathsf{F}(\bmz^t,\No(1+\tau^t))\\ \tau^{t+1} &= \frac{\beta}{\No}\langle\mathsf{G}(\bmz^t,\No(1+\tau^t))\rangle \\ \bmr^{t+1} &= \bmy - \bH \bms^{t+1} + \frac{\tau^{t+1}}{1+\tau^t}\bmr^t. \end{align*} We start with $\bmymrc = \bH^\Herm \bmy$ and $\bG = \bH^\Herm \bH$ and define $\phi^t = \frac{\No\tau^t}{\beta}$ so that $\frac{\tau^{t+1}}{1+\tau^t} = \frac{\beta\phi^{t+1}}{\No + \beta\phi^t}$. Then, \begin{align*} \bH^\Herm\bmr^{t+1} &= \bH^\Herm \bmy - \bH^\Herm\bH\bms^{t+1} + \frac{\tau^t}{1+\tau^t} \bH^\Herm\bmr^t\\ &= \bmymrc - \bG \bms^{t+1} + \frac{\beta\phi^{t+1}}{\No + \beta\phi^t} \bH^\Herm\bmr^t. \end{align*} \fref{alg:LAMA_alg} follows by noticing that $\bmv^{t+1} = \bH^\Herm\bmr^t = \bmz^t - \bms^t$. \subsection{Proof of \fref{lem:optimal_fusion}}\label{app:optimal_fusion} As in \fref{eq:decoupling}, we write the estimate $z_{c,u}$ for UE $u$ at cluster $c$ as $z_{c,u} = s_{0u} + e_{c,u}$, where $e_{c,u}$ represents residual interference and noise with known error variance $\Ex{}{|e_{c,u}|^2}=\sigma^2_{c,u}$. At UE~$u$, optimal fusion is $z_{u} = \sum_{c=1}^C \nu_{c,u} z_{c,u}$ so that \mbox{$\sum_{c=1}^C\nu_{c,u}=1$}. Hence, the fused estimate is $z_{u} = s_{0u} + \sum_{c=1}^C \nu_{c,u} e_{c,u}$, with the following post-fusion SINR: \begin{align} \label{eq:postfusionSINR} \SINR = \frac{\Ex{}{|s_{0u}|^2}}{\Ex{}{\big|\sum_{c=1}^C\nu_{c,u}e_{c,u}\big|^2}} = \frac{\Es}{\sum_{c=1}^C \nu_{c,u}^2 \sigma^2_{c,u}}. \end{align} Here, we used the assumption that the residual interference and noise terms $e_{c,u}$ are zero mean and uncorrelated across clusters $c=1,\ldots,C$. We are now interested in maximizing the post-fusion SINR in \fref{eq:postfusionSINR} subject to $\sum_{c=1}^C\nu_{c,u}=1$. Using the method of Lagrange multipliers, it is easy to see that \begin{align} \nu_{c,u} = \frac{1}{\sigma_{c,u}^2} \left(\sum_{c'=1}^C \frac{1}{\sigma_{c',u}^2} \right)^{\!\!-1}, \quad c=1,\ldots,C. \label{eq:opt_fusion} \end{align} \subsection{Proof of \fref{lem:SE_FP_Decentralized}}\label{app:SE_FP_Decentralized} For Rayleigh-fading channels, each entry in the partial channel matrix $\bH_c$ is distributed as $\setC\setN(0,1/\MR)$. To ensure that the expected column-norm of $\bH_c$ is one, we normalize the per-cluster input-output relation in \fref{eq:perclusterInOutrelation} by $1/\sqrt{w_c}$. This normalization amplifies the noise variance by $1/w_c$ in each cluster. In addition, since overall system dimension is $B w_c \times U$, the resulting system ratio is given by $\beta=U/(B w_c) = \beta/w_c$. By realizing that $\No/w_c$ is the per-cluster noise variance, the fixed-point equation follows immediately from Theorems \ref{thm:THeq} and~\ref{thm:SE} for linear and LAMA-based equalization, respectively. \subsection{Proof of \fref{thm:postfusionvariance}} \label{app:postfusionvariance} To simplify notation, we omit the UE index $u$. The proof follows from \fref{eq:opt_fusion} in \fref{lem:optimal_fusion}. The first expression in \fref{eq:sigma_FD} is trivial whereas the second expression is obtained as follows: \begin{align*} & \beta\sum_{c=1}^{\C} \nu_c \Psi(\bar\sigma_c^2) = \left(\sum_{c=1}^{\C}\frac{1}{\bar\sigma_c^2}\right)^{\!\!\!-1}\! \sum_{c=1}^{\C} \frac{\beta\Psi(\bar\sigma_c^2)}{\bar\sigma_c^2} \\ & \quad = \left(\sum_{c=1}^{\C}\frac{1}{\bar\sigma_c^2}\right)^{\!\!\!-1}\! \sum_{c=1}^{\C}\left(w_c - \frac{\No}{\bar\sigma_c^2} \right) = \left(\sum_{c=1}^{\C}\frac{1}{\bar\sigma_c^2}\right)^{\!\!\!-1}\!\!\!\! - \No. \end{align*} \subsection{Proof of \fref{lem:LAMA_Arch2_Arch1}}\label{app:LAMA_Arch2_Arch1} We first show when equality holds. The case for $C=1$ is trivial because the PD{} and FD{} architectures are equivalent for $C=1$. The case for $\beta \to 0$ is also straightforward because $\sigma_c^2=\sigma_\text{FD}^2=\sigma_\text{PD}^2 = \No$. For MRC, we have $\sigma_\text{FD}^2 = \No+\beta\sum_{c=1}^{\C} \nu_c \Varop_S[S] = \No+\beta\Varop_S[S] = \sigma_\text{PD}^2$. Let us now assume that $\beta>0$. We show that $\sigma_c^2 > \sigma_\text{PD}^2$ by re-writing the fixed-point solutions as \cite{Maleki2010phd}: $\sigma_c^2 = \sup\{ \sigma^2: \No+\beta\Psi(\sigma^2)\geq w_c\sigma^2\}$ and $\sigma_\text{PD}^2 = \sup\{ \sigma^2: \No+\beta\Psi(\sigma^2)\geq \sigma^2\}$. Note that $\No>0$, so both $\sigma_c^2$ and $\sigma_\text{PD}^2$ are strictly positive. It is easy to see that $\sigma_\text{PD}^2 \neq \sigma_c^2$ because $\sigma_\text{PD}^2 = \No+\beta\Psi(\sigma_\text{PD}^2 ) > w_c\sigma_\text{PD}^2$. Since $\Psi(\sigma^2 ) \to \Varop_S[S]$ as $\sigma^2\to\infty$ and $\Psi(\sigma^2)$ is continuous \cite{GWSS2011}, there exists a $\sigma_c^2>\sigma_\text{PD}^2$ that satisfies $\No+\beta\Psi(\sigma_c^2)=w_c\sigma_c^2$ by the intermediate value theorem. Finally, we use \cite[Prop. 9]{GWSS2011} to see that $\Psi(\sigma^2)$ is strictly increasing for $\sigma^2>0$ for LAMA. For ZF and MMSE, this also holds by inspection of $\dd \Psi(\sigma^2)/\dd\sigma^2 > 0$. Thus, the result $\sigma_\text{FD}^2 > \sigma_\text{PD}^2$ follows directly from \fref{lem:optimal_fusion} since \begin{align*} \sigma^2_\text{FD} =\No \!+\! \beta \sum_{c=1}^{\C} \nu_c \Psi(\sigma_c^2) > \No \!+\! \beta \sum_{c=1}^{\C} \nu_c \Psi(\sigma_\text{PD}^2) = \sigma_\text{PD}^2. \end{align*} \subsection{Proof of \fref{lem:ZF_same}}\label{app:ZF_same} The proof is straightforward and follows from \fref{thm:THeq} and \fref{lem:optimal_fusion}. Given that cluster $c$ has $B w_c > \beta$ antennas across all clusters $C$, the input-output relation of cluster $c$ in the large-system limit under ZF equalization results in a AWGN channel with decoupled noise variance: ${\sigma}_c^2 = \frac{\No}{ w_c - \beta }$. The proof follows from \fref{lem:optimal_fusion} noting that $\sum_{c=1}^C w_c = 1$: \begin{align*} \sigma_\text{FD}^2 = \left(\sum_{c=1}^C \frac{1}{{\sigma}_c^2}\!\right)^{-1} = \left(\sum_{c=1}^C \frac{w_c - \beta }{\No}\!\right)^{-1} = \frac{\No}{ 1 - C\beta }. \end{align*} \subsection{Proof of \fref{lem:LMMSE_equalization}}\label{app:LMMSE_equalization} The proof follows \fref{thm:THeq} with the fixed-point equation \begin{align*} w_c \sigma_c^2 = \No + \beta \frac{\Es}{\Es+\sigma_c^2} \sigma^2_c, \end{align*} which results in the following \SINR expression for cluster $C$ for L-MMSE with the FD architecture: \begin{align*} \SINR_{\textnormal{FD},c}^\textnormal{L-MMSE} =&\,\, \frac{1}{2} \Bigg( \sqrt{ \left(1 - \frac{\Es}{\No}(w_c-\beta)\right)^{\!\!2} + 4\frac{\Es}{\No}w_c} \\ &- \Big(1 - \frac{\Es}{\No}(w_c-\beta)\Big)\! \Bigg)\!. \end{align*} \fref{lem:LMMSE_equalization} follows from $\SINR_{\textnormal{FD}}^\textnormal{L-MMSE} = \sum_{c=1}^C \SINR_{\textnormal{FD},c}^\textnormal{L-MMSE}$. \subsection{Proof of \fref{lem:LMMSE_upper}}\label{app:LMMSE_upper} The proof of \fref{lem:LMMSE_upper} starts from \fref{eq:LMMSE_equalization}. Let us denote $\overline{\SINR}_{\textnormal{FD}}^\textnormal{L-MMSE}$ as $\SINR_{\textnormal{FD}}^\textnormal{L-MMSE}$ when $w_1 = 0$ and $w_2=\cdots=w_C = 0$. We also define $\overline{\beta} = 1-\beta$. Then, \begin{align*} &\!\!\!\!\!\!\!\!\!\!\!\max_{\bmw}\SINR_{\textnormal{FD}}^\textnormal{L-MMSE} \geq \overline{\SINR}_{\textnormal{FD}}^\textnormal{L-MMSE} \\=& \frac{1}{2} \Bigg( \sqrt{ \Big(1 - \frac{\Es}{\No}\overline{\beta}\Big)^{2} + 4\frac{\Es}{\No}} - \Big(1 - \frac{\Es}{\No}\overline{\beta}\Big)\Bigg) \\&+ \frac{C-1}{2} \Bigg( \sqrt{ \Big(1 - \frac{\Es}{\No}\beta\Big)^{2}} - \Big(1 - \frac{\Es}{\No}\beta\Big) \Bigg)\! \\ =& \frac{1}{2} \Bigg( \sqrt{ \Big(1 - \frac{\Es}{\No}\overline{\beta}\Big)^{2} + 4\frac{\Es}{\No}} - \Big(1 - \frac{\Es}{\No}\overline{\beta}\Big) \Bigg) \\ \stackrel{(a)}{=}& \SINR_{\textnormal{PD}}^\textnormal{L-MMSE}, \end{align*} where $(a)$ follows from (L-MMSE) in \fref{cor:sinr_PD}. Since we know from \fref{lem:LAMA_Arch2_Arch1} that $\SINR_{\textnormal{PD}}^\textnormal{L-MMSE}\geq \SINR_{\textnormal{FD}}^\textnormal{L-MMSE}$, we have that $\max_{\bmw}\SINR_{\textnormal{FD}}^\textnormal{L-MMSE} = \overline{\SINR}_{\textnormal{FD}}^\textnormal{L-MMSE} = \SINR_{\textnormal{PD}}^\textnormal{L-MMSE}$. \subsection{Proof of \fref{lem:LMMSE_uniform}}\label{app:LMMSE_uniform} The proof of \fref{lem:LMMSE_uniform} starts from \fref{eq:LMMSE_equalization} with the definition $f(w,\alpha) = \sqrt{(1 - \alpha(w-\beta))^{2} + 4\alpha w}$. Note that $f(w,\alpha)$ is convex in $w$ as $f''(w,\alpha) \geq 0$ for $\alpha\geq 0$. The final step follows from Jensen's inequality, which implies \begin{align*} \frac{1}{C}\sum_{c=1}^C f(w_c,\alpha) \geq f\left(\frac{1}{C}\sum_{c=1}^C w_c, \alpha\right), \end{align*} where equality holds if $w_1=w_2=\cdots=w_C$.
\section{Introduction} \label{sec:Intro} The present interest in manipulating quantum many-body systems and understanding the flow of quantum information naturally leads to consider the behavior of the four-point out-of-time-order correlator (OTOC) \cite{swingle18}. In contrast with the time-ordered products of quantum operators, widely used in the perturbative treatments of quantum field theories, the OTOC allows to address the subtleties related with thermalization and time-evolution of complex systems. First introduced in the context of semiclassical approaches to superconductivity theory \cite{lo69}, the relevance of the OTOC in the physics of black holes and the conjectured bound on its growth rate \cite{mss16} has spurred a sustained activity in the last few years \cite{sbsh16,afi16,cg16,kgp17,rgg17,hmy17,letal17,cdp17,gbswb17,k18,rgg18,cz18,rur18,gsjrw18,rfu18,hirschetal18}. The complexity of a quantum system, arising from its many-body and/or from the chaotic nature of the underlying classical dynamics, has been claimed to be essential in rendering a generic behavior of the OTOC which is universal with respect to the choice made for the quantum operators \cite{mss16}. The OTOC has then been considered as a probe of quantum chaos, unveiling the signatures of classical chaos on a quantum system, like the level statistics \cite{bgs84,LesHou89,Gutz-book,ullmo16}, the Loschmidt echo \cite{jalabert2001,goussev12,philtrans}, or the eigenstate thermalization hypothesis \cite{srednicki94,alonso_jain97,deutsch18}. A two-point correlation function of Heisenberg operators at different times, formally related to the OTOC, has been used to characterize the stochasticity in complex quantum systems since the beginning of quantum chaos studies \cite{dima1,dima2}. While some of the key predictions about the OTOC address quantum systems with many degrees of freedom \cite{mss16}, and a considerable body of work has taken many-body spin systems as a paradigm \cite{kgp17,cdp17}, it is important to understand the behavior of the OTOC in quantum systems with few degrees of freedom, where a good description of the classical and quantum dynamics is achievable. Among the latter, quantum maps \cite{rgg17,cdp17,cz18,gsjrw18,rfu18} and two-dimensional billiards \cite{hmy17,rgg18} have recently allowed to connect the time evolution of the OTOC with the features of the underlying classical dynamics. In particular, establishing the relevance of classical chaos. Quantum maps are defined by an evolution operator, rather than a Hamiltonian, and thus, the thermal aspects of the OTOC cannot be put in evidence. The important outcomes of the OTOC studies in quantum maps concern their short time behavior, exhibiting an exponential growth determined by twice the Lyapunov exponent of the classical map \cite{rgg17,cz18}, as well as their long-time behavior, where the approach to saturation is governed by the largest non-trivial Ruelle-Pollicot resonance \cite{gsjrw18}. Chaos is thus embedded in the short and long-time behavior of the OTOC of a quantum map, much alike as in the dynamics of the classical one. Numerical work in low-dimensional billiards \cite{hmy17} did not allow to identify a clear exponential growth of the OTOC governed by the Lyapunov exponent, nor to put in evidence a remarkable difference between the classically chaotic and integrable systems within the regime of initial growth. In this work we develop a semiclassical approach to the OTOC applicable to low-dimensional classically chaotic systems. We perform a systematic expansion in powers of $\hbar$, determining the leading classical behavior of the different components of the OTOC, and then their next-order contribution scaling with $\hbar^2$. We determine the growth-rate of the OTOC in the low-temperature limit, as well as the saturation behavior for long times. We confront our semiclassical results with numerical quantum calculations performed in a two-dimensional billiard, and make the connection with the predicted bounds on the OTOC growth rate. The paper is organized as follows. In Sec.~\ref{sec:oitopce} we present the basic definitions of the OTOC for a one-particle systems in the canonical ensemble, while in Sec.~\ref{sec:SAOTOC} we introduce the semiclassical formalism for obtaining the OTOC as a sum of three components. In Sec.~\ref{sec:DSOTOCc} we identify the ensemble of classical trajectories relevant for the semiclassical calculation of these components, providing their leading-order (classical limit) in Sec.~\ref{sec:LOCOTOCC}, and confronting them to numerical calculations in Sec.~\ref{sec:QNCOTOCC}. Section~\ref{sec:OTOCSL} presents the semiclassical limit of the OTOC, while Sec.~\ref{sec:LowTBOTOC} discusses the resulting low-temperature and long-time limits. The comparison with quantum numerical calculations of the OTOC are presented in Sec.~\ref{sec:QNCOTOC}, and Sec.~\ref{sec:conclusions} sums up the main conclusions of this work. Appendices A and B describe alternative semiclassical schemes not included in the main text. \section{OTOC in the one-particle canonical ensemble} \label{sec:oitopce} We consider the out-of-time-order correlator defined by \begin{equation} {\cal C}(t) = \left\langle\left\langle \left[ \hat{A}_t, \hat{B} \right]^{\dagger} \left[ \hat{A}_t, \hat{B} \right] \right\rangle\right\rangle \, . \label{eq:OTOC} \end{equation} Where $\hat{A}$ and $\hat{B}$ are two operators to be specified, while $\hat{A}_t = \hat{U}_t^{\dagger} \hat{A} \hat{U}_t$ follows from the time evolution of the former. We use the standard notation $\hat{U}_t=e^{-{\rm i} \hat{H} t/\hbar}$ for the evolution operator under the Hamiltonian $\hat{H}$ of the system. In this context, the double angular bracket stands for the thermal averaging which, in the one-body physics that we deal with, yields for an arbitrary operator $\hat{O}$ \begin{equation} \left\langle\left\langle \hat{O} \right\rangle\right\rangle = \frac{1}{Z} \ {\rm Tr}\left\{ e^{-\beta \hat{H}} \hat{O} \right\}\, , \label{eq:therav} \end{equation} where $Z$ is the canonical partition function and $\beta=(\kb T)^{-1}$, with $T$ the temperature and $\kb$ the Boltzmann constant. When $\hat{A}$ and $\hat{B}$ are chosen to be unitary operators, we have \begin{equation} {\cal C}(t) = 2 \left( 1 - {\rm Re} \left\{ \left\langle\left\langle \hat{A}_t^{\dagger} \hat{B}^{\dagger} \hat{A}_t \hat{B} \right\rangle\right\rangle \right\} \right) \, . \label{eq:OTOCUP} \end{equation} If, however, $\hat{A}$ and $\hat{B}$ are Hermitian operators, the OTOC is given by \begin{equation} {\cal C}(t) = - \left\langle\left\langle \left[ \hat{A}_t, \hat{B} \right]^{2} \right\rangle\right\rangle = - 2 \ {\rm Re} \left\{ {\cal O}^{(1)}(t) \right\} + {\cal O}^{(2)}(t) + {\cal O}^{(3)}(t) \, . \label{eq:OTOCHP} \end{equation} We note ${\cal O}^{(j)}(t) = \left\langle\left\langle \hat{O}_t^{(j)} \right\rangle\right\rangle$ the three components of the OTOC, obtained from \begin{subequations} \label{allO} \begin{equation} \hat{O}_t^{(1)} = \hat{A}_t \hat{B} \hat{A}_t \hat{B} \ , \end{equation} \begin{equation} \hat{O}_t^{(2)} = \hat{A}_t \hat{B}^2 \hat{A}_t \ , \end{equation} \begin{equation} \hat{O}_t^{(3)} = \hat{B} \hat{A}_t^2 \hat{B} \ . \end{equation} \end{subequations} When $\hat{B} = \hat{A}$ and/or at infinite temperature we have $\hat{O}_t^{(2)} = \hat{O}_t^{(3)}$. We will focus on the case in which $\hat{A}$ and $\hat{B}$ are Hermitian operators, which is the one where the measurement interpretation of the OTOC is straightforward \cite{swingle18}. To make explicit some of our calculations, we will choose $\hat{A} = \hat{X}$ and $\hat{B} = \hat{P}_{X}$. That is, the $X$ component of the position and momentum operators of a two-dimensional one-particle system, respectively. However, we will indicate the extent up to which our results are generic in terms of the chosen operators. Using the spectral decomposition of the Green function $G(\mathbf{r},\mathbf{r}^{\prime};\varepsilon)$ between $\mathbf{r}^{\prime}$ and $\mathbf{r}$ at energy $\varepsilon$, we can write \begin{align} {\cal O}^{(j)}(t) &= - \frac{1}{\pi Z} \int {\rm d} \varepsilon \ {\rm d} \mathbf{r}^{\prime} \ {\rm d} \mathbf{r} \ e^{-\beta \varepsilon} \ \nonumber \\ & \ \ \ \ {\rm Im} \left\{G(\mathbf{r},\mathbf{r}^{\prime};\varepsilon)\right\} \ O^{(\it j)}(\mathbf{r}^{\prime},\mathbf{r};t) \, . \label{eq:OTOCImGF} \end{align} We have defined (for $j=1,2$, $3$) the matrix element \begin{equation} O^{(j)}(\mathbf{r}^{\prime},\mathbf{r};t) = \langle \mathbf{r}^{\prime} \left| \hat{O}_t^{(j)} \right| \mathbf{r} \rangle \, , \label{eq:Oj} \end{equation} and we employed the Green function associated to the Schr\"odinger equation, that is, the Fourier transform of the propagator \begin{equation} K(\mathbf{r}^{\prime},\mathbf{r};t) = \langle \mathbf{r}^{\prime} \left| \hat{U}_t \right| \mathbf{r} \rangle \, . \label{eq:propagator} \end{equation} The energy integral in Eq.~\eqref{eq:OTOCImGF} runs over the whole spectrum, while the space integrals are taken over the area ${\cal A}$ of the system. The partition function for a spinless particle in a billiard of area ${\cal A}$ is $Z={\cal A}m/(2\pi \hbar^2 \beta)$. \section{Semiclassical approach to the OTOC} \label{sec:SAOTOC} For the evaluation of $O^{(j)}(\mathbf{r}^{\prime},\mathbf{r};t)$, the insertion of a complete basis of the position operator within the products that define $\hat{O}_t^{(j)}$ gives rise to the propagator Eq.~\eqref{eq:propagator}. Throughout this work, we will make extensive use of the semiclassical approximation for the later, that in the two-dimensional case is given by the expansion \cite{LesHou89, Gutz-book} \begin{align} K_{\rm sc}(\mathbf{r}^{\prime},\mathbf{r};t) & = \left( \frac{1}{2\pi {\rm i} {\hbar}}\right) \sum_{s(\mathbf{r},\mathbf{r}^{\prime};t)} C_{s}^{1/2} \nonumber \\ & \ \ \ \ \exp{\left[\tfrac{{\rm i}}{\hbar}R_{s}(\mathbf{r}^{\prime},\mathbf{r};t)-{\rm i} \tfrac{\pi}{2}\mu_{s}\right] } \, , \label{eq:SCpropagator} \end{align} as the sum over all the classical trajectories $s(\mathbf{r},\mathbf{r}^{\prime};t)$ joining the points $\mathbf{r}$ and $\mathbf{r}^{\prime}$ in a time $t$. We note \mbox{$R_{s}(\mathbf{r}^{\prime},\mathbf{r};t)=\int_{0}^{t} {\rm d} \tau \mathcal{L}$} the Hamilton principal function, obtained from the integral of the Lagrangian $\mathcal{L}$ along the classical path, and $\mu$ the Maslov index that counts the number of conjugate points. The prefactor $C_{s}=\left| \det\mathcal{B}_{s}\right|$ accounting for the conservation of the classical probability, is expressed in terms of the initial and final position components $b$ and $a$ as % $(\mathcal{B}_{s})_{ab}=-\partial^{2}R_{s}/\partial r_{a}^{\prime} \partial r_{b}$. The semiclassical approximation is applicable when the typical Hamilton principal function (or the action) of the relevant classical trajectories is much larger than $\hbar$. In the case of billiards on which we will focus in this work, the previous conditions translate into $kL \gg 1$, where $k$ is the magnitude of the wavevector and $L$ the minimal trajectory length. The terms $O^{(1)}(\mathbf{r}^{\prime},\mathbf{r};t)$ and $O^{(2)}(\mathbf{r}^{\prime},\mathbf{r};t)$ are given as sums over products of four trajectories, while $O^{(3)}(\mathbf{r}^{\prime},\mathbf{r};t)$ has a simpler expression, as it is obtained by a sum over pairs of trajectories. The semiclassical approximation for the later term is given by \begin{widetext} \begin{align} O^{(3)}_{\rm sc}(\mathbf{r}^{\prime},\mathbf{r};t) & = - \frac{1}{\left(2\pi \hbar\right)^2} \int {\rm d} \mathbf{r}_{1} \sum_{s_{2}(\mathbf{r}_{1},\mathbf{r}^{\prime};t)} \ \sum_{s_{1}(\mathbf{r},\mathbf{r}_{1};t)} C_{s_{2}}^{1/2} \ C_{s_{1}}^{1/2} \ \left\{P_{X,s_{2}}^{\rm f} \left( X_{1} \right)^{2} P_{X,s_{1}}^{\rm i}\right\} \nonumber \\ & \exp{\left[ \frac{{\rm i}}{\hbar}\left(R_{s_{1}}(\mathbf{r}_{1},\mathbf{r};t)-R_{s_{2}}(\mathbf{r}^{\prime},\mathbf{r}_{1};t)\right) -{\rm i} \frac{\pi}{2}\left( \mu_{s_{1}}-\mu_{s_{2}}\right) \right] } \, , \label{eq:O3semi} \end{align} \end{widetext} when as $\hat{A}$ and $\hat{B}$ are taken, respectively, as the $X$ component of the position and momentum operators. We note $X_1=\mathbf{r}_1.\hat{\bf e}_X$ and $P_X=\mathbf{p}.\hat{\bf e}_X$, with $\hat{\bf e}_X$ the unit vector in the $X$-direction, while the indices ${\rm i}$ and ${\rm f}$ refer, respectively, to the initial and final condition of the corresponding trajectory. The choice of $A$ and $B$ is not crucial at this stage, provided that they are local operators allowing to express, within a semiclassical formalism, their action at the beginning or the end of each trajectory, as indicated by the term inside the curly bracket in Eq.~\eqref{eq:O3semi}. \begin{widetext} The semiclassical approximation for the term $O^{(2)}(\mathbf{r}^{\prime},\mathbf{r};t)$ is given by \begin{align} O^{(2)}_{\rm sc}(\mathbf{r}^{\prime},\mathbf{r};t) & = \frac{1}{\left(2\pi \hbar \right)^4} \int {\rm d} \mathbf{r}_{3} \ {\rm d} \mathbf{r}_{2} \ {\rm d} \mathbf{r}_{1} \sum_{s_{4}(\mathbf{r}_{3},\mathbf{r}^{\prime};t)} \ \sum_{s_{3}(\mathbf{r}_{2},\mathbf{r}_{3};t)} \sum_{s_{2}(\mathbf{r}_{1},\mathbf{r}_{2};t)} \ \sum_{s_{1}(\mathbf{r},\mathbf{r}_{1};t)} \nonumber \\ & C_{s_{4}}^{1/2} \ C_{s_{3}}^{1/2} \ C_{s_{2}}^{1/2} \ C_{s_{1}}^{1/2} \ \left\{X_{3} \left( P_{X,s_{3}}^{\rm i}\right)^2 X_{1}\right\} \nonumber \\ & \exp{\left[ \frac{{\rm i}}{\hbar}\left(R_{s_{3}}(\mathbf{r}_{3},\mathbf{r}_{2};t)-R_{s_{4}}(\mathbf{r}^{\prime},\mathbf{r}_{3};t)\right) - {\rm i} \frac{\pi}{2}\left( \mu_{s_{3}}-\mu_{s_{4}}\right) \right] } \nonumber \\ & \exp{\left[ \frac{{\rm i}}{\hbar}\left(R_{s_{1}}(\mathbf{r}_{1},\mathbf{r};t)-R_{s_{2}}(\mathbf{r}_{2},\mathbf{r}_{1};t)\right) - {\rm i} \frac{\pi}{2}\left( \mu_{s_{1}}-\mu_{s_{2}}\right) \right] } \, . \label{eq:O2semi} \end{align} \end{widetext} A similar semiclassical expression is obtained for $O^{(1)}(\mathbf{r}^{\prime},\mathbf{r};t)$, with the only modification respect to \eqref{eq:O2semi} of using $X_{3} P_{X,s_{3}}^{\rm i} X_{1} P_{X,s_{1}}^{\rm i} $ within the curly bracket. \section{Diagonal scheme for the OTOC components} \label{sec:DSOTOCc} Independent trajectories where the corresponding phases are unrelated average out their contribution upon the spatial integrations. Therefore, we will only keep in the sums terms in which these phases are related. Noting $\tilde{s}_{j}$ the time-reversal symmetric of the trajectory $s_{j}$, the most obvious connection is when $\tilde{s}_{2}$ remains near to $s_{1}$ [in the cases of $O^{(1)}(\mathbf{r}^{\prime},\mathbf{r};t)$, $O^{(2)}(\mathbf{r}^{\prime},\mathbf{r};t)$, and $O^{(3)}(\mathbf{r}^{\prime},\mathbf{r};t)$] and in addition $\tilde{s}_{4}$ is close to $s_{3}$ [only relevant in the cases of $O^{(1)}(\mathbf{r}^{\prime},\mathbf{r};t)$ and $O^{(2)}(\mathbf{r}^{\prime},\mathbf{r};t)$]. Such a pairing scheme, which we call {\it diagonal}, and note with the subscript ``${\rm d}$,'' is the simplest one, and it will then be first considered. We stress at this point that this diagonal scheme does not simply imply a strict diagonal approximation matching each trajectory with its time-reversal, as usually meant by this level of approximation \cite{jalabert2001,goussev12}, but it rather incorporates the contributions of the trajectories in the neighborhood of a given one. \begin{figure} \centerline{\includegraphics[width=0.48\textwidth]{fig1}} \caption{Graphical representation of $O^{(3)}(\mathbf{r}^{\prime},\mathbf{r};t)$ according to Eq.~\eqref{eq:O3semi} for the case in which the trajectories $s_1$ and $s_2$ remain close to each other. We note ${\tilde s}_{2}=T(s_{2})$ the time reversed trajectory of $s_{2}$. The color blue (red) is used for trajectories whose Hamilton principal function appears with a plus (minus) sign in the phase term of Eq.~\eqref{eq:O3semi}. The dashed (black) line represents the trajectory $s$, leaving from $\mathbf{\bar r}=(\mathbf{r}+\mathbf{r}^{\prime})/2$ and reaching $\mathbf{r}_{1}$ in a time $t$, used in Eq.~\eqref{eq:O3diag} to linearize the dynamics of nearby trajectories, while $\mathbf{p}_{s}^{\rm i}$ stands for its initial momentum, and the unitary vectors $\mathbf{\hat e}^{\parallel}_{s}$, $\mathbf{\hat e}^{\bot}_{s}$ define a local coordinate system. \label{fig:O3}} \end{figure} The graphical representation of Eqs.~\eqref{eq:O3semi} and \eqref{eq:O2semi} in the diagonal scheme is given in Figs.~\ref{fig:O3} and \ref{fig:O2}, respectively. The trajectories whose Hamilton principal function appears with a plus (minus) sign in the corresponding phase term are indicated in blue (red). For the second case, the time-reversed trajectories ${\tilde s}_{j}=T(s_{j}) $ are considered, in view of their use in the forthcoming semiclassical calculation. Auxiliary trajectories, indicated in black, are taken as support of the linearization procedure. In Appendix \ref{app:AP}, we consider an alternative pairing (Fig.~\ref{fig:O4}) with respect to the previous one, relevant for the cases of $O^{(1)}(\mathbf{r}^{\prime},\mathbf{r};t)$ and $O^{(2)}(\mathbf{r}^{\prime},\mathbf{r};t)$, showing that it does not result in an additional contribution within the leading order of the semiclassical calculation. \begin{figure} \centerline{\includegraphics[width=0.48\textwidth]{fig2}} \caption{ Graphical representation of $O^{(2)}(\mathbf{r}^{\prime},\mathbf{r};t)$ according to Eq.~\eqref{eq:O2semi} for the case in which the trajectories $s_1$ and $s_2$, as well as $s_3$ and $s_4$, remain close to each other, using the same color convention as in Fig.~\ref{fig:O3}. The dashed (black) lines represent the trajectories $s$ ($s'$), leaving from $\mathbf{\bar r}=(\mathbf{r}+\mathbf{r}_{2})/2$ ($\mathbf{\bar r}^{\prime}=(\mathbf{r}_{2}+\mathbf{r}^{\prime})/2$) and reaching $\mathbf{r}_{1}$ ($\mathbf{r}_{3}$) in a time $t$, used in Eq.~\eqref{eq:O2diag} to linearize the dynamics of nearby trajectories. \label{fig:O2}} \end{figure} The semiclassical approach used for the propagator, together with the diagonal scheme, imply that the points $\mathbf{r}$ and $\mathbf{r}^{\prime}$ of Eqs.~\eqref{eq:O3semi} and \eqref{eq:O2semi} remain close to each other. Thus, for the case of a billiard that we develop in this work, the Green function appearing in Eq.~\eqref{eq:OTOCImGF} can be expressed as the sum of the two-dimensional free-space Green function plus the contribution from nondirect classical trajectories joining $\mathbf{r}^{\prime}$ and $\mathbf{r}$. The first term is \begin{equation} G_{2 {\rm D}}(\mathbf{r},\mathbf{r}^{\prime};\varepsilon) = - \frac{{\rm i}}{4} \ H_0\left(k|\mathbf{r}^{\prime}-\mathbf{r}|\right) \ \frac{2m}{\hbar^2} \, , \label{eq:freeGF} \end{equation} where $H_0$ is the zeroth-order Hankel function of the first kind, $m$ the particle mass, and $\varepsilon=\hbar^2 k^2/2m$, while the second one has the form presented in Eq.~\eqref{eq:SCGF}. We first consider the contribution from Eq.~\eqref {eq:freeGF}, and in Appendix \ref{app:B} we provide the corrections arising from the nondirect trajectories. Since ${\rm Im} \{G_{2 {\rm D}}(\mathbf{r},\mathbf{r}^{\prime};\varepsilon)\} = -(1/4) J_0\left(k\left|\mathbf{r}^{\prime}-\mathbf{r}\right|\right) 2m/\hbar^2$, with $J_0$ the zeroth-order Bessel function of the first kind, the $k$-integral stemming from Eq.~\eqref{eq:OTOCImGF} can be readily performed \cite{GR} and we obtain for the OTOC components in the diagonal scheme \begin{equation} {\cal O}^{(j)}_{\rm d}(t) = \frac{1}{\cal A} \int {\rm d} \mathbf{r}^{\prime} \ {\rm d} \mathbf{r} \ \exp{\left[-\frac{m}{2 \beta \hbar^2} \left|\mathbf{r}^{\prime}-\mathbf{r}\right|^2 \right]} \ O^{(j)}_{\rm d}(\mathbf{r}^{\prime},\mathbf{r};t) \, . \label{eq:OTOCint} \end{equation} For the spatial integrations of Eq.~\eqref{eq:OTOCint}, applied to ${\cal O}^{(3)}_{\rm d}(t)$, we perform a center-of-mass plus relative coordinate change from the original variables $(\mathbf{r},\mathbf{r}^{\prime})$ to the new ones $(\mathbf{\bar r},\mathbf{\Delta r})$ by posing $\mathbf{\bar r}=(\mathbf{r}+\mathbf{r}^{\prime})/2$ (see Fig.~\ref{fig:O3}) and $\mathbf{\Delta r}=\mathbf{r}^{\prime}-\mathbf{r}$. In the diagonal scheme, the trajectories $s_{1}$ and $s_{2}$ remain close to each other, therefore \begin{align} R_{s_{1}}(\mathbf{r}_{1},\mathbf{r};t)-R_{s_{2}}(\mathbf{r}^{\prime},\mathbf{r}_{1};t) &= R_{s_{1}}(\mathbf{r}_{1},\mathbf{r};t)-R_{{\tilde s}_{2}}(\mathbf{r}_{1},\mathbf{r}^{\prime};t) \nonumber \\ & \simeq \mathbf{p}_{s}^{\rm i}.\mathbf{\Delta r} \, \end{align} up to quadratic order in $\mathbf{\Delta r}$. The trajectory $s$ goes from $\mathbf{\bar r}$ to $\mathbf{r}_{1}$ in time $t$, and we note $\mathbf{p}_{s}^{\rm i}$ its initial momentum (see Fig.~\ref{fig:O3}). Within this approximation, ${\cal O}^{(3)}(t)$ reads \begin{align} {\cal O}^{(3)}_{\rm d}(t) & = - \frac{1}{\left(2\pi \hbar\right)^2 {\cal A}} \int {\rm d} \mathbf{\bar r} \ {\rm d} \mathbf{\Delta r} \ {\rm d} \mathbf{r}_{1} \ \exp{\left[-\frac{m}{2 \beta \hbar^2} \mathbf{\Delta r}^2 \right]} \nonumber\\ & \sum_{s(\mathbf{\bar r},\mathbf{r}_{1};t)} C_{s} \ \left\{P_{X,s_{2}}^{\rm f} \left( X_{1} \right)^{2} P_{X,s_{1}}^{\rm i}\right\} \exp{\left[ \frac{{\rm i}}{\hbar} \mathbf{p}_{s}^{\rm i}.\mathbf{\Delta r} \right] } \, . \label{eq:O3diag} \end{align} With the new integration variables, the trajectory $s_{1}({\tilde s}_{2})$ is the one that leaves $\mathbf{\bar r} \mp \mathbf{\Delta r}/2$ and reaches $\mathbf{r}_{1} $ in time $t$ while remaining in the environment of $s$. Making the change of variables from $\mathbf{r}_{1}$ to $\mathbf{p}_{s}^{\rm i}$ (that we note $\mathbf{\bar p}$) makes the prefactor $C_{s}$ (which is the Jacobian of the transformation) and the sum over $s$ to disappear from Eq.~\eqref{eq:O3diag}, leading to \begin{align} {\cal O}^{(3)}_{\rm d}(t) & = - \frac{1}{\left(2\pi \hbar\right)^2 \cal A} \int {\rm d} \mathbf{\bar r} \ {\rm d} \mathbf{\Delta r} \ {\rm d} \mathbf{\bar p} \ \nonumber \\ & \ \ \exp{\left[-\frac{m}{2 \beta \hbar^2} \mathbf{\Delta r}^2 + \frac{{\rm i}}{\hbar} \mathbf{\bar p}.\mathbf{\Delta r} \right]} \ \left\{P_{X,s_{2}}^{\rm f} \left( X_{1} \right)^{2} P_{X,s_{1}}^{\rm i}\right\} \, , \label{eq:O3class0} \end{align} where the trajectory $s_{1} \left(s_{2}\right)$ joins the points $\mathbf{\bar r} \mp \mathbf{\Delta r}/2$ and $\mathbf{r}\left(\mathbf{\bar r}, \mathbf{\bar p};t\right)$ in time $t$. Similar lines as before can be applied for the calculation of ${\cal O}^{(2)}(t)$ from Eq.~\eqref{eq:OTOCint} within the diagonal scheme. However, in addition to the center-of-mass plus relative coordinate change from the variables $(\mathbf{r},\mathbf{r}_{2})$ to $(\mathbf{\bar r},\mathbf{\Delta r})$, we need to perform another one from the variables $(\mathbf{r}_{2},\mathbf{r}^{\prime})$ to $(\mathbf{\bar r}^{\prime},\mathbf{\Delta r}^{\prime})$, yielding \begin{widetext} \begin{align} {\cal O}^{(2)}_{\rm d}(t) & = \frac{1}{\left(2\pi \hbar\right)^4 {\cal A}} \int {\rm d} \mathbf{\bar r}^{\prime} \ {\rm d} \mathbf{\Delta r}^{\prime} \ {\rm d} \mathbf{\bar r} \ {\rm d} \mathbf{\Delta r} \ {\rm d} \mathbf{r}_{3} \ {\rm d} \mathbf{r}_{1} \ \delta \left(\mathbf{\bar r}^{\prime}-\mathbf{\bar r} - \frac{\mathbf{\Delta r}^{\prime} + \mathbf{\Delta r}}{2}\right) \ \exp{\left[-\frac{m}{2 \beta \hbar^2} \left(\mathbf{\bar r}^{\prime}-\mathbf{\bar r} + \frac{\mathbf{\Delta r}^{\prime} + \mathbf{\Delta r}}{2} \right)^2 \right]} \nonumber \\ & \sum_{s^{\prime}(\mathbf{\bar r}^{\prime},\mathbf{r}_{3};t)} \ \sum_{s(\mathbf{\bar r},\mathbf{r}_{1};t)} C_{s^{\prime}} \ C_{s} \ \left\{X_{3} \left(P_{X,s_{3}}^{\rm i} \right)^{2} X_{1}\right\} \ \exp{\left[ \frac{{\rm i}}{\hbar} \left( \mathbf{p}_{s^{\prime}}^{\rm i}.\mathbf{\Delta r}^{\prime} + \mathbf{p}_{s}^{\rm i}.\mathbf{\Delta r}\right) \right] } \, . \label{eq:O2diag} \end{align} With the new integration variables, the trajectory $s_{1}({\tilde s}_{2})$ is the one that leaves $\mathbf{\bar r} \mp \mathbf{\Delta r}/2$ and reaches $\mathbf{r}_{1} $ in time $t$ while remaining in the environment of $s$, and similarly $s_{3}({\tilde s}_{4})$ leaves $\mathbf{\bar r}^{\prime} \mp \mathbf{\Delta r}^{\prime}/2$ and reaches $\mathbf{r}_{3} $ in time $t$ while remaining in the environment of $s^{\prime}$ (see Fig.~\ref{fig:O2}). We now perform the changes of variable from $\mathbf{r}_{1}$ to $\mathbf{p}_{s}^{\rm i}$ (that we note $\mathbf{\bar p}$) and from $\mathbf{r}_{3}$ to $\mathbf{p}_{s^{\prime}}^{\rm i}$ (that we note $\mathbf{\bar p}^{\prime}$), as well the center-of-mass plus relative coordinate change from the variables $(\mathbf{\bar r},\mathbf{\bar r}^{\prime})$ to $(\mathbf{\hat r},\mathbf{\Delta {\hat r}})$. The integration over $\mathbf{\Delta {\hat r}}$ leads to \begin{align} {\cal O}^{(2)}_{\rm d}(t) & = \frac{1}{\left(2\pi \hbar\right)^4 {\cal A}} \int {\rm d} \mathbf{\hat r} \ {\rm d} \mathbf{\Delta r}^{\prime} \ {\rm d} \mathbf{\Delta r} \ {\rm d} \mathbf{\bar p}^{\prime} \ {\rm d} \mathbf{\bar p} \ \exp{\left[-\frac{m}{2 \beta \hbar^2} \left(\mathbf{\Delta r}^{\prime} + \mathbf{\Delta r} \right)^2 + \frac{{\rm i}}{\hbar} \left( \mathbf{\bar p}^{\prime}.\mathbf{\Delta r}^{\prime} + \mathbf{\bar p}.\mathbf{\Delta r}\right) \right]} \ \nonumber \\ & \left\{X\left(\mathbf{\hat r} + \frac{\mathbf{\Delta r}^{\prime} + \mathbf{\Delta r}}{4}, \mathbf{\bar p}^{\prime};t \right) \ \left(P_{X,s_{3}}^{\rm i} \right)^{2} X\left(\mathbf{\hat r} - \frac{\mathbf{\Delta r}^{\prime} + \mathbf{\Delta r}}{4},\mathbf{\bar p};t \right)\right\} \, , \label{eq:O2diag2} \end{align} where the trajectory $s_{3}$ joins the points $\mathbf{\hat r} - (\mathbf{\Delta r}^{\prime} - \mathbf{\Delta r})/4$ and $\mathbf{r}\left(\mathbf{\hat r} + (\mathbf{\Delta r}^{\prime} + \mathbf{\Delta r})/4, \mathbf{\bar p}^{\prime};t\right)$ in time $t$. Performing center-of-mass plus relative coordinate changes from the variables $(\mathbf{\Delta r},\mathbf{\Delta r}^{\prime})$ to $(\mathbf{u},\mathbf{v})$ and from the variables $(\mathbf{\bar p},\mathbf{\bar p}^{\prime})$ to $(\mathbf{\hat p},\mathbf{\Delta {\hat p}})$ we have \begin{align} {\cal O}^{(2)}_{\rm d}(t) & = \frac{1}{\left(2\pi \hbar\right)^4 {\cal A}} \int {\rm d} \mathbf{\hat r} \ {\rm d} \mathbf{u} \ {\rm d} \mathbf{v} \ {\rm d} \mathbf{\hat p} \ {\rm d} \mathbf{\Delta {\hat p}} \ \exp{\left[-\frac{2m}{\beta \hbar^2} \mathbf{u}^2 + \frac{{\rm i}}{\hbar} \left(2 \mathbf{\hat p}.\mathbf{u} + \frac{\mathbf{\Delta {\hat p}}.\mathbf{v}}{2} \right) \right]} \ \nonumber \\ & \left\{X\left(\mathbf{\hat r} + \frac{\mathbf{u}}{2}, \mathbf{\hat p} + \frac{\mathbf{\Delta {\hat p}}}{2};t \right) \left(P_{X,s_{3}}^{\rm i} \right)^{2} X\left(\mathbf{\hat r} - \frac{\mathbf{u}}{2},\mathbf{\hat p} - \frac{\mathbf{\Delta {\hat p}}}{2};t \right)\right\} \, . \label{eq:O2diag3} \end{align} \end{widetext} With the new integration variables, the trajectory $s_{3}$ joins the points $\mathbf{\hat r} - \mathbf{v}/4$ and $\mathbf{r}\left(\mathbf{\hat r} + \mathbf{u}/2,\mathbf{\hat p} + \mathbf{\Delta {\hat p}}/2;t\right)$ in time $t$. Equations~\eqref{eq:O3class0} and \eqref{eq:O2diag3} are the basis of the systematic expansion of the OTOC components in powers of $\hbar$. \section{Leading-order contribution of the OTOC components} \label{sec:LOCOTOCC} In the leading order of $\hbar$ for Eq.~\eqref{eq:O3class0}, we use a strict diagonal condition ${\tilde s}_{2}=s_{1}$ for the terms within the curly bracket, and take $P_{X,s_{2}}^{\rm f} = - P_{X,{\tilde s}_{2}}^{\rm i} = - P_{X,s_{1}}^{\rm i}$. We will call this approximation {\it classical}, and note the corresponding results by the index ``${\rm cl}$''. Writing $\mathbf{\Delta r} = \Delta {\hat r}^{\parallel} \mathbf{\hat e}^{\parallel}_{s} + \Delta {\hat r}^{\bot} \mathbf{\hat e}^{\bot}_{s}$, where $(\mathbf{\hat e}^{\parallel}_{s},\mathbf{\hat e}^{\bot}_{s})$ is the local coordinate system sketched in Fig.~\ref{fig:O3}, we perform the $\Delta {\hat r}^{\parallel}$ and $\Delta {\hat r}^{\bot}$ integrals, which results in the purely classical expression \begin{equation} {\cal O}_{\rm cl}(t) = \frac{\beta}{2\pi {\cal A} m} \int {\rm d} \mathbf{\bar r} \ {\rm d} \mathbf{\bar p} \ \exp{\left[-\beta\frac{ \mathbf{\bar p}^2}{2 m} \right]} \ \{ {\bar P}_{X}^{2} \ X^{2}(\mathbf{\bar r},\mathbf{\bar p};t) \} \, . \label{eq:O3class} \end{equation} We have dropped the upper-index (3) from the last expression, since we will show in the sequel that the other components of the OTOC are also given by Eq.~\eqref{eq:O3class}. Turning to the calculation of ${\cal O}^{(2)}(t)$, to leading order in $\hbar$, we use the strict diagonal condition within the curly bracket of Eq.~\eqref{eq:O2diag3}. The $\mathbf{v}$ and $\mathbf{\Delta {\hat p}}$-integrals can be trivially done, leading to \begin{align} {\cal O}^{(2)}_{\rm cl}(t) &= \frac{1}{(\pi \hbar)^2{\cal A}} \int {\rm d} \mathbf{\hat r} \ {\rm d} \mathbf{u} \ {\rm d} \mathbf{\hat p} \ \nonumber \\ & \ \ \exp{\left[-\frac{2m}{\beta \hbar^2} \mathbf{u}^2 + \frac{2{\rm i}}{\hbar} \mathbf{\hat p}.\mathbf{u} \right]} \ \{ {\hat P}_{X}^{2} \ X^{2}(\mathbf{\hat r},\mathbf{\hat p};t) \} \, . \label{eq:O2class} \end{align} The $\mathbf{u}$-integration then yields the result Eq.~\eqref{eq:O3class}. At this level of approximation, the calculation for ${\cal O}^{(1)}_{\rm cl}(t)$ is equivalent to that of ${\cal O}^{(2)}_{\rm cl}(t)$, and thus, also given by Eq.~\eqref{eq:O3class}. We notice that the prefactor multiplying the integrals of Eq.~\eqref{eq:O3class} can be simply cast as $[(2\pi \hbar)^2 Z]^{-1}$ and that the classical expression of the OTOC components directly follows from the thermal average of the operators explicit in Eq.~\eqref{allO}, without the need of going through the previous semiclassical derivation. The usefulness of following the above-described procedure is to set the basis of a systematic semiclassical expansion for the OTOC. Since all components of the OTOC coincide in the classical limit, we necessarily have ${\cal C}_{\rm cl}(t)=0$. Such a result is not surprising, since the finite value of ${\cal C}(t)$ arises from noncommutation, which is a purely quantum concept. The classical limit of the OTOC components, even if canceling among themselves when evaluating ${\cal C}(t)$, are interesting to analyze, in particular in relation with their scaling with respect to the characteristic quantities of the problem. For instance, its zero-time value is simply given by \begin{equation} {\cal O}_{\rm cl}(t\!=\!0) = m \ {\cal G}_{Y}^{2} \ \kb T \, , \label{eq:teq0} \end{equation} where the gyration ratio ${\cal G}_{Y}$ of the stadium with respect to the $Y$-axis is defined by \begin{equation} {\cal G}_{Y}^{2} = \frac{1}{\cal A} \int {\rm d} \mathbf{r} \ X^2 \, . \end{equation} For times smaller than the one corresponding to the first bounce off the billiard walls $\mathbf{r}(\mathbf{\bar r},\mathbf{\bar p};t)=\mathbf{\bar r}+(\mathbf{\bar p}/m)t$, and then \begin{equation} {\cal O}_{\rm cl}(t) - {\cal O}_{\rm cl}(t\!=\!0) = 3 \left(\kb T \right)^2 t^2 = 3 m \ \kb T \ \ell^2 \, \label{eq:quadrbeh}, \end{equation} where the length $\ell = {\tilde v} t$ provides the appropriate scaling. We use ${\tilde v} = \left\langle V_X^2 \right\rangle^{1/2} = (\kb T/m)^{1/2}$ the root-mean-square for the $X$-component of the velocity in the free two-dimensional case. In a billiard, the energy of the trajectories is simply scalable, and therefore the momentum integral in Eq.~\eqref{eq:O3class} can be tackled by using polar coordinates. In following such a path, we see that ${\cal O}_{\rm cl}(t)$ scales linearly with the temperature $T$. The form of Eq.~\eqref{eq:O3class} applies even if we trade the operators ${\hat X}$ and ${\hat P}_{X}$ by arbitrary local ones ${\hat A}$ and ${\hat B}$. However, the resulting temperature scaling is characteristic of the particular choice of operators. \section{Quantum numerical calculation of the OTOC components} \label{sec:QNCOTOCC} Since ${\cal O}_{\rm cl}(t)$ is the leading contribution to all the ${\cal O}^{(j)}(t)$, it is meaningful to compare the quantum calculations of the latter with our theoretical prediction for the former, {\it i.e.} Eq.~\eqref{eq:O3class}. In Fig.~\ref{fig:Oj}, we show the quantum numerical calculations of ${\cal O}^{(j)}(t)$, at various temperatures $T$ (indicated by the color scale), for the unsymmetrical stadium sketched in the inset of Fig.~\ref{fig:Oj}(c). \begin{figure} \centerline{\includegraphics[width=0.48\textwidth]{fig3}} \caption{ Numerically obtained OTOC components ${\cal O}^{(1)}(t)$ (a), ${\cal O}^{(2)}(t)$ (b), and ${\cal O}^{(3)}(t)$ (c) (divided by $\kb T$ and in units of $ma^2$) for the unsymmetrized stadium sketched in the inset of panel (c), as a function of the scaled time (length) $\ell = {\tilde v} t$ (in units of $a$), with $ {\tilde v} = (\beta m)^{-1/2}$ the mean-squared $X$-velocity component. The color code indicates the temperature scale, expressing $\kb T/E_0$ in a $\log_2$ basis, with $E_0=\hbar^2/(ma^2)$. The inset of panel (b) presents ${\cal O}^{(2)}(t)$, scaled with $T^{\xi}$ and $\xi=0.99$, in arbitrary units on the same $\ell/a$ interval of the main figure. The inset of panel (a) presents ${\cal O}^{(1)}(t)/(\kb T)$ in a logarithmic scale for the intermediate range of $\ell/a$ indicated in the horizontal axis. Within the leading order in $\hbar$, the quantum numerical results for ${\cal O}^{(j)}(t)$ should be compared with the classical expression Eq.~\eqref{eq:O3class}. \label{fig:Oj}} \end{figure} For the numerical calculations of the OTOC and its components, we first compute the eigenstates of the stadium using the scaling method introduced in Ref.~\cite{vergini95}. We then build the matrix associated with the ${\hat X}$ operator in the eigenenergy basis, and subsequently the ${\hat P}_X$ matrix, using that for the stadium $[{\hat H},{\hat X}]=-2 {\rm i} {\hat P}_X$. Therefore the matrix elements of ${\hat P}_X$ can be obtained as \begin{equation} (P_X)_{mn}=\frac{{\rm i}}{2} \ E_{mn} \ X_{mn} \, , \end{equation} where $E_{mn}=E_m-E_n$, $X_{mn}=\langle m | {\hat X} |n \rangle$, and $(P_X)_{mn}=\langle m | {\hat P}_X |n \rangle$, with $|m\rangle$ ($|n\rangle$) the energy eigenstate corresponding to the energy $E_m (E_n)$. We truncate the basis to $5600$ states, and we use the first $5000$. We have checked that for the temperatures that we show here, the results are converged as a function of the basis size. At the highest temperatures that we consider, the restriction of working with a finite basis starts to limit the accuracy of the numerical calculations. The scaling of the time (through the length $\ell = {\tilde v} t$) and of the values of the OTOC components (with the temperature $T$) are chosen in view of the theoretical predictions for ${\cal O}_{\rm cl}(t)$. While the linear-in-$T$ scaling of the OTOC components works quite well, we notice that a slightly better data collapsing of the numerical data is obtained when using a scaling of the form $T^{\xi}$ (with $\xi=1.03$ for ${\cal O}^{(1)}(t)$, and $\xi=0.99$ for ${\cal O}^{(2)}(t)$ and ${\cal O}^{(3)}(t)$). Such a scaling, applied to ${\cal O}^{(2)}(t)$ is presented as an inset in Fig.~\ref{fig:Oj}(b). The smallness of the difference between the theoretical estimation for the leading-order contribution and the quantum mechanical calculation of the OTOC components makes it difficult to advance a possible explanation for such a discrepancy. We can see that, for a given temperature and time, all three ${\cal O}^{(j)}(t)$ are of the same order, and thus ${\cal C}(t)$, that results from their difference, will in general be much smaller than each of them. The numerically obtained values of ${\cal O}^{(j)}(t\!=\!0)$, and the initial quadratic increase with $\ell$, are in qualitative agreement with the classical results predicted by Eqs.~\eqref{eq:teq0} and \eqref{eq:quadrbeh}, respectively. The oscillations as a function of $\ell$, visible at low temperatures, reflect the dynamics of the billiard and the signature of the periodic-orbit corrections (see Appendix \ref{app:B}). We remark that the mean-trajectory-length at temperature $T$ is $\sqrt{\pi/2} \ \ell$. According to Eq.~\eqref{eq:O3class}, the long-time saturation value for the OTOC components should be equal to ${\cal O}_{\rm cl}(t=0)$, due to the uniform distribution of $X(\mathbf{\bar r},\mathbf{\bar p};t)$ for $t \rightarrow \infty$. However, the numerical results yield a smaller saturation value for ${\cal O}^{(1)}(t)$, and slightly higher one for ${\cal O}^{(2)}(t)$ and ${\cal O}^{(3)}(t)$, pointing to the importance of periodic-orbit (discussed in Appendix \ref{app:B}) and other quantum corrections in the long-time limit. The exponential decrease of ${\cal O}^{(1)}(t)$ for $2 \lesssim \ell/a \lesssim 10$, before approaching a saturation value smaller than that of ${\cal O}^{(2)}(t)$ and ${\cal O}^{(3)}(t)$ (see inset of Fig.~\ref{fig:Oj}.a), is in line with the behavior obtained for unitary quantum maps \cite{gsjrw18}. \section{OTOC in the semiclassical limit} \label{sec:OTOCSL} As discussed in the previous chapters, the OTOC is determined by the quantum corrections to its vanishing in the classical limit. Leaving aside the cases treated in the appendices, the quantum corrections stem from the difference between the diagonal scheme (presented in Sec.~\ref{sec:DSOTOCc}) and its classical limit (or strict diagonal approximation used in Sec.~\ref{sec:LOCOTOCC}). In order address such corrections, we undertake the case of ${\cal O}^{(1)}_{\rm d}(t)$, for which the curly bracket of Eq.~\eqref{eq:O2diag} should be replaced by $X_{3} P_{X,s_{3}}^{\rm i} X_{1} P_{X,s_{1}}^{\rm i}$. Following the same procedure as with ${\cal O}^{(2)}_{\rm d}(t)$, instead of Eq.~\eqref{eq:O2diag3} we have \begin{widetext} \begin{align} {\cal O}^{(1)}_{\rm d}(t) & = - \frac{1}{\left(2\pi \hbar\right)^4 {\cal A}} \int {\rm d} \mathbf{\hat r} \ {\rm d} \mathbf{\Delta {\hat r}} \ {\rm d} \mathbf{u} \ {\rm d} \mathbf{v} \ {\rm d} \mathbf{\hat p} \ {\rm d} \mathbf{\Delta {\hat p}} \ \delta \left(\mathbf{\Delta {\hat r}} - \mathbf{u} \right) \ \exp{\left[-\frac{m}{2 \beta \hbar^2} \left(\mathbf{\Delta {\hat r}} + \mathbf{u} \right)^2 \right]} \ \nonumber \\ & \left\{X\left(\mathbf{\hat r} + \frac{\mathbf{u}}{2}, \mathbf{\hat p} + \frac{\mathbf{\Delta {\hat p}}}{2};t \right) P_{X,s_{3}}^{\rm i} X\left(\mathbf{\hat r} - \frac{\mathbf{u}}{2},\mathbf{\hat p} - \frac{\mathbf{\Delta {\hat p}}}{2};t \right) P_{X,s_{1}} ^{\rm i} \right\} \ \exp{\left[ \frac{{\rm i}}{\hbar} \left(2 \mathbf{\hat p}.\mathbf{u} + \frac{\mathbf{\Delta {\hat p}}.\mathbf{v}}{2} \right) \right] } \, . \label{eq:O1diag3} \end{align} \end{widetext} The trajectory $s_{1}$ joins the points $\mathbf{\hat r} -\mathbf{u} + \mathbf{v}/4$ and $\mathbf{r}\left(\mathbf{\hat r} - \mathbf{u}/2,\mathbf{\hat p} - \mathbf{\Delta {\hat p}}/2;t\right)$ in time $t$. The trajectory $s_{3}$, as a function of the new variables, has been defined after Eq.~\eqref{eq:O2diag3}. Within the diagonal scheme, but going beyond the classical approximation of Sec.~\ref{sec:LOCOTOCC}, we must incorporate the effect of having $s_{1} \neq {\tilde s}_{2}$ and $s_{3} \neq {\tilde s}_{4}$. Towards such a goal, we start by linearizing the dynamics of ${\tilde s}_{1}$ around that of ${\tilde s}$. Working with the time-reversal trajectories is not crucial, but has an easier visualization since these paths are diverging from a common initial point (see Figs.~\ref{fig:O3} and \ref{fig:O2}). Using local coordinates parallel and perpendicular to ${\tilde s}$, we can link the initial and final displacements with respect to this path through the corresponding stability matrix $S_{\tilde s}$ \begin{equation} \left( \begin{array}{c} \delta q^{\parallel }_{t} \\ \delta q^{\bot }_{t} \\ \delta p^{\parallel }_{t} \\ \delta p^{\bot }_{t} \\ \end{array} \right) = S_{\tilde s} \left( \begin{array}{c} \delta q^{\parallel }_{0} \\ \delta q^{\bot }_{0} \\ \delta p^{\parallel }_{0} \\ \delta p^{\bot }_{0} \\ \end{array} \right) \end{equation} Using the monodromy matrix of the dynamics on Riemann surfaces of constant negative curvature characterized by a Lyapunov exponent $\lambda$ , and the fact that $\delta q^{\parallel }_{0} = \delta q^{\bot }_{0} = 0$ for the displacement of ${\tilde s}_{1}$ with respect to ${\tilde s}$, we have \begin{subequations} \label{eq:alldis} \begin{eqnarray} \mathbf{r}-\mathbf{\bar r} &=& - \frac{t}{m} \ \delta p^{\parallel }_{0} \ \mathbf{\hat e}^{\parallel }_{s} - \frac{\sinh{(\lambda t)}}{m\lambda} \ \delta p^{\bot }_{0} \ \mathbf{\hat e}^{\bot }_{s} \, , \label{eq:disr} \\ \mathbf{p}_{s_1}^{\rm i}-\mathbf{\bar p} &=& \delta p^{\parallel }_{0} \ \mathbf{\hat e}^{\parallel }_{s} + \cosh{(\lambda }t) \ \delta p^{\bot }_{0} \ \mathbf{\hat e}^{\bot }_{s} \, . \label{eq:disp} \end{eqnarray} \end{subequations} In the left-hand-side we have used the initial displacement of $s_{1}$, which is the final one of ${\tilde s}_{1}$ (with the inversion of the momentum). In the right-hand-side we kept the intial displacement of the time reversed trajectory and used, as in Fig.~\ref{fig:O3}, the local unit vectors $\mathbf{\hat e}^{\parallel}_{s}$ and $\mathbf{\hat e}^{\bot}_{s}$ parallel and perpendicular, respectively, to $s$ at its initial point. The projection of the transverse momentum and position displacements of Eq.~\eqref{eq:alldis} on the $\mathbf{\hat e}^{\bot}_{s}$ direction are related through \cite{Goussev2008} \begin{equation} \left(\mathbf{p}_{s_1}^{\rm i}-\mathbf{\bar p}\right)^{\bot} \simeq m\lambda \left( \mathbf{r}-\mathbf{\bar r} \right)^{\bot} \, , \end{equation} for long enough trajectories such that $\lambda t \gg 1$. And a similar relationship holds for $s_{3}$, which remains close to $s'$. We then have \begin{align} P_{X,s_{3}}^{\rm i} P_{X,s_{1}}^{\rm i} & \simeq {\hat P}_{X}^{2} - \left(\frac{\mathbf{\Delta {\hat p}}_X}{2} \right)^2 + \left(\frac{ m\lambda}{2} \right)^2 \left(\left(\mathbf{u}^{\bot }_{X} \right)^{2} - \left(\frac{\mathbf{v}^{\bot }_{X}}{2} \right)^{2} \right) \nonumber \\ & \ \ +m\lambda \left({\hat P}_{X}.\mathbf{u}^{\bot }_{X} - \frac{\mathbf{\Delta {\hat p}}_X.\mathbf{v}^{\bot }_{X}}{8} \right) \, . \label{eq:Pproduct} \end{align} Along the same lines, we can linearize $s$ and $s'$ around the trajectory ${\hat s}$ that leaves from $\mathbf{\hat r}$ with momentum $\mathbf{\hat p}$ taking a time $t$. We then have \begin{equation} \mathbf{r}_{3,1} = \mathbf{r}\left(\mathbf{\hat r},\mathbf{\hat p};t \right) \pm \frac{1}{2} \left[ S_{\hat s} \left( \begin{array}{c} \Delta {\hat r}^{\parallel} \\ \Delta {\hat r}^{\bot} \\ \Delta {\hat p}^{\parallel} \\ \Delta {\hat p}^{\bot} \\ \end{array} \right) \right]_{\rm rs} \, , \end{equation} where the notation $[\ldots]_{\rm rs}$ indicates that only the real-space coordinates of the four-dimensional phase-space vector are considered. For long enough trajectories, only the exponentially increasing terms of the stability matrix are kept, and we can furthermore assume that the direction of the final momentum is isotropically distributed. Therefore, \begin{align} X\left(\mathbf{\bar r}^{\prime}, \mathbf{\bar p}^{\prime};t \right)X\left(\mathbf{\bar r}, \mathbf{\bar p};t \right) - X^2\left(\mathbf{\hat r}, \mathbf{\hat p};t \right) \simeq \ \nonumber\\ & \hspace{-2cm}-\frac{e^{2\lambda t}}{8} \left(\Delta {\hat r}^{\bot} + \frac{ 1}{m \lambda} \Delta {\hat p}^{\bot} \right)^{2} \, . \label{eq:Xproduct} \end{align} Within the previous approximation, the time-independent correction arising from Eq.~\eqref{eq:Pproduct} is irrelevant. Clearly, there appears a limitation to the validity of the exponential increase in the trajectory separation used in Eq.~\eqref{eq:Xproduct}, that cannot hold beyond the typical size of the system (of the order of $a$ for the billiard that we study). Such a restriction defines critical values of $\Delta {\hat r}^{\bot}$ and $\Delta {\hat p}^{\bot}$ beyond which the integrand is no longer exponentially increasing with time. In the next section, we discuss this issue, which is crucial to describe the long-time limit of the OTOC. Staying away from such a limit, we adopt Eq.~\eqref{eq:Xproduct}, and thus we write \begin{widetext} \begin{align} \delta {\cal O}^{(1)}(t) & = {\cal O}^{(1)}_{\rm d}(t) - {\cal O}_{\rm cl}(t) = - \frac{1}{8 \left(2\pi \hbar\right)^4 {\cal A}} \int {\rm d} \mathbf{\hat r} \ {\rm d} \mathbf{\Delta {\hat r}} \ {\rm d} \mathbf{u} \ {\rm d} \mathbf{v} \ {\rm d} \mathbf{\hat p} \ {\rm d} \mathbf{\Delta {\hat p}} \ \delta \left(\mathbf{\Delta {\hat r}} - \mathbf{u} \right) \nonumber \\ & \exp{\left[-\frac{m}{2 \beta \hbar^2} \left(\mathbf{\Delta {\hat r}} + \mathbf{u} \right)^2 \right]} \ \left\{ e^{2\lambda t} \left(\Delta {\hat r}^{\bot} + \frac{ 1}{m \lambda} \Delta {\hat p}^{\bot} \right)^{2} {\hat P}_{X}^{2} \right\} \ \exp{\left[ \frac{{\rm i}}{\hbar} \left(2 \mathbf{\hat p}.\mathbf{u} + \frac{\mathbf{\Delta {\hat p}}.\mathbf{v}}{2} \right) \right] } \, . \label{eq:deltaO1} \end{align} Performing the $\mathbf{\Delta {\hat r}}$, $\mathbf{v}$, and $\mathbf{\Delta {\hat p}}$ integrals, we have \begin{equation} \delta {\cal O}^{(1)}(t) = - \frac{1}{2(2 \pi \hbar)^2{\cal A} } \int {\rm d} \mathbf{\hat r} \ {\rm d} \mathbf{u} \ {\rm d} \mathbf{\hat p} \ \exp{\left[-\frac{2m}{\beta \hbar^2} \mathbf{u}^2 + \frac{2{\rm i}}{\hbar} \mathbf{\hat p}.\mathbf{u} \right]} \ \left\{ e^{2\lambda t} \left(\mathbf{u}^{\bot } \right)^{2} {\hat P}_{X}^{2} \right\} \, . \label{eq:deltaO1p} \end{equation} Using the decomposition $\mathbf{u}= U^{\parallel } \ \mathbf{\hat e}^{\parallel}_{\tilde s} + U^{\bot } \ \mathbf{\hat e}^{\bot}_{\tilde s}$, the $U^{\parallel }$ and $U^{\bot }$ integrals can be readily done. At the level of approximation that we are working with $\delta {\cal O}^{(2)}(t)=\delta {\cal O}^{(1)}(t)$ and $\delta {\cal O}^{(3)}(t)=0$, thus \begin{equation} {\cal C}(t) = - \delta {\cal O}^{(1)}(t) = \frac{1}{64\pi} \ \frac{\beta^2 \hbar^2}{{\cal A} m^2} \int {\rm d} \mathbf{\hat r} \ {\rm d} \mathbf{\hat p} \ \exp{\left[-\beta\frac{ \mathbf{\hat p}^2}{2 m} \right]} \ \left\{ e^{2\lambda\left(|\mathbf{\hat p}| \right) t} \ {\hat P}_{X}^{2} \right\} \, . \label{eq:Csemiclass} \end{equation} We have stressed the $|\mathbf{\hat p}|$ dependence of $\lambda$ in the last equation. The $\mathbf{\hat r}$-integral is now trivial and it simply leads to the cancellation of the factor ${\cal A}$. As expected, the OTOC scales with $\hbar^2$. The corresponding prefactor is a purely classical (time and temperature-dependent) one. \end{widetext} \section{Long-time and low-temperature behavior of the OTOC} \label{sec:LowTBOTOC} In a billiard we have $\lambda\left(|\mathbf{\hat p}| \right) t = \lambda_{\rm g} L $, with $L = (|\mathbf{\hat p}|/m)t$ the trajectory length and $\lambda_{\rm g}= (m/|\mathbf{\hat p}|) \lambda$ a purely geometrical Lyapunov exponent. Using polar coordinates, the angular part of the $\mathbf{\hat p}$-integration can be readily done, leading to \begin{equation} {\cal C}(t) = \frac{\beta^2 \hbar^2}{64 m^2} \int {\rm d} p \ \ p^{3} \ \exp{\left[-\beta\frac{p^2}{2 m} + \frac{2\lambda_{\rm g} t}{m} p\right]} \ \, , \label{eq:Csemiclass2} \end{equation} The $p$-integration admits a closed expression in terms of the error function. However, its capability to predict the short and long-time behavior of the OTOC is limited by the various approximations leading to Eq.~\eqref{eq:Csemiclass2}. In particular, the above-discussed limitations of Eq.~\eqref{eq:Xproduct} for describing large times or momenta. Such a finite-size effect can be accounted for by separating the $\mathbf{u}$-integral of Eq.~\eqref{eq:deltaO1p} in two pieces. The first one, up to $|\mathbf{u}^{\bot}| \sim a \ e^{-2\lambda t}$, has the same integrand than Eq.~\eqref{eq:deltaO1p}, while for larger values of $|\mathbf{u}^{\bot}|$ the curly bracket can be traded by $a^2 {\hat P}_{X}^{2}$. The second contribution dominates in the long-time limit, leading to a saturation value \begin{equation} {\cal C}_{\rm s} \varpropto m a^2 \kb T \, , \label{eq:CLongT} \end{equation} which scales with the temperature and the area of the billiard, but is independent of $\hbar$, in agreement with the findings of Ref.~\onlinecite{hmy17}. For sufficiently low temperatures and not too long times, the term $e^{2\lambda_{\rm g} p t/m}$ in Eq.~\eqref{eq:Csemiclass2} behaves a smooth function of $p$ that can be taken outside of the integral, leading to a growth of ${\cal C}(t)$ with a rate $\Lambda$ given by the Lyapunov exponent corresponding to the average velocity. Such a procedure can be formalized by tackling the $p$-integral Eq.~\eqref{eq:Csemiclass} by the steepest-descent method, which for small $ \lambda_{\rm g} {\tilde v} t$ leads to \begin{equation} \frac{{\cal C}_{\rm LT}(t)}{\hbar^2} \varpropto \exp{\left[\sqrt{3} \ \lambda_{\rm g} {\tilde v} t \right]} \, , \label{eq:CLowT} \end{equation} We then have $\Lambda=\sqrt{3} \ \lambda_{\rm g} {\tilde v}$ for an intermediate time-window and sufficiently low temperatures. For increasing temperatures, the previous reasoning stops being valid and there is no time-window where the exponential growth of the OTOC can be observed. \section{Quantum numerical calculation of the OTOC} \label{sec:QNCOTOC} In Fig.~\ref{fig:tse} we present the quantum numerical calculations of the OTOC, according to the procedure described in Sec.~\ref{sec:QNCOTOCC}, for the billiard sketched in Fig.~\ref{fig:Oj}.c. For a given temperature and time, the typical values of ${\cal C}(t)$ are much smaller than those of its components ${\cal O}^{(j)}(t)$ (except for the long-time saturation values), confirming that the OTOC results from the small quantum correction of its components. \begin{figure} \centerline{\includegraphics[width=0.48\textwidth]{fig4}} \caption{ Numerically obtained OTOC (in a logarithmic scale) as a function of the scaled time (length) $\ell = {\tilde v} t$ for different temperatures according to the color scale (following the same conventions than in Fig.~\ref{fig:Oj}). The black straight lines describe the corresponding exponential growth $e^{\sqrt{3} \lambda_{\rm g} \ell}$ applicable in an intermediate time-window. Inset: OTOC scaled with the temperature (in a linear scale) in a larger $\ell/a$ interval showing its saturation in the long-time limit. \label{fig:tse}} \end{figure} For increasing values of $\ell$, we first notice a narrow regime with a quadratic take-off, followed by a regime of rapid growth. Further on, we identify a $\ell$-window with an exponential increase of the OTOC, well fitted when using the rate $\Lambda$ estimated in Eq.~\eqref{eq:CLowT} and the value $\lambda_g=0.425 a^{-1}$ applicable to the chosen billiard (black solid lines). The saturation of the OTOC for large times (see inset) completes the listing of observed regimes. The initial quadratic dependence (on $\ell$ or $t$) is characteristic of quantum perturbation theory, and it is thus expected in any kind of system. The ensuing rapid growth is also observed in a rectangle billiard (data not shown), as well as in other integrable systems (i.e. circle and particle-in-a-box) \citep{hmy17}. The semiclassical approach of Secs.~\ref{sec:OTOCSL} and \ref{sec:LowTBOTOC} does not allow to access such a regime, corresponding to times much smaller than that of the first collision (which for a trajectory with the mean velocity occurs for $\ell/a \simeq 0.4$). The differences between chaotic and integrable systems appear in the regimes occurring for $\ell/a \gtrsim 0.4$. For the latter case, it is not possible to identify a window of exponential growth as in Fig.~\ref{fig:tse}, and also, no clear saturation of ${\cal C}(t)$ is observed. While the exponential fit performed in the interval $0.4 \lesssim \ell/a \lesssim 1.5$ is hindered by the limited range of growth, the rate predicted by Eq.~\eqref{eq:CLowT} provides a good description at all working temperatures. Moreover, for these values of $\ell/a$, it is meaningful to confront the quantum numerical results with the semiclassical calculations. We remark that trajectories longer than those with the mean-trajectory-length are included in the semiclassical expressions like Eq.~\eqref{eq:Csemiclass} and may result in an important contribution. The exponential regime is further put in evidence in Fig.~\ref{fig:sr}(a), where we scaled ${\cal C}(t)$ with $\exp{(\sqrt{3} \lambda_{\rm g} \ell)}$. The time-window of the exponential growth increases when lowering the temperatures, in agreement with the theoretical prediction. A numerical prefactor $\alpha(T)$, with a weak (logarithmic) temperature dependence, characterizes this regime, [Fig.~\ref{fig:sr}(b)]. The fitting to the exponential form becomes poorer upon increasing the temperature, since, as discussed before Eq.~\eqref{eq:CLowT}, the thermal average does not simply select a mean velocity. \begin{figure} \centerline{\includegraphics[width=0.48\textwidth]{fig5}} \caption{Same data as in Fig.~\ref{fig:tse}, showing the OTOC, scaled with $e^{\sqrt{3} \lambda_{\rm g} \ell}$ (a), and with $\alpha(T) e^{\sqrt{3} \lambda_{\rm g} \ell}$ (b), as a function of the time $t$ (scaled with $t_0=ma^2/\hbar$) for different temperatures according to the color scale (following the same conventions than in Fig.~\ref{fig:Oj}). The time-window where the exponential growth provides a good description of the OTOC increases upon decreasing the temperature. Inset: scaling parameter $\alpha(T)$ exhibiting an approximate logarithmic temperature dependence. \label{fig:sr}} \end{figure} The saturation of the OTOC for long times is expected for a finite-size system \cite {kgp17,cdp17,rur18} and has been observed in the numerical simulations performed in several physical cases \cite{rgg17,hmy17,letal17,gsjrw18}. From the inset of Fig.~\ref{fig:tse}, we see that the value of the long-time saturation of the OTOC is proportional to the temperature. In addition to the term given by Eq.~\eqref{eq:CLongT} (proportional to temperature), we should consider the contribution arising from the different long-time value of the OTOC components, discussed in Sec.~\ref{sec:QNCOTOCC} (also proportional to temperature). Moreover, it is important to remark that quantifying the saturation values of quantities like the OTOC or the Loschmidt echo, whose semiclassical expression depend on four trajectories is difficult, due to the different possible pairings \cite{gg09} and the effect of trajectory loops \cite{sieber2001,gwgkr}. As in the case of Eq.~\eqref{eq:O3class}, the choice of the operator pair does not alter the structure of Eq.~\eqref{eq:Csemiclass}, but it merely modifies the phase-space variables within the curly bracket. These changes have important consequences for the final results, since in the thermal average the Boltzmann factor weights the states according to their energy. For instance, taking $A=B=X$ simply requires trading the term ${\hat P}_X^2$ inside the curly bracket by $X^2$. The stationary-phase procedure that leads to Eq.~\eqref{eq:CLowT}, now requires much lower temperatures to be applicable. The quantum numerical results for the OTOC in this case (not shown) exhibit a monotonous increase with time, up to a temperature-independent saturation value, but a window of exponential growth cannot be identified when the range of temperatures of Fig.~\ref{fig:tse} is investigated. Consistent with the previous analysis, the temperature dependence of the OTOC in the case $A=B=X$ is inverted with respect to that of the case $A=X$, $B=P_X$ of Fig.~\ref{fig:tse}. Taking $A=B=P_X$ results in very different OTOC components, with respect to the other two previously discussed cases, while for the associated OTOC a time window of exponential growth can be identified (not shown). \section{Conclusions} \label{sec:conclusions} The OTOC of quantum operators in low-dimensional systems has been addressed by semiclassical and numerical techniques. The four-point OTOC ${\cal C}(t)$ can be expressed in terms of three components ${\cal O}^{(j)}(t)$, for $j=1,2,3$. Introducing the semiclassical expression of the propagator, ${\cal O}^{(3)}(t)$, results as a sum of terms depending on pairs of trajectories, while the other two components, ${\cal O}^{(1)}(t)$ and ${\cal O}^{(2)}(t)$, require the simultaneous treatment of four classical trajectories. The leading-order $\hbar^0$ approximation for each of the three components of the OTOC is the same, such that at the classical level the OTOC vanishes for all times. The OTOC, stemming from the difference of these components is of order $\hbar^2$, and is much smaller than each of them. The case of the position and momentum operators in a two-dimensional classically chaotic system has been chosen to illustrate the capability of semiclassical expansions to obtain the first leading order terms in the $\hbar$ expansion of the OTOC. Numerical quantum calculations of the OTOC and its components, using a unsymmetrical billiard, were carried out to test the semiclassical results and set their limit of validity. The leading-order (classical) approximation to the OTOC components was shown to provide a good description of the numerical results, and the differences detected for long-times were attributed to quantum corrections. The semiclassical approach to the OTOC yielded an exponential increase within a limited time-window between the initial fast increase and the saturation for large times. The corresponding growth rate was in good agreement with that of the numerical calculations. The semiclassical approach, as well as the numerical one, predict that the time-window exhibiting exponential growth of the OTOC becomes larger as the temperature of the system diminishes. The bound on the OTOC growth-rate proposed in Ref.~\cite{mss16} is $\Lambda \le 4\pi \kb T/\hbar$, while we obtained $\Lambda=\sqrt{3} \ \lambda_{\rm g} {\tilde v}$. Thus, for the system and the operators considered, the proposed bound would hold if $ \kb T \ge 3\hbar^2 \lambda_{\rm g}^2/(16 \pi^2 m)$. We then conclude that the fulfillment of the bound is guaranteed, unless $\kb T$ is of the order of the ground state of the billiard. Notwithstanding, the prediction of a global growth for the OTOC encounters two limitations. Firstly, the thermal average necessarily mixes different growths given by an energy-dependent Lyapunov exponent. Secondly, the finite-size of the systems under consideration necessarily leads to a saturation of the OTOC for large times. A different choice of operators results in similar semiclassical expressions to the ones obtained in this work, but the thermal average gives to the OTOC and its components a temperature dependence that is very sensitive to the nature of these operators. The choice of an initial thermal state results in the mixing of various growth rates, and therefore in a different behavior of the OTOC, with respect to the case of an initially localized wave-packet \cite{rgg18,hirschetal18,rfu18}, where such a mixing is not present. The connection between the OTOC and the Loschmidt echo has been signaled in various contexts \cite{swingle18,zangaraphiltrans,k18,rfu18} as both link irreversibility with the operator noncommutativity. At the technical level, both observables are four-point functions that in a semiclassical formulation depend on four classical trajectories. Unlike the Loschmidt echo, there is only one Hamiltonian to be considered in the case of the OTOC, and this feature implies to take into account subtle action differences between nearby trajectories. Like in the calculation of the Loschmidt echo, the simplest semiclassical approach to the OTOC can be done for uniformly hyperbolic systems, and this has been the path followed in this work. When the Loschmidt echo is averaged over different intial wave-packets, the local variations of the Lyapunov exponent encountered in a typical chaotic system lead to the hyper-sensibility with respect to the perturbation, where the average decay is governed by a modified exponent and is representative of typical conditions only after the Ehrenfest time \cite{stb03}. The effects that emerge from the failure of reaching complete self-averaging of the Lyapunov exponent within a limited time-interval are more prominent in the case of the OTOC \cite{rgg18}, due to its initial exponential increase with time. \acknowledgments We acknowledge helpful discussions with H.M. Pastawski, A.J. Roncaglia, and M. Saraceno. We thank M. Saraceno and D. Weinmann for a careful reading of the manuscript and valuable suggestions. The authors received funding from French National Research Agency (Project No. ANR- 14-CE36-0007-01), the CONICET (Grant No. PIP 11220150100493CO), the ANPCyT (PICT- 2016-1056), the UBACyT (Grant No 20020130100406BA), a bi-national collaboration project funded by CONICET and CNRS (PICS No. 06687), and Laboratoire International Associ\'e (LIA) ``LiCOQ''.
\section{Introduction} Owing to the fascinating properties such as flexibility, tunability, scalability, and strong interaction with electromagnetic fields, superconducting Josephson-junction circuits provide an outstanding platform for quantum information processing (QIP)~\cite{Science:Devoret2013,RPP:Wendin2017}, quantum simulation of many-body physics~\cite{NatCommun:Barends2015,PhysRevA.95.042330,SciRep:Lamata2017}, and exploring the fundamentals of quantum electrodynamics in and beyond the ultrastrong-coupling regime~\cite{NatPhys:Niemczyk2010,NatPhys:Yoshihara2017}. Additionally, hybridizing these solid-state devices with the atoms may enable the information transfer between macroscopic and microscopic quantum systems~\cite{PRA:Yu2016-1,SciRep:Yu2016,PRA:Yu2016-2,QST:Yu2017,PRA:Yu2017,ProcSPIE:Hufnagel2017}, where the superconducting circuits play the role of rapid processor while the atoms act as the long-term memory. Nonetheless, the strong coupling to the environmental noise significantly limits the energy-relaxation ($T_{1}$) and dephasing ($T_{2}$) times of superconducting circuits~\cite{PRL:Astafiev2004,PRL:Yoshihara2006,PRA:Koch2007}. Recently, there has been focus on large-scale QIP~\cite{PRL:Song2017,npj:Lu2017}. Several network schemes have already been demonstrated in experiments: one-dimensional spin chain with the nearest-neighbor interaction~\cite{Nature:Kelly2015,Nature:Barends2016}, two-dimensional lattice with quantum-bus-linked qubits~\cite{NatCommun:Corcoles2015,NatCommun:Riste2015}, multiple artificial atoms interacting with the same resonator~\cite{PRL:Song2017}, and many cavities coupled to a superconducting qubit~\cite{NewJPhys:Yang2016}. However, only little attention has been paid to the quantum circuit composed of nearly identical superconducting qubits, where an arbitrary individual directly interacts with others and, in addition, all qubits are biased by the same voltage, current, or magnetic bias and are exposed to the same fluctuation source. Studying such a multiple-qubit architecture is of importance to superconducting QIP network. For one thing, the nearest- or next-nearest-neighbour-coupling approximation, which is commonly employed in scalable superconducting schemes~\cite{NewJPhys:Wallquist2005,PRB:Storcz2005,PRB:Richer2016}, does not always hold the truth in realistic systems. For another, transferring the quantum information from one processor to another over a long distance, which relies on the long-range interqubit coupling, is essential for cluster quantum computing~\cite{RepMathPhys:Nielsen2006} and quantum algorithms~\cite{Nature:DiCarlo2009}. Moreover, in a large-scale network composed of strong or ultrastrong interacting qubits, the energy relaxation and dephasing of one qubit strongly influence the dynamics of others and this fluctuation can be rapidly boosted and affect more qubits. Such a collective dissipation may significantly degrade the information transfer fidelity between two remotely separated qubits. However, to our best knowledge, this collective dissipation of a large ensemble of directly-coupled superconducting qubits has not been explored before. Here we investigate the collective relaxation effect in a multiple-qubit circuit, where all charge qubits are biased by the same voltage source, capacitively coupled via linking all islands together, and influenced by the same noise source. The system's Rabi oscillation is numerically studied in detail. It is shown that for the homogeneous system with identical qubits, the interqubit coupling strongly modifies the collective relaxation of quantum circuit. In contrast, the nonideal-fabrication-induced extra inhomogeneity always enhances the system's relaxation rate and also provides a platform for studying many-body localization. \section{Results} \subsection{Physical model} \begin{figure} \centering \includegraphics[width=12.0cm]{Fig1}\\ \caption{Multiple-qubit scheme. $N$ charge qubits are biased by the voltage source $V_{g}$ via the identical gate capacitors $C_{g}=300$ aF. In this work, we set $N=10$. All Cooper-pair boxes are linked together via the identical coupling capacitors $C_{c}$. The inhomogeneity of the system only arises from the nonidentical Josephson junctions. $C_{j,k}$ and $E_{j,k}$ with $k=1,\ldots,N$ denote the self-capacitances and Josephson energies of different Josephson junctions. The corresponding mean values are $C_{j}=30$ aF and $E_{J}=2\pi\hbar\times3$ GHz.}\label{Fig1} \end{figure} We consider $N$ capacitively-coupled single-Josephson-junction charge qubits as shown in figure~\ref{Fig1}. A voltage source $V_{g}$ biases the array of superconducting islands via the identical gate capacitors $C_{g}$. All Cooper-pair boxes are linked together via the identical coupling capacitors $C_{c}$, where we have applied the fact that the practical inhomogeneities of capacitors $C_{g}$ and capacitors $C_{c}$ are much smaller than that of Josephson junctions. For the $k$-th ($k=1,\ldots,N$) charge qubit, we define the self-capacitance of Josephson junction, the total capacitance, the charging energy, and the Josephson energy as $C_{j,k}$, $C_{\Sigma,k}=C_{g}+C_{j,k}+C_{c}$, $E_{C,k}=\frac{(2e)^{2}}{2C_{\Sigma,k}}$, and $E_{J,k}$, respectively. The total excess charge $Q_{k}$ of the $k$-th box distributes on capacitor plates of $C_{g}$, $C_{j,k}$, and $C_{c}$ that are involved in the Cooper-pair box. The corresponding charges are defined as $Q_{g,k}$, $Q_{j,k}$, and $Q_{c,k}$, respectively, and we have \begin{equation} Q_{k}=Q_{g,k}+Q_{j,k}+Q_{c,k}. \end{equation} According to Kirchhoff's circuit laws and charge conservation, one obtains \begin{eqnarray} &&\textstyle\frac{Q_{g,1}}{C_{g}}-\frac{Q_{j,1}}{C_{j,1}}=\frac{Q_{g,2}}{C_{g}}-\frac{Q_{j,2}}{C_{j,2}}=\ldots=-V_{g},\\ &&\textstyle\frac{Q_{c,1}}{C_{c}}-\frac{Q_{j,1}}{C_{j,1}}=\frac{Q_{c,2}}{C_{c}}-\frac{Q_{j,2}}{C_{j,2}}=\ldots,\\ &&Q_{c,1}+Q_{c,2}+\ldots+Q_{c,N}=0. \end{eqnarray} The total charging energy of the system is then given by \begin{eqnarray \nonumber E_{ch}&=&\textstyle\sum_{k}\left(\frac{Q^{2}_{g,k}}{2C_{g}}+\frac{Q^{2}_{j,k}}{2C_{j,k}}+\frac{Q^{2}_{c,k}}{2C_{c}}+V_{g}Q_{g,k}\right)\\ &=&\textstyle\sum_{k}E_{C,k}\left(N_{k}-N_{g}\right)^{2}+\left[\sum_{k}\frac{E_{C,k}}{\sqrt{NV}}\left(N_{k}-N_{g}\right)\right]^{2}, \end{eqnarray} where $N_{k}=-\frac{Q_{k}}{(2e)}$ denotes the number of excess Cooper pairs in the $k$-th box and $N_{g}=\frac{C_{g}V_{g}}{(2e)}$ is the gate-charge bias. We have also defined \begin{equation} V=\textstyle\frac{(2e)^{2}}{2C_{c}}-\frac{1}{N}\textstyle\sum_{k}E_{C,k}, \end{equation} which is positive and denotes the difference between the electrostatic energy of a Cooper pair in $C_{c}$ and the mean value of charging energies of different Cooper-pair boxes. Adding the tunneling energies of Cooper pairs into $E_{ch}$~\cite{Book:Dittrich1998}, the system's Hamiltonian is derived as $H=H_{0}+H_{1}$, where \begin{eqnarray} H_{0}&=&\textstyle{\sum_{k}\left[\frac{E_{C,k}}{2}(1-2N_{g})\sigma^{(k)}_{z}-\frac{E_{J,k}}{2}\sigma^{(k)}_{x}\right]},\label{H1a}\\ H_{1}&=&\textstyle{\left[\sum_{k}\frac{E_{C,k}}{2\sqrt{NV}}(\sigma^{(k)}_{z}+1-2N_{g})\right]^{2}},\label{H1b} \end{eqnarray} in the two-state approximation. The $x$- and $z$-components of the Pauli operator are given by $\sigma^{(k)}_{x}=(|0\rangle\langle1|)_{k}+(|0\rangle\langle1|)_{k}$ and $\sigma^{(k)}_{z}=(|1\rangle\langle1|)_{k}-(|0\rangle\langle0|)_{k}$. $|0\rangle_{k}$ and $|1\rangle_{k}$ represent the absence and presence of a single excess Cooper pair in the $k$-th island. The multiple-qubit system operates in the charging limit of $E_{C,k}\gg E_{J,k}$. $H_{0}$ gives the total energy of free charge qubits while $H_{1}$ corresponds to the interqubit interaction energy. It is seen that besides a constant, the qubit-qubit coupling leads to the linear terms of $(1-2N_{g})\sigma^{(k)}_{z}$, which may be involved into $H_{0}$, and the quadratic $zz$-interaction terms of $\sigma^{(k_{1})}_{z}\sigma^{(k_{2})}_{z}$ that are diagonal in the charge number basis. In the limit of $C_{c}\sim0$, we have $V\rightarrow\infty$, for which $H_{1}\sim0$ and charge qubits become independent with each other. As $C_{c}$ is increased, $E_{C,k=1,\ldots,N}$ go down. In this work, we restrict $C_{c}$ within the range satisfying the charging limit condition. Due to the assumption of identical gate and coupling capacitors, the system's inhomogeneity completely comes from the nonidentical Josephson junctions. \subsection{Homogeneous Circuit} We first consider the homogeneous system, where all Josephson junctions are identical, i.e., $C_{j,k}=C_{j}$, $E_{C,k}=E_{C}$, and $E_{J,k}=E_{J}$. It is easy to obtain $\frac{V}{E_{C}}=\frac{C_{g}+C_{j}}{C_{c}}$ and $H$ can be simplified as \begin{equation}\label{H2} \textstyle\frac{H}{N}=\frac{E^{2}_{C}}{4V}\left[\frac{J_{z}}{N}+\Xi(V,N_{g})\right]^{2}-\frac{E_{J}}{2}\frac{J_{x}}{N}, \end{equation} by defining the collective operators $J_{z}=\sum_{k}\sigma^{(k)}_{z}$ and $J_{x}=\sum_{k}\sigma^{(k)}_{x}$ and the function \begin{equation} \textstyle\Xi(V,N_{g})=\left(1+\frac{V}{E_{C}}\right)(1-2N_{g}). \end{equation} Equation~(\ref{H2}) illustrates that multiple qubits behave in the same way if they are initialized in the same state. We define the dimensionless parameter $\eta=\frac{E^{2}_{C}}{E_{J}V}$ to measure the interqubit coupling strength. \subsubsection{Ground state of nondissipative system} \begin{figure} \centering \includegraphics[width=12.0cm]{Fig2}\\ \caption{(a) Ground-state expectation value $\frac{\langle\beta|J_{z}|\beta\rangle}{N}$ of nondissipative homogeneous circuit as a function of $\eta$ and $N_{g}$. Solid lines: $\Xi(V,N_{g})=\pm1$. The varying range of $\eta$ ensures the charging limit of $\frac{E_{C}}{E_{J}}\gg1$. (b) Dependence of expectation value $\frac{\langle\beta|J_{x}|\beta\rangle}{N}$ on $\eta$ and $N_{g}$.}\label{Fig2} \end{figure} We are interested in the ground state of the nondissipative system in the limit of $N\rightarrow\infty$. The Holstein-Primakoff transformation~\cite{PRA:Yu2014}, \begin{eqnarray} \textstyle\frac{J_{z}}{2}&=&b^{\dag}b-\frac{N}{2},\\ \textstyle\frac{J_{x}}{2}&=&\sqrt{N-b^{\dag}b}b+b^{\dag}\sqrt{N-b^{\dag}b}, \end{eqnarray} is employed to map the multiple-qubit system onto a bosonic mode. The annihilation $b$ and creation $b^{\dag}$ operators fulfill the bosonic commutation relation $[b,b^{\dag}]=1$. Then, we introduce the macroscopic displacements, i.e., $b\rightarrow b+\sqrt{N}\beta$ and $b^{\dag}\rightarrow b^{\dag}+\sqrt{N}\beta^{\ast}$, to this bosonic mode and obtain a displaced Hamiltonian \begin{equation} {\cal{H}}=e^{-\sqrt{N}(\beta b^{\dag}-\beta^{\ast}b)}He^{\sqrt{N}(\beta b^{\dag}-\beta^{\ast}b)}. \end{equation} ${\cal{H}}$ is further expanded as ordered power series in $b$ and $b^{\dag}$. In the second-order approximation, choosing $\beta$ such that the linear terms associated with $b$ and $b^{\dag}$ vanish leads to the ground state $|\beta\rangle$ and the corresponding energy \begin{eqnarray} \nonumber\textstyle{\frac{{\cal{E}}}{N}}&\equiv&\textstyle{\frac{\langle\beta|{\cal{H}}|\beta\rangle}{N}}\\ &=&\textstyle\frac{E^{2}_{C}}{4V}\left[2\beta^{2}-1+\Xi(V,N_{g})\right]^{2}-2E_{J}\sqrt{1-\beta^{2}}\beta. \end{eqnarray} Finally, we find that $\beta$ is real and determined by \begin{equation} \textstyle\frac{E^{2}_{C}}{V}\left[2\beta^{2}-1+\Xi(V,N_{g})\right]=E_{J}\frac{1-2\beta^{2}}{\beta\sqrt{1-\beta^{2}}}, \end{equation} from which multiple solutions may be derived and the accepted one should minimize ${\cal{E}}$. We focus on the observable operator $J_{z}$. Figure~\ref{Fig2}(a) shows the ground-state expectation value $\frac{\langle\beta|J_{z}|\beta\rangle}{N}=(2\beta^{2}-1)$ vs. $\eta$ and $N_{g}$. One can see that the large interqubit coupling ($\eta\gg1$) opens a wide intermediate regime, where $\frac{\langle\beta|J_{z}|\beta\rangle}{N}$ strongly relies on the gate-charge bias $N_{g}$. In contrast, for $\eta\ll1$ the system returns to an ensemble of independent qubits, and $\frac{\langle\beta|J_{z}|\beta\rangle}{N}\approx1$ ($-1$) when $N_{g}>\frac{1}{2}$ ($<\frac{1}{2}$). We should note that, unlike the Dicke model of a single cavity mode interacting with an ensemble of two-level atoms~\cite{PRL:Emary2003,PRE:Emary2003}, both first and second derivatives of ${\cal{E}}$ with respect to $\beta$ are continuous, indicating the absence of phase transitions in our system. In the limit of $E_{J}\sim0$, one obtains the simple solution, $\frac{\langle\beta|J_{z}|\beta\rangle}{N}=-\Xi(V,N_{g})$ and ${\cal{E}}=0$. Due to the condition of $-1\leq\frac{\langle\beta|J_{z}|\beta\rangle}{N}\leq1$, the ground-state diagram may be divided into three regimes: $\frac{\langle\beta|J_{z}|\beta\rangle}{N}=-1$ and $|\beta=0\rangle$ (all qubits are in $|0\rangle$), $\frac{\langle\beta|J_{z}|\beta\rangle}{N}=-\Xi(V,N_{g})$, and $\frac{\langle\beta|J_{z}|\beta\rangle}{N}=1$ and $|\beta=1\rangle$ (all qubits are in $|1\rangle$), and the boundaries are given by $\Xi(V,N_{g})=\pm1$ [see figure~\ref{Fig2}(a)]. We also displays the expectation value $\frac{\langle\beta|J_{x}|\beta\rangle}{N}$ in figure~\ref{Fig2}(b), where $\frac{\langle\beta|J_{x}|\beta\rangle}{N}$ always maximizes at the sweet spot $N_{g}=\frac{1}{2}$ due to the resonant driving. \subsubsection{Dissipative system} In the practical operation, the many-qubit system is unavoidably interfered by environmental fluctuations. It has been experimentally demonstrated that the dominant noise sources in a single charge qubit include the high-frequency Ohmic dissipation from the DC voltage source and the low-frequency $1/f$ noise induced by background charge fluctuations~\cite{PRL:Astafiev2004,PRL:Nakamura2012,Pashkin2009}. The former mainly determines the relaxation time $T_{1}$ of the charge qubit, i.e., the characteristic time scale of the damped qubit Rabi oscillation, while the latter primarily affects the dephasing time $T_{2}$, i.e., the characteristic time scale of the damped qubit Ramsey/spin echo oscillation. According to~\cite{Pashkin2009,Makhlin2003}, the whole noise may be mapped onto the gate-charge bias $N_{g}$, i. e., the voltage source, in the mathematical treatment. This is still valid in this multi-qubit scheme. Since all islands are electrostatically biased by the same voltage source, different qubits are subjected to the same Ohmic noise whose spectrum is proportional to the noise frequency $f$. In addition, all islands are strongly coupled in the system. When environmental fluctuations interrupt the dynamic of one Cooper-pair box, the local voltage of the corresponding gate capacitor is disturbed. This voltage fluctuation may be mapped onto the voltage source and it further influences the dynamics of other boxes in the same way, leading to the energy relaxation of other charge qubits. Thus, one may map all local voltage fluctuations occurring in different Cooper-pair boxes on to the single voltage source. Moreover, in this work we mainly focus on the qubit Rabi oscillation, whose damping time is $T_{1}$, and the low-frequency $1/f$ noise in the circuit hardly influences $T_{1}$. Therefore, for these reasons it is valid to model environmental fluctuations by the fluctuation of gate-charge bias (voltage source), i.e., all charge qubits suffer the same noise. This differs from the many-body system composed of excited-state atoms that spontaneously decay independently. \begin{figure} \centering \includegraphics[width=13.0cm]{Fig3}\\ \caption{(a) Power spectral density $S_{\delta N_{g}}(f)$ of gate-charge fluctuations $\delta N_{g}(t)$. Solid (dash) line corresponds to the numerical (analytical) result. (b) Single-charge-qubit Rabi and Ramsey oscillations with the system parameters of $C_{g}$, $C_{j}$, and $E_{J}$ same to figure~(\ref{Fig1}) and $E_{C}=78E_{J}$ for $C_{c}=0$. For the Rabi oscillation, the qubit is initialized in $|1\rangle$ with $N_{g0}=\frac{1}{2}$. For performing Ramsey fringes, the qubit is initially prepared in $|1\rangle$ and $N_{g0}$ is set at $\frac{1}{2}$ during two $\frac{\pi}{2}$-pulses while $N_{g0}=0$ in the free evolution period. Solid curves: numerical results. Dash lines: decay-envelope fittings. In the Ramsey oscillation, the detailed behavior around the characteristic time sale $T_{2}$, which is surrounded by the rectangular frame, is zoomed in, and the oscillation frequency is given by $E_{\uparrow\downarrow}=\sqrt{E^{2}_{C}(1-2N_{g})^{2}+E^{2}_{J}}$. For all curves of ensemble average $\langle j_{z}(t)\rangle_{E}$, the size of trajectory ensemble is $10^{5}$.}\label{Fig3} \end{figure} We rewrite the gate-charge bias as \begin{equation} N_{g}(t)=N_{g0}+\delta N_{g}(t), \end{equation} i.e., a constant value $N_{g0}$ plus a fluctuating term $\delta N_{g}(t)$. The noise spectral density \begin{equation} S_{\delta N_{g}}(f)=\textstyle\int^{\infty}_{-\infty}\int^{\infty}_{-\infty}\delta N_{g}(t+\tau)\delta N_{g}(t)e^{-i2\pi f\tau}dtd\tau, \end{equation} is given by \begin{equation} S_{\delta N_{g}}(f)=\textstyle\frac{\pi R\hbar C^{2}_{g}}{e^{2}}f+\frac{\alpha}{2\pi f}, \end{equation} where the typical impedance of the voltage-source circuit is $R=50$ $\Omega$ and $\alpha=5.0\times10^{-7}$~\cite{APL:Zimmerli1992,JAP:Verbrugh1995,IEEE:Wolf1997}. Accordingly to $S_{\delta N_{g}}(f)$, one may numerically generate $\delta N_{g}(t)$ [see figure~\ref{Fig3}(a)]. We choose $\{|n_{1}\rangle\otimes\cdots\otimes|n_{N}\rangle;n_{k=1,\ldots,N}=0,1\}$ to span the Hilbert space. Using the Schr\"{o}dinger equation, \begin{equation} \textstyle i\hbar\frac{d}{dt}\psi(t)=H\psi(t), \end{equation} one can simulate the system's state $\psi(t)$ for a given initial state $\psi(0)$, resulting in the trajectory \begin{equation} j_{z}(t)=\langle\psi(t)|J_{z}|\psi(t)\rangle/N. \end{equation} Repeating the simulation with the same initial condition leads to the ensemble mean observation $\langle j_{z}(t)\rangle_{E}$. Here we use $\langle\ldots\rangle_{E}$ to denote the ensemble average. As an example, figure~\ref{Fig3}(b) depicts the Rabi and Ramsey oscillations of a single charge qubit, from which the decoherence times $T_{1,2}$ may be extracted. In the following we only focus on the collective Rabi oscillation of multiple-qubit circuit, where the system is initialized in $|1\rangle_{1}\otimes\ldots\otimes|1\rangle_{N}$ and we set $N_{g0}=\frac{1}{2}$. Figure~\ref{Fig4}(a) shows the damped $\langle j_{z}(t)\rangle_{E}$ for several different $\eta$. It is seen that for $\eta\ll1$, i.e., the very weak qubit-qubit interaction, $\langle j_{z}(t)\rangle_{E}$ is similar to that of single qubit, meaning that multiple qubits act almost independently. When $\eta$ is increased, i.e., the interqubit coupling becomes strong, the relaxation time $T_{1}$ of $\langle j_{z}(t)\rangle_{E}$ is dramatically reduced because the qubits get correlated and their dynamics are affected with each other. When one qubit relaxes, the gate-charge bias is disturbed and this influences the dynamics of other qubits, leading to an enhanced collective relaxation. As $\eta$ is further increased, the interqubit interactions become very strong. Surprisingly, $\langle j_{z}(t)\rangle_{E}$ relaxes much more slowly than that of single qubit and the oscillation behavior of $\langle j_{z}(t)\rangle_{E}$ also disappears. It is understandable from the aspect of interaction-induced detunings~\cite{JModOpt:Yu2016}. Diagonalizing the Hamiltonian~(\ref{H2}) leads to the eigenstates of the system. For the noninteracting system ($C_{c}=0$), the eigenstates with the same total number of the qubits in $|1\rangle$ are degenerate. The interqubit coupling removes this degeneracy and gives rise to the energy-level shifts of eigenstates. The much strong interactions among qubits enhance the qubit-state shifts to the values comparable or even larger than the Josephson energy $E_{J}$. Thus, the system operating point moves far away from the sweet spot $N_{g}=\frac{1}{2}$, resulting in a large qubit detuning and the suppression of oscillation behavior of $\langle j_{z}(t)\rangle_{E}$. In addition, according to the relaxation-time formula derived from the Fermi's golden rule~\cite{RMP:Makhlin2001}, $T_{1}$ is extended when the system moves away from the optimal working point. The dependence of $T_{1}$ on $\eta$ is displayed in figure~\ref{Fig4}(b). It is shown that $T_{1}$ starts to rise after $\eta\approx1$ where, as illustrated by equation~(\ref{H2}), the energy-level shift (detuning) $\frac{E^{2}_{C}}{V}$ is equal to the driving strength $E_{J}$. We should point out that although $T_{1}$ is enhanced in the large interqubit-coupling regime, the qubit dephasing time $T_{2}$ is strongly suppressed. At the sweet spot $N_{g}=\frac{1}{2}$, the qubit is minimally sensitive to the $1/f$ fluctuation in the quantum circuit. When the qubit working point departs from $N_{g}=\frac{1}{2}$, the $1/f$ noise significantly reduces $T_{2}$~\cite{PRL:Astafiev2004,PRL:Yoshihara2006,PRA:Koch2007}. Nevertheless, the influence of the $1/f$ noise may be weakened via stabilizing the superconducting qubit to a high-$Q$ resonator~\cite{Nature:Vijay2012} and the feedback control method~\cite{NPJ:Yu2018,PRA:Yu2018}, which potentially extends the dephasing time $T_{2}$. \begin{figure} \centering \includegraphics[width=11.0cm]{Fig4}\\ \caption{(a) Rabi oscillation $\langle j_{z}(t)\rangle_{E}$ of the dissipative homogeneous system where all charge qubits are initialized in $|n_{k=1,\ldots,N}=1\rangle$. The relaxation time $T_{1}$ is extracted from the decay envelope. (b) $T_{1}$ and steady-state ${\cal{C}}_{zz}(t\rightarrow\infty)$ vs. $\eta$. (c) Time-dependent probability density (PD) distribution of the trajectory ensemble of $j_{z}(t)$ and histogram of steady-state ensemble of $j_{z}(t\rightarrow\infty)$ for several different $\eta$, where the solid curves correspond to the line fittings. For $\eta=0.08$, $0.77$, and $7$, the corresponding standard deviations $\Delta j_{z}(t\rightarrow\infty)$ are derived as $0.45$, $0.18$, and $0.18$, respectively. For all curves, the system parameters are same to figure~\ref{Fig1} and the ensemble size is chosen to be $10^{3}$.}\label{Fig4} \end{figure} After a long enough time $(t\gg T_{1})$, the multiple-qubit system loses the memory of its initial condition and the ensemble expectation value $\langle j_{z}(t)\rangle_{E}$ approaches a steady-state value~\cite{JOSAB:Molmer1993,RMP:Plenio1998}. We use the symbol $t\rightarrow\infty$ to denote a large time scale after which the distribution of $j_{z}(t)$ becomes steady, i.e., the ensemble-averaged observables reach steady-state values. As shown in figure~\ref{Fig4}(a), $\langle j_{z}(t\rightarrow\infty)\rangle_{E}$ is equal to zero and independent of the coupling parameter $\eta$. Nevertheless, the steady-state histogram of the ensemble of $j_{z}(t\rightarrow\infty)$ relies on $\eta$. As depicted in figure~\ref{Fig4}(c), the trajectory ensemble of $j_{z}(t\rightarrow\infty)$ is distributed over the entire range from -1 to 1 in the weak-coupling limit ($\eta\ll1$). In contrast, as the qubit-qubit interaction is increased, although the qubits are still equally populated on $|0\rangle$ and $|1\rangle$, the spread of the statistical distribution of $j_{z}(t\rightarrow\infty)$ is narrowed, indicating the reduction of measurement uncertainty and the enhanced interqubit correlation. Generally, the expectation value of a product of two operators ($O_{1}$ and $O_{2}$) is different from the product of the expectation values of individual operators, i.e., $\langle\psi|O_{1}O_{2}|\psi\rangle\neq\langle\psi|O_{1}|\psi\rangle\langle\psi|O_{2}|\psi\rangle$, which is attributed to the correlation between two quantities. Accordingly, since the qubits are coupled via the $zz$-interaction [see equation~(\ref{H1b})], we define \begin{equation} {\cal{C}}_{zz}(t)=\textstyle{\left\langle\frac{1}{N(N-1)}\sum_{k_{1}\neq k_{2}}\left[\langle\psi(t)|\sigma^{(k_{1})}_{z}\sigma^{(k_{2})}_{z}|\psi(t)\rangle-\langle\psi(t)|\sigma^{(k_{1})}_{z}|\psi(t)\rangle\langle\psi(t)|\sigma^{(k_{2})}_{z}|\psi(t)\rangle\right]\right\rangle_{E}}, \end{equation} to measure the total interqubit correlation in the system~\cite{NewJPhys:Schachenmayer2015}. For independent qubits one has ${\cal{C}}_{zz}(t\rightarrow\infty)=0$. As exhibited in figure~\ref{Fig4}(b), ${\cal{C}}_{zz}(t\rightarrow\infty)$ approximates zero in the limit of $\eta\ll1$, indicating that the qubits behave independently. As $\eta$ is increased, ${\cal{C}}_{zz}(t\rightarrow\infty)$ goes up strongly and is saturated eventually. We should note that ${\cal{C}}_{zz}(t)$ differs from the variance $\Delta j^{2}_{z}(t)$ of the ensemble of trajectories $j_{z}(t)$, the definition of which is $\Delta j^{2}_{z}(t)=\left\langle j^{2}_{z}(t)\right\rangle_{E}-\left\langle j_{z}(t)\right\rangle_{E}^{2}$. $\Delta j_{z}(t)$ weights the ensemble spread of $j_{z}(t)$. Figure~\ref{Fig4}(c) shows the time-dependent ensemble distribution of $j_{z}(t)$ and steady-state histogram of $j_{z}(t\rightarrow\infty)$ for several different $\eta$. The distribution of $j_{z}(t)$ diffuses rapidly when $\eta$ is increased from zero, corresponding to the strong reduction of $T_{1}$. However, the width of steady-state distribution of $j_{z}(t\rightarrow\infty)$ becomes narrow, i.e., $\Delta j_{z}(t\rightarrow\infty)$ is suppressed, meaning that the interqubit correlation is enhanced. For $\eta\gg1$, the ensemble of $j_{z}(t)$ spreads slowly [see $j_{z}(t)$ with $\eta=0.77$ and $\eta=7$ in figure~\ref{Fig4}(c)] and the histogram of $j_{z}(t\rightarrow\infty)$ barely changes compared with that of $\eta\approx1$, denoting the extension of $T_{1}$ and the saturation of ${\cal{C}}_{zz}(t\rightarrow\infty)$. Actually, the spreading rate of the histogram of $j_{z}(t)$ corresponds to the relaxation rate of the multi-qubit system. As shown in figure~\ref{Fig4}(c), the system is initially prepared in the ground state $|1\rangle_{1}\otimes\ldots\otimes|1\rangle_{N}$. The histogram width of the trajectory ensemble $j_{z}(t)$ at $t=0$ is zero in principle. As the time $t$ is increased, the histogram of $j_{z}(t)$ becomes broader due to the fluctuation in the quantum circuit. For the system with small (large) $T_{1}$, the histogram of $j_{z}(t)$ reaches the steady-state distribution fast (slowly). \subsection{Inhomogeneous Circuit} So far, we have only focused on the homogeneous system with identical qubits. However, in the practical circumstance it is extremely difficult to fabricate an array of identical Josephson junctions. Thus, we have to return to the inhomogeneous system described by equations~(\ref{H1a}) and (\ref{H1b}). To take into account this nonideal-fabrication-induced inhomogeneity, we assume a normal distribution with a standard deviation $\lambda$ for different junction areas whose mean value is normalized to be unity~\cite{PRL:Kakuyanagi2016}. We use $C_{j}$ and $E_{J}$ to respectively denote the mean values of self-capacitances $C_{j,k=1,\ldots,N}$ and Josephson energies $E_{J,k=1,\ldots,N}$, i.e., $C_{j}=\frac{1}{N}\sum_{k}C_{j,k}$ and $E_{J}=\frac{1}{N}\sum_{k}E_{J,k}$. The corresponding standard deviations are given by $\lambda C_{j}$ and $\lambda E_{J}$ since both $C_{j,k}$ and $E_{J,k}$ are proportional to the area of the $k$-th junction. For the charging energies $E_{C,k=1,\ldots,N}$, the mean value is $E_{C}=\frac{(2e)^{2}}{2C_{\Sigma}}$ with $C_{\Sigma}=C_{g}+C_{j}+C_{c}$ and the standard deviation is derived as $\lambda\frac{C_{j}}{C_{\Sigma}}E_{C}$ in the limit of $C_{\Sigma}\gg C_{j}$. In addition, the ensemble average $\langle\ldots\rangle_{E}$ needs to involve this extra inhomogeneity, for which we assume that a group of $N$-qubit systems are prepared in the same initial condition and $E_{C,k=1,\ldots,N}$ and $E_{J,k=1,\ldots,N}$ of each system fulfill the corresponding normal distributions. As shown in figure~\ref{Fig5}(a), the inhomogeneity caused by nonidentical Josephson junctions strongly accelerates the relaxation of the collective Rabi oscillation even in the weak-coupling limit ($\eta\ll1$). This corresponds to the inhomogeneous broadening, where the unsynchronized Rabi dynamics of individual qubits destructively interfere with each other. Moreover, the extra inhomogeneity reduces the interqubit correlation and broadens the trajectory distribution [figure~\ref{Fig5}(b)]. Therefore, maximally minimizing the inhomogeneity arising from the defective fabrication technology becomes indispensable for the application of multiple-qubit circuits in QIP. Nevertheless, this inhomogeneous system may be still potentially applied to study the quantum many-body localization. We choose two spin states of the $k$-th qubit as $|\uparrow\rangle_{k}=\frac{1}{\sqrt{2}}(|0\rangle_{k}+|1\rangle_{k})$ and $|\downarrow\rangle_{k}=\frac{1}{\sqrt{2}}(|0\rangle_{k}-|1\rangle_{k})$ and define the new $x$- and $y$-components of Pauli matrix as $\tilde{\sigma}_{x,k}\equiv\sigma_{z,k}$ and $\tilde{\sigma}_{z,k}\equiv\sigma_{x,k}$. Then, the inhomogeneous Hamiltonian $H$ can be mapped onto the Ising model~\cite{NatPhys:Smith2016} \begin{equation} H_{Ising}=\textstyle\sum_{k<k'}J_{k,k'}\tilde{\sigma}_{x,k}\tilde{\sigma}_{x,k'}-\frac{B}{2}\sum_{k}\tilde{\sigma}_{z,k}-\sum_{k}\frac{D_{k}}{2}\tilde{\sigma}_{z,k}+\textstyle\sum_{k}\Delta_{k}\tilde{\sigma}_{x,k}, \end{equation} where $J_{k,k'}=\frac{E_{C,k}E_{C,k'}}{4NV}$ corresponds to the long-range spin-spin interaction, $B=E_{J}$ plays the role of the external field, and the inhomogeneity $D_{k}=E_{J,k}-E_{J}$ acts as the site-dependent disordered potential. Unlike the superconducting circuit in~\cite{arXiv:Xu2017}, the nearest-neighbor $J_{k,k\pm1}$ do not dominate. The last term in $H_{Ising}$ with \begin{equation} \Delta_{k}=\textstyle\frac{E_{C,k}}{2}(1-2N_{g})\left(1+\sum_{k'}\frac{E_{C,k'}}{NV}\right), \end{equation} vanishes at the sweet point $N_{g}=\frac{1}{2}$. However, the nonzero $\delta N_{g}(t)$ deviates $H_{Ising}$ from the standard disordered Ising model. In addition, the disorder term $D_{k}$ is sampled from a normal distribution, rather than a uniform random variable~\cite{arXiv:Xu2017}. \begin{figure} \centering \includegraphics[width=12.0cm]{Fig5}\\ \caption{Inhomogeneous multiple-qubit system and its application in many-body localization. (a) Upper: Relaxation time $T_{1}$ vs. standard deviation $\lambda$ with $\eta=0.08$. Lower: Rabi oscillation $\langle j_{z}(t)\rangle_{E}$ for several different $\lambda$. (b) Upper: ${\cal{C}}_{zz}(t\rightarrow\infty)$ as a function of $\lambda$ with $\eta=1.53$. Lower: Histogram of $j_{z}(t\rightarrow\infty)$ with $\lambda=0.4$ and $\Delta j_{z}(t\rightarrow\infty)=0.26$. (c) $\langle{\cal{D}}(t)\rangle_{E}$ of the disordered dissipative system with $N_{g0}=\frac{1}{2}$ and $\lambda=0.5$. (d) $\langle{\cal{D}}(t)\rangle_{E}$ of the disordered nondissipative system with $N_{g}=\frac{1}{2}$ and $\lambda=0.5$. The dashed lines are the results from the curve fitting based on $\langle{\cal{D}}(t\rightarrow\infty)\rangle_{E}(1-e^{-\gamma t})$. The localization rate approximates $\gamma\approx2\pi\times1.6$ GHz for different $\eta$. The values of $\langle{\cal{D}}(t\rightarrow\infty)\rangle_{E}$ are about 0.01, 0.1, 0.3, and 0.38 for $\eta=0.77$, 7, 39, and 71, respectively. Inset: Histogram of the ratio $r$ of adjacent energy-level gaps, where the solid curve corresponds to the Poisson distribution. The ensemble size is chosen to be $10^{3}$ for all curves. All system parameters are same to figure~\ref{Fig1}.}\label{Fig5} \end{figure} According to~\cite{NatPhys:Smith2016}, in the weak-coupling limit ($\eta\ll1$), we have $\lambda E_{J}\gg\textrm{max}(J_{k,k'})$ and the system may emerge the multiple-spin localization, which is quantified by the normalized Hamming distance~\cite{PRB: Hauke2015} \begin{equation} {\cal{D}}(t)=\textstyle\frac{1}{2}-\frac{1}{2N}\sum_{k}\langle\psi(0)|e^{i\frac{H_{Ising}}{\hbar}t}\tilde{\sigma}_{z,k}e^{-i\frac{H_{Ising}}{\hbar}t}\tilde{\sigma}_{z,k}|\psi(0)\rangle, \end{equation} with the initial state $\psi(0)$ being the N\'{e}el state. ${\cal{D}}(t\rightarrow\infty)$ arrives at $\frac{1}{2}$ for a thermalizing state and remains 0 at a fully localized state. For the disordered dissipative system with ($\lambda\neq0$, $\delta N_{g} (t)\neq0$), the Hamming distance ${\cal{D}}(t\rightarrow\infty)$ always approaches $\frac{1}{2}$, reaching the thermal equilibrium [see figure~\ref{Fig5}(c)]. This is attributed to the effect of environmental fluctuations $\delta N_{g} (t)$. Thus, besides QIP, suppressing the environmental noise is also the key issue for the application of superconducting circuits in the many-body simulation. Figure~\ref{Fig5}(d), where we have artificially set $\delta N_{g}(t)=0$, exhibits that the disordered nondissipative system with ($\lambda\neq0$, $\delta N_{g} (t)=0$) stays nearly fully localized product states in the weak-coupling limit ($\eta\ll1$) while ${\cal{D}}(t\rightarrow\infty)$ rises gradually up to $\frac{1}{2}$ as the qubit-qubit interactions become strong. Using the diagonalization method, we have also checked the statistics of the ratio parameter $r$ of adjacent energy-level gaps for the disordered nondissipative system~\cite{PRB:Oganesyan2007,PRB:Pal2010}. It is seen that $r$ follows the Poisson distribution when $\eta\ll1$ [the inset of figure~\ref{Fig5}(d)], manifesting the many-body localization, and apparently violates the Poisson distribution for a larger $\eta$, suppressing the localization effect. As experimentally demonstrated in~\cite{arXiv:Xu2017}, the many-body localized state may be still attainable within a short time scale when the thermalization rate of the system with ($\lambda=0$, $\delta N_{g} (t)\neq0$) coupling to the environment is much slower than the localization rate of the system with ($\lambda\neq0$, $\delta N_{g} (t)=0$) (i.e., the localization rate measures how fast a disordered nondissipative system reaches the localized state from an initially-prepared state). The localization rate $\gamma$ of the system with ($\lambda\neq0$, $\delta N_{g} (t)=0$) may be roughly estimated by assuming that the envelop of ${\cal{D}}(t)$ follows the exponential law, i.e., $\langle{\cal{D}}(t\rightarrow\infty)\rangle_{E}(1-e^{-\gamma t})$ [see the dashed lines in figure~\ref{Fig5}(d)]. The time scale that measures the thermalization rate of the system with ($\lambda=0$, $\delta N_{g} (t)\neq0$) coupling to the environment is given by $T_{1}(\lambda=0)$. The many-body localized state is potentially observed in the disordered dissipative system when $\gamma\gg T^{-1}_{1}(\lambda=0)$ which may be fulfilled for a large $\eta$. In comparison between figure~\ref{Fig5}(c) and~\ref{Fig5}(d), we find that for $\eta\gg1$ the Hamming distance ${\cal{D}}(t)$ of the disordered dissipative system rapidly reaches a metastable value smaller than $\frac{1}{2}$ (i.e., the system arrives at the localized state) and then slowly grows up to $\frac{1}{2}$ (i.e., the system approaches the thermalizing state). Thus, the many-body localization phenomenon can be observed within a short time scale for $\eta\gg1$. Increasing the disorder strength $D_{k}$, i.e., increasing $\lambda$, may enhance the localization rate of the inhomogeneous system, leading to an easy access to the many-body localized phase. However, a large $\lambda$ strongly reduces $\frac{E_{C,k}}{E_{J,k}}$, i.e., some qubits may not operate in the charging limit ($\frac{E_{C,k}}{E_{J,k}}\gg1$). \section{Conclusion} We have studied a multiple-charge-qubit system, where the Cooper-pair boxes are all capacitively linked. The qubit dynamics are interfered with environmental fluctuations which are mapped onto the gate voltage source that biases all qubits. The collective Rabi oscillation has been numerically simulated for both homogeneous and inhomogeneous systems. We find the interqubit coupling strongly varies the energy-relaxation rate of the quantum circuit consisting of identical Josephson junctions. For the weak coupling system, the qubit relaxation time $T_{1}$ is significantly reduced since the dynamics of one qubit is unavoidably influenced by the fluctuations of other qubits. In contrast, $T_{1}$ of the homogeneous system in the strong coupling regime can be enhanced to a value much larger than that of a free qubit. This result is caused by the strong energy-level shifts of qubit states (i.e., the large interaction-induced detunings) and consistent with the expectation of Fermi's golden rule. In QIP, transferring quantum information between two qubits in a homogeneous multi-qubit network is an essential process. The resulting fidelity is limited by the system's decoherence time. Thus, the enhancement of $T_{1}$ is crucially relevant to QIP. The nonideal-fabrication-induced inhomogeneity always expedites the multi-qubit system's collective decay. In addition, we mapped the inhomogeneous system onto the disordered Ising model to probe the many-body localization effect. This enables us to investigate the role of the environmental noise in the quantum simulation. For the inhomogeneous system with the localization rate faster than the thermalization rate, the many-body-localization regime is still accessible. \section{Acknowledgements} This research has been supported by the National Research Foundation Singapore \& by the Ministry of Education Singapore Academic Research Fund Tier 2 (Grant No. MOE2015-T2-1-101). \section{References}
\section{I. Introduction} Nonlinear spectroscopy techniques such as two-dimensional electronic spectroscopy are well-established both from a theoretical and experimental viewpoint \citep{Mukamel}. Among its most noteworthy applications, one could mention its usefulness to reveal electronic couplings and energy transfer pathways in complex molecular aggregates \citep{pathways}. Consequently, these experimental techniques assume a prominent role in the development of the field of \textit{quantum biology} \citep{Lambert}. Within this field, a considerable amount of investigation has been undertaken in view of determining whether nonclassical features such as quantum coherence may contribute to optimizing the energy transfer within multichromophoric systems. A paradigmatic example is the so-called Fenna-Matthew-Olson (FMO) complex present in green sulfur bacteria \citep{Engel, Ishizaki, Panitchayangkoon, Collini}. The approaches usually rely on particular theoretical models or are focused on the oscillations of the cross peaks in the 2D electronic spectroscopy signals as a signature of nonclassicality. Nonetheless, alternative ways of witnessing nonclassical effects within these systems, in particular the ones which do not specify a particular model, may permit us to have a clearer and more comprehensive picture of the different aspects of nonclassicality in molecular systems. As a result, we could push the boundaries of the field of quantum biology a little step further. Classical physics assumes {\it measurement noninvasiveness}, which is to say that, in principle, one can perform measurements on classical systems with arbitrarily small disturbance on their dynamics. Conversely, one aspect of the nonclassicality of physical systems is \textit{invasiveness}, meaning that measurements on these systems may affect their subsequent evolution in such a way that the statistics of later measurements performed on the same system cannot be explained by classical theory. Measurement noninvasiveness can be ruled out through the violation of an inequality proposed by Leggett and Garg in 1985 \cite{LG, Emary}. Specifically, the Leggett-Garg inequality (LGI) consists of a sum of two-time temporal quantum correlations between the results of dichotomic measurements performed on a single physical system as it evolves in time. Originally, the LGI derivation was based on an assumption called ``macrorealism {\it per se}'' as well, in addition to non-invasive measurability. By macrorealism {\it per se} one means the intuition that macroscopic objects -- here taken as objects obeying classical laws -- must be in a definite state at all instants of time, i.e. superpositions are not allowed. The two aforementioned assumptions are the content of the original definition of macrorealism by Leggett and Garg. Many recent works have further developed and discussed Leggett and Garg original proposition, as well as the meaning of the violation of the inequality \cite{Maroney, Moreira, Clemente, Clemente2, Kumari, Knee2, Kofler2,Martin,Animesh}. Alternative definitions and witnesses to macrorealism have also been proposed in relation with the Leggett-Garg scenario. For instance, the definition of the \textit{no-signaling in time} (NSIT) condition \citep{Kofler2} puts forward the macrorealist assumption related to the null effect that the measurement process is expected to have on a physical system, i.e. measurement noninvasiveness. In this context, measurement invasiveness can be defined as the nonclassical effect of measurements on the statistics of another observable measured later. Similar conditions to the NSIT have been used in Ref. \citep{Maroney} to derive the LGI, allowing one to conclude that measurement noninvasiveness can always be dismissed by the LGI violation. By considering the definition of the non-disturbance condition \cite{Knee2,Schild,Lambert2}, we explore here the extended concept of \textit{noninvasiveness of an operation}, where the concept of measurement noninvasiveness is generalized to the notion of noninvasiveness of a general quantum channel \cite{NewKnee, Moreira4}. Invasiveness of an operation is aimed to detect nonclassical effects on the statistics of an observable measured at a later time, in the same spirit as the NSIT and Leggett-Garg scenarios \cite{Knee2}. Within this framework, we propose a protocol for testing the non-disturbance condition in the context of electronic spectroscopy experiments, which could be employed with the purpose of witnessing nonclassicality in a vast range of systems wherein electronic spectroscopy is a tremendously useful tool. \begin{figure}[h!] \centering \includegraphics[width=8.6cm]{2DES.pdf} \label{fig:fig14} \caption{(Color online) Scheme of a 2D electronic spectroscopy experiment. The laser pulses $1,\,2,$ and $3$ are labeled according to the order they are applied. The center of the pulses reach the sample at $t=0$, $t=t^\prime_1$, and $t=t^\prime_2$, respectively. The time intervals between the interactions are $t^\prime_1-0=t_1$ and $t^\prime_2-t^\prime_1=t_2$, respectively. The time interval between the detection of the signal field by the spectrometer at time $t$ and pulse $3$ is $t_3$: $t-t^\prime_2=t_3$. \label{2DES}} \end{figure} \section{II. Nonlinear Response} In typical two-dimensional electronic spectroscopy experiments, three laser pulses, labelled as pulse 1, 2 and 3, interact with the sample as sketched in Fig. \ref{2DES}. The quantum mechanical description of the experiment considers a time-dependent Hamiltonian, which can be expressed as \begin{equation}\label{Ht} H(t) = H_0 + H^\prime(t), \end{equation} where $H_0$ is time-independent and concerns the molecular system only, while $H^\prime(t)$ is time-dependent and represents the action of the pulses. Before the application of the first pulse, the system is found to be in an equilibrium state $\rho_0$ i.e., a convex combination of the eigenstates of $H_0$. By denoting the electric field at time $t$ by $E(t)$, $H^\prime(t)$ is given by $H^\prime(t)=\mu\cdot E(t)$, where $\mu$ is the molecule dipole operator. Quite important now is the fact that usually the sample-pulse interaction is weak enough to permit the safe use of perturbation theory \citep{Mukamel}. Within this approach, the following physical picture emerges. When the first pulse reaches the sample, at time $t=0$, it potentially takes the system out of equilibrium, and coherence can be generated. Then, the system continues to undergo a free evolution governed by the Hamiltonian $H_0$ from $t=0$ to $t^\prime_1$, when the second pulse is applied. Once again the molecular system is let to evolve freely, until the last interaction takes place at $t^\prime_2$. The sample-emitted electric field $E_S$ is detected at time $t$. More precisely, what is detected is the intensity of the signal $I_S$ which is proportional to the electric field modulus squared $I_S \propto |E_S|^2$. The source of such emitted field is the induced third-order nonlinear polarization $P^{(3)}(t)$ resulting from the application of the three pulses. A simple textbook calculation leads to \citep{Mukamel} \begin{multline}\label{nonlinearP} P^{(3)}(t) = \int_0^\infty dt_3 \int_0^\infty dt_2 \int_0^\infty dt_1 E(t-t_3) \\ \times E(t-t_3-t_2)E(t-t_3-t_2-t_1)S^{(3)}(t_3,t_2,t_1), \end{multline} where $S^{(3)}(t_1,t_2,t_3)$ is the third-order response function which reads $ S^{(3)}(t_1,t_2,t_3) = \langle \mu(t_3+t_2+t_1)[\mu(t_2+t_1),[\mu(0),\rho(0)]] \rangle, $ with $\mu(t)=U^\dagger_0(t)\mu U_0(t)$. Here, $t^\prime_1-0=t_1$ is the time elapsed between the first and second pulses, $t^\prime_2-t^\prime_1=t_2$, the same for second and third pulses, and $t-t^\prime_2=t_3$, the time elapsed between the last pulse the signal detection. After the rotating wave approximation and Fourier decomposition of the third-order nonlinear polarization as \begin{equation}\label{FourierAmpl} P^{(3)}(t) = \sum_s P_s^{(3)}(t) e^{i {\bf k_s}\cdot {\bf r} - i\omega_s t}, \end{equation} where ${\bf k_s=\pm k_1 \pm k_2 \pm k_3}$ and $\omega_s=\pm \omega_1 \pm \omega_2 \pm \omega_3$, the choice of one particular Fourier component in (\ref{FourierAmpl}) (phase matching) leads to $I_S(t)\propto |P_s^{(3)}(t)|^2$. By fulfilling a phase matching condition, we have that $|P^{(3)}(t)|=|P_s^{(3)}(t)|$. Therefore, the signal is directly linked to an observable in the sense of quantum mechanics, $ I_S(t)\propto |P^{(3)}(t)|^2 $ \cite{foot}. Finally, we remark that the use of narrow pulses or the semi-impulsive limit approximation leads to $ I_S(t)\propto |S(t,t_1,t_2)|^2 $. All these derivations are detailed in \citep{Mukamel}. \section{III. Generalized Quantum Invasiveness} As previously discussed, it is always possible to perform measurements on classical systems with arbitrarily small disturbance on their evolutions. In turn, quantum mechanics allows disturbances on a physical system's evolution which cannot be minimized or gotten rid of classically. Leggett and Garg acknowledged this sort of nonclassical disturbance with regards to the effect of measurements on the evolution of quantum systems \citep{LG}. More generally, the effect of a general operation on the evolution of the system provide yet another route to witness nonclassicality as the quantum invasiveness of that operation \cite{Knee2,NewKnee, Moreira4}. As we will see in detail, the quantum invasiveness of an operation can be unveiled by looking at the measurement statistics of an observable $Q$ subsequently measured and can be related to the presence of coherence in a certain basis. Let us consider the scheme proposed in Ref. \citep{Knee2} and sketched in Fig. \ref{Scenario1}. This scheme will be presented for a two-level system but it can be easily extended for higher dimensions -- we will do this later in the context of the connection with spectroscopy. The kets $\{\ket{e},\ket{g}\}$ are the eigenstates of a chosen observable $\mathcal{O}$, not necessarily the measurement observable $Q$. They are referred to as \textit{classical states} in the sense that they are associated with definite values of that observable and therefore can be given a classical ontological interpretation. In this sense, convex combinations of these eigenstates are also classical states. In Fig. \ref{Scenario1}, we illustrate the preparation of the state $\rho$ as a result of an arbitrary state $\rho_0$ subject to a transformation represented by the box labeled as $U_1$. For example, if $U_1$ is a unitary, then $\rho = U_1\rho_0 U^\dagger_1$. This representation, which explicitly includes this first transformation, will be convenient for addressing the connection with spectroscopy experiments later. Now, the operation $O$ is performed at $t_1$, and the system undergoes a second transformation represented by the box labelled as $U_2$. Finally, the observable $Q$ is measured. By repeating the experiment many times, one is able to obtain the expected value $\left< Q\right>^\prime_\rho$ (the $^\prime$ indicates the presence of the operation $O$). In the lower part of the figure, the experiment is now performed without the operation $O$. In this case, the expected value is denoted by $\left< Q\right>_\rho$. One then defines the following quantity \begin{equation}\label{witness} d_\rho\equiv \left<Q\right>^\prime_\rho-\left<Q\right>_\rho. \end{equation} The evaluation of this quantity will also be carried out in the so called control experiments \citep{Knee2} depicted in Fig. \ref{fig:control} and defined as those which have as inputs the classical states defined as the eigenstates of $\mathcal{O}$, i.e. either $\rho=\ket{g}\bra{g}$ or $\rho=\ket{e}\bra{e}$. In this way, one can define classical disturbances through $d_g= \left<Q\right>^\prime_g-\left<Q\right>_g $ and $ d_e= \left<Q\right>^\prime_e-\left<Q\right>_e $. Nonclassical behaviour is then spotted if the following inequality is violated \begin{equation}\label{inequality} \min(d_g,d_e)\le d_\rho \le \max(d_g, d_e). \end{equation} Naturally, the violation of \eqref{inequality} can be related to the presence of coherence in the basis formed by the eigenstates of $\mathcal{O}$, as any convex combination of these eigenstates satisfy inequality \eqref{inequality} \citep{Knee2}. These auxiliary experiments serve for one fundamental purpose: it fixes the classical range for $d_\rho$ in the main experiment. This classical range can be enlarged due to the presence of classical disturbances which includes, for example, environmental noise and imprecisions in the application of the operation $O$. \begin{figure}[h!] \centering \includegraphics[width=7.8cm]{Main.pdf} \caption{ Scheme of the main experiment: in the upper part, a system initially in the state $\rho_0$ is subjected to the transformation $U_1$ at $t=0$ leading to state $\rho$. Then, an operation $O$ is applied at $t^\prime_1$. Finally, the measurement of the observable $Q$ is performed at $t^\prime_2$. The same realization is considered in the lower part of the figure, except for the fact that $O$ is not carried out at $t^\prime_1$.\label{Scenario1}} \end{figure} It is important to note that nothing that has been said so far relies on the nature of operation $O$ at $t^\prime_1$. Actually, $O$ can be a measurement operator, a unitary operation or even a general quantum channel \cite{NewKnee, Moreira4}. To see this, consider $O$ as an arbitrary quantum operation. One can therefore expect that, in general, \eqref{witness} will be trivially different from zero. Nonetheless, the realization of the control experiments takes the eigenstates of $\mathcal{O}$ as inputs, as shown in Fig. \ref{fig:control}, which belongs to the set of classical states. As we have seen above, the set of classical states includes the convex combinations of these eigenstates. In turn, the control experiments will take into account the classical scenarios for $\ket{g}$ and $\ket{e}$ by determining the values $d_g$ and $d_e$. Then, by convexity, for any $\rho$ belonging to the set of convex combinations of these eigenstates, prepared as a result of the first operation $U_1$ in main the experiment (Fig. \ref{Scenario1}), inequality \eqref{inequality} will be satisfied. \begin{figure}[h!] \centering \includegraphics[width=7.8cm]{control_experiment.pdf} \label{fig:fig14} \caption{ Scheme of the control experiment: in the upper part, the classical states $\ket{g}$ and $\ket{e}$ prepared at $t=0$ are subjected to the operation $O$ at $t^\prime_1$. The measurement of the observable $Q$ is performed at $t^\prime_2$. The same realization is considered in the lower part of the figure, except for the fact that $O$ is not carried out at $t^\prime_1$\label{fig:control}} \end{figure} Note that performing the control experiments with the classical states $\ket{g}$ and $\ket{e}$ as inputs is not the only way to determine $d_g$ and $d_e$. Alternatively, one may carry out this experiment with some classical state $\rho^C$ as input, an equilibrium Gibbs state, for instance, where \begin{equation}\label{classicalState} \rho^C=p_g\ket{g}\bra{g}+p_e\ket{e}\bra{e}, \end{equation} and $p_g+p_e=1$. For this state as input, we have $d_{\rho^C}=p_g d_g + p_e d_e$. Given that $p_g,p_e$ are known and by experimentally determining $d_{\rho_1^C}$ and $d_{\rho_2^C}$ with $\rho_1^C\neq\rho_2^C$, $d_g$ and $d_e$ can be evaluated. \section{IV. Nonclassicality in spectroscopy experiments} We now establish a connection between disturbance and nonlinear electronic spectroscopy experiments. As discussed above, the interactions between the system and the laser pulses will be treated within the framework of the standard perturbative approach, which is the theoretical framework used to analyze these experiments \citep{Mukamel}. The connection will be established by identifying observables which are commonly measured in spectroscopy experiments and that can be considered as the measurement observable $Q$ in the nonclassicality test explained in the previous section. This represents a clear advantage from the point of view of the experimental viability. Before going into the details, it is important to remark that there are alternative theoretical descriptions for electronic spectroscopy that could have been considered \citep{Cheng, Gelin}, and this can be investigated elsewhere. We take $U_1$, $O$, and $U_2$ depicted in Fig. \ref{Scenario1} as the three laser pulses in the spectroscopy experiment depicted in Fig. \ref{2DES}. The first laser may drive the system out of equilibrium and produce the state $\rho$ depicted in Fig. \ref{Scenario1}. As the classical states, we will be considering the eigenstates of the multichromophoric system Hamiltonian, i.e., $\mathcal{O}=H_0$, with $\ket{g}$ being the ground state and $\ket{i}$, with $i=1,2\ldots,n$, the excited states (exciton states). This choice will allow us to spot the presence of quantum coherence in the exciton basis, a topic of much interest to the quantum biology community \cite{Engel,Ishizaki,Panitchayangkoon}. Consider first the top part of Fig.~\ref{Scenario1} of the main experiment. By starting with the state $\rho_0$, typically a Gibbs state, $\rho$ is prepared as the result of the first laser pulse $U_1$. The system then evolves freely under $H_0$ until the second pulse $O$ is applied. Once again, free evolution takes place until the interaction with the last pulse $U_2$. The intensity of the emitted signal, $I^\prime_S(t)$, which is given in terms of the third-order polarization $P^{(3)}(t)$, is measured by a spectrometer at time $t$. Consider now the lower part of Fig.~\ref{Scenario1}, where the second laser pulse represented by $O$ is not applied. Only two interactions with the light pulses, $U_1$ and $U_2$, take place. As a result, the intensity $I_S(t)$ is given in terms of the second-order polarization, $P^{(2)}(t)$. Hence, Eq. \eqref{witness} can be expressed in terms of the induced polarizations as \begin{equation}\label{PN} d_\rho = I^\prime_S(t) - I_S(t) = |P^{(3)}(t)|^2 - |P^{(2)}(t)|^2. \end{equation} If semi-impulsive limit is considered, one can instead define a related quantity $ d^S_\rho = |S^{(3)}(t,t_1,t_2)|^2 - |S^{(2)}(t,t_1,t_2)|^2. $ We should also take into consideration the control experiments shown in Fig. \ref{fig:control}. A total of $n+1$ control experiments should be carried out, each of them corresponding to one of the eigenstates of $H_0$ as input, or different equilibrium states as explained before. As one can see, in the upper part of Fig. \ref{fig:control}, given one of the aforementioned eigenstates as input, only $O$ and $U_2$ are applied. In the lower part, in turn, only $U_2$ is carried out for the same eigenstate as input. As a result, we obtain $d_g= |P^{(2)}_g(t)|^2 - |P^{(1)}_g(t)|^2$ for the ground state and $d_i=|P^{(2)}_i(t)|^2 - |P^{(1)}_i(t)|^2$ for the excited states. Consequently, the invasiveness witness of Eq. \eqref{inequality} now reads \begin{equation}\label{Witness} \min_i\{d_g,d_i\}\le d_\rho \le \max_i\{d_g,d_i\}. \end{equation} Therefore, we have found a sound connection between disturbance and electronic spectroscopy experiments, since $d_\rho$ is given in terms of the polarization, an observable which is commonplace in the context of these experiments. As an illustrative example, let us consider an electronically coupled dimer with the Hamiltonian $(\hbar=1$) \citep{Branczyk} \begin{equation}\label{Hamiltonian} H_0= \omega_A a_A^\dagger a_A + \omega_B a_B^\dagger a_B + J(a_A^\dagger a_B + a_B^\dagger a _A), \end{equation} where $ a_i^\dagger $ and $ a_i $ are, respectively, creation and annihilation operators for electronic excitations at the chromophore $ i \in \{ A, B \} $, $ \omega_A $ and $ \omega_B $ are the first and second site energies, and $ J $ is the coupling between the chromophores. By defining the parameters $ \omega = (\omega_A + \omega_B)/2 $, $ \Delta = (\omega_A - \omega_B)/2$, and $ \theta = \arctan(J/\Delta)/2 $, one can diagonalize the dimer Hamiltonian with the help of the transformed operators $ a_\alpha = \cos \theta a_A + \sin \theta a_B, $ and $ a_\beta = -\sin \theta a_A + \cos \theta a_B $ \citep{Cheng,Branczyk}. In this way, the Hamiltonian \eqref{Hamiltonian} becomes \begin{equation}\label{Hamiltonian2} H_0 = \hbar \omega_\alpha \ket{\alpha}\bra{\alpha} + \hbar \omega_\beta \ket{\beta}\bra{\beta} + \hbar \omega_f \ket{f}\bra{f}, \end{equation} with the eigenvalues $\omega_\alpha = \omega + \Delta \sec 2 \theta, $ $\omega_\beta = \omega - \Delta \sec 2\theta, $ and $\omega_f = \omega_a + \omega_b.$ Without any loss of generality, the ground state $ \ket{g} $ is associated with the eigenvalue $\omega_g=0$. In \eqref{Hamiltonian2}, we also have $ \ket{\alpha} = a_\alpha^\dagger \ket{g} $ and $ \ket{\beta} = a_{\beta}^\dagger \ket{g} $ as single exciton states and $ \ket{f} = a_\alpha^\dagger a_\beta^\dagger \ket{g} $ the two-exciton state. The energy eigenstates of the system, $ \{ \ket{g}, \ket{\alpha}, \ket{\beta}, \ket{f} \} $, constitute the exciton basis and are the classical states in our protocol to witness nonclassicality. By assuming inversion symmetry, the even-order nonlinear polarizations must vanish \citep{Boyd}. Hence, $d_\rho = |P^{(3)}(t)|^2$ and, for the control experiments, $d_j = -|P^{(1)}_j(t)|^2$ with $j = g, \alpha, \beta,f$. The maximum value $d_j$ can assume is, therefore, $d_j =0$. In this case, according to inequality \eqref{Witness}, quantum invasiveness would in principle be witnessed whenever \begin{equation}\label{FinalWitness} |P^{(3)}(t)| \neq 0. \end{equation} Therefore, for the particular case where $P^{(2)}(t)=0$, $|P^{(3)}(t)|\neq 0$ implies nonclassicality. Moreover, if the semi-impulsive limit applies, \eqref{FinalWitness} can be written as $S^{(3)}(t,t_1,t_2)\neq 0$. In this example, one can see that the \textit{whole} protocol, including both the main and control experiments, were reduced to one single condition: $|P^{(3)}(t)|\neq 0$. Note, however, that this condition assumes the absence of underlying experimental errors associated with the particular experimental arrangement. Nonetheless, the control experiments have the purpose to address the clumsiness loophole \citep{Wilde} as well. In our context, the clumsiness loophole means the possibility of explaining the violation of inequality \eqref{Witness} classically. It can be viewed, therefore, as a result of errors and classical disturbance. As mentioned above, it can be addressed by considering classical scenarios, which are a subclass of the more general class of scenarios represented in Fig. \ref{Scenario1} \citep{Knee2, NewKnee, Moreira4}. Classical scenarios correspond to the experiments which have a classical state as input, the classical states being defined as the eigenstates of the observable $\mathcal{O}$, as well as convex mixtures of these eigenstates -- examples of such classical scenarios are the control experiments shown in Fig. \ref{fig:control}. However, as discussed before, these control experiments can be carried out by using, for example, equilibrium Gibbs states as inputs to determine $d_g$ and the $d_i$'s. Through many realizations of the control experiments, one is able to statistically detect errors and possible classical disturbances associated with the particular experimental arrangements by evaluating $d_g$ and the $d_i$'s. Then, we see that our protocol provides a way to block the clumsiness loophole since it allows one to statistically detect classical disturbances, reflecting on the bounds of inequality \eqref{Witness}. We stress that such errors, including not exactly vanishing two-order nonlinear polarizations and different noise mechanisms associated with the particular experimental setup, can only be detected when the experiment is ultimately performed. Inequality \eqref{Witness} will be used to take them into account even when $d_g=d_i=0$ is obtained theoretically, as it is the case for the result expressed in \eqref{FinalWitness}. As a result, by minimizing experimental errors and noise, one increases the possibility of witnessing nonclassicality. For completeness, let us explicitly include some noise to the electronic dimer, what will undoubtedly make the example a bit more realistic. However, we will still keep only electronic states in the system description as vibrational or vibronic effects would render this first discussion unnecessary more involved. This does not mean that vibrational degrees of freedom are not present. They are exactly the source of the environmental noise we are going to discuss below. What we will not do here is to consider dimers or other molecular structures where the coupling to vibration is so intense that this degree of freedom must be included in the system Hamiltonian. We are considering them as part of the bath or environment for the electronic part. An import source of noise is dephasing. This causes the coherences to progressively vanish while keeping the populations unchanged. Physically, the vibration and rotation of the molecule will cause local changes in the charge distribution over the molecule. As a result, the local frequencies $\omega_A$ and $\omega_B$ of the dimer will be stochastically changed by the incoherent thermal motion of external degrees of freedom. Typically, this is described by augmenting Hamiltonian in Eq. \eqref{Hamiltonian2} with terms concerning a bosonic bath and its coupling to the dimer \citep{Li}. By assuming a weak coupling to the bath, what is consistent with the fact that the vibrational degrees of freedom are not explicitly considered as part of the dimer, one can deduce a master equation for the system density matrix $\sigma(t)$ in between the pulses \citep{Mukamel,Li} \begin{equation}\label{Noise} \dot{\sigma}_{\nu\nu^\prime} = -\frac{i}{\hbar}(\epsilon_\nu-\epsilon_{\nu^\prime})\sigma_{\nu\nu^\prime} - \Gamma_{\nu\nu^\prime}\sigma_{\nu\nu^\prime}, \end{equation} with $\nu,\nu^\prime=g,\alpha,\beta,f$ and $\epsilon_\nu,\epsilon_{\nu^\prime}$ the eigenvalues associated with the eigenstates $\ket{\nu}$ in the exciton representation. Also, $\Gamma_{\nu\nu^\prime}$ contains the relaxation rates. For simplicity, we take all the relaxation rates to be the same, $\Gamma_{\nu\nu^\prime}=\Gamma$ and assume the semi-impulsive limit. Let us now consider how dephasing affects the result presented before. Clearly, in between the application of the pulses, the diagonal elements of the system density matrix die out according to \eqref{Noise}. This affects the measured signal through $S^{(3)}(t,t_1,t_2)\propto e^{-\Gamma t}$ \citep{Mukamel, Hamm}. The practical consequence for the protocol presented here is precisely what has been discussed before as the role of generic errors. As the third-order response function will decay exponentially and tend to zero, this implies that \eqref{FinalWitness} becomes less likely to be verified as time increases. Therefore, we see that the presence of noise in the Lindblad form decreases the value of $d_\rho$. As a conclusion, it affects even more the possibility of witnessing nonclassicality in the presence of experimental errors or imprecisions, i.e. when condition \eqref{FinalWitness} will not be valid anymore. Instead, inequality \eqref{Witness} which eventually takes classical disturbances and environmental noise into account in its bounds, which should be ultimatelly determined through the control experiments, must be violated. \section{V. Final considerations} Violations of the LGI for the multichromophoric systems were found theoretically in Ref. \citep{LGWilde}, where projective measurements in the site-basis were employed. However, as pointed out by the authors, such measurements are not realistic when it comes to experimental implementations. Our proposal aims to bridge this gap by linking nonclassicality tests to experimental techniques in a direct and fundamental way. By nonclassicality, in the scope of our work, we mean the nonclassical effect of an operation on the statistics of an observable subsequently measured. This can be associated both with coherence in the basis of an observable and the lack of an ontological interpretation of the measurement results given the deviation from convex sums of classical results, i.e., state superposition. Additionally, given that our work investigate quantum invasiveness in driven systems \citep{Friedenberger}, it deals with setups which are not conventionally considered in Leggett-Garg scenarios. At the same time, by proposing sound protocols which employ well-established experimental techniques such as electronic spectroscopy, we expect that the present work will pave the way for new and exciting experimental investigations in quantum biology and quantum technologies that rely on time-dependent Hamiltonians. \textit{Acknowledgments} - We thank Mauro Paternostro for valuable discussions. S. V. M. acknowledges financial support from the Brazilian agency CAPES and F. L. S. acknowledges partial support from of the Brazilian National Institute of Science and Technology of Quantum Information (INCT-IQ) and CNPq (Grant No. 302900/2017-9).
\section{Introduction}\label{intro}\noindent In this paper we investigate some qualitative properties of the skew-product semiflows generated by the solutions of non-autonomous parabolic partial functional differential equations (PFDEs for short) with finite delay and boundary conditions of Neumann, Robin or Dirichlet type. In this non-autonomous framework the phase space is a product space $\Omega \times C$, where the base $\Omega$ is a compact metric space under the action of a continuous flow $\sigma: \R \times \Omega \to \Omega$, $(t,\omega) \mapsto \omega {\cdot} t$ and the state space $C$ is an infinite dimensional Banach space of continuous functions. The skew-product semiflow $\tau: \R_+\times \Omega \times C \to \Omega \times C$, $(t,\omega,\varphi) \mapsto (\omega{\cdot} t,u(t,\omega, \varphi))$ is built upon the mild solutions of the associated abstract Cauchy problems (ACPs for short) with delay. We assume that the flow in the base is minimal. \par This formalism permits to carry out a dynamical study of the solutions of non-autonomous differential equations in which the temporal variation of the coefficients is almost periodic, almost automorphic or, more generally, recurrent. Frequently, $\Omega$ is obtained as the hull of the non-autonomous function defining the differential equations, although the approach considered here is more general. The references Ellis~\cite{elli}, Johnson et al.~\cite{jonnf}, Sacker and Sell~\cite{sase, sase94}, and Shen and Yi~\cite{shyi}, and references therein, contain ingredients of the theory of non-autonomous dynamical systems which will be used throughout this work. \par The main issue in the paper is the persistence of the systems of parabolic PFDEs. Persistence is a dynamical property which has a great interest in mathematical modelling, in areas such as biological population dynamics, epidemiology, ecology or neural networks. In the field of monotone dynamical systems, different notions of persistence have been introduced, with the general meaning that in the long run the trajectories place themselves above a prescribed region of the phase space, which we take to be a minimal set $K\subset \W\times C$. In many applications this minimal set is $\Omega \times \{0\}$, so that, roughly speaking, uniform or strict persistence means that the solutions eventually become uniformly strongly or strictly positive, respectively. \par In~\cite{obsa18} Obaya and Sanz showed that in the general non-autonomous setting, in order that persistence can be detected experimentally, this notion should be considered as a collective property of the complete family of systems over $\Om$. We follow this collective approach to develop dynamical properties of persistence with important practical implications. Our study intends to extend the theory of persistence written in Novo et al.~\cite{noos7} and Obaya and Sanz~\cite{obsa} for non-autonomous ODEs, FDEs with delay and parabolic PDEs to parabolic PFDEs, considering also the cases of Robin or Dirichlet boundary conditions. \par We briefly explain the structure and contents of the paper. Some basic concepts in the theory of non-autonomous dynamical systems are included in Section~\ref{sec-prelim}. Section~\ref{sec-skew-product} is devoted to describe the dynamical scenario in which the parabolic problems are immersed, distinguishing the case of Neumann or Robin boundary conditions, and the Dirichlet case. We analyze the regularity properties and the long-term behaviour of the solutions that determine the topological structure of omega-limit sets and minimal sets. We follow arguments in the line of Martin and Smith~\cite{masm0,masm} and Wu~\cite{wu} to extend previous results given in Novo et al.~\cite{nonuobsa} for Neumann boundary conditions, to the case of Robin and Dirichlet boundary conditions. We also study the consequences of the so-called quasimonotone condition in the problems. \par In Section~\ref{sec-linearized sem}, under regularity conditions in the reaction terms in the equations, we build the variational problems along the semiorbits of $\tau$, whose mild solutions induce the linearized skew-product semiflow. Then, in the linear and monotone setting, we consider continuous separations of type~II and the associated principal spectrums, which can be determined by Lyapunov exponents. The classical concept of continuous separation given by Pol\'{a}\v{c}ik and Tere\v{s}\v{c}\'{a}k~\cite{pote} in a discrete dynamical setting, and then extended to a continuous setting by Shen and Yi~\cite{shyi}, has proved to be widely applicable in non-autonomous ODEs and parabolic PDEs, but not in equations with delay. Later, Novo et al.~\cite{noos6} introduced a variation of this notion, and called it continuous separation of type~II, in order to make it applicable to delay equations. The results in Novo et al.~\cite{noos7} and Obaya and Sanz~\cite{obsa,obsa18} show its importance in the dynamical description of non-autonomous FDEs with finite delay, and now it becomes relevant in reaction-diffusion systems with delay. \par Finally, in Section~\ref{sec-uniform persistence} we consider regular and quasimonotone parabolic PFDEs. Assuming the existence of a minimal set $K$ for $\tau$ with a flow extension, we first establish an easy criterion for the existence of a continuous separation of type~II over $K$ in terms of the irreducibility of a constant matrix calculated from the partial derivatives of the reaction term in the equations, with respect to the non-delayed and delayed state components. A key fact is that in the general case, after a convenient permutation of the variables in the system, the constant matrix mentioned before has a block lower triangular structure, with irreducible diagonal blocks. This permits to consider a family of lower dimensional linear systems with a continuous separation, for which the property of persistence depends upon the positivity of its principal spectrum. In this situation, a sufficient condition for the presence of uniform or strict persistence in the area above $K$ is given in terms of the principal spectrums of an adequate subset of such systems in each case. \section{Some preliminaries}\label{sec-prelim}\noindent In this section we include some basic notions in topological dynamics for non-autonomous dynamical systems. \par Let $(\W,d)$ be a compact metric space. A real {\em continuous flow \/} $(\W,\sigma,\R)$ is defined by a continuous map $\sigma: \R\times \W \to \W,\; (t,\w)\mapsto \sigma(t,\w)$ satisfying $\sigma_0=\text{Id}$, and $\sigma_{t+s}=\sigma_t\circ\sigma_s$ for each $t, s\in\R$, where $\sigma_t(\w)=\sigma(t,\w)$ for all $\w \in \W$ and $t\in \R$. The set $\{ \sigma_t(\w) \mid t\in\R\}$ is called the {\em orbit\/} of the point $\w$. A subset $\W_1\subset \W$ is {\em $\sigma$-invariant\/} if $\sigma_t(\W_1)=\W_1$ for every $t\in\R$, and it is {\em minimal \/} if it is compact, $\sigma$-invariant and it does not contain properly any other compact $\sigma$-invariant set. Every compact and $\sigma$-invariant set contains a minimal subset. Furthermore, a compact $\sigma$-invariant subset is minimal if and only if every orbit is dense. We say that the continuous flow $(\W,\sigma,\R)$ is {\em recurrent\/} or {\em minimal\/} if $\W$ is minimal. \par A finite regular measure defined on the Borel sets of $\W$ is called a Borel measure on $\W$. Given $\mu$ a normalized Borel measure on $\W$, it is {\em $\sigma$-invariant\/} if $\mu(\sigma_t(\W_1))=\mu(\W_1)$ for every Borel subset $\W_1\subset \W$ and every $t\in \R$. It is {\em ergodic\/} if, in addition, $\mu(\W_1)=0$ or $\mu(\W_1)=1$ for every $\sigma$-invariant Borel subset $\W_1\subset \W$. \par Let $\R_+=\{t\in\R\,|\,t\geq 0\}$. Given a continuous compact flow $(\W,\sigma,\R)$ and a complete metric space $(C,\di)$, a continuous {\em skew-product semiflow\/} $(\W\times C,\tau,\,\R_+)$ on the product space $\W\times C$ is determined by a continuous map \begin{equation*} \begin{array}{cccl} \tau \colon &\R_+\times\W\times C& \longrightarrow & \W\times C \\ & (t,\w,\varphi) & \mapsto &(\w{\cdot}t,u(t,\w,\varphi)) \end{array} \end{equation*} which preserves the flow on $\W$, denoted by $\w{\cdot}t=\sigma(t,\w)$ and referred to as the {\em base flow\/}. The semiflow property means that $\tau_0=\text{Id}$, and $\tau_{t+s}=\tau_t \circ \tau_s$ for all $t, s\geq 0$, where again $\tau_t(\w,\varphi)=\tau(t,\w,\varphi)$ for each $(\w,\varphi) \in \W\times C$ and $t\in \R_+$. This leads to the so-called semicocycle property: \begin{equation}\label{semicocycle} u(t+s,\w,\varphi)=u(t,\w{\cdot}s,u(s,\w,\varphi))\quad\text{for }\; t,s\ge 0\;\;\text{and }\; (\w,\varphi)\in \W\times C\,. \end{equation} \par The set $\{ \tau(t,\w,\varphi)\mid t\geq 0\}$ is the {\em semiorbit\/} of the point $(\w,\varphi)$. A subset $K$ of $\W\times C$ is {\em positively invariant\/} if $\tau_t(K)\subseteq K$ for all $t\geq 0$ and it is $\tau$-{\em invariant\/} if $\tau_t(K)= K$ for all $t\geq 0$. A compact positively invariant set $K$ for the semiflow is {\em minimal\/} if it does not contain any nonempty compact positively invariant set other than itself. The restricted semiflow on a compact and $\tau$-invariant set $K$ admits a {\em flow extension\/} if there exists a continuous flow $(K,\wit\tau,\R)$ such that $\wit \tau(t,\w,\varphi)=\tau(t,\w,\varphi)$ for all $(\w,\varphi)\in K$ and $t\in\R_+$. \par Whenever a semiorbit $\{\tau(t,\w_0,\varphi_0)\mid t\ge 0\}$ is relatively compact, one can consider the {\em omega-limit set\/} of $(\w_0,\varphi_0)$, formed by the limit points of the semiorbit as $t\to\infty$. The omega-limit set is then a nonempty compact connected and $\tau$-invariant set. An important property of an omega-limit set is that semiorbits admit backward extensions inside it. Therefore, the sufficient condition for such a set to have a flow extension is the uniqueness of backward orbits (see~\cite{shyi} for more details). \par In this paper we will sometimes work under some differentiability assumptions. More precisely, when $C$ is a Banach space, the skew-product semiflow $\tau$ is said to be of class $C^1$ when $u$ is assumed to be of class $C^1$ in $\varphi$, meaning that $D_{\!\varphi}u(t,\w,\varphi)$ exists for any $t>0$ and any $(\w,\varphi)\in\W\times C$ and for each fixed $t>0$, the map $(\w,\varphi)\mapsto D_{\!\varphi}u(t,\w,\varphi)\in \mathcal L(C)$ is continuous in a neighborhood of any compact set $K\subset \W\times C$, for the norm topology on $\mathcal L(C)$; moreover, for any $\phi\in C$, $\lim_{\,t\to 0^+}D_{\!\varphi}u(t,\w,\varphi)\,\phi=\phi $ uniformly for $(\w,\varphi)$ in compact sets of $\W\times C$. \par In that case, whenever $K\subset \W\times C$ is a compact positively invariant set, we can define a continuous linear skew-product semiflow called the {\em linearized skew-product semiflow\/} of $\tau$ over $K$, \begin{equation*} \begin{array}{cccl} L: & \R_+\times K \times C& \longrightarrow & K \times C\\ & (t,(\w,\varphi),\phi) & \mapsto &(\tau(t,\w,\varphi),D_{\!\varphi}u(t,\w,\varphi)\,\phi)\,. \end{array} \end{equation*} We note that $D_{\!\varphi}u$ satisfies the linear semicocycle property: \begin{equation}\label{linear semicocycle} D_{\!\varphi}u(t+s,\w,\varphi)=D_{\!\varphi}u(t,\tau(s,\w,\varphi))\,D_{\!\varphi}u(s,\w,\varphi)\quad\text{for }\; t,s\ge 0\,,\; (\w,\varphi)\in K. \end{equation} \par Finally, we include the definition of monotone skew-product semiflow. A Banach space $X$ is {\em ordered} if there is a closed convex cone, i.e., a nonempty closed subset $X_+\subset X$ satisfying $X_+\!+X_+\subset X_+$, $\R_+ X_+\!\subset X_+$ and $X_+\cap(-X_+)=\{0\}$. If besides the positive cone has a nonempty interior, $\Int X_+\not=\emptyset$, $X$ is {\em strongly ordered}. The (partial) {\em strong order relation\/} in $X$ is then defined by \begin{equation}\label{order} \begin{split} v_1\le v_2 \quad &\Longleftrightarrow \quad v_2-v_1\in X_+\,;\\ v_1< v_2 \quad &\Longleftrightarrow \quad v_2-v_1\in X_+\;\text{ and }\;v_1\ne v_2\,; \\ v_1\ll v_2 \quad &\Longleftrightarrow \quad v_2-v_1\in \Int X_+\,.\qquad\quad\quad~ \end{split} \end{equation} The relations $\ge,\,>$ and $\gg$ are defined in the obvious way. If $C$ is an ordered Banach space, the skew-product semiflow $(\W\times C,\tau,\R_+)$ is {\em monotone\/} if \begin{equation*} u(t,\w,\varphi)\le u(t,\w,\phi)\,\quad \text{for\, $t\ge 0$, $\w\in\W$ \,and\, $\varphi, \phi\in C$ \,with\, $\varphi\le \phi$}\,. \end{equation*} Note that monotone semiflows are forward dynamical systems on ordered Banach spaces which preserve the order of initial states along the semiorbits. \section{Skew-product semiflows induced by parabolic PFDEs with delay}\label{sec-skew-product}\noindent In this section we consider time-dependent families of initial boundary value (IBV for short) problems given by systems of parabolic PFDEs with a fixed delay (just taken to be $1$) over a minimal flow $(\W,\sigma,\R)$, with Dirichlet, Neumann or Robin boundary conditions. More precisely, for each $\w\in\W$ we consider the IBV problem \begin{equation*} \left\{\begin{array}{l} \des\frac{\partial y_i}{\partial t}(t,x)= d_i\Delta y_i(t,x)+f_i(\w{\cdot}t,x,y(t,x),y(t-1,x))\,,\quad t>0\,,\;x\in \bar U,\\[.2cm] \alpha_i(x)\,y_i(t,x)+\delta_i\,\des\frac{\partial y_i}{\partial n}(t,x) =0\,,\quad t>0\,,\;\,x\in \partial U,\\[.2cm] y_i(s,x)=\varphi_i(s,x)\,,\quad s\in [-1,0]\,,\;\,x\in \bar U, \end{array}\right. \end{equation*} for $i=1,\ldots,n$, where $\w{\cdot}t$ denotes the flow on $\W$; $U$, the spatial domain, is a bounded, open and connected subset of $\R^m$ ($m\geq 1$) with a sufficiently smooth boundary $\partial U$; $\Delta$ is the Laplacian operator on $\R^m$ and $d_1,\ldots,d_n$ are positive constants called the diffusion coefficients; the map $f:\W\times \bar U\times\R^n\times\R^n\to \R^n$, called the reaction term, with components $f=(f_1,\ldots,f_n)$ satisfies the following condition: \begin{itemize} \item[(C)] $f(\w,x,y,\wit y)$ is continuous, and it is Lipschitz in $(y,\wit y)$ in bounded sets, uniformly for $\w\in \W$ and $x\in\bar U$, that is, given any $\rho>0$ there exists an $L_\rho>0$ such that \[ \|f(\w,x,y_2,\wit y_2)-f(\w,x,y_1,\wit y_1)\|\leq L_\rho\,(\|y_2-y_1\|+\|\wit y_2-\wit y_1\|) \] for any $\w\in \W$, $x\in\bar U$ and $y_i,\,\wit y_i\in\R^n$ with $\|y_i\|,\,\|\wit y_i\|\leq \rho\,,\; i=1,2$; \end{itemize} $\partial/\partial n$ denotes the outward normal derivative at the boundary; and the boundary conditions are called Dirichlet boundary conditions if $\delta_i=0$ and $\alpha_i\equiv 1$, Neumann boundary conditions if $\delta_i=1$ and $\alpha_i\equiv 0$, or Robin boundary conditions if $\delta_i=1$ and $\alpha_i\geq 0$ is sufficiently regular on $\partial U\!$, for $i=1,\ldots,n$. \par Let $C(\bar U)$ be the space of continuous real maps on the closure of $U$, endowed with the sup-norm, which we just denote by $\|\,{\cdot}\,\|$. If every $\delta_i=1$, that is, with Neumann or Robin boundary conditions, the initial value $\varphi_i$ lies in the space $C([-1,0]\times \bar U)\equiv C([-1,0],C(\bar U))$ of the continuous maps on $[-1,0]$ taking values in $C(\bar U)$, whereas with Dirichlet boundary conditions $\varphi_i$ should in addition satisfy the compatibility condition $\varphi_i(0)\in C_0(\bar U)$, the subspace of $C(\bar U)$ of functions vanishing on $\partial U$. \par The former family can be written for short for $y(t,x)=(y_1(t,x),\ldots,y_n(t,x))$ as \begin{equation}\label{family} \left\{\begin{array}{l} \des\frac{\partial y}{\partial t}(t,x)= D\Delta y(t,x)+f(\w{\cdot}t,x,y(t,x),y(t-1,x))\,,\quad t>0\,,\;\,x\in \bar U,\\[.2cm] \bar\alpha(x)\,y(t,x)+\delta\,\des\frac{\partial y}{\partial n}(t,x) =0\,,\quad t>0\,,\;\,x\in \partial U,\\[.2cm] y(s,x)=\varphi(s,x)\,,\quad s\in [-1,0]\,,\;\,x\in \bar U, \end{array}\right. \end{equation} for each $\w\in\W$, where $D$ and $\bar\alpha(x)$ respectively stand for the $n\times n$ diagonal matrices with entries $d_1,\ldots,d_n$ and $\alpha_1(x),\ldots,\alpha_n(x)$; $\delta=1$ for Neumann or Robin boundary conditions and $\delta=0$ for Dirichlet boundary conditions; and $\varphi$ is a given map in the space $C([-1,0],C(\bar U,\R^n))$, which can be identified with $C([-1,0]\times\bar U,\R^n)$. \par Using results by Martin and Smith~\cite{masm0,masm} and Travis and Webb~\cite{trwe}, the construction of a locally defined continuous skew-product semiflow linked to time-dependent families of IBV problems given by systems of parabolic PFDEs with (possibly variable) finite delay has been explained in Novo et al.~\cite{nonuobsa} in the case of Neumann boundary conditions. In fact, the problem with Robin boundary conditions admits a common treatment. Notwithstanding, the problem with Dirichlet boundary conditions is more delicate. \par In any case, the main idea is to immerse the family of problems with delay~\eqref{family} into a family of retarded abstract equations in an appropriate Banach space $B$, \begin{equation}\label{ACPdelay} \left\{\begin{array}{l} z'(t) = A z(t)+ F(\w{\cdot}t,z_t)\,,\quad t>0\,,\\ z_0=\varphi\in C([-1,0],B)\,, \end{array}\right. \end{equation} where for each $t\geq 0$, $z_t$ is the map defined by $z_t(s)=z(t+s)$ for $s\in [-1,0]$, and then use the semigroup theory approach. On the space of continuous functions $C([-1,0],B)$ the sup-norm will be used and it will be denoted by $\n{\cdot}_C$. \par When it's time to choose a Banach space, it is important to have in mind the kind of results that one wants to obtain. On the one hand, we want a strongly continuous semigroup of operators, so that the induced skew-product semiflow is continuous. On the other hand, in Section~\ref{sec-uniform persistence} we will be working with some strong monotonicity conditions, so that we need a cone of positive elements in the Banach space with a nonempty interior. For this reason, in the Dirichlet case we skip to work in $C_0(\bar U)$, since the natural cone of positive elements has an empty interior, and we better choose an intermediate space; more precisely, a domain of fractional powers associated to the realization of the Dirichlet Laplacian in $L^p(U)$. Nice sections dedicated to these spaces can be found in Henry~\cite{henr}, Lunardi~\cite{luna} or Pazy~\cite{pazy}. \par At this point it seems convenient to present the Neumann and Robin cases, and the Dirichlet case separately. \subsection{The case of Neumann or Robin boundary conditions}\label{sect-Neumann} In this case for each component $i=1,\ldots,n$ we consider on the space $C(\bar U)$ the differential operator $A_i^0 z_i = d_i\Delta z_i$ with domain $D(A_i^0)$ given by \[ \left\{z_i\in C^2(U)\cap C^1(\bar U)\;\Big|\; A_i^0z_i\in C(\bar U)\,,\; \alpha_i(x)\,z_i(x)+\des\frac{\partial z_i}{\partial n}(x)=0\, \;\forall \;x\in \partial U \right\}. \] Then, the closure $A_i$ of $A_i^0$ in $C(\bar U)$ is a sectorial operator and it generates an analytic semigroup of bounded linear operators $(T_i(t))_{t\geq 0}$, which is usually just written down as $(e^{tA_i})_{t\geq 0}$, and $e^{tA_i}$ is compact for any $t>0$ (for instance, see Smith~\cite{smit}). Besides, the semigroup is strongly continuous, that is, $A_i$ is densely defined. \par On the product Banach space $E=C(\bar U)^n\equiv C(\bar U,\R^n)$ endowed with the norm $\|(z_1,\ldots,z_n)\|=\sum_{i=1}^n\|z_i\|$, we consider the operator $A=\Pi_{i=1}^n A_i$ with domain $D(A)=\Pi_{i=1}^n D(A_i)$, which is sectorial and generates an analytic semigroup of operators $(e^{tA})_{t\geq 0}$, with $e^{tA}=\Pi_{i=1}^n e^{tA_i}$, and $e^{tA}$ is compact for any $t>0$. \par Let us define $F:\W\times C([-1,0],E)\to E$, $(\w,\varphi)\mapsto F(\w,\varphi)$ by \begin{equation}\label{F} F(\w,\varphi)(x)=f(\w,x,\varphi(0,x),\varphi(-1,x))\,,\quad x\in \bar U \end{equation} and consider the retarded abstract problems on $E$ given in~\eqref{ACPdelay}. As explained in Novo et al.~\cite{nonuobsa}, with condition (C) on $f$, mild solutions of these ACPs with delay, that is, continuous solutions of the integral equations \begin{equation}\label{variation constants} z(t)=e^{tA}\,z(0) +\int_0^t e^{(t-s)A}\,F(\w{\cdot}s,z_s) \,ds\,,\quad t\geq 0\,, \end{equation} permit us to set a locally defined continuous skew-product semiflow \begin{equation*} \begin{array}{cccc} \tau: &\mathcal{U} \subseteq\R_+\times \W\times C([-1,0],E) & \longrightarrow & \W\times C([-1,0],E)\\ & (t,\w,\varphi) & \mapsto &(\w{\cdot}t,z_t(\w,\varphi))\,, \end{array} \end{equation*} for an appropriate open set $\mathcal{U}$, where as usual $z_t(\w,\varphi)(s)=z(t+s,\w,\varphi)$ for every $s\in [-1,0]$, for $t\geq 0$. Besides, for any $t>1$ the section map $\tau_t$ is compact, meaning that it takes bounded sets in $\W\times C([-1,0],E)$ into relatively compact sets (see Proposition~2.4 in Travis and Webb~\cite{trwe}), and if a solution $z(t,\w,\varphi)$ remains bounded, then it is defined on the whole positive real line and the semiorbit of $(\w,\varphi)$ is relatively compact \par It is well-known that we have to impose some extra conditions on the map $f$ in~\eqref{family} in order to gain regularity in the solutions of the associated ACPs~\eqref{ACPdelay}. For completeness, we include the definition of what we call a classical solution. Different names for the same concept are sometimes found in the literature. \begin{defi}\label{defi-clasica} A map $z\in C^1((0,T],E)\cap C((0,T],D(A))\cap C([0,T],E)$ which satisfies~\eqref{ACPdelay} for $0<t\leq T$ is a {\em classical solution\/} on $[0,T]$. \end{defi} The following condition is often referred to as a {\em time regularity\/} condition. \begin{itemize} \item[($C^\theta(t)$)] $f(\w{\cdot}t,x,y,\wit y)$ is $\theta$-H\"{o}lder continuous in $t$ (for some $\theta\in(0,1)$) in bounded sets of $\R^n\times \R^n$ uniformly for $\w\in \W$ and $x\in\bar U$; that is, given any $r>0$ there exists an $l_r>0$ such that \[ \|f(\w{\cdot}t,x,y,\wit y)-f(\w{\cdot}s,x,y,\wit y)\|\leq l_r\,|t-s|^\theta\,,\quad t,\,s\geq 0\,, \] for any $\w\in \W$, $x\in\bar U$ and $y,\wit y\in\R^n$ with $\|y\|, \|\wit y\|\leq r$\,. \end{itemize} \par We include a short proof of the following result, which follows from Theorem~4.1 in Novo et al.~\cite{nonuobsa}. \begin{teor}\label{teor-time regularity-Neumann} Assume conditions $(C)$ and $(C^\theta(t))$, for some $\theta\in(0,1/2)$, on the map $f$ in~\eqref{family}. Then, for fixed $\w\in\W$ and $\varphi\in C([-1,0],E)$: \begin{itemize} \item[(i)] The mild solution of~\eqref{ACPdelay} is classical for $t\geq 1$, provided that it is defined. \item[(ii)] If $\varphi:[-1,0]\to E$ is $\theta$-H\"{o}lder continuous and besides $\varphi(0)\in C^{2\theta}(\bar U,\R^n)$, then the mild solution of~\eqref{ACPdelay} is a classical solution on intervals $[0,T]$ as long as it is defined. \end{itemize} \end{teor} \begin{proof} (i) Assume that the mild solution $z(t)=z(t,\w,\varphi)$ of~\eqref{ACPdelay} is defined for $t\in [0,T]$, and let $g(t)=F(\w{\cdot}t,z_t)$ for $t\in [0,T]$. Then, if $T>1$, for any $\varepsilon>0$, it is well-known that $z\in C^\theta([\varepsilon,T],E)$ meaning that it is $\theta$-H\"{o}lder continuous in $t$ (see Lunardi~\cite{luna}), so that under conditions (C) and $(C^\theta(t))$, $g$ is $\theta$-H\"{o}lder continuous on $[1+\varepsilon,T]$. The classical theory for the nonhomogeneous equation $z'(t)=Az(t)+g(t)$ then says that $z(t)$ is a classical solution on $[1,T]$ (see Henry~\cite{henr} or Lunardi~\cite{luna}). \par For (ii), note that with Neumann of Robin boundary conditions, $z\in C^\theta([0,\varepsilon],E)$ if and only if $\varphi(0)\in C^{2\theta}(\bar U,\R^n)$, provided that $\theta<1/2$ (for instance, see Lunardi~\cite{luna}), and then just argue as before. \end{proof} Still an additional condition has to be imposed on $f$ in order to have classical solutions $y(t,x)$ of the IBV problems with delay~\eqref{family}: \begin{itemize} \item[$(C^\theta(x))$] $f(\w,x,y,\wit y)$ is $\theta$-H\"{o}lder continuous in $x$ (for some $\theta\in(0,1)$) in bounded sets of $\R^n\times\R^n$ uniformly for $\w\in \W$; that is, given any $r>0$ there exists an $l_r>0$ such that for any $\w\in \W$ and $y,\wit y\in\R^n$ with $\|y\|, \|\wit y\|\leq r$, \[ \|f(\w,x_2,y,\wit y)-f(\w,x_1,y,\wit y)\|\leq l_r\,\|x_2-x_1\|^\theta\,,\quad x_1,\,x_2\in \bar U. \] \end{itemize} \par Note that the classical space where one looks for solutions is $C^{1,2}([a,b]\times \bar U,\R^n)$, for appropriate time intervals $[a,b]$. We are going to use some optimal regularity results of solutions of IBV problems contained in Lunardi~\cite{luna}. Nevertheless, since we are just interested in the $C^{1,2}$ regularity of solutions, we are not going to pay the due attention to the optimal regularity there proved. Some classical references for regularity results are Friedman~\cite{frie} and Ladyzhenskaja et al.~\cite{lasu}. \begin{teor}\label{teor-space regularity-Neumann} Assume conditions $(C)$, $(C^{\theta}(t))$ and $(C^{2\theta}(x))$ on the map $f$ in~\eqref{family}, for some $\theta\in(0,1/2)$, with Neumann or Robin boundary conditions. For fixed $\w\in\W$ and $\varphi\in C([-1,0],E)$, assume that the mild solution $z(t)=z(t,\w,\varphi)$ is defined on a time interval $[0,T]$ and set $y(t,x)=z(t)(x)$ for $t\in [0,T]$ and $x\in \bar U$, as well as $y(s,x)=\varphi(s,x)$ for $s\in [-1,0]$ and $x\in \bar U$. Then: \begin{itemize} \item[(i)] If $T>1$, for any $\varepsilon>0$ the map $y\in C^{1,2}([1+\varepsilon,T]\times \bar U,\R^n)$ is a solution of the IBV problem~\eqref{family} for $1+\varepsilon<t\leq T$. \item[(ii)] If $\varphi\in C^{\theta,2\theta}([-1,0]\times \bar U, \R^n)$, then, for any $\varepsilon>0$, $y\in C^{1,2}([\varepsilon,T]\times \bar U,\R^n)$ is a solution of the IBV problem~\eqref{family} for $\varepsilon<t\leq T$. \end{itemize} \end{teor} \begin{proof} For the continuous map $h(t,x)=f(\w{\cdot}t,x,y(t,x),y(t-1,x))$, $(t,x)\in [0,T]\times\bar U$, we consider the IBV problem on $[0,T]\times\bar U$, \begin{equation}\label{auxiliar-robin} \left\{\begin{array}{l} \des\frac{\partial y}{\partial t}(t,x)= D\Delta y(t,x)+h(t,x)\,,\quad 0<t\leq T,\;\,x\in \bar U,\\[.2cm] \bar\alpha(x)\,y(t,x)+\des\frac{\partial y}{\partial n}(t,x) =0\,,\quad 0<t\leq T,\;\,x\in \partial U,\\[.2cm] y(0,x)=\varphi(0,x)\,, \quad x\in \bar U. \end{array}\right. \end{equation} \par Note that in both items $y(t,x)=z(t)(x)$ is $C^1$ in $t$ because $z(t)$ is a classical solution, by Theorem~\ref{teor-time regularity-Neumann}. Therefore, it remains to check the $C^2$ regularity in $x$. \par By Theorem~5.1.17 in~\cite{luna}, $y(t,x)\in C^{\theta,2\theta}([\delta,T]\times \bar U)$ for any $\delta>0$ (condition (C) on $f$ is enough for this). Then, fixed $\varepsilon>0$, $h(t,x)\in C^{\theta,2\theta}([1+\frac{\varepsilon}{2},T]\times \bar U)$, and from Theorem~\ref{teor-time regularity-Neumann}, $z(1+\frac{\varepsilon}{2})\in D(A)$, so that the boundary condition is fulfilled at $t=1+\frac{\varepsilon}{2}$. Then, we can apply Proposition~7.3.3~(iii) in~\cite{luna} to the IBV problem~\eqref{auxiliar-robin} for $1+\frac{\varepsilon}{2}<t\leq T$ with initial condition $y(1+\frac{\varepsilon}{2},x)=z(1+\frac{\varepsilon}{2})(x)$ for $x\in \bar U$, to deduce that $y\in C^{1,2}([1+\varepsilon,T]\times \bar U,\R^n)$. The proof of (i) is finished. \par Recall that $\varphi(0)\in C^{2\theta}(\bar U,\R^n)$ is the necessary and sufficient condition to guarantee that $y(t,x)\in C^{\theta,2\theta}([0,T]\times \bar U)$. With the assumption $\varphi\in C^{\theta,2\theta}([-1,0]\times \bar U, \R^n)$ in~(ii), $h(t,x)\in C^{\theta,2\theta}([0,T]\times \bar U)$. Arguing as in the previous paragraph, we can deduce that $y\in C^{1,2}([\varepsilon,T]\times \bar U,\R^n)$ for any $\varepsilon>0$. The proof is finished. \end{proof} \subsection{The case of Dirichlet boundary conditions}\label{sect-Dirichlet} This time, for each component $i=1,\ldots,n$ we consider on the space $C(\bar U)$ the differential operator $A_i^0 z_i = d_i\Delta z_i$ with domain $D(A_i^0)=\{z_i\in C^2(U)\cap C_0(\bar U)\;|\; A_i^0z_i\in C_0(\bar U)\}$. The closure $A_i$ of $A_i^0$ in $C(\bar U)$ is a sectorial operator which generates an analytic semigroup of bounded linear operators $(e^{tA_i})_{t\geq 0}$, with $e^{tA_i}$ compact for any $t>0$ (see Lunardi~\cite{luna} or Smith~\cite{smit}), but now the semigroup is not strongly continuous, since $\overline{ D(A_i)}=C_0(\bar U)$. As in Section \ref{sect-Neumann}, $A=\Pi_{i=1}^n A_i$ is the sectorial operator with domain $D(A)=\Pi_{i=1}^n D(A_i)$ on the product Banach space $E=C(\bar U)^n\equiv C(\bar U,\R^n)$, and $e^{tA}$ is compact for any $t>0$. \par In this case, we also consider for each component $i$ the realization of the Dirichlet $d_i$-Laplacian on the Banach space $L^p(U)$ for a fixed $m<p<\infty$, that is, the operator $A_{i,p}:D(A_{i,p})\subset L^p(U)\to L^p(U)$ defined by $A_{i,p}z_i=d_i\Delta z_i$ (in a weak sense) for $z_i\in D(A_{i,p})$. This operator is sectorial, densely defined and $0\in\rho(A_{i,p})$. Then, for $\alpha\in (1/2+m/(2p),1)$, let $E_i^\alpha:=D(-A_{i,p})^\alpha=\rg (-A_{i,p})^{-\alpha}$ be the domain of fractional power $\alpha$ of $-A_{i,p}$, which is a Banach space with norm $\|z_i\|_\alpha = \|(-A_{i,p})^{\alpha}\,z_i\|_p$ and satisfies $E_i^\alpha\hookrightarrow C^1(\bar U)$ (see Theorem~1.6.1 in Henry~\cite{henr}). Besides, $E_i^\alpha$ is an intermediate space in the class $J_\alpha$ between $L^p(U)$ and $D(A_{i,p})$, that is, we have continuous embeddings $D(A_{i,p}) \hookrightarrow E_i^\alpha \hookrightarrow L^p(U)$ and there exists a constant $c_i>0$ such that $ \|z_i\|_\alpha\leq c_i\,\|A_{i,p}z_i\|_p^\alpha\,\|z_i\|_p^{1-\alpha}$ for any $z_i\in D(A_{i,p})$. Also the following estimate holds, which will be used later on: \begin{equation}\label{estimate} \| (-A_{i,p})^\alpha\,e^{t A_{i,p}}\|_{\mathcal{L}(L^p(U))}\leq M_\alpha\,t^{-\alpha}\,e^{-w t}\,,\quad t>0\, , \end{equation} for some $w>0$ and $M_\alpha>0$ (see Theorem~6.13 in Pazy~\cite{pazy}). \par In all, $D(A_i)\hookrightarrow D(A_{i,p})\hookrightarrow E_i^\alpha \hookrightarrow C^1(\bar U) \hookrightarrow C(\bar U) \hookrightarrow L^p(U)$ and $E_i^\alpha$ as an intermediate space in the class $J_\alpha$ between $C(\bar U)$ and $D(A_i)$. \par This time, we consider on the product Banach space $L^p(U)^n\equiv L^p( U,\R^n)$ with norm $\|(z_1,\ldots,z_n)\|_p=\sum_{i=1}^n \|z_i\|_p$, the operator $A_p=\Pi_{i=1}^n A_{i,p}$ with domain $D(A_p)=\Pi_{i=1}^n D(A_{i,p})$ and the bounded linear operator $(-A_p)^{-\alpha}=\Pi_{i=1}^n (-A_{i,p})^{-\alpha}$. We also consider the product Banach space $E^\alpha=\Pi_{i=1}^n E_i^\alpha$ endowed with the norm $\|(z_1,\ldots,z_n)\|_\alpha=\sum_{i=1}^n\|z_i\|_\alpha$. Thanks to H\"{o}lder's inequality, it is immediate to check that $E^\alpha$ is an intermediate Banach space between $E$ and $D(A)$ in the class $J_\alpha$. In fact, because of the continuous embeddings, $(e^{t A})_{t\geq 0}$ is an analytic semigroup of bounded linear operators on $E^\alpha$ and besides in this case: \begin{equation}\label{sup finito} \limsup_{t\to 0^+} \|e^{tA}\|_{\mathcal{L}(E^\alpha)}<\infty\,. \end{equation} Furthermore, it is easy to check that the semigroup of operators $(e^{t A})_{t\geq 0}$ is strongly continuous on $E^\alpha$, that is, $D(A)$ is dense in $E^\alpha$: just take any $z\in E^\alpha$, that is, $z=(-A_{p})^{-\alpha}\,y$ for some $y\in L^p(U,\R^n)$ and since $(-A_{p})^{-\alpha}$ commutes with $e^{tA_{p}}$, $\|e^{t A}z-z\|_\alpha= \|e^{t A_p}(-A_{p})^{-\alpha}\,y- (-A_{p})^{-\alpha}\,y\|_\alpha=\|e^{t A_p}y-y\|_p\to 0$ as $t\to 0^+$, since $(e^{t A_p})_{t\geq 0}$ is strongly continuous in $L^p(U,\R^n)$. In particular, $E^\alpha\hookrightarrow\overline{ D(A)}=C_0(\bar U,\R^n)$. Finally, $e^{t A}:E^\alpha \to E^\alpha$ is compact for any $t>0$. This follows from $E^\alpha \hookrightarrow E$, the compactness of $e^{(t/2) A}:E\to E$ and the boundedness of $e^{(t/2) A}:E\to E^\alpha$ because $E^\alpha$ is an intermediate space in the class $J_\alpha$. \par On this occasion, we consider $F:\W\times C([-1,0],E^\alpha)\to E$, $(\w,\varphi)\mapsto F(\w,\varphi)$ defined as in~\eqref{F}, and the retarded ACPs on $E^\alpha$ given in~\eqref{ACPdelay}. Although there are some results for these problems in the $\alpha$-norm (e.g., see Travis and Webb~\cite{trwe78}), here we opt to apply the ``method of steps" to get existence and uniqueness of mild solutions of~\eqref{ACPdelay}, arguing on $[0,1]$ first, then on $[1,2]$, and so on. In this way we can apply the well-established theory for semilinear ACPs with nonlinearities defined in intermediate spaces (for instance, see Chapter~7 in Lunardi~\cite{luna}). So, for fixed $\w\in \W$ and $\varphi\in C([-1,0],E^\alpha)$, let us define the map $ \wit F:[0,1]\times E^\alpha \to E$ by $\wit F(t,v)(x)=f(\w{\cdot}t,x,v(x),\varphi(t-1,x))$ for any $x\in \bar U$, for the map $f$ in~\eqref{family}. It is easy to check that condition (C) on $f$ is transferred to the map $\wit F$, in the sense that $\wit F$ is continuous and it is Lipschitz in $v$ in bounded sets of $E^\alpha$, uniformly for $t\in [0,1]$; that is, given $R>0$ there exists a $C_R>0$ such that for $t\in[0,1]$, \begin{equation}\label{lipsch v} \|\wit F(t,v_2)-\wit F(t,v_1)\|\leq C_R\,\|v_2-v_1\|_\alpha\quad\hbox{for any }\; \|v_1\|_\alpha, \|v_2\|_\alpha\leq R\,. \end{equation} \par With these conditions, the standard theory for the semilinear ACP in $E^\alpha$, \begin{equation}\label{ACP} \left\{\begin{array}{l} z'(t) = A z(t)+ \wit F(t,z(t))\,,\quad t>0\,,\\ z(0)=\varphi(0)\in E^\alpha\,, \end{array}\right. \end{equation} with $A$ sectorial and densely defined, says that the problem admits a unique mild solution $z=z(t,\w,\varphi)\in C([0,\delta],E^\alpha)$ for a certain $\delta=\delta(\w,\varphi)\in (0,1]$, that is, $z$ is a continuous solution of the integral equation \begin{equation*} z(t)=e^{tA}\,z(0) +\int_0^t e^{(t-s)A}\,\wit F(s,z(s)) \,ds\,,\quad t\in [0,\delta]\,. \end{equation*} Compare with~\eqref{variation constants} to see that $z$ is also a mild solution of~\eqref{ACPdelay} on $[0,\delta]$. \par Whenever the mild solution is globally defined on $[0,1]$, then we consider the ACP~\eqref{ACP} on $[1,2]$ with $\wit F(t,v)(x)=f(\w{\cdot}t,x,v(x),z(t-1,\w,\varphi)(x))$ for any $x\in \bar U$, and $z(1)=z(1,\w,\varphi)\in E^\alpha$. Now $\wit F$ is continuous and satisfies~\eqref{lipsch v} on $[1,2]$, and once more the problem admits a unique mild solution. Both solutions stuck together give the mild solution on $[0,1+\delta']$, and note once more that $z$ is a mild solution of~\eqref{ACPdelay} too. This procedure can be iterated, as long as the mild solution is defined. \par Standard arguments using a generalized version of the Gronwall's lemma (see Lemma~7.1.1 in Henry~\cite{henr}) permit to see that the mild solution $z(t,\w,\varphi)$ depends continuously on the initial condition $\varphi$, and also on $\w\in\W$ (note that the map $F$ depends on both $\w$ and $\varphi$). Therefore, mild solutions of the ACPs permit us to set a locally defined continuous skew-product semiflow \begin{equation*} \begin{array}{cccc} \tau: &\mathcal{U} \subseteq\R_+\times \W\times C([-1,0],E^\alpha) & \longrightarrow & \W\times C([-1,0],E^\alpha)\\ & (t,\w,\varphi) & \mapsto &(\w{\cdot}t,z_t(\w,\varphi))\,, \end{array} \end{equation*} for an appropriate open set $\mathcal{U}$, where $z_t(\w,\varphi)(s)=z(t+s,\w,\varphi)$ for every $s\in [-1,0]$. Also here, if a solution $z(t,\w,\varphi)$ remains bounded, then it is defined on the whole positive real line and the semiorbit of $(\w,\varphi)$ is relatively compact: see the arguments in the proof of Proposition~3.1 in Novo et al.~\cite{nonuobsa}. \par Note that we can also consider $F:\W\times C([-1,0],E)\to E$ defined as in~\eqref{F}, and solve the retarded ACP~\eqref{ACPdelay} for any $\varphi\in C([-1,0],E)$ (with $\varphi(0)\in C_0(\bar U,\R^n)$ if continuity of the mild solution up to $t=0$ is wanted). Then, since $E^\alpha$ is an intermediate space between $E$ and $D(A)$, from~\eqref{variation constants} it follows that for $t>1$, $z_t(\w,\varphi)\in C([-1,0],E^\alpha)$ (see Proposition~4.2.1 in Lunardi~\cite{luna}). In fact, one can prove that for $t>1$, the section semiflow $\tau_t:\W\times C([-1,0],E)\to \W\times C([-1,0],E^\alpha)$ is compact on its domain: argue as in Proposition~2.4 in Travis and Webb~\cite{trwe}. \par We finish this section with some results on regularity of solutions. A classical solution is defined exactly as in Definition~\ref{defi-clasica}. \begin{teor}\label{teor-time regularity-Dirichlet} Assume conditions $(C)$ and $(C^\theta(t))$, for some $\theta\in(0,1/2)$, on the map $f$ in~\eqref{family}. Then, for fixed $\w\in\W$ and $\varphi\in C([-1,0],E^\alpha)$: \begin{itemize} \item[(i)] The mild solution of~\eqref{ACPdelay} is classical for $t\geq 1$, provided that it is defined. \item[(ii)] If $\varphi:[-1,0]\to E$ is $\theta$-H\"{o}lder continuous, then the mild solution of~\eqref{ACPdelay} is a classical solution on intervals $[0,T]$ as long as it is defined. \end{itemize} \end{teor} \begin{proof} The proof follows the same lines as that of Theorem~\ref{teor-time regularity-Neumann}. Just recall that $E^\alpha\hookrightarrow\overline{ D(A)}=C_0(\bar U,\R^n)$, and that with Dirichlet boundary conditions the mild solution $z\in C^\theta([0,\varepsilon],E)$ if and only if $\varphi(0)\in C_0^{2\theta}(\bar U,\R^n)$ (see~\cite{luna}). Since $\varphi(0)\in E^\alpha\hookrightarrow C^1(\bar U,\R^n)$, and $\theta<1/2$, we can give it for granted. The proof is finished. \end{proof} \begin{teor}\label{teor-space regularity-Dirich} Assume conditions $(C)$, $(C^{\theta}(t))$ and $(C^{2\theta}(x))$ on the map $f$ in~\eqref{family}, for some $\theta\in(0,1/2)$, with Dirichlet boundary conditions. For fixed $\w\in\W$ and $\varphi\in C([-1,0],E^\alpha)$, assume that the mild solution $z(t)=z(t,\w,\varphi)$ is defined on a time interval $[0,T]$ and set $y(t,x)=z(t)(x)$ for $t\in [0,T]$ and $x\in \bar U$, as well as $y(s,x)=\varphi(s,x)$ for $s\in [-1,0]$ and $x\in \bar U$. Then: \begin{itemize} \item[(i)] If $T>1$, for any $\varepsilon>0$ the map $y\in C^{1,2}([1+\varepsilon,T]\times \bar U,\R^n)$ is a solution of the IBV problem~\eqref{family} for $1+\varepsilon<t\leq T$. \item[(ii)] If $\varphi\in C^\theta([-1,0], E)$, then for any $\varepsilon>0$ the map $y\in C^{1,2}([\varepsilon,T]\times \bar U,\R^n)$ is a solution of the IBV problem~\eqref{family} for $\varepsilon<t\leq T$. \end{itemize} \end{teor} \begin{proof} The proof follows the same lines as that of Theorem~\ref{teor-space regularity-Neumann}. For the continuous map $h(t,x)=f(\w{\cdot}t,x,y(t,x),y(t-1,x))$ for $(t,x)\in [0,T]\times\bar U$, consider the IBV problem~\eqref{auxiliar-robin} but with boundary condition $y(t,x)=0$ for $0<t\leq T$, $x\in \partial U$. \par This time by Theorem~5.1.11 in~\cite{luna}, $y(t,x)\in C^{\theta,2\theta}([\varepsilon,T]\times \bar U)$ for any $\varepsilon>0$. Since we are working on $E^\alpha$ with $\alpha>1/2$, $\varphi(0)\in E^\alpha\hookrightarrow C^{2\theta}_0(\bar U,\R^n)$ and then in fact $y(t,x)\in C^{\theta,2\theta}([0,T]\times \bar U)$. Therefore, the map $h(t,x)\in C^{\theta,2\theta}([1,T]\times \bar U)$. Besides, since for any $t\geq 0$, $z(t)\in E^\alpha \hookrightarrow C_0(\bar U,\R^n)$, we have that $z(t)(x)=0$ for any $t\geq 0$ and any $x\in \partial U$. With these conditions we can apply Proposition~7.3.2~(iii) in~\cite{luna} to the IBV problem for $1<t\leq T$ with initial condition $y(1,x)=z(1)(x)$ for $x\in \bar U$, to get that $y\in C^{1,2}([1+\varepsilon,T]\times \bar U,\R^n)$ and (i) is proved. \par With the assumptions in (ii), and the fact that $\varphi(s)\in E^\alpha\hookrightarrow C^{2\theta}(\bar U,\R^n)$ for any $s\in [-1,0]$, now $h(t,x)\in C^{\theta,2\theta}([0,T]\times \bar U)$. Once more Proposition~7.3.2~(iii) in~\cite{luna} implies that $y\in C^{1,2}([\varepsilon,T]\times \bar U,\R^n)$. The proof is finished. \end{proof} \subsection{Monotone skew-product semiflows induced by quasimonotone parabolic PFDEs}\label{sec-monotonos} In this section we are concerned with the classical quasimonotone condition which renders the skew-product semiflow induced by mild solutions monotone. We state this result, together with a technical inequality which will be fundamental in Section~\ref{sec-uniform persistence}. \par First of all, we describe the cones of positive vectors in the spaces we are dealing with. In the case of Neumann or Robin boundary conditions, $C([-1,0],E)$ is a strongly ordered Banach space with positive cone $ C_+([-1,0],E)=\{\varphi\in C([-1,0],E)\mid \varphi(s)\in E_+\;\text{for} \; s\in [-1,0]\}$ where $E_+=\{z\in E\mid z(x)\geq 0\;\text{for} \; x\in\bar U\}$ and $\R^n_+=\{y\in\R^n\mid y_i\geq 0\; \text{for}\; i=1,\ldots,n\}$. Note that we can trivially identify \[ \Int C_+([-1,0],E)=\{\varphi \in C([-1,0]\times\bar U,\R^n)\mid \varphi(s,x)\gg 0 \;\text{for}\; s\in [-1,0]\,,\,x\in\bar U \}\,. \] \par In the case of Dirichlet boundary conditions, $C([-1,0],E^\alpha)$ is a strongly ordered Banach space with $ C_+([-1,0],E^\alpha)=\{\varphi\in C([-1,0],E^\alpha)\mid \varphi(s)\in E^\alpha_+\;\text{for} \; s\in [-1,0]\}\,, $ where the positive cone in $E^\alpha$ is $E^\alpha_+=\{z\in E^\alpha\,\big|\; z(x)\geq 0\;\text{for} \; x\in\bar U \}$. Besides, $E^\alpha_+$ has a nonempty interior, since \begin{equation*} \Big\{z\in E^\alpha_+\,\big|\; z(x)\gg 0\;\text{for} \; x\in U \;\text{and}\; \frac{\partial z}{\partial n}(x)\ll 0 \;\text{for} \; x\in\partial U \Big\}= \Int E^\alpha_+\,, \end{equation*} and $\Int C_+([-1,0],E^\alpha)=\{\varphi\in C([-1,0],E^\alpha)\mid \varphi(s)\in \Int E^\alpha_+ \text{ for }s\in[-1,0]\}\not=\emptyset$. \par To unify the writing, $E^\gamma$ will stand for the Banach space $E$ in the problem with Neumann or Robin boundary conditions, and for $E^\alpha$ in the problem with Dirichlet boundary conditions; and $C_\gamma$ for the space $C([-1,0],E^\gamma)$ with the sup-norm $\|\,{\cdot}\,\|_{C_\gamma}$. Also, the order relations in $E^\gamma$ and $C_\gamma$ will just be denoted by $\leq$, $<$ and $\ll$ according to~\eqref{order}, but have in mind the different spaces involved in each case. \begin{prop}\label{prop-monotone} Assume hypotheses $\rm{(C)}$ and $(C^{\theta}(t))$, for some $0<\theta<1/2$, on the map $f$ in~\eqref{family}, plus the quasimonotone condition: \begin{itemize} \item[(QM)] If $\,y,\wit y, u,\wit u\in \R^n$ with $y\leq u$, $\wit y\leq \wit u$ and $y_i=u_i$ for some $i\in\{1,\ldots,n\}$, then $f_i(\w,x,y,\wit y)\leq f_i(\w,x,u, \wit u)$ for any $\w\in\W$ and $x\in\bar U$. \end{itemize} Besides, in the Dirichlet case assume further: \begin{itemize} \item[(DM)] $f(\w,x,0,0)=0$ for any $\w\in\W$ and $x\in\partial U$. \end{itemize} Then: \begin{itemize} \item[(i)] The induced skew-product semiflow on $\W\times C_\gamma$ is monotone, that is, if $\varphi,\psi\in C_\gamma$ with $\varphi\leq \psi$, then $z_t(\w,\varphi)\leq z_t(\w,\psi)$ for any $\w\in\W$ and any $t\geq 0$ where both terms are defined. \item[(ii)] Given $\w\in\W$ and $\varphi,\psi\in C_\gamma$ with $\varphi\leq \psi$ such that $z(t,\w,\varphi)$ and $z(t,\w,\psi)$ are defined for $t\in[0,\beta]$ for some $\beta>0$, there exists an $L=L(\w,\varphi,\psi,\beta)>0$ such that for each $i=1,\ldots,n$, and for each $t\in[0,\beta]$, \[ z_i(t,\w,\psi)-z_i(t,\w,\varphi)\geq e^{-L t}\,e^{t A_i}\,(\psi_i(0)-\varphi_i(0))\,. \] \end{itemize} \end{prop} \begin{proof} (i) For each fixed $\w\in \W$, it follows from the results in Martin and Smith~\cite{masm0,masm}. \par (ii) We include the proof for the sake of completeness, although the result in the Neumann case follows from Lemma~4.3 in Novo et al.~\cite{nonuobsa}. First of all, observe that if $\w\in\W$, and $\varphi,\psi\in C_\gamma$ with $\varphi\leq \psi$ and $\|\varphi(s)(x)\|,\|\psi(s)(x)\|\leq \rho$ for any $s\in [-1,0]$ and $x\in \Bar U$, then, for any $t\in\R$ and $x\in\bar U$, \begin{multline}\label{lemma 1.1} f_i(\w{\cdot}t,x,\psi(0)(x),\psi(-1)(x))-f_i(\w{\cdot}t,x,\varphi(0)(x),\varphi(-1)(x))\geq \\ - L\,(\psi_i(0)(x)-\varphi_i(0)(x))\,, \end{multline} for the constant $L=L_\rho>0$ provided in $\rm{(C)}$. To see it, just subtract and add the term $f_i(\w{\cdot}t,x,\phi(0)(x),\varphi(-1)(x))$ for the map $\phi\in C_\gamma$ defined by $\phi_i=\psi_i$ and $\phi_j=\varphi_j$ if $j\not= i$, which satisfies $\varphi\leq \phi\leq \psi$, and then apply (QM) and (C). \par Now, let us fix $\varphi,\psi\in C_\gamma$ with $\varphi\leq \psi$ and such that $z(t,\w,\varphi)$ and $z(t,\w,\psi)$ are defined for $t\in[0,\beta]$, and let $\rho>0$ be such that $\sup\{\|z(t,\w,\varphi)(x)\|,\,\|z(t,\w,\psi)(x)\|\mid t\in[-1,\beta],\, x\in \bar U\}< \rho$. Then take $L=L_\rho$ the constant given in (C), which obviously depends on $\w,\,\varphi,\,\psi$ and $\beta$. \par As a first step, we consider the particular case when $\varphi,\psi\in C^\theta([-1,0],E)$, and $\varphi(0),\,\psi(0)\in C^{2\theta}(\bar U, \R^n)$ in the Neumann or Robin cases. Then, either Theorem~\ref{teor-time regularity-Neumann} or Theorem~\ref{teor-time regularity-Dirichlet} applies to get that the mild solutions $z(t,\w,\varphi)$ and $z(t,\w,\psi)$ are classical solutions on $[0,\beta]$, so that for each fixed $i=1,\ldots,n$ we can consider the map on $[0,\beta]$, with values in $D(A_i)$ for $t>0$, defined by $v_i(t)=e^{L t}\,(z_i(t,\w,\psi)-z_i(t,\w,\varphi))$. Then, for $t>0$, and for $F:\W\times C_\gamma\to E$ defined in~\eqref{F}, we have that \begin{equation*} v_i'(t)= L v_i(t)+ A_i v_i(t)+e^{L t} (F_i(\w{\cdot}t,z_t(\w,\psi))- F_i(\w{\cdot}t,z_t(\w,\varphi))). \end{equation*} Now, for any $t\in(0,b]$, since $z_t(\w,\varphi)\leq z_t(\w,\psi)$ by (i), and by the choice of $\rho$,~\eqref{lemma 1.1} applies and we can write $v_i'(t)\geq L v_i(t)+A_i v_i(t)-L v_i(t)= A_i v_i(t)$, so that $g_i(t)=v_i'(t)-A_i v_i(t)\geq 0$. Now, $(e^{tA_i})_{t\geq 0}$ is a positive semigroup of operators in $C(\bar U)$ in the Neumann or Robin cases, and in $C_0(\bar U)$ in the Dirichlet case (for instance, see Smith \cite{smit}). Besides, in the Dirichlet case, $\overline{ D(A_i)}=C_0(\bar U)$ and {\rm (DM)} is assumed, so that $g_i(t)=L v_i(t)+e^{L t} (F_i(\w{\cdot}t,z_t(\w,\psi))- F_i(\w{\cdot}t,z_t(\w,\varphi)))\in C_0(\bar U)$ for $t>0$. Finally, since $v_i'(t)=A_i v_i(t)+g_i(t)$, we can write \begin{equation*} v_i(t)=e^{tA_i}\,v_i(0)+\int_0^t e^{(t-s)A_i}\,g_i(s)\,ds \geq e^{tA_i}\,v_i(0) = e^{tA_i}(\psi_i(0)-\varphi_i(0)) \,, \end{equation*} from where the searched inequality immediately follows. \par In the general case, note that the set of H\"{o}lder continuous maps $C^\theta([-1,0],E^\gamma)$, with $\varphi(0)\in C^{2\theta}(\bar U, \R^n)$ in the Neumann or Robin cases, is dense in $C_\gamma$, and in the Dirichlet case $C^\theta([-1,0],E^\alpha)\subset C^\theta([-1,0],E)$. Then, for $\varphi,\psi\in C_\gamma$ as before, we can take sequences $\{\varphi_n\},\{\psi_n\}$ as in the first step with $\varphi_n\to\varphi$ and $\psi_n\to\psi$, $\varphi_n\leq \varphi\leq \psi\leq \psi_n$ for any $n\geq 1$ and such that $\|z(t,\w,\varphi_n)(x)\|,\,\|z(t,\w,\psi_n)(x)\|\leq \rho$ for any $t\in[0,\beta]$, $x\in \bar U$ and $n\geq 1$. Then, the proof is finished by applying the first step to the pairs $\varphi_n,\psi_n$ and taking limits as $n\to\infty$. \end{proof} Note that the standard parabolic maximum principle implies that $e^{t A_i}$ is strong\-ly positive for $t>0$, i.e., if $z_i>0$, then $e^{t A_i}z_i\gg 0$. Then, in the situation of the previous result, if $\varphi_i(0)<\psi_i(0)$ for some $i$, it is $z_i(t,\w,\varphi)\ll z_i(t,\w,\psi)$ for $t>0$. \section{The linearized semiflow and Lyapunov exponents}\label{sec-linearized sem} \noindent In this section we build the linearized semiflow under regularity conditions in the problems. Besides, when the semiflow is also monotone, we present the concept of a continuous separation of type~II and of the related principal spectrum, and show how the latter can be calculated in terms of some Lyapunov exponents. \par From now on, we use the unified notation introduced in Section~\ref{sec-monotonos} to include any of the boundary conditions, but whenever it is convenient to make a distinction, we will write $C=C([-1,0],E)$ with sup-norm $\|\,{\cdot}\,\|_{C}$ in the Neumann and Robin cases, and $C_\alpha=C([-1,0],E^\alpha)$ with sup-norm $\|\,{\cdot}\,\|_{C_\alpha}$ in the Dirichlet case. \par In the case of Neumann boundary conditions, the next result can be found in Novo et al.~\cite{nonuobsa}, and it can be trivially extended to the case of Robin boundary conditions. The proof is inspired in the proof of Theorem~3.5 in Novo et al.~\cite{nonuobsa}. \begin{teor}\label{teor-linearized sk} Consider the family of IBV problems with delay~\eqref{family}, $\w\in\W$ and assume that $f:\W\times\bar U\times \R^n\times \R^n\to\R^n$ is continuous and of class $C^1$ in the $y$ and $\wit y$ variables. Then, the skew-product semiflow generated by mild solutions on $\W\times C_\gamma$, $\tau(t,\w,\varphi)=(\w{\cdot}t,z_t(\w,\varphi))$ is of class $C^1$ with respect to $\varphi$. Furthermore, for each $\psi\in C_\gamma$, $D_{\!\varphi} z_t(\w,\varphi)\,\psi = v_t(\w,\varphi,\psi)$ for the mild solution $v(t,\w,\varphi,\psi)$ of the associated variational retarded ACP along the semiorbit of $(\w,\varphi)$, \begin{equation}\label{variational} \left\{\begin{array}{l} v'(t)=Av(t)+D_{\!\varphi} F(\w{\cdot}t,z_t(\w,\varphi))\,v_t\,, \quad t> 0\,, \\v_0=\psi\in C_\gamma\,,\end{array}\right. \end{equation} which is defined for $t$ in $[0,b)$, the maximal interval of definition of $z(t,\w,\varphi)$. \end{teor} \begin{proof} We write the proof for the case of Dirichlet boundary conditions. Recall that $F:\W\times C_\alpha\to E$ is defined in~\eqref{F} and that $z(t,\w,\varphi)$ is a mild solution of the retarded ACP~\eqref{ACPdelay}. In this case with fixed delay, \begin{multline}\label{derivada} [D_{\!\varphi} F(\w{\cdot}t,z_t(\w,\varphi))\,v_t](x)=D_{y} f(\w{\cdot}t,x,z(t,\w,\varphi)(x),z(t-1,\w,\varphi)(x))\,v(t)(x)\\ +D_{\wit y} f(\w{\cdot}t,x,z(t,\w,\varphi)(x),z(t-1,\w,\varphi)(x))\,v(t-1)(x)\,,\quad x\in \bar U. \end{multline} \par By the $C^1$ character of $f(\w,x,y,\wit y)$ in $(y,\wit y)$, we can argue as in the previous sections to get the existence of a unique mild solution of~\eqref{variational}, denoted by $v(t)=v(t,\w,\varphi,\psi)$. By linearity of the problem, $v$ exists in the large, i.e., \begin{equation}\label{mild v} v(t)=e^{tA}\,\psi(0) +\int_0^t e^{(t-s)A}\,D_{\!\varphi} F(\w{\cdot}s,z_s(\w,\varphi))\,v_s \,ds\,,\quad\hbox{for any }\, t\in [0,b)\,. \end{equation} \par Let us fix a $t>0$, and let us first check that for $\w\in \W$ and $\varphi,\,\psi\in C_\alpha$, $D_{\!\varphi} z_t(\w,\varphi)\,\psi$ exists, provided that $z_t(\w,\varphi)$ exists, and $D_{\!\varphi} z_t(\w,\varphi)\,\psi = v_t(\w,\varphi,\psi)$, and second that the map $\Om\times C_\alpha\to \mathcal L(C_\alpha)$, $(\w,\varphi) \mapsto D_{\!\varphi} z_t(\w,\varphi)$ is continuous. \par First of all, note that fixed $t>0$ and $(\w,\varphi)\in \W\times C_\alpha$ such that $z_t(\w,\varphi)$ exists, and given $\psi\in C_\alpha$, the solution $z(\,\cdot\,,\w,\varphi+\varepsilon \,\psi)$ of~\eqref{ACPdelay} with initial data $z_0=\varphi+\varepsilon \,\psi$ is also defined on $[0,t]$, provided that $|\varepsilon|\leq \varepsilon_0$ for a sufficiently small $\varepsilon_0$. We want to prove that there exists the limit \[ \lim_{\varepsilon\to 0} \frac{z_t(\w,\varphi+\varepsilon \,\psi)-z_t(\w,\varphi)}{\varepsilon}= v_t(\w,\varphi,\psi)\,. \] For convenience, we will get to this by proving that $\lim_{\varepsilon\to 0} h^\varepsilon(t)=0$ for the map \[ h^\varepsilon(s)= \frac{1}{\varepsilon} \sup_{r\in [0,s]} \| z(r,\w,\varphi+\varepsilon \,\psi)-z(r,\w,\varphi)-\varepsilon\, v(r,\w,\varphi,\psi)\|_\alpha\,,\quad s\in [0,t]\,. \] Let us call $g^\varepsilon(r)=z(r,\w,\varphi+\varepsilon \,\psi)-z(r,\w,\varphi)-\varepsilon\, v(r,\w,\varphi,\psi)$ for $r\in[0,s]$ and recall that $\|z\|_\alpha= \|(-A_{p})^{\alpha}\,z\|_p$, for any $z\in E^\alpha$. \par Having in mind~\eqref{variation constants} and~\eqref{mild v} we write for $r\in [0,s]$, \begin{multline*} g^\varepsilon(r)=\displaystyle\int_0^{r} e^{(r-l)A}\,\big[ F(\w{\cdot}l,z_l(\w,\varphi+\varepsilon \,\psi))- F(\w{\cdot}l,z_l(\w,\varphi))\\ -\varepsilon D_{\!\varphi} F(\w{\cdot}l,z_l(\w,\varphi))\,v_l(\w,\varphi,\psi)\big]\,dl\,, \end{multline*} and the term $F(\w{\cdot}l,z_l(\w,\varphi+\varepsilon \,\psi))- F(\w{\cdot}l,z_l(\w,\varphi))$ can be written, applying the mean value theorem to $F$, as \[ \int_0^1 D_{\!\varphi} F(\w{\cdot}l,\lambda\,z_l(\w,\varphi+\varepsilon \,\psi)+ (1-\lambda)\,z_l(\w,\varphi))(z_l(\w,\varphi+\varepsilon \,\psi)-z_l(\w,\varphi))\,d\lambda\,. \] Consequently, for any $r\in [0,s]$ we can write \begin{multline*} g^\varepsilon(r)= \displaystyle\int_0^{r} e^{(r-l)A}\left(\int_0^1 D_{\!\varphi} F(\w{\cdot}l,\lambda\,z_l(\w,\varphi+\varepsilon \,\psi)+ (1-\lambda)\,z_l(\w,\varphi))\,g_l^\varepsilon\,d\lambda \right)dl \\ + \varepsilon \displaystyle\int_0^{r} e^{(r-l)A}\left( \int_0^1 \big[ D_{\!\varphi} F(\w{\cdot}l,\lambda\,z_l(\w,\varphi+\varepsilon \,\psi)+ (1-\lambda)\,z_l(\w,\varphi)) \right.\\ - D_{\!\varphi} F(\w{\cdot}l,z_l(\w,\varphi))\big]\,v_l(\w,\varphi,\psi)\,d\lambda \Big)\,dl \,. \end{multline*} From this, taking into account that: \par\smallskip - there exists an $M_\alpha'>0$ such that \begin{equation}\label{cota} \|(-A_{p})^\alpha\,e^{rA}\,z\|_p\leq M_\alpha'\,r^{-\alpha}\,\|z\| \quad\text{for any}\; z\in E\;\text{and}\; r>0, \end{equation} because of~\eqref{estimate} and the continuous embedding $E\hookrightarrow L^p(U,\R^n)$; - $\|v_l(\w,\varphi,\psi)\|_{C_\alpha}\leq K_1$ for some $K_1>0$ and for any $l\in[0,t]\,$; - $\sup_{\lambda\in[0,1]} \| D_{\!\varphi} F(\w{\cdot}l,\lambda\,z_l(\w,\varphi+\varepsilon \,\psi)+ (1-\lambda)\,z_l(\w,\varphi))\|_{\mathcal L(C_\alpha,E)}\leq K_2$ for some $K_2>0$, for any $l\in[0,t]$ and for small enough $|\varepsilon|$, because of the continuity of $D_{\!\varphi} F$ in $\Om\times C_\alpha$ and the compactness of $\{z_l(\w,\varphi) \mid l\in[0,t]\}$ for the norm in $C_\alpha$; - $\lim_{\varepsilon\to 0}\alpha^\varepsilon(s)=0$ uniformly for $s\in[0,t]$, where \par \noindent${\displaystyle \alpha^\varepsilon(s)=M_\alpha'\,K_1\!\!\!\sup_{r\in[0,s]}\!\int_0^r (r-l)^{-\alpha}\left(\int_0^1 \!\!\| D_{\!\varphi} F(\w{\cdot}l,\lambda\,z_l(\w,\varphi+\varepsilon \,\psi)+ (1-\lambda)\,z_l(\w,\varphi)) \right.}$\\ ${\displaystyle ~\hspace{5.5cm}- D_{\!\varphi} F(\w{\cdot}l,z_l(\w,\varphi))\|_{\mathcal L(C_\alpha,E)}\,d\lambda\Big)dl\,;}$ - the map $h^\varepsilon(l)$ is nondecreasing for $l\in [0,t]$, hence, for $s\in[0,t]$, \[ \sup_{r\in[0,s]}\int_0^r M_\alpha'\,(r-l)^{-\alpha} K_2 \, h^\varepsilon(l)\,dl=\int_0^s M_\alpha'\,(s-l)^{-\alpha} K_2 \, h^\varepsilon(l)\,dl\,; \] \par\smallskip\noindent we obtain that for any $s\in [0,t]$, \[ h^\varepsilon(s)=\frac{1}{\varepsilon}\,\sup_{r\in[0,s]} \|g^\varepsilon(r)\|_\alpha\leq \alpha^\varepsilon(s)+ \int_0^s M_\alpha'\,(s-l)^{-\alpha} K_2 \, h^\varepsilon(l)\,dl\,, \] and applying the generalized Gronwall's lemma, we get that for any $s\in [0,t]$, \[ h^\varepsilon(s)\leq \alpha^\varepsilon(s)+ \theta \int_0^s H(\theta(s-l))\,\alpha^\varepsilon(l)\,dl\,, \] where the constant $\theta$ depends on the constants $M_\alpha'\,K_2$ and on $1-\alpha$, and the map $H(s)$ behaves like $\frac{s^{-\alpha}}{\Gamma(1-\alpha)}$ as $s\to 0^+$ (see Lemma 7.1.1 in Henry~\cite{henr} for more details). From here, we can deduce that $\lim_{\varepsilon\to 0}h^\varepsilon(t)=0$, as we wanted to see. \par To finish the proof, let us fix a $t>0$ and let us check the continuity of the map $\Om\times C_\alpha\to \mathcal L(C_\alpha)$, $(\w,\varphi) \mapsto D_{\!\varphi} z_t(\w,\varphi)$. So, let us take $\{(\w_n,\varphi_n)\}_{n\geq 1}\subset \Om\times C_\alpha$ with $(\w_n,\varphi_n)\to (\w,\varphi)$ and let us see that \begin{align*} \|D_{\!\varphi} &z_t(\w_n,\varphi_n)-D_{\!\varphi} z_t(\w,\varphi)\|_{\mathcal L(C_\alpha)}=\sup_{\|\psi\|\leq 1}\|v_t(\w_n,\varphi_n,\psi)- v_t(\w,\varphi,\psi)\|_{C_\alpha}\\ &\leq \sup_{\|\psi\|\leq 1}\sup_{s\in [0,t]}\|v(s,\w_n,\varphi_n,\psi)- v(s,\w,\varphi,\psi)\|_\alpha\to 0\quad\hbox{as}\; n\to\infty\,. \end{align*} The general arguments are similar to the ones used before. Using~\eqref{mild v}, we first apply the generalized Gronwall's inequality to prove that $\|v_s(\w,\varphi,\psi)\|_{C_\alpha}$ is uniformly bounded for $s\in[0,t]$ and $\|\psi\|\leq 1$. Note that~\eqref{sup finito} is needed at this point. Then, again using~\eqref{mild v} for $v(s,\w_n,\varphi_n,\psi)- v(s,\w,\varphi,\psi)$, a further application of the generalized Gronwall's inequality, together with~\eqref{cota} and the facts that: \par\smallskip - $\des\sup_{s\in[0,t]}\des\sup_{n\geq 1}\|D_{\!\varphi} F(\w_n{\cdot}s,z_s(\w_n,\varphi_n))\|_{\mathcal L(C_\alpha,E)}<\infty\,;$ -$\des\lim_{n\to\infty}\des\sup_{s\in[0,t]}\|D_{\!\varphi} F(\w_n{\cdot}s,z_s(\w_n,\varphi_n))-D_{\!\varphi} F(\w{\cdot}s,z_s(\w,\varphi))\|_{\mathcal L(C_\alpha,E)}= 0\,;$ - $l\in [0,t]\mapsto \des\sup_{r\in[0,l]}\des\sup_{\|\psi\|\leq 1}\|v(r,\w_n,\varphi_n,\psi)- v(r,\w,\varphi,\psi)\|_\alpha$ is nondecreasing; \par\smallskip\noindent permits to see that the above limit is $0$. The proof is finished. \end{proof} In the conditions of the previous result, if there is a compact positively invariant set $K\subset \W\times C_\gamma$ for $\tau$ (e.g., if there is a bounded solution $z(t,\w,\varphi)$ and $K$ is the omega-limit set of $(\w,\varphi)$), one can build the linearized skew-product semiflow over $K$: \begin{equation*} \begin{array}{cccl} L: & \R_+\times K \times C_\gamma& \longrightarrow & K \times C_\gamma\\ & (t,(\w,\varphi),\psi) & \mapsto &(\tau(t,\w,x),v_t(\w,\varphi,\psi))\,, \end{array} \end{equation*} with $v_t(\w,\varphi,\psi)=D_{\!\varphi} z_t(\w,\varphi)\,\psi$, and $v(t,\w,\varphi,\psi)$ is the mild solution of the variational retarded ACP~\eqref{variational} along the semiorbit of $(\w,\varphi)$. Note that, because of boundedness of $K$, the semiflow inside $K$ is globally defined. \par It is important to note that, if $K$ is $\tau$-invariant and compact, in the Dirichlet case $K$ can be equally considered with either the topology of $\W\times C_\alpha$ or of $\W\times C$. \begin{prop} If $K$ is a compact $\tau$-invariant subset of $\Om\times C$, then $K \subset \Omega \times C_\alpha$ and the restriction of both topologies on $K$ agree. \end{prop} \begin{proof} Since $\tau_t(K)=K$ for any $t\geq 0$ and $\tau_t:\W\times C\to \W\times C_\alpha$ is compact for $t>1$, $K$ is relatively compact in $\W\times C_\alpha$; and it is closed because the inclusion $\Om\times C_\alpha\hookrightarrow \Om\times C$ is continuous. Thus, the identity map with the two topologies $i:(K,\W\times C_\alpha)\to (K,\W\times C)$ is a homeomorphism, as it is continuous, bijective and $(K,\W\times C_\alpha)$ is compact. \end{proof} Closely related to the classical concept of a continuous separation in the terms given by Pol\'{a}\v{c}ik and Tere\v{s}\v{c}\'{a}k~\cite{pote} and Shen and Yi~\cite{shyi}, Novo et al.~\cite{noos6} introduced the concept of a continuous separation of type~II, which is the appropriate one if there is delay in the equations. We include the definition here, since it is going to be crucial in the study of persistence properties in Section~\ref{sec-uniform persistence}. \par When the skew-product semiflow $\tau$ is monotone and of class $C^1$ in $\varphi$, we say that a compact, positively invariant set $K\subset \W\times C_\gamma$ admits a {\em continuous separation of type~\/}II if there are families of subspaces $\{X_1(\w,\varphi)\}_{(\w,\varphi)\in K}$ and $\{X_2(\w,\varphi)\}_{(\w,\varphi)\in K}$ of $C_\gamma$ satisfying the following properties. \begin{itemize} \item[(S1)$\;$] $C_\gamma=X_1(\w,\varphi)\oplus X_2(\w,\varphi)$ and $X_1(\w,\varphi)$, $X_2(\w,\varphi)$ vary continuously in $K$; \item[(S2)$\;$] $X_1(\w,\varphi)=\spa\{ \psi(\w,\varphi)\}$, with $\psi(\w,\varphi)\gg 0$ and $\|\psi(\w,\varphi)\|_{C_\gamma}=1$ for any $(\w,\varphi)\in K$; \item[(S3)'] there exists a $t_0>0$ such that if for some $(\w,\varphi)\in K$ there is a $\phi\in X_2(\w,\varphi)$ with $\phi>0$, then $D_{\!\varphi} z_t(\w,\varphi)\,\phi=0$ for any $t\geq t_0$; \item[(S4)$\;$] for any $t>0$, $(\w,\varphi)\in K$, \begin{align*} D_{\!\varphi} z_t(\w,\varphi)\,X_1(\w,\varphi)&= X_1(\tau(t,\w,\varphi))\,,\\ D_{\!\varphi} z_t(\w,\varphi)\,X_2(\w,\varphi)&\subset X_2(\tau(t,\w,\varphi))\,; \end{align*} \item[(S5)$\;$] there are $M>0$, $\delta>0$ such that for any $(\w,\varphi)\in K$, $\phi\in X_2(\w,\varphi)$ with $\|\phi\|_{C_\gamma}=1$ and $t>0$, \begin{equation*} \|D_{\!\varphi} z_t(\w,\varphi)\,\phi\|_{C_\gamma}\leq M \,e^{-\delta t}\,\|D_{\!\varphi} z_t(\w,\varphi)\,\psi(\w,\varphi)\|_{C_\gamma}\,. \end{equation*} \end{itemize} The precise meaning of the continuous variation expressed in (S1) has been explained in Obaya and Sanz~\cite{obsa}. \par For convenience, we also recall some definitions of Lyapunov exponents. The standard definition of superior and inferior Lyapunov exponents at $\infty$ of each $(\w,\varphi,\psi)\in K\times C_\gamma$ is as follows (for instance, see Sacker and Sell~\cite{sase}): \[ \lambda_i(\w,\varphi,\psi)=\liminf_{t\to\infty} \frac{\log\|v_t(\w,\varphi,\psi)\|_{C_\gamma}}{t}\,,\; \lambda_s(\w,\varphi,\psi)=\limsup_{t\to\infty} \frac{\log\|v_t(\w,\varphi,\psi)\|_{C_\gamma}}{t}\,; \] the Lyapunov exponents of each $(\w,\varphi)\in K$ are defined by \[ \lambda_i(\w,\varphi)=\liminf_{t\to\infty} \frac{\log\|D_{\!\varphi} z_t(\w,\varphi)\|_{\mathcal{L}(C_\gamma)}}{t},\, \lambda_s(\w,\varphi)=\limsup_{t\to\infty} \frac{\log\|D_{\!\varphi} z_t(\w,\varphi)\|_{\mathcal{L}(C_\gamma)}}{t}; \] and the lower and upper Lyapunov exponents of $K$ are respectively the numbers: $\alpha_K=\inf_{(\w,\varphi)\in K} \lambda_i(\w,\varphi)$ and $\lambda_K=\sup_{(\w,\varphi)\in K} \lambda_s(\w,\varphi)$. \par When the linearized semiflow $L$ is monotone and $K$ is a minimal set with a flow extension and a continuous separation of type~II, these exponents play a fundamental role in the determination of the principal spectrum $\Sigma_p$ (see Mierczy{\'n}ski and Shen~\cite{mish}), that is, the Sacker-Sell spectrum (see~\cite{sase,sase94}) of the restriction of $L$ to the one-dimensional invariant subbundle \begin{equation* \displaystyle\bigcup_{(\w,\varphi)\in K} \{(\w,\varphi)\} \times X_1(\w,\varphi)\,. \end{equation*} More precisely, $\Sigma_p=[\alpha_K,\lambda_K]$ and besides, if $X_1(\w,\varphi)=\spa\{\psi\}$ for the vector $\psi=\psi(\w,\varphi)\gg 0$ in (S2), then $\lambda_i(\w,\varphi)=\lambda_i(\w,\varphi,\psi)$ and $\lambda_s(\w,\varphi)=\lambda_s(\w,\varphi,\psi)$ (see Proposition~4.4 in Novo et al.~\cite{noos7} for the result in an abstract setting). Since principal spectrums are going to be the dynamical objects in order to determine the persistence of the systems in Section \ref{sec-uniform persistence}, it is good to know that in the Dirichlet case the Lyapunov exponents can be calculated with the sup-norm in $C=C([-1,0],E)$, which is much easier to deal with numerically than the sup-norm in $C_\alpha$. \begin{prop}\label{prop-Lyapunov exponents} Assume that the map $f$ in~\eqref{family} is continuous and of class $C^1$ in the $y$ and $\wit y$ variables. Let $K\subset \W\times C_\gamma$ be a compact positively invariant set and consider the linearized semiflow $L$ over $K$. Then, in the case of Dirichlet boundary conditions, for any $(\w,\varphi)\in K$ and $\psi \in C_\alpha$ one can calculate: \[ \lambda_i(\w,\varphi,\psi)=\liminf_{t\to\infty} \frac{\log\|v_t(\w,\varphi,\psi)\|_{C}}{t}\,,\; \lambda_s(\w,\varphi,\psi)=\limsup_{t\to\infty} \frac{\log\|v_t(\w,\varphi,\psi)\|_{C}}{t}\,. \] In particular, if $\lambda_i(\w,\varphi,\psi)=\lambda_s(\w,\varphi,\psi)$, then \[ \lambda(\w,\varphi,\psi)=\lim_{t\to\infty} \frac{\log\|v_t(\w,\varphi,\psi)\|_{C}}{t}\,. \] \end{prop} \begin{proof} Let us omit the dependence of $v_t$ on $(\w,\varphi,\psi)$ to simplify the writing, and set $\tilde\lambda_s=\limsup_{t\to\infty} \frac{\log\|v_t\|_{C}}{t}$. Since $C_\alpha\hookrightarrow C$, it is clear that $\tilde\lambda_s\leq \lambda_s$. To see that also $\lambda_s\leq \tilde\lambda_s$, let us take a sequence $t_n\uparrow \infty$ such that $\lambda_s=\lim_{n\to\infty} \frac{\log\|v_{t_n}\|_{C_\alpha}}{t_n}$. Since for each $n\geq 1$ there exists a $t_n^1\in [t_n-1,t_n]$ such that $\|v_{t_n}\|_{C_\alpha}=\|v(t_n^1)\|_{\alpha}$, we have that $\lambda_s=\lim_{n\to\infty} \frac{\log\|v(t_n^1)\|_{\alpha}}{t_n^1}$. Now, for the map $F:\W\times C_\alpha\to E$ defined in~\eqref{F}, we can write by the variation of constants formula~\eqref{variation constants}, \[ v(t_n^1)=e^A\,v(t_n^1-1) +\int_0^1 e^{(1-s)A}\,D_{\!\varphi}F(\w{\cdot}(t_n^1-1+s),z_{t_n^1-1+s}(\w,\varphi))\,v_{t_n^1-1+s}\,ds\,. \] Now, note that we can also consider $F$ as defined on $\W\times C$ with values in $E$. Then, taking $M=\sup\{\|D_{\!\varphi}F(\tilde \w, \tilde \varphi)\|_{\mathcal{L}(C,E)}\mid (\tilde \w, \tilde \varphi)\in K\}<\infty$, we can apply~\eqref{cota} to get \[ \|v(t_n^1)\|_{\alpha}\leq M'_\alpha\, \|v(t_n^1-1)\|+\int_0^1 M'_\alpha\, (1-s)^{-\alpha}\, M\, \|v_{t_n^1-1+s}\|_C\,ds\,. \] As before, for each $n\geq 1$, there exists a $t_n^2\in [t_n^1-2,t_n^1]$ such that $\|v_{t_n^1-1+s}\|_C\leq \|v(t_n^2)\|$ for any $s\in [0,1]$, and in particular $\|v(t_n^1-1)\|\leq \|v(t_n^2)\|$. Then, \[ \|v(t_n^1)\|_{\alpha}\leq M'_\alpha\, \|v(t_n^2)\|+\int_0^1 M'_\alpha\, (1-s)^{-\alpha}\, M\, \|v(t_n^2)\|\,ds=\big(1+\frac{M}{1-\alpha}\big) M'_\alpha\, \|v(t_n^2)\| \,, \] for any $n\geq 1$. Since $\|v(t_n^2)\| \leq \|v_{t_n^2}\|_C $, we can easily conclude that \[ \lambda_s=\lim_{n\to\infty} \frac{\log\|v(t_n^1)\|_{\alpha}}{t_n^1}\leq \lim_{n\to\infty} \frac{\log\|v_{t_n^2}\|_{C}}{t_n^2} \leq \limsup_{t\to\infty} \frac{\log\|v_t\|_{C}}{t}= \tilde\lambda_s\,. \] \par Let us now deal with $\tilde\lambda_i=\liminf_{t\to\infty} \frac{\log\|v_t\|_{C}}{t}$. Once more the inequality $\tilde\lambda_i\leq \lambda_i$ is clear, so that it remains to prove that $\lambda_i\leq \tilde\lambda_i$. This time we take a sequence $t_n\uparrow\infty$ such that $\tilde\lambda_i=\lim_{n\to\infty} \frac{\log\|v_{t_n}\|_{C}}{t_n}$. Now, arguing as in the first paragraph, associated with the sequence $\{t_n+2\}_{n\geq 1}$ we can find a sequence $\{t_n^2\}_{n\geq 1}$ with $t_n^2\in [t_n-1,t_n+2]$ such that $\|v_{t_n+2}\|_{C_\alpha}\leq c\,\|v(t_n^2)\|$ for $c=(1+\frac{M}{1-\alpha}) M'_\alpha>0$ and for any $n\geq 1$. Note that if we prove that $\|v(t_n^2)\|\leq \tilde c\,\|v_{t_n}\|_C$ for every $n\geq 1$, for a certain $\tilde c>0$, we are done, since then: \[ \lambda_i=\liminf_{t\to\infty} \frac{\log\|v_t\|_{C_\alpha}}{t}\leq \lim_{n\to\infty}\frac{\log\|v_{t_n+2}\|_{C_\alpha}}{t_n+2} \leq \lim_{n\to\infty} \frac{\log\|v_{t_n}\|_{C}}{t_n}=\tilde \lambda_i\,. \] For that, once more we use the variation of constants formula to write, for $r\in [0,2]$, \[ v(t_n+r)=e^{rA}\,v(t_n) +\int_0^r e^{(r-l)A}\,D_{\!\varphi}F(\w{\cdot}(t_n+l),z_{t_n+l}(\w,\varphi))\,v_{t_n+l}\,dl\,. \] Then, consider the map $h_n(s)=\des\sup_{r\in [-1,s]}\|v(t_n+r)\|$ defined for $s\in [0,2]$. Note that if for some $s\in [0,2]$, $h_n(s)=\|v(t_n+r_0)\|$ for some $-1\leq r_0\leq 0$, then $h_n(s)\leq \|v_{t_n}\|_C$. Else, $h_n(s)=\des\sup_{r\in [0,s]}\|v(t_n+r)\|$ and we can bound \[ h_n(s)\leq M_0\,\|v_{t_n}\|_C+ \int_0^s M_0\,M\,h_n(l)\,dl\, \] for the constants $M_0=\max\{1,\sup_{s\in [0,2]}\|e^{sA}\|_{\mathcal{L}(E)}\}$ and $M$ the same as before, so that this inequality holds for any $s\in [0,2]$. Applying of the Gronwall's lemma, we obtain $h_n(s)\leq \tilde c \,\|v_{t_n}\|_C$ for an appropriate $\tilde c>0$ independent of $n\geq 1$, for any $s\in [0,2]$. In particular $\|v(t_n^2)\|\leq h_n(2)\leq \tilde c\,\|v_{t_n}\|_C$ for every $n\geq 1$. The proof is finished. \end{proof} \section{Persistence for quasimonotone systems of parabolic PFDEs}\label{sec-uniform persistence}\noindent In this section the properties of uniform and strict persistence are studied for quasimonotone and regular parabolic problems of type~\eqref{family}, $\w\in\W$. More precisely, we assume the following conditions on $f$: \begin{itemize} \item[(C1)] $f(\w,x,y,\wit y)$ is continuous and of class $C^1$ in $(y,\wit y)$. \item[(C2)] The maps $D_y f(\w{\cdot}t,x,y,\wit y)$ and $D_{\wit y} f(\w{\cdot}t,x,y,\wit y)$ are Lipschitz in $(y,\wit y)$ in bounded sets, uniformly for $\w\in \Om$ and $x\in\bar U$. \item[(C3)] $f(\w{\cdot}t,x,y,\wit y)$ as well as the maps $D_yf(\w{\cdot}t,x,y,\wit y)$ and $D_{\wit y} f(\w{\cdot}t,x,y,\wit y)$ satisfy conditions $(C^{\theta}(t))$ and $(C^{2\theta}(x))$, for some $\theta\in(0,1/2)$. \item[(C4)] Quasimonotone condition: for any $(\w,x,y,\wit y)\in \W\times \bar U\times\R^n\times\R^n$, \[ \frac{\partial f_i}{\partial y_j}(\w,x,y,\wit y) \geq 0 \;\, \text{ for } i\not= j \;\, \text{ and }\; \frac{\partial f_i}{\partial \wit y_j}(\w,x,y,\wit y)\ge 0\,\;\text{ for any}\;\, i, j\,. \] \end{itemize} \par As proved in Theorem \ref{teor-linearized sk}, with (C1) the skew-product semiflow $\tau(t,\w,\varphi)$ is of class $C^1$ in $\varphi$. Condition $(C^{2\theta}(x))$ in (C3) is required so that the solutions of the IBV problems with delay, as well as those of the linearized problems, are smooth enough in order to apply the classical parabolic maximum or minimum principles; see Theorems~\ref{teor-space regularity-Neumann} and~\ref{teor-space regularity-Dirich}. Finally, note that (C4) is the usual way to write the quasimonotone condition (QM) under regularity assumptions. \par First of all, by linearizing the problems, in the Dirichlet case we can now establish the monotonicity of the skew-product semiflow removing condition (DM) in Proposition~\ref{prop-monotone}. Recall that $C_\alpha=C([-1,0],E^\alpha)$. \begin{prop}\label{prop-strong monotonicity-Dirichlet} Consider the family of parabolic problems with delay~\eqref{family}, $\w\in\W$ with Dirichlet boundary conditions and assume that $f$ satisfies $\rm{(C1)}$-$\rm{(C4)}$. Then: \begin{itemize} \item[(i)] The induced skew-product semiflow on $\W\times C_\alpha$ is monotone, that is, if $\varphi,\psi\in C_\alpha$ with $\varphi\leq \psi$, then $z_t(\w,\varphi)\leq z_t(\w,\psi)$ for any $\w\in\W$ and any $t\geq 0$ where both terms are defined. \item[(ii)] Given $\w\in\W$ and $\varphi,\psi\in C_\alpha$ with $\varphi\leq \psi$ such that $z(t,\w,\varphi)$ and $z(t,\w,\psi)$ are defined for $t\in[0,\beta]$ for some $\beta>0$, there exists an $L=L(\w,\varphi,\psi,\beta)>0$ such that for each $i=1,\ldots,n$, and for each $t\in[0,\beta]$, \[ z_i(t,\w,\psi)-z_i(t,\w,\varphi)\geq e^{-L t}\,e^{t A_i}\,(\psi_i(0)-\varphi_i(0))\,. \] \end{itemize} \end{prop} \begin{proof} Note that with any boundary conditions, by the regularity assumptions on $f$ we can consider the linearized IBV problem of~\eqref{family} along the semiorbit of each fixed $(\w,\varphi)\in \W\times C_\gamma$, \begin{equation}\label{linear family} \left\{\begin{array}{l} \des\frac{\partial u}{\partial t}= D\Delta u+g(\tau(t,\w,\varphi),x,u(t,x),u(t-1,x))\,,\; t\in (0,\beta]\,,\;\,x\in \bar U,\\[.2cm] \bar\alpha(x)\,u(t,x)+\delta\,\des\frac{\partial u}{\partial n}(t,x) =0\,,\quad t\in (0,\beta]\,,\;\,x\in \partial U,\\[.2cm] u(s,x)=\psi(s,x)\,, \quad s\in [-1,0]\,,\;\,x\in \bar U, \end{array}\right. \end{equation} provided that the mild solution $z(t,\w,\varphi)$ is defined on the interval $[0,\beta]$, where the map $g:(\W\times C_\gamma)\times\bar U\times \R^n\times\R^n\to\R^n$, linear in $(u,v)$, is defined by (see~\eqref{derivada}) \[g(\w,\varphi,x,u,v)=D_{y} f(\w,x,\varphi(0)(x),\varphi(-1)(x))\,u +D_{\wit y} f(\w,x,\varphi(0)(x),\varphi(-1)(x))\,v\,.\] \par Under assumptions (C1)-(C4) on $f$, it is easy to check that $g$ satisfies all the conditions in order to apply Proposition~\ref{prop-monotone} to each linearized problem along the orbit of $(\w,\varphi)$ if $\varphi\in C^\theta([-1,0],E)$. Let us now restrict to the Dirichlet case. \par Arguing as in the proof of Proposition~\ref{prop-monotone}~(ii), we just need to consider $\w\in\W$ and $\varphi,\psi\in C_\alpha$ with $\varphi\leq \psi$ such that $\varphi,\,\psi\in C^\theta([-1,0],E)$, and $z(t,\w,\varphi)$ and $z(t,\w,\psi)$ are defined for $t\in[0,\beta]$ for some $\beta>0$: in the general case, we can approximate $\varphi$ and $\psi$ by $\theta$-H\"{o}lder continuous maps. Besides, we can assume without loss of generality that also $z(t,\w,\lambda \psi + (1-\lambda)\varphi)$ is defined for $t\in[0,\beta]$ for every $\lambda\in (0,1)$. Then, thanks to Theorem~\ref{teor-linearized sk} we can write for any $t\in (0,\beta]$, \begin{equation}\label{mean value} z_t(\w,\psi)-z_t(\w,\varphi)=\int_0^1 D_{\!\varphi} z_t(\w,\lambda\, \psi + (1-\lambda)\,\varphi)\,(\psi-\varphi)\,d\lambda \end{equation} where $D_{\!\varphi} z_t(\w,\lambda \psi + (1-\lambda)\varphi)\,(\psi-\varphi)=v_t(\w,\lambda \psi + (1-\lambda)\varphi,\psi-\varphi)$ for the mild solution $v$ of the variational retarded ACP along the semiorbit of $(\w,\lambda \psi + (1-\lambda)\varphi)$ with initial condition $\psi-\varphi$ (see~\eqref{variational}), which is just the ACP built from the linearized IBV problem, to which Proposition~\ref{prop-monotone} applies. Therefore (i) immediately follows, since $D_{\!\varphi} z_t(\w,\lambda\, \psi + (1-\lambda)\,\varphi)\,(\psi-\varphi)\geq 0$ for any $\lambda\in [0,1]$. \par Now, to see (ii) just write \begin{equation}\label{mean value componente} z_i(t,\w,\psi)-z_i(t,\w,\varphi)=\int_0^1 v_i(t,\w,\lambda\, \psi + (1-\lambda)\,\varphi,\psi-\varphi)\,d\lambda\,, \end{equation} recall that $v$ is linear with respect to the initial value, and apply Proposition~\ref{prop-monotone}~(ii) to the linearized problem for each $\lambda\in [0,1]$. \end{proof} In the next result conditions are given to provide the existence of a continuous separation of type~II over a minimal set $K\subset \W\times C_\gamma$: see Section \ref{sec-linearized sem} for the definition. \begin{teor}\label{teor-sep cont tipo II} Consider the family of parabolic problems with delay~\eqref{family}, $\w\in\W$ with $f$ satisfying conditions $\rm{(C1)}$-$\rm{(C4)}$, and assume that there exists a minimal set $K\subset \W\times C_\gamma$ for the induced skew-product semiflow $\tau$. For the $n\times n$ real matrices \begin{equation}\label{A and B} D_y f(\w,x,y,\wit y) = [a_{ij}(\w,x,y,\wit y)]\,, \quad D_{\wit y} f(\w,x,y,\wit y) = [b_{ij}(\w,x,y,\wit y)] \end{equation} define \begin{align*} \bar a_{ij} &= \sup\{ a_{ij}(\w,x,\varphi(0,x),\varphi(-1,x))\mid (\w,\varphi)\in K,\, x\in\bar U\}\,\; \text{for }\, i\not= j\,, \; \text{and }\,\bar a_{ii}=0\,, \\ \bar b_{ij} &= \sup\{ b_{ij}(\w,x,\varphi(0,x),\varphi(-1,x))\mid (\w,\varphi)\in K,\, x\in\bar U\}\,\; \text{for }\, i\not= j\,, \; \text{and }\,\bar b_{ii}=0\,, \end{align*} and consider the matrix \begin{equation}\label{A+B} \bar A+ \bar B=[\bar a_{ij}+\bar b_{ij}]\,. \end{equation} Then, if the matrix $\bar A+ \bar B$ is irreducible, \begin{itemize} \item[(i)] there exists a $t_*\geq 1$ such that for each $(\w,\varphi)\in K$ the linear operator $D_{\!\varphi} z_{t_*}(\w,\varphi)$ satisfies the following dichotomy property: given $\psi\in C_\gamma$ with $\psi>0$, either $D_{\!\varphi} z_{t_*}(\w,\varphi)\,\psi =0$ or $D_{\!\varphi} z_{t_*}(\w,\varphi)\,\psi \gg 0$; \item[(ii)] provided that $K$ admits a flow extension, there is a continuous separation of type~{\rm II} over $K$. \end{itemize} \end{teor} \begin{proof} This result is Theorem~5.1 in Novo et al.~\cite{nonuobsa} for the case of Neumann boundary conditions. The proof for Robin or Dirichlet boundary conditions follows step by step the same arguments, so that we only make some remarks. \par First of all, note that in the minimal set $K$ there are backwards extensions of semiorbits, and this implies that if $(\w,\varphi)\in K$, $\varphi\in C_\gamma$ has some specific regularity properties; more precisely $\varphi\in C^{1,2}([-1,0]\times \bar U,\R^n)$. This follows from Theorem~\ref{teor-space regularity-Neumann} or Theorem~\ref{teor-space regularity-Dirich}, moving backwards in the semiorbit with $t>2$ and then gaining regularity by coming back forwards. \par Second, when we look at the family of linearized IBV problems along the semiorbits of $(\w,\varphi)\in K$, the map $g$ in~\eqref{linear family} satisfies conditions (C), $(C^\theta(t))$ and $(C^{2\theta}(x))$ uniformly for $(\w,\varphi)\in K$, and Proposition~\ref{prop-monotone}~(ii) is repeatedly used. \par Finally, (ii) follows from the abstract Theorem~5.4 in Novo et al.~\cite{noos6} provided that the operators $D_{\!\varphi}z_t(\w,\varphi)$ are eventually compact, which happens for $t>1$. \end{proof} Before we state the main result, we give the appropriate definitions of uniform and strict persistence in the area above a compact $\tau$-invariant set $K\subset \Om\times C_\gamma$, which were introduced in Novo et al.~\cite{noos7} and in Obaya and Sanz~\cite{obsa}, respectively. \begin{defi}\label{defi-persistence} Let $K\subset \W\times C_\gamma$ be a compact $\tau$-invariant set for the continuous and monotone semiflow $\tau$. (i) The semiflow $\tau$ is said to be {\it uniformly persistent} ({\it u-persistent} for short) in the region situated {\it strongly above} $K$ if there exists a $\psi_0\in C_\gamma$, $\psi_0\gg 0$ such that for any $(\w,\varphi)\in K$ and any $\phi\gg \varphi$ there exists a time $t_0=t_0(\w,\varphi,\phi)$ such that $z_t(\w,\phi)\geq z_t(\w,\varphi)+\psi_0$ for any $t\geq t_0$. (ii) The semiflow $\tau$ is said to be {\it strictly persistent at $0$} ({\it $s_0$-persistent} for short) in the region situated above $K$ if there exists a collection of strictly positive maps $\psi_1,\ldots,\psi_N\in C_\gamma$, $\psi_i>0$ for every $i$, such that for any $(\w,\varphi)\in K$ and any $\phi\geq \varphi$ with $\phi(0)> \varphi(0)$ there exists a time $t_0=t_0(\w,\varphi,\phi)$ such that $z_t(\w,\phi)\geq z_t(\w,\varphi)+\psi_i$ for any $t\geq t_0$, for one of the maps $\psi_1,\ldots,\psi_N$. \end{defi} \begin{teor}\label{teoremaDelay} Consider the family of problems with delay~\eqref{family}, $\w\in\W$ with $f$ satisfying conditions $\rm{(C1)}$-$\rm{(C4)}$, and assume that there exists a minimal set $K\subset \W\times C_\gamma$ for the induced skew-product semiflow $\tau$ which admits a flow extension. For each $(\w,\varphi)\in K$ consider the linearized IBV problem of~\eqref{family} along the semiorbit of $(\w,\varphi)$, given in~\eqref{linear family}, and calculate the matrix $\bar A+\bar B=[\bar a_{ij}+\bar b_{ij}]$ given in~\eqref{A+B}. Without loss of generality, we can assume that the matrix $\bar A+\bar B$ has the form \begin{equation}\label{triangular} \left[\begin{array}{cccc} \bar A_{11}+\bar B_{11} & 0 &\ldots & 0 \\ \bar A_{21}+\bar B_{21} & \bar A_{22} +\bar B_{22}& \ldots& 0 \\ \vdots & \vdots &\ddots & \vdots \\ \bar A_{k1}+\bar B_{k1} & \bar A_{k2}+\bar B_{k2} & \ldots& \bar A_{kk}+\bar B_{kk} \end{array}\right]\, \end{equation} with irreducible diagonal blocks, denoted by $\bar A_{11}+\bar B_{11},\ldots, \bar A_{kk}+\bar B_{kk}$, of size $n_1,\ldots,n_k$ respectively ($n_1+\cdots + n_k=n$). \par For each $j=1,\ldots,k$, let us denote by $I_j$ the set formed by the $n_j$ indexes corresponding to the rows of the block $\bar A_{jj}+\bar B_{jj}$, and let $L_j$ be the linear skew-product semiflow induced on $K\times C([-1,0],\Pi_{i\in I_j} E_i^\gamma)$ by the solutions of the $n_j$-dimensional linear systems for $(\w,\varphi)\in K$ given by \begin{equation}\label{bloque j} \left\{\begin{array}{l} \des\frac{\partial u}{\partial t}= D_j\Delta u+A_{jj}(\w{\cdot}t,x,z(t,\w,\varphi)(x),z(t-1,\w,\varphi)(x))\,u(t,x)\\[.2cm] \; + B_{jj}(\w{\cdot}t,x,z(t,\w,\varphi)(x),z(t-1,\w,\varphi)(x))\,u(t-1,x)\,,\;\, t>0\,,\;x\in \bar U, \\ \bar\alpha_j(x)\,u+\delta\,\des\frac{\partial u}{\partial n} =0\,,\quad t>0\,,\;\,x\in \partial U,\\[.2cm] u(s,x)=\psi^j(s,x)\,,\quad s\in [-1,0]\,,\;\,x\in \bar U, \end{array}\right. \end{equation} for the corresponding diagonal blocks $A_{jj}$ and $B_{jj}$ of $D_y f$ and $D_{\wit y} f$ in~\eqref{A and B}, respectively, for $D_j$ and $\bar\alpha_j(x)$ respectively the $n_j\times n_j$-diagonal matrices with diagonal entries $d_i$ and $\alpha_i(x)$ for $i\in I_j$, and initial value $\psi^j\in C([-1,0],\Pi_{i\in I_j} E_i^\gamma)$. Then, $K^j=K\times \{0\}\subset K\times C([-1,0],\Pi_{i\in I_j} E_i^\gamma)$ is a minimal set for $L_j$ which admits a continuous separation of type~II. Let $\Sigma_p^j$ be its principal spectrum. \par If $k=1$, {\it i.e.}, if the matrix $\bar A+\bar B$ is irreducible, let $I=J=\{1\}$. Else, let \begin{align*} I&=\{j\in\{1,\ldots,k\} \,\mid\, \bar A_{ji}+\bar B_{ji}=0 \text{ for any } i\not= j\},\\ J&=\{j\in\{1,\ldots,k\} \,\mid\, \bar A_{ij}+\bar B_{ij}=0 \text{ for any } i\not= j\}, \end{align*} that is, $I$ is composed by the indexes $j$ such that any block in the row of $\bar A_{jj}+\bar B_{jj}$, other than itself, is null, whereas $J$ contains those indexes $j$ such that any block in the column of $\bar A_{jj}+\bar B_{jj}$, other than itself, is null. Then, some sufficient conditions for uniform and strict persistence at $0$ are the following: \begin{itemize} \item[(i)] If $\Sigma_p^j\subset (0,\infty)$ for any $j\in I$, then $\tau$ is uniformly persistent in the area situated strongly above $K$. \item[(ii)] If $\Sigma_p^j\subset (0,\infty)$ for any $j\in J$, then $\tau$ is strictly persistent at $0$ in the area situated above $K$. \end{itemize} \end{teor} \begin{proof} We skip some details in the proof, since it often follows arguments in the proofs of Theorem~5.8 in Novo et al.~\cite{noos7} and Theorem~5.3 in Obaya and Sanz~\cite{obsa} for delay equations without diffusion, for (i) and (ii) respectively. \par Note that a convenient permutation of the variables takes the matrix $\bar A+\bar B$ into the form~\eqref{triangular}, and $\bar a_{ij},\,\bar b_{ij}\geq 0$ because of (C4) and the definition. Also, we maintain the notation introduced in Theorem~\ref{teor-linearized sk} for the variational problems. Besides, for any map $v$, let us denote $v^j=(v_i)_{i\in I_j}$, for $j=1,\ldots,k$. \par To see (i), we distinguish three cases. \par\noindent \textbf{(A1)}: $k=1$, that is, $\bar A+\bar B$ is an irreducible matrix. Then Theorem~\ref{teor-sep cont tipo II} says that $K$ admits a continuous separation of type~II, and since $\Sigma_p^1\subset (0,\infty)$, the abstract Theorem~4.5 in~\cite{noos7} implies that $\tau$ is u-persistent in the area strongly above $K$. \par\noindent \textbf{(A2)}: $k>1$ and $\bar A+\bar B$ is a reducible matrix with a block diagonal structure. In this case the argument goes exactly as in case (C2) in the proof of Theorem~5.8 in~\cite{noos7} for delay equations without diffusion. The key is to apply Theorem~4.5 in~\cite{noos7} to each of the uncoupled linear skew-product semiflows $L_j$, which admit a continuous separation of type~II and have positive principal spectrums. In all, we find a map $\psi_0\gg 0$ and a $t_0>0$ such that $D_{\!\varphi} z_{t}(\w,\varphi)\,\psi_0\gg 2\,\psi_0$ for $t\geq t_0$ and $(\w,\varphi)\in K$. Then, Theorem~3.3 in~\cite{noos7} provides the u-persistence in the zone strongly above $K$. \par\noindent \textbf{(A3)}: $k>1$ and $\bar A+\bar B$ is a reducible matrix with a non-diagonal block lower triangular structure, that is, at least one of the non-diagonal blocks in \eqref{triangular} is not null. This time we combine the arguments in case (C3) in the proofs of Theorem~5.6 for PDEs and Theorem~5.8 for delay equations in~\cite{noos7}. As in case (A2), the aim is to find a map $\psi\gg 0$ and a $t_1>0$ such that $D_{\!\varphi} z_{t}(\w,\varphi)\,\psi\gg 2\,\psi$ for $t\geq t_1$ and $(\w,\varphi)\in K$, so that Theorem~3.3 in~\cite{noos7} applies. Note that, since for $j\in I$ the systems \eqref{bloque j} are uncoupled, arguing as in (A2) we already have the appropriate maps $\psi_0^j\gg 0$ for $j\in I$ and the appropriate $t_0>0$, so that if $\psi\gg 0$ with $\psi^j=\psi_0^j$ for $j\in I$, then $v_t^j(\w,\varphi,\psi)\gg 2\,\psi^j$ for $t\geq t_0$ and $(\w,\varphi)\in K$, for each $j\in I$. That is, it remains to adequately complete the other components of $\psi\gg 0$. \par Since $1\in I$, we move forwards filling the gaps, so take $l=\min\{j\in \{2,\ldots,k\}\mid j\notin I\}\geq 2$. Then, at least one of the blocks to the left of $\bar A_{ll} +\bar B_{ll}$ is not null, that is, there exists an $m<l$, $m\in I$ such that $\bar A_{lm} +\bar B_{lm}\not=0$, so that $\bar a_{i_1k}+\bar b_{i_1k}>0$ for some $i_1\in I_l$ and $k\in I_m$. For $u(t,x)=v(t,\w,\varphi,\psi)(x)\geq 0$ by Proposition \ref{prop-monotone}, from~\eqref{linear family}, the block lower triangular structure of the linearized systems, condition (C4), and since $k\in I_m$ with $m\in I$, we have that \vspace{-0,2cm} \begin{multline*} \frac{\partial u_{i_1}}{\partial t}(t,x)=d_{i_1}\Delta u_{i_1}(t,x)+\sum_{j=1}^{i_1} \big( a_{i_1j}(\cdot)\,u_j(t,x)+b_{i_1j}(\cdot)\,u_j(t-1,x)\big)\\ \geq d_{i_1}\Delta u_{i_1}(t,x)+2\,a_{i_1k}(\cdot)\,(\psi_0^m)_k(0,x) +2\,b_{i_1k}(\cdot)\,(\psi_0^m)_k(-1,x) +a_{i_1i_1}(\cdot)\,u_{i_1}(t,x) \end{multline*} for $t\geq t_0$ and $x\in \bar U$, where $(\cdot)$ stands for $(\w{\cdot}t,x,z(t,\w,\varphi)(x),z(t-1,\w,\varphi)(x))$. Then, we consider the auxiliar family of scalar parabolic PDEs for $(\w,\varphi)\in K$, \begin{equation*} \des\frac{\partial h}{\partial t}= d_{i_1}\Delta h+ 2\,a_{i_1k}(\cdot)\,(\psi_0^m)_k(0,x) +2\,b_{i_1k}(\cdot)\,\,(\psi_0^m)_k(-1,x) + a_{i_1i_1}(\cdot)\,h(t,x) \end{equation*} for $t>0$, $x\in \bar U$, with boundary condition $\alpha_{i_1}(x)\,h(t,x)+\delta\,\frac{\partial h}{\partial n}(t,x) =0$ for $t>0$ and $x\in \partial U$. Since $\bar a_{i_1k}+\bar b_{i_1k}>0$ means that $a_{i_1k}(\w_1,x_1,\varphi_1(0,x_1),\varphi_1(-1,x_1))+b_{i_1k}(\w_1,x_1,\varphi_1(0,x_1),\varphi_1(-1,x_1))>0$ for some $(\w_1,\varphi_1)\in K$ and $x_1\in U$, and $(\psi_0^m)_k(0,x_1), (\psi_0^m)_k(-1,x_1)>0$, one can apply the same dynamical argument used in Theorem~5.6 in~\cite{noos7} to conclude that there exist a $t_{i_1}>0$ and a map $\psi_{0i_1}\in E_{i_1}^\gamma$ with $\psi_{0i_1}\gg 0$ such that $h(t,\,\cdot\,,\w,\varphi,0) \gg 2 \,\psi_{0i_1}$ for any $(\w,\varphi)\in K$ and $t\geq t_{i_1}$. Note that a version of Lemma~2.11~(ii) in N\'{u}\~{n}ez et al.~\cite{nuos3} for Dirichlet boundary conditions in the intermediate space $E_{i_1}^\alpha$ has been used. Finally, consider $\psi_{0i_1}\in C([-1,0],E_{i_1}^\gamma)$ the identically equal to $\psi_{0i_1}$ map, which satisfies $\psi_{0i_1}\gg 0$, and take any initial condition $\psi\gg 0$ with $\psi^j=\psi_0^j$ for $j\in I$ and $\psi^l_{i_1}=\psi_{0i_1}$. Then, comparing solutions of the two previous problems (see Martin and Smith~\cite{masm0,masm}), we can conclude that $(v_{i_1}^l)_t(\w,\varphi,\psi)\gg 2\,\psi_{i_1}^l$ for $t\geq t_0+t_{i_1}+1$ and $(\w,\varphi)\in K$, and we are done with the component $i_1\in I_l$. \par The argument for the rest of components in $I_l$, if any, is similar and relies on the irreducibility of the block $\bar A_{ll}+\bar B_{ll}$; and for the remaining blocks, if any, is just the same. The proof of (i) is finished. \par To see (ii) we consider again three cases, in accordance with Theorem~5.3 in~\cite{obsa}. \par\noindent \textbf{(B1)}: $k=1$, that is, $\bar A+\bar B$ is an irreducible matrix. By (i), we already know that $\tau$ is u-persistent. To see that it is also $s_0$-persistent, take $\psi_0\gg 0$ the map given in Definition~\ref{defi-persistence}~(i) and $t_*\geq 1$ the time given in Theorem~\ref{teor-sep cont tipo II}~(i). Now take $(\w,\varphi)\in K$ and $\phi\geq \varphi$ with $\phi(0)> \varphi(0)$. Then, $\phi_i(0)> \varphi_i(0)$ for some $i$ and Proposition~\ref{prop-monotone}~(ii) applied to the linearized systems implies that $v_i(t,\w,\varphi,\phi-\varphi)\gg 0$ for any $t>0$. Then it cannot be $D_{\!\varphi} z_{t_*}(\w,\varphi)\,(\phi-\varphi) =0$, and necessarily $D_{\!\varphi} z_{t_*}(\w,\varphi)\,(\phi-\varphi) \gg 0$. By continuity, $D_{\!\varphi} z_{t_*}(\w,\lambda\phi+(1-\lambda)\varphi)\,(\phi-\varphi) \gg 0$ for $\lambda\in[0,\varepsilon]$ for a certain $\varepsilon>0$, and using~\eqref{mean value}, $z_{t_*}(\w,\phi)\gg z_{t_*}(\w,\varphi)$. To finish, apply the u-persistence to $(\w{\cdot}t_*,z_{t_*}(\w,\varphi))\in K$ together with the semicocycle property~\eqref{semicocycle}. \par Now, for $k>1$, take $\phi\geq \varphi$ with $\phi(0)> \varphi(0)$ and distinguish two possibilities: \par\noindent \textbf{(B2)}: $k> 1$ and $\phi_i(0)> \varphi_i(0)$ for some $i\in I_j$ with $j\in J$. In this case we follow the arguments in case (C2) in the proof of Theorem~5.3 in~\cite{obsa} for delay equations without diffusion. Basically, a family of $n_j$-dimensional systems of nonlinear parabolic PFDEs with delay over the base flow in $K$ is built, in such a way that it is a minorant family for the components $y^j(t,x)=z^j(t,\w,\varphi)(x)$, and besides the linearized systems along the orbits in a minimal set are precisely the systems~\eqref{bloque j}, with irreducible matrix $\bar A_{jj}+\bar B_{jj}$. Then, to this family case (B1) applies, and thus there exist a $\psi_0^j\in C([-1,0],\Pi_{i\in I_j} E_i^\gamma)$, $\psi_0^j\gg 0$ and a $t_0^j>0$, associated to its u-persistence. Then, using standard arguments of comparison of solutions, one can check that $z_t(\w,\phi)\geq z_t(\w,\varphi)+\psi_j$ for any $t\geq t_0^j$, for the map $\psi_j \in C_\gamma$ defined by $\psi_j^j=\psi_0^j$ and $\psi_j^m=0$ if $m\not=j$, which satisfies $\psi_j>0$. Just remark that the maps $\{\psi_j\}_{j\in J}$ built in this way are the appropriate collection required in Definition~\ref{defi-persistence}~(ii). \par\noindent \textbf{(B3)}: $k> 1$ and $\phi^l(0)=\varphi^l(0)$ for any $l\in J$. Then, consider $i$ such that $\phi_i(0)> \varphi_i(0)$ with $i\in I_j$ for some $j\notin J$. Now we distinguish two situations: \par\noindent \textbf{(B3.1)}: There exists an $m\geq 1$ such that $\bar A_{j+m,j}+\bar B_{j+m,j}\not=0$ with $j+m\in J$. In this case we search for a time $t_1>0$ such that $z^{j+m}(t_1,\w,\phi)>z^{j+m}(t_1,\w,\varphi)$, for then we can apply case (B2) together with the semicocycle relation~\eqref{semicocycle}. \par As a first step, let us study the components $v_t^j(\w,\varphi,\phi-\varphi)$. Write $L_j(t,\w,\varphi,\psi^j)=(\tau(t,\w,\varphi),w_t(\w,\varphi,\psi^j))$ for the linear skew-product semiflow induced by the solutions of \eqref{bloque j} for $(\w,\varphi)\in K$ and $\psi^j\in C([-1,0],\Pi_{i\in I_j} E_i^\gamma)$. By condition (C4), a comparison of solutions argument says that $v_t^j(\w,\varphi,\phi-\varphi)\geq w_t(\w,\varphi,\phi^j-\varphi^j)$ for $t\geq 0$. Besides, applying Proposition~\ref{prop-monotone}~(ii) to $L_j$, since $\phi^j_i(0)>\varphi^j_i(0)$, we get that $w_i(t,\w,\varphi,\phi^j-\varphi^j)\gg 0$ for any $t>0$. Therefore, it must be $w_{t_*}(\w,\varphi,\phi^j-\varphi^j)\gg 0$ for $t_*\geq 1$ the time given in Theorem~\ref{teor-sep cont tipo II}~(ii) for $L_j$. Then, the linear semicocycle property~\eqref{linear semicocycle} and Proposition~\ref{prop-monotone}~(ii) imply that $w_t(\w,\varphi,\phi^j-\varphi^j)\gg 0$ for $t\geq t_*$, so that also $v_{t}^j(\w,\varphi,\phi-\varphi)\gg 0$ for $t\geq t_*$. \par Finally, take $i_1\in I_{j+m}$ and $k\in I_j$ such that $\bar a_{i_1k}+\bar b_{i_1k}>0$. Then, for $u(t,x)=v(t,\w,\varphi,\phi-\varphi)(x)$ recall that with (C4), $u(t,x)\geq 0$ by Proposition~\ref{prop-monotone}~(i), and since $k\in I_j$, $u_{k}(t,x)> 0$ for any $t\geq t_*-1$ and $x\in U$. Now, arguing as in the proof of Theorem~5.1 in Novo et al.~\cite{nonuobsa}, associated to the minimal set $K$ and to the open set $U_{i_1k}=\{(\tilde \w,\tilde \varphi)\in \Om\times C_\gamma\mid a_{i_1k}(\tilde\w,x,\tilde\varphi(0,x),\tilde\varphi(-1,x))+b_{i_1k} (\tilde\w,x,\tilde\varphi(0,x),\tilde\varphi(-1,x))>0 \;\text{for some } x\in U\}$, there exists a $T_0>2$ such that for any $(\tilde \w,\tilde \varphi)\in K$ there is a $t_0\in (2,T_0)$ such that $\tau(t_0,\tilde\w,\tilde \varphi)\in U_{i_1k}$. Applying this property to $\tau(t_*,\w,\varphi)\in K$ there exist a $t_0\in (2,T_0)$ and an $x_0\in U$ such that \begin{multline*} \wit a_{i_1k} + \wit b_{i_1k}:= a_{i_1k}(\w{\cdot}(t_*+t_0),x_0,z(t_*+t_0,\w,\varphi)(x_0),z(t_*+t_0-1,\w,\varphi)(x_0))\\ +b_{i_1k}(\w{\cdot}(t_*+t_0),x_0,z(t_*+t_0,\w,\varphi)(x_0),z(t_*+t_0-1,\w,\varphi)(x_0))>0\,. \end{multline*} Now, by (C4), on the one hand $u_{i_1}(t,x)$ satisfies the following parabolic inequality \[ \frac{\partial u_{i_1}}{\partial t}(t,x) \geq d_{i_1}\Delta u_{i_1}(t,x) +a_{i_1i_1}(\w{\cdot}t,x,z(t,\w,\varphi)(x),z(t-1,\w,\varphi)(x))\,u_{i_1}(t,x) \] for $t> t_*$ and $x\in \bar U$, together with the corresponding boundary condition. Then, if it were $u_{i_1}(t_*+t_0,x_0)=0$, the minimum principle for scalar parabolic PDEs would say that $u_{i_1}(t,x)=0$ for any $(t,x)\in [t_*,t_*+t_0]\times \bar U$, so that in particular $\Delta u_{i_1}(t_*+t_0,x_0)=0$ and $\partial_t u_{i_1}(t_*+t_0,x_0)=0$. But on the other hand, then \[ \frac{\partial u_{i_1}}{\partial t}(t_*+t_0,x_0) \geq \wit a_{i_1k}\,\,u_k(t_*+t_0,x_0) + \wit b_{i_1k}\,\,u_k(t_*+t_0-1,x_0)>0\,, \] a contradiction. Therefore, $u_{i_1}(t_*+t_0,x_0)>0$, so that $v_{i_1}(t_*+t_0,\w,\varphi,\phi-\varphi)>0$ and by Proposition~\ref{prop-monotone}~(ii), $v_{i_1}(t,\w,\varphi,\phi-\varphi)\gg 0$ for any $t>t_*+t_0$. Take such a $t_1>t_*+t_0$ and use relation \eqref{mean value componente} together with a continuity argument to conclude that $z_{i_1}(t_1,\w,\phi)\gg z_{i_1}(t_1,\w,\varphi)$, so that $z^{j+m}(t_1,\w,\phi)>z^{j+m}(t_1,\w,\varphi)$, as we wanted. \par\noindent \textbf{(B3.2)}: For any $m\geq 1$ such that $\bar A_{j+m,j}+\bar B_{j+m,j}\not=0$, $j+m\notin J$. In this case, we take the greatest $m\geq 1$ such that $\bar A_{j+m,j}+\bar B_{j+m,j}\not=0$ and we argue as in case (B3.1) to find a $t_1>0$ such that $z^{j+m}(t_1,\w,\phi)>z^{j+m}(t_1,\w,\varphi)$. Since $j+m\notin J$, again there is an $l\geq 1$ such that $\bar A_{j+m+l,j+m}+\bar B_{j+m+l,j+m}\not=0$. If for some such $l\geq 1$, $j+m+l\in J$ we fall again in case (B3.1), and if not, we are again in case (B3.2) and we just iterate the procedure. Since $k\in J$, in a finite number of iterations we fall in case (B3.1). The proof is finished. \end{proof}
\section{Introduction} \label{sec:intro} Despite decades of research, designing chemicals with specific properties or characteristics is still heavily driven by serendipity and chemical intuition. Current machine learning (ML) and deep learning (DL) models in chemistry typically rely on engineered features (molecular descriptors) developed from expert knowledge, and have made progress in property prediction. \subsection{Big Data but Small Labels} Like many other fields, the growth of big data in chemistry is underway~\cite{goh2017r}. However, the amount of labeled data is significantly smaller than that available in conventional DL research. To illustrate this disparity, a database of 100,000 measured (labeled) samples is considered a significant accomplishment in chemistry, which would otherwise be considered a small dataset in computer vision research, where datasets such as ImageNet that includes over a million images are typically the starting point. Owing to the complexities of data collection in the chemical sciences which require expensive and slow wet-lab experimentation, the scarcity of labels is an inherent problem to this field. While representation learning thrives in a big data environment, recent DL models that learn directly from raw chemical data have accomplished reasonable success using molecular graphs,~\cite{duvenaud2015,kearnes2016} molecular images,~\cite{goh2017c1,goh2017c2,wallach2015}, or molecular text-representations~\cite{bjerrum2017,goh2017s} to predict chemical properties. However, the watershed breakthrough akin to AlexNet for computer vision has yet to be observed in this field, although recent developments in weak supervised training methods such as ChemNet has made progress towards this goal.~\cite{goh2017c3} \textit{Therefore, while big data in chemistry exists, it comes with a caveat of small labels, which reduces the effectiveness of deploying deep learning in this industry.} \subsection{Contributions} Our work addresses some of the challenges associated with the big data but small label challenge in chemistry. \textit{Specifically, we develop a multimodal CNN-MLP network architecture that incorporates both engineered features and learned representations, which is the first reported example of how multimodal learning can be used effectively in chemistry}. Our contributions are as follows. \begin{itemize} \item We develop the first multimodal CNN-MLP neural network architecture for chemical property prediction that utilizes both engineered and learned representations. \item We investigate the effect of network architecture, hyperparameters, and feature selection on model accuracy. \item We demonstrate the effectiveness of this network design in the development of DeepBioD, which considerably outperforms existing state-of-the-art models by 31\% for predicting chemical biodegradability. \end{itemize} The organization for the rest of the paper is as follows. In section 2, we outline the motivations and design principles behind the multimodal network. In section 3, we examine the biodegradability dataset, its applicability to chemical-affiliated industries, and the training protocol. Lastly, in section 4, we explore different multimodal network designs, and other factors that affect model accuracy and generalization. We conclude with the development of the DeepBioD model for predicting biodegradability, and evaluate its performance against the current state-of-the-art. \subsection{Related Work} Multimodal learning is an established technique in DL research. Our work takes inspiration from earlier research that demonstrated using different data modalities can improve model accuracy~\cite{ngiam2011}. However, to the best of our knowledge existing multimodal learning models operate primarily on different streams of synchronous raw data, for example a video stream and its corresponding audio stream, or an image and its respective text caption. In contrast, there has been limited research in using multimodal learning to combine traditional feature engineering with representation learning, and there currently exist no examples of multimodal learning in chemistry. \section{Multimodal Network Design} \label{sec:design} In this section, we document the data preparation steps for processing chemical image data. Then, we examine the design principles behind the multimodal neural network used in this work. \subsection{Data Representation} We followed the same preparation of chemical image data as reported by Goh et. al.~\cite{goh2017c1}. Briefly, the 2D molecular structure and its coordinates were used to map onto a discretized image of 80 x 80 pixels that corresponds to 0.5 {\AA} resolution per pixel. Then, each atom and bond pixel is assigned a "color" using the "EngD" color-coding scheme as reported by Goh et. al.~\cite{goh2017c2}. The resulting image is then used to train the Chemception CNN model. In addition to the chemical image data, the other component of the multimodal model, the MLP network, uses engineered features (molecular descriptors) as input. Two sets of molecular descriptors input data were obtained. The first set, referred to as Ballabio-40, was obtained directly from Mansouri et. al.~\cite{mansouri2013}, which is a set of 41 selected descriptors that was computed from DRAGON. We also prepared a second set, PaDEL-1400, which is a more comprehensive set of \textasciitilde1400 descriptors computed using PaDEL. \subsection{Designing the Multimodal Neural Network} \begin{figure}[!htbp] \centering \includegraphics[scale=0.10]{./schematic.pdf} \caption{\small Schematic diagram of the multimodal neural network that uses both molecular descriptors and raw image data that operates in (a) parallel and (b) sequential mode.} \label{fig:schematic} \end{figure} CNNs are effective neural network designs for learning from image data. Its effectiveness has been demonstrated in examples like ResNet~\cite{he2015} that achieves human-level accuracy in image recognition tasks. In the absence of copious amount of data, the representation learning ability of deep neural networks may not learn optimal features. In the context of limited labeled chemical data, any sub-optimality of the network's learned representations could potentially be mitigated with the introduction of engineered chemical features. Thus, the goal of this work is to combine two modalities, the first is engineered features, and the other is using raw image data. However, unlike conventional multimodal DL models, there is no synchronization between the data streams in this work. Therefore, an appropriate multimodal network design that works well for chemistry research problems must be first developed. As illustrated in Figure~\ref{fig:schematic}, we explored two multimodal architectures that operate as either a parallel or sequential model. In the parallel model, two neural networks are trained simultaneously. The first component is a standard feedforward MLP neural network that uses molecular descriptors as the input data. The other is the Chemception CNN model that uses chemical image input data. The penultimate layer output from the CNN will correspond to learned features of the entire chemical. Using expert knowledge, we know this output is similar to a molecular descriptor (i.e. engineered features of the entire chemical). We therefore, concatenated both network outputs before passing it to the final classification layer. This approach thus recombines the learned features from the CNN with the reprocessed features from the MLP (we use the term "reprocessed" as the output from the MLP will be a non-linear combination of the original input of engineered features). The underlying hypothesis of this design is that during training, the CNN component could potentially learn representations to supplement missing features from the MLP component. An alternative approach would be to train a multimodal model in two stages. In this setup, known as the sequential model, the Chemception CNN model is first trained directly on the chemical task. Once this is completed, the CNN weights are freezed, and the penultimate layer output is concatenated with the molecular descriptors, which are then collectively used as input data for training a second MLP network. This approach is therefore equivalent to running a list of engineered features (molecular descriptors) and learned representations (from the CNN) through a MLP network. The underlying hypothesis behind this design is that the CNN is allowed to first learn its own representations, and any inherent shortcomings in either its learned features or expert engineered features may be mitigated through additional representation learning in the MLP network. As for the network architecture of the Chemception CNN model, we used the T3\_F16 model reported by Goh et. al.~\cite{goh2017c1}. For the MLP architecture, we performed a grid search totaling 20 different versions of each multimodal network design for [2,3,4,5] fully-connected layers with ReLU activation functions~\cite{glorot2011} and [16,32,64,128,256] neurons per layer. A dropout of 0.5 was also added after each fully-connected layer. The results presented in this paper for each respective multimodal model is the best model found using grid search, as determined by the validation error rate. \section{Methods} \label{sec:method} In this section, we provide an introduction to the biodegradation dataset. Then, we document the training methods, as well as the evaluation metrics used in this work. \subsection{Industrial Applications (Biodegradability)} One example of a chemistry research problem with limited data is in biodegradability prediction. Biodegradability is the tendency of chemicals to break down naturally. Non-biodegradable chemicals that do not decay, can lead to accumulation and this can be harmful in the long-term for the environment. Furthermore, biodegradation is a long-time scale process, and as such, using ML/DL models to predict biodegradability is a rapid and cost-effective solution. Over the years, ML models have been developed and the current state-of-the-art is based on conventional ML algorithms trained on engineered features (molecular descriptors).~\cite{mansouri2013} \subsection{Dataset Description} In this work, we used the same dataset that was used to develop the current state-of-the-art model for predicting biodegradability~\cite{mansouri2013}. Each chemical is classified as either biodegradable (RB) or non-biodegradable (NRB). The training/validation dataset was curated from MITI. The test set was constructed from two data sources, Cheng et.al. and the Canadian DSL database. Additional data cleaning steps, such as handling data replicates, unifying test duration, etc. were reported previously, and we used the final cleaned dataset for training DeepBioD and benchmarking against existing models~\cite{mansouri2013}. \begin{table}[!htbp] \centering \begin{tabular}{|c|c|c|c|} \hline Data & RB & NRB & Total \\ \hline Training/Validation & 356 & 699 & 1055\\ Test & 191 & 479 & 670\\ \hline \end{tabular}\\ \caption{Biodegradability dataset used in this study.} \label{table:dataset} \end{table} \subsection{Data Splitting} We used a random 5-fold cross validation for training and evaluated the performance and early stopping criterion of the model using the validation set. The splitting between training/validation and test dataset was identical to Mansouri et. al.~\cite{mansouri2013}, and it was used throughout this paper unless specified otherwise. We also noted that the training/validation and test datasets were obtained from different sources. This means that the chemicals between both datasets may not overlap well in chemical space, and/or systematic biases from different experimental measurements or lab protocols might arise. Thus, we also preprocessed a re-mixed dataset to mitigate the above-mentioned effects. In this re-mixed dataset, both training/validation and test datasets were combined, and a random 40\% was re-partitioned out to construct a new test set. The re-mixed training/validation and test dataset is therefore like the original datasets in terms of size, but each dataset would have samples from all data sources. \subsection{Training the Neural Network} DeepBioD was trained using a Tensorflow backend~\cite{abadi2016} with GPU acceleration. The network was created and executed using the Keras 1.2 functional API interface~\cite{chollet2015}. We use the RMSprop algorithm to train for 500 epochs using the standard settings recommended: learning rate = 10\textsuperscript{-3}, $\rho$ = 0.9, $\epsilon$ = 10\textsuperscript{-8}. We used a batch size of 32, and also used early stopping to reduce overfitting. This was done by monitoring the loss of the validation set, and if there was no improvement after 50 epochs, the last best model was saved as the final model. During the training of the Chemception CNN component, we also performed additional real-time data augmentation to the image using the ImageDataGenerator function in the Keras API, where each image was randomly rotated between 0 to 180 degrees. \subsection{Loss Function and Performance Metrics} We used the binary cross-entropy loss function for training. The performance metric reported in our work is the classification error rate (Er), which was defined in prior publications and it is a function of sensitivity (Sn) and specificity (Sp): \[Er = 1 - (Sp - Sn)/2\] \[Sp = \frac{TN}{TN + FP}\quad Sn = \frac{TP}{TP + FN}\] \section{Experiments} \label{sec:exp} In this section, we perform several experiments to determine the best multimodal network design, which is used to develop DeepBioD, an ensemble model for predicting biodegradability. Then, we compared DeepBioD to existing state-of-the-art methods for biodegradability prediction. \subsection{Searching for an Optimal Network Design} We investigated factors that affected the performance of the multimodal neural network. In the absence of more data, network architecture has been a key driver in increasing model accuracy~\cite{he2015}. We also investigated the effect of feature selection, and examine an alternative data splitting approach to account for systematic biases. \subsubsection{Evaluating Baseline Models} As our work combines a typical MLP network with the Chemception CNN model, we first evaluated the performance of baseline (single-modal) models. Two different training strategies were used for Chemception. The first approach was supervised learning on the biodegradability dataset. The second approach is based on ChemNet~\cite{goh2017c3}, which is a weak supervised transfer learning approach that uses a model pre-trained on numerous chemical rules and fine-tuning its weights for predicting biodegradability. The use of ChemNet in this context is therefore analogous to using existing image classification models (ResNet, GoogleNet, etc.) for fine-tuning on related tasks. As shown in Figure~\ref{fig:standalone_error}, Chemception trained directly on the biodegradability dataset achieved a classification error rate of 0.178 on the test set. Relative to traditional ML algorithms trained on the same dataset, which achieved an error rate of 0.170 to 0.180~\cite{mansouri2013}, the resulting Chemception model is comparable, but it is not performing better. We attribute this observation to a consequence of having limited labeled data. In comparison, ChemNet achieved a noticeably lower error rate of 0.157. This model exploits the advantage of weak supervision that uses a much larger database of 500,000 compounds, but without using additional labels. In addition, the baseline MLP model that was trained on the Ballabio-40 descriptor set also achieved a similar error rate of 0.156. \textit{Our results indicate that neither a standalone MLP nor CNN model is better than the other.} \begin{figure}[!htbp] \centering \includegraphics[scale=0.20]{./standalone_error.pdf} \caption{\small Error classification rate of standalone (S) Chemception or MLP models compared to multimodal (M) CNN-MLP models, trained on the Ballabio-40 descriptor set.} \label{fig:standalone_error} \end{figure} \subsubsection{Parallel vs Sequential Multimodal Network} Having established baseline standards, we now explore if the inclusion of engineered features in a multimodal configuration will improve model performance. We trained both sequential and parallel multimodal neural networks. For the parallel model (MM-P-Chem), the Chemception component was trained directly on the dataset. For the sequential model, we used the fixed weights of either the Chemception (MM-S-Chem) or ChemNet (MM-S-ChemNet) model trained in the preceding section, to generate additional input that was passed to the MLP network. As shown in Figure~\ref{fig:standalone_error}, all multimodal models perform better than the standalone MLP or Chemception models. We observed the error rate of both MM-P-Chem (0.151) and MM-S-Chem (0.148) models trained directly on the Ballabio-40 dataset are similar. However, the large difference between validation and test error rates suggest that the multimodal models are not generalizing as well as the standalone models. There are 2 factors that account for this observation. First, by virtue of limited labels, there may be insufficient diversity being presented in the training/validation set, which may not overlap well with the test set (i.e. the training/validation and test datasets are not sufficiently similar). The other factor to consider is that the test dataset was obtained from two separate database/measurements, which may introduce additional systematic biases. To improve the generalization of the multimodal models, we evaluated the effect of using the ChemNet model. This model was originally trained on a much larger and more diverse dataset, before fine-tuning on the biodegradability dataset. We tested both parallel and sequential models but observed that only the sequential multimodal model could be trained effectively. We suspect this is because the parallel model uses a pre-trained ChemNet for the CNN component, but the MLP component would be initialized with random weights. It is plausible that more sophisticated training methods can be developed, but it is beyond the scope of this work. The results presented in Figure 2, shows that the MM-S-ChemNet model achieved a validation and test error rate of 0.103 and 0.140 respectively. Compared to the Chemception-based multimodal models, the difference in error rate is smaller, but more importantly, the test error rate is also the lowest amongst all models explored. \textit{Therefore, these results strongly indicate that multimodal models that utilize both raw data and engineered features can improve model accuracy relative to standalone models, and limitations in generalizing to new data can be mitigated by pre-training on larger datasets.} \subsubsection{Gaining Insight on Feature Selection} The performance of the MLP and multimodal models reported thus far have trained on the selected set of 41 molecular descriptors that were used to develop the current state-of-the-art model~\cite{mansouri2013}. In that work, the authors constructed the Ballabio-40 descriptor set from a larger pool of 800 descriptors, using a sophisticated feature selection protocol based on clustering and genetic algorithms to identify the optimal subset of molecular descriptors for training conventional ML models. \begin{figure}[!htbp] \centering \includegraphics[scale=0.45]{./multimodal_error.pdf} \caption{\small Error classification rate of various multimodal CNN-MLP models when trained on the PaDEL-1400 descriptor set shows a systematic reduction relative to comparable models trained on the Ballabio-40 descriptor set.} \label{fig:multimodal_error} \end{figure} Unlike traditional ML algorithms, deep neural networks with modern algorithms and training methods have been shown to be robust even in the presence of many input features,~\cite{lecun2015} and consequently feature selection may not be necessary. In addition, excessive feature selection has the effect of reducing the quantity of input data to the MLP network, and this means that the network has less data to work with in learning representations, which may degrade its performance. Hence, we explored the effect of using a larger set of ~1400 features computed using PaDEL. We performed analogous experiments, and the results are summarized in Figure~\ref{fig:multimodal_error}. We observed a systematic reduction in the test error rate across all 3 multimodal models evaluated when using the PaDEL-1400 descriptor set. In addition, the best model, MM-S-ChemNet, has its error reduced from 0.140 to 0.133, which is the lowest error attained thus far. \textit{These results indicate that excessive feature selection may not be necessary when using deep neural networks, and the inclusion of more engineered features can improve model performance.} \subsubsection{On Dataset Dissimilarity and Systematic Biases} With limited labeled data, there is a risk that training/validation and test datasets may not be sufficiently similar, and if datasets are constructed from different sources, such as in this work, this may introduce systematic biases due to differences in experimental techniques and protocol. To further disentangle our model's accuracy from these effects, we explore a different data splitting protocol. As detailed in the methods section, we reconstructed a new training/validation and test dataset that had samples from all 3 sources used to construct the original biodegradability dataset. This re-mixed dataset was trained with the PaDEL-1400 descriptor set. We observed that the validation error showed no systematic improvement across various multimodal models tested. However, there was a consistent reduction in the test error rate, to the point that the best model, MM-S-ChemNet achieves an error rate of 0.114, compared to 0.133 using the original data splitting. This suggests that the difference in the two error rates can be attributed to any dissimilarity between the original datasets, as well as any systematic biases introduced by different databases/experiments. \textit{Our results suggest that when developing models with limited training data, models should be periodically retrained with new data (when available) to improve generalizability, and to account for unknown biases (if any).} \subsubsection{DeepBioD: Putting it All Together} Having explored various multimodal model network designs, and the factors that affect model performance, we have identified that the MM-S-ChemNet model trained on a larger PaDEL-1400 descriptor set, where the MLP component has 2 fully-connected layers of 128 neurons each, provides the lowest error and best generalization. To develop DeepBioD, we trained a total of 5 additional MM-S-ChemNet models that use a different seed number to govern the splitting between training and validation datasets. These 5 individual models were then used to develop an ensemble model, in which the predicted output across all 5 models was averaged, and the mean output was used to predict the molecule's class. \textit{Using this ensemble approach, the final DeepBioD model achieves an error classification rate of 0.125 on the test set.} \subsection{Comparing DeepBioD to State-of-the-Art Models} To the best of our knowledge, no DL model has been developed for biodegradability prediction. The current state-of-the-art is a consensus model of 3 traditional ML algorithms: kNN, PLSDA, SVM~\cite{mansouri2013}. In addition, two type of consensus models were reported. The consensus \#1 model uses the average output of the 3 individual ML algorithms to provide a final prediction, and this is similar in approach to our ensemble model. \begin{figure}[!htbp] \centering \includegraphics[scale=0.40]{./deepbiod.pdf} \caption{\small Our model (O) DeepBioD has a lower error classification rate compared to prior (P) state-of-the-art models for biodegradability predictions in every category.} \label{fig:deepbiod} \end{figure} As illustrated in Figure~\ref{fig:deepbiod}, a single multimodal neural network model, MM-S-ChemNet that has an error rate of 0.133 already outperforms all 3 ML models, as well as the consensus \#1 model that has an error rate of 0.170. However, a more appropriate comparison against consensus \#1 would be using an ensemble model like DeepBioD that achieves an error rate of 0.125. \textit{Therefore, DeepBioD provides a 27\% reduction in error rate relative to current state-of-the-art.} \subsubsection{Reliability and Generalizability Tradeoff} When dealing with limited data, it is important to ascertain the reliability of a model's prediction. Prior work has demonstrated that using the consensus \#2 model, which only returns a predicted class when all 3 underlying ML models are in agreement can reduce the error rate to 0.130~\cite{mansouri2013}. However, the drawback is that this model is only able to provide predictions for 87\% of the test set. It has to be emphasized that DeepBioD in its current form provides a classification for all the compounds in the test set, and with a lower error rate. However, if one were to factor in the completeness of prediction coverage, a more appropriate comparison to consensus \#2 would be a modified model that is adjusted to return no classes when its prediction is not reliable. In this modified DeepBioD+ model, we introduced an empirical threshold criterion that filters out predictions if the class probability is less than 0.8. The resulting model achieves an error rate of 0.090 with 89\% coverage, which is a non-trivial 31\% reduction relative to the current state-of-the-art consensus \#2 model. \textit{These results indicate that filtering out less reliable predictions can boost model performance, which can be particularly useful in prospective studies on unseen data.} \subsection{Multimodal Learning in Other Domains} While the multimodal model that we have developed is for biodegradability prediction, this approach can be extended to other properties of interest to chemical-affiliated industries, on the condition that some labeled data exists. We also anticipate that the CNN component can be replaced with different network architectures, such as those that use graphs ~\cite{duvenaud2015,kearnes2016} or text ~\cite{bjerrum2017,goh2017s} as the input data. Lastly, there are design principles that can be adapted to other domains. First, (i) prior feature engineering research by domain scientists is necessary, which implies that other scientific, engineering and financial modeling applications may benefit from this approach. Second, (ii) identifying appropriate locations to combine data streams from engineered and learned representations is critical. In our work, we used expert-knowledge to determine that the penultimate layer output of the CNN component would correspond to engineered features. For other domain applications, we anticipate this solution will be field specific requiring both expert-knowledge and deep learning ingenuity to identify similar critical points in the multimodal network design. \section{Conclusions} \label{sec:conclusions} In conclusion, we developed a novel multimodal CNN-MLP neural network architecture for predicting biodegradability. This model uses both raw data (images) and engineered features (molecular descriptors), while leveraging weak supervised learning and transfer learning methods. The final DeepBioD model achieves an error rate of 0.125, significantly outperforming the current state-of-the-art of 0.170. We have also shown that training on larger datasets using weak supervision (without requiring additional labels) improves the model's ability to generalize to new data. Our work therefore demonstrates that a multimodal network that combines the benefit of representation learning from raw data with expert-driven feature engineering is a viable approach in domain applications that have limited labeled data. \bibliographystyle{aaai}
\section*{Introduction} Mixed inequalities were introduced by E. Sawyer in \cite{Sawyer}. These inequalities include two Muckenhoupt weights $u$ and $v$ and the weak type estimate that Sawyer proved in that article involves a level set of certain operator, which is related with the classical Hardy-Littlewood maximal operator. This modification implies that the most known techniques involved with classical weak type inequalities must be replaced for other ones. Concretely, Sawyer proved that if $u,v$ are weights belonging to the $A_1$-Muckenhoupt class then the inequality \begin{equation}\label{mixta_para_M} uv\left(\left\{x\in \R: Sf(x)>t\right\}\right)\leq \frac{C}{t}\int_{\R}|f(x)|u(x)v(x)\,dx \end{equation} holds for every positive $t$, where $S(f)(x)=M(fv)(x)v^{-1}(x)$. The motivation of Sawyer of considering \eqref{mixta_para_M} was the fact that this inequality together with the Jone's factorization Theorem allow us to obtain an alternative proof of the boundedness of the Hardy-Littlewood maximal operator $M$ in $L^p(w)$, provided $w\in A_p$, $1<p<\infty$. Later on, Cruz Uribe, Martell and P\'erez proved in \cite{CU-M-P} an extension of the Sawyer estimate on the real line to higher dimensions. They showed that if $u,v$ are weights that satisfy $u,v\in A_1$ or $u\in A_1$ and $v\in A_\infty(u)$ then the inequality \begin{equation}\label{mixta_para_M_y_T_Rn} uv\left(\left\{x\in \R^n: \frac{|\mathcal{T}(fv)(x)|}{v(x)}>t\right\}\right)\leq \frac{C}{t}\int_{\R^n}|f(x)|u(x)v(x)\,dx \end{equation} holds for every positive $t$, where $\mathcal{T}$ is either the Hardy-Littlewood maximal function or a Calder\'on-Zygmund operator. We want to point out that these authors not only extended Sawyer's estimate to higher dimensions and other operators but also included another condition on the weights. This condition is ``smoother'' than $u,v\in A_1$ since it can be shown that it implies $uv\in A_\infty$ while, in the other case, that product might be very singular. Recently, in \cite{Li-Ombrosi-Perez}, Li, Ombrosi and P\'erez extended these estimates to a more general context. Concretely, they proved that if $u\in A_1$ and $v\in A_\infty$ then the inequality \eqref{mixta_para_M_y_T_Rn} holds for every positive $t$. Then, a natural question that arises is if similar estimates hold for other maximal operators, which are defined by means of certain Young functions. Particularly, we consider $L$log$L$ type functions since, it is well known, they provide maximal functions related with commutators of Calder\'on-Zygmund operators. In \cite{bcp} the authors proved a mixed weighted inequality for such operators, but for a particular weight $v(x)=|x|^{-\beta}$ with $\beta<-n$. This means that $v$ is not even locally integrable. No assumptions were made on $u$. More specifically, they proved that if $u\geq 0$, $v$ is as above and $w=1/\Phi(v^{-1})$ then \begin{equation*} uw\left(\left\{x\in \R^n: \frac{M_\Phi(fv)(x)}{v(x)}>t\right\}\right)\leq C\int_{\R^n}\Phi\left(\frac{|f(x)|v(x)}{t}\right)Mu(x)\,dx \end{equation*} holds for every positive $t$, where $\Phi(t)=t^r(1+\log^+t)^{\delta}$, with $r\geq 1$, $\delta\geq0$ and $\log^+t=\max\{0,\log t\}$, for $t>0$. Notice that the product $uv$ is replaced on this last estimate by $uw$. This fact suggests us that if we consider maximal operators associated with Young functions the external weight $v$ should be modified in that way. This seems to be a well extension, since if we take $r=1$ and $\delta=0$, the operator $M_\Phi$ is the Hardy-Littlewood maximal operator and $w=v$, so we recover estimate \eqref{mixta_para_M_y_T_Rn}. Let us also point out that if we consider the operator $M_r(f)=M(f^r)^{1/r}$, $r\geq 1$ we have that \[\left\{x: \frac{M_r(fv)(x)}{v(x)}>t\right\}=\left\{x: \frac{M((fv)^r)(x)}{v^r(x)}>t^r\right\}.\] So if $u,v^r$ are $A_1$ weights then inequality \eqref{mixta_para_M_y_T_Rn} yields \begin{equation*} uv^r\left(\left\{x\in \R^n: \frac{M_r(fv)(x)}{v(x)}>t\right\}\right)\leq \frac{C}{t^r}\int_{\R^n}|f(x)|^ru(x)v^r(x)\,dx. \end{equation*} But this last inequality can be also written as follows \begin{equation}\label{mixed_Mr_segundaforma} uw\left(\left\{x\in \R^n: \frac{M_\Phi(fv)(x)}{v(x)}>t\right\}\right)\leq C\int_{\R^n}\Phi\left(\frac{|f(x)|v(x)}{t}\right)u(x)\,dx, \end{equation} where $w=1/\Phi(v^{-1})$ with $\Phi(t)=t^r$. \medskip Thus, as in the case of the operator $M$, the inequality above allow us to obtain an alternative proof of the boundedness of the operator $M_r$ in $L^p(w)$, with $r<p<\infty$ and $w$ belonging to the $A_{p/r}$-Muckenhoupt class. Indeed, given $w\in A_{p/r}$ we use the Jone's factorization Theorem to decompose it as $w=uv^{r-p}=uv^{r(1-p/r)}$, where $u,v^r\in A_1$, and consider the auxiliar operator $S(f)(x)=M_r(fv)(x)v^{-1}(x)$. Then, \eqref{mixed_Mr_segundaforma} is the $(r,r)$-weak type inequality of the operator $S$ with respect to the measure $d\mu=uv^r\,dx$. Also, it is not difficult to see that $S$ is bounded in $L^\infty(uv^r)$. Then, by using the Marcinkiewicz's interpolation theorem we get the boundedness of $S$ in $L^p(uv^r)$, $r<p<\infty$ and thus \begin{align*} \int_{\R^n}M_r(f)(x)^pw(x)\,dx&=\int_{\R^n}M_r(f)^p(x)u(x)v^{r-p}(x)\,dx\\ &=\int_{\R^n}S(fv^{-1})^p(x)u(x)v^r(x)\,dx\\ &\leq C\int_{\R^n}|f(x)|^pu(x)v^{r-p}(x)\,dx\\ &=C\int_{\R^n}|f(x)|^pw(x)\,dx. \end{align*} \medskip In this paper we shall consider a wider class of maximal operators that includes the operators $M_r$, $r\geq 1$ and we prove that they satisfy an analogous inequality, under the same condition on the weights, i.e., $u,v^r\in A_1$. Concretely, we will prove the following theorem. \begin{teo}\label{teo_main} Let $r\geq 1$, $\delta\geq0$ and $\Phi(t)=t^r(1+\log^+t)^\delta$. If $u,v^r$ are $A_1$ weights and $w=1/\Phi(v^{-1})$, then there exists a positive constant $C$ such that the inequality \begin{equation}\label{eq_teo_main} uw\left(\left\{x\in \R^n: \frac{M_\Phi(fv)(x)}{v(x)}>t\right\}\right)\leq C\int_{\R^n}\Phi\left(\frac{|f(x)|v(x)}{t}\right)u(x)\,dx \end{equation} holds for every positive $t$ and every bounded function $f$ with compact support. \end{teo} By virtue of the extension of \eqref{mixta_para_M_y_T_Rn} in \cite{Li-Ombrosi-Perez} to the case $u\in A_1$ and $v\in A_\infty$, we conjecture that Theorem~\ref{teo_main} should still hold for the case $u\in A_1$ and $v^r\in A_\infty$. If the conjecture is true, we could get the result in \cite{Li-Ombrosi-Perez} for the Hardy-Littlewood maximal function by taking $\Phi(t)=t$. The remainder of the paper is organized as follows: in $\S$1 we give the preliminaries and definitions. In $\S$2 we prove certain lemmas we shall use in the proof of the main result, which is contained in $\S$3. \section{Preliminaries and basic results}\label{seccion_preliminares} Recall that a \emph{weight} $w$ is a function that is locally integrable, positive and finite in almost every $x$. Given $1<p<\infty$ we say that $w\in A_p$ if there exists a positive constant $C$ such that \[\left(\frac{1}{|Q|}\int_Qw\,dx\right)\left(\frac{1}{|Q|}\int_Qw^{1-p'}\,dx\right)^{p-1}\leq C,\] for every cube $Q\subseteq \R^n$. By a cube $Q$ we understand a cube in $\R^n$ with sides parallel to the coordinate axes. For $p=1$ we say that $w\in A_1$ if there exists a positive constant $C$ such that for every cube $Q$ \[\frac{1}{|Q|}\int_Qw\,dx\leq C\inf_Qw.\] The smallest constant $C$ for which the inequalities above hold is denoted by $[w]_{A_p}$ and called the $A_p$ constant of $w$. Finally, the $A_\infty$ class is defined as the collection of all the $A_p$ classes, that is, $A_\infty=\bigcup_{p\geq 1}A_p$. It is well known that $A_p$ classes are increasing on $p$, that is, if $p\leq q$ then $A_p\subseteq A_q$. For more details and other properties of weights see \cite{javi} or \cite{grafakos}. There are many conditions that characterize the set $A_\infty$. In this paper we will use the following one: we say that $w\in A_\infty$ if there exist positive constants $C$ and $\e$ such that, for every cube $Q\subseteq \R^n$ and every measurable set $E\subseteq Q$ the condition \[\frac{w(E)}{w(Q)}\leq C\left(\frac{|E|}{|Q|}\right)^{\e}\] holds, where $w(E)=\int_E w$. With this characterization we obtain the following result, which was previously proved in \cite{M-W-Maximal-Hilbert} for $n=1$. For the sake of completeness we include the proof. \begin{lema}\label{estimacion_lema_M-W} Let $w\in A_\infty$, $\lambda>0$ and $Q$ a cube of $\R^n$. Then, there exist positive constants $C_0$ and $\xi$ such that \[|\{w(x)>\lambda\}\cap Q|\leq C_0|Q|\left[\frac{1}{\lambda|Q|}\int_Q w(x)\,dx\right]^{1+\xi}.\] \end{lema} \begin{proof} Since $w\in A_\infty$, there exist positive constants $C$ and $\e$ such that for every cube $Q$ and every measurable set $E\subseteq Q$ \begin{equation}\label{condicion_A_infinito} \frac{w(E)}{w(Q)}\leq C\left(\frac{|E|}{|Q|}\right)^{\e}. \end{equation} Let $E_\lambda=\{w(x)>\lambda\}\cap Q$. Thus $|E_\lambda|\leq\frac{1}{\lambda}\int_{E_{\lambda}}w(x)\,dx$. By \eqref{condicion_A_infinito} we obtain \[|E_{\lambda}|\leq \frac{1}{\lambda}w(E_\lambda)\leq \frac{C}{\lambda}\left(\frac{|E_\lambda|}{|Q|}\right)^\e w(Q),\] which implies that \[|E_\lambda|\leq |Q|\left(\frac{C}{\lambda|Q|}w(Q)\right)^{1/(1-\e)}.\] Taking $\xi=1/(1-\e)-1$ and $C_0=C^{1/(1-\e)}$ the desired estimate follows. \end{proof} \begin{lema}\label{relacion_phi_con_potencia} If $\Phi(t)=t^r(1+\log^+t)^{\delta}$, for $t\geq 1$ and $\e>0$ we have that \[\Phi(t)\leq Ct^{r+\e},\] with $C=\max\{(\delta/\e)^{\delta},1\}$. \end{lema} \begin{proof} The proof of the inequality $t^r(1+\log^+t)^{\delta}\leq Ct^{r+\e}$ for $t\geq 1$ can be achieved by showing that $1\leq C^{1/\delta}t^{\e/\delta}-\log t$ holds for every $t\geq 1$. Let $f(t)=C^{1/\delta}t^{\e/\delta}-\log t$ and note that $f(1)=C^{1/\delta}\geq 1$. Then, for $t>1$, \[f'(t)=\frac{\e}{\delta}C^{1/\delta}\frac{t^{\e/\delta}}{t}-\frac{1}{t}\] and $f'(t)>0$ if and only if $t>(\delta/\e)^{\delta/\e}C^{-1/\e}$ and this inequality is always true because of the definition of $C$. So $f$ is an increasing function and the inequality above holds. \end{proof} \bigskip Given a locally integrable function $f$, the \emph{Hardy-Littlewood maximal operator} is defined by \[Mf(x)=\sup_{Q\ni x}\frac{1}{|Q|}\int_Q |f(y)|\,dy.\] We say that $\varphi:[0,\infty)\to[0,\infty]$ is a \emph{Young function} if it is convex, increasing, $\varphi(0)=0$ and $\varphi(t)\to\infty$ when $t\to\infty$. Given a Young function $\varphi$, the maximal operator $M_\varphi$ is defined, for $f\in L^1_{\textit{loc}}$, by \[M_\varphi f(x)=\sup_{Q\ni x}\norm{f}_{\varphi,Q},\] where $\norm{f}_{\varphi,Q}$ denotes the \emph{average of Luxemburg type} of the function $f$ in the cube $Q$, which is defined as follows \[\norm{f}_{\varphi,Q}=\inf\left\{\lambda>0 : \frac{1}{|Q|}\int_Q\varphi\left(\frac{|f(y)|}{\lambda}\right)\,dy\leq 1 \right\}.\] \bigskip By a \emph{dyadic grid} $\mathcal{D}$ we will understand a collection of cubes of $\R^n$ that satisfies the following properties \begin{enumerate} \item all cube $Q$ in $\mathcal{D}$ has side length $2^k$, for some $k\in\Z$, \item if $P\cap Q\neq\emptyset$ then $P\subseteq Q$ or $Q\subseteq P$, \item $\mathcal{D}_k=\{Q\in\mathcal{D}: \ell(Q)=2^k\}$ is a partition of $\R^n$ for every $k\in\Z$, where $\ell(Q)$ denotes the length of each side of $Q$. \end{enumerate} To a given dyadic grid $\mathcal{D}$ we can associate the corresponding maximal operator $M_{\varphi,\mathcal{D}}$ defined similarly as above, where the supremum is taken over all cube in $\mathcal{D}$. When $\varphi(t)=t$, we will simply denote this operator with $M_{\mathcal{D}}$. \medskip The next result will be useful in our estimates. A proof can be found in \cite{Okikiolu}. \begin{teo}\label{teo_control_diadico} There exist dyadic grids $\mathcal{D}^{(i)}$, $1\leq i\leq 3^n$ such that for every cube $Q\subseteq\R^n$ there exist $i$ and $Q_0\in \mathcal{D}^{(i)}$ such that $Q\subseteq Q_0$ and $\ell(Q_0)\leq 3\ell(Q)$. \end{teo} With this result in mind, it will be sufficient to prove Theorem~\ref{teo_main} for $M_{\Phi,\mathcal{D}}$, for a general dyadic grid $\mathcal{D}$, since \[M_{\Phi}f(x)\leq C\s{i=1}{3^n}M_{\Phi,\mathcal{D}^{(i)}}f(x).\] Indeed, fix $x\in\R^n$ and $Q$ a cube containing $x$. By Theorem~\ref{teo_control_diadico} we have a dyadic grid $\mathcal{D}^{(i)}$ and $Q_0\in \mathcal{D}^{(i)}$ with the properties above. Then, \[\frac{1}{|Q|}\int_Q \Phi\left(\frac{|f(y)|}{\norm{f}_{\Phi,Q_0}}\right)\,dy \leq\frac{|Q_0|}{|Q|}\frac{1}{|Q_0|}\int_{Q_0}\Phi\left(\frac{|f(y)|}{\norm{f}_{\Phi,Q_0}}\right)\,dy \leq 3^n,\] so \[\norm{f}_{\Phi,Q}\leq 3^n\norm{f}_{\Phi,Q_0}\leq 3^n M_{\Phi, \mathcal{D}^{(i)}}(f)(x)\leq 3^n\s{i=1}{3^n}M_{\Phi, \mathcal{D}^{(i)}}(f)(x).\] Thus, by taking supremum over all cubes $Q$ that contain $x$ we have the desired estimate. \section{Previous lemmas} In this section we will state and prove some lemmas that will be useful in the proof of our main result. \begin{lema}\label{descomposicion_de_CZ_del_espacio} Given $\lambda>0$, a bounded function with compact support $f$, a dyadic grid $\mathcal{D}$ and a Young function $\varphi$, there exists a family of dyadic cubes $\{Q_j\}_j$ of $\mathcal{D}$ that satisfies \[\{x\in\R^n: M_{\varphi,\mathcal{D}}f(x)>\lambda\}=\bigcup_j Q_j,\] and $\norm{f}_{\varphi,Q_j}>\lambda$ for every $j$. \end{lema} \begin{proof} Let $\lambda>0$ be fixed. For $k\in \Z$ we define $E_kf(x)=\s{Q\in \mathcal{D}_k}{}\norm{f}_{\varphi,Q}\mathcal{X}_Q(x)$. With this definition, we can write $M_{\varphi,\mathcal{D}}f(x)=\sup_k E_kf(x)$. Next, we consider the sets \[\Lambda_k=\{x\in\R^n: E_kf(x)>\lambda \textrm{ and } E_jf(x)\leq \lambda \textrm{ if } j>k \}.\] Then, we have that $\{x\in\R^n: M_{\varphi,\mathcal{D}}f(x)>\lambda\}=\bigcup_k \Lambda_k$. Indeed, if $x\in \{M_{\varphi,\mathcal{D}}f(x)>\lambda\}$ there exist $k\in \Z$ and $Q\in\mathcal{D}_k$ such that $\norm{f}_{\varphi,Q}>\lambda$ and this means that $E_kf(x)>\lambda$. Notice that $E_kf(x)\to 0$ when $k\to \infty$ since the Luxemburg norm $\norm{f}_{\Phi,Q}$ tends to zero when $|Q|\to\infty$, because $f$ is bounded and has compact support. Then, there exists $k_0\in\Z$ such that if $j>k_0$, $E_jf(x)\leq \lambda$. Now, if for every $i: k<i\leq k_0$ we have $E_if(x)\leq \lambda$ then $x\in \Lambda_k$. If not, let $i_0$ the biggest integer less or equal than $k_0$ for which $E_{i_0}f(x)>\lambda$. In this case, $x\in \Lambda_{i_0}$. Conversely, if $x\in \bigcup_k \Lambda_k$ there exists $k_0$ such that $x\in\Lambda_{k_0}$ and this means that $E_{k_0}f(x)>\lambda$ which yields $M_{\varphi,\mathcal{D}}f(x)>\lambda$. Finally, observe that every set $\Lambda_k$ can be written as a union of cubes of $\mathcal{D}_k$ with the desired property since, for a fixed $x\in\Lambda_k$, we have $y\in \Lambda_k$ for all $y\in Q(k)$, where $Q(k)$ is the cube in $\mathcal{D}_k$ that contains $x$. \end{proof} Notice that the way we build the sets $\Lambda_k$ ensures us that the cubes $Q_j$ are maximal in the sense of inclusion, that is, if $Q_j\subsetneq Q'$ for a fixed $j$, then $\norm{f}_{\Phi,Q'}\leq \lambda$. \medskip Throughout this paper, we will denote $\Phi(t)=t^r(1+\log^+t)^{\delta}$, with $r\geq 1$ and $\delta\geq0$. \begin{lema}\label{lema_propiedad_bk} Given a number $a>1$, for $k\in\Z$ define $b_k=1/\Phi(a^{-k})$. Then, \[a^r\leq \frac{b_{k+1}}{b_k}\leq \Phi(a),\] for every $k$. \end{lema} \begin{proof} \begin{align*} \frac{b_{k+1}}{b_k}&=\frac{a^{-rk}(1+\log^+a^{-k})^{\delta}}{a^{-r(k+1)}(1+\log^+a^{-(k+1)})^{\delta}}\\ &=a^r\left(\frac{1+\log^+a^{-k}}{1+\log^+a^{-(k+1)}}\right)^\delta=:a^r(\varphi_k(a))^{\delta}. \end{align*} Let us notice that, if $k=-1$, $\varphi_k(a)=(1+\log^+a)$. If $k\geq 0$, then $\varphi_k(a)=1$, and if $k<-1$ we have \begin{align*} 1+\log^+(a^{-k})&=1+\log^+a^{-(k+1)}a\\ &=1+\log{a^{-(k+1)}}+\log a, \end{align*} thus $\varphi_k(a)=1+\frac{\log a}{1+\log^+ a^{-(k+1)}}$. So we can deduce that \[1\leq \varphi_k(a)\leq 1+\log^+ a,\] and by raising every member to the power $\delta$ and by multiplying by $a^r$ we are done. \end{proof} We shall devote the end of this section to prove some results concerning to the following set, which is essential in the proof of our main result. For a fixed $a>1$ and for each $k\in\Z$, set \[\Omega_k=\{x\in\R^n: M_{\mathcal{D}}v(x)>a^k\}\cap\{x\in\R^n: M_{\Phi,\mathcal{D}}g(x)>a^k\},\] where $\Phi(t)=t^r(1+\log^+t)^{\delta}$, $v^r\in A_1$ and $g$ is a function that we define later in the corresponding proof. For each $k$, $\Omega_k$ can be written as the disjoint union of dyadic maximal cubes $\{Q^k_j\}_j$ contained in a dyadic grid $\mathcal{D}$. Indeed, from Lemma~\ref{descomposicion_de_CZ_del_espacio} each set can be written in that way separately. Thus, \begin{equation}\label{descomposicion_Omega_k} \Omega_k=\left(\bigcup_\ell R_\ell^k\right)\cap\left(\bigcup_i S_i^k\right)=\bigcup_{\ell,i}R_\ell^k\cap S_i^k=\bigcup_j Q_j^k, \end{equation} where $Q_j^k=S_i^k$ if $S_i^k\subset R_\ell^k$ and $Q_j^k=R_\ell^k$ otherwise, for each $(\ell,i)$ for which the intersection is nonempty. For these cubes we have that \begin{equation}\label{propiedad_cubos_para_v_sin_gamma} \frac{a^k}{[v]_{A_1}}\leq \frac{1}{[v]_{A_1}}\inf_{Q^k_j}M_\mathcal{D}v\leq \inf_{Q^k_j}v \end{equation} \medskip The next two lemmas deal with the dyadic maximal cubes $\{Q^k_j\}_j$ that decompose $\Omega_k$. \begin{lema}\label{lema_acotacion_promedios_vk} Let $k\in\Z$, $v_k(x)=\min\{v^r(x),b_{k+1}\}$ with $v\in A_1$. If $Q^\ell_j$ is a cube as in \eqref{descomposicion_Omega_k} with $\ell\geq k$ then \[\frac{b_k}{[v]_{A_1}^r}\leq \frac{1}{|Q^\ell_j|}\int_{Q^\ell_j}v_k(x)\,dx\leq b_{k+1},\] where $b_k=1/\Phi(a^{-k})$. \end{lema} \begin{proof} From the definition of $v_k$, we trivially have the second inequality. To see that the first one holds, let us consider the subsets of $Q^\ell_j$ given by $A=\{x\in Q^\ell_j: v_k(x)=v^r(x)\}$ and $B=Q^\ell_j\backslash A$. Notice that \begin{align*} \frac{1}{|Q^\ell_j|}\int_{Q^\ell_j}v_k&=\frac{1}{|Q^\ell_j|}\left[\int_A v^r+\int_B b_{k+1}\right]\\ &\geq \frac{1}{|Q^\ell_j|}\left[(\inf_{A}v^r)|A|+b_{k+1}|B|\right]\\ &\geq \frac{1}{|Q^\ell_j|}\left[(\inf_{Q^\ell_j}v^r)|A|+b_k\frac{b_{k+1}}{b_k}|B|\right]. \end{align*} From \eqref{propiedad_cubos_para_v_sin_gamma} and Lemma~\ref{lema_propiedad_bk} we have that \begin{align*} \frac{1}{|Q^\ell_j|}\int_{Q^\ell_j}v_k&\geq \frac{1}{|Q^\ell_j|}\left[\left(\frac{a^\ell}{[v]_{A_1}}\right)^r|A|+\frac{b_k}{[v]_{A_1}^r}a^r[v]_{A_1}^r|B|\right]\\ &\geq \frac{1}{|Q^\ell_j|}\left[\left(\frac{a^k}{[v]_{A_1}}\right)^r|A|+\frac{b_k}{[v]_{A_1}^r}a^r[v]_{A_1}^r|B|\right]\\ &\geq \frac{b_k}{[v]_{A_1}^r}\left[\frac{|A|+|B|}{|Q^\ell_j|}\right]=\frac{b_k}{[v]_{A_1}^r}, \end{align*} where we have used that $\ell\geq k$ and $a^{rk}\geq b_k$, because of the definition of $\Phi$. \end{proof} Let us define $\Gamma=\{(k,j): |Q^k_j\cap\{x: v(x)\leq a^{k+1}\}|>0\}$. Thus, if $(k,j)\in\Gamma$ we obtain that \begin{equation}\label{propiedad_cubos_para_v} \frac{a^k}{[v]_{A_1}}\leq \frac{1}{[v]_{A_1}}\inf_{Q^k_j}M_\mathcal{D}v\leq \inf_{Q^k_j}v\leq \frac{1}{|Q^k_j|}\int_{Q^k_j}v\leq [v]_{A_1}\inf_{Q^k_j}v\leq[v]_{A_1}a^{k+1}. \end{equation} \begin{lema}\label{lema_estimacion_para_vt} Let $Q_s^t$ be a cube such that $(t,s)\in\Gamma$, $v^r\in A_1$ and $E=Q_s^t\cap\{x: M_\mathcal{D}v(x)>a^k\}$, $k\in\Z$. Then, there exist positive constants $C>0$ and $\eta>1$ such that \[v_t(E)\leq Cv_t(Q_s^t)a^{(t-k)r\eta}.\] \end{lema} \begin{proof} Notice that $E=Q_s^t\cap\{x: (M_\mathcal{D}v(x))^r>a^{kr}\}\subseteq Q_s^t\cap\{x: v^r(x)>a^{kr}/[v]_{A_1}^r\}=:F$. Using Lemma~\ref{estimacion_lema_M-W} for $v^r\in A_1\subseteq A_\infty$, there exist $C,\e$ such that \begin{equation}\label{eq1_lema_estimacion_para_vt} |E|\leq|F|=\left|Q_s^t\cap\left\{x: v^r(x)>\left(\frac{a^k}{[v]_{A_1}}\right)^r\right\}\right|\leq C|Q_s^t|\left[\frac{1}{a^{kr}|Q_s^t|}\int_{Q_s^t}v^r(x)\,dx\right]^{1/(1-\e)}. \end{equation} Thus, given $\e$, we choose $p>1/\e$ and apply H\"{o}lder's inequality with exponents $p$ and $p'$. From the definition of $v_t$ and \eqref{eq1_lema_estimacion_para_vt} we get \begin{align*} \int_E v_t\,dx&\leq \left(\int_E v_t^p\,dx\right)^{1/p}|E|^{1/p'}\\ &\leq C b_{t+1}|Q_s^t|^{1/p}|Q_s^t|^{1/p'}\left[\frac{1}{|Q_s^t|a^{kr}}\int_{Q_s^t}v^r\,dx\right]^{1/(p'(1-\e))}. \end{align*} By using \eqref{propiedad_cubos_para_v}, Lemmas~\ref{lema_propiedad_bk} and \ref{lema_acotacion_promedios_vk} and taking $\eta=1/{p'(1-\e)}$ we have that \begin{align*} \int_E v_t\,dx&\leq C \frac{b_{t+1}}{b_t}b_t|Q_s^t|a^{(t-k)r\eta}\\ &\leq C\Phi(a)v_t(Q_s^t)a^{(t-k)r\eta}\\ &=Cv_t(Q_s^t)a^{(t-k)r\eta}. \end{align*} \end{proof} \section{Proof of the main result} We devote this section to the proof of Theorem~\ref{teo_main}. It follows similar lines as in \cite{Sawyer} but with substantial changes. Since it is quite long and have some technical calculations, for the sake of clearness we will write some claims that will be proved separately. \begin{proof}[Proof of Theorem~\ref{teo_main}] In order to prove inequality \eqref{eq_teo_main}, fix $t>0$, a dyadic grid $\mathcal{D}$ and let $g=fv/t$. Then, it will be enough to prove that \[uw\left(\left\{x\in \R^n: M_{\Phi,\mathcal{D}}(g)(x)>v(x)\right\}\right)\leq C\int_{\R^n}\Phi(g)\,u\,dx.\] We can assume, without loss of generality, that $g$ is a bounded function with compact support. Fix a number $a>\max\{2^n,L\}$, where $L$ is a quantity that will be chosen later. For every $k\in\Z$ consider the numbers $a^k$ and $b_k=1/\Phi(a^{-k})$. As we said before, the set \[\Omega_k=\{x\in\R^n: M_{\mathcal{D}}v(x)>a^k\}\cap\{x\in\R^n: M_{\Phi,\mathcal{D}}g(x)>a^k\}\] can be written as the disjoint union of dyadic maximal cubes $\{Q^k_j\}_j$, for each $k$ (see \eqref{descomposicion_Omega_k}). Let us consider the set $\Gamma=\{(k,j): |Q^k_j\cap\{x: v(x)\leq a^{k+1}\}|>0\}$. Thus, for $(k,j)\in\Gamma$ we have that \eqref{propiedad_cubos_para_v} holds. Notice also that if $A_k=\{x: a^k<v(x)\leq a^{k+1}\}$, then for each $k$ we have \begin{align*} A_k\cap\{x: M_{\Phi,\mathcal{D}}g(x)>v(x)\}&\subseteq\{x: M_\mathcal{D}v(x)>a^k\}\cap\{x: v(x)\leq a^{k+1}\}\cap\{x: M_{\Phi,\mathcal{D}}g(x)>a^k\}\\ &\subseteq\bigcup_{j: (k,j)\in \Gamma}Q^k_j, \end{align*} except for a set of measure zero. Also, if $x\in A_k$ then $b_k<w(x)\leq b_{k+1}$. Thus, we get \begin{align*} uw(\{x\in\R^n: M_{\Phi,\mathcal{D}}g>v\})&=\s{k\in\Z}{}uw(\{M_{\Phi,\mathcal{D}}g>v\}\cap A_k)\\ &\leq \s{k\in\Z}{}\frac{b_{k+1}}{b_k}b_ku(\{M_{\Phi,\mathcal{D}}g>v\}\cap A_k)\\ &\leq \Phi(a)\s{k\in\Z}{}\s{j:(k,j)\in\Gamma}{}b_ku(Q^k_j)\\ &\leq \Phi(a)[v]_{A_1}^r\s{k\in\Z}{}\s{j:(k,j)\in\Gamma}{}u(Q^k_j)\frac{v_k(Q^k_j)}{|Q^k_j|}, \end{align*} where we have used Lemmas~\ref{lema_propiedad_bk} and~\ref{lema_acotacion_promedios_vk} and \eqref{propiedad_cubos_para_v}. We fix now a negative integer $N$ and define $\Gamma_N=\{(k,j)\in \Gamma: k\geq N\}$. The objective is to prove that there exists a positive constant $C$, independent of $N$, such that \[\s{(k,j)\in\Gamma_N}{}u(Q^k_j)\frac{v_k(Q^k_j)}{|Q^k_j|}\leq C\int_{\R^n}\Phi(g)u\,dx.\] If the estimate above can be achieved, then the result follows by letting $N\to-\infty$. \medskip Let $\Delta_N=\{Q^k_j: (k,j)\in \Gamma_N\}$. Given two cubes in $\Delta_N$ they are either disjoint or one is contained in the other. Also observe that if $k>t$, $\Omega_k\subseteq \Omega_t$, so if there exist cubes $Q^k_j$, $Q_s^t$ for which $Q^k_j\cap Q_s^t\neq\emptyset$ necessarily we must have $Q^k_j\subseteq Q_s^t$. If $\eta>1$ is the constant that appears in Lemma~\ref{lema_estimacion_para_vt}, we choose $1<\alpha<\eta$ and define a sequence of sets by induction in the following way: \[G_0=\{(k,j)\in \Gamma_N: Q^k_j \textrm{ is maximal in }\Delta_N\},\] and, in a colloquial way, a pair $(k,j)$ in $\Gamma_N$ belongs to $G_{n+1}$ if the cube $Q^k_j$ has an ``ancestor'' $Q_s^t$, with $(t,s)\in G_n$, and $Q^k_j$ is the ``first descendant'' in $\Gamma_N$ satisfying $\mu(Q_j^k)>\mu(Q_s^t)$, where $\mu(Q_s^t)$ is the weighted average given by \[\mu(Q_s^t):= \frac{b_t}{a^{\alpha r t}}\frac{1}{|Q_s^t|}\int_{Q_s^t}u(x)\,dx,\] in the sense that $\mu(Q_i^\ell)\leq\mu(Q_s^t)$ for every $(\ell,i)\in\Gamma_N$ and $Q^k_j\subsetneq Q_i^\ell\subseteq Q_s^t$. That is, we define for $n\geq 0$, $G_{n+1}$ to be the set of pairs $(k,j)\in \Gamma_N$ such that there exists $(t,s)\in G_n$ with $Q_j^k\subsetneq Q_s^t$ and for which the inequalities \begin{equation}\label{desigualdad1_conjuntoGn} \frac{1}{|Q^k_j|}\int_{Q^k_j}u(x)\,dx>a^{(k-t)\alpha r} \frac{b_t}{b_k}\frac{1}{|Q_s^t|}\int_{Q_s^t}u(x)\,dx \end{equation} and \begin{equation}\label{desigualdad2_conjuntoGn} \frac{1}{|Q_i^\ell|}\int_{Q_i^\ell}u(x)\,dx\leq a^{(\ell-t)\alpha r} \frac{b_t}{b_\ell}\frac{1}{|Q_s^t|}\int_{Q_s^t}u(x)\,dx \end{equation} hold with $(\ell,i)\in\Gamma_N$ and $Q^k_j\subsetneq Q_i^\ell\subseteq Q_s^t$. Notice that if $G_{n_0}=\emptyset$ for some $n_0$, then $G_{n}=\emptyset$ for every $n\geq n_0$. Let $P=\bigcup_{n\geq 0}G_n$. If $(t,s)\in P$ we will say that the cube $Q_s^t$ is a \textit{principal cube}. \begin{afirmacion}\label{afirmacion1} There exists a positive constant $C$ such that \[\s{(k,j)\in\Gamma_N}{}\frac{1}{|Q^k_j|}v_k(Q^k_j)u(Q^k_j)\leq C \s{(k,j)\in P}{}\frac{1}{|Q^k_j|}v_k(Q^k_j)u(Q^k_j).\] \end{afirmacion} For each fixed $k\in\Z$, let us consider the disjoint collection $\{\tilde Q_i^k\}_i$ of maximal dyadic cubes given by Lemma~\ref{descomposicion_de_CZ_del_espacio}, whose union is the set $\{x\in \R^n: M_{\Phi,\mathcal{D}}g(x)>a^k\}$. Thus, for every $i$ it follows that \begin{equation a^k<\norm{g}_{\Phi,\tilde Q_i^k}, \end{equation} which is equivalent to \begin{equation}\label{propiedad_promedios_g} 1<\frac{1}{|\tilde Q_i^k|}\int_{\tilde Q_i^k}\Phi\left(\frac{g(y)}{a^k}\right)\,dy. \end{equation} Since $Q^k_j\subseteq\{x: M_{\Phi,\mathcal{D}}g(x)>a^k\}$, for each $j$ there is a unique $i=i(j,k)$ such that $Q^k_j\subseteq \tilde Q_i^k$. By Claim~\ref{afirmacion1}, Lemma~\ref{lema_acotacion_promedios_vk} and \eqref{propiedad_promedios_g} we have that \begin{align*} \s{(k,j)\in \Gamma_N}{}\frac{1}{|Q^k_j|}v_k(Q^k_j)u(Q^k_j)&\leq C\s{(k,j)\in P}{}\frac{1}{|Q^k_j|}v_k(Q^k_j)u(Q^k_j)\\ &\leq C \s{(k,j)\in P}{}\frac{b_{k+1}}{b_k}b_k\frac{u(Q^k_j)}{|\tilde Q_i^k|}\int_{\tilde Q_i^k}\Phi\left(\frac{g}{a^k}\right)\,dx. \end{align*} Since $\Phi$ is submultiplicative and from the definition of $b_k$ we obtain \begin{align*} \s{(k,j)\in \Gamma_N}{}\frac{1}{|Q^k_j|}v_k(Q^k_j)u(Q^k_j)&\leq C\s{(k,j)\in P}{}\Phi(a)\frac{1}{\Phi(a^{-k})}\Phi(a^{-k})\frac{u(Q^k_j)}{|\tilde Q_i^k|}\int_{\tilde Q_i^k}\Phi(g)\,dx\\ &=C\int_{\R^n}\left[\s{(k,j)\in P}{}\frac{1}{|\tilde Q_i^k|}u(Q^k_j)\mathcal{X}_{\tilde Q_i^k}(x)\right]\Phi(g(x))\,dx\\ &=C\int_{\R^n}h(x)\Phi(g(x))\,dx, \end{align*} where $h(x)=\s{(k,j)\in P}{}|\tilde Q_i^k|^{-1}u(Q^k_j)\mathcal{X}_{\tilde Q_i^k}(x)$. In order to finish, it only remains to show that there exists $C>0$ such that $h(x)\leq Cu(x)$. For a given $x\in \R^n$, we can assume that $u(x)<\infty$. For every fixed $k$ there exists at most one $\tilde Q_i^k$ that verifies $x\in \tilde Q_i^k$. If so, we denote it $\tilde Q^k$ and for every $k$ we define $P_k=\{(k,j)\in P: Q^k_j\subseteq \tilde Q^k\}$ and $G=\{k: P_k\neq\emptyset\}$. Recall that $k\geq N$, and therefore $G$ is bounded from below. Let $k_0$ be the smallest element in $G$. We will build a sequence in $G$ in the following way: chosen $k_m$, for $m\geq 0$ we select $k_{m+1}$ the smallest integer in $G$ greater than $k_m$ satisfying \begin{equation}\label{desigualdad1_sucesionkm} \frac{1}{|\tilde Q^{k_{m+1}}|}\int_{\tilde Q^{k_{m+1}}}u(y)\,dy>\frac{2}{|\tilde Q^{k_m}|}\int_{\tilde Q^{k_m}}u(y)\,dy. \end{equation} It is clear that, if $k_m\leq \ell< k_{m+1}$, then \begin{equation}\label{desigualdad2_sucesionkm} \frac{1}{|\tilde Q^{\ell}|}\int_{\tilde Q^{\ell}}u(y)\,dy\leq\frac{2}{|\tilde Q^{k_m}|}\int_{\tilde Q^{k_m}}u(y)\,dy. \end{equation} The sequence $\{k_m\}_{m\geq0}$ defined above has only a finite number of terms. Indeed, if it was not the case, by applying condition \eqref{desigualdad1_sucesionkm} repeatedly, we would have \[[u]_{A_1}u(x)\geq \frac{1}{|\tilde Q^{k_m}|}\int_{\tilde Q^{k_m}}u(y)\,dy>2^m\frac{1}{|\tilde Q^{k_0}|}\int_{\tilde Q^{k_0}}u(y)\,dy\] for every $m>0$, and taking limit when $m\to\infty$ we would get a contradiction. Therefore $\{k_m\}=\{k_m\}_{m=0}^{m_0}$. With this fact in mind and denoting $F_m=\{\ell\in G: k_m\leq \ell<k_{m+1}\}$ we can write \begin{align*} h(x)&=\s{(k,j)\in P}{}\frac{1}{|\tilde Q_i^k|}u(Q^k_j)\mathcal{X}_{\tilde Q_i^k}(x)\\ &=\s{(k,j)\in P}{}\frac{u(Q^k_j)}{u(\tilde Q^k)}\left(\frac{1}{|\tilde Q^k|}\int_{\tilde Q^k}u(y)\,dy\right)\\ &=\s{m=0}{m_0}\s{\ell\in F_m}{}\left(\frac{1}{|\tilde Q^\ell|}\int_{\tilde Q^\ell}u(y)\,dy\right)\s{j:(\ell,j)\in P_\ell}{}\frac{u(Q_j^\ell)}{u(\tilde Q^\ell)}\\ &\leq 2\s{m=0}{m_0}\left(\frac{1}{|\tilde Q^{k_m}|}\int_{\tilde Q^{k_m}}u(y)\,dy\right)\s{\ell\in F_m}{}\s{j: (\ell,j)\in P_\ell}{}\frac{u(Q_j^\ell)}{u(\tilde Q^\ell)}, \end{align*} where in the last inequality we have used condition \eqref{desigualdad2_sucesionkm}. \begin{afirmacion}\label{afirmacion2} There exists a positive constant $C$ such that \[\s{\ell\in F_m}{}\s{j:(\ell,j)\in P_\ell}{}\frac{u(Q_j^\ell)}{u(\tilde Q^\ell)}\leq C.\] \end{afirmacion} If this claim holds, we are done. Indeed, denoting $C_m=|\tilde Q^{k_m}|^{-1}\int_{\tilde Q^{k_m}}u$ and using the estimate above we have that \begin{align*} h(x)&\leq C\s{m=0}{m_0}C_m\leq C\s{m=0}{m_0} C_{m_0}2^{m-m_0}\\ &= CC_{m_0}2^{-m_0}\s{m=0}{m_0}2^m=CC_{m_0}2^{-m_0}(2^{m_0+1}-1)\\ &\leq CC_{m_0}\leq C[u]_{A_1}u(x). \end{align*} \end{proof} In order to conclude, we prove Claim~\ref{afirmacion1} and \ref{afirmacion2}. \bigskip \begin{proof}[Proof of Claim~\ref{afirmacion1}] Fix $(t,s)\in P$ and define \[ I(t,s)=\{(k,j)\in \Gamma_N: Q^k_j\subseteq Q_s^t \textrm{ and $Q_s^t$ is the smallest principal cube that contains } Q^k_j\}.\] Particularly, every $Q^k_j$ with $(k,j)\in I(t,s)$ is not principal, unless $(k,j)=(t,s)$. From condition \eqref{desigualdad2_conjuntoGn} we can write \[\s{(k,j)\in I(t,s)}{}\frac{v_k(Q^k_j)}{|Q^k_j|}u(Q^k_j)\leq \s{(k,j)\in I(t,s)}{}a^{(k-t)\alpha r}\frac{b_t}{b_k}\frac{u(Q_s^t)}{|Q_s^t|}\frac{v_k(Q^k_j)}{v_t(Q^k_j)}v_t(Q^k_j).\] From Lemma~\ref{lema_acotacion_promedios_vk} with $k>t$ we have that \[\frac{v_k(Q^k_j)}{v_t(Q^k_j)}\leq [v]_{A_1}^r\frac{b_{k+1}}{b_t}\leq [v]_{A_1}^r\Phi(a)\frac{b_k}{b_t},\] so we can write \begin{align*} \s{(k,j)\in I(t,s)}{}\frac{v_k(Q^k_j)}{|Q^k_j|}u(Q^k_j)& \leq\Phi(a)[v]_{A_1}^r\frac{u(Q_s^t)}{|Q_s^t|}\s{(k,j)\in I(t,s)}{}a^{(k-t)\alpha r}\frac{b_t}{b_k}\frac{b_k}{b_t}v_t(Q^k_j)\\ &\leq \Phi(a)[v]_{A_1}^r \frac{u(Q_s^t)}{|Q_s^t|}\s{(k,j)\in I(t,s)}{}a^{(k-t)\alpha r}v_t(Q_s^t\cap\{x: M_{\mathcal{D}}v(x)>a^k\}). \end{align*} From Lemma~\ref{lema_estimacion_para_vt}, \begin{align*} \s{(k,j)\in I(t,s)}{}\frac{v_k(Q^k_j)}{|Q^k_j|}u(Q^k_j)&\leq C\Phi(a)[v]_{A_1}^r\frac{u(Q_s^t)}{|Q_s^t|}\s{(k,j)\in I(t,s)}{}a^{(k-t)\alpha r}v_t(Q_s^t)a^{(t-k)r\eta}\\ &\leq C\Phi(a)[v]_{A_1}^r\frac{u(Q_s^t)}{|Q_s^t|}v_t(Q_s^t)\s{k\geq t}{}a^{(t-k)r(\eta-\alpha)}\\ &\leq C\Phi(a)[v]_{A_1}^r\frac{u(Q_s^t)}{|Q_s^t|}v_t(Q_s^t), \end{align*} since $\eta-\alpha>0$ and $a>2^n>1$. Thus, we have obtained that \[\s{(k,j)\in I(t,s)}{}\frac{v_k(Q^k_j)}{|Q^k_j|}u(Q^k_j)\leq C\Phi(a)[v]_{A_1}^r\frac{u(Q_s^t)}{|Q_s^t|}v_t(Q_s^t),\] and if we sum over all $(t,s)\in P$ it follows that \[\s{(k,j)\in \Gamma_N}{}\frac{v_k(Q^k_j)}{|Q^k_j|}u(Q^k_j)\leq\s{(t,s)\in P}{}\s{(k,j)\in I(t,s)}{}\frac{v_k(Q^k_j)}{|Q^k_j|}u(Q^k_j)\leq C\s{(t,s)\in P}{}\frac{v_k(Q_s^t)}{|Q_s^t|}u(Q_s^t).\] \end{proof} \bigskip \begin{proof}[Proof of Claim~\ref{afirmacion2}] Assume for the moment that there exists a positive number $\gamma$ such that if $(\ell,j)\in P_\ell$ and $k_m\leq \ell<k_{m+1}$ then \begin{equation}\label{ec1_demo_afirmacion2} \frac{1}{|Q_j^\ell|}\int_{Q_j^\ell}u(y)\,dy>\frac{a^{(\ell-k_m)\gamma}}{2[u]_{A_1}}\frac{1}{|\tilde Q^\ell|}\int_{\tilde Q^\ell}u(y)\,dy. \end{equation} Then, if $y\in Q_j^\ell$, \begin{align*} u(y)[u]_{A_1}&\geq\frac{1}{|Q_j^\ell|}\int_{Q_j^\ell}u(z)\,dz\\ &>\frac{a^{(\ell-k_m)\gamma}}{2[u]_{A_1}}\frac{1}{|\tilde Q^\ell|}\int_{\tilde Q^\ell}u(y)\,dy \end{align*} and thus, \[u(y)>\frac{a^{(\ell-k_m)\gamma}}{2[u]_{A_1}^2}\frac{u(\tilde Q^\ell)}{|\tilde Q^\ell|}=:\lambda,\] which implies that \[\bigcup_{j:(\ell,j)\in P_\ell}Q_j^\ell\subseteq\{x\in \tilde Q^\ell: u(x)>\lambda\}.\] Since $u\in A_1\subseteq A_{\infty}$, there exist positive constants $C$ and $\nu$ for which $\frac{u(E)}{u(Q)}\leq C\left(\frac{|E|}{|Q|}\right)^{\nu}$ holds, for every measurable $E\subseteq Q$. So, by Chebyshev's inequality and the definition of $\lambda$ we have \begin{align*} \s{j:(\ell,j)\in P_\ell}{}u(Q_j^\ell)&=u\left(\bigcup_{j:(\ell,j)\in P_\ell} Q_j^\ell\right)\\ &\leq u(\{x\in \tilde Q^\ell: u(x)>\lambda\})\\ &\leq Cu(\tilde Q^\ell)\left(\frac{|\{x\in \tilde Q^\ell: u(x)>\lambda\}|}{|\tilde Q^\ell|}\right)^{\nu}\\ &\leq Cu(\tilde Q^\ell)\left(\frac{1}{\lambda|\tilde Q^\ell|}\int_{\tilde Q^\ell}u(y)\,dy\right)^{\nu}\\ &=Cu(\tilde Q^\ell)a^{(k_m-\ell)\gamma\nu}, \end{align*} and finally \begin{align*} \s{\ell\in F_m}{}\s{j:(\ell,j)\in P_\ell}{}\frac{u(Q_j^\ell)}{u(\tilde Q^\ell)}&\leq C\s{\ell\in F_m}{}a^{(k_m-\ell)\gamma\nu}\\ &\leq C\s{\ell\geq k_m}{}a^{(k_m-\ell)\gamma\nu}=C, \end{align*} since $a>1$. This gives us the so desired proof. \bigskip We now prove that~\eqref{ec1_demo_afirmacion2} actually holds. Pick $(\ell,j)\in P_\ell$ with $k_m\leq \ell<k_{m+1}$. Since $\Omega_\ell\subseteq \Omega_{k_m}$, by maximality there exists a unique $s$ such that $Q_j^\ell\subseteq Q_s^{k_m}$. We want to see that $(k_m,s)\in \Gamma_N$. If $(k_m,s)\in P$ we are done since $P\subseteq \Gamma_N$. Then, let us assume that $(k_m,s)\not\in P$. From the definition of $G$ and $P_{k_m}$, $\tilde Q^{k_m}$ contains a cube $Q_p^{k_m}$ with $(k_m,p)\in P$. We shall see, as a first step, that $Q_s^{k_m}\subsetneq \tilde Q^{k_m}$. Indeed, there exists a unique $i(s)$ such that $Q_j^\ell\subseteq Q_s^{k_m}\subseteq \tilde Q_{i(s)}^{k_m}$. Also, \[\left\{x: M_{\Phi,\mathcal{D}}g(x)>a^\ell\right\}\subseteq \left\{x: M_{\Phi,\mathcal{D}}g(x)>a^{k_m}\right\}=\bigcup_i \tilde Q_i^{k_m},\] so there exists a unique $i_0$ such that $Q_j^\ell \subseteq \tilde Q^\ell\subseteq \tilde Q_{i_0}^{k_m}$. Besides, from the definition of $\tilde Q^k$, $x\in \tilde Q^{k_m}$ and $x\in \tilde Q_{i_0}^{k_m}$ so we must have \[\tilde Q_{i(s)}^{k_m}=\tilde Q_{i_0}^{k_m}=\tilde Q^{k_m},\] which directly implies $Q_s^{k_m}\subseteq \tilde Q^{k_m}$. In fact, this inclusion is proper since both $Q_s^{k_m}$ and $Q_p^{k_m}$ are contained in $\tilde Q^{k_m}$ and $s\neq p$. Now observe that $\tilde Q^{k_m}$ is a maximal cube of the set $\{x: M_{\Phi,\mathcal{D}}g(x)>a^{k_m}\}$ and $Q_s^{k_m}$ is a maximal cube of \[\Omega_{k_m}=\{x\in\R^n: M_{\mathcal{D}}v(x)>a^{k_m}\}\cap\{x\in\R^n: M_{\Phi,\mathcal{D}}g(x)>a^{k_m}\},\] and since $Q_s^{k_m}\subsetneq \tilde Q^{k_m}$ it follows that $Q_s^{k_m}$ is a maximal dyadic cube of $\{x: M_{\mathcal{D}}v(x)>a^{k_m}\}$. Thus \begin{equation}\label{ec2_demo_afirmacion2} \frac{1}{|Q_s^{k_m}|}\int_{Q_s^{k_m}}v(y)\,dy\leq 2^na^{k_m}\leq a^{k_m+1}, \end{equation} so that $|Q_s^{k_m}\cap\{x:v(x)\leq a^{k_m+1}\}|>0$. Indeed, if not, denoting $E=Q_s^{k_m}\cap\{x: v(x)>a^{k_m+1}\}$ we would have \[\frac{1}{|Q_s^{k_m}|}\int_{Q_s^{k_m}}v(y)\,dy=\frac{1}{|E|}\int_{Q_s^{k_m}}v(y)\,dy>\frac{1}{|E|}\int_E v(y)\,dy>a^{k_m+1},\] which contradicts~\eqref{ec2_demo_afirmacion2}. Therefore, $(k_m,s)\in \Gamma_N$ and $Q_s^{k_m}$ is contained in, at least, one principal cube. Let $Q_{\sigma}^k$ the smallest principal cube that contains $Q_s^{k_m}$. By using conditions~\eqref{desigualdad1_conjuntoGn} and~\eqref{desigualdad2_conjuntoGn} we can write \[\frac{1}{|Q_j^\ell|}\int_{Q_j^\ell}u(y)\,dy>a^{(\ell-k)\alpha r}\frac{b_k}{b_\ell}\frac{1}{|Q_\sigma^k|}\int_{Q_\sigma^k}u(y)\,dy\geq a^{(\ell-k_m)\alpha r}\frac{b_{k_m}}{b_\ell}\frac{1}{|Q_s^{k_m}|}\int_{Q_s^{k_m}}u(y)\,dy\] Also, from \eqref{desigualdad2_sucesionkm} \[\frac{1}{|\tilde Q^\ell|}\int_{\tilde Q^\ell}u(y)\,dy\leq \frac{2}{|\tilde Q^{k_m}|}\int_{\tilde Q^{k_m}}u(y)\,dy\leq 2[u]_{A_1}\inf_{\tilde Q^{k_m}}u\leq2[u]_{A_1}\frac{1}{|Q_s^{k_m}|}\int_{Q_s^{k_m}}u(y)\,dy.\] With these two inequalities we obtain the following estimate \begin{align*} \frac{1}{|Q_j^\ell|}\int_{Q_j^\ell}u(y)\,dy&>a^{(\ell-k)\alpha r}\frac{b_k}{b_\ell}\frac{b_{k_m}}{b_k}a^{(k-k_m)\alpha r}\frac{1}{|Q_s^{k_m}|}\int_{Q_s^{k_m}}u(y)\,dy\\ &=a^{(\ell-k_m)\alpha r}\frac{b_{k_m}}{b_\ell}\frac{1}{|Q_s^{k_m}|}\int_{Q_s^{k_m}}u(y)\,dy\\ &>\frac{1}{2[u]_{A_1}}\frac{a^{(\ell-k_m)\alpha r}}{(\Phi(a))^{\ell-k_m}}\frac{1}{|\tilde Q^\ell|}\int_{\tilde Q^\ell}u(y)\,dy, \end{align*} by Lemma~\ref{lema_propiedad_bk}. We now apply Lemma~\ref{relacion_phi_con_potencia} with $0<\beta<r(\alpha-1)$. So, for $t\geq 1$ we have that $\Phi(t)\leq C_0t^{r+\beta}$. Thus, \[\frac{1}{|Q_j^\ell|}\int_{Q_j^\ell}u(y)\,dy>\frac{1}{2[u]_{A_1}}\frac{a^{(\ell-k_m)(\alpha r-r-\beta)}}{C_0^{\ell-km}}\frac{1}{|\tilde Q^\ell|}\int_{\tilde Q^\ell}u(y)\,dy.\] Recalling that $a>\max\{2^n,L\}$, if $\delta>0$ then $a^{\alpha r-r-\beta}/C_0>1$ by choosing $L=(\delta/\beta)^{\delta/(r(\alpha-1)-\beta)}$. Indeed, if $C_0=1$ the previous inequality trivially holds. If not, $C_0=(\delta/\beta)^{\delta}$ and the inequality holds if and only if $a>(\delta/\beta)^{\delta/(r(\alpha-1)-\beta)}$. So, if we denote $\theta=a^{\alpha r-r-\beta}/C_0$ then we can take $\gamma=\log_a\theta$ in \eqref{ec1_demo_afirmacion2}. If $\delta=0$, then $\Phi(t)=t^r$ and $a^{(\ell-k_m)\alpha r}/a^{(\ell-k_m)r}=a^{(\ell-k_m)(\alpha-1)r}$ and in this case we can take $\gamma=(\alpha-1)r$, and \eqref{ec1_demo_afirmacion2} is proved. \end{proof} \medskip \section*{Acknowledgments} This paper is a constitutive part of my doctoral thesis, under the direction of Ph. D. Gladis Pradolini and Ph. D. Marilina Carena. I would like to specially thank to both of them for reading this manuscript and suggest me adequate changes in notation and redaction. \providecommand{\bysame}{\leavevmode\hbox to3em{\hrulefill}\thinspace} \providecommand{\MR}{\relax\ifhmode\unskip\space\fi MR } \providecommand{\MRhref}[2] \href{http://www.ams.org/mathscinet-getitem?mr=#1}{#2} } \providecommand{\href}[2]{#2}
\section{Introduction} In medical image processing, we often deal with problems where the images are challenging to analyze due to their low quality and only a limited training dataset is available. In these cases it can be helpful to incorporate prior knowledge. Examples are localization problems where the objects can be approximated by a simple geometrical shape or a statistical model. That is the case for X-ray images of the femur (thigh bone), which is the main focus of this paper. Localizing the femur in an X-ray image is helpful for many medical applications~\cite{Tian2003,Tannast2007,Wang2011,Sutter2012,Bojan2013,Regling2014,Lindner2015} to identify pathologies or assist during surgery. To do that, an algorithm needs to identify the anatomical parts of the bone. In the case of the femur that could be the precise location of the femoral head, the greater trochanter, etc. X-rays taken intraoperatively are often fluoroscopic X-rays in order to limit the radiation exposure of surgeons and operating room staff. Fluoroscopic X-rays are taken with a comparatively low radiation dose, which results in low SNR and contrast (see~\autoref{fig:example_image}), making their automatic processing challenging. The scans are often made with so-called C-arms, which can be easily repositioned and rotated during the surgery. However, this also means that the images do not have a standardized appearance. In particular, scale, image-plane rotation, viewing angle, and contrast/brightness vary in a wide range and increase the search space for the object detection. During surgery, the femur is furthermore often occluded by implants and surgical tools, as shown in \autoref{fig:example_image}.% \begin{figure}[tb] \centering \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[width=\textwidth]{example_image.png} \end{subfigure}% \quad \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[width=\textwidth]{example_image2} \end{subfigure} \caption{Fluoroscopic X-ray images with different contrast showing the femur. The black border is due to the disk-shaped detector of the C-arm. The right image also shows an implant.}% \label{fig:example_image} \end{figure} Algorithms for the detection of the femur were already proposed for different 3D modalities such as MRI (\cite{Deniz2017}), CT (\cite{Krcah2011}), and 2D radiographic X-rays (\cite{Behiels2002,Chen2005,Gamage2010,Lindner2013,Xie2014}). Detectors for parts of the femur in fluoroscopic X-rays were presented in~\cite{Dong2009,Gamage2010,Wang2011,Eguizabal2017}. In this paper, we develop a new approach that uses deep learning combined with prior information about the shape of the bone. We will use fluoroscopic X-ray images for our evaluation, but our approach can be applied to other 2D and 3D modalities as well. A classical solution to localize anatomical points on a contour is the \ac{ASM} algorithm~\cite{Cootes1992a}. For the \ac{ASM} algorithm, the variation of the outline and the gray-level appearances near the outline are learned from training data. However, the standard \ac{ASM} only employs a low-capacity model and fluoroscopic X-ray images have a low SNR, which means that simple models of the appearance are not sufficient for an accurate localization. Similar to the techniques in~\cite{Cheng2016, Cheng2017,Zadeh2017} a more complex patch-based neural network can be used for a refinement step. However, such an approach is inherently slow, and in~\cite{Cheng2017}, the authors report a computation time of 8 minutes.% The state of the art for localizing the femur in \emph{radiographic} (i.e., higher-dose and thus higher-quality) X-rays uses random forests, which can achieve high capacity, and combines them with constrained local models~\cite{Lindner2013}. However, the random forests are used in a part of the algorithm where they have a strong impact on runtime. An end-to-end solution to predict the coordinates of anatomical points with a neural network usually requires many training images and thus does not work for many medical imaging applications. Pixel-wise segmentation networks, on the other hand, have been shown to work well even with limited amounts of training data~\cite{Ronneberger2015,Long2015}. They can be used to find the outline of objects, but they do not label particular points on the outline. Instead, we propose to fit the geometrical or statistical representation of the model to the output of a segmentation network, a process we call \emph{deep morphing}. This allows us to localize the objects as well as labeling specific points on their outline. Segmentation networks perform pixel-wise classification, typically by means of a series of convolution layers, downsampling, and upsampling operations. In the case of a single (foreground) class, the last operation in the network is a sigmoid activation function. The activation value is a measure of confidence for the presence of the foreground class, as shown in \autoref{fig:simulated_with_gt}, which can be thresholded for a hard assignment. \begin{figure}[tb] \centering \begin{subfigure}[t]{0.65\textwidth} \centering\includegraphics[height=4cm]{simulated_with_gt} \end{subfigure}% \quad \begin{subfigure}[t]{0.32\textwidth} \centering\includegraphics[height=4cm]{prediction_of_simulated} \end{subfigure} \caption{Simulated C-arm image of the proximal part of the femur (left), the true outline overlaid in yellow (middle), and the prediction of a trained segmentation network (right).}% \label{fig:simulated_with_gt} \end{figure} The outline of this paper is as follows. In \autoref{sec:head} we introduce the first problem, where we localize the femoral head, and in \autoref{sec:femur} we discuss the problem of localizing keypoints on the entire femur. In \autoref{sec:evaluation} we evaluate the performance of our proposed solutions on a dataset of fluoroscopic X-ray images. Since the number of images in our dataset is relatively small, we train our networks with simulated images, which is explained in the appendix. % \section{Detecting the femoral head}% \label{sec:head} In this section, we focus on the detection of the femoral head, which is the part of the femur that meets the pelvis. This specific part of the femur is frequently of interest in medical applications~\cite{Tannast2007,Wang2011,Sutter2012,Bojan2013,Regling2014}. The femoral head is roughly spherical~\cite{Hammond1967,Petersik2011}, and in 2D X-ray images its contour is frequently approximated by a circle~\cite{Sutter2012, Tannast2007}. Thus we are interested in the center coordinates $\mu_x$ and $\mu_y$, and the radius $r$. % A straightforward solution to this problem using a DNN is a regression network that estimates the circle parameters \( \bm\theta = {[\mu_x, \mu_y, r]}^T \) and is trained to minimize the cost function \begin{equation} \|\bm\theta - \hat{\bm\theta} \|^2. \label{mse} \end{equation} This is similar to the localization through bounding-box regression used, for example, in~\cite{Simonyan2014}. A second solution to this problem is an R-CNN approach~\cite{Ren2015a}, where one network proposes regions of interest and another network classifies them and predicts a bounding box. Such a solution was employed in~\cite{He2015} for a localization problem with many classes. In our case, we know that exactly one instance of a femoral head will be visible. Hence we are interested in a different approach for the localization of the femoral head. We propose the following two-stage approach: First, a segmentation network predicts the outline of the femoral head. Given the 2D output $O(x,y)$ of the the first stage at (pixel) locations $x$ and $y$, we then identify the set of foreground pixels \begin{equation} P_\mathrm{fg} = \{(x, y) \mid O(x, y) > 0.5 \} \label{P_fg} \end{equation} and solve the following nonlinear least-squares fit of the geometric distances~\cite{Gander1994}: \begin{equation} \min_{\mu_x, \mu_y, r} \sum _{(x,y) \in P_\mathrm{fg} } {\left(\sqrt{ {(\mu_x - x)}^2 + {(\mu_y - y)}^2} - r \right)}^2. \label{geometric_fit} \end{equation} To avoid an iterative solution, we can also parameterize the circle as $x^2 + y^2 + Bx + Cy + D$ and minimize the \emph{algebraic} distance~\cite{Chernov2005}: \begin{equation} \min_{B, C, D} \sum _{(x,y) \in P_\mathrm{fg} } {\left(x^2 + y^2 + Bx + Cy + D\right)}^2. \label{algebraic_fit} \end{equation} For this problem, a closed-form solution exists~\cite{Chernov2005}. This approach can easily be generalized to other contours in 2D or surfaces in 3D by replacing the cost function of the second stage to reflect the object of interest. This could be useful for example % for glaucoma screening, where the optic disc in fundus images can be approximated by an ellipse~\cite{Fu2018}. Our approach can also be used to localize the femoral head in 3D CT scans, by performing a 3D segmentation followed by a fit of a sphere. % \section{Detecting the entire proximal femur}% \label{sec:femur} In this section, our goal is to identify the contour of the femur and to label its anatomical parts. Algorithms for such a task can be classified into general \emph{keypoint localization} algorithms, where the spatial relationship between keypoints is often modeled implicitly, and approaches that use \acp{SSM}. Many variations for both types of algorithms have been presented for problems like face recognition, human pose estimation, and the detection of bodily organs in medical imaging. % Here, we are interested in a novel combination of \acp{SSM} and deep learning that allows a fast and accurate detection of the proximal femur. A simple instance of an \ac{SSM} is a model that captures the distribution of the location of specific points on the shape, i.e\ a \ac{PDM}. In its typical formulation (\cite{Cootes1992}), a $2N$-dimensional vector is constructed with the coordinates of the $N$ points: \( \mathbf{x} = {[x_1, y_1,\ \dots, x_N, y_N]}^T \). These points are then approximated by the linear model \begin{align} \mathbf{x} & \approx \bar{\mathbf{x}} + \sum_{i=1}^{M} \mathbf{p}_i b_i,\quad \mathrm{with} \\ b_i & = \mathbf{p}_i^T(\mathbf{x} - \bar{\mathbf{x}}), \end{align} where $\bar{\mathbf{x}}$ is the sample mean of $\mathbf{x}$ and the $\mathbf{p}_i$'s are the orthonormal eigenvectors of the sample covariance matrix of $\mathbf{x}$, sorted by decreasing eigenvalues $\lambda_i$. The $\mathbf{p}_i$'s can be interpreted as the modes of the shape, and the $b_i$'s measure the strength of the modes. For $M=2N$, the approximation becomes exact, but in practice not all modes are used to avoid overfitting the training dataset. Choosing $M$ such that a sufficiently large fraction of the variance is retained works well in practice~\cite{Cootes1995}. Alternatively, $M$ can be chosen automatically based on information-theoretic criteria~\cite{Davies2002,Eguizabal2018}. This \ac{PDM} also allows for regularization of shapes which are \enquote{far} away from the distribution observed in the training phase. In such a case some $b_i$'s are typically large in magnitude, and the reconstruction can be regularized, for example by clipping them to \( \pm 3 \sqrt \lambda_i\)~\cite{Cootes1992}. A \ac{PDM} is typically fit to a shape observed in an image with the \ac{ASM}~\cite{Cootes1992a} algorithm or one of its variants. Given an initial position of the shape, these algorithms iteratively fit the shape model to the image by first moving the current points to points on the desired outline based on the information in the image. Then these points are constrained to conform to the typical variations observed in the training data of the \ac{PDM}. These two steps are repeated until convergence. In preliminary tests, we experimented with a two-class segmentation network that predicts whether or not a pixel is a boundary pixel of the femur. We observed that such a network is indeed able to identify the entire contour of the femur in low-dose X-ray images. Hence we propose to use a segmentation network as a first stage. Next, we initialize and fit an \ac{PDM} to the \emph{output map} of the network. We will now explain these steps in more detail. \subsection{Initialization of the \ac{PDM}} The \ac{ASM} algorithm relies on an initial placement of the mean shape in the image. Without prior information, this is quite difficult in fluoroscopic X-ray images since they can be arbitrarily rotated and have a low SNR and contrast.\ If a segmentation network is able to identify the contour as shown in \autoref{fig:simulated_with_gt}, this can be simplified. As a first step, the coordinates of the mean shape of the \ac{PDM} need to be scaled, rotated, and shifted such that they are close to the shape observed in the image. The segmentation network yields a probability map for the outline of the bone. However, it does not indicate which points on the outline correspond to particular points of the \ac{PDM}. Hence we need to simultaneously find the corresponding points on the observed shape and a rigid transformation. This can be achieved with the \ac{CPD} algorithm~\cite{Myronenko2010}. \ac{CPD} finds a transformation $\mathcal{T}$ of the points of the mean shape $(x_n, y_n)$, and estimates the posterior probability $p(n \mid \tilde{x}_m, \tilde{y}_m )$ of the $n$th transformed point of the mean shape given the observed point $(\tilde{x}_m, \tilde{y}_m) \in P_\mathrm{fg}$, as defined in~\eqref{P_fg}. To initialize the \ac{PDM} with \(\mathbf{x}_\mathrm{init} = [\bar{x}_1, \bar{y}_1, \dots, \bar{x}_N, \bar{y}_N]^T\), we thus use the transformed points of the mean shape: \begin{equation} (\bar{x}_n, \bar{y}_n) = \mathcal{T}(x_n, y_n). \end{equation} An example can be seen in \autoref{fig:prediction_with_fit}. These initial points will not match the points from the segmentation network. This initial shape is then fit to the contour of the segmentation network such that we reach a good tradeoff between fitting the observed data and staying close to shape variations observed in the training data. This will be described in \autoref{sec:fit}. \begin{figure}[tb] \centering \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[height=5cm]{prediction_with_fit} \caption{Initialization of the model: Prediction of a DNN with the mean shape fitted to the foreground pixels.}% \label{fig:prediction_with_fit} \end{subfigure}% \quad \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[height=5cm]{update} \caption{Update along lines orthogonal to the current shape.}% \label{fig:update} \end{subfigure} \caption{Steps during the shape model fit.} \end{figure} One final comment on the robustness of this initialization is in order: The \ac{CPD} algorithm breaks down if one point cloud is rotated too much~\cite{Myronenko2010}. This can be dealt with by performing the registration with differently rotated versions and choosing the best match. The same applies if one of the point clouds is reflected. \subsection{Fitting the shape model}% \label{sec:fit} In the \ac{ASM} algorithm~\cite{Cootes1992a}, the shape model is updated by finding better points on lines orthogonal to the current shape. This is done by comparing the observed gray-level profile on the orthogonal line with those observed in the training data. But since our images have such low SNR, local gray-level information is not very discriminative. Hence we do not update the shape model based on the original image but instead fit it to the output of the segmentation network. More precisely, we use the two-dimensional output of the last sigmoid-layer, i.e.\ \emph{before} applying thresholding for classification. This output measures the confidence of the network and thus contains more information that can be exploited for fitting. Given a segmentation with an initial placement of the mean shape, we update the points of the shape with the position of the maximum confidence along the orthogonal lines of the shape (\autoref{fig:update}). This is followed by the constraint of the shape (\autoref{fig:constraint}). These steps are then repeated for a few iterations. \begin{figure} \centering \includegraphics[width=0.5\textwidth]{irregularity} \caption{Irregular shape in a region of low confidence. Such a shape can be regularized with the \ac{PDM} constraint.}% \label{fig:constraint} \end{figure} % \section{Evaluation}% \label{sec:evaluation} We have an in-house dataset of 211 fluoroscopic X-rays from Klinikum Augsburg, showing the proximal part of the femur. These X-rays are taken intraoperatively during surgeries treating hip fractures, hence many of them contain surgical tools and implants. The number of images in our database is insufficient to train neural networks, thus we will only evaluate our algorithms on this data and use simulated data for training (\autoref{sec:simulator}). For the network architecture, we choose the FusionNet~\cite{Quan2016}, which is a variant of the U-Net~\cite{Ronneberger2015} but with residual connections. % During training we rely on augmentation to control overfitting: We use random rotations of up to 360°, reflections, additive spatially colored noise, and gamma transformations. We furthermore block square regions in the training images, which is a simple model for the occlusions by implants and tools in the real X-ray images in our database. The networks are trained with a cross-entropy loss for 80 epochs, and the learning rate is decayed by a factor of $0.1$ after 60 epochs. We are interested both in detecting only the femoral head (which for some applications is all that is needed) and in detecting the entire outline of the femur. We now evaluate the performance of our deep-morphing approaches presented in Sections~\ref{sec:head} and~\ref{sec:femur}. \subsection{Femoral head detection} We first consider the detection of the femoral head (see \autoref{sec:head}). Since it is located inside the pelvis, the femoral head is particularly difficult to identify in fluoroscopic X-ray images. We annotated the femoral heads in our dataset, and the average time of $\SI{54}{\second}$ per circle-annotation shows how difficult this problem is. We trained a segmentation network to predict the outline of the femoral head region in simulated images. Because we derive the ground truth from the simulated data, the target outline does not resemble a perfect arc. In other scenarios, the target map could consist of the points on a circle or an arc, which requires less manual annotation compared to a pixel-wise outline. For evaluation, we predict the outline with the trained network and fit the circle to the outline as proposed in \autoref{sec:head}. Given a bigger dataset of real X-ray images, this procedure could also include fine-tuning the network to improve generalization. In our case, the two-stage approach generalizes quite well on real images, especially when there are no occlusions by tools or implants. In that case, the RMSE, defined as \(\|\bm\theta - \hat{\bm\theta} \|\), is 3.8 pixels on average for both the geometric~\eqref{geometric_fit} and the algebraic fit~\eqref{algebraic_fit} when working with images of size 448 $\times$ 448.\footnote{For our problem, the algebraic and geometric fits usually yield very similar results, so we choose the algebraic fit because it is faster.} An example of such a segmentation is shown in \autoref{fig:correct_circle}. If there are implants visible in the X-ray image, the segmentation network tends to predict fewer foreground pixels. As a result, the fitted circles become less accurate, as shown for example in \autoref{fig:incorrect_tools}. In some cases, the network predicts very few circle pixels and the fitted circles become very inaccurate. However, we can avoid many incorrect detections by requiring a certain number (for example 100) of foreground pixels to be predicted. Then the average RMSE on images with occlusions by tools is 8.5 pixels, but fine-tuning on real images with occlusions should help close this gap. \begin{figure}[tb] \centering \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[width=\textwidth]{correct_circle} \caption{Estimated circle is nearly identical to the ground truth.}% \label{fig:correct_circle} \end{subfigure}% \quad \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[width=\textwidth]{incorrect_tools} \caption{Tools and implants are visible and lead to an inaccurate circle.}% \label{fig:incorrect_tools} \end{subfigure} \caption{Examples of femoral head detections.} \end{figure} \subsection{Proximal femur detection} We now consider the detection of the entire proximal femur (see~\autoref{sec:femur}). We do not have a dataset of real X-ray images with manually labeled \emph{landmarks}, hence we derived a 2D \ac{PDM} from a 3D surface model of the bone. An example of a real image with a fitted shape model is shown in \autoref{fig:fit_real_data}. Overall, the outline is found very accurately, except for the femoral neck region where the network prediction is ambiguous. The PDM ends up too far outside of the bone in that region, but the overall point-to-curve RMSE for a manual segmentation is still quite low with a value of $2.3$ pixels.\footnote{Since a manual annotation of points outside of the circular beam cone is not well defined, we only compute the RMSE for points inside.} In \autoref{fig:fit_real_data2}, the average point-to-curve RMSE between the predicted points and a manual segmentation of the outline is $1.6$ pixels. Here, most parts are found very accurately. In images without occlusions by tools or implants (which we have not simulated yet in our training data), the network generalizes very well and is capable of identifying the outline. Since our 2D \ac{PDM} is a model that includes a large part of the shaft, fitting can fail when the image only shows the part of the femur without the shaft. For problems where a large model is not of interest, a shorter \ac{PDM} could be used instead. In images with occlusions, the network does not generalize as well as in the case of detecting the femoral head because the implants typically occlude large portions of the greater trochanter and the bone marrow. \begin{figure}[tb] \centering \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[width=\textwidth]{fit_real_data} \caption{}% \label{fig:fit_real_data} \end{subfigure}% \quad \begin{subfigure}[t]{0.48\textwidth} \centering\includegraphics[width=\textwidth]{fit_real_data2} \caption{}% \label{fig:fit_real_data2} \end{subfigure} \caption{Final results of fitting a shape model to the output of a segmentation network. Our model also identifies the correspondences to anatomical parts. An example is the yellow $\times$, which represents the lesser trochanter.} \end{figure} % \section{Conclusion} We have presented two-stage approaches called deep morphing to localize objects with geometrical or statistical prior knowledge. In the case of geometrical information, the model itself is very simple, which means that the manual labeling effort is quite low. Still, a simple geometrical model of a circular outline is expressive enough to solve the problem of localizing the femoral head in fluoroscopic X-ray images. If more expressive power is required, the object can be described by a statistical model, which can be fit directly to the outline predicted by a segmentation network. As in~\cite{Unberath2018}, we also demonstrated the feasibility of training the networks on a dataset of simulated X-ray images. This allows us to circumvent the problem of limited datasets in medical image processing. To some extent, the networks generalize to real X-ray images, although effects that were not simulated (e.g.\ surgical tools) are problematic. Apart from including tools and implants in the simulated X-rays, this could also be alleviated by either fine-tuning the networks on real images or by improving the realism of the simulated images with a generative adversarial network~\cite{Shrivastava2017}. Our deep morphing algorithm can be modified to process X-ray images acquired from different views (e.g.\ anterior-posterior and medial-lateral) or X-ray images showing different parts of a bone (e.g.\ the proximal and the distal part of the femur). This can be achieved by separate models that are morphed to the segmentation and the best fit is chosen afterwards~\cite{Cootes2000a}. Moreover, classification networks can be trained to distinguish between different views and to classify which part of a bone is visible in the image. Based on the decision of the classification network, the appropriate model is then chosen before applying deep morphing. \subsubsection*{Acknowledgments} To simulate our X-ray images, we used CT scans from the SMIR dataset~\cite{Kistler2013}. The fluoroscopic X-ray dataset was provided by the Klinikum Augsburg.
\section{Introduction} \IEEEPARstart{N}{owdays} deep convolutional neural networks (CNNs) have achieved top results in many difficult image classification tasks. However, the number of parameters in CNN models is high which limits the use of deep models on devices with limited resources such as smartphones, embedded systems, etc. Meanwhile, it has been known that there exist a lot of redundancy between the parameters and the feature maps in deep models, i.e., that CNN models are over-parametrized. The reason that over-parametrized CNN models are used instead of small sized CNN models is that the over-parametrization makes the training of the network easier as has been shown in the experiments in \cite{Livni}. The reason for this phenomenon is believed to be due to the fact that the gradient flow in networks with many parameters achieves a better trained network than the gradient flow in small networks. Therefore, a well-known traditional principle of designing good neural networks is to make a network with a large number of parameters, and then use regularization techniques to avoid over-fitting rather than making a network with small number of parameters from the beginning.\\ \indent However, it has been shown in \cite{Zhang} that even with the use of regularization methods, there still exists excessive capacity in the trained networks, which means that the redundancy between the parameters is still large. This again implies the fact that the parameters or the feature maps can be expressed in a structured subspace with a smaller number of coefficients. Finding the underlying structure that exist between the parameters in the CNN models and reducing the redundancy of parameters and feature maps are the topics of the deep compression field. As has been well summarized in \cite{CompressDeep1}, researches on the compression of deep models can be categorized into works which try to eliminate unnecessary weight parameters \cite{CompressDeep2}, works which try to compress the parameters by projecting them onto a low rank subspace \cite{CompressDeep3}\cite{CompressDeep4}\cite{CompressDeep5}, and works which try to group similar parameters into groups and represent them by representative features\cite{CompressDeep6}\cite{CompressDeep7}\cite{CompressDeep8}\cite{CompressDeep9}\cite{CompressDeep10}. These works follow the common framework shown in Fig. \ref{frameworks}(a), i.e., they first train the original uncompressed CNN model by back-propagation to obtain the uncompressed parameters, and then try to find a compressed expression for these parameters to construct a new compressed CNN model.\\ \indent In comparison, researches which try to restrict the number of parameters in the first place by proposing small networks are also actively in progress (Fig. \ref{frameworks}(b)). However, as mentioned above, the reduction in the number of parameters changes the gradient flow, so the networks have to be designed carefully to achieve a trained network with good performance. For example, MobileNets \cite{Mobilenet} and Xception networks \cite{Xception} use depthwise separable convolution filters, while the Squeezenet \cite{Squeezenet} uses a bottleneck approach to reduce the number of parameters. Other models use 1-D filters to reduce the size of networks such as the highly factorized Flattened network \cite{Flattened}, or the models in \cite{TrainingLow} where 1-D filters are used together with other filters of different sizes. Recently, Google's Inception model has also adopted 1-D filters in version 4. One difficulty in using 1-D filters is that 1-D filters are not easy to train, and therefore, they are used only partially like in the Google's Inception model, or in the models in \cite{TrainingLow} etc., except for the Flattened network which is constituted of consecutive 1-D filters only. However, even the Flattened network uses only three layers of 1-D filters in their experiments, due to the difficulty of training 1-D filters with many layers.\\ \indent In this paper, we propose a rank-1 CNN, where the rank-1 3-D filters are constructed by the outer products of 1-D vectors. At the outer product based composition step at each epoch of training, the number of parameters in the 3-D filters become the same as in the filters in standard CNNs, allowing a good gradient flow to flow throughout the network. This gradient flow also updates the parameters in the 1-D vectors, from which the 3-D filters are composed. At the next composition step, the weights in the 3-D filters are updated again, not by the gradient flow but by the outer product operation, to be projected onto the rank-1 subspace. By iterating this two-step update, all the 3-D filters in the network are trained to minimize the loss function while maintaining its rank-1 property. This is different from approaches which try to approximate the trained filters by low rank approximation after the training has finished, e.g., like the low rank approximation in \cite{Jaderberg}. The composition operation is included in the training phase in our network, which directs the gradient flow in a different direction from that of standard CNNs, directing the solution to live on a rank-1 subspace. In the testing phase, we do not need the outer product operation anymore, and can directly filter the input channels with the trained 1-D vectors treating them now as 1-D filters. That is, we take consecutive 1-D convolutions with the trained 1-D vectors, since the result is the same as being filtered with the 3-D filter constituted of the trained 1-D vectors. Therefore, the inference speed is exactly the same as that of the Flattened network. However, due to the better gradient flow, better parameters for the 1-D filters can be found with the proposed method, and more importantly, the network can be trained even in the case when the Flattened network can be not.\\ \indent We will also show that the convolution with rank-1 filters results in rank-deficient outputs, where the rank of the output is upper-bounded by a smaller bound than in normal CNNs. Therefore, the output feature vectors are constrained to live on a rank-deficient subspace in a high dimensional space. This coincides with the well-known belief that the feature vectors corresponding to images live on a low-dimensional manifold in a high dimensional space, and the fact that we get similar accuracy results with the rank-1 net can be another proof for this belief.\\ \indent We also explain in analogy to the bilateral-projection based 2-D principal component analysis(B2DPCA) what the 1-D vectors are trying to learn, and why the redundancy becomes reduced in the parameters with the rank-1 network. The reduction of the redundancy between the parameters is expressed by the reduced number of effective parameters, i.e., the number of parameters in the 1-D vectors. Therefore, the rank-1 net can be thought of as a compressed version of the standard CNN, and the reduced number of parameters as a smaller upper bound for the effective capacity of the standard CNN. Compared with regularization methods, such as stochastic gradient descent, drop-out, and regularization methods, which do not reduce the excessive capacities of deep models as much as expected, the rank-1 projection reduces the capacity proportionally to the ratio of decrease in the number of parameters, and therefore, maybe can help to define a better upper bound for the effective capacity of deep networks. \begin{figure} \centering \includegraphics[width=0.8\columnwidth]{fig_compare_with_deep_compression.png} \caption{Two kinds of approaches trying to achieve small and efficient deep models (a) approach of compressing pre-trained parameters (b) approach of modeling and training a small-sized model directly.} \label{frameworks} \end{figure} \section{Related Works} The following works are related to our work. It is the work of the B2DPCA which gave us the insight for the rank-1 net. After we designed the rank-1 net, we found out that a similar research, i.e., the work on the Flattened network, has been done in the past. We explain both works below. \subsection{Bilateral-projection based 2DPCA} In \cite{B2DPCA}, a bilateral-projection based 2D principal component analysis(B2DPCA) has been proposed, which minimizes the following energy functional: \begin{equation} \label{bilateral} [{\mathbf P}_{opt}, {\mathbf Q}_{opt}] = \mathop{{\rm argmin}}\limits_{{\mathbf P}, {\mathbf Q}} \| {\mathbf X} - {\mathbf P}{\mathbf C}{\mathbf Q}^T \|^2_F, \end{equation} where ${\mathbf X} \in R^{n \times m}$ is the two dimensional image, ${\mathbf P} \in R^{m \times l}$ and ${\mathbf Q} \in R^{n \times r}$ are the left- and right- multiplying projection matrices, respectively, and ${\mathbf C} = {\mathbf P}^T{\mathbf X}{\mathbf Q}$ is the extracted feature matrix for the image ${\mathbf X}$. The optimal projection matrices ${\mathbf P}_{opt}$ and ${\mathbf Q}_{opt}$ are simultaneously constructed, where ${\mathbf P}_{opt}$ projects the column vectors of ${\mathbf X}$ to a subspace, while ${\mathbf Q}_{opt}$ projects the row vectors of ${\mathbf X}$ to another one. To see why ${\mathbf P}$ is projecting the column vectors of ${\mathbf X}$ to a subspace, consider a simple example where ${\mathbf P}$ has $l$ column vectors: \begin{equation} \label{P} \begin{array}{c} {\mathbf P}= \left[ \begin{array}{cccc} | & | & & |\\ {\mathbf p}_1 & {\mathbf p}_2 & ... & {\mathbf p}_l\\ | & | & & |\\ \end{array} \right], \end{array} \end{equation} Then, left-multiplying ${\mathbf P}$ to the image ${\mathbf X}$, results in: \begin{equation} \label{PX} \begin{array}{c} {\mathbf P}^T{\mathbf X} =\left[ \begin{array}{c} \leaders\hrule height3pt depth-2.6pt\hskip2em \relax {\mathbf p}_1^T \leaders\hrule height3pt depth-2.6pt\hskip2em \relax \leaders\hrule height3pt depth-2.6pt\hskip2em \relax\\ \leaders\hrule height3pt depth-2.6pt\hskip2em \relax {\mathbf p}_2^T \leaders\hrule height3pt depth-2.6pt\hskip2em \relax \leaders\hrule height3pt depth-2.6pt\hskip2em \relax\\ \vdots \\ \leaders\hrule height3pt depth-2.6pt\hskip2em \relax {\mathbf p}_l^T \leaders\hrule height3pt depth-2.6pt\hskip2em \relax \leaders\hrule height3pt depth-2.6pt\hskip2em \relax\\ \end{array} \right] \left[ \begin{array}{cccc} | & | & & |\\ {\mathbf x}_{col_1} & {\mathbf x}_{col_2} & ... & {\mathbf x}_{col_m}\\ | & | & & |\\ \end{array} \right] \\ \\ = \left[ \begin{array}{cccc} {\mathbf p}_1^T{\mathbf x}_{col_1} & {\mathbf p}_1^T{\mathbf x}_{col_2}& ... & {\mathbf p}_1^T{\mathbf x}_{col_m} \\ {\mathbf p}_2^T{\mathbf x}_{col_1} & {\mathbf p}_2^T{\mathbf x}_{col_2}& ... & {\mathbf p}_2^T{\mathbf x}_{col_m} \\ \vdots & \vdots & \vdots & \vdots \\ {\mathbf p}_l^T{\mathbf x}_{col_1} & {\mathbf p}_l^T{\mathbf x}_{col_2}& ... & {\mathbf p}_l^T{\mathbf x}_{col_m} \\ \end{array} \right], \end{array} \end{equation} where it can be observed that all the components in ${\mathbf P}^T{\mathbf X}$ are the projections of the column vectors of ${\mathbf X}$ onto the column vectors of ${\mathbf P}$. Meanwhile, the right-multiplication of the matrix ${\mathbf Q}$ to ${\mathbf X}$ results in, \begin{equation} \label{XQ} \begin{array}{c} {\mathbf X}{\mathbf Q} = \left[ \begin{array}{cc} \leaders\hrule height3pt depth-2.6pt\hskip2em \relax {\mathbf x}_{row_1} \leaders\hrule height3pt depth-2.6pt\hskip2em \relax \leaders\hrule height3pt depth-2.6pt\hskip2em \relax \\ \leaders\hrule height3pt depth-2.6pt\hskip2em \relax {\mathbf x}_{row_2} \leaders\hrule height3pt depth-2.6pt\hskip2em \relax \leaders\hrule height3pt depth-2.6pt\hskip2em \relax\\ \vdots \\ \leaders\hrule height3pt depth-2.6pt\hskip2em \relax {\mathbf x}_{row_n} \leaders\hrule height3pt depth-2.6pt\hskip2em \relax \leaders\hrule height3pt depth-2.6pt\hskip2em \relax\\ \end{array} \right] \left[ \begin{array}{cccc} | & | & & | \\ {\mathbf q}_1 & {\mathbf q}_2 & ... & {\mathbf q}_r\\ | & | & & |\\ \end{array} \right] \\ \\ = \left[ \begin{array}{cccc} {\mathbf x}_{row_1}{\mathbf q}_1 & {\mathbf x}_{row_1}{\mathbf q}_2 & ... & {\mathbf x}_{row_1}{\mathbf q}_r \\ {\mathbf x}_{row_2}{\mathbf q}_1 & {\mathbf x}_{row_2}{\mathbf q}_2 & ... & {\mathbf x}_{row_2}{\mathbf q}_r \\ \vdots & \vdots & \vdots & \vdots \\ {\mathbf x}_{row_n}{\mathbf q}_1 & {\mathbf x}_{row_n}{\mathbf q}_2 & ... & {\mathbf x}_{row_n}{\mathbf q}_r \\ \end{array} \right], \end{array} \end{equation} where the components of ${\mathbf X}{\mathbf Q}$ are the projections of the row vectors of ${\mathbf X}$ onto the column vectors of ${\mathbf Q}$. From the above observation, we can see that the components of the feature matrix ${\mathbf C} = {\mathbf P}^T {\mathbf X} {\mathbf Q} \in R^{l \times r}$ is a result of simultaneously projecting the row vectors of ${\mathbf X}$ onto the column vectors of ${\mathbf P}$, and the column vectors of ${\mathbf X}$ onto the column vectors of ${\mathbf Q}$. It has been shown in \cite{B2DPCA}, that the advantage of the bilateral projection over the unilateral-projection scheme is that ${\mathbf X}$ can be represented effectively with smaller number of coefficients than in the unilateral case, i.e., a small-sized matrix ${\mathbf C}$ can well represent the image ${\mathbf X}$. This means that the bilateral-projection effectively removes the redundancies among both rows and columns of the image. Furthermore, since \begin{equation} \begin{array}{c} {\mathbf C} = {\mathbf P}^T {\mathbf X} {\mathbf Q} = \left[ \begin{array}{cccc} {\mathbf p}^T_1 {\mathbf X} {\mathbf q}_1 & {\mathbf p}^T_1 {\mathbf X} {\mathbf q}_2 & ... & {\mathbf p}^T_1 {\mathbf X} {\mathbf q}_r \\ {\mathbf p}^T_2 {\mathbf X} {\mathbf q}_1 & {\mathbf p}^T_2 {\mathbf X} {\mathbf q}_2 & ... & {\mathbf p}^T_2 {\mathbf X} {\mathbf q}_r \\ \vdots & \vdots & \vdots & \vdots\\ {\mathbf p}^T_l {\mathbf X} {\mathbf q}_1 & {\mathbf p}^T_l {\mathbf X} {\mathbf q}_2 & ... & {\mathbf p}^T_l {\mathbf X} {\mathbf q}_r \\ \end{array}\right] \\ = \left[ \begin{array}{cccc} <{\mathbf X}, {\mathbf p}_1 {\mathbf q}^T_1> & <{\mathbf X}, {\mathbf p}_1 {\mathbf q}^T_2> & ... & <{\mathbf X}, {\mathbf p}_1 {\mathbf q}^T_r> \\ <{\mathbf X}, {\mathbf p}_2 {\mathbf q}^T_1> & <{\mathbf X}, {\mathbf p}_2 {\mathbf q}^T_2> & ... & <{\mathbf X}, {\mathbf p}_2 {\mathbf q}^T_r> \\ \vdots & \vdots & \vdots & \vdots \\ <{\mathbf X}, {\mathbf p}_l {\mathbf q}^T_1> & <{\mathbf X}, {\mathbf p}_l {\mathbf q}^T_2> & ... & <{\mathbf X}, {\mathbf p}_l {\mathbf q}^T_r> \\ \end{array}\right], \end{array} \end{equation} it can be seen that the components of ${\mathbf C}$ are the 2-D projections of the image ${\mathbf X}$ onto the 2-D planes ${\mathbf p}_1 {\mathbf q}^T_1, {\mathbf p}_1 {\mathbf q}^T_2, ...{\mathbf p}_l {\mathbf q}^T_r$ made up by the outer products of the column vectors of ${\mathbf P}$ and ${\mathbf Q}$. The 2-D planes have a rank of one, since they are the outer products of two 1-D vectors. Therefore, the fact that ${\mathbf X}$ can be well represented by a small-sized ${\mathbf C}$ also implies the fact that ${\mathbf X}$ can be well represented by a few rank-1 2-D planes, i.e., only a few 1-D vectors ${\mathbf p}_1, ...{\mathbf p}_l, {\mathbf q}_1, ....{\mathbf q}_r$, where $l << m$ and $r << n$.\\ \indent In the case of (\ref{bilateral}), the learned 2-D planes try to minimize the loss function \begin{equation} L= \| {\mathbf X} - {\mathbf P}{\mathbf C}{\mathbf Q}^T \|^2_F, \end{equation} i.e., try to learn to best approximate ${\mathbf X}$. A natural question arises, if good rank-1 2-D planes can be obtained to minimize other loss functions too, e.g., loss functions related to the image classification problem, such as \begin{equation} L= \| y_{true} - y({\mathbf X},{\mathbf P},{\mathbf Q}) \|^2_F, \end{equation} where $y_{true}$ denotes the true classification label for a certain input image ${\mathbf X}$, and $y({\mathbf X},{\mathbf P},{\mathbf Q})$ is the output of the network constituted by the outer products of the column vectors in the learned matrices ${\mathbf P}$ and ${\mathbf Q}$. In this paper, we will show that it is possible to learn such rank-1 2-D planes, i.e., 2-D filters, if they are used in a deep structure. Furthermore, we extend the rank-1 2-D filter case to the rank-1 3-D filter case, where the rank-1 3-D filter is constituted as the outer product of three column vectors from three different learned matrices. \subsection{Flattened Convolutional Neural Networks} In \cite{Flattened}, the `Flattened CNN' has been proposed for fast feed-forward execution by separating the conventional 3-D convolution filter into three consecutive 1-D filters. The 1-D filters sequentially convolve the input over different directions, i.e., the lateral, horizontal, and vertical directions. Figure \ref{flattened-training} shows the network structure of the Flattened CNN. The Flattened CNN uses the same network structure in both the training and the testing phases. This is in comparison with our proposed model, where we use a different network structure in the training phase as will be seen later. \begin{figure} \centering \includegraphics[width=1\columnwidth]{Fig_training1.jpg} \caption{The structure in Flattened network. The same network structure of sequential use of 1-D filters is used in the training and testing phases.} \label{flattened-training} \end{figure} However, the consecutive use of 1-D filters in the training phase makes the training difficult. This is due to the fact that the gradient path becomes longer than in normal CNN, and therefore, the gradient flow vanishes faster while the error is more accumulating. Another reason is that the reduction in the number of parameters causes a gradient flow different from that of the standard CNN, which is more difficult to find an appropriate solution. This fact coincides with the experiments in \cite{Livni} which show that the gradient flow in a network with small number of parameters cannot find good parameters. Therefore, a particular weight initialization method has to be used with this setting. Furthermore, in \cite{Flattened}, the networks in the experiments have only three layers of convolution, which is maybe due to the fact of the difficulty in training networks with more layers. \section{Proposed Method} In comparison with other CNN models using 1-D rank-1 filters, we propose the use of 3-D rank-1 filters(${\mathbf w}$) in the training stage, where the 3-D rank-1 filters are constructed by the outer product of three 1-D vectors, say ${\mathbf p}$, ${\mathbf q}$, and ${\mathbf t}$: \begin{equation} {\mathbf w} = {\mathbf p} \otimes {\mathbf q} \otimes {\mathbf t}. \end{equation} This is an extension of the 2-D rank-1 planes used in the B2DPCA, where the 2-D planes are constructed by ${\mathbf w} = {\mathbf p} \otimes {\mathbf q} = {\mathbf p}{\mathbf q}^T$. Figure \ref{proposed-training1} shows the training and the testing phases of the proposed method. The structure of the proposed network is different for the training phase and the testing phase. In comparison with the Flattened network (Fig. \ref{flattened-training}), in the training phase, the gradient flow first flows through the 3-D rank-1 filters and then through the 1-D vectors. Therefore, the gradient flow is different from that of the Flattened network resulting in a different and better solution of parameters in the 1-D vectors. The solution can be obtained even in large networks with the proposed method, for which the gradient flow in the Flattened network cannot obtain a solution at all. Furthermore, at test time, i.e., at the end of optimization, we can use the 1-D vectors directly as 1-D filters in the same manner as in the Flattened network, resulting in the same inference speed as the Flattened network(Fig. \ref{proposed-training1}). \begin{figure} \centering \includegraphics[width=1\columnwidth]{Fig_training2.jpg} \caption{Proposed rank-1 neural network with different network structures in training and testing phases.} \label{proposed-training1} \end{figure} Figure \ref{proposed_training2} explains the training process with the proposed network structure in detail. At every epoch of the training phase, we first take the outer product of the three 1-D vectors ${\mathbf p}$, ${\mathbf q}$, and ${\mathbf t}$. Then, we assign the result of the outer product to the weight values of the 3-D convolution filter, i.e., for every weight value in the 3-D convolution filter ${\mathbf w}$, we assign \begin{equation} \label{FX} w_{i,j,k} = p_i q_j t_k, \,\, \forall_{i,j,k \in \Omega({\mathbf w})} \end{equation} where, $i,j,k$ correspond to the 3-D coordinates in $\Omega({\mathbf w})$, the 3-D domain of the 3-D convolution filter ${\mathbf w}$. Since the matrix constructed by the outer product of vectors has always a rank of one, the 3-D convolution filter ${\mathbf w}$ is a rank-1 filter.\\ \indent During the back-propagation phase, every weight value in ${\mathbf w}$ will be updated by \begin{equation} \label{normal_update} w'_{i,j,k} = w_{i,j,k} - \alpha \frac{\partial L}{\partial w_{i,j,k}}, \end{equation} where $\frac{\partial L}{\partial w_{i,j,k}}$ denotes the gradient of the loss function $L$ with respect to the weight $w_{i,j,k}$, and $\alpha$ is the learning rate. In normal networks, $w'_{i,j,k}$ in (\ref{normal_update}) is the final updated weight value. However, the updated filter ${\mathbf w}'$ normally is not a rank-1 filter. This is due to the fact that the update in (\ref{normal_update}) is done in the direction which considers only the minimizing of the loss function and not the rank of the filter.\\ \indent With the proposed training network structure, we take a further update step, i.e., we update the 1-D vectors ${\mathbf p}$, ${\mathbf q}$, and ${\mathbf t}$: \begin{equation} p'_{i} = p_{i} - \alpha \frac{\partial L}{\partial p_{i}}, \,\, \forall_{i \in \Omega({\mathbf p})} \end{equation} \begin{equation} q'_{j} = q_{j} - \alpha \frac{\partial L}{\partial q_{j}}, \,\, \forall_{j \in \Omega({\mathbf q})} \end{equation} \begin{equation} t'_{k} = t_{k} - \alpha \frac{\partial L}{\partial t_{k}}, \,\, \forall_{k \in \Omega({\mathbf t})} \end{equation} Here, $\frac{\partial L}{\partial p_{i}}$, $\frac{\partial L}{\partial q_{j}}$, and $\frac{\partial L}{\partial t_{k}}$ can be calculated as \begin{equation} \frac{ \partial L }{ \partial p_i } = \sum_j \sum_k \frac{ \partial L}{ \partial w_{i,j,k} }\frac{ \partial w_{i,j,k}}{ \partial p_i}= \sum_j \sum_k \frac{ \partial L}{ \partial w_{i,j,k} }q_j t_k, \end{equation} \begin{equation} \frac{ \partial L }{ \partial q_j } = \sum_i \sum_k \frac{ \partial L}{ \partial w_{i,j,k} }\frac{ \partial w_{i,j,k}}{ \partial q_j}= \sum_i \sum_k \frac{ \partial L}{ \partial w_{i,j,k} }p_i t_k, \end{equation} \begin{equation} \frac{ \partial L }{ \partial t_k} = \sum_i \sum_j \frac{ \partial L}{ \partial w_{i,j,k} }\frac{ \partial w_{i,j,k}}{ \partial t_k}= \sum_i \sum_j \frac{ \partial L}{ \partial w_{i,j,k} }p_i q_j. \end{equation} \begin{figure} \centering \includegraphics[width=1\columnwidth]{Fig_training-4.jpg} \caption{Steps in the training phase of the proposed rank-1 network.} \label{proposed_training2} \end{figure} At the next feed forward step of the back-propagation, an outer product of the updated 1-D vectors ${\mathbf p}$, ${\mathbf q}$, and ${\mathbf t}$ is taken to concatenate them back into the 3-D convolution filter ${\mathbf w}''$: \begin{equation} \label{next_update} \begin{array}{ccc} w''_{i,j,k} \!\!\!\!\!\!\!\!\! & = p'_{i}q'_{j}t'_{k} = (p_{i} - \alpha \frac{\partial L}{\partial p_{i}})(q_{j} - \alpha \frac{\partial L}{\partial q_{j}})(t_{k} - \alpha \frac{\partial L}{\partial t_{k}})& \\ &\!\!\!\!\!\!\!\! = p_{i}q_{j}t_{k} - \alpha (p_{i}q_{j}\frac{\partial L}{\partial t_{k}}+q_{j}t_{k}\frac{\partial L}{\partial p_{i}} + p_{i}t_{k}\frac{\partial L}{\partial q_{j}})&\\ \!\!\!\!\!\!+ \!\!\!\!\!\!\!\!\! & {\alpha}^2 (p_{i}\frac{\partial L}{\partial q_{j}}\frac{\partial L}{\partial t_{k}}+ q_{j}\frac{\partial L}{\partial p_{i}}\frac{\partial L}{\partial t_{k}}+t_{k}\frac{\partial L}{\partial p_{i}}\frac{\partial L}{\partial t_{k}})-{\alpha}^3\frac{\partial L}{\partial p_{i}}\frac{\partial L}{\partial q_{j}}\frac{\partial L}{\partial t_{k}}& \\ =& w_{i,j,k} - \alpha \Delta_{i,j,k}, \,\, \forall_{i,j,k}, &\!\!\!\!\!\!\!\! \\ \end{array} \end{equation} where \begin{equation} \label{set} \begin{array}{ccc} \Delta_{i,j,k}\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\! & = p_{i}q_{j}\frac{\partial L}{\partial t_{k}}+q_{j}t_{k}\frac{\partial L}{\partial p_{i}} + p_{i}t_{k}\frac{\partial L}{\partial q_{j}}&\\ & \!\!\!\!\!\! - \alpha (p_{i}\frac{\partial L}{\partial q_{j}}\frac{\partial L}{\partial t_{k}}+ q_{j}\frac{\partial L}{\partial p_{i}}\frac{\partial L}{\partial t_{k}}+t_{k}\frac{\partial L}{\partial p_{i}}\frac{\partial L}{\partial t_{k}})+{\alpha}^2\frac{\partial L}{\partial p_{i}}\frac{\partial L}{\partial q_{j}}\frac{\partial L}{\partial t_{k}}.& \\ \end{array} \end{equation} As the outer product of 1-D vectors always results in a rank-1 filter, ${\mathbf w}''$ is a rank-1 filter as compared with ${\mathbf w}'$ which is not. Comparing (\ref{normal_update}) with (\ref{next_update}), we get \begin{equation} w''_{i,j,k} = w'_{i,j,k} - \alpha (\Delta_{i,j,k}-\frac{\partial L}{\partial w_{i,j,k}}). \end{equation} Therefore, $\Delta_{i,j,k}-\frac{\partial L}{\partial w_{i,j,k}}$ is the incremental update vector which projects ${\mathbf w}'$ back onto the rank-1 subspace. \section{Property of rank-1 filters} Below, we explain some properties of the 3-D rank-1 filters. \subsection{Multilateral property of 3-D rank-1 filters} We explain the bilateral property of the 2-D rank-1 filters in analogy to the B2DPCA. The extension to the multilateral property of the 3-D rank-1 filters is then straightforward. We first observe that a 2-D convolution can be seen as shifting inner products, where each component $y({\mathbf r})$ at position ${\mathbf r}$ of the output matrix ${\mathbf Y}$ is computed as the inner product of a 2-D filter ${\mathbf W}$ and the image patch ${\mathbf X}({\mathbf r})$ centered at ${\mathbf r}$: \begin{equation} y({\mathbf r}) = <{\mathbf W},{\mathbf X}({\mathbf r})>. \end{equation} If ${\mathbf W}$ is a 2-D rank-1 filter, then, \begin{equation} y({\mathbf r}) = <{\mathbf W},{\mathbf X}({\mathbf r})> = <{\mathbf p}{\mathbf q}^T, {\mathbf X}({\mathbf r})> = {\mathbf p}^T {\mathbf X}({\mathbf r}) {\mathbf q} \end{equation} As has been explained in the case of B2DPCA, since ${\mathbf p}$ is multiplied to the rows of ${\mathbf X}({\mathbf r})$, ${\mathbf p}$ tries to extract the features from the rows of ${\mathbf X}({\mathbf r})$ which can minimize the loss function. That is, ${\mathbf p}$ searches the rows in all patches ${\mathbf X}({\mathbf r}), \forall_{{\mathbf r}}$ for some common features which can reduce the loss function, while ${\mathbf q}$ looks for the features in the columns of the patches. This is in analogy to the B2DPCA, where the bilateral projection removes the redundancies among the rows and columns in the 2-D filters. Therefore, by easy extension, the 3-D rank-1 filters which are learned by the multilateral projection will have less redundancies among the rows, columns, and the channels than the normal 3-D filters in standard CNNs. \subsection{Property of projecting onto a low dimensional subspace} In this section, we show that the convolution with the rank-1 filters projects the output channels onto a low dimensional subspace. In \cite{DeepConvolution}, it has been shown via the block Hankel matrix formulation that the auto-reconstructing U-Net with insufficient number of filters results in a low-rank approximation of its input. Using the same block Hankel matrix formulation for the 3-D convolution, we can show that the 3-D rank-1 filter projects the input onto a low dimensional subspace in a high dimension. To avoid confusion, we use the same definitions and notations as in \cite{DeepConvolution}. A wrap-around Hankel matrix $H_{d}({\mathbf f})$ of a function ${\mathbf f} = [f[1], f[2], \hdots ,f[n]]$ with respect to the number of columns $d$ is defined as \begin{equation} H_{d}({\mathbf f}) = \left[ \begin{array}{cccc} f[1] & f[2] & \hdots & f[d] \\ f[2] & f[3] & \hdots & f[d+1] \\ \vdots & \vdots & \ddots & \vdots\\ f[n] & f[1] & \hdots & f[d-1] \\ \end{array} \right] \in R^{n \times d}. \end{equation} Using the Hankel matrix, a convolution operation with a 1-D filter ${\mathbf w}$ of length $d$ can be expressed in a matrix-vector form as \begin{equation} {\mathbf y} = H_{d}({\mathbf f})\bar{{\mathbf w}}, \end{equation} where $\bar{{\mathbf w}}$ is the flipped version of ${\mathbf w}$, and ${\mathbf y}$ is the output result of the convolution.\\ \indent The 2-D convolution can be expressed using the block Hankel matrix expression of the input channel. The block Hankel matrix of a 2-D input ${\mathbf X} = [{\mathbf x}_1, ..., {\mathbf x}_{n_2}] \in R^{n_1 \times n_2}$ with ${\mathbf x}_i \in R^{n_1}$ being the columns of ${\mathbf X}$, becomes \begin{equation} H_{d_1,d_2}({\mathbf X}) = \left[ \begin{array}{cccc} H_{d_1} ({\mathbf x}_1) & H_{d_1} ({\mathbf x}_2) & \hdots & H_{d_1} ({\mathbf x}_{d_2}) \\ H_{d_1} ({\mathbf x}_2) & H_{d_1} ({\mathbf x}_3) & \hdots & H_{d_1} ({\mathbf x}_{d_2 +1}) \\ \vdots & \vdots & \ddots & \vdots\\ H_{d_1} ({\mathbf x}_{n_2}) & H_{d_1} ({\mathbf x}_1) & \hdots & H_{d_1} ({\mathbf x}_{d_2 -1}) \\ \end{array} \right], \end{equation} where $H_{d_1,d_2}({\mathbf X}) \in R^{n_1 n_2 \times d_1 d_2}$ and $H_{d_1}({\mathbf x}_{i}) \in R^{n_1 \times d_1}$. With the block Hankel matrix, a single-input single-output 2-D convolution with a 2-D filter ${\mathbf W}$ of size $d_1 \times d_2$ can be expressed in matrix-vector form, \begin{equation} VEC({\mathbf Y}) = H_{d_1,d_2}({\mathbf X}) VEC({\mathbf W}), \end{equation} where $VEC({\mathbf Y})$ denotes the vectorization operation by stacking up the column vectors of the 2-D matrix ${\mathbf Y}$.\\ \indent In the case of multiple input channels ${\mathbf X}^{(1)} \hdots {\mathbf X}^{(N)}$, the block Hankel matrix is extended to \begin{equation} H_{d_1,d_2 | N}\left( [{\mathbf X}^{(1)} \hdots {\mathbf X}^{(N)}] \right)= \left[ H_{d_1,d_2}({\mathbf X}^{(1)}) \hdots H_{d_1,d_2}({\mathbf X}^{(N)})\right], \end{equation} and a single output of the multi-input convolution with multiple filters becomes \begin{equation} VEC({\mathbf Y}^{(i)})=\sum_{j=1}^{N}H_{d_1,d_2}({\mathbf X}^{(j)})VEC({\mathbf W}_{(i)}^{(j)}), \,\,\, i=1,\hdots,q, \end{equation} where $q$ is the number of filters. Last, the matrix-vector form of the multi-input multi-output convolution resulting in multiple outputs ${\mathbf Y}^{(1)} \hdots {\mathbf Y}^{(q)}$ can be expressed as \begin{equation} {\mathbf Y} = H_{d_1,d_2 | N}\left( [{\mathbf X}^{(1)} \hdots {\mathbf X}^{(N)}] \right) {\mathbf W}, \end{equation} where \begin{equation} {\mathbf Y} = [VEC({\mathbf Y}^{(1)}) \, \hdots \, VEC({\mathbf Y}^{(q)})] \end{equation} and \begin{equation} {\mathbf W} = \left[ \begin{array}{ccc} VEC({\mathbf W}_{(1)}^{(1)}) & \hdots & VEC({\mathbf W}_{(q)}^{(1)}) \\ \vdots & \ddots & \vdots \\ VEC({\mathbf W}_{(1)}^{(N)}) & \hdots & VEC({\mathbf W}_{(q)}^{(N)}) \\ \end{array} \right]. \end{equation} To calculate the upper bound of the rank of ${\mathbf Y}$, we use the rank inequality \begin{equation} rank(\mathbf{AB}) \leq min\{rank(\mathbf{A}),rank(\mathbf{B})\} \end{equation} on ${\mathbf Y}$ to get \begin{equation} rank({\mathbf Y})\!\leq\!min \{rank H_{d_1,d_2|N}\!\left(\![{\mathbf X}^{(1)}\hdots{\mathbf X}^{(N)}]\!\right)\!,rank({\mathbf W})\}. \end{equation} Now to investigate the rank of ${\mathbf W}$, we first observe that \begin{equation} {\mathbf W} = \left[ \begin{array}{ccc} {\mathbf t}_1[1] VEC({\mathbf p}_1 \otimes {\mathbf q}_1 ) & \hdots & {\mathbf t}_q[1] VEC({\mathbf p}_1 \otimes {\mathbf q}_1 ) \\ \vdots & \ddots & \vdots \\ {\mathbf t}_1[N] VEC({\mathbf p}_l \otimes {\mathbf q}_r ) & \hdots & {\mathbf t}_q[N] VEC({\mathbf p}_l \otimes {\mathbf q}_r ) \\ \end{array} \right] \end{equation} as can be seen in Fig. \ref{HankelAnalysis}.\\ \begin{figure} \centering \includegraphics[width=0.8\columnwidth]{ForHankelAnalysis.jpg} \caption{Convolution filters of the proposed rank-1 network.} \label{HankelAnalysis} \end{figure} \indent Then, expressing ${\mathbf W}$ as the stack of its sub-matrices, \begin{equation} {\mathbf W} = \left[ \begin{array}{ccc} {\mathbf W}_1 \\ \vdots\\ {\mathbf W}_s \\ \vdots\\ {\mathbf W}_N \\ \end{array} \right] \in R^{Nd_1d_2 \times q}, \end{equation} where \begin{equation} {\mathbf W}_s = \left[ \begin{array}{ccc} {\mathbf t}_1[s]VEC({\mathbf p}_i\otimes{\mathbf q}_j) & \hdots & {\mathbf t}_q[s]VEC({\mathbf p}_i\otimes{\mathbf q}_j)\\ \end{array} \right], \end{equation} which columns are the vectorized forms of the 2-D slices in the 3-D filters which convolve with the $s$-th image. We observe that all the sub-matrices ${\mathbf W}_s \in R^{d_1d_2 \times q}, (s=1,...N)$ have a rank of 1, since all the column vectors in ${\mathbf W}_s$ are in the same direction and differ only in their magnitudes, i.e., by the different values of ${\mathbf t}_1[s], ..., {\mathbf t}_q[s]$. Therefore, the upper bound of $rank({\mathbf W})$ is $min\{N,q\}$ instead of $min\{Nd_1d_2,q\}$ which is the upper bound we get if we use non-rank-1 filters.\\ \indent As a result, the output ${\mathbf Y}$ is upper bounded as \begin{equation} rank({\mathbf Y}) \leq a, \end{equation} where \begin{equation} \label{ranka} \begin{array}{cc} a = min \{rank H_{d_1,d_2|N}\left([{\mathbf X}^{(1)}\hdots{\mathbf X}^{(N)}]\right),\\ \mbox{number of input channels ($N$)},\\ \mbox{number of filters ($q$)}\}. \end{array} \end{equation} As can be seen from (\ref{ranka}), the upper bound is determined by the ranks of Hankel matrices of the input channels or the numbers of input channels or filters. In common deep neural network structures, the number of filters are normally larger than the number of input channels, e.g., the VGG-16 uses in every layer a number of filters larger or equal to the number of input channels. So if we use the same structure for the proposed rank-1 network as in the VGG-16 model, the upper bound will be determined mainly by the number of input channels. Therefore, the outputs of layers in the proposed CNN are constrained to live on sub-spaces having lower ranks than the sub-spaces on which the outputs of layers in standard CNNs live. Since the output of a certain layer becomes the input of the next layer, the difference in the rank between the standard and the proposed rank-1 CNN accumulates in higher layers. Therefore, the final output of the proposed rank-1 CNN lives on a sub-space of much lower rank than the output of the standard CNN. \section{Experiments} We compared the performance of the proposed model with the standard CNN and the Flattened CNN model \cite{Flattened}. We used the same number of layers for all the models, where for the Flattened CNN we regarded the combination of the lateral, vertical, and horizontal 1-D convolutional layers as a single layer. Furthermore, we used the same numbers of input and output channels in each layer for all the models, and also the same ReLU, Batch normalization, and dropout operations. The codes for the proposed rank-1 CNN will be opened at https://github.com/petrasuk/Rank-1-CNN.\\ \indent Table 1-3 show the different structures of the models used for each dataset in the training stage. The outer product operation of three 1-D filters ${\mathbf p}$, ${\mathbf q}$, and ${\mathbf t}$ into a 3-D rank-1 filter ${\mathbf w}$ is denoted as ${\mathbf w} \doteq {\mathbf p} \otimes {\mathbf q} \otimes {\mathbf t}$ in the tables. The datasets that we used in the experiments are the MNIST, the CIFAR10, and the `Dog and Cat'(https://www.kaggle.com/c/dogs-vs-cats) datasets. We used different structures for different datasets. For the experiments on the MNIST and the CIFAR10 datasets, we trained on 50,000 images, and then tested on 100 batches each consisting of 100 random images, and calculated the overall average accuracy. The sizes of the images in the MNIST and the CIFAR10 datasets are $28 \times 28$ and $32 \times 32$, respectively. For the `Dog and Cat' dataset, we trained on 24,900 training images (size $224 \times 224$), and tested on a set of 100 test images.\\ \indent The proposed rank-1 CNN achieved a slightly larger testing accuracy on the MNIST dataset than the other two models (Fig. \ref{MNIST}). This is maybe due to the fact that the MNIST dataset is in its nature a low-ranked one, for which the proposed method can find the best approximation since the proposed method constrains the solution to a low rank sub-space. With the CIFAR10 dataset, the accuracy is slightly less than that of the standard CNN which maybe due to the fact that the images in the CIFAR10 datasets are of higher ranks than those in the MNIST dataset. However, the testing accuracy of the proposed CNN is higher than that of the Flattened CNN which shows the fact that the better gradient flow in the proposed CNN model achieves a better solution. The `Dog and Cat' dataset was used in the experiments to verify the performance of the proposed CNN on real-sized images and on a deep structure. In this case, we could not train the Flattened network due to memory issues. We used the Tensorflow API, and somehow, the Tensorflow API requires much more GPU memory for the Flattened network than the proposed rank-1 network. We also believe that, even if there is no memory issue, with this deep structure, the Flattened network cannot find good parameters at all due to the limit of the bad gradient flow in the deep structure. The Standard CNN and the proposed CNN achieved similar test accuracy as can be seen in Fig. \ref{DogAndCat}. \begin{table}[h] \begin{center} \caption{Structure of CNN for MNIST dataset} \begin{tabular}{c|c|c} \textbf{Standard CNN} & \textbf{Flattened CNN} & \textbf{Proposed CNN}\\ \hline \multicolumn{3}{c}{Conv1: 64 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$1\times3\times3$ conv} & $1\times1\times1\times$ conv &${\mathbf w}_{1} \doteq {\mathbf p}_{1}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{1}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{1}(1\times1\times1)$\\ & & $1\times3\times3$ conv \\ \hline \multicolumn{3}{c}{Conv2: 64 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$64\times3\times3$ conv} & $64\times1\times1$ conv &${\mathbf w}_{2} \doteq {\mathbf p}_{2}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{2}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{2}(64\times1\times1)$ \\ & & $64\times3\times3$ conv\\ \hline \multicolumn{3}{c}{Max Pool ($\frac{1}{2})$}\\ \hline \multicolumn{3}{c}{Conv3: 144 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$64\times3\times3$ conv} & $64\times1\times1$ conv &${\mathbf w}_{3} \doteq {\mathbf p}_{3}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{3}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{3}(64\times1\times1)$ \\ & & $64\times3\times3$ conv\\ \hline \multicolumn{3}{c}{Conv4: 144 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$144\times3\times3$ conv} & $144\times1\times1$ conv &${\mathbf w}_{4} \doteq {\mathbf p}_{4}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{4}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{4}(144\times1\times1)$ \\ & & $144\times3\times3$ conv\\ \hline \multicolumn{3}{c}{Max Pool ($\frac{1}{2})$}\\ \hline \multicolumn{3}{c}{Conv5: 144 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$144\times3\times3$ conv} & $144\times1\times1$ conv &${\mathbf w}_{5} \doteq {\mathbf p}_{5}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{5}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{5}(144\times1\times1)$ \\ & & $144\times3\times3$ conv\\ \hline \multicolumn{3}{c}{Conv6: 256 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$144\times3\times3$ conv} & $144\times1\times1$ conv &${\mathbf w}_{6} \doteq {\mathbf p}_{6}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{6}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{6}(144\times1\times1)$ \\ & & $144\times3\times3$ conv\\ \hline \multicolumn{3}{c}{Conv7: 256 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$256\times3\times3$ conv} & $256\times1\times1$ conv &${\mathbf w}_{7} \doteq {\mathbf p}_{7}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{7}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{7}(256\times1\times1)$ \\ & & $256\times3\times3$ conv\\ \hline \multicolumn{3}{c}{FC 2048 + Batch Normalization + ReLU + Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{FC 1024 + Batch Normalization + ReLU + Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{FC 10 + ReLU + Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{Soft-Max}\\ \hline \end{tabular} \end{center} \label{tab:table2} \end{table} \begin{table}[h!] \label{tab:table1} \begin{center} \caption{Structure of CNN for CIFAR-10 dataset} \begin{tabular}{c|c|c} \textbf{Standard CNN} & \textbf{Flattened CNN} & \textbf{Proposed CNN}\\ \hline \multicolumn{3}{c}{Conv1: 64 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$3\times3\times3$ conv} & $3\times1\times1$ conv &${\mathbf w}_{1} \doteq {\mathbf p}_{1}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{1}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{1}(3\times1\times1)$\\ & & $3\times3\times3$ conv \\ \hline \multicolumn{3}{c}{ReLU + Batch Normalization}\\ \hline \multicolumn{3}{c}{Conv2: 64 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$64\times3\times3$ conv} & $64\times1\times1$ conv &${\mathbf w}_{2} \doteq {\mathbf p}_{2}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{2}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{2}(64\times1\times1)$ \\ & & $64\times3\times3$ conv\\ \hline \multicolumn{3}{c}{ReLU + Max Pool ($\frac{1}{2})$ + Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{Conv3: 144 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$64\times3\times3$ conv} & $64\times1\times1$ conv &${\mathbf w}_{3} \doteq {\mathbf p}_{3}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{3}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{3}(64\times1\times1)$ \\ & & $64\times3\times3$ conv\\ \hline \multicolumn{3}{c}{ReLU + Batch Normalization}\\ \hline \multicolumn{3}{c}{Conv4: 144 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$144\times3\times3$ conv} & $144\times1\times1$ conv &${\mathbf w}_{4} \doteq {\mathbf p}_{4}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{4}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{4}(144\times1\times1)$ \\ & & $144\times3\times3$ conv\\ \hline \multicolumn{3}{c}{ReLU + Max Pool ($\frac{1}{2})$ +Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{Conv5: 256 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$144\times3\times3$ conv} & $144\times1\times1$ conv &${\mathbf w}_{5} \doteq {\mathbf p}_{5}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{5}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{5}(144\times1\times1)$ \\ & & $144\times3\times3$ conv\\ \hline \multicolumn{3}{c}{ReLU + Batch Normalization}\\ \hline \multicolumn{3}{c}{Conv6: 256 filters, each filter constituted as:}\\ \hline \multirow{4}{*}{$256\times3\times3$ conv} & $256\times1\times1$ conv &${\mathbf w}_{6} \doteq {\mathbf p}_{6}(1\times3\times1)$\\ & $1\times3\times1$ conv & $\otimes{\mathbf q}_{6}(1\times1\times3)$\\ & $1\times1\times3$ conv & $\otimes{\mathbf t}_{6}(256\times1\times1)$ \\ & & $256\times3\times3$ conv\\ \hline \multicolumn{3}{c}{ReLU + Max Pool ($\frac{1}{2})$ + Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{FC 1024 + Batch Normalization + ReLU + Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{FC 512 + Batch Normalization + ReLU + Drop Out (Prob. = 0.5)}\\ \hline \multicolumn{3}{c}{FC 10}\\ \hline \multicolumn{3}{c}{Soft-Max}\\ \hline \end{tabular} \end{center} \end{table} \begin{table}[h] \begin{center} \caption{Structure of CNN for `Dog and Cat' dataset} \label{tab:table3} \begin{tabular}{c|c} \textbf{Standard CNN} & \textbf{Proposed CNN}\\ \hline \multicolumn{2}{c}{Conv1: 64 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$3\times3\times3$ conv} & ${\mathbf w}_{1} \doteq {\mathbf p}_{1}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{1}(1\times1\times3)\otimes{\mathbf t}_{1}(3\times1\times1)$\\ & $3\times3\times3$ conv \\ \hline \multicolumn{2}{c}{Conv2: 64 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$64\times3\times3$ conv} & ${\mathbf w}_{2} \doteq {\mathbf p}_{2}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{2}(1\times1\times3)\otimes{\mathbf t}_{2}(64\times1\times1)$\\ & $64\times3\times3$ conv \\ \hline \multicolumn{2}{c}{Batch Normalization + ReLU + Max Pool ($\frac{1}{2})$}\\ \hline \multicolumn{2}{c}{Conv3: 144 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$64\times3\times3$ conv} & ${\mathbf w}_{3} \doteq {\mathbf p}_{3}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{3}(1\times3\times1)\otimes{\mathbf t}_{3}(64\times1\times1)$\\ & $64\times3\times3$ conv \\ \hline \multicolumn{2}{c}{ReLU}\\ \hline \multicolumn{2}{c}{Conv4: 144 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$144\times3\times3$ conv} & ${\mathbf w}_{4} \doteq {\mathbf p}_{4}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{4}(1\times1\times3)\otimes{\mathbf t}_{4}(144\times1\times1)$\\ & $144\times3\times3$ conv \\ \hline \multicolumn{2}{c}{Batch Normalization + ReLU + Max Pool ($\frac{1}{2})$}\\ \hline \multicolumn{2}{c}{Conv5: 256 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$144\times3\times3$ conv} & ${\mathbf w}_{5} \doteq {\mathbf p}_{5}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{5}(1\times1\times3)\otimes{\mathbf t}_{5}(144\times1\times1)$\\ & $144\times3\times3$ conv \\ \hline \multicolumn{2}{c}{ReLU}\\ \hline \multicolumn{2}{c}{Conv6: 256 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$256\times3\times3$ conv} & ${\mathbf w}_{6} \doteq {\mathbf p}_{6}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{6}(1\times1\times3)\otimes{\mathbf t}_{6}(256\times1\times1)$\\ & $256\times3\times3$ conv \\ \hline \multicolumn{2}{c}{Batch Normalization + ReLU + Max Pool ($\frac{1}{2})$}\\ \hline \multicolumn{2}{c}{Conv7: 256 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$256\times3\times3$ conv} & ${\mathbf w}_{7} \doteq {\mathbf p}_{7}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{7}(1\times1\times3)\otimes{\mathbf t}_{7}(256\times1\times1)$\\ & $256\times3\times3$ conv \\ \hline \multicolumn{2}{c}{ReLU}\\ \hline \multicolumn{2}{c}{Conv8: 484 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$256\times3\times3$ conv} & ${\mathbf w}_{8} \doteq {\mathbf p}_{8}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{8}(1\times1\times3)\otimes{\mathbf t}_{8}(256\times1\times1)$\\ & $256\times3\times3$ conv \\ \hline \multicolumn{2}{c}{ReLU}\\ \hline \multicolumn{2}{c}{Conv9: 484 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$484\times3\times3$ conv} & ${\mathbf w}_{9} \doteq {\mathbf p}_{9}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{9}(1\times1\times3)\otimes{\mathbf t}_{9}(484\times1\times1)$\\ & $484\times3\times3$ conv \\ \hline \multicolumn{2}{c}{Batch Normalization + ReLU + Max Pool ($\frac{1}{2})$}\\ \hline \multicolumn{2}{c}{Conv10: 484 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$484\times3\times3$ conv} & ${\mathbf w}_{10} \doteq {\mathbf p}_{10}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{10}(1\times1\times3)\otimes{\mathbf t}_{10}(484\times1\times1)$\\ & $484\times3\times3$ conv \\ \hline \multicolumn{2}{c}{ReLU}\\ \hline \multicolumn{2}{c}{Conv11: 484 filters, each filter constituted as:}\\ \hline \multirow{3}{*}{$484\times3\times3$ conv} & ${\mathbf w}_{11} \doteq {\mathbf p}_{11}(1\times3\times1) \otimes$\\ & ${\mathbf q}_{11}(1\times1\times3)\otimes{\mathbf t}_{11}(484\times1\times1)$\\ & $484\times3\times3$ conv \\ \hline \multicolumn{2}{c}{Batch Normalization + ReLU + Max Pool ($\frac{1}{2})$}\\ \hline \multicolumn{2}{c}{FC 1024 + Batch Normalization + ReLU}\\ \hline \multicolumn{2}{c}{FC 512 + Batch Normalization + ReLU}\\ \hline \multicolumn{2}{c}{FC 2}\\ \hline \multicolumn{2}{c}{Soft-Max}\\ \hline \end{tabular} \end{center} \end{table} \begin{figure} \centering \includegraphics[width=1\columnwidth]{MNIST.png} \caption{Comparison of test accuracy on the MNIST dataset.} \label{MNIST} \end{figure} \begin{figure} \centering \includegraphics[width=1\columnwidth]{CIFAR10.png} \caption{Comparison of test accuracy on the CIFAR10 dataset.} \label{CIFAR10} \end{figure} \begin{figure} \centering \includegraphics[width=1\columnwidth]{DogAndCat.png} \caption{Comparison of test accuracy on the `Dog and Cat' dataset.} \label{DogAndCat} \end{figure} \ifCLASSOPTIONcaptionsoff \newpage \fi
\section{Introduction} \label{Intro} Modern statistics is experiencing the growth of machine learning techniques, such as Classification and Regression Trees (CART) [\ref{breiman1984}], and Random Forests [\ref{breiman2001}], which can be applied to a wide range of statistical problems. In order to use these techniques to answer relevant statistical questions, it is appropriate to highlight some important features of many machine learning methods. These methods are largely about making good predictions and finding the model that fits the data best. Furthermore, their importance lies in the ability to deal with complex datasets, where the number of units is large, as well as the number of features connected with a single unit. In this framework, causality is often de-emphasized. However, in the last decades, the availability of increasingly larger datasets has brought to the attention a new important problem for causal inference, which machine learning techniques can ``easily'' solve. As a matter of fact, the necessity to deal with problems connected with the heterogeneity of the treatment effects is stronger than in the past: the availability of large datasets makes it possible to customize causal effect estimates for population's subsets and even for individuals. In the past, the analysis subsets for causal inference problems were specified in advance by trials' protocols, while with the new machine learning technique presented in this paper, the subsets are selected by the algorithm itself in a data-driven way. Classical approaches to the analysis of heterogeneous effects are non-parametric methods, such as nearest neighbour matching method, kernel method, and series estimation [\ref{wagerathey2017}]. These techniques usually offer good results in terms of estimation abilities. The drawback is that they perform well as far as the number of covariates is low. Machine learning techniques outperform other non-parametric methods when the number of covariates is relatively high. This can be seen as the reason that led recently to the application of machine learning techniques to causal discovery and inference. A good example of the use of machine learning techniques in these fields, and a very important inspiration for the present work, is the recently published paper [\ref{atheyimbens2015}], where an adaptation to causal inference of CART in its regression version, named Causal Tree (henceforth, CT), was developed to estimate causal effects with instrumental variables. While the goal of the method proposed in [\ref{atheyimbens2015}] is very similar to the one of the algorithm we develop in this paper (namely, to draw proper causal inference in the presence of irregular assignment mechanisms), the CT algorithm can identify the heterogeneity of causal effects with respect to a particular subset of selected covariates, where the selection needs to be done by the researcher herself. Conversely, our algorithm, named Causal Tree with Instrumental Variable (henceforth, CT-IV), provides a data-driven way to shed light on the heterogeneity of the treatment effects. The paper is structured as follows. Section \ref{Causal} provides a background on the causal inference framework, its link with machine learning as it is modeled via the CT algorithm, and basic concepts about instrumental variables. In Section \ref{unconfounded}, we describe our proposed CT-IV algorithm. In Section \ref{synth}, we provide a comparison on synthetic data between the CT and CT-IV algorithms in the presence of an irregular assignment mechanism, showing numerically advantages of the latter. Section \ref{assess} concludes the paper with a case study on firm level data where the proposed algorithm is used to assess the heterogeneity of the effects of an employment policy implemented by the Tuscan Regional Administration (Italy). \vspace{-0.25cm} \section{Background} \label{Causal} \textbf{A. Rubin's Causal Model.} In order to set up the method presented in this paper, it is important to remind some notions and notations of Rubin's potential outcome framework [\ref{rubin1974}, \ref{rubin1980}]. Rubin's framework is the milestone of causal inference. Together with the Pearl's causality approach [\ref{pearl2009}], it is the most widely used model in the scientific literature about causal inference. Given a set of $N$ units, indexed by $i=1,...,N$, let $W_i$ be the binary indicator of the receipt of the treatment: \begin{equation}\label{eq:1} \small W_i \in \{0,1\}. \end{equation} In order to develop a proper causal inference framework, one needs to assume that the potential outcomes for any unit do not vary with the treatments assigned to other units, and that, for each unit, there are no different forms or versions of each treatment level, which may lead to different potential outcomes [\ref{rubin1974}, \ref{rubin1980}]. This assumption is referred in the literature as the Stable Unit Treatment Value Assumption (henceforth, SUTVA). Given SUTVA, one can postulate the existence of a pair of potential outcomes for each unit: \begin{equation} \small Y_i^{obs}= Y_i(W_i)=\begin{cases} Y_i(0) & \text{if} \;\;\;\; W_i=0, \\ Y_i(1) & \text{if} \;\;\;\; W_i=1. \end{cases} \end{equation} Starting from the notion of potential outcomes, one can define a unit-level causal effect as the difference between the potential outcome under treatment and the one under control: \begin{equation} \small \tau_i= Y_i(1) - Y_i(0). \end{equation} The problem of this approach to causal inference is that one can observe just one potential outcome for every unit. It is impossible to observe both potential outcomes for the same unit at the same time. Therefore, from this perspective, causal inference is a \textit{missing data problem} [\ref{ir2015}]. Is it then impossible to estimate any causal effect? No, it is not but, in orded to draw proper causal inference, one needs to introduce the central concepts of the Rubin's Causal Model [\ref{ir2015}]. Let $X_i$ be the vector of features (usually called also \textit{covariates} or \textit{pre-treatment} variables) associated with the $i$-th unit, and known not to be affected by the treatment. Let $\bold{X}$ be the $N \times K$ matrix of covariates values (where $N$ is the number of units, and $K$ the number of covariates per unit), ${W}$ the $N$-dimensional vector of binary assignments to the treatment, and ${Y\text{(0)}}$ and ${Y\text{(1)}}$ the $N$-dimensional vectors of potential outcomes. Imbens and Rubin [\ref{ir2015}] define the \textit{assignment mechanism} $P({W}|\bold{X}, {Y\text{(0)}}, {Y\text{(1)}})$, the \textit{unit level assignment probability} $p_i(\bold{X},{Y\text{(0)}}, {Y\text{(1)}})$ and the \textit{propensity score} $e(x)=P(W_i=1|X_i=x)$, which is the probability for a unit to be treated, conditional on its covariates [\ref{rosenbaum1983}]. Following [\ref{ir2015}], one defines a \textit{classical randomized experiment} as an assignment mechanism that has the following 4 properties: \begin{enumerate} \item it is \textit{individualistic}, meaning that the treatment assignment for any unit is a function only of its own covariates and potential outcomes; \item it is \textit{probabilistic}, meaning that the unit level assignment probability belongs to the open interval $(0,1)$; \item it is \textit{unconfounded}, meaning that it does not depend on the potential outcomes; \item it has a functional form that is \textit{known} (and, to some extent, controlled) by the researcher. \end{enumerate} Suppose that one is interested in the population average treatment effect: \begin{equation} \small \tau^p=\mathbb{E}[Y_i(1)-Y_i(0)]={ \mu}(1) - { \mu}(0), \end{equation} where ${ \mu}(1)$ is the expected value of $Y_i(1)$, and ${ \mu}(0)$ is the expected value of $Y_i(0)$. In the case of a classical randomized experiment, an unbiased estimator of $\tau^p$ is: \begin{equation} \small \hat{\tau} = \hat{ \mu}(1) - \hat{ \mu}(0). \end{equation} In the equation above, $\hat{ \mu}(1) = {1 \over N_1} \sum_{i:W_i=1}Y_i^{obs}$, where $N_1$ is the number of units assigned to the treated group, and $\hat{ \mu}(0) = {1 \over N_0} \sum_{i:W_i=0}Y_i^{obs}$, where $N_0$ is the number of units assigned to the control group. Finally, $\sum_{i\in \{0,1\}}N_i=N$. By relaxing the fourth property of a known assignment mechanism, one ends up in a scenario that [\ref{ir2015}] defines as a \textit{Regular Assignment Mechanism}. Is it possible in such a scenario to still draw causal inference? The central property that needs to be invoked in order to do so is the unconfoundedness property 3) defined above. Unconfoundedness can be formalized as the conditional independence of the assignment variable $W_i$ to the potential outcomes given (conditioning on) the covariates vector: \begin{equation}\label{eq:unconf} \small W_i \independent \left( Y_i(0), Y_i(1)\right) | X_i. \end{equation} The importance of this assumption is that, conditional on covariates, one can treat observations as they were coming from a randomized experiment. Let the Conditional Average Treatment Effect (CATE) be defined as: \begin{equation} \small \tau(x)=\mathbb{E}[Y_i(1)-Y_i(0)|X_i=x] = \mu(1, x) - \mu(0, x), \label{cate} \end{equation} where $\mu(w, x)$ is the expected value of $Y_i(W_i=w)$ given $X_i=x$. Then it can be proven, by the law of iterated expectations, that: \begin{equation} \small \tau^{p}=\mathbb{E}[Y_i(1)-Y_i(0)]=\mathbb{E}[\tau(X_i)]=\mathbb{E}[\mu(1, x) - \mu(0, x)]. \end{equation} It follows that $\tau^p$ is identified if $\mu(1,x)$ and $\mu(0,x)$ are identified over the support of $\bold{X}$. Under unconfoundedness, it can be proven that $\mu(1,x)$ and $\mu(0,x)$ are identified [\ref{atheyimbens2015}]. This gives the possibility to the researcher, if all the important confounding covariates are present in the data, to draw causal inference even when the assignment mechanism is not randomized but is regular. This is the typical case of observational studies, where the researcher does not know beforehand the assignment mechanism (i.e., property 4) above does not hold). Moreover, in observational studies, the assignment to the treatment may be different from the receipt of the treatment. In this scenario, where one allows for non-compliance between the treatment assigned and the treatment received, one can assume that the assignment is itself unconfounded, while the receipt is confounded. Following [\ref{ir2015}], this assignment mechanism is named \textit{Irregular Assignment Mechanism}. How to draw inference in the presence of an irregular assignment mechanism will be the focus of Subsection II.C, and also the focus of our applied machine learning algorithm in Section \ref{unconfounded}. Going back to the CATE, there is a variety of reasons for researchers to conduct estimation of $\tau(x)$ (see formula (\ref{cate})). One is strictly related to the magnitude of the benefits of the treatment which can vary with the features of the individuals. For instance, one can imagine the extreme case where the average treatment effect of a drug is positive on the overall population (in terms of curing a specific disease), but for a sub-population of patients, with certain characteristics, the average treatment effect is ineffective, or even negative. For these reasons, it is important to find a proper way to estimate causal effects not only on the entire population, but also on specific subsets of the population. \vspace{0.3cm} \textbf{B. Regression Trees for Causal Inference.} Machine learning offers new ways to investigate heterogeneous effects (i.e., ones that depend on the covariates vector $X_i$, see (\ref{cate})), as suggested in \ref{atheyimbens2015}, \ref{wagerathey2017}]. Machine learning techniques developed so far in the literature can provide a useful tool to achieve this goal, in scenarios where the assignment mechanism is randomized or is regular. A machine learning technique that was applied to this task is the CART method [\ref{breiman1984}]. CART is suitable for this goal because, on one side, it is a fully supervised machine learning technique but, on the other side, it is a pretty flexible method that can be adapted to various learning tasks. Here, due to page constraints, we limit to provide an overview of the basic ideas behind such method, referring the reader to [\ref{breiman1984}] for other details about it. The primary goal of CART is to estimate the conditional expectation of an observed outcome on the basis of the information on features and outcomes for units in the training sample, and to compare the resulting estimates on a test sample. Practically, one can estimate these values by building a suitable tree (a classification or a regression tree, depending on the specific problem). The different admissible tree models one can construct entail alternative splits of the tree, based on the values of the features in the data. A possible way to choose the best among various admissible trees is provided by the following procedure, whose initial step consists in dividing the dataset into two different samples: \\ \textit{a)} a first sample, called training sample (or training set), which is used to construct a maximal depth tree, performing the splits using an in-sample goodness-of-fit measure $Q^{is}$. The size of this training sample is indicated by $N^{tr}$. Then, the maximal depth tree is pruned, with the aim of maximizing another criterion function $Q^{crit}$, for various choices of a suitable penalty parameter $\alpha > 0$ on which $Q^{crit}$ depends;\\ \textit{b)} a second sample, called validation sample (or validation set), which is used, for each choice of $\alpha$, to validate the associated pruned tree, through the use of an out-of-sample goodness of fit $Q^{oos}$. This second sample size is indicated by $N^{va}$. Here, we consider the case in which a single training set and a single validation set are used. In the machine learning literature, this procedure is called the holdout method, and is particular form of cross-validation. In this case, $\alpha$ is chosen by maximizing $Q^{oos}$ with respect to it, and the tree itself is re-trained using the full dataset, for the resulting value of $\alpha$. Finally, a different sample, called test sample (or test set), with cardinality $N^{te}$, is used to assess the performance of the resulting model. In the following, we describe the Causal Tree (CT) method [\ref{atheyimbens2015}], which is a modification of the original CART method in its regression version, tailored to causal inference. The CT method differs from CART from the following features: \begin{enumerate}[a.] \item the CATE transformation of the outcome; \item a rework of the in-sample goodness of fit; \item a rework of the out-of-sample goodness of fit. \end{enumerate} \subsubsection{The CATE Transformation} First of all, one needs to address the big issue of constructing an algorithm that leads to an accurate estimate $\hat{\tau}(x)$ of the conditional average treatment effect. In an ideal world, one would measure the quality of the estimator by looking at the value of the following goodness of fit measure, defined in terms of the mean squared error: \begin{equation}\label{infeasible} \small Q^{infeas}(\hat{\tau})= - \mathbb{E}[(\tau_i-\hat{\tau}(X_i))^2], \end{equation} However, it is infeasible to estimate the value of $Q^{infeas}$, because one does not know the values of both potential outcomes for each unit, as $\tau_i$ is unobservable. To address this issue, one can transform the observed outcome using the treatment indicator variable $W_i$ and the propensity score $e(X_i)$, as proposed by Athey and Imbens [\ref{atheyimbens2015}]: \begin{equation}\label{eq:10} \small Y_i^*=Y_i^{obs} \cdot {{W_i- e(X_i)}\over{(1-e(X_i)) \cdot e(X_i)}}. \end{equation} Since $Y_i^{obs}$ is equivalent to $Y_i(W_i)$ then, using (\ref{eq:1}), one can express (\ref{eq:10}) as: \begin{equation} \label{eq:13} \small Y_i^*=Y_i(1) \cdot {W_i \over e(X_i)} - Y_i(0) \cdot {{(1-W_i)} \over {(1-e(X_i))}}. \end{equation} What is the strength of this transformation? Athey and Imbens prove that, if the unconfoundedness assumption holds, then: \begin{equation}\label{eq:12} \small \mathbb{E}[Y_i^*|X_i=x]= \tau(x), \end{equation} where $Y_i^*$ in (\ref{eq:13}) is computed replacing the propensity score $e(X_i)$ with its suitable estimate $\hat{e}(X_i)$ (obtained, e.g., via logistic regression). However, there are some issues in building a tree using a straightforward transformation of the outcome like $Y_i^*$. In fact, Athey and Imbens argue that the within a leaf sample average of the transformed outcome $Y_i^*$ is not the most efficient estimator of the treatment effect and, moreover, that the proportion of treated and control units within a leaf can be quite different from the overall sample proportion. An easy way to solve this issue, proposed in [\ref{atheyimbens2015}], is to weight the CATE transformation in a matter similar to the one developed in [\ref{hirano2003}]. Every partition of the covariates space is identified by a set of leaves, and the treatment effect for the covariates vector $X_i$ belonging to a generic leaf $\mathbb{X}_j$ is estimated as\footnote{Likewise next formulas (\ref{IV}) and (\ref{IV_propensity}), (\ref{cace_leaf}) can be applied also to the validation sample and to the entire (training and validation) sample $\Omega$, replacing the superscript ``\textit{tr}'', respectively, with ``\textit{va}'' and ``$\Omega$''.}: \begin{eqnarray} \label{cace_leaf} \small \hat{\tau}^{CT}(X_i)&=&{{\sum_{l:X_l^{tr} \in \mathbb{X}_j} Y_l^{obs,tr} \cdot {W_l^{tr} \over \hat{e}(X_l^{tr})}} \over {\sum_{l:X_l^{tr} \in \mathbb{X}_j}{W_l^{tr} \over \hat{e}(X_l^{tr})}}} \nonumber \\ &&- {{\sum_{l:X_l^{tr} \in \mathbb{X}_j} Y_l^{obs,tr} \cdot {(1-W_l^{tr}) \over (1-\hat{e}(X_l^{tr}))}} \over {\sum_{l:X_l^{tr} \in \mathbb{X}_j}{(1-W_l^{tr}) \over (1-\hat{e}(X_l^{tr}))}}}. \end{eqnarray} \subsubsection{In-Sample Goodness of Fit} The second component of the algorithm, which also differs from the corresponding component in the original CART algorithm, is the in-sample goodness of fit. The big issue for defining a proper criterion function for the in-sample goodness of fit is that, in the causal inference framework, the criterion (\ref{infeasible}), and even its sample approximation $-{1\over N^{tr}} \sum_{i=1}^{N^{tr}}(\tau_i-\hat{\tau}(X_i^{tr}))^2$, which is what would be implemented by a direct application of the original CART algorithm, are infeasible. Hence, [\ref{atheyimbens2015}] proposes to approximate (\ref{infeasible}) by: \begin{equation} \small Q^{is}=-{1\over N^{tr}}\sum_{i=1}^{N^{tr}} \hat{\tau}^2(X_i^{tr}), \end{equation} and to use the corresponding criterion function \begin{equation} \small Q^{crit}=Q^{is}-\alpha \cdot \kappa, \end{equation} where $\alpha>0$ is a penalty parameter, and $\kappa$ is the number of leaves in the tree. \subsubsection{Out-of-Sample Goodness of Fit} For cross-validation, there is no big need for any significant additional computational effort, given the fact that one has already obtained an estimate $\hat{\tau}^{CT}$ of the causal effect defined in terms of the training sample (see (\ref{cace_leaf})), and one just needs to compare it with the causal effect drawn from the validation sample used for the cross-validation. One could easily rework the mean squared error with the transformed outcome $Y_i^*$ to get the Transform-The-Outcome (TOT) loss function: \begin{equation} \label{catebased} \small Q^{oos,tot}=-{1\over N^{va}} \sum_{i=1}^{N^{va}}( Y_i^{va,*}-\hat{\tau}(X_i^{va}))^2. \end{equation} The in-sample goodness of fit can be reworked in different ways, following [\ref{atheyimbens2015}]. It looks to us that the TOT-based out-of-sample goodness-of-fit in (\ref{catebased}) fits in a better way in those frameworks in which the number of covariates would lead to very computationally demanding alternative estimators. \subsubsection{Causal Inference with Causal Tree} Due to the specific construction of the Causal Tree, the learning problem reduces to that of estimating the treatment effect in each member of a partition of the covariate space. For the problem of estimating the treatment effect in each leaf of the partition, standard methods are valid. Once one has constructed the tree $\mathbb{T}$, one can consider the leaf that corresponds to the subset $\mathbb{X}_j$ (henceforth, identified with $\mathbb{X}_j$ itself). The tree is defined as a partition of the feature space $\mathbb{X}$, and one can write: \begin{equation} \small \mathbb{T} = \{\mathbb{X}_1,..., \mathbb{X}_{\#(\mathbb{T})}\}, \: {\rm with} \: \bigcup_{j=1}^{\#(\mathbb{T})} \mathbb{X}_j = \mathbb{X}, \end{equation} where $\#(\mathbb{T})$ indicates the number of leaves in the tree. Within the leaf $\mathbb{X}_j$, the average treatment effect is: \begin{equation} \small \tau_{\mathbb{T},\mathbb{X}_j}= \mathbb{E}[Y_i(1) - Y_i(0)|X_i \in \mathbb{X}_j], \end{equation} which can be estimated as follows, by subtracting the average outcome $\overline{Y}_{\mathbb{X}_j}^{obs,te}(0)=\overline{Y}_c^{obs,te}$ on the control units from the average outcome $\overline{Y}_{\mathbb{X}_j}^{obs,te}(1)=\overline{Y}_t^{obs,te}$ on the treated units, both evaluated over the test sample, which is different from the training and validation sample used for the cross-validation: \begin{equation} \small \hat{\tau}_{\mathbb{T},\mathbb{X}_j}= \overline{Y}_{\mathbb{X}_j}^{obs,te}(1) - \overline{Y}_{\mathbb{X}_j}^{obs, te}(0)=\overline{Y}_t^{obs,te} - \overline{Y}_c^{obs, te}. \end{equation} One can also estimate, for each leaf $\mathbb{X}_j$, the variance of this estimator using the following Neyman estimator [\ref{neyman1934}]: \begin{equation}\label{Neyman} \small \hat{\mathbb{V}}^{Neyman}_{\mathbb{T},\mathbb{X}_j}= { s^{te,2}_{t,{\mathbb{X}_j}} \over N^{te}_{t,{\mathbb{X}_j}}} + {s^{te,2}_{c,{\mathbb{X}_j}} \over N^{te}_{c,{\mathbb{X}_j}}}, \end{equation} where $s^{te,2}_{t,{\mathbb{X}_j}}$ represents the sample variance of the treated group in the test set, $N^{te}_{t,{\mathbb{X}_j}}$ its size, $s^{te,2}_{c,{\mathbb{X}_j}}$ the sample variance of the control group in the test set, and $N^{te}_{c,{\mathbb{X}_j}}$ its size. This estimator of the variance is unbiased, with respect to the finite-sample distribution of the test sample, if the treatment effect can be assumed to be \textit{additive and constant} within a leaf [\ref{ir2015}]. However, it can be used to construct confidence intervals only under the normal approximation, which is typically reliable when the number of units inside a leaf is large enough. % % \vspace{0.3cm} \textbf{C. General Instrumental Variable Framework.} \label{geniv} In observational studies, the assignment mechanism may be irregular. For example, dependence on the assignment of the potential outcomes may be not ruled out even after conditioning on a rich set of covariates. These are the cases where the unconfoundedness assumption is violated. In these settings, instrumental variable methods [\ref{ir2015}] can still help to estimate causal effects. To briefly make the context clear, one can consider the following example of an irregular assignment mechanism, for which, in a study population of $N$ units, a certain number of individuals are randomized to receive a treatment (read a drug), but not all the units that are assigned to receive it are actually treated. Let us denote by $W_i$ the receipt of the treatment, and by $Z_i$ the assignment to the treatment (instrumental variable). Throughout this paper, we will assume both the $W_i$ and $Z_i$ to be binary, even if one could get similar results by relaxing this assumption. In the following, $W_i(Z_i)$ represents the treatment received as a function of the treatment assigned. This leads one to distinguish four different sub-populations $G_i$ of units: those that always comply with the assignment (compliers), those who never comply with the assignment (defiers), those that even if not assigned to the treatment take it (always-takers), and those who do not take the treatment even if assigned to it (never-takers). Formally, one can highlight these sub-populations as follows: \begin{enumerate} \small \item Compliers ($G_i=C$): $W_{i}(Z_i=0)=0$ and $W_{i}(Z_i=1)=1$; \item Defiers ($G_i=D$): $W_{i}(Z_i=0)=1$ and $W_{i}(Z_i=1)=0$; \item Always-takers ($G_i=AT$): $W_{i}(Z_i=0)=1$, $W_{i}(Z_i=1)=1$; \item Never-takers ($G_i=NT$): $W_{i}(Z_i=0)=0$, $W_{i}(Z_i=1)=0$. \end{enumerate} \normalsize \par How can one conduct causal inference in such a setting, if one decides to use the CART method? The first thing to do is to assume the classical Instrumental Variable (IV) assumptions to hold [\ref{ir2015}]: monotonicity, existence of compliers, unconfoundedness of the instrument, and exclusion restriction. These four assumptions can be written in detail as follows: \begin{enumerate} \item monotonicity: $W_i (1) \geq W_i (0)$; \item existence of compliers: $ P(W_{i}(0)<W_{i}(1))>0$; \item unconfoundedness of the instrument (expressed in terms of conditional independence notation): $Z_i \independent (Y_i(0,0), Y_i(0,1), Y_i(1,0),Y_i(1,1 ),W_i(0), W_i(1))$; \item exclusion restriction: $Y_i(0) = Y_i(1), \ \ {\rm for } \ G_i \in \{AT,NT\}$ where, for each sub-population and $z \in \{0,1\}$, the shortened notation $Y_i(z)$ is used to denote $Y_i(z, W_i(z))$. \end{enumerate} The monotonicity assumption leads us to exclude the existence of units that do exactly the opposite of what they are assigned to (read defiers). In the case of one-sided noncompliance, when units that are not assigned to take the drug cannot take it, this assumption is automatically satisfied as $W_i(0) = 0$ for each unit, excluding the presence of defiers and always-takers. In the case of two-sided noncompliance, when treated and control units can access the opposite treatment status, the monotonicity assumption is very plausible but not directly verifiable. The second assumption is the so-called ``existence of compliers'' assumption. This assumption states that the sub-population of compliers exists with positive probability. The third assumption states that the instrument is unconfounded. As we saw in Section \ref{Causal}, the importance of unconfoundedness is that, conditional on covariates, the assignment to the treatment is as good as if the assignment mechanism was randomized. The last but not least assumption is the exclusion restriction, which rules out any direct effect of $Z_i$ on $Y_i$. According to this assumpton, there is no effect of the assignment on the outcome, in the absence of an effect of the assignment of the treatment on the treatment received, being the treatment of primary interest. \indent 1) {\em Complier Average Causal Effect:} \label{CACE} In the setting above, what ``one can get from the data'' (without invoking any of the previous assumptions) is the Intention To Treat $ITT_Y$, which is defined as the effect of the intention to treat a unit on the outcome of the same unit (effect of the assignment): \begin{equation}\label{super_IV} \small ITT_Y=\mathbb{E}[Y_i|Z_i=1] - \mathbb{E}[Y_i|Z_i=0]. \end{equation} If one does not assume any of the classical IV assumptions above to hold, then the global $ITT_Y$ may be written as the weighted average of the $ITT_Y$ effects across the four sub-populations of compliers, defiers, always-takers and never-takers: \begin{equation} \small ITT_Y = \pi_C ITT_{Y,C} + \pi_D ITT_{Y,D} + \pi_{NT} ITT_{Y,NT} + \pi_{AT} ITT_{Y,AT}, \end{equation} where $ITT_{Y,G}$ ($G=C, D, NT, AT)$ is the effect of the treatment assignment on units of type $G$ and $\pi_G$ is the proportion of units of type $G$. We can then proceed by adding step by step the four assumptions. The first assumption that we impose is the exclusion restriction. If it holds, then we get \begin{equation} \small ITT_{Y,AT}=ITT_{Y,NT}=0, \end{equation} since, for both always-takers and never-takers, one has \begin{equation} \small Y_i(1)-Y_i(0)=0. \end{equation} If for an individual the assignment has no effect on the treatment received, then it has also no effect on the outcome. This is a substantial assumption, and is not implied by the design. It is generally stated as the assignment not affecting the outcome other than through the treatment received, as we saw above. Such an assumption can be used to attribute the effect of assignment to the treatment received as follows, taking into account only compliers and defiers: \begin{equation} \small ITT_Y = \pi_C ITT_{Y,C} + \pi_D ITT_{Y,D}. \end{equation} Under monotonicity, we rule out the existence of defiers: $\pi_{D}=0$. If we add the unconfoundedness assumption, we can estimate the distribution of compliance types as follows: \begin{enumerate}[a.] \item $\pi_{AT} = P(W_i(0) = W_i(1) = 1) =\mathbb{E}[W_i|Z_i = 0]=\mathbb{E}[W_i(0)]$, estimated as $\hat{\pi}_{AT}=\frac{1}{N_0}\sum_{i=1}^N (1-Z_i)W_i$; \item $ \pi_{NT} =P(W_i(0) = W_i(1) = 0) = 1 - \mathbb{E}[W_i|Z_i = 1]=1-\mathbb{E}[W_i(1)] $, estimated as $\hat{\pi}_{NT}=\frac{1}{N_1}\sum_{i=1}^N Z_i (1-W_i)$; \item $ \pi_C = P(W_i(0) = 0, W_i(1) = 1) = \mathbb{E}[W_i|Z_i = 1]-\mathbb{E}[W_i|Z_i = 0] $, estimated as $\hat{\pi}_{C}=\frac{1}{N_1}\sum_{i=1}^N Z_i W_i- \frac{1}{N_0}\sum_{i=1}^N (1-Z_i)W_i$, \end{enumerate} where $N_1$ is the number of units assigned to the treatment and $N_0$ is the number of units assigned to the control. Once one has estimated the distribution of compliers, when one adds also the ``existence of compliers'' assumption, one finally gets: \begin{equation} \small ITT_Y = \pi_C ITT_{Y,C}. \end{equation} From this formula, as being $\pi_C \neq 0$, it comes out that $ITT_{Y,C}$, the so-called Complier Average Causal Effect (CACE), is [\ref{imbens1997}]: \begin{equation} \label{ITT_C} \small ITT_{Y,C} = ITT_Y/\pi_C=\frac{\mathbb{E}[Y_i|Z_i = 1]-\mathbb{E}[Y_i|Z_i = 0]}{\mathbb{E}[W_i|Z_i = 1]-\mathbb{E}[W_i|Z_i = 0]}. \end{equation} In general, the global $ITT_Y$ may be viewed as a lower bound on the treatment effect on the compliers: with the assumptions $\pi_D = 0$, $\pi_C > 0$, and that both $ITT_{Y,NT}$ and $ITT_{Y,AT}$ are strictly less than $ITT_{Y,C}$, one gets $ITT_Y < ITT_{Y,C}$. The complier average treatment effect, $ITT_{Y,C}$, is a local effect, since it makes reference just to the population of compliers, hence it can also be referred as a Local Average Treatment Effect (LATE). It can be estimated as the coefficient associated with the instrumental variable regression [\ref{imbens1994}] as we will see in detail in Subsection III.B. Invoking unconfoundedness, exclusion restriction and monotonicity, one can also infer the outcome distribution for compliers, $\mathbb{E}[Y_i(0)|G_i=C]$, and $\mathbb{E}[Y_i(1)|G_i=C]$. Under the same assumptions, one can estimate the entire marginal distribution of $Y_i(0)$ and $Y_i(1)$ for compliers. \section{Causal Tree with Instrumental Variable} \label{unconfounded} \textbf{A. Causal Tree with Randomized Instrumental Variable.} \label{CT-IVrandomized} In the following, we extend the CT algorithm to the case of an irregular assignment mechanism where the assignment-to-the-treatment variable is itself randomized, but its receipt is not. If we assume the instrumental variable to be randomized, we can draw causal inference from a Causal Tree by making some changes in the structure of the tree. The first difference is that we need to rework the outcome variable, substituting in (\ref{eq:10}) the indicator variable $W_i$ with the instrumental variable $Z_i$, as follows: \begin{equation} \small Y_i^{*,IV}=Y_i^{obs} \cdot {{Z_i- e(X_i)}\over{(1-e(X_i)) \cdot e(X_i)}}, \end{equation} where the propensity score is now reworked as $e(x) = P(Z_i=1|X_i=x)$. In this case, when the assignment mechanism corresponds to a classical randomized experiment, the propensity score is a constant (i.e., $e(x)=p$ for all $x$), and the transformation above simplifies to: \begin{equation} \small Y_i^{*,IV}= {{Y_i(1) \cdot Z_i} \over p}- {{Y_i(0) \cdot (1 - Z_i) } \over {(1-p)}}. \end{equation} Likewise in (\ref{cace_leaf}), one can also use a weighted version of the transformation of the outcome to provide an estimate $\reallywidehat{ITT}_Y(X_i)$ of the intention to treat $ITT_Y$, for $X_i$ belonging to a generic leaf $\mathbb{X}_j$, as follows: \begin{equation} \label{IV} \footnotesize \reallywidehat{ITT}_Y(X_i)={{\sum_{l: X_l^{tr} \in \mathbb{X}_j} Y_l^{obs,tr} \cdot {Z_l^{tr} \over \hat{p}}} \over {\sum_{l: X_l^{tr} \in \mathbb{X}_j}{Z_l^{tr} \over \hat{p}}}}- {{\sum_{l: X_l^{tr} \in \mathbb{X}_j} Y_l^{obs,tr} \cdot {(1-Z_l^{tr}) \over (1-\hat{p})}} \over {\sum_{l: X_l^{tr} \in \mathbb{X}_j}{(1-Z_l^{tr}) \over (1-\hat{p})}}}, \end{equation} where $\hat{p}$ is the estimated value of $p$. Again, following [\ref{hirano2003}], (\ref{IV}) is an unbiased and efficient estimator of (\ref{super_IV}) within every leaf. We also need to rework the in-sample and out-of-sample goodness-of-fit measures: \begin{enumerate}[a.] \item In-sample goodness of fit: \begin{equation}\label{IS_IV} \small Q^{is, IV}=-{1\over N^{tr}}\sum_{i=1}^{N^{tr}} \reallywidehat{ITT}_Y^2(X_i^{tr}); \end{equation} \item Out-of-sample goodness of fit: \begin{equation} \small Q^{oos, IV}=-MSE=-{1\over N^{va}} \sum_{i=1}^{N^{va}}(Y_i^{va,*}-\reallywidehat{ITT}_Y(X_i^{va}))^2. \end{equation} \end{enumerate} For the sake of clarity, here (and in the following subsection), to fit the instrumental variable framework, we have reworked the out-of-sample goodness-of-fit based on TOT (see (\ref{catebased})). This rework could easily be adapted to other out-of-sample goodness-of-fit measures. The last part of our algorithm based on the instrumental variable focuses on the estimation of the complier average treatment effects. As we highlighted before, by using the instrumental variable $Z_i$, we are substantially assuming four different types in our population: compliers, always-takers, never-takers, and defiers. As before, our interest lies on the effect on the compliers. Within every leaf, the complier average causal effect is: \begin{equation} \footnotesize {\tau}^{cace}_{\mathbb{X}_j}=\frac{\mathbb{E}[Y_i|Z_i=1, X_i \in \mathbb{X}_j] - \mathbb{E}[Y_i|Z_i=0, X_i \in \mathbb{X}_j]}{P(G_i=C|X_i \in \mathbb{X}_j)}={ITT_{Y,\mathbb{X}_j} \over \pi_{C,\mathbb{X}_j}}. \end{equation} This formula is analogous to (\ref{ITT_C}), and can be estimated in every leaf assuming the existence of compliers. Then, ${\tau}^{cace}_{\mathbb{X}_j}$ can be estimated as: \begin{equation} \label{cace_leaf1} \small \hat{\tau}^{cace}_{\mathbb{X}_j}={\reallywidehat{ITT}_{Y,\mathbb{X}_j} \over \hat{ \pi}_{C,\mathbb{X}_j}}, \end{equation} where ${ITT}_{Y,\mathbb{X}_j}$ is estimated following (\ref{IV}), and ${ \pi}_{C,\mathbb{X}_j}$ can be estimated as: \begin{equation} \label{pi_c} \small \hat{\pi}_{C,\mathbb{X}_j}=\frac{1}{N_{1, \mathbb{X}_j}}\sum_{i=1}^{N_{\mathbb{X}_j}} Z_i W_i-\frac{1}{N_{0, \mathbb{X}_j}}\sum_{i=1}^{N_{\mathbb{X}_j}} (1-Z_i)W_i, \end{equation} where $N_{1, \mathbb{X}_j}$ and $N_{0, \mathbb{X}_j}$ are the numbers of units assigned respectively to the treated and control group within a certain leaf $\mathbb{X}_j$, and $N_{\mathbb{X}_j}$ is the number of units within the leaf. \vspace{0.3cm} \textbf{B. Causal Tree with Unconfounded Instrumental Variable.} \label{CT-IVunconfounded} Now, we extend the analysis above to the case of an irregular assignment mechanism, where both the assignment and receipt of the treatment are not randomized, but the assignment can be assumed to be unconfounded when conditioning on important covariates. When the instrumental variable is not randomized a priori, the property of unconfoundedness of the instrument does not necessarily hold. If we think of $Z_i$ as our assignment mechanism, then the unconfoundedness of the instrument holds when: \begin{equation} \label{eq:40} \small Z_i \independent ({Y}_i(0), {Y}_i(1)) | {X}_i. \end{equation} Due to the propensity score properties, this assumption holds even conditioning on the propensity score: \begin{equation} \label{eq:41} \small Z_i \independent ({Y}_i(0), {Y}_i(1)) | e({X_i}). \end{equation} When the assumption (\ref{eq:41}) holds, one can rework the transformed outcome variable in a similar way as in the previous subsection, obtaining \small \begin{align} Y_i^*&=Y_i(1) \cdot {Z_i \over e(X_i)} - Y_i(0) \cdot {{(1-Z_i)} \over {(1-e(X_i))}}. \end{align} \normalsize Assuming that the exclusion restriction and the monotonicity assumptions hold, it is possible to provide an estimate $\reallywidehat{ITT}_Y(X_i)$ of the intention to treat $ITT_Y$ for $X_i$ belonging to a generic leaf $\mathbb{X}_j$, as follows: \begin{eqnarray} \label{IV_propensity} \footnotesize \reallywidehat{ITT}_Y(X_i)&=&{{\sum_{l: X_l^{tr} \in \mathbb{X}_j} Y_l^{obs,tr} \cdot {Z_l^{tr} \over \hat{e}(X_l^{tr})}} \over {\sum_{l: X_l^{tr} \in \mathbb{X}_j}{Z_l^{tr} \over \hat{e}(X_l^{tr})}}} \nonumber \\ && - {{\sum_{l: X_l^{tr} \in \mathbb{X}_j} Y_l^{obs,tr} \cdot {(1-Z_l^{tr}) \over (1-\hat{e}(X_l^{tr}))}} \over {\sum_{l: X_l^{tr} \in \mathbb{X}_j}{(1-Z_l^{tr}) \over (1-\hat{e}(X_l^{tr}))}}}, \end{eqnarray} where $\hat{e}(X_l^{tr})$ is the estimated value of $e(X_l^{tr})$. The difference between (\ref{IV}) and (\ref{IV_propensity}) is that, given the complete randomization of the instrument, in (\ref{IV}) the probability $\hat{e}(X_l^{tr})$ was fixed to $\hat{p}$ for any given unit, while in (\ref{IV_propensity}) the assignment-to-the-treatment probability is modelled by the estimated propensity score $\hat{e}(X_l^{tr})$. Finally, the complier average treatment effect in each leaf is still estimated using (\ref{cace_leaf1}), replacing (\ref{IV}) with (\ref{IV_propensity}) to determine the estimate $\reallywidehat{ITT}_{Y,\mathbb{X}_j}$. \subsubsection{Overall CACE} \par Starting from all the leaves, one can reconstruct the overall effect over all of them as a weighted average of the estimates $\hat{\tau}^{cace}_{\mathbb{X}_j}$ over every leaf $\mathbb{X}_j$. One can represent this weighted average as \begin{equation}\label{eq:tau_cace_overall} \small \hat{\tau}^{cace}_{overall}= \sum_{j=1}^{N^{l}} \frac{\hat{\tau}^{cace}_{\mathbb{X}_j} \cdot N^{co}_{\mathbb{X}_j}}{N^{co}}, \end{equation} where $N^{l}$ represents the number of leaves, $N^{co}_{\mathbb{X}_j}$ the number of compliers for every leaf $\mathbb{X}_j$, and $N^{co}$ the overall number of compliers in all the leaves. One can also compute the proportion of compliers in every leaf $\mathbb{X}_j$ simply as: \begin{equation} \small \pi^{co}_{\mathbb{X}_j}= \frac{N^{co}_{\mathbb{X}_j}}{N^{co}}. \end{equation} \subsubsection{Estimating CACE in Every Leaf with Two Stage Least Squares Regressions} \label{2sls} A suitable possibility to estimate the treatment effect in every leaf is to use, within every leaf $\mathbb{X}_j$ of the tree $\mathbb{T}$, the Two Stage Least Squares (henceforth, TSLS) method for the estimation of the effect on the complier population, as it is presented in [\ref{imbens1997}]. If one assumes the receipt of the treatment variable $W_i$ and the instrumental variable $Z_i$ to be binary variables, our problem can be expressed in terms of 2 simultaneous regressions: \small \begin{align} \label{IV_reg} Y_i^{obs}&=\alpha + \gamma \cdot W_i + \epsilon_i, \\ \label{IV_reg1} W_i&=\pi_0 + \pi_1 \cdot Z_i + \eta_i. \end{align} \normalsize In the econometric terminology, the explanatory variable $W_i$ is $endogenous$, while the IV variable $Z_i$ is $exogenous$. \par The logic of IV regression is that one can estimate the above two reduced form regressions in the case of a single instrument by least squares. In particular, one can estimate $\tau^{CACE}$ through TSLS, as the following ratio [\ref{ir2015}, \ref{imbens1997}]: \begin{equation} \label{eq:52} \small \hat{\tau}^{CACE}=\hat{\tau}^{IV}=\frac{\hat{\gamma}}{\hat{\pi}_1}=\frac{\reallywidehat{ITT}_Y}{\hat{ \pi}_C}, \end{equation} where $\hat{\tau}^{IV}$ is an unbiased estimator of the average causal effect on the population of compliers. If one runs a TSLS regression within every leaf $\mathbb{X}_j$ of the tree $\mathbb{T}$, then one is able to obtain an estimate $\hat{\tau}^{cace}_{\mathbb{X}_j}$ for every such leaf. A possible extension of (\ref{IV_reg1}) would be to include in the first stage regression all the possible confounding variables available in the dataset (in this case, $\pi_2 \cdot X_i$ denotes a scalar product): \begin{equation} \small W_i=\pi_0 + \pi_1 \cdot Z_i + \pi_2 \cdot X_i + \eta_i. \end{equation} The idea is that, if the instrument is unconfounded only conditional on confounding variables, then one could include these covariates in the estimation of the treatment effect on the complier population within each leaf. \par In every leaf, using the TSLS method, we can also obtain an estimate of the variance of our $\hat{\tau}^{cace}_{\mathbb{X}_j}$ estimator, which corresponds to the Neyman estimated variance $\hat{\mathbb{V}}^{Neyman}_{\mathbb{T},\mathbb{X}_j}$ for the leaf $\mathbb{X}_j$ of the tree $\mathbb{T}$ (see (\ref{Neyman})). \vspace{0.3cm} \textbf{C. The CT-IV Algorithm.} \label{algorithm} Our proposed CT-IV algorithm is summarized as follows. \line(1,0){240} \textbf {Causal Tree with Instrumental Variable (CT-IV)} \\ \footnotesize Inputs: $N$ units $i$ $(X_i, Z_i, W_i, Y_i^{obs})$, where $X_i$ is the feature vector, $Z_i$ is treatment assignment (instrumental variable), $W_i$ is the treatment receipt, and $Y_i^{obs}$ is the observed response. Outputs: 1) a Causal Tree (determined by the use of the instrumental variable), and 2) estimates of the Complier Average Causal Effects on its leaves. \begin{enumerate} \item First Step of the Algorithm (Building the Tree) \begin{itemize} \item Draw a random subsample from $\Omega$ without replacement and divide it into two disjoint sets: a training set ($\Omega^{tr}$) and a validation set ($\Omega^{va}$) of size $\sum_{k}{\Omega_k}=\Omega$ with $k \in \{tr, va\}$. \item Grow a Causal Tree, following the next procedure to take into account the presence of the instrumental variable $Z_i$: \renewcommand{\theenumii}{\roman{enumii}} \begin{enumerate} \item estimate the propensity $e(x)=P(Z_i=1 | X_i = x)$ of getting assigned to the treatment; \item drop units with an estimated propensity score below 0.1 or above 0.9 (in order not to weight too much units with extreme values of the estimated propensity score); \item grow a tree by maximizing the following in-sample goodness-of-fit criterion, for several values of $\alpha > 0$: \begin{equation*} Q^{crit, IV}=-{1\over N^{tr}}\sum_{i=1}^{N^{tr}} \reallywidehat{ITT}_Y^2(X_i^{tr}) - \alpha\cdot \kappa, \end{equation*} where $ \reallywidehat{ITT}_Y(X_i^{tr})$ is estimated on the training sample as in (\ref{IV}) in the case of randomization of the instrument or as in (\ref{IV_propensity}) if the instrument is not randomized, $\alpha$ is the penalty parameter, and $\kappa$ is the number of leaves, which measures the complexity of the model; \item cross-validate the tree, using the following out-of-sample goodness of fit: \begin{equation*} Q^{oos, IV}=-MSE=-{1\over N^{va}} \sum_{i=1}^{N^{va}}(Y_i^{va,*} - \reallywidehat{ITT}_Y(X_i^{va}))^2 \end{equation*} where $ \reallywidehat{ITT}_Y(X_i^{va})$ is estimated on the validation sample as in (\ref{IV}) in the case of randomization of the instrument or as in (\ref{IV_propensity}) if the instrument is not randomized. \end{enumerate} \end{itemize} \item Second Step of the Algorithm (Estimating the Complier Average Causal Effects) \begin{itemize} \item The complier average causal effect within a leaf $\mathbb{X}_j$ can be estimated on the entire sample $\Omega$ in two alternative ways: \begin{enumerate}[(a)] \item if $Z_i$ is randomized (Subsection III.A) then one can directly estimate the complier average causal effect within every leaf as: \begin{equation*} \hat{\tau}^{cace}_{\mathbb{X}_j}={\reallywidehat{ITT}_{Y,\mathbb{X}_j} \over \hat{ \pi}_{C,\mathbb{X}_j}} \end{equation*} where $ \reallywidehat{ITT}_{Y, \mathbb{X}_j}$ is estimated as in (\ref{IV}) and $\hat{ \pi}_{C,\mathbb{X}_j}$ is estimated following (\ref{pi_c}); \item if $Z_i$ is not randomized but can be assumed to be unconfounded (Subsection III.B) then run a TSLS conditioning on the confounding covariates in the first stage regression. \end{enumerate} \end{itemize} \end{enumerate} \line(1,0){255} \vspace{0.1cm} \normalsize \section{Comparison of the CT and CT-IV Algorithms on Synthetic Data} \label{synth} In this section, we conduct simulations on synthetic data, to compare the performance of the proposed CT-IV algorithm with that of CT. As goodness-of-fit measure, we use the opposite of the Mean Squared Error of prediction (MSE) on the test set, and to assess the relative performance of the two algorithms, we consider the following relative gap measure based on such MSE [\ref{wanglihopp2017}]: \begin{equation} \small Relative\,Gap = \frac{MSE_{CT} - MSE_{CT\textit{-}IV}}{MSE_{CT}} \times 100. \end{equation} Moreover, we run some robustness checks. In this section, our focus will be also on what happens in presence of a weak instrument, namely when the instrument $Z_i$ is weakly correlated with the treatment variable, and when the instrument directly affects the outcome. While the presence of weak instruments is directly testable (typically, with an F-test on the first stage regression), what is not testable and could be potentially harmful is a violation of the exclusion restriction at the leaf level. Alternative algorithms, such as the one in [\ref{wanglihopp2017}], take into account the exclusion restriction just at a general level while, in this paper, we take into account that assumption at the leaf level. In a non-synthetic scenario, this assumption is not directly testable, but our algorithm seems to be more ``transparent'' than other algorithms by taking into account possible violations of this assumption. \vspace{0.3cm} \textbf{A. Synthetic Data Construction.} To compare our CT-IV algorithm with the CT one, we first consider some scenarios where the assignment mechanism is irregular. As we saw in Subsection II.C, this means that the assignment to the treatment is randomized, but the receipt of the treatment is not. The general model that we use for our data simulation is built by considering the following variation of the typical IV setting reported in (\ref{IV_reg}) and (\ref{IV_reg1}). The major differences are that we introduce in the main equation (\ref{IV_reg3}) a nuisance term $\eta_i$ and an interaction term between regressors and the treatment indicator, in order to \textit{heterogenise} the treatment effects. The nuisance term $\eta_i$ can be thought as a not-observable feature that affects both the treatment assignment and the outcome. The general setting looks as follows: \vspace{-0.4cm} {\small \begin{align} \label{IV_reg3} Y_i^{obs}&= 1 + f(X_i^{out}) + W_i + W_i \cdot g(X_i^{tre}) + \eta_i + \epsilon_i, \\ \label{IV_reg2} W_i&= Z_i +f(X_i^{out}) + \eta_i, \end{align} } \normalsize \noindent where $X_i = (x_{i1},..., x_{iK})$ is a $K$-dimensional vector of covariates, $X^{out}_i$ highlights those covariates that have an effect on the outcome, and $X_i^{tre}$ (with $\{X_i^{tre}\}\subseteq \{X^{out}_i\}$) those covariates that affect the treatment effect. We consider various functional forms for $f$ and $g$ and for the error distribution in the main equation (\ref{IV_reg3}), as well as for $f$ in the first stage equation (\ref{IV_reg2}). The designs investigated (with $K=1$ for design 1, and $K=10$ for the other cases) are reported in Table \ref{sim}. \begin{table \scriptsize \centering \caption{Simulation models} \label{sim} \begin{tabular}{ p{0.3cm}p{6.1cm}p{0.6cm} } \toprule \textbf{\textbf{Design}} & \centering \textbf{Form of the Model} & \textbf{Error} \\ \midrule 1 & $Y_i^{obs}= 1 + X_{i1} + W_i + W_i \cdot X_{i1} + \eta_i + \epsilon_i$ & $ \mathcal{N}(0,1)$ \\ 2 & $Y_i^{obs}= 1 + \sum_{k=1}^{10} X_{ik} + W_i + W_i \cdot \sum_{k=9}^{10}X_{ik} + \eta_i + \epsilon_i$ & $ \mathcal{N}(0,1)$ \\ 3 & $Y_i^{obs}= 1 + \sum_{k=1}^{10} X_{ik} + W_i + W_i \cdot \sum_{k=9}^{10}X_{ik} + \eta_i + \epsilon_i$ & $ Exp(10)$ \\ 4 & $Y_i^{obs}= 1 + \sum_{k=1}^{10} X_{ik} + W_i + W_i \cdot \sum_{k=9}^{10}X_{ik} + \eta_i + \epsilon_i$ & $\mathcal{U}(0,1)$ \\ 5 & $Y_i^{obs}= 1 + \sum_{k=1}^{10} X_{ik} + W_i + W_i \cdot \prod_{k=9}^{10}X_{ik} + \eta_i + \epsilon_i$ & $ \mathcal{N}(0,1)$ \\ \bottomrule \multicolumn{3}{l}{} \\ \end{tabular} \vspace{-0.6cm} \end{table} We train all the five models using incrementally bigger samples, with cardinality ranging from 500 to 50000 (i.e., 500, 1000, 5000, 50000). We implement a holdout cross-validation, assigning half of the observations to the training set (and validation set) and the other half to the test set. We let $X_{ik} \sim\mathcal{N}(0,0.1)$ (considering independent features), $W_i \sim Bern(0.5)$, $Z_i \sim Bern(0.5)$, and the nuisance parameter $\eta_i$ be a white noise. Moreover, we set the correlations between $W_i$ and $Z_i$ and $W_i$ and $\eta_i$ to be respectively $Cor(W_i, Z_i) \simeq 0.65$ and $Cor(W_i, \eta_i) \simeq 0.50$. To make the trees comparable, we set the maximal depth of the tree to be 2, and the minimal leaf size to be one tenth of the sample size. \vspace{0.3cm} \textbf{B. Simulation Results.} The results of the simulations are evaluated in Table \ref{sim_res}, in terms of the mean squared error of prediction on the test set. As one can see from the relative gaps reported in Table \ref{sim_res}, the IV-CT algorithm outperforms the CT one in all the different designs. Comparing the various models by column, one observes that with respect to the baseline case (design 1), the relative gap between the IV-CT and CT algorithms widens as we add covariates (design 2), change the errors distribution (designs 3 and 4), or change the functional form (design 5). Moreover, it is important to notice that, as the sample size increases, the relative gap widens as well. From the values of the MSE it seems that, while the CT performance is quite stable, CT-IV performance increases as the sample size grows larger. This is especially true in designs 1 and 5. \begin{table \scriptsize \centering \caption{Simulation results} \label{sim_res} \begin{tabular}{c c c c c c } \toprule \multirow{2}{*}{\textbf{Design}} & \multirow{2}{*}{\textbf{Approach}} & \multicolumn{4}{c}{\textbf{Sample Size}} \\ \cline{3-6} & & \multicolumn{1}{c}{500} & \multicolumn{1}{c}{1,000} & \multicolumn{1}{c}{5,000} & \multicolumn{1}{c}{50,000} \\ \midrule \multirow{3}{*}{1} & MSE (CT-IV) & 0.369 & 0.038 & 0.067 & 0.066 \\ & MSE (Causal Tree) & 0.857 & 0.727 & 1.073 & 0.973 \\ & Relative Gap & 57\% & 94\% & 94\% & 93\% \\ \midrule \multirow{3}{*}{2} & MSE (CT-IV) & 0.239 & 0.058 & 0.058 & 0.052 \\ & MSE (Causal Tree) & 0.778 & 0.787 & 1.028 & 0.994 \\ & Relative Gap & 69\% & 93\% & 94\% & 95\% \\ \midrule \multirow{3}{*}{3} & MSE (CT-IV) & 0.058 & 0.041 & 0.037 & 0.062 \\ & MSE (Causal Tree) & 0.872 & 1.186 & 1.044 & 1.004 \\ & Relative Gap & 93\% & 97\% & 96\%& 94\% \\ \midrule \multirow{3}{*}{4} & MSE (CT-IV) & 0.072 & 0.053 & 0.051 & 0.050 \\ & MSE (Causal Tree) & 0.851 & 1.052 & 1.098 & 1.004 \\ & Relative Gap & 92\% & 95\% & 95\% & 95\% \\ \midrule \multirow{3}{*}{5} & MSE (CT-IV) & 0.122 & 0.030 & 0.070 & 0.058 \\ & MSE (Causal Tree) & 0.893 & 0.866 & 0.720 & 1.014 \\ & Relative Gap & 86\% & 96\% & 90\% & 94\% \\ \bottomrule \end{tabular} \vspace{-0.4cm} \end{table} \vspace{0.3cm} \textbf{C. Robustness Checks.} Once we have checked that the CT-IV algorithm outperforms the CT algorithm on synthetic data, it is worth asking what happens when some of the assumptions on which the consistency of the CT-IV is built are partially violated. The main problem that can arise when applying the CT-IV method is a well-known issue in the econometric literature, known as the \textit{weak instrument} problem [\ref{stock2002}]. This problem, in our framework, deals with the fact that the number of compliers within every leaf can be particularly small. In an econometric framework, the goal that one would like to achieve is to ensure that $Cor(W_i, Z_i)$ is bounded away from zero. In the following, we test what happens when the instrument is weak on the overall population, and what happens when the exclusion restriction is violated in a specific sub-population. We test these violations on the second model design in Table \ref{sim}. In particular, we assume 2 different scenarios. In the first scenario, we let the instrument be weak on the overall population, by setting $Cor(W_i, Z_i) \simeq 0.5 $. In the second scenario, we impose a partial violation of the exclusion restriction, by letting the instrumental variable $Z_i$ directly affect the outcome $Y_i$ when the feature $X_{i10}$ satisfies the condition $ X_{i10} \geq 0$. \begin{table \scriptsize \centering \caption{Robustness checks for violations of IV assumptions} \label{rc_res} \begin{tabular}{c c c c c c} \toprule \multirow{2}{*}{\textbf{Scenario}} & \multirow{2}{*}{\textbf{Approach}} & \multicolumn{4}{c}{\textbf{Sample Size}} \\ \cline{3-6} & & \multicolumn{1}{c}{500} & \multicolumn{1}{c}{1,000} & \multicolumn{1}{c}{5,000} & \multicolumn{1}{c}{50,000} \\ \midrule \multirow{3}{*}{1} & MSE (CT-IV) & 0.439 & 0.157 & 0.120 & 0.194 \\ & MSE (Causal Tree) & 0.881 & 0.898 & 1.270 & 1.252 \\ & Relative Gap & 50\% & 82\% & 90\% & 85\% \\ \midrule \multirow{3}{*}{2} & MSE (CT-IV) & 0.198 & 0.040 & 0.118 & 0.143 \\ & MSE (Causal Tree) & 0.244 & 0.329 & 0.452 & 0.311 \\ & Relative Gap & 19\% & 87\% & 74\% & 54\% \\ \bottomrule \end{tabular} \vspace{-0.4cm} \end{table} In this case, the results from the simulations, reported in Table \ref{rc_res}, show that the IV-CT algorithm outperforms the CT even in the presence of weak instruments. It is important to notice that, within every leaf, the weak-instrument test leads to the rejection of the null hypothesis of weak instrument: our algorithm is able to identify those leaves where there is no weak-instrument problem. Moreover, our algorithm is robust even when the exclusion restriction is partially violated (second scenario). In this case, while the CT algorithm shows a better performance compared with the other scenario, by partially reducing the relative gap, the CT-IV still performs better in terms of the mean squared error of prediction. Since the estimation of the causal effects is performed in a second stage with respect to the building of the tree, our algorithm seems to handle in a good way possible problems due to the violation of exclusion restriction within every leaf. This could not hold true if the exclusion restriction is taken into account just at a general level, as in [\ref{wanglihopp2017}]. \section{Case Study} \label{assess} \textbf{A. Programs for the Development of Crafts in Tuscany (Italy).} During the years 2003-2005, the Tuscan Regional Administration (Italy) introduced the ``Programs for the Development of Crafts'' (henceforth, PDC). These programs were aimed at Tuscan small-sized handicraft firms, with the goal of promoting innovation and regional development [\ref{arpino2016}, \ref{mealli2017}]. The firms could access PDC by a voluntary application and eligibility criteria. The objective of PDC was to ease access to credit for small-sized firms to boost investments, sales and employment levels. The PCD call guaranteed soft-loans to the firms that were considered eligible for the grant. The eligibility was evaluated on the basis of an investment project. The minimal admissible investment cost was 25\,000 Euros, and the grant covered 60\% of the financed investment [\ref{mattei2007}]. Among firms participating in the PDC, the large majority of the projects were funded, and the percentage of insolvencies was lower than 3\%. Data are available for firms that received the PDC, firms that applied for the founding but were not eligible, and firms that did not apply for the PDC. For our analysis, we use an integrated dataset including information collected by the ``Artigian Credito Toscano'' and information coming from the archives of the Chamber of Commerce ($2001-2004$). The data are available for $266$ assisted firms (participating in 2003/05 PDC) and $721$ non-assisted firms. The firms in the dataset are operating in 4 economic sectors that comprise the majority of the Tuscan artisan firms: construction; manufacturing activities; wholesale and retail trade; real estate business, rental services, computer, research, business services. The covariates are time-varying covariates, such as sales and employees, and time-invarying covariates, such as location of the firm, year of start-up, legal status, and main distribution channel. The location of each firm is recorded at the provincial level. A central variable for our analysis is the amount of firm's sales in 2002 (pre-treatment year). We created 6 different sales' groups (up to 50,000; 50,000 to 100,000; 100,000 to 250,000; 250,000 to 500,000; 500,000 to 1,000,000; greater than 1,000,000). The dependent variable is a categorical variable that takes the values $1$, $-1$, $0$, respectively, if the number of employees in the firm in the year immediately subsequent to the treatment increased, decreased, or remained the same. The covariate that catches the assignment to the treatment is a dummy variable, which is recorded as 1 if the firm received the financial aid during the two years 2003/2005, and 0 otherwise. However, the treatment variable is not randomized. To draw proper causal inference in this scenario (irregular assignment mechanism), one needs to use an instrumental variable. Luckily, we have data on firms' applications for the funding. This is a good instrument, since those firms that applied for the funding were very likely to get it, and it seems that the application itself should not have affected the outcome (exclusion restriction). Moreover, we know that the population of compliers exists (existence of compliers) and, since this is a case of one-sided non-compliance, defiers are ruled out by the design of the policy (monotonicity). However, the instrument is not randomized and, in order to draw proper causal inference in this scenario, one needs to build a propensity score for the instrument itself, in order for the unconfoundedness assumption to hold. This is a very central point and a main novelty of the approach proposed in this paper. Finally, we discard firms with missing values on relevant variables. The selection procedure leads to a sample of 98 assisted firms and 662 non-assisted firms. \vspace{0.3cm} \textbf{B. Application of the CT-IV Algorithm to Assess Heterogeneous Causal Effects.} In Figure \ref{cartiv}, results are shown for the CT-IV algorithm applied on our data. Within every node, the estimated value of the intention to treat and the percentage of observations associated with each node are shown. The name of the variable used for splitting the tree is shown just below each node. The nodes are numbered according to their level in the tree (with the same numbering that one would use for a full binary tree with the same number of levels). The different effects are recorded with different colours: the pinker the node, the closer the effect to zero, while the greener the node, the stronger the effect. No weak-instrument problems occur in the construction of the tree. Table \ref{table:4} reports the estimated values of the ITT and of the CACE, for each leaf of the constructed tree. For the latter, we report also its standard error, estimated using the TSLS method within every leaf. As one can see, there is a large variation in the CACE among the different leaves. For instance, the observations in the \textit{node 2} (those firms with sales lower than 100,000 Euros) provide a null and non-significant effect according to a t-test. On the opposite side, those firms within the \textit{node 15} (firms with more than 11 employees, and with sales between 100,000 and 1,000,000 Euros) show a 0.61 causal effect in the chance of increasing the number of employees when they get the fundings. In our case study, the difference between $\reallywidehat{ITT}_{Y,{\mathbb{X}_j}}$ and $\hat{\tau}^{cace}_{\mathbb{X}_j}$ is quite small, because the percentage of compliers within every leaf is around 90\% (with the exception of \textit{node 58}, where the percentage of compliers is smaller than 80\%), and the overall percentage of compliers is exactly 90\%. The overall CACE is positive (0.17) and significant. \begin{figure \centering \includegraphics[width=0.57\textwidth, center]{CART_IV_2.png} \caption{CT-IV built on the PDC data} \label{cartiv} \end{figure} \begin{table \footnotesize \footnotesize \centering \caption{Estimated Intention to Treat and Complier Average Causal Effect on the final nodes (leaves)} \setlength{\tabcolsep}{2pt} \renewcommand{\arraystretch}{1.5} \begin{tabular}{rrrrrrrrrr} \hline Node $\#j$ &\#2& \#48& \#49& \#25& \#13& \#28& \#58& \#59& \#15 \\ \hline $\reallywidehat{ITT}_{Y,{\mathbb{X}_j}}$ & 0.003 & -0.14 & 0.072 & 0.12 & 0.19 & 0.16 & 0.23 & 0.44 & 0.55 \\ $\hat{\tau}^{cace}_{\mathbb{X}_j}$ & 0.003 & -0.15 & 0.083 & 0.14 & 0.21 & 0.18 & 0.30 & 0.47 & 0.61 \\ S.E. $\hat{\tau}^{cace}_{\mathbb{X}_j}$ & 0.060 & 0.08 & 0.101 & 0.09 & 0.10 & 0.10 & 0.14 & 0.10 & 0.10 \\ \hline \end{tabular} \vspace{-0.4cm} \label{table:4} \end{table} \section{Conclusions} The main aim of this paper is to strengthen the link between machine learning techniques and causal inference, as well as to provide, in this regard, an innovative approach. From this point of view, the CT-IV algorithm developed in this paper has shown to fit in a good way our causal inference goals in the presence of an irregular assignment mechanism. The results obtained from the simulations show that, on one side, CT-IV provides a robust estimation of the overall causal effect on the population under study. On the other side, it outperforms the Causal Tree, providing a very good insight into the heterogeneity of the effects. As a possible extension, which will the subject of a future investigation, the CT-IV algorithm could be combined with the Honest Causal Tree framework [\ref{atheyimbens2016}], to improve the quality of its estimates. Studying the heterogeneity of causal effects is growing in importance as the size of the dataset, and thus of the population under study, grows; indeed, as shown in the case study, taking into account heterogeneous effects on different subgroups of the study population can help optimizing public interventions and making them more cost-effective. Other possible applications are in fields such as management, health sciences, economics, sociology, and political science. Concluding, CT-IV has the following peculiar strengths: \begin{enumerate} \item it can be applied directly, even when the instrument is not randomized (confounded instrumental variable); \item it does not directly need a theoretical derivation of the consistency of its estimators because it is based on robust estimators (ITT \& TSLS estimators); \item it provides robust causal effect estimators within every leaf, even when the exclusion restriction is partially violated; \item it is also robust in settings where the instrument is weak. \end{enumerate} \section*{Acknowledgment} The authors declare no conflicts of interest.
\section{Introduction} Arguably, a growing interest to style transfer algorithms for texts is motivated by \citet{Gatys}, where style transfer was developed for images in a very convincing manner. \citet{Gatys} visualize the information at different processing stages in the convolutional neural network (CNN) by reconstructing the input image out of the network’s responses in a particular layer. This approach allowed the authors to avoid the burden of explicit style definition and conclude that in higher layers of the network, detailed pixel information is lost while the high-level content of the image is preserved. At the same time, discarding information on the global arrangement of the scene one can reconstruct the style of the input image from a style representation built on different subsets of CNN layers. This effective information decomposition, which makes high level image information explicit, seems to be an internal property of CNNs optimized for object recognition, but is not available for texts so far. In \citet{Zhang33} authors apply CNN to the task of text understanding and this promises a chance for a similar semantic-stylistic decomposition for texts in future, however at the moment it is difficult due to a number of reasons. First, textual information does not have the continuity that is characteristic for the images. Second, there is no 'characteristic' scale on which one can observe solely stylistic information: one can not say that the style of the text is determined on the level of letters but does not have anything to do with words or collocations. Finally, one usually speaks about the stylization of sentences rather than longer patterns of text. This inevitably implies a significantly lower amount of stylistic information available to the system in every separate piece of input. However, these difficulties as well as an absence of a clear consensus definition of the text style somehow do not hinder the intuitive understanding of the style transfer problem in the context of texts. This contradiction between an intuitive nature of the problem and its' formal complexity results in a number of research projects that not only look at the problem from very different angles but, in fact, even look on different problems giving them the same name. Further we list a number of different contributions that can be roughly split in three major groups that have very different understanding of this problem. \section{Related work} Let us try to systematize current approaches to the style transfer for texts. \subsection{Ad-hoc defined style classes} Despite the fact that a sentiment of a sentence is not equivalent to its style there is a number of works that focus on the sentiment of the text specifically. In \citet{li}, for example, the authors estimate {\em the quality of the style transfer} with binary sentiment classifier trained on the same corpus of Yelp and Amazon reviews that is used for the training of the 'style'-transfer system. There are multiple results in this field, see \citet{Kabbara}, or \citet{Xu2}. We suggest to call this understanding of the text style {\em ad-hoc}, since here the notion of the style is rigorously reverse-engineered out of a given training dataset. \citet{Ficler} and especially \citet{Fu} generalize this ad-hoc approach in a clear and legitimate way. \citet{Fu} suggest to define style as a set of measurable categorial and/or continuos parameters. One trains a classifier for every parameter that comprises the style of the texts and then tests the resulting output with this pre-trained set of classifiers, using the percentage of correctly classified sentences as a measure of style transfer success. Subjectively, ad-hoc approaches tend to be extremely useful for a number of industrial tasks. This is partially due to a clear, applied problem set-up and partially to an exceeding number of human-supervised natural language datasets that could be used in the ad-hoc style-transfer setup. Enhanced with human peer-reviews as in \citet{TY} they can be very illustrative. However, since methods of this type do not imply any holistic and non-contradictory notion of style, talking about sentiment transfer or, say, text summarization instead of a 'style transfer' would make more sense in this ad-hoc paradigm. \subsection{NMT approaches} The idea behind these works is to define two different styles as two different languages and thus reduce the problem of style transfer to the problem of neural machine translation (NMT). A typical example of this approach could the so-called \textit{'style of the time'} (see \citet{Hughes}). \citet{xu} or \citet{Jhamtani} use parallel corpora of Shakespeare in original and modern language to train an automated 'shakespearizator'. \citet{Carlson} use parallel bible translations and discuss the results in the context of automated simplification that "can easily be viewed as style transfer". The use of such methods in practice is seriously hindered due to the deficit of parallel datasets with equivalent semantics and different stylistics. In \citet{Jang} authors address this problem trying to find an automated method for parallel corpora generation. In \citet{Rao} a dataset for formality style transfer is introduced alongside with the benchmarks and target metrics in the context of NMT. The problem of aligned dataset will stay characteristic for NMT approaches: \citet{Xu3} lists seven styles of language but immediately gives a disclaimer that 'There are certainly more than seven language styles as there are more than seven wonders in the world.' Each further 'wonder' would demand a separate aligned training corpus which makes NMT-approaches relatively labour-extensive. \subsection{Post-NMT approaches} These are the approaches that follow the logic of NMT methods. The researchers agree that the notion of style should not be fragmentized as in ad-hoc approaches but should rather be extracted out of the corpora automatically. The same analogue of different styles being different languages holds here. However, understanding a limiting effect associated with the deficit of parallel language datasets, the researchers try to find work-arounds inspired by recent zero-shot NMT techniques, GANs, ect. In the last several years this post-NMT view started to get momentum, see \citet{Artetxe}, \citet{Han}, \citet{Shen}, \citet{Zhang2}, \citet{Prabhumoye}, \citet{Zhang1}. All of the methods try to obtain some latent representations that would correspond to stylistics and semantics separately (similarly to the information decomposition that we have for images). This might be done in a number of ways: \begin{itemize} \item Obtaining regularized or somehow aligned embeddings for words or sentences and segmenting embedding state-space into the semantic and stylistic sections; \item Using double transfer (there-and-back) as a target for the quality of the style transfer method; \item Training a stylistic discriminator. \end{itemize} \section{Text style transfer}\label{formulation} This brief overview of current approaches to style transfer definition arises a number of questions. The most interesting one is if there is a connection between the implied intuitive understanding of style and semantics. Indeed, ad-hoc defined style classes do not imply that the semantic part of the sentence should not be altered after a style-transfer. For example, if one assumes that sentiment is a stylistic feature, as some of the authors listed above do, that might lead to the following contradiction. Let us optimize a loss function that corresponds to an effective information decomposition of semantics and style on the dataset $X$ that looks like \begin{equation} \label{loss} \mathcal{L}_{total} (X)= A_{semantic} (X) + A_{stylistic} (X), \end{equation} where $A$ stands for some measure of accuracy of style transfer procedure. Generally, one would expect to say that "this place has great candy" and "this place has awful candy" are two stylistically identical examples that have different semantics. However, if we treat sentiment as a stylistic feature, we have to assume that either $ A_{stylistic} (X)$ is a function of $A_{semantic} (X)$ (which means that it does not make sense to talk about style transfer anymore) or that there exists an effective information decomposition such that $A_{semantic} (X)$ and $A_{stylistic} (X)$ are independent functions of $X$. Indeed, in our example such decomposition could be obtained if one assumes that "this place has candy" is the part of the sentence that contains all semantically significant information whereas "great" is the part of the sentence that is responsible for its 'style'. However, the existence of such decomposition would mean that our final solution would inevitably be unstable, having equal resulting loss for sentences with different degree of semantics preservation and stylistic accuracy. Moreover, depending on how one measures $A_{semantic} (X)$ and $A_{stylistic} (X)$ there might be multiple reformulations with the same final loss $\mathcal{L}_{total} (X)$. For example "this place has average candy", "that fella sells awful caramels", "those restaurants serve horrific bonbons" might end up having comparable losses. Intuitively one would perceive "that fella sells awful caramels" and "those restaurants serve horrific bonbons" as two clear examples of semantically equivalent and stylistically different sentences, but this is not so under the assumption that sentiment is a stylistic attribute. One also has to mention that due to the language multimodality under such decomposition assumptions the sentence "this place has cotton candy" would be measured as semantically equivalent to the "this place has great candy" and stylistically could be assigned to the neutral sentiment. This, if we use the loss from Equation \ref{loss}, might make it preferable to the sentence "that fella sells awful caramels" (the sentiment part for the latter sentence might not compensate for it's semantic difference with "this place has great candy"). It would also make it equivalent to "this place has average candy", despite the common sense intuition that says that these two sentences are equivalent in style but are semantically different. This simple experiment illustrates a general weakness of ad-hoc approaches that have to define a loss under certain predefined information decomposition assumptions that are anything but trivial. This does not hinder applications of ad-hoc approaches to task-specific NLP problems but one has to keep this issue in mind and control for it. NMT approaches, on the other hand, do not have the loss-decomposition difficulty but raise some other questions. The most prominent questions here are: \begin{itemize} \item Can one say that any two semantically aligned corpora define a valid stylistic pair? Is, say, a style transfer problem from 'narcissistic' to 'academic' a legitimate style transfer task? \item Can there be an overlap of styles within one corpus? How can we control that? \item Should every sentence in the corpus have a clear stylistic component? Can we remove or mix the sentences without a clear stylistic component in our corpus? Will such operation change the resulting style transfer algorithm? \end{itemize} All these questions are relevant for post-NMT methods as well, since the crucial difference between the two is the semantic alignment of two corpora, yet the style is latent content distribution across different text corpora both in NMT and post-NMT methods. Keeping these ideas in mind we would suggest two clear criteria for a style-transfer task: \begin{itemize} \item Style is an integral component of text that allows it to be assigned to a certain category or a sub-corpus. The choice of such categories or sub-corpora is to be task-dependent. \item Style has to be 'orthogonal' to semantics in the following way: any semantically relevant information could be expressed in any style. \end{itemize} Under these two criteria style transfer becomes a parallel shift with respect to a certain style coordinate, and latent representations are aligned to perform style transfer. Lexicon and sentence structure are two main tools for such shifts. Let sentence $X$ and its reformulation $\tilde{X}$ be represented as two points in state space $\mathbb{R}^n \bigotimes \mathbb{S}$, where $\mathbb{S}$ corresponds to the style dimension and $\mathbb{R}^n$ is a space of semantic embeddings. The loss for the problem of style transfer is defined as \begin{equation} \label{loss2} \mathcal{L}_{total} (X, \tilde{X})= D_{\mathbb{R}^n}(X, \tilde{X}) + D_{S} (X, \tilde{X}), \end{equation} where $D_{\mathbb{R}^n}$ and $D_{S}$ are the notions of distances obtained our of a given corpus. Important part of this formalization is that we do not impose any structure over $S$. This structure is to be obtained through the exploration of a given corpus and the transferred sentences from one style match example sentences from the other style as a population. \section{Conclusion} In this short opinion paper we have listed different approaches to the problem of style transfer. We have broadly classified them into three main groups: ad-hoc approaches that use sets of pre-defined metrics for style, NMT approaches that use semantically aligned corpora and treat style as an integral property of a text that should not be formalized explicitly and post-NMT approach that are rooted in the same notion of non-explicit style formulation but try to avoid the formation of semantically aligned parallel corpora. We propose to distinguish ad-hoc tasks from NMT and post-NMT style-transfer tasks. We also suggest to talk about style transfer under the assumption of certain orthogonality between style and semantics that can be attained under NMT and post-NMT approaches and is unattainable in ad-hoc perspective.
\section{Introduction} The idea of cosmological inflation is capable to address some problems of the standard big bang theory, such as the horizon, flatness and monopole problems. Also, it can provide a reliable mechanism for generation of density perturbations responsible for structure formation and therefore temperature anisotropies in Cosmic Microwave Background (CMB)spectrum [1-8]. There are a wide variety of cosmological inflation models where viability of their predictions in comparison with observations makes them to be acceptable or unacceptable (see for instance [9] for this purpose). The simplest inflationary model is a single scalar field scenario in which inflation is driven by a scalar field called the inflaton that predicts adiabatic, Gaussian and scale-invariant fluctuations [10]. But, recently observational data have revealed some degrees of scale-dependence in the primordial density perturbations. Also, Planck team have obtained some constraints on the primordial non-Gaussianity [11-13]. Therefore, it seems that extended models of inflation which can explain or address this scale-dependence and non-Gaussianity of perturbations are more desirable. There are a lot of studies in this respect, some of which can be seen in Refs. [14-19] with references therein. Among various inflationary models, the non-minimal models have attracted much attention. Non-minimal coupling of the inflaton field and gravitational sector is inevitable from the renormalizability of the corresponding field theory (see for instance [20]). Cosmological inflation driven by a scalar field non-minimally coupled to gravity are studied, for instance, in Refs. [21-28]. There were some issues on the unitarity violation with non-minimal coupling (see for instance, Refs. [29-31]) which have forced researchers to consider possible coupling of the derivatives of the scalar field with geometry [32]. In fact, it has been shown that a model with nonminimal coupling between the kinetic terms of the inflaton (derivatives of the scalar field) and the Einstein tensor preserves the unitary bound during inflation [33]. Also, the presence of nonminimal derivative coupling is a powerful tool to increase the friction of an inflaton rolling down its own potential [33]. Some authors have considered the model with this coupling term and have studied the early time accelerating expansion of the universe as well as the late time dynamics [34-36]. In this paper we extend the non-minimal inflation models to the case that a canonical inflaton field is coupled non-minimally to the gravitational sector and in the same time the derivatives of the field are also coupled to the background geometry (Einstein's tensor). This model provides a more realistic framework for treating cosmological inflation in essence. We study in details the cosmological perturbations and possible non-Gaussianities in the distribution of these perturbations in this non-minimal inflation. We expand the action of the model up to the third order and compare our results with observational data from Planck2015 to see the viability of this extended model. In this manner we are able to constraint parameter space of the model in comparison with observation. \section{Field Equations} We consider an inflationary model where both a canonical scalar field and its derivatives are coupled non-minimally to gravity. The four-dimensional action for this model is given by the following expression: \begin{equation} S=\frac{1}{2}\int d^{4}x\sqrt{-g}\Bigg[M_{p}^{2}f(\phi)R+\frac{1}{\widetilde{M}^{2}}G_{\mu\nu}\partial^{\mu}\phi\partial^{\nu}\phi-2V(\phi)\Bigg]\,, \end{equation} where $M_{p}$ is a reduced planck mass, $\phi$ is a canonical scalar field, $f(\phi)$ is a general function of the scalar field and $\widetilde{M}$ is a mass parameter. The energy-momentum tensor is obtained from action (1) as follows \vspace{0.5cm} $T_{\mu\nu}=\frac{1}{2\widetilde{M}^{2}}\bigg[\nabla_{\mu}\nabla_{\nu}(\nabla^{\alpha}\phi\nabla_{\alpha}\phi) -g_{\mu\nu}\Box(\nabla^{\alpha}\phi\nabla_{\alpha}\phi) +g_{\mu\nu}g^{\alpha\rho}g^{\beta\lambda}\nabla_{\rho}\nabla_{\lambda}(\nabla_{\alpha}\phi\nabla_{\beta}\phi)$ \begin{equation} +\Box(\nabla_{\mu}\phi \nabla_{\nu}\phi)\bigg]-\frac{g^{\alpha\beta}}{\widetilde{M}^{2}} \nabla_{\beta}\nabla_{\mu}(\nabla_{\alpha}\phi \nabla_{\nu}\phi)-M_{p}^{2}\nabla_{\mu}\nabla_{\nu}f(\phi)+M_{p}^{2}g_{\mu\nu}\Box f(\phi)+g_{\mu\nu}V(\phi)\,. \end{equation} On the other hand, variation of the action (1) with respect to the scalar field gives the scalar field equation of motion as \begin{equation} \frac{1}{2}M_{p}^{2}Rf'(\phi)-\frac{1}{\widetilde{M}^{2}}G^{\mu\nu}\nabla_{\mu}\nabla_{\nu}\phi-V'(\phi)=0\,, \end{equation} where a prime denotes derivative with respect to the scalar field. We consider a spatially flat Friedmann-Robertson-Walker (FRW) line element as \begin{equation} ds^{2}=-dt^{2}+a^{2}(t)\delta_{ij}dx^{i}dx^{j}\,, \end{equation} where $a(t)$ is scale factor. Now, let's assume that $f(\phi)=\frac{1}{2}\phi^{2}$. In this framework, $T_{\mu\nu}$ leads to the following energy density and pressure for this model respectively \begin{equation} \rho=\frac{9H^{2}}{2\widetilde{M}^{2}}\dot{\phi}^{2}-\frac{3}{2}M_{p}^{2}H\phi(2\dot{\phi}+H\phi)+V(\phi) \end{equation} $$p=-\frac{3}{2}\frac{H^{2}\dot{\phi}^{2}}{\widetilde{M}^{2}}-\frac{\dot{\phi}^{2}\dot{H}}{\widetilde{M}^{2}} -\frac{2H}{\widetilde{M}^{2}}\dot{\phi}\ddot{\phi}$$ \begin{equation} +\frac{1}{2}M_{p}^{2}\Bigg[2\dot{H}\phi^{2}+3H^{2}\phi^{2} +4H\phi\dot{\phi}+2\phi\ddot{\phi}+2\dot{\phi}\Bigg]-V(\phi)\,, \end{equation} where a dot refers to derivative with respect to the cosmic time. The equations of motion following from action (1) are \begin{equation} H^{2}=\frac{1}{3M_{p}^{2}}\Bigg[-\frac{3}{2}M_{p}^{2}H\phi(2\dot{\phi}+H\phi)+\frac{9H^{2}}{2\widetilde{M}^{2}}\dot{\phi}^{2}+V(\phi)\Bigg]\,, \end{equation} $$\dot{H}=-\frac{1}{2M_{p}^{2}}\Bigg[\dot{\phi}^{2}\bigg(\frac{3H^{2}}{\widetilde{M}^{2}}-\frac{\dot{H}}{\widetilde{M}^{2}}\bigg) -\frac{2H}{\widetilde{M}^{2}}\dot{\phi}\ddot{\phi}-\frac{3}{2}M_{p}^{2}H\phi(2\dot{\phi}+H\phi)$$ \begin{equation}+\frac{1}{2}M_{p}^{2}\bigg((2\dot{H}+3H^{2})\phi^{2}+4H\phi\dot{\phi}+2\phi\ddot{\phi}+2\dot{\phi}^{2}\bigg)\Bigg] \end{equation} \begin{equation} -3M_{p}^{2}(2H^{2}+\dot{H})\phi+\frac{3H^{2}}{\widetilde{M}^{2}}\ddot{\phi}+3H\bigg(\frac{3H^{2}}{\widetilde{M}^{2}} +\frac{2\dot{H}}{\widetilde{M}^{2}}\bigg)\dot{\phi}+V'(\phi)=0\,. \end{equation} The slow-roll parameters in this model are defined as \begin{equation} \epsilon\equiv-\frac{\dot{H}}{H^{2}}\,\,\,\,,\,\,\,\,\eta\equiv-\frac{1}{H}\frac{\ddot{H}}{\dot{H}}\,. \end{equation} To have inflationary phase, $\epsilon$ and $\eta$ should satisfy slow-roll conditions($\epsilon\ll1$ , $\eta\ll1$). In our setup, we find the following result \begin{equation} \epsilon=\bigg[1+\frac{\phi^{2}}{2}-\frac{\dot{\phi^{2}}}{2\widetilde{M}^{2}M_{p}^{2}}\bigg]^{-1} \bigg[\frac{3\dot{\phi}^{2}}{2\widetilde{M}^{2}M_{p}^{2}}+\frac{\phi\dot{\phi}}{2H} +\frac{\ddot{\phi}}{H\dot{\phi}}\bigg(\frac{\phi\dot{\phi}}{2H} -\frac{\dot{\phi^{2}}}{\widetilde{M}^{2}M_{p}^{2}}\bigg)\bigg] \end{equation} and \begin{equation} \eta=-2\epsilon-\frac{\dot{\epsilon}}{H\epsilon}\,. \end{equation} Within the slow-roll approximation, equations (7),(8) and (9) can be written respectively as \begin{equation} H^{2}\simeq\frac{1}{3M_{p}^{2}}\Bigg[-\frac{3}{2}M_{p}^{2}H^{2}\phi^{2}+V(\phi)\Bigg]\,, \end{equation} \begin{equation} \dot{H}\simeq-\frac{1}{2M_{p}^{2}}\Bigg[\frac{3H^{2}\dot{\phi}^{2}}{\widetilde{M}^{2}}-M_{p}^{2}H\phi\dot{\phi}+M_{p}^{2}\dot{H}\phi^{2}\Bigg]\,, \end{equation} and \begin{equation} -6M_{p}^{2}H^{2}\phi+\frac{9H^{3}\dot{\phi}}{\widetilde{M}^{2}}+V'(\phi)\simeq0\,. \end{equation} The number of e-folds during inflation is defined as \begin{equation} {\cal N}=\int_{t_{hc}}^{t_{e}}H\,dt\,, \end{equation} where $t_{hc}$ and $t_{e}$ are time of horizon crossing and end of inflation respectively. The number of e-folds in the slow-roll approximation in our setup can be expressed as follows \begin{equation} {\cal N}\simeq\int_{\phi_{hc}}^{\phi_{e}}\frac{V(\phi)d\phi}{M_{p}^{2}\bigg(1 +\frac{1}{2}\phi^{2}\bigg)\Bigg[2M_{p}^{2}\widetilde{M}^{2}\phi -M_{p}^{2}\widetilde{M}^{2}\frac{V'(\phi)}{V(\phi)}\bigg(1+\frac{1}{2}\phi^{2}\bigg)\Bigg]}\,. \end{equation} After providing the basic setup of the model, for testing cosmological viability of this extended model we treat the perturbations in comparison with observation. \section{Second-Order Action: Linear Perturbations} In this section, we study linear perturbations around the homogeneous background solution. To this end, the first step is expanding the action (1) up to the second order in small fluctuations. It is convenient to work in the ADM formalism given by [37] \begin{equation} ds^{2}=-N^{2}dt^{2}+h_{ij}(N^{i}dt+dx^{i})(N^{j}dt+dx^{j})\,, \end{equation} where $N^{i}$ is the shift vector and $N$ is the lapse function. We expand the lapse function and shift vector to $N=1+2\Phi$ and $N^{i}=\delta^{ij}\partial_{j}\Upsilon$ respectively, where $\Phi$ and $\Upsilon$ are three-scalars. Also, $h_{ij}=a^{2}(t)[(1+2\Psi)\delta_{ij}+\gamma_{ij}]$, where $\Psi$ is spatial curvature perturbation and $\gamma_{ij}$ is shear three-tensor which is traceless and symmetric. In the rest of our study, we choose $\delta\Phi=0$ and $\gamma_{ij}=0$. By taking into account the scalar perturbations in linear-order, the metric (18) is written as (see for instance [38]) \begin{equation} ds^{2}=-(1+2\Phi)dt^{2}+2\partial_{i}\Upsilon dtdx^{i}+a^{2}(t)(1+2\Psi)\delta_{ij}dx^{i}dx^{j}\,. \end{equation} Now by replacing metric (19) in action (1) and expanding the action up to the second-order in perturbations, we find (see for instance [39,40]) $$S^{(2)}=\int dt dx^{3}a^{3}\Bigg[-\frac{3}{2}(M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})\dot{\Psi}^{2} +\frac{1}{a^{2}}((M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})\dot{\Psi}$$ $$-(M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})\Phi)\partial^{2}\Upsilon -\frac{1}{a^{2}}(M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})\Phi\partial^{2}\Psi$$ $$+3(M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})\Phi\dot{\Psi} +3H(-\frac{1}{2}M_{p}^{2}H\phi^{2}-M_{p}^{2}\phi\dot{\phi}$$ \begin{equation} +\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})\Phi^{2} +\frac{1}{2a^{2}}(M_{p}^{2}\phi^{2}+\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})(\partial\Psi)^{2}\Bigg]\,. \end{equation} By variation of action (20) with respect to $N$ and $N^{i}$ we find \begin{equation} \Phi=\frac{M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}}}{M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}}}\dot{\Psi}\,, \end{equation} $$\partial^{2}\Upsilon=\frac{2a^{2}}{3}\frac{(-\frac{9}{2}M_{p}^{2}H^{2}\phi^{2}-9M_{p}^{2}H\phi\dot{\phi} +\frac{27H^{2}\dot{\phi}^{2}}{\widetilde{M}^{2}})}{(M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})}$$ \begin{equation} +3\dot{\Psi}a^{2}-\frac{M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}}}{M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}}}\dot{\Psi}\,. \end{equation} Finally the second order action can be rewritten as follows \begin{equation} S^{(2)}=\int dt dx^{3}a^{3}\vartheta_{s}\bigg[\dot{\Psi}^{2}-\frac{c_{s}^{2}}{a^{2}}(\partial\Psi)^{2}\bigg] \end{equation} where by definition \begin{equation} \vartheta_{s}\equiv6\frac{(M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})^{2}(-\frac{1}{2}M_{p}^{2}H^{2}\phi^{2}-M_{p}^{2}H\phi\dot{\phi}+\frac{3}{\widetilde{M}^{2}} H^{2}\dot{\phi}^{2})}{(M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3}{\widetilde{M}^{2}}H\dot{\phi}^{2})^{2}}+ 3(\frac{1}{2}M_{p}^{2}\phi^{2}-\frac{1}{2\widetilde{2}}\dot{\phi}^{2}) \end{equation} and $$c_{s}^{2}\equiv\frac{3}{2}\bigg\{(M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})^{2} (M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})H$$ $$-(M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})^{2}(M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})$$ $$4(M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})(M_{p}^{2}\phi\dot{\phi}-\frac{\dot{\phi}\ddot{\phi}}{\widetilde{M}^{2}}) (M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})$$ $$-(M_{p}^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})^{2}(M_{p}^{2}\dot{H}\phi^{2}+2M_{p}^{2}H\phi\dot{\phi}M_{p}^{2}\dot{\phi}^{2}+M_{p}^{2}\phi\ddot{\phi} -\frac{3\dot{H}\dot{\phi}^{2}}{\widetilde{M}^{2}}-\frac{6}{\widetilde{M}^{2}}H\dot{\phi}\ddot{\phi})\bigg\}$$ $$\bigg\{9[\frac{1}{2}M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{2\widetilde{M}^{2}}][4(\frac{1}{2}M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{2\widetilde{M}^{2}}) (-\frac{1}{2}M_{p}^{2}H^{2}\phi^{2}-M_{p}^{2}H\phi\dot{\phi}+\frac{3}{M\widetilde{^{2}}H^{2}\dot{\phi}^{2}})$$ \begin{equation} +(M_{p}^{2}H\phi^{2}+M_{p}^{2}\phi\dot{\phi}-\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})^{2}]\bigg\}^{-1}\,. \end{equation} In order to obtain quantum perturbations $\Psi$, we can find equation of motion of the curvature perturbation by varying action (23) which follows \begin{equation} \ddot{\Psi}+\bigg(3H+\frac{\dot{\vartheta_{s}}}{\vartheta_{s}}\bigg)+\frac{c_{s}^{2}k^{2}}{a^{2}}\Psi=0\,. \end{equation} By solving the above equation up to the lowest order in slow-roll approximation, we find \begin{equation} \Psi=\frac{iH\exp(-ic_{s}k\tau)}{2c_{s}^{\frac{3}{2}}\sqrt{k^{3}}\vartheta_{s}}(1+ic_{s}k\tau)\,. \end{equation} By using the two-point correlation functions we can study power spectrum of curvature perturbation in this setup. We find two-point correlation function by obtaining vacuum expectation value at the end of inflation. We define the power spectrum $P_{s}$, as \begin{equation} \langle0|\Psi(0,\textbf{k}_{1})\Psi(0,\textbf{k}_{2})|0\rangle=\frac{2\pi^{2}}{k^{3}}P_{s}(2\pi)^{3}\delta^{3}(\textbf{k}_{1}+\textbf{k}_{2})\,, \end{equation} where \begin{equation} P_{s}=\frac{H^{2}}{8\pi^{2}\vartheta_{s} c_{s}^{3}}\,. \end{equation} The spectral index of scalar perturbations is given by (see Refs. [41-43] for more details on the cosmological perturbations in generalized gravity theories and also inflationary spectral index in these theories.) \begin{equation} n_{s}-1=\frac{d\ln P_{s}}{d\ln k}|_{c_{s}k=aH}=-2\epsilon-\delta_{F}-\eta_{s}-S \end{equation} where by definition \begin{equation} \delta_{F}=\frac{\dot{f}}{H(1+f)}\,\,\,\,,\,\,\,\,\eta_{s}=\frac{\dot{\epsilon_{s}}}{H\epsilon_{s}}\,\,\,\,,\,\,\,\,S=\frac{\dot{c_{s}}}{Hc_{s}} \end{equation} also \begin{equation} \epsilon_{s}=\frac{\vartheta_{s}c_{s}^{2}}{M_{pl}^{2}(1+f)}. \end{equation} we obtain finally \begin{equation} n_{s}-1=-2\epsilon-\frac{1}{H}\frac{d\ln c_{s}}{dt} -\frac{1}{H}\frac{d\ln[2H(1+\frac{\phi^{2}}{2})\epsilon+\phi\dot{\phi}]}{dt}\,, \end{equation} which shows the scale dependence of perturbations due to deviation of $n_{s}$ from $1$. Now we study tensor perturbations in this setup. To this end, we write the metric as follows \begin{equation} ds^{2}=-dt^{2}+a(t)^{2}(\delta_{ij}+T_{ij})dx^{i}dx^{j}\,, \end{equation} where $T_{ij}$ is a spatial shear 3-tensor which is transverse and traceless. It is convenient to write $T_{ij}$ in terms of two polarization modes, as follows \begin{equation} T_{ij}=T_{+}e^{+}_{ij}+T^{\times}e^{\times}_{ij}\,, \end{equation} where $e^{+}_{ij}$ and $e^{\times}_{ij}$ are the polarization tensors. In this case the second order action for the tensor mode can de written as \begin{equation} S_{T}=\int dt dx^{3} a^{3}\vartheta_{T}\bigg[\dot{T}_{(+,\times)}^{2}-\frac{c_{T}^{2}}{a^{2}}(\partial T_{(+,\times)})^{2}\bigg]\,, \end{equation} where by definition \begin{equation} \vartheta_{T}\equiv\frac{1}{8}(M_{p}^{2}\phi^{2}-\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}}) \end{equation} and \begin{equation} c_{T}^{2}\equiv\frac{\widetilde{M}^{2}M_{p}^{2}\phi^{2}+\dot{\phi}^{2}}{\widetilde{M}^{2}M_{p}^{2}\phi^{2}-\dot{\phi}^{2}}\,. \end{equation} Now, the amplitude of tensor perturbations is given by \begin{equation} P_{T}=\frac{H^{2}}{2\pi^{2}\vartheta_{T}c_{T}^{3}}\,, \end{equation} where we have defined the tensor spectral index as \begin{equation} n_{T}\equiv\frac{d\ln P_{T}}{d\ln k}|_{c_{T}k=aH}\,=-2\epsilon-\delta_{F}. \end{equation} By using above equations we get finally \begin{equation} n_{T}=-2\epsilon-\frac{\phi\dot{\phi}}{H(1+\frac{\phi^{2}}{2})}\,. \end{equation} The tensor-to-scalar ratio as an important observational quantity in our setup is given by \begin{equation} r=\frac{P_{T}}{P_{s}}=16c_{s}\bigg(\epsilon+\frac{\phi\dot{\phi}}{2H(1+\frac{\phi^{2}}{2})}+O(\epsilon^{2})\bigg)\simeq-8c_{s}n_{T} \end{equation} which yields the standard consistency relation. \section{Third-Order Action: Non-Gaussianity} Since a two-point correlation function of the scalar perturbations gives no information about possible non-Gaussian feature of distribution, we study higher-order correlation functions. A three-point correlation function is capable to give the required information. For this purpose, we should expand action (1) up to the third order in small fluctuations around the homogeneous background solutions. In this respect we obtain \vspace{0.5cm} $S^{(3)}=\int dtdx^{3}a^{3}\bigg\{3\Phi^{3}[M_{p}^{2}H^{2}(1+\frac{\phi^{2}}{2})+M_{p}^{2}H\phi\dot{\phi}-\frac{5}{\widetilde{M^{2}}}H^{2}\dot{\phi^{2}}] +\Phi^{2}[9\Psi(-\frac{1}{2}M_{p}^{2}\phi^{2}-M_{p}^{2}H\phi\dot{\phi}$ \vspace{0.5cm} $+\frac{3}{\widetilde{M}^{}}H^{2}\dot{\phi}^{2}) +6\dot{\Psi}(-M_{p}^{2}H(1+\frac{\phi^{2}}{2})-\frac{1}{2}M_{p}^{2}\phi\dot{\phi}\frac{3}{\widetilde{M}^{2}}H\dot{\phi}^{2}) -\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}a^{2}}\partial^{2}\Psi -\frac{2}{a^{2}}\partial^{2}\Upsilon(-M_{p}^{2}H$\vspace{0.05cm} $(1+\frac{\phi^{2}}{2})-\frac{1}{2}M_{p}^{2}\phi\dot{\phi}\frac{3}{\widetilde{M}^{2}}H\dot{\phi}^{2})] +\Phi[\frac{1}{a^{2}}(-M_{p}^{2}H\phi^{2}-M_{p}^{2}\phi\dot{\phi}+\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})\partial_{i}\Psi\partial_{i}\Upsilon -9(-M_{p}^{2}H\phi^{2}-M_{p}^{2}\phi\dot{\phi}+$ \vspace{0.5cm} $\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})\dot{\Psi}\Psi+\frac{1}{2a^{4}}(M_{p}^{2}(1+\frac{\phi^{2}}{2})+\frac{3}{2}\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}}) (\partial_{i}\partial_{j}\Upsilon\partial_{i}\partial_{j}\Upsilon-\partial^{2}\Upsilon\partial^{2}\Upsilon) +\frac{1}{a^{2}}(-M_{p}^{2}H\phi^{2}-M_{p}^{2}\phi\dot{\phi}+\frac{3H\dot{\phi}^{2}}{\widetilde{M}^{2}})\Psi\partial^{2}\Upsilon $ \vspace{0.5cm} $+\frac{4}{2a^{2}}(M_{p}^{2}(1+\frac{\phi^{2}}{2})+\frac{3}{2}\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}}) \dot{\Psi}\partial^{2}\Upsilon+\frac{1}{a^{2}}(-M_{p}^{2}\phi^{2}+\frac{\dot{\phi}}{\widetilde{M}^{2}}) \Psi\partial^{2}\Psi +\frac{1}{2a^{2}}(-M_{p}^{2}\phi^{2}+\frac{\dot{\phi}}{\widetilde{M}^{2}})(\partial\Psi)^{2} -6(M_{p}^{2}(1+\frac{\phi^{2}}{2})+$ \vspace{0.5cm} $\frac{3}{2}\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}})\dot{\Psi}^{2}]+\frac{1}{2a^{2}}(M_{p}^{2}\phi^{2}+\frac{\dot{\phi}^{2}}{\widetilde{M}^{2}}) \Psi(\partial\Psi)^{2} +\frac{9}{2}(-M_{p}^{2}\phi^{2}+\frac{\dot{\phi}}{\widetilde{M}^{2}})\dot{\Psi^{2}}\Psi -\frac{1}{a^{2}}(-M_{p}^{2}\phi^{2}+\frac{\dot{\phi}}{\widetilde{M}^{2}})\dot{\Psi}\partial_{i}\Psi\partial_{i}\Upsilon -\frac{1}{a^{2}}(-M_{p}^{2}\phi^{2}+\frac{\dot{\phi}}{\widetilde{M}^{2}})$ \begin{equation} \dot{\Psi}\Psi\partial^{2}\Upsilon-\frac{3}{4a^{4}}\Psi(-M_{p}^{2}\phi^{2}+\frac{\dot{\phi}}{\widetilde{M}^{2}}) (\partial_{i}\partial_{j}\Upsilon\partial_{i}\partial_{j}\Upsilon-\partial^{2}\Upsilon\partial^{2}\Upsilon) +\frac{1}{a^{4}}(-M_{p}^{2}\phi^{2}+\frac{\dot{\phi}}{\widetilde{M}^{2}})\partial_{i}\Psi\partial_{i}\Upsilon\partial^{2}\Upsilon\bigg\} \end{equation} We use Eqs. (21) and (22) for eliminating $\Phi$ and $\Upsilon$ in this relation. For this end, we introduce the quantity $\chi$ as follows \begin{equation} \Upsilon=\frac{M_{p}^{2}\widetilde{M}^{2}\phi^{2}-\dot{\phi}^{2}}{\widetilde{M}^{2}M_{p}^{2}(H\phi^{2}+\phi\dot{\phi})-3H\dot{\phi}^{2}}\Psi +\frac{2\widetilde{M^{2}}a^{2}\chi}{M_{p}^{2}\widetilde{M}^{2}\phi^{2}-\dot{\phi}^{2}}\,, \end{equation} where \begin{equation} \partial^{2}\chi=\vartheta_{s}\dot{\Psi}\,. \end{equation} Now the third order action (43) takes the following form \vspace{0.5cm} $S^{(3)}=\int dt\, dx^{3}a^{3}\bigg\{[-3M_{p}^{2}c_{s}^{-2}\Psi\dot{\Psi^{2}} +M_{p}^{2}a^{-2}\Psi(\partial\Psi)^{2}+M_{p}^{2}c_{s}^{-2}H^{-1}\dot{\Psi}^{3}]$ \begin{equation} \bigg[(1+\frac{1}{4}\phi^{2})\epsilon+\frac{5}{8}\frac{\phi\dot{\phi}}{H}\bigg] -2(1+\frac{1}{4}\phi^{2})^{-1}(\frac{5}{8}\frac{\phi\dot{\phi}}{c_{s}^{2}H})\dot{\Psi}\partial_{i}\Psi\partial_{i}\chi\bigg\}\,. \end{equation} By calculating the three-point correlation function we can study non-Gaussianity feature of the primordial perturbations. For the present model, we use the interaction picture in which the interaction Hamiltonian, $H_{int}$, is equal to the Lagrangian third order action. The vacuum expectation value of curvature perturbations at $\tau=\tau_{f}$ is \begin{equation} \langle\Psi(\textbf{k}_{1})\Psi(\textbf{k}_{2})\Psi(\textbf{k}_{3})\rangle=-i\int_{\tau_{i}}^{\tau_{f}}d\tau \langle0|[\Psi(\tau_{f},\textbf{k}_{1})\Psi(\tau_{f},\textbf{k}_{2})\Psi(\tau_{f},\textbf{k}_{3}),H_{int}(\tau)]|0\rangle\,. \end{equation} By solving the above integral in Fourier space, we find \begin{equation} \langle\Psi(\textbf{k}_{1})\Psi(\textbf{k}_{2})\Psi(\textbf{k}_{3})\rangle=(2\pi)^{3}\delta^{3}(\textbf{k}_{1}+\textbf{k}_{2}+\textbf{k}_{3}) P_{s}^{2}F_{\Psi}(\textbf{k}_{1},\textbf{k}_{2},\textbf{k}_{3})\,, \end{equation} where \begin{equation} F_{\Psi}(\textbf{k}_{1},\textbf{k}_{2},\textbf{k}_{3})=\frac{(2\pi)^{2}}{\prod_{i=1}^{3}k_{i}^{3}}G_{\Psi}\,, \end{equation} \vspace{0.5cm} $G_{\Psi}=\bigg[\frac{3}{4}\bigg(\frac{2}{K}\Sigma_{i>j}k_{i}^{2}k_{j}^{2}-\frac{1}{K^{2}}\Sigma_{i\neq j}k_{i}^{2}k_{j}^{3}\bigg)+\frac{1}{4}\bigg(\frac{1}{2}\Sigma_{i}k_{i}^{3}+\frac{2}{K}\Sigma_{i>j}k_{i}^{2}k_{j}^{2} -\frac{1}{K^{2}}\Sigma_{i\neq j} k_{i}^{2}k_{j}^{3}\bigg)$ \begin{equation} -\frac{3}{2}\bigg(\frac{(k_{1}k_{2}k_{3})^{2}}{K^{3}}\bigg)\bigg]\bigg(1-\frac{1}{c_{s}^{2}}\bigg)\,, \end{equation} and $K=\sum_{i}k_{i}$. Finally the non-linear parameter $f_{NL}$ is defined as follows \begin{equation} f_{NL}=\frac{10}{3}\frac{G_{\Psi}}{\sum_{i=1}^{3}k_{i}}\,. \end{equation} Here we study non-Gaussianity in the orthogonal and the equilateral configurations [44,45]. Firstly we should account $G_{\Psi}$ in these configurations. To this end, we follow Refs. [46-48] to introduce a shape $\zeta_{\ast}^{equi}$ as $\zeta_{\ast}^{equi}=-\frac{12}{13}(3\zeta_{1}-\zeta_{2})$. In this manner we define the following shape which is orthogonal to $\zeta_{\ast}^{equi}$ \begin{equation} \zeta_{\ast}^{ortho}=-\frac{12}{14-13\beta}[\beta(3\zeta_{1}-\zeta_{2})+3\zeta_{1}-\zeta_{2}]\,, \end{equation} where $\beta\simeq1.1967996$. Finally, bispectrum (48) can be written in terms of $\zeta_{\ast}^{equi}$ and $\zeta_{\ast}^{ortho}$ as follows \begin{equation} G_{\Psi}=G_{1}\zeta_{\ast}^{equi}+G_{2}\zeta_{\ast}^{ortho}\,, \end{equation} where \begin{equation} G_{1}=\frac{13}{12}\bigg[\frac{1}{24}\bigg(1-\frac{1}{c_{s}^{2}}\bigg)\bigg](2+3\beta) \end{equation} and \begin{equation} G_{2}=\frac{14-13\beta}{12}\bigg[\frac{1}{8}\bigg(1-\frac{1}{c_{s}^{2}}\bigg)\bigg]\,. \end{equation} Now, by using equations (50-55) we obtain the amplitude of non-Gaussianity in the orthogonal and equilateral configurations respectively as \begin{equation} f_{NL}^{equi}=\frac{130}{36\sum_{i=1}^{3}k_{i}^{3}}\bigg[\frac{1}{24} \bigg(\frac{1}{1-c_{s}^{2}}\bigg)\bigg](2+3\beta)\zeta_{\ast}^{equi}\,, \end{equation} and \begin{equation} f_{NL}^{ortho}=\frac{140-130\beta}{36\sum_{i=1}^{3}k_{i}^{3}}\bigg[\frac{1}{8} \bigg(1-\frac{1}{c_{s}^{2}}\bigg)\bigg]\zeta_{\ast}^{ortho}\,. \end{equation} The equilateral and the orthogonal shape have a negative and a positive peak in $k_{1}=k_{2}=k_{3}$ limit, respectively [49]. Thus, we can rewrite the above equations in this limit as \begin{equation} f_{NL}^{equi}=\frac{325}{18}\bigg[\frac{1}{24}\bigg(\frac{1}{c_{s}^{2}}-1\bigg)\bigg](2+3\beta)\,, \end{equation} and \begin{equation} f_{NL}^{ortho}=\frac{10}{9}\bigg[\frac{1}{8}\bigg(1-\frac{1}{c_{s}^{2}}\bigg)\bigg](\frac{7}{6}+\frac{65}{4}\beta)\,, \end{equation} respectively. \section{Confronting with Observation} The previous sections were devoted to the theoretical framework of this extended model. In this section we compare our model with observational data to find some observational constraints on the model parameter space. In this regard, we introduce a suitable candidate for potential term in the action. We adopt\footnote{Note that in general $\lambda$ has dimension related to the Planck mass. This can be seen easily by considering the normalization of $\phi$ via $V(\phi)=\frac{1}{n}\lambda(\frac{\phi}{\phi_{0}})^{n}$ which indicates that $\lambda$ cannot be dimensionless in general. When we consider some numerical values for $\lambda$ in our numerical analysis, these values are in \emph{``appropriate units"}.} $V(\phi)=\frac{1}{n}\lambda\phi^{n}$ which contains some interesting inflation models such as chaotic inflation. To be more specified, we consider a quartic potential with $n=4$. Firstly we substitute this potential into equation (11) and then by adopting $\epsilon=1$ we find the inflaton field's value at the end of inflation. Then by solving the integral (17), we find the inflaton field's value at the horizon crossing in terms of number of e-folds, $N$. Then we substitute $\phi_{hc}$ into Eqs. (33), (42), (58) and (59). The resulting relations are the basis of our numerical analysis on the parameter space of the model at hand. To proceed with numerical analysis, we study the behavior of the tensor-to-scalar ratio versus the scalar spectral index. In figure (1), we have plotted the tensor-to-scalar ratio versus the scalar spectral index for $N=60$ in the background of Planck2015 data. The trajectory of result in this extended non-minimal inflationary model lies well in the confidence levels of Planck2015 observational data for viable spectral index and $r$. The amplitude of orthogonal configuration of non-Gaussianity versus the amplitude of equilateral configuration is depicted in figure 2 for $N=60$. We see that this extended non-minimal model, in some ranges of the parameter $\lambda$, is consistent with observation. If we restrict the spectral index to the observationally viable interval $0.95<n_{s}<0.97$, then $\lambda$ is constraint to be in the interval $0.013<\lambda<0.095$ in \emph{appropriate units}. If we restrict the equilateral configuration of non-Gaussianity to the observationally viable condition $-147<f^{equi}_{NL}<143$, then we find the constraint $\lambda<0.1$ in our setup. \vspace{1cm} \begin{figure}[htp] \begin{center}\special{psfile=f.eps angle =0 hscale=40 vscale=35 hoffset=60 voffset=-245} \vspace{6cm} \end{center} \caption{\small {Tensor-to-scalar ratio versus the scalar spectral index in the background of Planck2015 TT,TE and EE+lowP data.}} \end{figure} \begin{figure}[htp] \begin{center}\special{psfile=ff.eps angle =0 hscale=40 vscale=35 hoffset=40 voffset=-245} \vspace{5.75cm} \end{center} \caption{\small {The amplitude of the orthogonal configuration versus the amplitude of the equilateral configuration of non-Gaussianity in the background of Planck2015 TTT, EEE, TTE and EET data.}} \end{figure} \section{Summary and Conclusion} We studied an extended model of single field inflation where the inflaton and its derivatives are coupled to the background geometry. By focusing on the third order action and nonlinear perturbations we obtained observables of cosmological inflation, such as tensor-to-scalar ratio and the amplitudes of non-Gaussianities in this extended setup. By confronting the model's outcomes with observational data from Planck2015, we were able to constraint parameter space of the model. By adopting a quartic potential with $V(\phi)=\frac{1}{4}\lambda\phi^{4}$, restricting the model to realize observationally viable spectral index (or tensor-to-scalar ratio) imposes the constraint on coupling $\lambda$ as $0.013<\lambda<0.095$. Also restricting the amplitude of equilateral amplitude of non-Gaussianity to the observationally supported value of $-147<f^{equi}_{NL}<143$, results in the constraint $\lambda<0.1$ in appropriate units. \\ {\bf Acknowledgement}\\ The work of K. Nozari has been supported financially by Research Institute for Astronomy and Astrophysics of Maragha (RIAAM) under research project number 1/5750-1.
\section{Introduction} \label{Introduction} The stable shape preserving pulse solutions of nonlinear wave models, which are known as solitons, appear in a variety of fields, including optics \cite{Agrawal2001,Mollenauer2006}, condensed matter physics \cite{Malomed89}, hydrodynamics \cite{Zakharov84,Newell85}, and plasma physics \cite{Horton96}. One of the main properties characterizing solitons is their robustness in soliton collisions, that is, the fact that the solitons do not change their shape in the collisions. Another important property of solitons, which is manifested in fast inter-soliton collisions, is the simple form of the scaling relations for collision-induced changes of soliton parameters, such as position, phase, amplitude, and frequency \cite{fast_collisions}. This property holds both in the absence of perturbations and in the presence of weak perturbations to the integrable nonlinear wave model. Consider for example fast collisions between two solitons of the cubic nonlinear Schr\"odinger (NLS) equation, which is one of the most widely used nonlinear wave models in physics \cite{Malomed89,Zakharov84,Newell85}. In the absence of perturbations, the collision-induced changes in the phase and position of soliton 1, for example, scale as $\eta_{2}/|\Delta\beta|$ and $-\eta_{2}/\Delta\beta^{2}$, where $\eta_{j}$ with $j=1,2$ are the soliton amplitudes, $\Delta\beta=\beta_{2}-\beta_{1}$, and $\beta_{j}$ with $j=1,2$ are the soliton frequencies \cite{Zakharov84,MM98,CP2005}. Furthermore, during fast collisions between NLS solitons in the presence of a weak perturbation due to cubic loss, the solitons experience amplitude and frequency shifts, which scale as $-\epsilon_{3}\eta_{1}\eta_{2}/|\Delta\beta|$ and $-\epsilon_{3}\eta_{1}^{2}\eta_{2}/\Delta\beta^{2}$ for soliton 1, where $\epsilon_{3}$ is the cubic loss coefficient \cite{PNC2010}. Similar simple scaling relations hold for fast two-pulse collisions of NLS solitons in the presence of other weak perturbations, such as delayed Raman response \cite{Chi89,Malomed91,Kumar98,CP2005,P2004,NP2010}, and higher-order nonlinear loss \cite{PC2012}. The simple form of the scaling relations for collision-induced changes of soliton parameters can be attributed to the shape preserving and stability properties of the solitons \cite{PNC2010,CP2005,PC2012}. The latter two properties are related with the integrability of the nonlinear wave model. Therefore, one might also relate the simple form of the scaling relations for changes in soliton parameters in fast two-soliton collisions to the integrability of the model. One might expect a very different behavior for collisions between pulses that are not shape preserving, since in this case, it is expected that changes in pulse shape or instability would lead to the breakdown of the simple dynamics observed in fast two-soliton collisions. This expectation is especially typical for linear physical systems that are weakly perturbed by nonlinear dissipation, since the pulses of the linear systems are in general not shape preserving \cite{Tkach97,Agrawal2001,Agrawal89a}. However, in Ref. \cite{PNH2017B}, we showed that the opposite might in fact be true. That is, we demonstrated that the amplitude shifts in fast two-pulse collisions in linear physical systems, weakly perturbed by nonlinear dissipation, exhibit soliton-like scaling behavior. The behavior was demonstrated for collisions between Gaussian pulses of the following central physical systems: (1) linear optical waveguides with weak cubic loss; (2) systems described by linear diffusion-advection models with weak quadratic loss. We showed that in both cases, the expressions for the amplitude shifts in fast collisions between two Gaussian pulses have the same form as the expression for the amplitude shift in a fast collision between two solitons of the cubic NLS equation in the presence of weak cubic loss. The analytic predictions were confirmed by numerical simulations with the corresponding perturbed coupled linear evolution models. The study in Ref. \cite{PNH2017B} was limited to fast collisions between Gaussian pulses. Therefore, based on the results of Ref. \cite{PNH2017B}, it is unclear if the soliton-like behavior of the collision-induced amplitude shift is universal in the sense that it does not depend on the details of the initial pulse shapes. In the current paper we address this important question. More specifically, we show that the simple soliton-like form of the expressions for the collision-induced amplitude shifts is universal in the sense that it is independent of the exact details of the initial pulse shapes. This is done for both linear optical waveguides with weak cubic loss and for systems described by linear diffusion-advection models with weak quadratic loss. We explain the universal soliton-like form of the expressions for the collision-induced amplitude shifts by noting that changes in pulse shapes occurring during a collision due to the effects of dispersion or diffusion can be neglected for fast collisions, and by noting the conservation of the total energies (or total masses) of the pulses by the unperturbed linear evolution models. Furthermore, we demonstrate the universal behavior of the amplitude shifts by carrying out numerical simulations with the two perturbed coupled linear evolution models with three different initial conditions corresponding to pulses with exponentially decreasing tails, pulses with power-law decreasing tails, and pulses that are initially nonsmooth. We find very good agreement between the analytic predictions for the amplitude shifts and the results of the numerical simulations in all six cases. Surprisingly, the analytic predictions hold even for collisions between pulses with initially nonsmooth shapes in linear optical waveguides despite of the fast generation of significant pulse tails in this case. We explain the good agreement between the analytic and numerical results in the latter case by noting that during fast collisions most of the pulse energies are still contained in the main bodies of the pulses, and by noting the conservation of the total energies of the two pulses by the unperturbed linear propagation model. The rest of the paper is organized as follows. In Sec. \ref{waveguides}, we obtain the expression for the collision-induced amplitude shift in a fast two-pulse collision in a linear optical waveguide with weak linear and cubic loss. We show that this expression is universal in the sense that it is independent of the details of the initial pulse shapes. We then present a comparison of the analytic expression with results of numerical simulations with the perturbed coupled linear propagation model for three major types of pulses. In Sec. \ref{diffusion}, we obtain the expression for the amplitude shift in a fast collision between two concentration pulses in systems described by perturbed coupled linear diffusion-advection models with weak linear and quadratic loss. We then show that this expression is universal. Furthermore, we compare the analytic expression for the amplitude shift with results of numerical simulations with the perturbed coupled linear diffusion-advection model for three main types of pulses. Section \ref{conclusions} is devoted to our conclusions. In Appendix \ref{appendA}, we derive the relations between the collision-induced amplitude shifts and the collision-induced changes in pulse shapes. A description of the procedures used for calculating the values of the collision-induced amplitude shift from the analytic expressions and from results of numerical simulations is provided in Appendix \ref{appendB}. \section{Fast collisions in linear optical waveguides} \label{waveguides} \subsection{Propagation model and initial pulse shapes} \label{waveguides_model} We consider the dynamics of fast collisions between two pulses of light in linear optical waveguides with weak linear and cubic loss. The dynamics of the collision can be described by the following system of perturbed coupled linear propagation equations \cite{PNH2017B,Agrawal2007a,PNC2010}: \begin{eqnarray}&& \!\!\!\!\!\!\! i\partial_z\psi_{1}\!-\!\mbox{sgn}(\tilde\beta_{2})\partial_{t}^{2}\psi_{1}\!=\! -i\epsilon_{1}\psi_{1}\! -\!i\epsilon_{3}|\psi_{1}|^2\psi_{1}\! -\!2i\epsilon_{3}|\psi_{2}|^2\psi_{1}, \nonumber \\&& \!\!\!\!\!\!\! i\partial_z\psi_{2}+id_{1}\partial_{t}\psi _{2} -\mbox{sgn}(\tilde\beta_{2})\partial_{t}^2\psi_{2}= -i\epsilon_{1}\psi_{2}-i\epsilon_{3}|\psi_{2}|^2\psi_{2} \nonumber \\&& -2i\epsilon_{3}|\psi_{1}|^2\psi_{2}, \!\!\!\!\!\!\!\! \label{coll1} \end{eqnarray} where $\psi_{1}$ and $\psi_{2}$ are the envelopes of the electric fields of the pulses, $z$ is propagation distance, and $t$ is time \cite{Dimensions1}. In Eq. (\ref{coll1}), $d_{1}$ is the group velocity coefficient, $\tilde\beta_{2}$ is the second-order dispersion coefficient, and $\epsilon_{1}$ and $\epsilon_{3}$ are the linear and cubic loss coefficients, which satisfy $0<\epsilon_{1} \ll 1$ and $0<\epsilon_{3} \ll 1$. The terms $-\mbox{sgn}(\tilde\beta_{2})\partial_{t}^{2}\psi_{j}$ on the left hand side of Eq. (\ref{coll1}) are due to the effects of second-order dispersion, while $id_{1}\partial_{t}\psi _{2}$ is associated with the group velocity difference. The first terms on the right hand side of Eq. (\ref{coll1}) describe linear loss effects, while the second and third terms describe intra-pulse and inter-pulse effects due to cubic loss. Note that the perturbed coupled propagation model (\ref{coll1}) is based on the assumption that the effects of cubic (Kerr) nonlinearity can be neglected. This assumption was successfully used in previous experimental and theoretical works, see e.g., Refs. \cite{Perry97,Liang2005,Cohen2005b,Cohen2004}. In addition, it is assumed that the nonlinear loss is weak, and as a result, the effects of higher-order loss are also neglected. We emphasize, however, that the effects of higher-order loss on the collision-induced amplitude shift can be calculated in a manner similar to the one described in Sec. \ref{waveguides_delta_A} (see also, Ref. \cite{QMN2018}, where the calculation was carried out for collisions between Gaussian pulses). We are interested in demonstrating universal behavior of the amplitude shift in fast two-pulse collisions in the sense that the amplitude shift is not very sensitive to the exact details of the pulse shape. We therefore consider fast collisions between pulses with generic initial pulse shapes and with tails that decay sufficiently fast, such that the values of the integrals $\int_{-\infty}^{\infty} dt |\psi_{j}(t,0)|^{2}$ are finite. We assume that the pulses can be characterized by initial amplitudes $A_{j}(0)$, initial widths $W_{j0}$, initial positions $y_{j0}$, and initial phases $\alpha_{j0}$. To illustrate the universal behavior of the collision-induced amplitude shift we consider three prototypical initial pulse shapes, which represent three major types of behavior of the pulse tails before and during the collisions. More specifically, we consider the following three types of pulses: (1) pulses with exponentially decreasing tails, (2) pulses with power-law decreasing tails, (3) pulses that are initially nonsmooth and that develop significant tails during the propagation. For concreteness, we demonstrate the universal behavior of the amplitude shift using the following representative initial pulses: hyperbolic secant pulses in (1), generalized Cauchy-Lorentz pulses in (2), and square pulses in (3). The initial envelopes of the electric fields for these pulses are given by \begin{eqnarray} && \psi_{j}(t,0)=A_{j}(0)\sech\left[(t-y_{j0})/W_{j0}\right]\exp(i\alpha_{j0}), \label{IC1} \end{eqnarray} with $j=1,2$ for hyperbolic secant pulses, by \begin{eqnarray} && \psi_{j}(t,0)=\frac{A_{j}(0)\exp(i\alpha_{j0})} {1+ 2 \left[(t-y_{j0})/W_{j0} \right]^{4}}, \label{IC2} \end{eqnarray} with $j=1,2$ for generalized Cauchy-Lorentz pulses, and by \begin{eqnarray} && \!\!\!\!\!\!\!\!\! \psi_{j}(t,0)= \left\{\begin{array}{l l} A_{j}(0)\exp(i\alpha_{j0}) & \;\; \mbox{for} \;\; |t-y_{j0}| \le W_{j0}/2,\\ 0 & \;\; \mbox{for} \;\; |t-y_{j0}| > W_{j0}/2,\\ \end{array} \right. \label{IC3} \end{eqnarray} with $j=1,2$ for square pulses. We emphasize, however, that similar behavior of the collision-induced amplitude shift is observed for other choices of the initial pulse shapes. \subsection{Calculation of the collision-induced amplitude shift} \label{waveguides_delta_A} The expressions for the collision-induced amplitude shifts are obtained under the assumption of a complete fast two-pulse collision. The complete collision assumption means that the two pulses are well separated at $z=0$ and at the final propagation distance $z=z_{f}$. To explain the implications of the fast collision assumption, we define the collision length $\Delta z_{c}$, which is the distance along which the envelopes of the colliding pulses overlap, by $\Delta z_{c}=W_{0}/|d_{1}|$, where for simplicity we assume $W_{10}=W_{20}=W_{0}$. The fast collision assumption then means that $\Delta z_{c}$ is the shortest length scale in the problem. In particular, $\Delta z_{c}\ll z_{D}$, where $z_{D}=W_{0}^{2}/2$ is the length scale characterizing the effects of second-order dispersion on single-pulse propagation (the dispersion length). Using the definitions of $\Delta z_{c}$ and $z_{D}$, we obtain $W_{0}|d_{1}|/2 \gg 1$, as the condition for a fast two-pulse collision. We now show that the condition $W_{0}|d_{1}|/2 \gg 1$ is clearly satisfied for collisions in massive multichannel weakly perturbed linear optical waveguide systems with tens or hundreds of frequency channels. Consider as an example a multichannel linear optical fiber system with a total wavelength difference $\Delta\lambda=\lambda_{2} - \lambda_{1}=0.045$ $\mu\mbox{m}$, where $\lambda_{1}=1.549$ $\mu\mbox{m}$ is the wavelength for the highest frequency channel and $\lambda_{2}=1.594$ $\mu\mbox{m}$ is the wavelength for the lowest frequency channel. These values are identical to the ones used in the multichannel optical fiber transmission experiment with 109 channels reported in Ref. \cite{Mollenauer2003}. The group refractive index values for these wavelengths are $n_{g1}=1.4626$ and $n_{g2}=1.4629$, respectively \cite{Agrawal2001,Malitson65,Tan98}. Assuming in addition that the pulse width is 20 ps and that $|\tilde\beta_{2}|=1$ $\mbox{ps}^2/\mbox{km}$, which are typical values for mulitchannel transmission at 10 Gb/s per channel, we obtain $W_{0}|d_{1}|/2 = 2 \times 10^{4} \gg 1$ for collisions between pulses from the two outermost frequency channels. Moreover, since the frequency difference between adjacent channels in multichannel transmission is constant, we obtain that in a system with 109 channels $W_{0}|d_{1}|/2 \simeq 185.2 \gg 1$ for collisions between pulses from adjacent channels. Therefore, the condition for a fast collision is satisfied for all collisions in this linear optical fiber transmission system. As a second example, consider linear multichannel transmission in a silicon waveguide with $\Delta\lambda=\lambda_{2} - \lambda_{1}=0.05$ $\mu\mbox{m}$, $\lambda_{1}=0.75$ $\mu\mbox{m}$, and $\lambda_{2}=0.8$ $\mu\mbox{m}$. The group refractive index values for these wavelengths are $n_{g1}=4.3597$ and $n_{g2}=4.3285$, respectively \cite{Aspnes83}. Assuming that the pulse width is 20 ps and that $|\tilde\beta_{2}|=1$ $\mbox{ps}^2/\mbox{km}$, we find $W_{0}|d_{1}|/2 = 2.08 \times 10^{6} \gg 1$ for collisions between pulses from the two outermost frequency channels. Furthermore, we obtain that in a multichannel system with 109 channels $W_{0}|d_{1}|/2 \simeq 1.926 \times 10^{4} \gg 1$ for collisions between pulses from adjacent frequency channels. Thus, the condition for a fast collision is satisfied for all collisions in this linear silicon waveguide transmission system. The perturbation technique for calculating the collision-induced amplitude shift was first presented in our work in Ref. \cite{PNH2017B}. We present here a review of this perturbation technique along with some important features that were not discussed in Ref. \cite{PNH2017B}. Our perturbation procedure is a generalization of the perturbative technique, developed in Refs. \cite{PCG2003,PCG2004} for calculating the effects of weak perturbations on fast two-soliton collisions. Following the perturbative calculation for the two-soliton collision, we look for a solution of Eq. (\ref{coll1}) in the form \begin{eqnarray}&& \!\!\!\!\!\!\! \psi_{j}(t,z)=\psi_{j0}(t,z)+\phi_{j}(t,z), \label{coll2} \end{eqnarray} where $j=1,2$, $\psi_{j0}$ are the solutions of Eq. (\ref{coll1}) without the inter-pulse interaction terms, and $\phi_{j}$ describe corrections to $\psi_{j0}$ due to inter-pulse interaction. By definition, $\psi_{10}$ and $\psi_{20}$ satisfy the following two weakly perturbed linear propagation equations \begin{eqnarray}&& \!\!\!\!\!\!\! i\partial_z\psi_{10}\!-\!\mbox{sgn}(\tilde\beta_{2})\partial_{t}^{2}\psi_{10}\!=\! -i\epsilon_{1}\psi_{10}\! -\!i\epsilon_{3}|\psi_{10}|^2\psi_{10}, \!\!\!\!\!\!\!\! \label{coll2_add1} \end{eqnarray} and \begin{eqnarray}&& \!\!\!\!\!\!\! i\partial_z\psi_{20}+id_{1}\partial_{t}\psi _{20} -\mbox{sgn}(\tilde\beta_{2})\partial_{t}^2\psi_{20}= \nonumber \\&& -i\epsilon_{1}\psi_{20} -i\epsilon_{3}|\psi_{20}|^2\psi_{20}. \label{coll2_add2} \end{eqnarray} We now substitute the ansatz (\ref{coll2}) into Eq. (\ref{coll1}) and use Eqs. (\ref{coll2_add1}) and (\ref{coll2_add2}) to obtain equations for the $\phi_{j}$. We focus attention on the calculation of $\phi_{1}$, as the calculation of $\phi_{2}$ is similar. Taking into account only leading-order effects of the collision, i.e., effects of order $\epsilon_{3}$, we can neglect terms containing $\phi_{j}$ on the right hand side of the resulting equation. We therefore obtain: \begin{equation} i\partial_z\phi_{1}-\mbox{sgn}(\tilde\beta_{2})\partial_{t}^{2}\phi_{1}= -2i\epsilon_{3}|\psi_{20}|^2\psi_{10}. \label{coll3} \end{equation} We continue to follow the perturbation procedure for fast two-soliton collisions and substitute $\psi_{j0}(t,z)=\Psi_{j0}(t,z)\exp[i\chi_{j0}(t,z)]$ and $\phi_{1}(t,z)=\Phi_{1}(t,z)\exp[i\chi_{10}(t,z)]$ into Eq. (\ref{coll3}), where $\Psi_{j0}$ and $\chi_{j0}$ are real-valued. We arrive at the following equation for $\Phi_{1}$: \begin{eqnarray} && i\partial_{z}\Phi_{1} - \left(\partial_{z}\chi_{10}\right)\Phi_{1} -\mbox{sgn}(\tilde\beta_{2})\left[ \partial_{t}^{2}\Phi_{1} +2i\left(\partial_{t}\chi_{10}\right)\partial_{t}\Phi_{1} \right. \nonumber \\&& \left. +i\left(\partial_{t}^{2}\chi_{10}\right)\Phi_{1} -\left(\partial_{t}\chi_{10}\right)^2\Phi_{1} \right] = -2i\epsilon_{3}\Psi_{20}^{2}\Psi_{10}. \label{coll3_add1} \end{eqnarray} The term on the right hand side of Eq. (\ref{coll3_add1}) is of order $\epsilon_{3}$. In addition, since the collision length $\Delta z_{c}$ is of order $1/|d_{1}|$, the term $i\partial_{z}\Phi_{1}$ is of order $|d_{1}| \times O(\Phi_{1})$. Equating the orders of $i\partial_{z}\Phi_{1}$ and $-2\epsilon_{3}\Psi_{20}^{2}\Psi_{10}$, we find that $\Phi_{1}$ is of order $\epsilon_{3}/|d_{1}|$. In addition, we observe that all other terms on the left hand side of Eq. (\ref{coll3_add1}) are of order $\epsilon_{3}/|d_{1}|$ or higher, and can therefore be neglected. As a result, the equation for $\Phi_{1}$ in the leading order of the perturbative calculation is: \begin{eqnarray} && \partial_{z}\Phi_{1}= -2\epsilon_{3}\Psi_{20}^{2}\Psi_{10}. \label{coll4} \end{eqnarray} Equation (\ref{coll4}) has the same form as the equation obtained for a fast collision between two solitons of the NLS equation in the presence of weak cubic loss (see Eq. (9) in Ref. \cite{PNC2010}). We also note that since the $\Psi_{j0}$ are real-valued, $\Phi_{1}$ is real-valued as well. We calculate the net collision-induced amplitude shift of pulse 1 from the net collision-induced change in $\Phi_{1}$. For this purpose, we denote by $z_{c}$ the collision distance, which is the distance at which the maxima of $|\psi_{j}(t,z)|$ coincide. In a fast collision, the collision takes place in a small interval $[z_{c}-\Delta z_{c},z_{c}+\Delta z_{c}]$ around $z_{c}$. Therefore, the net collision-induced change in the envelope of pulse 1 $\Delta\Phi_{1}(t,z_{c})$ can be evaluated by: $\Delta\Phi_{1}(t,z_{c})=\Phi_{1}(t,z_{c}+ \Delta z_{c})-\Phi_{1}(t,z_{c}-\Delta z_{c})$. To calculate $\Delta\Phi_{1}(t,z_{c})$, we introduce the approximation $\Psi_{j0}(t,z)=A_{j}(z)\tilde\Psi_{j0}(t,z)$, where $\tilde\psi_{j0}(t,z)=\tilde\Psi_{j0}(t,z)\exp[i\chi_{j0}(t,z)]$ is the solution of the unperturbed linear propagation equation with unit amplitude. We then substitute the approximate expressions for $\Psi_{j0}$ into Eq. (\ref{coll4}) and integrate with respect to $z$ over the interval $[z_{c}-\Delta z_{c},z_{c}+\Delta z_{c}]$. This calculation yields: \begin{eqnarray}&& \!\!\!\!\!\! \Delta\Phi_{1}(t,z_{c})\!=\!-2\epsilon_{3} \!\!\int_{z_{c}-\Delta z_{c}}^{z_{c}+\Delta z_{c}} \!\!\!\!\!\!\!\!\!\!\! dz' A_{1}(z') A_{2}^{2}(z') \tilde\Psi_{10}(t,z')\tilde\Psi_{20}^{2}(t,z'). \nonumber \\&& \label{coll5} \end{eqnarray} The only function on the right hand side of Eq. (\ref{coll5}) that contains fast variations in $z$, which are of order 1, is $\tilde\Psi_{20}$. We can therefore approximate $A_{1}(z)$, $A_{2}(z)$, and $\tilde\Psi_{10}(t,z)$ by $A_{1}(z_{c}^{-})$, $A_{2}(z_{c}^{-})$, and $\tilde\Psi_{10}(t,z_{c})$, where $A_{j}(z_{c}^{-})$ is the limit from the left of $A_{j}$ at $z_{c}$. Furthermore, we can take into account only the fast dependence of $\tilde\Psi_{20}$ on $z$, i.e., the $z$ dependence that is contained in the factors $y=t-y_{20}-d_{1}z$. Denoting this approximation of $\tilde\Psi_{20}(t,z)$ by $\bar\Psi_{20}(y,z_{c})$, we obtain: \begin{eqnarray}&& \!\!\!\!\!\!\!\! \Delta\Phi_{1}(t,z_{c})\!=\! -2\epsilon_{3}A_{1}(z_{c}^{-}) A_{2}^{2}(z_{c}^{-}) \tilde\Psi_{10}(t,z_{c})\times \nonumber \\&& \!\!\int_{z_{c}-\Delta z_{c}}^{z_{c}+\Delta z_{c}} \!\!\!\!\!\!\!\! dz' \bar\Psi_{20}^{2}(t-y_{20}-d_{1}z',z_{c}). \label{coll5_add1} \end{eqnarray} Since the integrand on the right hand side of Eq. (\ref{coll5_add1}) is sharply peaked at a small interval around $z_{c}$, we can extend the integral's limits to $-\infty$ and $\infty$. We also change the integration variable from $z'$ to $y=t-y_{20}-d_{1}z'$ and obtain: \begin{eqnarray} && \!\!\!\!\!\!\! \Delta\Phi_{1}(t,z_{c})\!=\!-\frac{2\epsilon_{3} A_{1}(z_{c}^{-}) A_{2}^{2}(z_{c}^{-})}{|d_{1}|}\tilde\Psi_{10}(t,z_{c}) \!\!\!\int_{-\infty}^{\infty} \!\!\!\!\! dy \bar\Psi_{20}^{2}(y,z_{c}). \nonumber \\&& \label{coll6} \end{eqnarray} In Appendix \ref{appendA}, we show that the net collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ is related to the net collision-induced change in the envelope of the pulse $\Delta\Phi_{1}(t,z_{c})$ by: \begin{eqnarray}&& \!\!\!\!\!\!\!\!\!\!\!\!\!\! \Delta A_{1}^{(c)}= \left[\int_{-\infty}^{\infty} \!\!\!\!\! dt \tilde\Psi_{10}^{2}(t,z_{c})\right]^{-1} \!\!\int_{-\infty}^{\infty} \!\!\!\!\! dt \tilde\Psi_{10}(t,z_{c})\Delta\Phi_{1}(t,z_{c}). \label{coll6_add1} \end{eqnarray} Substitution of Eq. (\ref{coll6}) into Eq. (\ref{coll6_add1}) yields the following expression for the net collision-induced amplitude shift of pulse 1: \begin{eqnarray} && \!\!\!\! \Delta A_{1}^{(c)}=-\frac{2\epsilon_{3} A_{1}(z_{c}^{-}) A_{2}^{2}(z_{c}^{-})}{|d_{1}|} \int_{-\infty}^{\infty} dy \bar\Psi_{20}^{2}(y,z_{c}). \label{coll7} \end{eqnarray} Note that \begin{eqnarray} && \!\!\!\! \int_{-\infty}^{\infty} dy \bar\Psi_{20}^{2}(y,z_{c}) = \int_{-\infty}^{\infty} dt \tilde\Psi_{20}^{2}(t,z_{c}) = \int_{-\infty}^{\infty} dt |\tilde\psi_{20}(t,z_{c})|^{2}. \nonumber \end{eqnarray} But since $\int_{-\infty}^{\infty} dt |\tilde\psi_{20}(t,z)|^{2}$ is a conserved quantity of the unperturbed linear propagation equation, the following relations hold \begin{eqnarray} && \!\!\!\! \int_{-\infty}^{\infty} dt |\tilde\psi_{20}(t,z_{c})|^{2} = \int_{-\infty}^{\infty} dt |\tilde\psi_{20}(t,0)|^{2} = \int_{-\infty}^{\infty} dt \tilde\Psi_{20}^{2}(t,0) = \mbox{const}. \nonumber \end{eqnarray} Thus, we can replace the integral on the right hand side of Eq. (\ref{coll7}) by $\int_{-\infty}^{\infty} dt \tilde\Psi_{20}^{2}(t,0)$ and obtain \begin{eqnarray} && \!\!\!\! \Delta A_{1}^{(c)}=-\frac{2\epsilon_{3} A_{1}(z_{c}^{-}) A_{2}^{2}(z_{c}^{-})}{|d_{1}|} \int_{-\infty}^{\infty} dt \tilde\Psi_{20}^{2}(t,0). \label{coll7_add1} \end{eqnarray} We note that the collision-induced amplitude shift $\Delta A_{1}^{(c)}$ depends only on the values of $A_{1}(z_{c}^{-})$, $A_{2}(z_{c}^{-})$, $|d_{1}|$, and on the initial total energy of pulse 2, $\int_{-\infty}^{\infty} dt \tilde\Psi_{20}^{2}(t,0)$. The amplitude shift does not depend on any other properties of the initial pulses. Thus, the expression for the amplitude shift is universal in the sense that it is independent of the exact details of the initial pulse shapes. Equation (\ref{coll7_add1}) is expected to hold for generic pulse shapes $\Psi_{j0}(t,z)$ with tails that decay sufficiently fast, such that the approximations leading from Eq. (\ref{coll5}) to Eq. (\ref{coll6}) are valid. Our numerical simulations with the coupled propagation model (\ref{coll1}), whose results are presented in Sec. \ref{waveguides_simu}, reveal that Eq. (\ref{coll7_add1}) is valid even for pulses with power-law decreasing tails, such as generalized Cauchy-Lorentz pulses, and for pulses that are initially nonsmooth and that develop significant tails during the propagation, such as square pulses. We now use Eq. (\ref{coll7_add1}) to obtain expressions for the amplitude shifts in fast collisions between hyperbolic secant pulses, generalized Cauchy-Lorentz pulses, and square pulses, whose initial envelopes are given by Eqs. (\ref{IC1}), (\ref{IC2}), and (\ref{IC3}), respectively. We find that in all three cases, the amplitude shift of pulse 1 has the form \begin{eqnarray} && \Delta A_{1}^{(c)}= -C_{P} \epsilon_{3} W_{20} A_{1}(z_{c}^{-}) A_{2}^{2}(z_{c}^{-})/|d_{1}|, \label{coll8} \end{eqnarray} where $W_{20}$ is the initial pulse width of pulse 2 and $C_{P}$ is a constant, whose value depends on the total initial energy of pulse 2. Furthermore, we find that $C_{P}=4$ for a collision between hyperbolic secant pulses, $C_{P}=3\pi/2^{7/4}$ for a collision between generalized Cauchy-Lorentz pulses, and $C_{P}=2$ for a collision between square pulses. In Ref. \cite{PNC2010}, we showed that the amplitude shift in a fast collision between two solitons of the NLS equation in the presence of weak cubic loss is given by: $\Delta\eta_{1}^{(c)}=-4\epsilon_{3}\eta_{1}(z_{c}^{-})\eta_{2}(z_{c}^{-})/|\Delta\beta|$ (see Eq. (11) in Ref. \cite{PNC2010}). Noting that the soliton width is $W_{j}=1/\eta_{j}$, we can express the collision-induced amplitude shift of the soliton as: \begin{eqnarray} && \Delta\eta_{1}^{(c)}= -4\epsilon_{3}W_{2}(z_{c}^{-})\eta_{1}(z_{c}^{-}) \eta_{2}^{2}(z_{c}^{-})/|\Delta\beta| . \label{coll8_add2} \end{eqnarray} Thus, the expression for the collision-induced amplitude shift of the soliton has exactly the same form as the expression in Eq. (\ref{coll8}) for a collision between two pulses of the linear propagation equation. We also observe that $C_{P}=4$ in a two-soliton collision and in a collision between two hyperbolic secant pulses of the linear propagation equation. \subsection{Numerical simulations for different pulse shapes} \label{waveguides_simu} Since the prediction of section \ref{waveguides_delta_A} for universal behavior of the collision-induced amplitude shift in fast two-pulse collisions is based on several simplifying assumptions, it is important to check this prediction by numerical simulations with the full propagation model (\ref{coll1}). Equation (\ref{coll1}) is numerically integrated by employing the split-step method with periodic boundary conditions \cite{Agrawal2001,Yang2010}. For concreteness and without loss of generality, we present the results of the simulations with parameter values $\epsilon_{1}=0.01$, $\epsilon_{3}=0.01$, and $\mbox{sgn}(\tilde\beta_{2})=1$. Since we are interested in fast collisions, the values of $d_{1}$ are varied in the intervals $-60 \le d_{1} \le -2$ and $2 \le d_{1} \le 60$. To demonstrate the universal behavior of the collision-induced amplitude shift, we carry out the simulations with the three representative initial pulse shapes given by Eqs. (\ref{IC1})-(\ref{IC3}), which correspond to hyperbolic secant pulses, generalized Cauchy-Lorentz pulses, and square pulses. The values of the initial amplitudes, initial widths, initial phases, and initial position of pulse 1 are chosen as $A_{j}(0)=1$, $W_{j0}=4$, $\alpha_{j0}=0$, and $y_{10}=0$. The initial position of pulse 2 $y_{20}$ and the final propagation distance $z_{f}$ are chosen, such that the two pulses are well separated at $z=0$ and at $z=z_{f}$. In particular, we choose $y_{20}=\pm 25$ and $z_{f}=4$ for hyperbolic secant pulses, $y_{20}=\pm 20$ and $z_{f}=3$ for generalized Cauchy-Lorentz pulses, and $y_{20}=\pm 6$ and $z_{f}=4.5$ for square pulses. We emphasize, however, that results similar to the ones presented below are obtained in numerical simulations with other physical parameter values. For each of the three types of pulse shapes we present the dependence of $\Delta A_{1}^{(c)}$ on $d_{1}$ obtained in the simulations together with the analytic prediction of Eq. (\ref{coll8}). We also discuss the behavior of the relative error in the approximation of $\Delta A_{1}^{(c)}$, which is defined by $|\Delta A_{1}^{(c)(num)}-\Delta A_{1}^{(c)(th)}|\times 100/|\Delta A_{1}^{(c)(th)}|$. The procedures used for obtaining the values of $\Delta A_{1}^{(c)}$ from Eq. (\ref{coll8}) and for calculating $\Delta A_{1}^{(c)}$ from the results of the numerical simulations are described in Appendix \ref{appendB}. \begin{figure}[ptb] \begin{tabular}{cc} \epsfxsize=8.5cm \epsffile{fig1a.eps} \\ \epsfxsize=8.5cm \epsffile{fig1b.eps} \\ \epsfxsize=8.5cm \epsffile{fig1c.eps} \end{tabular} \caption{(Color online) The pulse shapes $|\psi_{j}(t,z)|$ at $z=0$ (a), $z=z_{i}=2$ (b), and $z=z_{f}=4$ (c) in a fast collision between two hyperbolic secant pulses in a linear waveguide with weak linear and cubic loss. The first-order dispersion coefficient is $d_{1}=15$. The blue triangles and green circles represent the initial pulse shapes $|\psi_{j}(t,0)|$ with $j=1,2$ in (a), and the perturbation theory's prediction for $|\psi_{j}(t,z)|$ with $j=1,2$ in (b) and (c). The solid red and dashed magenta curves in (b) and (c) correspond to $|\psi_{j}(t,z)|$ with $j=1,2$, obtained by numerical solution of Eq. (\ref{coll1}).} \label{fig1} \end{figure} We start by discussing the results of the numerical simulations for fast collisions between hyperbolic secant pulses. Figure \ref{fig1} shows the initial pulse shapes $|\psi_{j}(t,0)|$, and the pulse shapes $|\psi_{j}(t,z)|$ obtained in the simulation with $d_{1}=15$ at the intermediate distance $z_{i}=2>z_{c}$, and at the final distance $z_{f}=4$ \cite{zi_values}. Also shown is the analytic prediction for $|\psi_{j}(t,z)|$, which is obtained by employing Eq. (\ref{coll2}). We observe very good agreement between the analytic prediction and the result of the numerical simulation at both $z=z_{i}$ and $z=z_{f}$. In addition, we find that the pulses undergo broadening due to second-order dispersion and that no significant tail develops up to the final distance $z_{f}$. The dependence of the collision-induced amplitude shift $\Delta A_{1}^{(c)}$ on $d_{1}$ obtained by the numerical simulations is shown in Fig. \ref{fig2} along with the analytic prediction of Eq. (\ref{coll8}). The agreement between the analytic prediction and the simulations results is very good. More specifically, the relative error in the approximation of $\Delta A_{1}^{(c)}$ is less than 4.3$\%$ for $10 \le |d_{1}| \le 60$ and less than 8.2$\%$ for $2 \le |d_{1}| < 10$. Thus, the analytic prediction of Eq. (\ref{coll8}) provides a good approximation for the actual value of the collision-induced amplitude shift even at $d_{1}$ values that are not much larger than 1. These findings together with similar findings obtained in Ref. \cite{PNH2017B} for collisions between Gaussian pulses demonstrate the universal behavior of the amplitude shift in fast collisions between pulses with shapes that exhibit exponential or faster than exponential decrease with time. \begin{figure}[ptb] \epsfxsize=12.0cm \epsffile{fig2.eps} \caption{(Color online) The collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ vs the group velocity parameter $d_{1}$ in a fast collision between two hyperbolic secant pulses in a linear waveguide with weak linear and cubic loss. The red circles correspond to the result obtained by numerical solution of Eq. (\ref{coll1}). The solid blue curve represents the prediction of Eq. (\ref{coll8}) with $C_{P}=4$.} \label{fig2} \end{figure} Next, we consider fast collisions between generalized Cauchy-Lorentz pulses. The initial pulse shapes $|\psi_{j}(t,0)|$, and the pulse shapes $|\psi_{j}(t,z)|$ obtained in the simulation with $d_{1}=15$ at $z_{i}=1.571>z_{c}$ and at $z_{f}=3$ are shown in Fig. \ref{fig3}. The analytic prediction for $|\psi_{j}(t,z)|$, which is obtained with Eq. (\ref{coll2}), is also shown. We observe that the pulses undergo considerable broadening and develop observable tails due to the effects of second-order dispersion. Despite of this, the agreement between the prediction of the perturbation theory and the simulation's result is very good at both $z=z_{i}$ and $z=z_{f}$. The dependence of $\Delta A_{1}^{(c)}$ on $d_{1}$ obtained in the simulations is shown in Fig. \ref{fig4} together with the analytic prediction of Eq. (\ref{coll8}). We observe very good agreement between the results of the simulations and the analytic prediction. In particular, the relative error in the approximation of $\Delta A_{1}^{(c)}$ is smaller than 2.9$\%$ for $10 \le |d_{1}| \le 60$ and smaller than 6.8$\%$ for $2 \le |d_{1}| < 10$. Similar results are obtained for other values of the physical parameters and for other pulse shapes with power-law decreasing tails. Thus, our current study extends the results of Ref. \cite{PNH2017B}, in which it was assumed that the initial pulse shapes must possess tails that exhibit exponential or faster than exponential decrease with time for the perturbation theory to hold. Moreover, our results demonstrate that the universal behavior of the collision-induced amplitude shift is also observed in collisions between pulses with a relatively slow decay of the tails, such as power-law decay. \begin{figure}[ptb] \begin{tabular}{cc} \epsfxsize=8.5cm \epsffile{fig3a.eps} \\ \epsfxsize=8.5cm \epsffile{fig3b.eps} \\ \epsfxsize=8.5cm \epsffile{fig3c.eps} \end{tabular} \caption{(Color online) The pulse shapes $|\psi_{j}(t,z)|$ at $z=0$ (a), $z=z_{i}=1.571$ (b), and $z=z_{f}=3$ (c) in a fast collision between two generalized Cauchy-Lorentz pulses in a linear waveguide with weak linear and cubic loss. The first-order dispersion coefficient is $d_{1}=15$. The blue triangles and green circles represent the initial pulse shapes $|\psi_{j}(t,0)|$ with $j=1,2$ in (a), and the perturbation theory's prediction for $|\psi_{j}(t,z)|$ with $j=1,2$ in (b) and (c). The solid red and dashed magenta curves in (b) and (c) correspond to $|\psi_{j}(t,z)|$ with $j=1,2$, obtained by numerical solution of Eq. (\ref{coll1}).} \label{fig3} \end{figure} \begin{figure}[ptb] \epsfxsize=12.0cm \epsffile{fig4.eps} \caption{(Color online) The collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ vs the group velocity parameter $d_{1}$ in a fast collision between two generalized Cauchy-Lorentz pulses in a linear waveguide with weak linear and cubic loss. The red circles represent the result obtained by numerical solution of Eq. (\ref{coll1}). The solid blue curve represents the prediction of Eq. (\ref{coll8}) with $C_{P}=3\pi/2^{7/4}$.} \label{fig4} \end{figure} We now turn to consider fast collisions between square pulses. The initial pulse shapes $|\psi_{j}(t,0)|$, and the pulse shapes $|\psi_{j}(t,z)|$ obtained in the simulation with $d_{1}=15$ at the intermediate distance $z_{i}=0.986>z_{c}$ and at the final distance $z_{f}=4.5$ are shown in Fig. \ref{fig5}. The analytic prediction obtained with Eq. (\ref{coll2}) is also shown. We observe that the pulses develop extended oscillatory tails and experience broadening due to the effects of second-order dispersion. The development of the extended tails occurs on a length scale in $z$, which is smaller than the collision length $\Delta z_{c}$. Despite of this fact, we observe very good agreement between the perturbation theory's prediction for the pulse shapes and the simulation's result at both $z=z_{i}$ and $z=z_{f}$. The dependence of the collision-induced amplitude shift $\Delta A_{1}^{(c)}$ on $d_{1}$ obtained in the simulations is shown in Fig. \ref{fig6} along with the analytic prediction of Eq. (\ref{coll8}). The agreement between the analytic prediction and the results of the simulations is very good, despite of the development of extended pulse tails. More specifically, the relative error in the approximation of $\Delta A_{1}^{(c)}$ is smaller than 3.8$\%$ for $10 \le |d_{1}| \le 60$, smaller than 7.2$\%$ for $3 \le |d_{1}| < 10$, and is equal to 22.0$\%$ at $|d_{1}|=2$. The good agreement between the analytic prediction and the results of the numerical simulations can be explained in the following manner. First, since $\Delta z_{c} \ll z_{D}$, most of the energy is contained in the main bodies of the pulses during the collision [see Fig. \ref{fig5}(b)]. Second, the total energy integrals $\int_{-\infty}^{\infty} dt \tilde\Psi_{j0}^{2}(t,z)$, which appear in the calculation of $\Delta A_{1}^{(c)}$ [see Eqs. (\ref{coll6_add1})-(\ref{coll7_add1})], are conserved by the unperturbed linear propagation equation. As a result, the redistribution of the total energy of the pulses due to the development of extended tails does not have a significant effect on the values of $\Delta A_{1}^{(c)}$ measured in the simulations for $|d_{1}| \ge 3$, as long as the main bodies of the pulses are well-separated at $z_{f}$. Instead, contributions to the amplitude shift coming from interaction between the main body of one pulse and the tail of the other pulse and between the tails of both pulses partially compensate for the reduction in the contribution coming from direct interaction between the main bodies of the two pulses. Based on the results presented in Figs. \ref{fig5} and \ref{fig6} and on similar results obtained with other values of the physical parameters, we conclude that the universal behavior of the collision-induced amplitude shift can be observed even in collisions between pulses, which develop extended tails during the collision. \begin{figure}[ptb] \begin{tabular}{cc} \epsfxsize=8.5cm \epsffile{fig5a.eps} \\ \epsfxsize=8.5cm \epsffile{fig5b.eps} \\ \epsfxsize=8.5cm \epsffile{fig5c.eps} \end{tabular} \caption{(Color online) The pulse shapes $|\psi_{j}(t,z)|$ at $z=0$ (a), $z=z_{i}=0.986$ (b), and $z=z_{f}=4.5$ (c) in a fast collision between two square pulses in a linear waveguide with weak linear and cubic loss. The first-order dispersion coefficient is $d_{1}=15$. The blue triangles and green circles represent the initial pulse shapes $|\psi_{j}(t,0)|$ with $j=1,2$ in (a), and the perturbation theory's prediction for $|\psi_{j}(t,z)|$ with $j=1,2$ in (b) and (c). The solid red and dashed magenta curves in (b) and (c) correspond to $|\psi_{j}(t,z)|$ with $j=1,2$, obtained by numerical solution of Eq. (\ref{coll1}).} \label{fig5} \end{figure} \begin{figure}[ptb] \epsfxsize=12.0cm \epsffile{fig6.eps} \caption{(Color online) The collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ vs the group velocity parameter $d_{1}$ in a fast collision between two square pulses in a linear waveguide with weak linear and cubic loss. The red circles represent the result obtained by numerical simulations with Eq. (\ref{coll1}). The solid blue curve corresponds to the prediction of Eq. (\ref{coll8}) with $C_{P}=2$.} \label{fig6} \end{figure} \section{Fast collisions in systems described by coupled linear diffusion-advection models} \label{diffusion} \subsection{Evolution model and initial pulse shapes} \label{diffusion_model} We consider the dynamics of a fast collision between pulses of two substances, denoted by 1 and 2, that evolve in the presence of linear diffusion, weak linear and quadratic loss, and advection of material 2 with velocity $v_{d}$ relative to material 1. The dynamics of the fast two-pulse collision is described by the following system of perturbed coupled linear diffusion-advection equations \cite{PNH2017B}: \begin{eqnarray} && \!\!\!\!\!\!\!\!\!\!\!\!\!\! \partial _{t}u_{1}=\partial _{x}^{2}u_{1}-\varepsilon_{1}u_{1} -\varepsilon_{2}u_{1}^{2}-2\varepsilon_{2}u_{1}u_{2}, \nonumber \\&& \!\!\!\!\!\!\!\!\!\!\!\!\!\! \partial _{t}u_{2}=\partial _{x}^{2}u_{2}-v_{d}\partial _{x}u_{2} -\varepsilon_{1}u_{2}-\varepsilon_{2}u_{2}^{2}-2\varepsilon_{2}u_{1}u_{2}, \label{rda1} \end{eqnarray} where $u_{1}$ and $u_{2}$ are the concentrations of substance 1 and 2, $t$ is time, $x$ is a spatial coordinate, and the linear and quadratic loss coefficients $\varepsilon_{1}$ and $\varepsilon_{2}$ satisfy $0<\varepsilon_{1} \ll 1$ and $0<\varepsilon_{2} \ll 1$ \cite{Dimensions2}. The term $-v_{d}\partial _{x}u_{2}$ in Eq. (\ref{rda1}) describes advection, while the terms $-\varepsilon_{1}u_{j}$ describe the effects of linear loss. The terms $-\varepsilon_{2}u_{j}^{2}$ and $-2\varepsilon_{2}u_{j}u_{k}$ describe intra-substance and inter-substance effects due to quadratic loss, respectively. Note that in Eq. (\ref{rda1}) we assume that the nonlinear loss is weak, and therefore, the effects of higher-order loss can be neglected. We point out that the effects of higher-order loss on the collision-induced amplitude shift can be calculated in a manner similar to the one described in Sec. \ref{diffusion_delta_A} (see also, Ref. \cite{QMN2018}, where a similar calculation was performed for collisions between Gaussian pulses in weakly perturbed linear optical waveguides). We are interested in demonstrating universal behavior of the collision-induced amplitude shift. For this purpose, we consider fast collisions between pulses with generic initial shapes and with tails that decay sufficiently fast, such that the values of the integrals $\int_{-\infty}^{\infty} dx u_{j}(x,0)$ are finite. We assume that the pulses can be characterized by initial amplitudes $A_{j}(0)$, initial widths $W_{j0}$, and initial positions $x_{j0}$. Similar to Sec. \ref{waveguides}, we demonstrate the universal behavior of the collision-induced amplitude shift by considering the following three major types of pulses: (1) pulses with exponentially decreasing tails, (2) pulses with power-law decreasing tails, (3) pulses that are initially nonsmooth. For concreteness, we demonstrate the behavior of the amplitude shift using the following representative initial pulses: hyperbolic secant pulses in (1), generalized Cauchy-Lorentz pulses in (2), and square pulses in (3). The initial concentrations $u_{j}(x,0)$ for these pulses are given by \begin{eqnarray} && u_{j}(x,0)=A_{j}(0)\sech\left[(x-x_{j0})/W_{j0}\right], \label{rda_IC1} \end{eqnarray} with $j=1,2$ for hyperbolic secant pulses, by \begin{eqnarray} && u_{j}(x,0)=\frac{A_{j}(0)} {1+ 2 \left[(x-x_{j0})/W_{j0} \right]^{4}} , \label{rda_IC2} \end{eqnarray} with $j=1,2$ for generalized Cauchy-Lorentz pulses, and by \begin{eqnarray} && \!\!\!\!\!\!\!\!\! u_{j}(x,0)= \left\{\begin{array}{l l} A_{j}(0) & \;\; \mbox{for} \;\; |x-x_{j0}| \le W_{j0}/2,\\ 0 & \;\; \mbox{for} \;\; |x-x_{j0}| > W_{j0}/2,\\ \end{array} \right. \label{rda_IC3} \end{eqnarray} with $j=1,2$ for square pulses. We point out that similar behavior of the collision-induced amplitude shift is observed for other choices of the initial pulse shapes. \subsection{Calculation of the collision-induced amplitude shift} \label{diffusion_delta_A} To obtain the expressions for the collision-induced amplitude shifts, we assume a complete fast two-pulse collision. The complete collision assumption means that the two pulses are well separated at $t=0$ and at the final time $t=t_{f}$. The assumption of a fast collision means that the collision time interval $\Delta t_{c}=W_{0}/|v_{d}|$, which is the time interval during which the two pulses overlap, is much shorter than the diffusion time $t_{D}=W_{0}^{2}$. Requiring $\Delta t_{c} \ll t_{D}$, we obtain $W_{0}|v_{d}| \gg 1$, as the condition for a fast collision. We now demonstrate that the condition $W_{0}|v_{d}| \gg 1$ for a fast collision can be realized in weakly perturbed physical systems described by linear diffusion-advection models. An important example for these systems is provided by binary gas mixtures. For concreteness, consider diffusion of $\mbox{O}_{2}$ in $\mbox{N}_{2}$ at 293.15$^{\circ}$K and at a pressure of 1 atm. The diffusion coefficient is $D=0.202$ $\mbox{cm}^{2}/\mbox{s}$ \cite{CRC2004}. Thus, for an initial pulse width of 1 cm and for an advection velocity value of $V_{d}=3$ $\mbox{cm}/\mbox{s}$, we find that $W_{0}|v_{d}| =14.85$. Similar results are obtained in other binary gas mixtures. For example, the diffusion coefficient of $\mbox{CO}_{2}$ in $\mbox{N}_{2}$ at 293.15$^{\circ}$K and at a pressure of 1 atm is $D=0.160$ $\mbox{cm}^{2}/\mbox{s}$ \cite{CRC2004}. Using this value we find that for an initial pulse width of 1 cm and for $V_{d}=3$ $\mbox{cm}/\mbox{s}$, $W_{0}|v_{d}| =18.75$. Therefore, the condition $W_{0}|v_{d}| \gg 1$ for a fast two-pulse collision is satisfied in both cases. The perturbation technique for calculating the collision-induced amplitude shift is similar to the one derived in section \ref{waveguides_delta_A} for treating fast collisions between pulses of the linear propagation equation. Thus, we look for a solution of Eq. (\ref{rda1}) in the form \begin{eqnarray}&& \!\!\!\!\!\!\! u_{j}(x,t)=u_{j0}(x,t)+\phi_{j}(x,t), \label{rda2} \end{eqnarray} where $j=1,2$, $u_{j0}$ are solutions of Eq. (\ref{rda1}) without inter-pulse interaction, and $\phi_{j}$ describe collision-induced effects. By definition, $u_{10}$ and $u_{20}$ satisfy the following two weakly perturbed linear diffusion equations \begin{eqnarray}&& \!\!\!\!\!\!\! \partial _{t}u_{10}=\partial _{x}^{2}u_{10}-\varepsilon_{1}u_{10} -\varepsilon_{2}u_{10}^{2}, \!\!\!\!\!\!\!\! \label{rda2_add1} \end{eqnarray} and \begin{eqnarray}&& \!\!\!\!\!\!\! \partial _{t}u_{20}=\partial _{x}^{2}u_{20}-v_{d}\partial _{x}u_{20} -\varepsilon_{1}u_{20}-\varepsilon_{2}u_{20}^{2}. \!\!\!\!\!\!\!\! \label{rda2_add2} \end{eqnarray} We substitute the ansatz (\ref{rda2}) into Eq. (\ref{rda1}) and use Eqs. (\ref{rda2_add1}) and (\ref{rda2_add2}) to obtain equations for $\phi_{1}$ and $\phi_{2}$. We concentrate on the calculation of $\phi_{1}$, since the calculation of $\phi_{2}$ is similar. Taking into account only leading-order effects of the collision, we can neglect terms that contain products of $\varepsilon_{1}$ or $\varepsilon_{2}$ with $\phi_{1}$ or $\phi_{2}$, such as $-\varepsilon_{1}\phi_{1}$, $-2\varepsilon_{2}u_{10}\phi_{1}$, $-2\varepsilon_{2}u_{20}\phi_{1}$, $-2\varepsilon_{2}u_{10}\phi_{2}$, etc. We therefore obtain: \begin{equation} \partial_{t}\phi_{1}=\partial _{x}^{2}\phi_{1}-2\varepsilon_{2}u_{10}u_{20}. \label{rda3} \end{equation} The term $-2\varepsilon_{2}u_{10}u_{20}$ on the right hand side of Eq. (\ref{rda3}) is of order $\varepsilon_{2}$. Additionally, the collision time interval $\Delta t_{c}$ is of order $1/|v_{d}|$ and therefore, the term $\partial_{t}\phi_{1}$ is of order $|v_{d}| \times O(\phi_{1})$. Equating the orders of $\partial_{t}\phi_{1}$ and $-2\varepsilon_{2}u_{10}u_{20}$, we find that $\phi_{1}$ is of order $\varepsilon_{2}/|v_{d}|$. As a result, the term $\partial _{x}^{2}\phi_{1}$ is of order $\varepsilon_{2}/|v_{d}|$ and can be neglected. Thus, the equation for the collision-induced change of pulse 1 in the leading order of the perturbative calculation is: \begin{equation} \partial _{t}\phi_{1}=-2\varepsilon_{2}u_{10}u_{20}. \label{rda4} \end{equation} Equation (\ref{rda4}) is similar to Eq. (\ref{coll4}) in section \ref{waveguides_delta_A} and also to the equation obtained in Ref. \cite{PNC2010} for a fast collision between two solitons of the NLS equation in the presence of weak cubic loss. The net collision-induced amplitude shift of pulse 1 is calculated from the net collision-induced change in the concentration of pulse 1. We denote by $t_{c}$ the collision time, which is the time at which the maxima of $u_{j}(x,t)$ coincide. In a fast collision, the collision takes place in the small time interval $[t_{c}-\Delta t_{c},t_{c}+\Delta t_{c}]$ around $t_{c}$. Therefore, the net collision-induced change in the concentration of pulse 1 $\Delta\phi_{1}(x,t_{c})$ can be estimated by: $\Delta\phi_{1}(x,t_{c})=\phi_{1}(x,t_{c}+\Delta t_{c})- \phi_{1}(x,t_{c}-\Delta t_{c})$. To calculate $\Delta\phi_{1}(x,t_{c})$, we introduce the approximation $u_{j0}(x,t)=A_{j}(t) \tilde u_{j0}(x,t)$, where $\tilde u_{j0}(x,t)$ is the solution of the unperturbed linear diffusion equation with unit amplitude. Substituting the approximate expressions for $u_{j0}$ into Eq. (\ref{rda4}) and integrating with respect to time over the interval $[t_{c}-\Delta t_{c},t_{c}+\Delta t_{c}]$, we obtain: \begin{eqnarray} && \!\!\!\!\!\!\!\!\!\!\! \Delta\phi_{1}(x,t_{c})\!=\! -2\varepsilon_{2}\!\!\int_{t_{c}-\Delta t_{c}}^{t_{c}+\Delta t_{c}} \!\!\!\!\!\!\!\!\!\! dt' A_{1}(t') A_{2}(t') \tilde u_{10}(x,t') \tilde u_{20}(x,t'). \nonumber \\&& \label{rda5} \end{eqnarray} The only function on the right hand side of Eq. (\ref{rda5}) that contains fast variations in $t$, which are of order 1, is $\tilde u_{20}$. Therefore, we can approximate $A_{1}(t)$, $A_{2}(t)$, and $\tilde u_{10}(x,t)$ by $A_{1}(t_{c}^{-})$, $A_{2}(t_{c}^{-})$, and $\tilde u_{10}(x,t_{c})$. Additionally, we can take into account only the fast dependence of $\tilde u_{20}$ on $t$, i.e., the $t$ dependence that is contained in the factors $y=x-x_{20}-v_{d}t$. Denoting this approximation of $\tilde u_{20}(x,t)$ by $\bar u_{20}(y,t_{c})$ and implementing the approximations, we obtain: \begin{eqnarray} && \!\!\!\!\!\!\!\!\!\!\! \Delta\phi_{1}(x,t_{c})\!=\! -2\varepsilon_{2}A_{1}(t_{c}^{-})A_{2}(t_{c}^{-})\tilde u_{10}(x,t_{c}) \times \nonumber \\&& \!\!\!\int_{t_{c}-\Delta t_{c}}^{t_{c}+\Delta t_{c}} \!\!\!\!\!\!\!\! dt' \bar u_{20}(x-x_{20}-v_{d}t',t_{c}). \label{rda5_add1} \end{eqnarray} Since the integrand on the right hand side of Eq. (\ref{rda5_add1}) is sharply peaked at a small interval about $t_{c}$, we can extend the integral's limits to $-\infty$ and $\infty$. In addition, we change the integration variable from $t'$ to $y=x-x_{20}-v_{d}t'$ and obtain \begin{eqnarray} && \!\!\!\!\!\! \Delta\phi_{1}(x,t_c)= -\frac{2\varepsilon_{2}A_{1}(t_{c}^{-})A_{2}(t_{c}^{-})}{|v_{d}|}\tilde u_{10}(x,t_{c}) \!\!\!\int_{-\infty}^{\infty} \!\!\!\!\!\!\!\! dy \, \bar u_{20}(y,t_{c}). \nonumber \\&& \label{rda6} \end{eqnarray} In Appendix \ref{appendA}, we show that the net collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ is related to $\Delta\phi_{1}(x,t_c)$ by: \begin{eqnarray}&& \!\!\!\!\!\!\!\!\!\!\!\!\!\! \Delta A_{1}^{(c)}=\left[\int_{-\infty}^{\infty} \!\!\!\!\! dx \, \tilde u_{10}(x,t_{c})\right]^{-1} \!\!\int_{-\infty}^{\infty} \!\!\!\!\! dx \, \Delta\phi_{1}(x,t_c). \label{rda6_add1} \end{eqnarray} Substituting Eq. (\ref{rda6}) into Eq. (\ref{rda6_add1}), we arrive at the following expression for the total collision-induced amplitude shift of pulse 1: \begin{eqnarray} && \!\!\!\!\!\!\!\! \Delta A_{1}^{(c)}=-\frac{2\varepsilon_{2}A_{1}(t_{c}^{-})A_{2}(t_{c}^{-})}{|v_{d}|} \int_{-\infty}^{\infty} dy \, \bar u_{20}(y,t_{c}). \label{rda7} \end{eqnarray} We note that \begin{eqnarray} && \!\!\!\! \int_{-\infty}^{\infty} dy \, \bar u_{20}(y,t_{c}) = \int_{-\infty}^{\infty} dx \, \tilde u_{20}(x,t_{c}). \nonumber \end{eqnarray} In addition, since $\int_{-\infty}^{\infty} dx \, \tilde u_{20}(x,t)$ is a conserved quantity of the unperturbed linear diffusion equation, the following relations hold \begin{eqnarray} && \!\!\!\! \int_{-\infty}^{\infty} dx \, \tilde u_{20}(x,t_{c}) = \int_{-\infty}^{\infty} dx \, \tilde u_{20}(x,0) = \mbox{const}. \nonumber \end{eqnarray} Therefore, we can replace the integral on the right hand side of Eq. (\ref{rda7}) by $\int_{-\infty}^{\infty} dx \, \tilde u_{20}(x,0)$ and obtain \begin{eqnarray} && \!\!\!\! \Delta A_{1}^{(c)}=-\frac{2\varepsilon_{2}A_{1}(t_{c}^{-})A_{2}(t_{c}^{-})}{|v_{d}|} \int_{-\infty}^{\infty} dx \, \tilde u_{20}(x,0). \label{rda7_add1} \end{eqnarray} We observe that the amplitude shift $\Delta A_{1}^{(c)}$ depends only on the values of $A_{1}(t_{c}^{-})$, $A_{2}(t_{c}^{-})$, $|v_{d}|$, and on the initial total mass of pulse 2, $\int_{-\infty}^{\infty} dx \, \tilde u_{20}(x,0)$. Since the expression for $\Delta A_{1}^{(c)}$ is independent of the exact details of the initial pulse shapes, we say that this expression is universal. Equation (\ref{rda7_add1}) is expected to hold for generic pulse shapes $u_{j0}(x,t)$ with tails that decay sufficiently fast, such that the approximations leading from Eq. (\ref{rda5}) to Eq. (\ref{rda6}) are valid. In Sec. \ref{diffusion_simu}, we show by numerical simulations with the coupled diffusion-advection model (\ref{rda1}) that Eq. (\ref{rda7_add1}) is valid even for pulses with power-law decreasing tails, such as generalized Cauchy-Lorentz pulses, and for pulses that are initially nonsmooth, such as square pulses. Using Eq. (\ref{rda7_add1}), we can obtain explicit expressions for the amplitude shifts in fast collisions between hyperbolic secant pulses, generalized Cauchy-Lorentz pulses, and square pulses, whose initial shapes are given by Eqs. (\ref{rda_IC1}), (\ref{rda_IC2}), and (\ref{rda_IC3}), respectively. We find that in all three cases, $\Delta A_{1}^{(c)}$ is given by: \begin{eqnarray} \!\!\!\!\!\!\!\! \Delta A_{1}^{(c)}=-C_{D} \varepsilon_{2} W_{20} A_{1}(t_{c}^{-}) A_{2}(t_{c}^{-})/|v_{d}|, \label{rda8} \end{eqnarray} where the value of the constant $C_{D}$ depends on the initial total mass of pulse 2. In addition, we find that $C_{D}=2\pi$ for a collision between hyperbolic secant pulses, $C_{D}=2^{1/4}\pi$ for a collision between generalized Cauchy-Lorentz pulses, and $C_{D}=2$ for a collision between square pulses. We point out that Eqs. (\ref{rda7_add1}) and (\ref{rda8}) are similar to Eqs. (\ref{coll7_add1}) and (\ref{coll8}) for the amplitude shift in a fast collision between two pulses of the linear propagation model in the presence of weak cubic loss. Equation (\ref{rda8}) is also similar to Eq. (\ref{coll8_add2}) for the amplitude shift in a fast collision between two solitons of the NLS equation in the presence of weak cubic loss. \subsection{Numerical simulations for different pulse shapes} \label{diffusion_simu} To validate the predictions for universal behavior of the amplitude shift in fast two-pulse collisions, we carry out numerical simulations with Eq. (\ref{rda1}). The equation is numerically solved by the split-step method with periodic boundary conditions \cite{Verwer2003}. For concreteness and without loss of generality, we present here the results of simulations with parameter values $\varepsilon_{1}=0.01$ and $\varepsilon_{2}=0.01$. Since we are interested in fast collisions, the values of $v_{d}$ are varied in the intervals $-60 \le v_{d} \le -2$ and $2 \le v_{d} \le 60$. The universal behavior of the collision-induced amplitude shift is demonstrated by carrying out numerical simulations with the three typical initial pulse shapes given by Eqs. (\ref{rda_IC1})-(\ref{rda_IC3}), i.e., with hyperbolic secant pulses, generalized Cauchy-Lorentz pulses, and square pulses. The values of the initial amplitudes, initial widths, and initial position of pulse 1 are chosen as $A_{j}(0)=1$, $W_{j0}=4$, and $x_{10}=0$. The initial position of pulse 2 $x_{20}$ and the final time $t_{f}$ are chosen, such that the pulses are well separated at $t=0$ and at $t=t_{f}$. More specifically, we choose $x_{20}=\pm 25$ and $t_{f}=4$ for hyperbolic secant pulses, $x_{20}=\pm 25$ and $t_{f}=3.5$ for generalized Cauchy-Lorentz pulses, and $x_{20}=\pm 6$ and $t_{f}=1.5$ for square pulses. We point out that results similar to the ones presented below are obtained in numerical simulations with other physical parameter values. For each pulse shape type, we present the dependence of $\Delta A_{1}^{(c)}$ on $v_{d}$ obtained in the simulations along with the perturbation theory's prediction of Eq. (\ref{rda8}). We also discuss the behavior of the relative error in the approximation of $\Delta A_{1}^{(c)}$. The procedures for calculating the values of $\Delta A_{1}^{(c)}$ from Eq. (\ref{rda8}) and from the results of the numerical simulations are similar to the ones described in Appendix \ref{appendB}. We first discuss the results of the numerical simulations for fast collisions between hyperbolic secant pulses. Figure \ref{fig7} shows the pulse shapes $u_j(x,t)$ obtained in the simulation with $v_{d}=15$ at $t=0$, at the intermediate time $t_{i}=2>t_{c}$, and at the final time $t_{f}=4$ \cite{ti_values}. The analytic prediction for $u_j(x,t)$, obtained with Eq. (\ref{rda2}), is also shown. We observe that the pulses experience broadening due to diffusion. Despite of the broadening, the agreement between the numerical result and the analytic prediction is very good at both $t=t_{i}$ and $t=t_{f}$. Figure \ref{fig8} shows the dependence of $\Delta A_{1}^{(c)}$ on $v_{d}$ obtained by the simulations along with the analytic prediction of Eq. (\ref{rda8}). The agreement between the analytic prediction and the simulations results is very good. In particular, the relative error in the approximation of $\Delta A_{1}^{(c)}$ is smaller than 4.1$\%$ for $10 \le |v_{d}| \le 60$ and smaller than 13.3$\%$ for $2 \le |v_{d}| < 10$. Similar behavior was observed in Ref. \cite{PNH2017B} for collisions between Gaussian pulses. Thus, our findings in the current paper and in Ref. \cite{PNH2017B} demonstrate the universal behavior of the amplitude shift in fast collisions between pulses, whose tails exhibit exponential or faster than exponential decrease with increasing distance from the pulse maximum. \begin{figure}[ptb] \begin{tabular}{cc} \epsfxsize=8.5cm \epsffile{fig7a.eps} \\ \epsfxsize=8.5cm \epsffile{fig7b.eps} \\ \epsfxsize=8.5cm \epsffile{fig7c.eps} \end{tabular} \caption{(Color online) The pulse shapes $u_j(x,t)$ at $t=0$ (a), $t=t_{i}=2$ (b), and $t=t_{f}=4$ (c) in a fast collision between two hyperbolic secant pulses in a system described by the coupled diffusion-advection model (\ref{rda1}). The advection velocity is $v_{d}=15$. The blue triangles and green circles represent the initial pulse shapes $u_j(x,0)$ with $j=1,2$ in (a), and the perturbation theory's prediction for $u_j(x,t)$ with $j=1,2$ in (b) and (c). The solid red and dashed magenta curves in (b) and (c) correspond to $u_j(x,t)$ with $j=1,2$, obtained by numerical solution of Eq. (\ref{rda1}).} \label{fig7} \end{figure} \begin{figure}[ptb] \epsfxsize=12.0cm \epsffile{fig8.eps} \caption{(Color online) The collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ vs advection velocity $v_{d}$ in a fast collision between two hyperbolic secant pulses in a system described by the coupled diffusion-advection model (\ref{rda1}). The red circles represent the result obtained by numerical solution of Eq. (\ref{rda1}). The solid blue curve corresponds to the prediction of Eq. (\ref{rda8}) with $C_{D}=2\pi$.} \label{fig8} \end{figure} Next, we present the results of numerical simulations for fast collisions between generalized Cauchy-Lorentz pulses. Figure \ref{fig9} shows the pulse shapes $u_j(x,t)$ obtained in the simulation with $v_{d}=15$ at $t=0$, $t_{i}=1.929>t_{c}$, and $t_{f}=3.5$. Also shown is the analytic prediction for $u_j(x,t)$, which is obtained with Eq. (\ref{rda2}). The agreement between the numerical result and the analytic prediction is very good at both $t=t_{i}$ and $t=t_{f}$ despite of the diffusion-induced broadening experienced by the pulses. Additionally, we do not observe any noticeable oscillatory features in the pulse tails, such as the ones seen in Figs. \ref{fig3}(b) and \ref{fig3}(c) for collisions between generalized Cauchy-Lorentz pulses in linear optical waveguides. The dependence of $\Delta A_{1}^{(c)}$ on $v_{d}$ obtained in the simulations is shown in Fig. \ref{fig10} together with the analytic prediction of Eq. (\ref{rda8}). We observe very good agreement between the results of the simulations and the analytic prediction. Indeed, the relative error in the approximation of $\Delta A_{1}^{(c)}$ is less than 3.3$\%$ for $10 \le |v_{d}| \le 60$ and less than 8.9$\%$ for $2 \le |v_{d}| < 10$. Similar results are obtained for other values of the physical parameters and for other pulse shapes with power-law decreasing tails. We therefore conclude that the universal behavior of the collision-induced amplitude shift is also observed in fast collisions between pulses, whose tails exhibit relatively slow (power-law) decrease with increasing distance from the pulse maximum. \begin{figure}[ptb] \begin{tabular}{cc} \epsfxsize=8.5cm \epsffile{fig9a.eps} \\ \epsfxsize=8.5cm \epsffile{fig9b.eps} \\ \epsfxsize=8.5cm \epsffile{fig9c.eps} \end{tabular} \caption{(Color online) The pulse shapes $u_j(x,t)$ at $t=0$ (a), $t=t_{i}=1.929$ (b), and $t=t_{f}=3.5$ (c) in a fast collision between two generalized Cauchy-Lorentz pulses in a system described by the coupled diffusion-advection model (\ref{rda1}). The advection velocity is $v_{d}=15$. The blue triangles and green circles represent the initial pulse shapes $u_j(x,0)$ with $j=1,2$ in (a), and the perturbation theory's prediction for $u_j(x,t)$ with $j=1,2$ in (b) and (c). The solid red and dashed magenta curves in (b) and (c) correspond to $u_j(x,t)$ with $j=1,2$, obtained by numerical solution of Eq. (\ref{rda1}).} \label{fig9} \end{figure} \begin{figure}[ptb] \epsfxsize=12.0cm \epsffile{fig10.eps} \caption{(Color online) The collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ vs advection velocity $v_{d}$ in a fast collision between two generalized Cauchy-Lorentz pulses in a system described by the coupled diffusion-advection model (\ref{rda1}). The red circles represent the result obtained by numerical solution of Eq. (\ref{rda1}). The solid blue curve corresponds to the prediction of Eq. (\ref{rda8}) with $C_{D}=2^{1/4}\pi$.} \label{fig10} \end{figure} Finally, we describe the results of the simulations for fast collisions between square pulses. The initial pulse shapes $u_j(x,0)$, and the pulse shapes $u_j(x,t)$ obtained in the simulation with $v_{d}=15$ at $t=0$, $t_{i}=0.557>t_{c}$, and $t_{f}=1.5$ is shown in Fig. \ref{fig11}. The analytic prediction, obtained with Eq. (\ref{rda2}), is also shown. It is seen that the pulses undergo significant broadening due to the effects of diffusion. However, in contrast with the situation in linear optical waveguides, the pulses do not develop any observable oscillatory tails. Despite of the broadening, the agreement between the numerical result and the analytic prediction for the pulse shapes is very good. Figure \ref{fig12} shows the dependence of $\Delta A_{1}^{(c)}$ on $v_{d}$ obtained by the simulations together with the analytic prediction of Eq. (\ref{rda8}). We observe very good agreement between the analytic prediction and the simulations results. More specifically, the relative error in the approximation of $\Delta A_{1}^{(c)}$ is smaller than 4.3$\%$ for $10 \le |v_{d}| \le 60$ and smaller than 5.3$\%$ for $2 \le |v_{d}| < 10$. Similar results are obtained with other values of the physical parameters. We therefore conclude that the universal behavior of the collision-induced amplitude shift can be observed even in collisions between pulses with nonsmooth initial shapes. \begin{figure}[ptb] \begin{tabular}{cc} \epsfxsize=8.5cm \epsffile{fig11a.eps} \\ \epsfxsize=8.5cm \epsffile{fig11b.eps} \\ \epsfxsize=8.5cm \epsffile{fig11c.eps} \end{tabular} \caption{(Color online) The pulse shapes $u_j(x,t)$ at $t=0$ (a), $t=t_{i}=0.557$ (b), and $t=t_{f}=1.5$ (c) in a fast collision between two square pulses in a system described by the coupled diffusion-advection model (\ref{rda1}). The advection velocity is $v_{d}=15$. The blue triangles and green circles represent the initial pulse shapes $u_j(x,0)$ with $j=1,2$ in (a), and the perturbation theory's prediction for $u_j(x,t)$ with $j=1,2$ in (b) and (c). The solid red and dashed magenta curves in (b) and (c) correspond to $u_j(x,t)$ with $j=1,2$, obtained by numerical solution of Eq. (\ref{rda1}).} \label{fig11} \end{figure} \begin{figure}[ptb] \epsfxsize=12.0cm \epsffile{fig12.eps} \caption{(Color online) The collision-induced amplitude shift of pulse 1 $\Delta A_{1}^{(c)}$ vs advection velocity $v_{d}$ in a fast collision between two square pulses in a system described by the coupled diffusion-advection model (\ref{rda1}). The red circles represent the result obtained by numerical solution of Eq. (\ref{rda1}). The solid blue curve corresponds to the prediction of Eq. (\ref{rda8}) with $C_{D}=2$.} \label{fig12} \end{figure} \section{Conclusions} \label{conclusions} We demonstrated that the amplitude shifts in fast two-pulse collisions in linear physical systems, weakly perturbed by nonlinear dissipation, exhibit universal soliton-like behavior. The behavior was demonstrated for linear optical waveguides with weak cubic loss and for systems described by linear diffusion-advection models with weak quadratic loss. We showed that in both cases, the expressions for the collision-induced amplitude shifts due to the nonlinear loss have the same form as the expression for the amplitude shift in a fast collision between two solitons of the cubic NLS equation in the presence of weak cubic loss. Furthermore, we showed that the expressions for the amplitude shifts are universal in the sense that they are independent of the exact details of the initial pulse shapes. The universal soliton-like behavior of the expressions for the collision-induced amplitude shifts was explained by noting that changes in pulse shapes occurring during the collision due to the effects of dispersion or diffusion can be neglected for fast collisions, and by noting the conservation of the total energies (or total masses) of the pulses by the unperturbed linear evolution models. We demonstrated the universal behavior of the collision-induced amplitude shifts by performing numerical simulations with the two perturbed coupled linear evolution models with three different initial conditions corresponding to pulses with exponentially decreasing tails, pulses with power-law decreasing tails, and pulses that are initially nonsmooth. In all six cases we found very good agreement between the analytic predictions for the amplitude shifts and the results of the numerical simulations. Surprisingly, the analytic predictions held even for collisions between pulses with initially nonsmooth shapes in linear optical waveguides despite of the fast generation of significant pulse tails. The good agreement between the analytic and numerical results in the latter case was explained by noting that during fast collisions most of the pulse energies are still contained in the main bodies of the pulses, and by noting the conservation of the total energies of the two pulses by the unperturbed linear propagation model. \section*{Acknowledgments} Q.M.N. and T.T.H. are supported by the Vietnam National Foundation for Science and Technology Development (NAFOSTED) under Grant No. 101.99-2015.29.
\section{Introduction} Electronics on flex offer aesthetic and functional advantages such as the possibility of roll to roll manufacturing \cite{roll2}, use of organic metals and semiconductors \cite{organic1, organic2, flex1}, sensors and actuators on flex \cite{flex1, flex4, flex5, flex8}, energy sources \cite{energy1, energy2, energy3} and wearable devices for health diagnostics \cite{ wear2, wear3, wear4, wear5}. However, these advantages are accompanied by poor reliability of devices \cite{defect1} and interconnects \cite{SanjivDefectIdentification}. Interconnects on flex experience mechanical forces due to stretching, bending and thermal stress; unexpected current surges due to electrostatic discharge and environment related degradation. As a result, open interconnect faults occurring during system operation are common. Both passive and active techniques have been investigated to address this problem. Passive approaches tailor interconnect geometries \cite{flex1}, \cite{geometry0, geometry1, geometry3, geometry4, geometry5, geometry6, geometry7, geometry8, geometry9} and materials \cite{geometry3},\cite{stretch1, stretch2, stretch4, stretch5, stretch8, stretch9, stretch11, stretch12, stretch13, stretch14, stretch16, stretch17, stretch18, stretch19} to improve mechanical flexibility. While they do improve tolerance to mechanical stress driven faults, they do not prevent faults occurring due to other mechanisms. Moreover, they do not provide a means to re-establish connectivity if an open fault does occur. On the other hand, active techniques offer on-line repair of an open fault. Self healing of interconnects using conductive polymers \cite{selfhealGeneral1}, \cite{selfhealGeneral2}, liquid metals \cite{selfhealLM1, selfhealLM2, selfheal1}, embedding of capsules of conductive inks in interconnects that spill the ink upon fracture \cite{selfheal2, selfheal3, selfheal4}, controller based impedance modulation \cite{selfheal54}, Janus particles driven by differences in hydrophobicities \cite{selfheal6}, ionic gels \cite{selfheal5} and electric field driven interconnect re-structuring using dispersions have been investigated \cite{selfheal7, selfheal8, selfheal9, selfheal10}. While these approaches have been shown to be very effective, the techniques have some shortcomings as they either use relatively rare materials (eg. Ga, In), change conventional interconnect fabrication processes, only address mechanical stress related faults or do not permit stretchability. An ideal solution towards improving open fault tolerance of interconnects on flex would have the following attributes. First it would be a self driven repair mechanism. Second, it would permit a heal having near metallic conductivity. Third, it would permit a heal having high stretchability. Fourth, the repair mechanism would be activated irrespective of the cause of the fault. \begin{figure*} \centering \includegraphics[width=6 in]{Fig1} \caption{(a) Illustration of the self healing mechanism. (b) Demonstration of stretchable self healing with the heal adaptively increasing in length to accommodate the stretching. The dispersion is contained in a well and over an interconnect with an artificially induced open fault. Initially, the fault is healed. Upon stretching the substrate, the heal stretches while maintaining electrical connectivity. The photographs of the events occurring inside the well are also shown. Videos in Supplementary Material.} \end{figure*} This work provides an affirmative answer to all four points. Here we use a dispersion of electrically conductive particles in an insulating fluid that is contained and isolated over each interconnect as shown in Fig. 1a. Upon the occurrence of an open circuit fault in a current carrying interconnect, the electric field appearing across the open gap polarizes the conductive particles of the dispersion inside the gap. The polarized particles experience dipole-dipole attractive forces and eventually chain up and sinter to create a bridge across the gap thereby healing the fault. Therefore the repair mechanism is independent of the cause the fault. This mechanism also permits near plastic stretchability (Fig. 1b). When the substrate is stretched, the heal momentarily breaks. This re-establishes the field in this newly formed break, polarizes locally available free partcles and encourages them to fill the gap to re-establish connectivity. The heal therefore stretches by increasing the number of particles constituting the chain thereby making this a unique approach to stretchable self healing. Fig. 1c demonstrates this concept using a series resistor-light emitting diode (LED) circuit on a polydimethylsiloxane (PDMS) substrate and a dispersion of 80 mg/ml of copper microspheres (radius 5 $\mu$m) in silicone oil (see Appendix). For demonstrations, the interconnect used was a single strand (100 $\mu$m) of a multi strand wire. Further, a well containing the dispersion was created over an exposed region of the interconnect and an open fault was deliberately introduced in this region. The entire sample was mechanically clamped to the translation stage for stretching. When an external voltage was applied, the LED did not initially light up due to the open fault. However, the electric field across the gap activated the self healing mechanism resulting in the LED eventually lighting up. When the entire system was stretched, the connectivity was maintained (with intermittent breaks) due to the heal increasing its length. The events occurring inside the well are also shown in Fig. 1c. Henceforth we discuss the mechanics of self healing and a key process of a self driven sintering. This sintering is important to achieve mechanical flexibility in the heal. We characterize the self healing mechanism and the response of the heal to stretching. All experiments in this work use a dispersion of copper microspheres in silicone oil (see Appendix). \section{Mechanics of Healing with Sintering} To study the mechanism of self healing, an open circuit fault was emulated using a test bed shown in Fig. 2a. A dispersion of copper microspheres (radius 5 $\mu$m) in silicone oil (see Appendix) was contained in a 200 $\mu$m wide gap between two electrodes. This gap mimicked the open fault while the electrodes represented the two ends of the disconnected interconnect. External resistors were placed in series to emulate the terminal impedances of the interconnect. The total external impedance was $R_{a}\sim$ 4.4 k$\Omega$. A Keithley 2410 source meter unit was used to source the voltage, $V_{a}$, and measure the dynamics of the current through the circuit throughout the experiment. Fig. 2b shows the typical observed dynamics of the current during the healing process for experiments performed with dispersions at different temperatures. The temperature influenced the viscosity of the fluid and therefore the dynamics of healing. \begin{figure*} \centering \includegraphics[width=4 in]{Fig2} \caption{(a) Experimental setup for the study of the mechanics of self healing. (b) Current versus time for several self healing experiments conducted with dispersions at different temperatures. At higher temperatures, the viscosity of the fluid is low and the healing is quicker. The sudden jump in current is indicative of the sintering of the heal. (c) Photographs of the process of self healing (d) SEM images of the sintered heal. (e) Transients of the heal resistance, $R_{h}(t)$, during healing for different external resistances, $R_{a}$. (f) The heal time and steady state heal resistance are dependent on $R_{a}$. Videos in Supplementary Material} \end{figure*} In real applications, the occurrence of an open fault in a current carrying interconnect would itself result in the electric field and initiate the healing process. However, for the purpose of this study, an electric field, $\xi_{a}$, was artificially created across the gap by applying an external voltage, $V_{a}$. The field strength was chosen with a view towards the possible application of self healing for printed electronic thin film transistor circuits on flex. In these systems, operating voltages are typically 5 V to 15 V and open faults causing 10 $\mu$m gaps (see Supplementary Material) would result in fields of approximately 0.5 V/$\mu$m to 1.5 V/$\mu$m. With this in mind, a field of $\xi_{a}\approx 0.4$ V/$\mu$m was created across the gap by applying an external voltage, $V_{a}=80$ V to the circuit of Fig. 2a. Upon experiencing this field the conductive particles of the dispersion in the gap were polarized. As shown in the sequence of photographs (Fig. 2c, Video in Supplementary Material), the induced dipole moment in the copper particles resulted in them chaining up due to dipole-dipole attraction and forming chains of loosely held linear clusters ($t$=25 s). Once these chains spanned the gap and bridged the two electrodes, the current through the interconnect was established to a small extent. This current caused joule heating. For certain conductive particles (eg. copper), this heating resulted in a weak sintering of the particles thereby leading to the reduction of the heal resistance with time. This sintered bridge constituted the heal. After sintering, the current through the interconnect increased rapidly leading to the restoration of electrical connectivity. Fig. 2d shows SEM images of the sintered copper particles in the bridge (see Appendix). The total healing time, $\tau_{h}$, is the sum of two components - the time taken for the formation of the chains of electrostatically held particles and the time taken for sintering and formation of the single wire like bridge. The first component i.e. the time for the formation of chains is estimated by equating the the dipole-dipole attractive force that drives the mechanism of chain formation with the opposing force of viscous drag experienced by the particles moving through the fluid. This time can be shown to scale as $\sim (\eta_{f}/\epsilon_{f})(x_{p}/r_{p})^{5}\xi_{a}^{-2}$ with $\eta_{f}$ being the dynamic viscosity of the fluid, $\epsilon_{f}$ the permittivity of the fluid and $x_{p}$ the average distance between the conductive particles in a homogenous dispersion (See Supplementary Material). The second components, i.e., the dynamics of sintering is governed by a positive feedback mechanism that can be qualitatively described as follows. Upon the formation of the multiple chains of loosely held particles across the gap, the current through the interconnect distributes itself through these chains. However, minor differences in the resistance of each chain results in the current through the chains being different such that one of the chains, typically the shortest, carries the maximum current and heats the quickest. This results in quicker sintering and its resistance being lowered further which in turn increases the current and the heating through it. This results in the restoration and stabilization of the current through the interconnect. If the time dependent resistance of the heal is $R_{h}(t)$, the voltage drop across the gap would be $V_{a}R_{h}(t)/(R_{h}(t)+R_{a})$ and the rate of increase in temperature of the bridge would be proportional to $V_{a}^{2}R_{h}(t)/(R_{h}(t)+R_{a})^{2}$. This heating leads to the sintering and the reduction of $R_{h}(t)$ with time. The dependence of the dynamics of $R_{h}(t)$ on $R_{a}$ is shown in Fig. 2e. The dependence of the healing time and the steady state heal resistance on $R_{a}$ is shown in Fig. 2f. For successful self healing, the interconnect must have low terminal impedance i.e., it must be a current carrying interconnect. \section{Self Healing with Stretching} Fig. 3a shows the experimental setup to study the response of the heal to 1D stretching. To emulate the electrodes and the encapsulated dispersion as envisioned in Fig. 1a, a half-open micro channel (100 $\mu$m width and 500 $\mu$m depth) was molded on the surface of a PDMS substrate. The channel was then filled (from one side via capillary action) with the dispersion of copper microspheres in silicone oil. Two wires (100 $\mu$m diameter) were inserted into the channel from the two ends to form the two electrodes. One of the wires was attached to a precision translation stage (Thor Labs BSC 101 SIN 40833095) that enabled it to move back and forth in the channel with a precise velocity. The surface was finally capped with Kapton tape. The tape confined the dispersion and restricted the movement of the electrode to 1D. The external circuit was similar to Fig. 2a but with $R_{a}=220$ k$\Omega$. To begin, the spacing between the electrodes was adjusted to $40$ $\mu$m (initial position) to emulate an open fault. Healing was first achieved at this initial position and a sintered bridge was allowed to form across the 40 $\mu$m gap (time $t$=0 s). When the current through the interconnect was stable, the electrodes were moved apart at a constant relative velocity of $u=5$ $\mu$m/s (after initial acceleration from rest). Fig. 3b illustrates a sequence of photographs from the experiment. The heal appeared to `stretch' in order to accommodate the movement of the electrodes (Video in Supplementary Material). The dynamics of the current through the circuit was continuously recorded throughout the experiment (Fig. 3c). The shaded subplot is the zoomed view of the time span from 50 s to 100 s. Despite intermittent breaks, the connectivity was repeatedly restored till around 900 s. Beyond this, the connectivity was permanently lost. Following up from the discussion around Fig. 1b, this phenomenon of persistent restoration of electrical conductivity can be explained as follows. Initially, with the electrodes separated by an open gap, the particle chain bridges the gap, sinters and restores electrical connectivity. When the electrodes begin to move apart due to stretching, the sintered chain momentarily experiences large stress and breaks. However, a strong electric field is re-established in this new gap that is formed due to the break. The presence of the electric field once again initiates the self healing mechanism and involves locally available free particles to participate in the healing by polarizing them. The new particles that fill the gap soon sinter to become a permanent part of the heal (Fig. 3d). The heal therefore responds to stretching by adding more particles to its length. \begin{figure*} \centering \includegraphics[width=7 in]{Fig3} \caption{(a) Experimental setup for the study of the impact of stretching on the heal. (b) Photographs from experiments demonstrating the stretchability of the heal. At $t$=0 min, the open gap of length 40 $\mu$m is healed. The electrodes are then moved apart at a constant velocity of 5 $\mu$m/s. (c) In response to stretching, the heal adaptively increases its length by involving more particles to participate in the healing process. (d) Measurements of current versus time during the stretching. (e) Maximum stretchable length, $\Delta l_{max}$, as a function of the stretching velocity, $u$, applied voltage, $V_{a}$ and dispersion concentration (f) Prediction of $\Delta l_{max}$, as a function of $u$, $V_{a}$ and dispersion concentration based on Eq. 1. (g) Buckling of the heal in response to compression and the typical dynamics of the current through the heal in response to stretching and subsequent compression. Videos in Supplementary Material.} \end{figure*} The repeated drops and increases in current (Fig. 3c) also corroborates with this explanation. However, this repeated restoration of electrical conductivity does not last forever. If the local concentration of particles become too low or if the velocity of separation, $u$, is too high, electrical connectivity is permanently lost (here at around 900 s). In the former case, there are no particles available to fill in the gaps occurring in the expanding heal. In the latter case, the increasing distance between the electrodes rapidly weakens the field and weakens the dipole moment and the driving force for healing. Therefore, if the break is not filled in by a nearby particle immediately, it becomes increasingly harder for permanent restoration. The maximum length, $\Delta l_{max}$, to which the heal can stretch to without permanent loss of electrical connectivity depends on $V_{a}$, $u$, and the dispersion concentration. As shown in Fig. 3e, $\Delta l_{max}$ reduced with the increase in $u$, increased with an increase in $V_{a}$ and increased with an increase in dispersion concentration. To quantify $\Delta l_{max}$, we consider the case where there exists a sintered heal across the open gap between two electrodes. At time $t=0$, the electrodes are moved apart with a constant velocity $u$. The stress in the sintered heal causing a fracture at some location in the heal and this new gap grows in length as $ut$ and the field across the gap reduces as $\sim V_{a}/ut$ (ignoring the non-uniformity of field). This field is responsible for re-activating self healing and filling in this gap with the locally available particles. However, if this field drops below a threshold electric field $\xi_{th}$, the dipole-dipole attractive forces become too weak to overcome the static friction and the Brownian motion and conductivity is not restored. The time taken for the electric field to drop to below $\xi_{th}$ scales as $\tau_{th}\sim V_{a}/(u\xi_{th})$. If the nearest free particles is at a distance of $\sim x_{p}$, the time constant for the particle to arrive at the gap can be shown to be $\sim (\eta_{f}/\epsilon_{f})(x_{p}/r_{p})^{5}u^{2}t^{2}/V_{a}$. If the time for sintering is ignored, this time constant defines the total repair time of the newly formed gap. Therefore for the heal to stretch successfully by the addition of more particles along its length, this repair time must be $\leq \tau_{th}$. Clearly as time $t$ increases, this condition is less likely to be satisfied. Therefore, the heal can stretch till equality is obtained in time constants and therefore, \begin{equation} \Delta l_{max}\propto (\epsilon_{f}/\eta_{f})^{1/2}(r_{p}/x_{p})^{5/2}(u\xi_{th})^{-1/2}V_{a}^{3/2} \end{equation} As an example, a dispersion of 80 mg/ml of $r_{p}=5$ $\mu$m particles silicone oil of kinematic viscosity 300 cSt implies $\eta_{f}$=0.28 kg/ms, $\epsilon_{f}$=$20\times10^{-12}$ F/m, $x_{p}$=38.8 $\mu$m. If $\xi_{th}$=0.04 V/$\mu$m. With the constant of proportionality in Eq. 1 being 0.06, the dependence of $\Delta l_{max}$ on $V_{a}$ and $u$ is shown in Fig. 3f. On the other hand, for a constant voltage of 125 V, the dependence of $\Delta l_{max}$ on the dispersion concentration (in weight/volume) and $u$ is shown in Fig. 3f. \begin{figure*} \centering \includegraphics[width=4.5 in]{Fig4} \caption{(a) Demonstration of stretching in two dimensions. The electrodes are moved axially and then tangentially. The initial direction of the heal across the open gap is shown before the onset of tangential movement. The final direction of the heal is shown defining the moment the chain breaks and cannot stretch any further. The maximum angle subtended between the initial and final direction is $\theta$. (b) Plot of the typical current transients during the two dimensional movement. (c) The plot of the subtended angle $\theta$ as a function of the velocity and the maximum displacement length as a function of the velocity. Video in Supplementary Material.} \end{figure*} We next consider the case of 1D oscillations, i.e., 1D stretching followed by 1D compression of the heal as described by Fig. 3g. After being stretched and subsequently compressed, the heal grew in length to accommodate the stretching and subsequently buckled to accommodate compression, all the while maintaining electrical connectivity. Fig. 3g shows the buckling in the heal during compression observed during different experiments. The typical dynamics of the current through the heal in response to stretching and subsequent compression is also shown. For experiments on 2-D stretching, a 5 mm by 5 mm by 2mm (depth) well in PDMS was used to contain the dispersion. 100 $\mu$m single strand wires were slightly bent at the ends and immersed in the dispersion to form the electrodes. One of the wires was connected to two approximately orthogonally aligned translation stages (Axial control: Holmarc MTS 3760; Tangential control: Thor Labs BSC 101 SIN 40833095). The external circuit was similar to that used in Fig. 3a. At the start of the experiment, the electrodes were placed 40 $\mu$m apart and the voltage was applied resulting in a heal. Once the current stabilized, the electrodes were moved apart axially allowing the heal to stretch. After a 1.15 mm displacement, axial translation was stopped and tangential translation was activated. The images of Fig. 4a illustrate the impact of tangential movement. The heal therefore experienced two kinds of forces. The first was the stress due to axial stretching. The second was the distributed loading along its length due to viscous drag experienced by the heal as it moves through the fluid during tangential movement.Except for intermittent loss of conductivity, this two dimensional movement did not disrupt the electrical connectivity between the electrodes. However, for large displacements, the heal was permanently fractured resulting in a loss of conductivity. Fig. 4b plots the current as a function of time during the experiment. Fig. 4c plots the maximum subtended angle between the initial position of the heal to the final position (when the heal fractures permanently) as a function of the velocity of movement along the tangential direction. Fig. 4c also plots the maximum displacement along the tangential direction before failure. \section{Discussion} This work presented the possibility of realizing interconnects with the ability to automatically heal an open circuit failure with the heal having an ability to stretch. This was achieved by the use of a rather simple system - a dispersions of conductive particles in an insulating fluid. If an open fault were to occur in a current carrying interconnect, the resulting electric field in the gap would initiate the self healing mechanism by polarizing the conductive particles located in the gap and resulting in them chaining up (dipole-dipole attraction) to eventually form a bridge across the gap. The repair mechanism is therefore truly self driven, i.e. it self-activates and self-terminates. The occurrence of the fault creates the electric field that initiates the self healing mechanism. The healing mechanism restores conductivity by forming a sintered chain of particles (the heal) across the open gap. Once the gap is short circuited by the heal, the field disappears discouraging further chain formation and stopping the mechanism. The healing mechanism is akin to blood clotting where the various species in the blood rush to the site of injury to participate in clotting. The key feature of the healing mechanism is the possibility of compressing and stretching the heal without losing electrical connectivity. A requirement to achieve this was the sintering of the particles constituting the bridge. This too was self driven due to Joule heating governed by positive feedback for as long as $R_{h}(t)>R_{a}$. Sintering made the heal behave like a conductive thread or chain. In compression, this chain could accommodate compression by buckling appropriately. In tension (stretching), the chain would break. Since the chain segments on either side of this break were conductive, the electric field would be re-established in this newly formed gap thus reactivating the healing by encouraging locally available particles to fill this gap and complete the chain. Thus the sintered chain would accommodate stretching by effectively adding more particles to its length. This is a fundamental difference compared to using conductive materials that stretch due to low modulus of elasticity. For the sake of comparison with other stretchable conductors, it is useful to model the effective mechanical properties of the heal. Using 80 mg/ml dispersions of copper microspheres in silicone oil, for $V_{a}=125 V$, the maximum displacement ranged from 0.5 mm (for $u=20$ $\mu$m/s) to 2.5 mm (for $u=5$ $\mu$m/s). Since the initial separation of the electrodes was 40 $\mu$m, this is equivalent to a minimum strain of 12.5 to a maximum strain of 60.25 depending on the strain rate. Although there is an influence of the strain rate, the stress dynamics due to a step in strain is not like a viscoelastic material. Instead, the averaged effective behavior of the heal is to respond to the step in strain by adding more particles to increase its length and with no increase in average stress. Therefore it is more apt to model this behavior as plastic with the rupture point dependent on the strain rate. For complete integration of the self healing mechanism with integrated circuits on flex, three major problems need to be overcome. The first is with regards to the encapsulation and techniques of packaging of the dispersion with high density interconnects in the manner shown in Fig. 1a. The solution to this problem may lie in borrowing ideas from inkjet printed electronics and microfluidics. These technologies are compatible with flexible electronics and would permit the controlled dispensing and packaging of the dispersion. The second problem is with regards to scaling down. All experiments described in this paper used interconnects and open gaps of width of $\sim 100$ $\mu$m. This permitted the use of dispersions having metallic particles of diameter of $\sim 10$ $\mu$m. However, thin film transistor based integrated circuits on flex typically use interconnects of width $\sim 100$ $\mu$m which would results in open faults of widths of the same length scale. For this study to scale down, the dispersion must now use particles of $\sim 1$ $\mu$m diameter. This poses problems with the stability of the dispersion as well as impacting the time taken to heal due to a much weaker dipole-dipole forces and a more influential Brownian motion. This problem can be overcome by increasing the dispersion concentration. However, such an approach spills over to the third major problem which is with regards to cross-talk. As the dispersion concentration is increased and as the dispersion heads towards becoming a conductive fluid, the significantly three dimensional feature of the interconnects due to the encapsulation would result in a significant cross talk between two adjacent interconnects thereby limiting the frequency response. Therefore, the use of a very high dispersion concentration is not ideal and this parameter needs to be optimized. Nevertheless, this approach to self healing is versatile and has the potential for application across a varying class of systems such as flexible and wearable electronics to commercial printed circuit boards. This versatility stems from two features. First, the approach does not use rare materials (eg. Ga-In, graphene etc) but instead a dispersion of copper particles in a common insulating fluid (transformer oil). Second, the approach does not change the conventional material and processes used for interconnect fabrication. Instead, the concept can be implemented as an add on feature require additional fabrication processes if self healing is desired. These features permit interconnects with the ability to self heal and stretch on flexible substrates thereby improving interconnect reliability significantly. \section{Conclusion} This work demonstrated the possibility of self healing interconnects with the ability to stretch significantly. This was demonstrated using copper-silicone oil dispersions. Heals having near metallic conductivity of $\sim 5 \times 10^{5}$ Sm and a stretchability with strains from 12 to 60 depending on the strain rate were demonstrated. Previously, stretchable interconnects used materials other than copper. Here we effectively show self healing, stretchable copper. This work promises high speed, self healing and stretchable interconnects on flex thereby improving system reliability. \section*{Acknowledgement} This work was funded by the EPSRC Grant No. RG92121 and DST IMPRINT Grant No. 7969. Amit Kumar and Virendra Parab contributed equally to this work. Sanjiv Sambandan thanks the DBT India-Cambridge Lectureship program for permitting a joint appointment between the Indian Institute of Science and the University of Cambridge. \section*{Appendix: Materials and Methods} \subsection*{Dispersion Preparation} Dispersions of copper microspheres (radius 5 $\mu$m, Alfa Aesar 042689) in silicone oil (kinematic viscosity 300 cSt, S. D. Fine-Chem Limited 25072) were used. Desired concentrations (in mg/ml) were obtained by measuring the weight of copper particles to be dispersed in a known volume of silicone oil. The dispersion was sonicated for 1 hour at 80 C followed by mechanical stirring to achieve the required homogeneity. At room temperature, it was observed that the viscosity of the fluid aided the preparation of relatively stable and homogenous dispersions that were sufficiently suitable for the applications discussed in this work. No other stabilization techniques were used. \subsection*{Sample Preparation for SEM Imaging} For SEM images (Fig. 2d), the experiment was first performed as described in Fig. 2 on a printed circuit board. The current versus time was constantly measured. 30 s after the current was restored and stabilized (indicative of sintering), the circuit was disconnected. The regions between the electrodes now contained the sintered heal immersed in silicone oil. To obtain SEM images this region was repeatedly rinsed with isopropyl alcohol to remove the oil. The sample was then dried and the section of the printed circuit board containing the bridge was transferred to an SEM stub for imaging. A conductive carbon tape was used to short circuit the electrodes (and therefore the heal) to the SEM stub for good imaging.
\section{Introduction} {\it Generalized Nash equilibrium} (GNE) problems in games with shared coupling constraints arise in various network scenarios where a set of players (agents) compete for limited network resources, e.g. power grids and smart grids, \cite{Basar2012}, optical networks, \cite{pavel2}, wireless communication networks, \cite{asuman,shanbhag4}, electric vehicle charging, \cite{lygeros2}. The study of GNE dates back to \cite{debreu,rosen}; a historical review is provided in \cite{faccinei1}, \cite{pang}. Distributed GNE computation in monotone games has seen an increasing interest in recent years, \cite{shanbhag4,zhuminghui,payoff,lygeros2,grammatico_1,liangshu,grammatico_2,GrammaticoCDC2017,GrammaticoECC2018,YiPavelCDC1_2017,yipeng2TCNS}. Most works assume that each player has access to all other agents' decisions - the classical setting of {\em full-decision information}, either by observation or by a central node coordinator. There are many current networked applications where agents may only access or observe the decisions of their neighbours, and there is no central node to provide them with global information, i.e., a {\em partial-decision information} setting. The assumption of information exchange is motivated in networks where there is no central node that has bidirectional communications with all players to provide them with global information, as in peer-to-peer networks. Application scenarios range from spectrum access in cognitive radio networks, where users adaptively adjust their operating parameters based on interactions with the environment and other users in the network, \cite{Cheng2014}, congestion games in ad-hoc networks, \cite{Tekin2012}, to networked Nash-Cournot competition, \cite{cournotgame}, and opinion dynamics in social networks, \cite{Srikant2014}, \cite{Ozdaglar2016}. These examples are non-cooperative in the way decisions are made (each agent minimizes its own cost function), while agents exchange locally information with neighbours to compensate for the lack of global information on others' decisions. The first results on distributed NE seeking under such partial-decision information have been for finite-action games, \cite{kar1}, and for aggregative games with {\em no coupling constraints}, \cite{shanbhag1}. Results were extended to general continuous-kernel games in \cite{pavel4,GadjovPavelTAC2018,SalehiPavelIFAC_2017,ShiPavelACC_2017,YeHu_TAC_2017}, for NE seeking problems only, in games with \emph{no coupling constraints}. Inspired by work on NE seeking under partial-decision information, \cite{shanbhag1}, and by the recent elegant, operator-theoretic approach to GNE problems, \cite{GrammaticoECC2018}, \cite{YiPavelCDC1_2017}, in this paper we consider GNE seeking in games with affine coupling constraints, under partial-decision and local information exchange over an arbitrary network. \emph{Literature review:} Distributed (variational) GNE computation is an active research area, but existing results are for the classical setting of {\em full-decision information}. Initial results were developed based on a variational inequality (VI) approach, \cite{faccinei1}, \cite{shanbhag4}. For (pseudo)-monotone games, \cite{shanbhag4} adopts a single-layer Tikhonov regularization primal-dual algorithm, \cite{zhuminghui} proposes a primal-dual gradient approach, while \cite{payoff} proposes a payoff-based algorithm, all with diminishing step-sizes. Recently, an operator-splitting approach has proved to be very powerful; it allows the design of GNE algorithms that are guaranteed to globally converge with fixed step-sizes, with concise convergence proofs. Most results are for {\em aggregative games}, \cite{lygeros2}, \cite{liangshu,grammatico_2,GrammaticoCDC2017,GrammaticoECC2018}. In \cite{grammatico_2,GrammaticoCDC2017,GrammaticoECC2018}, algorithms are semi-decentralized, requiring a central node (coordinator) to broadcast the common multipliers and/or aggregative variables, hence a star topology. This is relaxed in \cite{liangshu} by combining a continuous-time consensus dynamics and a projected gradient, still for aggregative games. For games with {\em generally coupled costs} and affine coupling constraints, distributed and center-free GNE seeking is investigated via an operator approach in \cite{YiPavelCDC1_2017,yipeng2TCNS,yipeng2}: a forward-backward algorithm, convergent in strongly monotone games \cite{YiPavelCDC1_2017,yipeng2}, and preconditioned proximal algorithms for monotone games \cite{yipeng2TCNS}. Players communicate the local multipliers over a network with arbitrary topology, in a distributed, peer-to-peer manner, but each agent has access to the decisions of all other agents that influence his cost, hence {\em full-decision information}. {\em Contributions:} Motivated by the above, in this paper we consider distributed GNE seeking in a {\em partial-decision information} setting via an operator-splitting approach. We propose a fully distributed GNE seeking algorithm for games with generally coupled costs and affine coupling constraints, over networks with an arbitrary topology. To the best of our knowledge, this is the first such algorithm in the literature. Based on a primal-dual analysis of the variational inequality KKT conditions, we reformulate the problem as that of finding zeros of a sum of monotone operators and use the Laplacian matrix to distribute the computations. Different from \cite{YiPavelCDC1_2017} (perfect opponents' decision information), herein we distribute both the primal and the dual variables. To account for partial-decision information, we endow each agent with an auxiliary variable that estimates the other agents' decisions (primal variables), as in NE seeking over networks, \cite{GadjovPavelTAC2018,SalehiPavelIFAC_2017}. Compared to \cite{YiPavelCDC1_2017,yipeng2}, this introduces technical challenges, as a change in an estimate induces a nonlinear change in an agent's dynamics. We make use of two selection matrices and we incorporate the Laplacian in an appropriate manner to do double duty, namely to enforce consensus of the local decision estimates (primal variables) and of the local multipliers (dual variables). Compared to \cite{PavelCDC2018}, here we relax the assumption of cocoercivity of the extended pseudo-gradient. Under Lipschitz continuity of the extended pseudo-gradient, we prove convergence with {\em fixed step-sizes} over any connected graph, by leveraging monotone operator-splitting techniques, \cite{combettes1}. Specifically, we reformulate the algorithm as a forward-backward iteration for doubly-augmented monotone operators, and distribute the resolvent operation via a doubly-augmented metric matrix. The paper is organized as follows. Section \ref{sec_notation} gives the notations and preliminary background. Section \ref{sec_game_and_algorithm} formulates the game. Section \ref{sec_algorithm_develpo} introduces the distributed GNE seeking algorithm and reformulates it as an operator-splitting iteration. The convergence analysis is presented in Section \ref{sec_alg_converge}, numerical simulations in Section \ref{sec:numerical} and concluding remarks are given in Section \ref{sec_concluding}. Some of the proofs are placed in the appendix. \vspace{-0.225cm} \section{Preliminary background}\label{sec_notation} \vspace{-0.15cm} \noindent {\it Notations. } For a vector $x \!\in \! \bm{R}^m$, $x^T$ denotes its transpose and $\|x\|= \sqrt{x^Tx}$ the norm induced by inner product $\langle\cdot,\cdot\rangle$. For a symmetric positive-definite matrix $\Phi$, $\Phi \succ 0$, $s_{\min}(\Phi)$ and $s_{\max}(\Phi)$ denote its minimum and maximum eigenvalues. The $\Phi$-induced inner product is $\langle x, y\rangle_{\Phi}=\langle \Phi x,y\rangle$ and the $\Phi$-induced norm, $\|x \|_\Phi=\sqrt{\langle \Phi x,x\rangle}$. For a matrix $A\in \bm{R}^{m\times n}$, let $\|A\| = \sigma_{\max} (A)$ denote the 2-induced matrix norm, where $\sigma_{\max} (A)$ is its maximum singular value. Let $\bm{1}_m\!=\!(1,...,1)^T \!\in \! \bm{R}^m$ and $\bm{0}_m \!=\!(0,...,0)^T \! \in \! \bm{R}^m$. For $\mathcal{N}\!=\! \{1,...,N\}$, $col(x_i)_{i\in \mathcal{N}}$ or $[x_i]_{i\in \mathcal{N}}$ denotes the stacked vector obtained from vectors $x_i$, $diag((A_i)_{i\in \mathcal{N}})$ the block diagonal matrix with $A_1, . . . ,A_N$ on the main diagonal. $Null(A)$ and $Range(A)$ are the null and range space of matrix $A$, respectively, while $[A]_{ij}$ stands for its $(i,j)$ entry. $I_m$ denotes the identity matrix in $\bm{R}^{m\times m}$. Denote $\times_{i=1,...,N}\Omega_i$ or $\prod_{i=1}^N \Omega_i$ as the Cartesian product of the sets $\Omega_i,i=1,...,N$. \vspace{-0.25cm} \subsection{Monotone operators} The following are from \cite{combettes1}. Let $\mathfrak{A} \! \!:\!\!\bm{R}^m \!\!\rightarrow \! \!2^{\bm{R}^m}$ be a set-valued operator. The domain of $\mathfrak{A}$ is $dom\mathfrak{A} \!= \! \{x\in \bm{R}^m| \mathfrak{A}x \neq \emptyset\}$ where $\emptyset$ is the empty set, and the range of $\mathfrak{A}$ is $ran\mathfrak{A}=\{y \in \bm{R}^m| \exists x, y\in \mathfrak{A}x\}$. The graph of $\mathfrak{A}$ is $gra\mathfrak{A}=\{(x,u) \in \bm{R}^m\times \bm{R}^m| u\in \mathfrak{A}x\}$; the inverse of $\mathfrak{A}$ is defined through its graph as $gra\mathfrak{A}^{-1}=\{(u, x)| (x, u)\in gra \mathfrak{A}\}$. The zero set of $\mathfrak{A}$ is $zer\mathfrak{A}=\{x\in \bm{R}^m | \bm{0} \in \mathfrak{A}x\}$. $\mathfrak{A}$ is called monotone if $\forall (x,u), \forall(y,v)\in gra\mathfrak{A}$, $\langle x-y, u-v\rangle \geq 0.$ It is maximally monotone if $gra\mathfrak{A}$ is not {\it strictly} contained in the graph of any other monotone operator. The resolvent of $\mathfrak{A}$ is $\mathcal{J}_{\mathfrak{A}}=({\rm Id}+\mathfrak{A})^{-1}$, where ${\rm Id}$ is the identity operator. $\mathcal{J}_\mathfrak{A}$ is single-valued and $dom\mathcal{J}_{\mathfrak{A}}=\bm{R}^m$ if $\mathfrak{A}$ is maximally monotone. The composition of $\mathfrak{A}$ and $\mathfrak{B}$ is denoted by $ \mathfrak{A}\circ \mathfrak{B}$. The sum $\mathfrak{A}+\mathfrak{B}$ is defined as $gra (\mathfrak{A}+\mathfrak{B})=\{(x,y+z)| (x,y)\in gra \mathfrak{A}, (x,z)\in gra \mathfrak{B}\}$. If $\mathfrak{A}$ and $\mathfrak{B}$ are maximally monotone operators and $0\in int(dom \mathfrak{B}-dom \mathfrak{A})$, then $\mathfrak{A}+\mathfrak{B}$ is also maximally monotone. If $\mathfrak{B}$ is single-valued, then $zer(\mathfrak{A}+\mathfrak{B})=Fix (\mathcal{J}_{\mathfrak{A}}\circ({\rm Id}-\mathfrak{B}))$, \cite[Prop. 25.1]{combettes1}, where $FixT$ denotes the set of fixed points of $T$. For a proper {\it lower semi-continuous convex} (l.s.c.) function $f$, its sub-differential $\partial f: domf\rightarrow 2^{\bm{R}^m}$ is $x \mapsto \{g\in \bm{R}^m| f(y)\geq f(x)+ \langle g, y -x \rangle, \forall y\in domf\}.$ $\partial f$ is a maximally monotone operator. $Prox_{f}= \mathcal{J}_{\partial f}:\bm{R}^m\rightarrow dom f$, $ Prox_{f} : x \mapsto \arg\min_{u\in dom f } f(u)+\frac{1}{2} \|u -x \|^2$ is the proximal operator of $f$. Define the indicator function of $\Omega$ as $\iota_{\Omega}(x)= 0$ if $ x\in \Omega$ and $\iota_{\Omega}(x)= \infty$ if $x\notin \Omega.$ For a closed convex set $\Omega$, $\iota_{\Omega}$ is a proper l.s.c. function and $\partial \iota_{\Omega}$ is the normal cone operator of $\Omega$, $N_{\Omega}(x)=\{v| \langle v, y -x\rangle\leq 0, \forall y\in \Omega\} $. An operator $T: \Omega \subset \bm{R}^m\rightarrow \bm{R}^m$ is nonexpansive if it is $1-$Lipschitz, i.e., $\|T(x)-T(y) \| \leq \|x-y \|, \forall x,y \in \Omega$. $T$ is $\alpha-$averaged ($\alpha\! \in \! (0,1)$), if there exists a nonexpansive operator $T^{'}$ such that $T\!=\!(1\!-\!\alpha){\rm Id}\!+\!\alpha T^{'}$. By \cite[Prop. 4.25]{combettes1}, given $\alpha\in (0,1)$, $T\in \mathcal{A}(\alpha) $, where $\mathcal{A}(\alpha)$ denotes the class of $\alpha-$averaged operators, if and only if $\forall x, y \in \Omega$:\\ (i): $\|\!Tx\!-\!Ty \!\|^2 \!\leq \!\|x\!-\!y \|^2\! -\!\frac{1\!-\!\alpha}{\alpha} \| (x\!-\!y)\!-\!(Tx\!-\!Ty) \|^2$.\\ (ii): $\|Tx\!-\!Ty \|^2\!+\! (1\!-\!2\alpha)\|x\!-\!y\|^2 \leq 2(1\!-\!\alpha) \langle x\!-\!y, Tx\!-\!Ty \rangle$. \\ If $T \! \!\in \! \!\mathcal{A}(\frac{1}{2})$, $T$ is also called firmly nonexpansive. If $\mathfrak{A}$ is maximally monotone, $\mathcal{J}_{\mathfrak{A}}\!\!=\!\!({\rm Id}\!+\!\mathfrak{A})^{-1}\!$ is firmly nonexpasive, \cite[\!Prop. \! 23.7]{combettes1}. Let the projection of $x$ onto $\Omega$ be $P_{\Omega}(x)\!=\!\arg\min_{y\in \Omega} \|x-y \|$, with $\!P_{\Omega}(x)\!=\!Prox_{\iota_{\Omega}}(x) \!=\!\mathcal{J}_{N_{\Omega}}(x)\!$. If $\Omega$ is closed and convex, $P_{\Omega}$ is firmly nonexpansive since $N_{\Omega}$ is maximally monotone \cite[Prop. 4.8]{combettes1}. $T$ is called $\beta-$cocoercive if $\beta T \in \mathcal{A}(\frac{1}{2})$, for $\beta >0$, i.e., $\beta\|T(x)-T(y) \|^2 \leq \langle x-y, T(x)-T(y) \rangle, \forall x, y \in \Omega$. If $f$ is convex differentiable, with $\theta-$Lipschitz gradient $\nabla f $, then $\nabla f $ is $\frac{1}{\theta}-$cocoercive (cf. Baillon-Haddad theorem, \cite[Thm. 18.15]{combettes1}). \vspace{-0.25cm} \subsection{Graph theory} The following are from \cite{god}. Let graph $\mathcal{G}_c=(\mathcal{N},\mathcal{E})$ describe the information exchange among a set $\mathcal{N}$ of agents, where $\mathcal{E} \! \subset \! \mathcal{N} \!\times \!\mathcal{N} $ is the edge set. If agent $i$ can get information from agent $j$, then $(j,i) \in \mathcal{E}$ and agent $j$ belongs to agent $i$'s neighbour set $\mathcal{N}_i=\{ j | (j,i) \in \mathcal{E}\}$, $i \notin \mathcal{N}_i$. $\mathcal{G}_c$ is undirected when $(i,j)\in \mathcal{E}$ if and only if $(j,i)\in \mathcal{E}$. $\mathcal{G}_c$ is connected if any two agents are connected. Let $W=[w_{ij}]\in \bm{R}^{N\times N}$ be the weighted adjacency matrix, with $w_{ij} >0$ if $j\in \mathcal{N}_i$ and $w_{ij}=0$ otherwise, and $Deg= diag ((d_i)_{i\in \mathcal{N}})$, where $d_i=\sum_{j=1}^N w_{ij}$. Assume $W=W^T$. The weighted Laplacian of $\mathcal{G}_c$ is $L=Deg-W.$ When $\mathcal{G}_c$ is connected and undirected, 0 is a simple eigenvalue of $L$, $L \bm{1}_N=\bm{0}_N$, $\bm{1}^T_{N} L=\bm{0}^T_N$; all other eigenvalues are positive. Let the eigenvalues of $L$ in ascending order be $0<s_2(L)\leq ... \leq s_N(L)$, $d^* \leq s_N(L) \leq 2d^*$, where $d^*=\max_i \{d_i\}$ is the maximal weighted degree. \section{Game formulation}\label{sec_game_and_algorithm} Consider a group of agents (players) $\mathcal{N}=\{1,..., N \}$, where each player $i\in \mathcal{N}$ controls its local decision (strategy or decision) $x_i\in \bm{R}^{n_i}$. Denote $x=col(x_i)_{i\in \mathcal{N}} \in \bm{R}^n$ as the decision profile, i.e., the stacked vector of all the agents' decisions where $\sum_{i=1}^N n_i=n$. We also write $x=col(x_i)_{i\in \mathcal{N}}$ as $x=(x_i,x_{-i})$ where $x_{-i}=col(x_j)_{j\in \mathcal{N}\setminus\{i} = col(...,x_{i-1},x_{i+1},...)$ denotes the decision profile of all agents' decisions except player $i$. Agent $i$ aims to optimize its objective function $J_i(x_i,x_{-i})$, coupled to other players' decisions, with respect to its own decision $x_i$ over its feasible decision set. Let the globally shared, affine coupled constrained set be \begin{equation}\label{equ_coupling_set} K := \prod_{i=1}^N \Omega_i \bigcap \{ x \in \bm{R}^n | \sum_{i=1}^N A_ix_i \leq \sum_{i=1}^N b_i\}. \end{equation} where $\Omega_i \subset \bm{R}^{n_i}$ is a private feasible set of player $i$, and $ A_i \in \bm{R}^{m\times n_i}$, $b_i\in \bm{R}^m$ its local data. Let $\Omega=\prod_{i=1}^N \Omega_i$. A jointly-convex game with coupled constraints is represented by the set of inter-dependent optimization problems \begin{equation}\label{GM} \forall i \in \mathcal{N}, \, \min_{x_i\in \bm{R}^{n_i}} \; J_i(x_i,x_{-i}) \; \quad s.t. \;\; x_i\in K_i(x_{-i}). \end{equation} where $K_i(x_{-i}):=\{ x_i\in \bm{R}^{n_i}: (x_i,x_{-i}) \in K \}$ is the feasible decision set of agent $i$. A generalized Nash equilibrium (GNE) of game \eqref{GM}, \eqref{equ_coupling_set} is a profile $x^*=col(x^*_i)_{i\in \mathcal{N}}$ at the intersection of all best-response sets,\vspace{-0.1cm} \begin{equation} x_i^* \in \arg\min J_i(x_i,x^*_{-i}) \; s.t. \; x_i\in K_i(x^*_{-i}), \forall i\in \mathcal{N}. \end{equation} \begin{assumption}\label{assum1} For each player $i$, $J_i(x_i,x_{-i})$ is continuously differentiable and convex in $x_i$, given $x_{-i}$, and $\Omega_i$ is non-empty compact and convex. $K$ is non-empty and satisfies Slater's constraint qualification. \end{assumption} Denote $A=[A_1,...,A_N]$ and $b=\sum_{i=1}^N b_i$. Suppose $x^*$ is a GNE of game \eqref{GM}, \eqref{equ_coupling_set} then for agent $i$, $x_i^*$ is the optimal solution to the following convex optimization problem: \begin{equation}\label{op_1} \min_{x_i\in \bm{R}^{n_i}} J_i(x_i,x^*_{-i}), \quad s.t.\; x_i\in \Omega_i, A_ix_i \leq b-\sum_{j \neq i,j\in \mathcal{N}} A_j x^*_j.\vspace{-0.1cm} \end{equation} A primal-dual characterization can be obtained via a Lagrangian for each agent $i$, \begin{equation}\label{local_lagrangian} L_i(x_i,\lambda_i;x_{-i}) = J_i(x_i,x_{-i})+\lambda^T_{i}(A x -b). \end{equation} with dual variable (multiplier) $\lambda_i\in \bm{R}^m_{+}$. When $x_i^*$ is an optimal solution to \eqref{op_1}, there exists $\lambda_i^*\in \bm{R}_{+}^m$ such that the following KKT conditions are satisfied:\vspace{-0.1cm} \begin{equation} \begin{array}{lll}\label{kkt_3} \bm{0}_{n_i} = \nabla_{x_i} L_i(x^*_i,\lambda^*_i;x^*_{-i}), \, x^*_i \in \Omega_i, \, \, i \in \mathcal{N} \\ \langle \lambda^*_i, Ax^* -b \rangle=0, \, -(Ax^* - b) \geq \bm{0}, \, \lambda_i^*\geq \bm{0}, \end{array} \end{equation}\vspace{-0.1cm} Equivalently, using the normal cone operator, \vspace{-0.1cm \begin{equation} \begin{array}{lll}\label{kkt_1} \bm{0}_{n_i} \in \nabla_{x_i} J_i(x^*_i,x^*_{-i}) + A_i^T \lambda_i^* +N_{\Omega_i}(x^*_i), i \in \mathcal{N} \\ \bm{0}_m \in - (Ax^*-b) + N_{\bm{R}^m_{+}}(\lambda_i^*) \end{array} \end{equation} Denote $\bm{\lambda}=col(\lambda_i)_{i\in \mathcal{N}} $. By \cite[Thm. 8, \S 4]{faccinei1} when $(x^*,\bm{\lambda}^*)$ satisfies KKT conditions \eqref{kkt_1}, $x^*$ is a GNE of game \eqref{GM}, \eqref{equ_coupling_set}. A GNE with the same Lagrangian multipliers for all the agents is called {\em variational GNE}, \cite{faccinei1}, which has the economic interpretation of no price discrimination, \cite{shanbhag2}. A {\it variational GNE} of game \eqref{GM}, \eqref{equ_coupling_set} is defined as $x^* \in K$ solution of the following $VI(F,K)$: \begin{equation}\label{vi} \langle F(x^*), x -x^*\rangle \geq 0, \, \, \forall x\in K, \end{equation} where $F$ is the {\em pseudo-gradient} of the game defined as: \begin{equation}\label{pseudogradient} F(x) = col(\nabla_{x_i} J_i(x_i,x_{-i}))_{i\in \mathcal{N}}. \end{equation} $x^*$ solves $VI(F,K)$ if and only if there exists a $\lambda^*\in \bm{R}^m$ such that the KKT conditions are satisfied, \cite[\S 10.1]{FacchineiBOOK}, \begin{equation} \begin{array}{lll}\label{kkt_2_BIG} \bm{0}_n &\in F(x^*) + A^T \lambda^* +N_{\Omega}(x^*) \\ \bm{0}_m & \in -(Ax^*-b) + N_{\bm{R}^m_{+}}(\lambda^*) \end{array} \end{equation} where $N_{\Omega}(x^*)=\prod_{i=1}^N N_{\Omega_i}(x^*_i)$, or component-wise, \begin{equation*} \begin{array}{lll} \bm{0}_{n_i} \in \nabla_{x_i} J_i(x^*_i,x^*_{-i}) + A_i^T \lambda^* +N_{\Omega_i}(x^*_i),i\in \mathcal{N} \\ \bm{0}_m \in -(Ax^*-b) + N_{\bm{R}^m_{+}}(\lambda^*). \end{array} \end{equation*} Assumption \ref{assum1} guarantees existence of a solution to $VI(F,K)$ \eqref{vi}, by \cite[Cor. 2.2.5]{FacchineiBOOK}. By \cite[Thm. 9, \S 4]{faccinei1}, every solution $x^*$ of $VI(F,K)$ \eqref{vi} is a GNE of game \eqref{GM}. Furthermore, if $x^*$ together with $\lambda^*$ satisfies the KKT conditions \eqref{kkt_2_BIG} for $VI(F,K)$ \eqref{vi}, then $x^*$ satisfies the KKT conditions \eqref{kkt_1} with $\lambda_1^*\!=\!...\!=\!\lambda^*_N\!=\!\lambda^*$, hence $x^*$ is variational GNE of game \eqref{GM}. Our aim is to design an iterative algorithm that finds a variational GNE under \emph{partial-decision information} over a network with arbitrary topology $\mathcal{G}_c$, by using an operator-theoretic approach. We first review typical iterative algorithms under full-decision information, where each agent has access to the others' decisions. \subsection{Iterative Algorithm under Full-Decision Information} \begin{assumption}\label{strgmon_Fassump} $F$ is strongly monotone and Lipschitz continuous: there exists $\mu>0$ and $\theta_0 >0$ such that for any pair of points $x$ and $x'$, $\langle x-x', F(x) - F(x') \rangle \geq \mu \| x- x'\|^2$ and $\| F(x) - F(x') \| \leq \theta_0 \| x- x'\|$. \end{assumption} Strong monotonicity of $F$ is a standard assumption under which convergence of projected-gradient type algorithms is guaranteed with fixed step-sizes, e.g. \cite{zhuminghui},\cite{lygeros2}, \cite{YiPavelCDC1_2017}, \cite{GrammaticoECC2018}. % Under Assumption \ref{assum1}, \ref{strgmon_Fassump}, the $VI(F,K)$, \eqref{vi}, has a unique solution $x^*$ (cf. \cite[Thm. 2.3.3]{FacchineiBOOK}), thus the game \eqref{GM} has a unique variational GNE. Assuming each player has access to the others' decisions $x_{-i}$, i.e., {\it full-decision information}, a primal-dual projected-gradient GNE algorithm is \vspace{-0.2cm} \begin{equation}\label{dal_1_semi_decentralized} \begin{array}{ll} x_{i,k+1} & = P_{\Omega_i}\big( x_{i,k}-\tau ( \nabla_{x_i} J_i(x_{i,k},x_{-i,k}) + A_i^T \lambda_{k} )\big) \\ \lambda_{k+1} & = P_{\bm{R}^{m}_{+}}\Big (\lambda_{k} + \sigma\big ( A (2x_{k+1} -x_{k}) - b \big)\Big), \vspace{-0.4cm} \end{array} \end{equation} where $x_{i,k}$, $\lambda_{k}$ denote $x_i$, $\lambda$ at iteration $k$ and $\tau$ and $\sigma$ are fixed step-sizes. The dual variable $\lambda$ is handled by a center (coordinator) as in \cite{GrammaticoECC2018} hence \eqref{dal_1_semi_decentralized} is semi-decentralized. Algorithm \eqref{dal_1_semi_decentralized} is an instance of an operator-splitting method for finding zeros of a sum of monotone operators, \cite[\S 25]{combettes1}. To see this, note that the KKT conditions \eqref{kkt_2_BIG} can be written as $col(x^*, \lambda^*) \in zer \mathcal{T}$ where the operator $\mathcal{T}$ is defined by the concatenated right-hand side of \eqref{kkt_2_BIG}. $\mathcal{T} $ can be split as $\mathfrak{A} + \mathfrak{B}$, where operators $\mathfrak{A}$, $\mathfrak{B}$ are defined as \vspace{-0.2cm} \begin{align}\label{operator_tilde_A_B} & \mathfrak{A}:\; \left [ \begin{array}{c} x \\ \lambda \end{array} \right] \mapsto \left [ \begin{array}{c} N_{\Omega}(x) \\ N_{\bm{R}^m_{+}}(\lambda) \end{array} \right] + \left [ \begin{array}{cc} 0 & A^T \\ - A & 0 \end{array} \right] \left [ \begin{array}{c} x \\ \lambda \end{array} \right] \nonumber \\ & \mathfrak{B}:\; \left [ \begin{array}{c} x \\ \lambda \end{array} \right] \mapsto \left [ \begin{array}{c} F(x) \\ b \end{array} \right] \end{align} Algorithm \eqref{dal_1_semi_decentralized} can be obtained as a forward-backward iteration, \cite[\S 25.3]{combettes1}, for zeros of $\Phi^{-1}\mathfrak{A} + \Phi^{-1} \mathfrak{B}$, where $\Phi = \left [ \begin{array}{cc} \tau^{-1} & -A^T \\ - A & \sigma^{-1} \end{array} \right] $ is a metric matrix. We note that different GNE seeking algorithms can be obtained for different splitting of $\mathcal{T}$, with convergence conditions dependent on monotonicity properties of $\mathfrak{A}$ and $\mathfrak{B}$. Notice that $\mathfrak{A}$ \eqref{operator_tilde_A_B} is maximally monotone (similar arguments for this can be found in Lemma \ref{lem_monotone}), and under Assumption \ref{strgmon_Fassump}, $\mathfrak{B}$ is cocoercive. Convergence of \eqref{dal_1_semi_decentralized} to $x^*$, $\lambda^*$ can be proved for sufficient conditions on the fixed-step sizes such that $\Phi \succ 0$. \section{Distributed Algorithm under Partial-Decision Information}\label{sec_algorithm_develpo} % In this section we consider a {\em partial-decision information} setting, where the agents do not have full information on the others' decisions $x_{-i}$. We propose an algorithm that allows agents to find a variational GNE based on local information exchange with neighbours, over a communication graph $\mathcal{G}_c$ with arbitrary topology, under the following assumption. \vspace{0.2cm} \begin{assumption}\label{connectivity} $\mathcal{G}_c$ is undirected and connected. \end{assumption} \vspace{0.2cm} {\it Our approach is based on the interpretation of the KKT conditions \eqref{kkt_2_BIG} as a zero-finding problem of a sum of operators. To deal with (incomplete) partial-decision information and to distribute the computations, we introduce estimates and lift the original problem to a higher-dimensional space. This space (called the augmented space), is doubly-augmented (in both primal and dual variables), and the original space is its consensus subspace. We appropriately define a pair of doubly-augmented operators, such that any zero of their sum lies on the consensus subspace, and has variational GNE $x^*$ and $\lambda^*$ as its components. } \vspace{0.2cm} We describe next the algorithm variables. Agent $i$ controls its local decision $x_i\in \bm{R}^{n_i}$, and a local copy of multiplier (dual variable) $\lambda_i \in \bm{R}_{+}^m$ for the estimation of $\lambda^*$ in \eqref{kkt_2_BIG}. To cope with partial-decision information, we endow each player with an auxiliary variable $\mathbf{x}^i $ that provides an estimate of other agents' primal variables (decisions), as done in \cite{GadjovPavelTAC2018,SalehiPavelIFAC_2017} for NE seeking. Thus agent $i$ maintains $\mathbf{x}^i =col(\mathbf{x}^i_j)_{j \in \mathcal{N}} \in \bm{R}^n$, where $\mathbf{x}^i_j $ is player $i$'s estimate of player $j$'s decision and $\mathbf{x}^i_i = x_i$ is its decision. Note that $\mathbf{x}^i = (x_i, \mathbf{x}^i_{-i})$, where $\mathbf{x}^i_{-i}$ represents player $i$'s estimate vector without its own decision $x_i$. In steady-state all estimates should be equal, i.e., $\mathbf{x}^i=\mathbf{x}^j$ and $\lambda_i=\lambda_j$. \textit{Each agent uses the relative feedback from its neighbours such that in steady-state these estimates, on both {\it primal} and {\it dual variables}, agree one with another.} An additional local auxiliary variable $z_i\in \bm{R}^m$ is used for the coordination needed to satisfy the coupling constraint and to reach consensus of the local multipliers (dual variables) $\lambda_i$. Agents exchange local $\{ \mathbf{x}^i, \lambda_i,z_i\}$ via the arbitrary topology communication graph $\mathcal{G}_c=\{\mathcal{N},\mathcal{E}\}$. $(j,i)\in \mathcal{E}$ if player $i$ can receive $\{ \mathbf{x}^j, \lambda_j,z_j\}$ from player $j \in \mathcal{N}_i$, where $\mathcal{N}_i=\{j| (j,i)\in \mathcal{E}\}$ denotes its set of neighbours. \vspace{0.3cm} The distributed algorithm for player $i$ is given as follows. \vspace{0.2cm} \begin{alg}\label{dal_1} \\ \noindent\rule{0.49\textwidth}{0.7mm} Initialize: $x_{i,0}\!\in \Omega_i$, $\!\mathbf{x}^i_{-i,0}\! \in \!\bm{R}^{n-n_i}$, $\lambda_{i,0}\!\in\! \bm{R}_{+}^m$, $\!z_{i,0} \!\in \!\bm{R}^m$.\\ Iteration: \vspace{-0.4cm} \begin{equation} \begin{array}{ll} x_{i,k+1} \!\! \!\! & = P_{\Omega_i}\left (x_{i,k}-\tau_i \big ( \nabla_{x_i} J_i(x_{i,k},\mathbf{x}^i_{-i,k}) +A_i^T \lambda_{i,k} \right . \\ \!\! \!\!&\qquad \qquad \qquad \quad \left .+{c} \sum_{j\in \mathcal{N}_i} w_{ij} (x_{i,k}- \mathbf{x}^j_{i,k}) \big )\right ) \\ \mathbf{x}^i_{-i,k+1} \!\! \!\! & = \mathbf{x}^i_{-i,k} - \tau_i {c} \sum_{j\in \mathcal{N}_i} w_{ij} \big (\mathbf{x}^i_{-i,k}- \mathbf{x}^j_{-i,k} \big ) \\ z_{i,k+1} \!\! \!\! & = z_{i,k} + \nu_i \sum_{j\in \mathcal{N}_i} w_{ij}(\lambda_{i,k}-\lambda_{j,k}) \\ \lambda_{i,k+1}\!\! \!\! & = P_{\bm{R}^{m}_{+}}\Big(\lambda_{i,k} + \sigma_i\big( A_i(2x_{i,k+1} -x_{i,k})-b_i \nonumber\\ \!\! \!\!&\; -\sum_{j\in \mathcal{N}_i} w_{ij}(2(z_{i,k+1}-z_{j,k+1})-(z_{i,k}-z_{j,k})) \nonumber\\ \!\! \!\!&\;\quad\quad \qquad \qquad \quad -\sum_{j\in\mathcal{N}_i} w_{ij}(\lambda_{i,k}-\lambda_{j,k})\big)\Big)\label{al_3} \end{array} \end{equation} \noindent\rule{0.49\textwidth}{0.7mm} Here $x_{i,k}$, $\!\mathbf{x}^i_{-i,k} $, $\!z_{i,k}$, $\!\lambda_{i,k}$ denote $x_i$, $\!\mathbf{x}^i_{-i}$, $\!z_i$, $\lambda_i$ at iteration $k$, $c\!>\!0$ is a design parameter, $\tau_i,\!\nu_i,\! \sigma_i \!>\!0$ are fixed step-sizes of player $i$, and $W\!=[w_{ij}]$ the weighted adjacency matrix of $\mathcal{G}_c$. \end{alg} \begin{remark} The update for $x_i$ in Algorithm \ref{dal_1} employs a projected-gradient descent of the local Lagrangian function in \eqref{local_lagrangian} with an extra proportional term of the consensual errors (disagreement) between his primal variables and his neighbours' estimates. The updates for $ \mathbf{x}^i_{-i}$ and $z_i$ can be regarded as discrete-time integrations for the consensual errors of local decision estimates and dual variables. Finally, $\lambda_i$ is updated by a combination of the projected-gradient ascent of local Lagrangian \eqref{local_lagrangian} and a proportional-integral term for consensual errors. Each player knows only its local data in game \eqref{GM}, $J_i$, $\Omega_i$, $A_i$ and $b_i$, own private information, i.e., cost function, preference and decision ability. $A_i$ characterizes how agent $i$ is involved in the coupled constraint (shares the global resource), assumed to be privately known by player $i$. The globally shared constraint $A x\leq b$ couples the agents' feasible decision sets, but is {\it not known} by any agent. \end{remark} \begin{remark}\label{rem_Alg1_double_aug} Compared to algorithm \eqref{dal_1_semi_decentralized}, Algorithm \ref{dal_1} is completely distributed (without any central coordinator), i.e., primal-distributed and dual-distributed over $\mathcal{G}_c$. The algorithms in \cite{YiPavelCDC1_2017}, \cite{GadjovPavelTAC2018} are special cases of Algorithm \ref{dal_1}. When each agent has access to all players' decisions that affect its cost, the estimates $ \mathbf{x}^i_{-i}$ are not needed (set $c\!=\!0$), and Algorithm \ref{dal_1} reduces to the dual-distributed, perfect-information case one in \cite{YiPavelCDC1_2017} (dual distributed). On the other hand, in a game with no coupling constraints (set $A\!=\!0$, $b\! =\!0$), the $\lambda_i$ (hence the $z_i$) are not needed, and Algorithm \ref{dal_1} reduces to a discrete-time version of the primal-distributed dynamics in \cite{GadjovPavelTAC2018}. \end{remark} Next, we write Algorithm \ref{dal_1} in compact form, using two matrices to manipulate the selection of agent $i$'s decision variables, $x_i$, and estimate variables, $\mathbf{x}^i_{-i}$. Let \vspace{-0.2cm} \begin{align} \label{eq:actualStratREMatrix} \mathcal{R}_i & = \begin{bmatrix} \mathbf{0}_{n_i\times n_{<i}} && & I_{n_i} & && \mathbf{0}_{n_i\times n_{>i}} \end{bmatrix} \\ \mathcal{S}_i &= \begin{bmatrix} I_{n<i} & \mathbf{0}_{n<i \times n_i} & \mathbf{0}_{n<i \times n>i} \\ \mathbf{0}_{n>i \times n<i} & \mathbf{0}_{n>i \times n_i} & I_{n>i} \end{bmatrix}\end{align} where $n_{<i} = \sum_{j<i\ j\in\mathcal{N}} n_j$, $n_{>i} = \sum_{j>i\ j\in\mathcal{N}} n_j$. Hence $\mathcal{R}_i$ selects the $i$-th $n_i$-dimensional component from an $n$-dimensional vector, while $\mathcal{S}_i$ removes it. Thus, $\mathcal{R}_i \, \mathbf{x}^i \!=\!\mathbf{x}^i_i\!=\!x_i$ and $\mathcal{S}_i \, \mathbf{x}^i\!=\!\mathbf{x}^i_{-i}$. With $x_i=\mathcal{R}_i \, \mathbf{x}^i$, the stacked decisions $x\!=\!col(x_i)_{i \in \mathcal{N}} \!\in \! \mathbf{R}^n$ can be written as $x \!= \!\mathcal{R}\mathbf{x} $, where $\mathcal{R} \! =\! diag((\mathcal{R}_i)_{i \in \mathcal{N}})$ and $\mathbf{x} \!=col(\mathbf{x}^i)_{i \in \mathcal{N}} \in \mathbf{R}^{Nn}$. Similarly, the stacked estimates are $ col(\mathbf{x}^i_{-i})_{i \in \mathcal{N}} = \mathcal{S}\mathbf{x} \in \mathbf{R}^{(N-1)n}$, where $\mathcal{S} = diag((\mathcal{S}_i)_{i \in \mathcal{N}})$. These two matrices, $\mathcal{R}$ and $\mathcal{S}$, play a key role in the following. Using \eqref{eq:actualStratREMatrix}, it can be seen that both are full row rank and moreover, \vspace{-0.2cm \begin{align}\label{eq:IdRSMatrix} \mathcal{R}^T\mathcal{R} + \mathcal{S}^T\mathcal{S} = I_{Nn}, \quad \quad \nonumber \\ \,\, \mathcal{R}\mathcal{S}^T = \mathbf{0}_{n}, \, \, \mathcal{S}\mathcal{R}^T = \mathbf{0}_{Nn-n} \\ \,\, \mathcal{R}\mathcal{R}^T = I_{n}, \, \, \mathcal{S}\mathcal{S}^T = I_{Nn-n}.\nonumber \end{align} Furthermore, with $\mathbf{v} \!:=\mathcal{S}\mathbf{x}$, we can write $\mathbf{x}= \mathcal{R}^T x + \mathcal{S}^T \mathbf{v}$. With these notations, we write Algorithm \ref{dal_1} in stacked form, using boldface notation for stacked variables (all local copies). \begin{lemma}\label{lem_ALG_compact} Let $x_k\!\!= \!\!col(x_{i,k})_{i \in \mathcal{N}}$, $\mathbf{x}_k\!\!=\!\! col(\mathbf{x}^i_{k})_{i \in \mathcal{N}}$, $\bm{\lambda}_k\!\!=\!\!col(\lambda_{i,k})_{i \in \mathcal{N}}$, $\bm{z}_k\!\!=\!\! col(z_{i,k})_{i \in \mathcal{N}}$. Then, Algorithm \ref{dal_1} is equivalently written in stacked notation as \vspace{-0.2cm} \begin{align} x_{k+1} &= P_{\Omega}\big(x_{k}-\bm{\tau}_x ( \mathbf{F}(\mathbf{x}_{k}) +\bm{A}^T \bm{\lambda}_{k}+ {c} \mathcal{R}\mathbf{L}_x \, \mathbf{x}_k)\big) \label{Alg1BLOCK_1} \\\mathcal{S}\mathbf{x}_{k+1} &= \mathcal{S}\mathbf{x}_{k}- \bm{\tau}_s \, {c} \mathcal{S}\mathbf{L}_x \, \mathbf{x}_k \label{Alg1BLOCK_2}\\ \bm{z}_{k+1} &= \bm{z}_{k} + \bm{\nu} \mathbf{L}_{\lambda} \, \bm{\lambda}_{k} \label{Alg1BLOCK_3}\\ \bm{\lambda}_{k+1} &= P_{\bm{R}^{Nm}_{+}}\big(\bm{\lambda}_{k} + \bm{\sigma} ( \bm{A} (2x_{k+1} -x_{k})-\bm{b} \label{Alg1BLOCK_4} \\ \quad \, \, & \qquad \qquad \qquad - \mathbf{L}_{\lambda} \, \bm{\lambda}_{k} -\mathbf{L}_{\lambda} \, (2\bm{z}_{k+1}-\bm{z}_k))\big)\nonumber \end{align} where $ \mathbf{F}$ is defined as \vspace{-0.2cm \begin{equation}\label{pseudogradient_EKT} \mathbf{F}(\mathbf{x})= col(\nabla_{x_i} J_i(x_i,\mathbf{x}^i_{-i}))_{i \in \mathcal{N}}, \end{equation} $\bm{A}\! \! = \!diag(\!(A_i)_{i \in \mathcal{N}}\!$, $\!\!\bm{b}\!\! \! = \!col(b_i)_{i \in \mathcal{N}}\!$, $\!\mathbf{L}_{x} \!\! \! =\!L \!\otimes \!I_n$, $\!\mathbf{L}_{\lambda} \! \!\! =L \!\otimes \!I_m$, $\mathcal{R} \!\!= \!diag(\!(\mathcal{R}_i)_{i \in \mathcal{N}}\!)$, $\mathcal{S} = diag(\!(\mathcal{S}_i)_{i \in \mathcal{N}}\!)$, $\bm{\tau}_x \!\!= \!\!diag\!(\tau_i I_{n_i})_{i \in \mathcal{N}}\!$, $\!\bm{\tau}_s \!\! = \!\!diag\!(\tau_i I_{n-n_i})_{i \in \mathcal{N}}\!)$, $\!\bm{\nu} \!\! = \!\! diag\!(\nu_i I_{m})_{i \in \mathcal{N}}\!$, $\!\bm{\sigma} \!\! = \!\! diag\!(\sigma_i I_{m})_{i \in \mathcal{N}}\!$. \end{lemma}\hfill $\Box$ \begin{remark} In Algorithm \ref{dal_1}, instead of evaluating its gradient at actual decisions, as in $\nabla_{x_i} J_i(x_{i},x_{-i})$, each player evaluates its gradient at local estimates, $\nabla_{x_i} J_i(x_i, \mathbf{x}^i_{-i})$. The stacked form $ \mathbf{F}(\mathbf{x})$, \eqref{pseudogradient_EKT}, called the {\em extended pseudo-gradient}, is the extension of $F$, \eqref{pseudogradient} to the augmented space of decisions and estimates. When these estimates are identical, $\mathbf{x}^i = x$ for all $i$, then $ \mathbf{F}(\mathbf{1}_N \otimes x) = F(x)$. \end{remark} Based on Lemma \ref{lem_ALG_compact}, we show next that Algorithm \ref{dal_1} can be written as a forward-backward iteration for finding zeros of the sum of two doubly-augmented operators $\Phi^{-1} {\bm{\mathfrak{A}}}$ and $\Phi^{-1} {\bm{\mathfrak{B}}}$, where ${\bm{\mathfrak{A}}}$, ${\bm{\mathfrak{B}}}$ are related to $\mathfrak{A}$, $\mathfrak{B}$, \eqref{operator_tilde_A_B}, and $\Phi$ is a (preconditioning) metric matrix. Let $\varpi\!=\! col(\mathbf{x}, \bm{z},\bm{\lambda}) \! \in \! {\bm{\Omega}}$, where ${\bm{\Omega}}\!:=\! \bm{R}^{Nn} \! \times \! \bm{R}^{Nm}\! \times \!\bm{R}_{+}^{Nm}$. Define ${\bm{\mathfrak{A}}}: {\bm{\Omega}}\rightarrow 2^{\bm{R}^{Nn+2Nm}}$, $ {\bm{\mathfrak{B}}}: {\bm{\Omega}}\rightarrow \bm{R}^{Nn+2Nm}$ as \begin{align}\label{op_hat_A} & {\bm{\mathfrak{A}}}: \varpi \mapsto \left [\!\!\! \begin{array}{c} \mathcal{R}^T N_{\Omega}(\mathcal{R}\mathbf{x}) \!\!\\ \bm{0} \\ N_{\bm{R}^{Nm}_{+}}(\bm{\lambda}) \!\!\!\! \end{array} \! \right] \! + \! \left[\! \begin{array}{ccc} \!\!\!\! \bm{0} & \bm{0} & \mathcal{R}^T \bm{A}^T\!\! \\ \!\!\!\! \bm{0} & \bm{0} & -\mathbf{L} _\lambda \!\! \\ \!\!\!\! - \bm{A} \mathcal{R} & \mathbf{L}_\lambda & \bm{0} \!\! \\ \end{array} \! \right] \! \! \varpi \nonumber \\ & {\bm{\mathfrak{B}}}: \varpi \mapsto \left [\! \begin{array}{c} \mathcal{R}^T \mathbf{F}(\mathbf{x}) + {c} \mathbf{L}_x \mathbf{x} \\ \bm{0} \\ \mathbf{L}_\lambda \, \bm{\lambda} +\bm{b} \end{array} \! \right] \end{align} where $N_{\Omega}(\mathcal{R}\mathbf{x}) =N_{\Omega}(x)= \prod_{i=1}^N N_{\Omega_i}(x_i)$, $\mathcal{R}^T N_{\Omega}(\mathcal{R}\mathbf{x})=\{ \mathcal{R}^T v \, | v \in N_{\Omega}(\mathcal{R}\mathbf{x})\} $, $N_{\bm{R}^{Nm}_{+}}(\bm{\lambda})=\prod_{i=1}^N N_{\bm{R}^m_{+}}(\lambda_i)$. Let the matrix $\Phi$ be defined as \begin{equation}\label{metric_matrixBis} {\Phi}=\left[\! \begin{array}{ccc} \bm{\tau}^{-1} & \bm{0} & -\mathcal{R}^T \bm{A}^T \\ \bm{0} & \bm{\nu}^{-1} & \mathbf{L}_\lambda \\ -\bm{A} \mathcal{R} & \mathbf{L}_\lambda & \bm{\sigma}^{-1} \\ \end{array} \!\right]. \end{equation} where $\!\bm{\tau} \!=\! diag((\tau_i I_n)_{i\in \mathcal{N}})$, $\!\bm{\tau}^{-1} \!=\! diag((\tau^{-1}_i I_n)_{i\in \mathcal{N}})$, and $\bm{\nu}^{-1}\!, \bm{\sigma}^{-1}$ are similarly defined from $\bm{\nu}, \bm{\sigma}$. \begin{lemma}\label{lem_fix_approximation} Let $\varpi_k=col({\mathbf{x}}_k, {\bm{z}}_k,{\bm{\lambda}}_k)$, $\bm{\mathfrak{A}}$, $\bm{\mathfrak{B}}$, $\Phi$ as in \eqref{op_hat_A}, \eqref{metric_matrixBis}. Suppose that ${\Phi} \!\succ \!0$ and ${\Phi}^{-1} \!{\bm{\mathfrak{A}}}$ is maximally monotone. Then the following hold:\\ (i): Algorithm \ref{dal_1} is equivalent to \vspace{-0.15cm} \begin{equation} \label{compact_operator_1} - {\bm{\mathfrak{B}}}(\varpi_{k}) \in {\bm{\mathfrak{A}}}(\varpi_{k+1})+{\Phi}(\varpi_{k+1}-\varpi_{k}), \end{equation} \vspace{-0.6cm} \begin{equation}\label{com_fix} \hspace{-0.2cm}\text{or,} \, \, \varpi_{k+1}\!=\! ({\rm Id}\!+\!{\Phi}^{-1} {\bm{\mathfrak{A}}})^{-1}\!\!\circ\! ({\rm Id}\!-\! {\Phi}^{-1}{\bm{\mathfrak{B}}}) \varpi_{k}\!:=\! T_2 \!\circ \! T_1 \varpi_k, \end{equation} where $T_1:={\rm Id}-{\Phi}^{-1}{\bm{\mathfrak{B}}} $ and $T_2:=({\rm Id}+{\Phi}^{-1}{\bm{\mathfrak{A}}})^{-1}$. \\ (ii): Any limit point $\overline{\varpi}=col(\overline{\mathbf{x}}, \overline{\bm{z}},\overline{\bm{\lambda}})$ of Algorithm \ref{dal_1} is a zero of ${\bm{\mathfrak{A}}}+{\bm{\mathfrak{B}}}$ and a fixed point of $T_2 \circ T_1$. \end{lemma}\hfill $\Box$ \begin{remark}\label{rem_FB_AB_B_Phi Algorithm 1, written as \eqref{com_fix} is a {\em forward-backward iteration} for finding zeros of ${\Phi}^{-1} {\bm{\mathfrak{A}}} \!+ \! {\Phi}^{-1} {\bm{\mathfrak{B}}}$, or fixed-point iteration for $T_2 \!\circ \! T_1$ \cite[\S 25.3]{combettes1}. It alternates a forward step $({\rm Id}-{\Phi}^{-1}{\bm{\mathfrak{B}}})$, and a backward step $({\rm Id}+{\Phi}^{-1}{\bm{\mathfrak{A}}})^{-1}$. Typically, the backward step evaluates the resolvent of a monotone operator, while the forward step evaluates a cocoercive operator. Note that we put the skew-symmetric part (monotone but not cocoercive) in ${\bm{\mathfrak{A}}}$, \eqref{op_hat_A}, and $\mathbf{F}$, $\mathbf{L}_x$ and $ \mathbf{L}_\lambda$ in ${\bm{\mathfrak{B}}}$. This separation between constraint data and game cost functions data will be instrumental later on to study monotonicity and cocoercivity properties of the two operators. Note that with the standard choice $\Phi = I$, the resolvent $({\rm Id}+{\bm{\mathfrak{A}}})^{-1}$ needs evaluated, which cannot be done in a distributed manner. This is where a non-identity metric matrix ${\Phi}$ as in \eqref{metric_matrixBis} helps. Specifically, for ${\bm{\mathfrak{A}}}$ \eqref{op_hat_A}, let ${\bm{\mathfrak{A}}}={\bm{\mathfrak{A}}}_1\!+\!{\bm{\mathfrak{A}}}_2$, where ${\bm{\mathfrak{A}}}_1=\mathcal{R}^TN_{\Omega} \mathcal{R}(\mathbf{x})\times \bm{0}_{Nm} \times N_{\bm{R}^{Nm}_{+}}(\bm{\lambda})$ and ${\bm{\mathfrak{A}}}_2$ is the skew-symmetric matrix in \eqref{op_hat_A}. Then, with ${\Phi}$ as in \eqref{metric_matrixBis}, \eqref{compact_operator_1} is written as $- {\bm{\mathfrak{B}}}(\varpi_{k}) \in {\bm{\mathfrak{A}}}_1(\varpi_{k+1})+ ({\bm{\mathfrak{A}}}_2 +\Phi)\varpi_{k+1}-\Phi \varpi_{k} $, where $ {\bm{\mathfrak{A}}}_2 \!+\! {\Phi} \!=\! \left[\!\! \begin{array}{ccc} \bm{\tau}^{-1} & \!\bm{0} &\! \bm{0} \\ \bm{0} & \!\bm{\nu}^{-1} & \!\bm{0} \\ -2\bm{A} \mathcal{R} & \!2\mathbf{L}_\lambda & \! \bm{\sigma}^{-1} \\ \end{array} \!\!\right] $. Since this is lower block-triangular, the resolvent can be evaluated distributively via only projection, matrix multiplying and local communication. Using $P_{\bm{R}_{+}^{Nm}}(\bm{\lambda})=({\rm Id}\!+\!N_{\bm{R}_{+}^{Nm}})^{-1}$, it can be checked that the explicit iterations are as in \eqref{Alg1BLOCK_1}-\eqref{Alg1BLOCK_4}. \end{remark} \begin{remark}\label{rem_op_hat_A_B} Operators $\bm{\mathfrak{A}}$, $\bm{\mathfrak{B}}$, \eqref{op_hat_A}, are doubly-augmented extensions of $\mathfrak{A}$, $\mathfrak{B}$, \eqref{operator_tilde_A_B}, obtained by introducing local copies of primal and dual variables, from $x \in \bm{R}^n$ to $\mathbf{x} =[\mathbf{x}^i]_{i\in\mathcal{N}} \in \bm{R}^{Nn}$, $\lambda \in \bm{R}^m$ to $\bm{\lambda} = [\lambda_i]_{i\in\mathcal{N}} \in \bm{R}^{Nm}$ and with auxiliary variables $\bm{z} = [z_i]_{i\in\mathcal{N}} \in \bm{R}^{Nm}$. The Laplacian matrices $\bm{L}_x$ and $\bm{L}_\lambda$ help to enforce the consensus of the local primal variables $\mathbf{x}^i$ and of the local dual multipliers $\lambda_i$, as well as the feasibility of the affine coupling constraints. The auxiliary variables $z_i$ help for the consensus of $\lambda_i$s and to decouple the constraint, in the sense of estimating the contribution of the other agents in the constraint. Note that if we set $\mathcal{R} \!=\!I$, $\mathbf{L}_x \!=\! 0$, $\mathbf{x} \!=\! \bm{1}_N \!\otimes \!x$ then $ \mathbf{F}(\mathbf{1}_N \! \otimes \! x) \!=\! F(x)$ and ${\bm{\mathfrak{A}}}$ and ${\bm{\mathfrak{B}}}$ collapse to the operators ${\overline{\mathfrak{A}}}$ and ${\overline{\mathfrak{B}}}$ in \cite{YiPavelCDC1_2017}, distributed in dual variables only. Furthermore, if we also set $\mathbf{L}_\lambda =0$ and take $\bm{\lambda} = \bm{1}_N \! \otimes \!\lambda$, matrix $\bm{A}$ reduces to $A$, and we recover operators $\mathfrak{A}$ and $\mathfrak{B}$, \eqref{operator_tilde_A_B}. Extension to the partial-decision information case introduces technical challenges in the convergence analysis: coupling in $\mathbf{F}$ (augmented space), non-square $\mathcal{R}$, and the extra term involving $\mathbf{L}_x$. We will exploit properties of these extra terms to derive properties for the doubly-extended operators ${\bm{\mathfrak{A}}}$ and ${\bm{\mathfrak{B}}}$. \end{remark} \section{Convergence analysis}\label{sec_alg_converge} In this section we prove the convergence of Algorithm \ref{dal_1}. First, in Theorem \ref{thm_zeroHAT_is_correct}, based on the fact that any limiting point of Algorithm \ref{dal_1} is a zero of ${\bm{\mathfrak{A}}}+{\bm{\mathfrak{B}}}$ (Lemma \ref{lem_fix_approximation}(ii)), we characterize the zeros of ${\bm{\mathfrak{A}}}+{\bm{\mathfrak{B}}}$. We show that any zero is on the consensus subspace and solves the $VI(F,K)$ \eqref{vi}, thus any limiting point of Algorithm \ref{dal_1} finds a variational GNE of game \eqref{GM}. {Let $\mathbf{E}_x \! \! \!= \!\{ \!\mathbf{x}\! \in \!\mathbf{R}^{Nn} | \mathbf{x}^i \!\!=\! \mathbf{x}^j, \forall i,j \!\!\in\! \mathcal{N} \!\}\! \!= \!\{ \mathbf{x} \!=\! \mathbf{1}_N \!\otimes x, x \!\in \! \bm{R}^{n}\! \}$ denote the estimate consensus subspace, $\mathbf{E}_x^\perp$ its orthogonal complement with $\mathbf{R}^{Nn} \! \!=\! \mathbf{E}_x \oplus \mathbf{E}_x^\perp$, $\mathbf{E}_\lambda \! \!\!=\! \{ \! \bm{\lambda} \! \in \! \mathbf{R}^{Nm} \! \bm{\lambda} \!=\! \mathbf{1}_N \!\otimes \!\lambda, \lambda \!\in \! \bm{R}^{m}\! \}$ the multiplier consensus subspace. Consider $\mathbf{L}_{x} \!\! \! =\!L \!\otimes \!I_n$, $\mathbf{L}_{\lambda} \! \!\! =L \!\otimes \!I_m$. Under Assumption \ref{connectivity} on $\mathcal{G}_c$, $Null (\mathbf{L}_x) \! = \! Range \{ \mathbf{1}_N \!\otimes \!I_n \}\! \!=\!\mathbf{E}_x$, $Range (\mathbf{L}_x) \!=\! Null (\mathbf{L}_x)^\perp \!\!= \! Null \{ \mathbf{1}^T_N \! \otimes \! I_n \}\!=\!\mathbf{E}_x^\perp$, $Null (\mathbf{L}_\lambda) \!=\! Range \{ \mathbf{1}_N \!\otimes \! I_m \}\!=\! \mathbf{E}_\lambda$, $Range (\mathbf{L}_\lambda) \!\!=\! Null \{ \mathbf{1}^T_N \!\otimes \! I_m \}\!$. \begin{theorem}\label{thm_zeroHAT_is_correct} Suppose that Assumptions \ref{assum1}-\ref{connectivity} hold. Consider operators $\bm{\mathfrak{A}}$,$\bm{\mathfrak{B}}$, \eqref{op_hat_A}. Then the following statements hold. \\ (i): Given any $\overline{\varpi}^*\!:=\!col(\mathbf{x}^*,\!\bm{z}^*\!,\!\bm{\lambda}^*) \!\in \! zer({\bm{\mathfrak{A}}}\!+\!{\bm{\mathfrak{B}}})$, then {$\mathbf{x}^* \! \in \! \mathbf{E}_x$ and $\bm{\lambda}^*\! \in \! \mathbf{E}_\lambda$}, with $\mathbf{x}^*\! = \!\bm{1}_N \! \otimes x^*$ and $\bm{\lambda}^*\!=\!\bm{1}_N \!\otimes \lambda^*$, where $x^*$, $\lambda^*$ satisfy the KKT conditions \eqref{kkt_2_BIG}, $col(x^*,\lambda^*)\!\in \! zer(\mathfrak{A}\!+\!\mathfrak{B})$, for $\mathfrak{A}$, $\mathfrak{B}$, \eqref{operator_tilde_A_B}. Moreover, $x^*$ solves the $VI(F,K)$ \eqref{vi}, hence $x^*$ is a variational GNE of game \eqref{GM}. (ii): $zer({\bm{{\mathfrak{A}}}}+{\bm{{\mathfrak{B}}}}) \! \neq \emptyset$. \end{theorem} {\bf Proof:} (i) Let $\overline{\varpi}^*:=col(\!\mathbf{x}^*,\!\bm{z}^*,\!\bm{\lambda}^*\!) \!\in\! zer({\bm{\mathfrak{A}}}\!+\!{\bm{\mathfrak{B}}})$. By \eqref{op_hat_A}, \vspace{-0.45cm} \begin{align}\label{ZERO_op_hat_AB} & \bm{0}_{Nn} \in \mathcal{R}^T \mathbf{F}(\mathbf{x}^*) + {c}\mathbf{L}_{x} \mathbf{x}^* +\mathcal{R}^T \bm{A}^T \bm{\lambda}^* + \mathcal{R}^T N_{\Omega}(\mathcal{R} \mathbf{x}^*) \nonumber \\ & \bm{0}_{Nm} = -\mathbf{L}_\lambda \bm{\lambda}^* \\ & \bm{0}_{Nm} \in \mathbf{L}_{\lambda} \bm{\lambda}^* + \bm{b} +N_{\bm{R}^{Nm}_{+}}(\bm{\lambda}^*) -\bm{A} \mathcal{R} \mathbf{x}^* + \mathbf{L}_\lambda \bm{z}^* \nonumber \end{align} From the {\em first} line it follows that for some $v \in N_{\Omega}( \mathcal{R}\mathbf{x}^*)$ \vspace{-0.15cm} \begin{align}\label{ZERO_op_hat_ABEQ} & \bm{0}_{Nn} = \mathcal{R}^T \big [ \mathbf{F}(\mathbf{x}^*) + \bm{A}^T \bm{\lambda}^* + v \big ] + {c}\mathbf{L}_{x} \mathbf{x}^* \end{align} From the {\em second} line of \eqref{ZERO_op_hat_AB} it follows that $\bm{\lambda}^* \in Null(\mathbf{L}_{\lambda})\!=\!\mathbf{E}_\lambda$, hence $\bm{\lambda}^* = \mathbf{1}_N \otimes \lambda^*$, for some $ \lambda^* \in \bm{R}^{m}$. Note that $(\mathbf{1}_N^T\otimes I_n)\mathcal{R}^T = I_n$ (by \eqref{eq:actualStratREMatrix}) and $(\mathbf{1}_N^T\otimes I_n)\mathbf{L}_x = \mathbf{0}_{n\times Nn}$. The, premultiplying \eqref{ZERO_op_hat_ABEQ} by $(\mathbf{1}_N^T\otimes I_n)$ yields \vspace{-0.2cm} \begin{align}\label{ZERO_op_hat_ABis2EQ} & \bm{0}_{n} = \mathbf{F}(\mathbf{x}^*) + \bm{A}^T \bm{\lambda}^* + v \end{align} Substituting \eqref{ZERO_op_hat_ABis2EQ} into \eqref{ZERO_op_hat_ABEQ} yields $ \bm{0}_{Nn}\! = \mathbf{L}_{x} \mathbf{x}^* $. Thus, $\mathbf{x}^* \! \in \!Null(\mathbf{L}_{x})\! = \! \mathbf{E}_x$ (by Assumption \ref{connectivity}), and $\mathbf{x}^* \!= \!\mathbf{1}_N \! \otimes \! x^*$, for some $ x^* \!\in \!\bm{R}^{n}$. Using $\!\mathbf{x}^* \! =\! \mathbf{1}_N \!\otimes \!x^*$ and $\bm{\lambda}^* \! =\! \mathbf{1}_N \!\otimes \!\lambda^*$ in \eqref{ZERO_op_hat_ABis2EQ} yields $ \bm{0}_{n} \!= \! \mathbf{F}(\mathbf{1}_N \!\otimes \!x^*) \!+ \!\bm{A}^T(\mathbf{1}_N \! \otimes \!\lambda^*) \!+ \! v $ for $v \in N_{\Omega}( \mathcal{R}\mathbf{x}^*)$, or $ \bm{0}_{n} \in \mathbf{F}(\mathbf{1}_N \otimes x^*) + \bm{A}^T ( \mathbf{1}_N \otimes \lambda^* )+ N_{\Omega}(x^*)$. With $ \mathbf{F}( \mathbf{1}_N \otimes x^*) = F( x^*)$, $ \bm{A}^T ( \mathbf{1}_N \otimes \lambda^* )= A^T \lambda^*$, this is equivalent to $ \bm{0}_{n} \in F(x^*) + A^T \lambda^* + N_{\Omega}(x^*) $, which is the \textit{first } line in \eqref{kkt_2_BIG}. Using $\mathbf{x}^* \!= \! \mathbf{1}_N \! \otimes \!x^*$, $\bm{\lambda}^* \! = \! \mathbf{1}_N \!\otimes \!\lambda^*$, $\mathbf{L}_\lambda \bm{\lambda}^* \!= \!\bm{0}_{Nm} $ in the {\em third} line of \eqref{ZERO_op_hat_AB}, yields $ \bm{0}_{Nm} \in \bm{b} +N_{\bm{R}^{Nm}_{+}}(\mathbf{1}_N \otimes \lambda^*) -\bm{A} \mathcal{R} (\mathbf{1}_N \otimes x^*) + \mathbf{L}_\lambda \bm{z}^*. $ Thus, with $ \mathcal{R} ( \mathbf{1}_N \!\otimes \! x^*) \! =\! x^*$, \vspace{-0.25cm} \begin{align}\label{4thZERO_op_hat_ABis3EQ} & \bm{0}_{Nm} = \bm{b} + col (w_i)_{i \in \mathcal{N}} - \bm{A} x^* + \mathbf{L}_\lambda \bm{z}^* . \end{align} for some $w_i \! \in \! N_{\bm{R}^{m}_{+}}( \lambda^*)$, $i \!\in \!\mathcal{N}$. Premultiplying \eqref{4thZERO_op_hat_ABis3EQ} by $(\mathbf{1}_N^T \!\otimes \! I_m)$, with $(\mathbf{1}_N^T \! \otimes \! I_m)\mathbf{L}_\lambda \!=\! \mathbf{0}_{m \!\times \!Nm}$, $(\mathbf{1}_N^T \!\otimes \!I_m)\bm{A} \! =\! A$, yields that \bm{0}_{m} = \sum_{i =1}^N b_i + \sum_{i =1}^N w_i - A x^*, $ or, $\bm{0}_{m} \in b \!+\! \sum_{i =1}^N N_{\bm{R}^{m}_{+}}( \lambda^*) \!- \! A x^*.$ This gives the \textit{second} line in \eqref{kkt_2_BIG}, using $N_{\bigcap_{i=1}^N \mathcal{S}_i}\!=\!\sum_{i=1}^N \! \! N_{\mathcal{S}_i}$ if $\bigcap_{i=1}^N int(\mathcal{S}_i)\!\!\neq \! \emptyset$, \cite[Cor. 16.39]{combettes1}. Thus, the KKT conditions \eqref{kkt_2_BIG} for $VI(F,K)$ \eqref{vi} are satisfied for $x^*$ and $\lambda^*$, $col(x^*,\lambda^*) \in zer(\mathfrak{\mathfrak{A}}+\mathfrak{\mathfrak{B}})$, hence $x^*$ is a variational GNE of game \eqref{GM}. (ii) Under Assumption \ref{assum1} and \ref{strgmon_Fassump}, $VI(F,K)$ \eqref{vi} has a unique solution $x^*$, \cite[Thm. 2.3.3]{FacchineiBOOK}, hence there exists $\lambda^* \!\in \! \bm{R}^m$ such that \eqref{kkt_2_BIG} holds, \cite[Prop. 1.2.1]{FacchineiBOOK}, $col(x^*,\lambda^*) \in zer(\mathfrak{A}+\mathfrak{B})$. The first two lines in \eqref{ZERO_op_hat_AB} are satisfied with $\mathbf{x}^* \! = \!\mathbf{1}_N \!\otimes \! x^*$ and $\bm{\lambda}^*\!=\!\bm{1}_N \! \otimes \!\lambda^*$. Using \eqref{kkt_2_BIG} it can be shown that $\exists \bm{z}^* \!\in \! \bm{R}^{Nm}$ such that the third line in \eqref{ZERO_op_hat_AB} is also satisfied, hence $zer({\bm{{\mathfrak{A}}}}\!+\!{\bm{{\mathfrak{B}}}}) \!\neq \!\emptyset$. This is omitted due to space constraints (see the proof of \cite[Thm. 1]{yipeng2} for similar arguments). \hfill $\Box$ Note that \eqref{ZERO_op_hat_AB} can be regarded as the KKT conditions \eqref{kkt_2_BIG}, doubly-augmented in both the primal and the dual space using local variables, $\mathbf{x}$, $\bm{\lambda}$, and auxiliary variables $\bm{z}$. Next we focus on proving the convergence of Algorithm \ref{dal_1}, based on its interpretation as a forward-backward iteration for zeros of ${\Phi}^{-1}{\bm{\mathfrak{A}}} +{\Phi}^{-1}{\bm{\mathfrak{B}}}$, or a fixed-point iteration of $T_2 \!\circ \! T_1$ (see \eqref{com_fix}, Lemma \ref{lem_fix_approximation}). This is done in Theorem \ref{thm_convergence}, using nonexpansiveness properties of $T_1$ and $T_2$, obtained in Lemma \ref{lem_PhiA_B_prop} from properties of ${\Phi}^{-1}{\bm{\mathfrak{A}}}$ and ${\Phi}^{-1}{\bm{\mathfrak{B}}}$. These are based on monotonicity properties of $\bm{\mathfrak{A}}$ and $\bm{\mathfrak{B}}$ (Lemma \ref{lem_monotone}), under a sufficient condition for $\Phi$ to be positive definite (Lemma \ref{lem_monotone_metric}). To prove Lemma \ref{lem_PhiA_B_prop} and \ref{lem_monotone}, a key result is Lemma \ref{boldRF_plus_cL_strgmon_lemma}, which shows how a \textit{restricted} monotonicity property can be achieved in the augmented space under Lipschitz continuity of $\mathbf{F}$. \begin{assumption}\label{Lipchitz_boldFassump} The extended pseudo-gradient $\mathbf{F}$, \! \eqref{pseudogradient_EKT}, is Lipschitz continuous: there exists $\theta>0$ such that for any $\mathbf{x}$ and $\mathbf{x'}$, $\| \mathbf{F}(\mathbf{x})-\mathbf{F}(\mathbf{x'}))\| \leq \theta \| \mathbf{x}- \mathbf{x'}\|$. \end{assumption} \begin{remark} Note that Assumption~\ref{Lipchitz_boldFassump} on $\mathbf{F}$ is weaker than those in \cite{SalehiPavelIFAC_2017,ShiPavelACC_2017,YeHu_TAC_2017}, \cite{PavelCDC2018}. In the classical, full-decision information setting, convergence proof relies on cocoercivity (strong monotonicity) of $F$, e.g. \cite{YiPavelCDC1_2017}. Cocoercivity of $\mathbf{F}$ (the extension of cocoercivity of $F$ to the augmented space), is sometimes used in works on NE computation in partial-decision information setting, \cite{SalehiPavelIFAC_2017,ShiPavelACC_2017,YeHu_TAC_2017}, \cite{PavelCDC2018}. Unlike distributed optimization, where cocoercivity is automatically satisfied, in a game context, monotonicity of $\mathbf{F}$ is \emph{not automatically satisfied} in the augmented space, because of coupling to the others' actions and because of partial convexity. It does hold in games with shared coupling constraints but separable costs. We show next how, in generally coupled games, under Assumption~\ref{Lipchitz_boldFassump}, a \textit{restricted} monotonicity property can be achieved in the augmented space. \end{remark} {\begin{lemma}\label{boldRF_plus_cL_strgmon_lemma} Consider that Assumptions~\ref{assum1}-\ref{Lipchitz_boldFassump} hold and let \vspace{-0.15cm} \begin{equation}\label{eqboldRF_plus_cL_strgmon_5} \Psi = \left [ \begin{array}{ccc} \frac{\mu}{N} && - \frac{\theta + \theta_0}{2\sqrt{N}} \\ - \frac{\theta + \theta_0}{2\sqrt{N}} && c \, s_2(L) - \theta \end{array} \right ] \end{equation} Then, for any $c > c_{\min}$, where $c_{\min} \, s_2(L) = \frac{(\theta+\theta_0)^2}{4\mu} +\theta$, $\Psi \succ 0$ and, for any $ \mathbf{x}$ and any $ \mathbf{x'} \in \mathbf{E}_x$, \vspace{-0.2cm} \begin{eqnarray}\label{eqboldRF_plus_cL_strgmon} &&\hspace{-1.5cm}(\!\mathbf{x}\!-\! \mathbf{x'})^T \! \big (\mathcal{R}^T(\mathbf{F}(\mathbf{x})\!-\!\mathbf{F}(\mathbf{x'}))\!+\!c \mathbf{L}_x(\mathbf{x} \!-\! \mathbf{x'}) \big )\!\geq \!\bar{\mu} \|\mathbf{x}\!-\!\mathbf{x'}\|^2, \end{eqnarray} where $\bar{\mu}\!:=\!s_{\min}(\Psi)>0$ and $\mathbf{E}_x\!=\!Null(\mathbf{L}_x)$ is the $n$- dimensional consensus subspace. \end{lemma}}\vspace{-0.3cm}\hfill$\Box$ \begin{remark}\label{rem_theta_quadratic} Lemma \ref{boldRF_plus_cL_strgmon_lemma} is instrumental to show global convergence of Algorithm \ref{dal_1} under Assumption \ref{Lipchitz_boldFassump}. In Section \ref{sec:numerical} we consider a quadratic game example and check analytically Assumption \ref{Lipchitz_boldFassump}. \end{remark}} {Property \eqref{eqboldRF_plus_cL_strgmon} in Lemma \ref{boldRF_plus_cL_strgmon_lemma} means that, for a sufficiently large $c\!>\!0$, $ \mathcal{R}^T\mathbf{F}\!+ c\mathbf{L}_x$ is $\bar{\mu}$-strongly monotone in a \textit{restricted} set of directions (since $\mathbf{x'} \in\mathbf{E}_x $), which we call $\bar{\mu}$-\textit{restricted} strongly monotone. This is a weaker monotonicity property, similar to the notion of \textit{restricted} convexity used in DOP, \cite{Zhang2017}, and high-dimensional statistical estimation, \cite{NegahbanNIPS2009}. To show this key property, an instrumental step is the decomposition of the augmented space $\mathbf{R}^{Nn}\! =\!\mathbf{E}_x \!\oplus \!\mathbf{E}_x^\perp$ into the consensus subspace $\mathbf{E}_x\!=\!Null(\mathbf{L}_x)$ (where $F$ is strongly monotone), and its orthogonal complement $\mathbf{E}^\perp\!=\!Null(\mathbf{L}_x)^\perp$ (where $ \mathbf{L}_x$ is strongly monotone), (see proof in Appendix). Based on this property, we show in Lemma \ref{lem_monotone} that the operator $\bm{\mathfrak{B}}$ is \textit{restricted} cocoercive, which is sufficient to prove global convergence of Algorithm~\ref{dal_1}.} \begin{lemma}\label{lem_monotone} Suppose Assumptions \ref{assum1}-{\ref{Lipchitz_boldFassump}} hold and {$c$ is selected such that $ c > c_{\min}$, with $c_{\min}$ as in Lemma \ref{boldRF_plus_cL_strgmon_lemma}. } Then the following hold for operators ${\bm{\mathfrak{A}}}$ and ${\bm{\mathfrak{B}}}$, \eqref{op_hat_A}. \\(i): ${\bm{\mathfrak{A}}}$ is maximally monotone. \\ (ii): ${\bm{\mathfrak{B}}}$ is $\beta$-\textit{restricted} cocoercive: for any $\varpi $ and any {$\varpi' \!\in \bm{\Omega}_E$, where ${\bm{\Omega}}_E\!=\! \mathbf{E}_x \!\times \!\! \bm{R}^{Nm}\! \! \times \!\bm{R}_{+}^{Nm} $,} the following holds, \vspace{-0.2cm}\begin{equation}\label{eq:B_cocercive_restricted} \!\langle \varpi -\varpi',\bm{\mathfrak{B}} \varpi - \bm{\mathfrak{B}} \varpi' \rangle \geq \beta \| \bm{\mathfrak{B}}\varpi- \bm{\mathfrak{B}}\varpi' \|^2 \end{equation} {where $\beta \in (0, \min \{ \frac{\bar{\mu}}{\bar{\theta}^2}, \frac{1}{2d^*} \}]$, $\bar{\theta} = \theta + 2 c d^*$, $\bar{\mu}=s_{\min}(\Psi)$, $\Psi$ as in \eqref{eqboldRF_plus_cL_strgmon_5} and $d^*$ is the maximal weighted degree of $\mathcal{G}_c$.} \end{lemma}\hfill $\Box$ The next result follows from Lemma 3 in \cite{ YiPavelCDC1_2017}) and Gershgorin's theorem. \begin{lemma}\label{lem_monotone_metric} Consider ${\Phi}$, \eqref{metric_matrixBis}. Given any $\delta >0$, if each player choose step-sizes $\tau_i, \nu_i, \sigma_i$ in Algorithm \ref{dal_1} such that \vspace{-0.15cm} \begin{equation} \begin{array}{lll}\label{step_size_choice} 0<&\tau_i & \leq ({\max_{j=1,...n_i} \{\sum^m_{k=1} | [A_i^T]_{jk} |\}+\delta})^{-1},\\ 0<&\sigma_i & \leq ({\max_{j=1,...m} \{ \sum^{n_i}_{k=1} | [A_i]_{jk} | \}+2d_i+ \delta})^{-1}\\ 0<&\nu_i & \leq ({2d_i+\delta})^{-1} \end{array} \end{equation} then ${\Phi} \succ 0$ and $ {\Phi} - \delta I_{n+2Nm} \succeq 0$. \end{lemma}\vspace{-0.1cm}\hfill $\Box$ The next result gives properties of ${\Phi}^{-1}{\bm{\mathfrak{A}}}$ and $ {\Phi}^{-1}{\bm{\mathfrak{B}}}$ under the ${\Phi}-$induced norm $ \| \!\!\cdot \!\!\|_{{\Phi}}$. \begin{lemma}\label{lem_PhiA_B_prop}Suppose Assumptions \ref{assum1}-\ref{Lipchitz_boldFassump} hold. Take any {$c$ such that $ c > c_{\min}$, with $c_{\min}$ as in Lemma \ref{boldRF_plus_cL_strgmon_lemma}, } and any $ \delta > \frac{1}{2\beta}$, where $\beta \in (0, \min \{ \frac{\bar{\mu}}{\bar{\theta}^2}, \frac{1}{2d^*} \}]$, $\bar{\theta} = \theta +2 c d^*$, $\bar{\mu}=s_{\min}(\Psi)$, $\Psi$ as in \eqref{eqboldRF_plus_cL_strgmon_5} and $d^*$ is the maximal weighted degree of $\mathcal{G}_c$. Suppose that the step-sizes $\tau_i, \nu_i, \sigma_i$ in Algorithm \ref{dal_1} are chosen to satisfy \eqref{step_size_choice}. Then, the following hold for the operators ${\Phi}^{-1}{\bm{\mathfrak{A}}}$, ${\Phi}^{-1}{\bm{\mathfrak{B}}}$ and $T_1={\rm Id}-{\Phi}^{-1}{\bm{\mathfrak{B}}}, T_2=({\rm Id}+{\Phi}^{-1}{\bm{\mathfrak{A}}})^{-1} $, under the $\Phi$-induced norm $\| \!\cdot \!\|_\Phi$, with ${\Phi}$ as in \!\eqref{metric_matrixBis}. \\ (i) ${\Phi}^{-1}{\bm{\mathfrak{A}}}$ is maximally monotone and $T_2 \in \mathcal{A}(\frac{1}{2})$. \\ (ii) ${\Phi}^{-1}{\bm{\mathfrak{B}}}$ is {$\beta\delta$-\textit{restricted} cocoercive and $T_1$ is \textit{restricted} nonexpansive, such that } {for any $\varpi$ and any $\varpi' \in {\bm{\Omega}}_E$, \vspace{-0.15cm} \begin{equation}\label{eq:prop1_T1} \begin{array}{ll} \| T_1 \varpi \!-\! T_1 \varpi' \|^2_{\Phi} \!\!&\leq \! \| \varpi - \varpi' \|^2_{\Phi} \\ & \hspace{-1.3cm} - (2 \beta \delta -1) \| \varpi - \varpi ' - \left (T_1 \varpi - T_1 \varpi'\right) \|^2_{\Phi} \end{array} \end{equation}} \end{lemma}\hfill $\Box$ The next result shows the convergence of Algorithm \ref{dal_1} based on its compact reformulation \eqref{com_fix} and properties of $T_1$, $T_2$. \begin{theorem}\label{thm_convergence} Suppose Assumptions \ref{assum1}-\ref{Lipchitz_boldFassump} hold. Take any {$c$ such that $ c > c_{\min}$, with $c_{\min}$ as in Lemma \ref{boldRF_plus_cL_strgmon_lemma}, } and any $ \delta > \frac{1}{2\beta}$, where $\beta \in (0, \min \{ \frac{\bar{\mu}}{\bar{\theta}^2}, \frac{1}{2d^*} \}]$, $\bar{\theta} = \theta + 2 c d^*$, $\bar{\mu}=s_{\min}(\Psi)$, $\Psi$ as in \eqref{eqboldRF_plus_cL_strgmon_5} and $d^*$ is the maximal weighted degree of $\mathcal{G}_c$. If step-sizes $\tau_i, \nu_i, \sigma_i$ in Algorithm \ref{dal_1} are chosen satisfy \eqref{step_size_choice}, then, for each player $i$ its $\{\mathbf{x}^i_k\}_{k \in \mathbf{N}}$ converges to the same value $x^*$ variational GNE of game \eqref{GM}, and its local decision $x_{i,k} = \mathbf{x}^i_{i,k}$ converges to the corresponding component in $x^*$, while the local multiplier $\lambda_{i,k}$ of all agents converge to the same multiplier corresponding to the KKT condition \eqref{kkt_2_BIG}, i.e., $\lim_{k\rightarrow \infty} x_{i,k}= x_i^*, \quad \lim_{k\rightarrow \infty} \lambda_{i,k} =\lambda^*$, $\forall i \in \mathcal{N}$. \end{theorem} {\bf Proof:} By Lemma \ref{lem_monotone_metric}, $\Phi \succ 0$, and by Lemma \ref{lem_PhiA_B_prop}, ${\Phi}^{-1}{\bm{\mathfrak{A}}}$ is maximally monotone and ${\Phi}^{-1}{\bm{\mathfrak{B}}}$ is \textit{restricted} $\beta\delta-$cocoercive. By Lemma \ref{lem_fix_approximation}(ii), Algorithm \ref{dal_1} can be written in the compact form \eqref{com_fix}, fixed-point iteration $\varpi_{k+1}=T_2 \circ T_1\varpi_{k}$. Consider { any $\varpi^* \in zer({\bm{\mathfrak{A}}}+{\bm{\mathfrak{B}}})$}, or equivalently any fixed point of $T_2 \circ T_1$, i.e., $\varpi^* =T_2 T_1 \varpi^*$. By Lemma \ref{lem_fix_approximation} and \eqref{com_fix} it follows that \vspace{-0.2cm} \begin{equation} \begin{array}{lll}\label{equ_thm_5_2} \|\varpi_{k+1}- \varpi^*\|_{\Phi} \!\!&= \| T_2( T_1 \varpi_{k})- T_2 (T_1 \varpi^*)\|_{\Phi} \\ & \hspace{-1cm} \leq \| T_1 \varpi_{k}- T_1 \varpi^* \| \leq \| \varpi_{k}- \varpi^* \|_{\Phi} \end{array} \end{equation} where the first inequality follows from $T_2$ being nonexpansive (by Lemma \ref{lem_PhiA_B_prop}(i)), and the second one from \eqref{eq:prop1_T1}, Lemma \ref{lem_PhiA_B_prop}(ii), since $\varpi^* \!\in\! \bm{\Omega}_E$ (cf. Theorem \ref{thm_zeroHAT_is_correct}(i)) and $2\beta\delta \! >\!1$ by assumption. Hence the sequence $\{\|\varpi_{k}-\varpi^* \|_{\Phi}\}$ is non-increasing and bounded from below. By the monotonic convergence theorem and since $\Phi \succ 0$, $\{\| \varpi_{k}- \varpi^* \| \}$ is bounded and converges for every $\varpi^* \in zer({\bm{\mathfrak{A}}}+{\bm{\mathfrak{B}}})$.\\ Denote $\xi = \frac{1}{2\delta \beta} \in (0,1)$. Using again \eqref{com_fix}, we can write \vspace{-0.2cm} \begin{equation} \begin{array}{lll}\label{equ_thm_57_1} &&\hspace{-0.8cm}\|\varpi_{k+1}- \varpi^* \|_{\Phi}^2= \| T_2 ( T_1 \varpi_{k})- T_2 (T_1 \varpi^*) \|_{\Phi}^2\\ && \leq \|T_1 \varpi_{k}- T_1 \varpi^*\|_{\Phi}^2 \\ &&\quad - \| ( T_1 \varpi_{k}- T_1 \varpi^*) - (T_2 T_1 \varpi_{k}- T_2 T_1 \varpi^*)\|^2_{\Phi} \\ && \leq \|\varpi_{k}- \varpi^* \|^2_{\Phi} \\ && \quad - \| ( T_1 \varpi_{k}- T_1 \varpi^*) - (T_2 T_1 \varpi_{k}- T_2 T_1 \varpi^*)\|^2_{\Phi} \\ && \quad -\frac{1-\xi}{\xi}\| \varpi_{k}-\varpi^*- (T_1 \varpi_{k}- T_1 \varpi^*) \|^2_{\Phi} \end{array} \end{equation} where the first inequality follows by \cite[Prop. 4.25(i)]{combettes1} for $T_2\in \mathcal{A}(\frac{1}{2})$, and the second one from \eqref{eq:prop1_T1}, Lemma \ref{lem_PhiA_B_prop}(ii), for $T_1$ with $2\delta \beta\! =1/\xi$. Next, we use, (cf. \cite[Cor. 2.14]{combettes1}), \vspace{-0.2cm} \begin{equation}\label{equation_norm} \alpha \|x\|^2 + (1-\alpha)\|y \|^2 = \|\alpha x +(1-\alpha)y \|^2 + \alpha(1-\alpha) \|x-y\|^2. \end{equation} For the second and third terms on the right hand side of \eqref{equ_thm_57_1}, \vspace{-0.2cm} \begin{equation} \begin{array}{ll}\label{equ_thm_57_2} &\hspace{-0.5cm} \xi \| ( T_1 \varpi_{k}- T_1 \varpi^*) - (T_2 T_1 \varpi_{k}- T_2 T_1 \varpi^*)\|^2_{\Phi} \\ &\qquad+\frac{1-\xi}{\xi}\| \varpi_{k}-\varpi^*- (T_1 \varpi_{k}- T_1 \varpi^*) \|^2_{\Phi} \\ & =\| (T_1 \varpi_{k}- T_1 \varpi^*)-\xi (T_2 T_1 \varpi_{k}- T_2 T_1 \varpi^*) \\ &\qquad\qquad - (1-\xi)(\varpi_{k}-\varpi^*) \|^2_{\Phi}\\ &\qquad+ \xi(1-\xi)\| ( T_1 \varpi_{k}- T_1 \varpi^*) - (T_2 T_1 \varpi_{k}- T_2 T_1 \varpi^*)\\ &\qquad \qquad -(T_1 \varpi_{k}- T_1 \varpi^*)+(\varpi_{k}-\varpi^*) \|_{\Phi}^2\\ &\geq \xi (1-\xi) \| (\varpi_{k}-\varpi^*)-(T_2 T_1 \varpi_{k}- T_2 T_1 \varpi^*)\|^2_{\Phi}\\ &= \xi(1-\xi) \|\varpi_{k}-T_2 T_1 \varpi_{k} \|^2_{\Phi}\\ &= \xi (1-\xi) \| \varpi_{k}-\varpi_{k+1}\|^2_{\Phi} \end{array} \end{equation} where the first equality follows from \eqref{equation_norm} by setting $\alpha=\xi$, $x= ( T_1 \varpi_{k}- T_1 \varpi^*) - (T_2 T_1 \varpi_{k}- T_2 T_1 \varpi^*)$ and $y=(T_1 \varpi_{k}- T_1 \varpi^*)-(\varpi_{k}-\varpi^*)$. Combining \eqref{equ_thm_57_1} and \eqref{equ_thm_57_2} yields $\forall k\geq 0$, \vspace{-0.2cm} \begin{equation}\label{equ_thm_5} \|\varpi_{k+1}- \varpi^* \|_{\Phi}^2 \leq \|\varpi_{k}- \varpi^* \|^2_{\Phi} - (1-\xi) \| \varpi_{k}-\varpi_{k+1}\|^2_{\Phi}. \end{equation} Using \eqref{equ_thm_5} from $0$ to $k$ and adding all $k+1$ inequalities yields \vspace{-0.25cm} \begin{equation} \|\varpi_{k+1}- \varpi^* \|_{\Phi}^2 \leq \|\varpi_{0}- \varpi^* \|^2_{\Phi} - (1-\xi) \sum_{l=0}^{k}\| \varpi_{l}-\varpi_{l+1}\|^2_{\Phi}. \end{equation} Taking limit as $k\rightarrow \infty$ we have, \vspace{-0.25cm} $$(1-\xi) \sum_{k=1}^{\infty} \| \varpi_{k}-\varpi_{k+1}\|^2_{\Phi} \leq \|\varpi_{0}- \varpi^* \|^2_{\Phi} $$ Since $1-\xi>0$, it follows that $\sum_{k=1}^{\infty} \| \varpi_{k}-\varpi_{k+1}\|^2_{\Phi}$ converges and $\lim_{k\rightarrow \infty} \varpi_{k}-\varpi_{k+1}=0$ (since $\Phi \succ0$).\\ Since $\{\| \varpi_{k}- \varpi^* \| \}$ is bounded and converges, $\{\varpi_k\}$ is a bounded sequence. Thus, there exists a subsequence$\{\varpi_{n_k}\}$ that converges to some $\overline{\varpi}^*$. Note that $T_2\circ T_1$ is continuous and single-valued, because \eqref{com_fix} is just an equivalent form of Algorithm \ref{dal_1}, and the right hand side of Algorithm \ref{dal_1} is continuous. Since ${\varpi}_{n_{k}+1}=T_2T_1 \varpi_{n_k}$ and $T_2T_1$ is continuous, and since $\lim_{n_{k}\rightarrow \infty}\varpi_{n_k}-{\varpi}_{n_{k}+1}=0$, passing to limit point, we have $\overline{\varpi}^* =T_2T_1\overline{\varpi}^* $. Therefore, the limit point $\overline{\varpi}^*$ is a fixed point of $T_2 T_1$, or equivalently, $\overline{\varpi}^* \in zer({\bm{\mathfrak{A}}}+{\bm{\mathfrak{B}}})$. Setting $\varpi^*=\overline{\varpi}^*$ in \eqref{equ_thm_5_2}, it follows that $\{\| \varpi_{k}- \overline{\varpi}^* \| \}$ is bounded and converges. Since there exists a subsequence $\{\varpi_{n_k}\}$ that converges to $\overline{\varpi}^*$, it follows that $\{\| \varpi_{k}- \overline{\varpi}^* \| \}$ converges to zero. Therefore, $\lim_{k\rightarrow \infty} \varpi_k \rightarrow \overline{\varpi}^*$ as $k \rightarrow \infty$. Furthermore, by Lemma \ref{lem_fix_approximation}(ii), this $\overline{\varpi}^* :=col(\mathbf{x}^*,\bm{z}^*,\bm{\lambda}^*) $ satisfies $col(\mathbf{x}^*,\bm{z}^*,\bm{\lambda}^*) \in zer( {\bm{\mathfrak{A}}} + {\bm{\mathfrak{B}}})$. Invoking Theorem \ref{thm_zeroHAT_is_correct}(i) concludes the proof. \hfill $\Box$ \begin{remark} Note that, since ${\Phi}^{-1}{\bm{\mathfrak{A}}}$ is maximally monotone, convergence of Algorithm \ref{dal_1} could be proved using a simpler argument, based on \cite[Thm. 25.8]{combettes1}, once ${\Phi}^{-1}{\bm{\mathfrak{B}}}$ is shown to be cocoercive (fully, not only \textit{restricted}). Such an argument is used in \cite{PavelCDC2018} (for $c\!=\!1$), under a cocoercivity assumption for $\mathcal{R}^T\mathbf{F}$. Here we do not use any monotonicity assumption on $\mathcal{R}^T\mathbf{F}$, but rather only Lipschitz continuity of $\mathbf{F}$. under which only \textit{restricted} cocercivity of ${\Phi}^{-1}{\bm{\mathfrak{B}}}$ is guaranteed. Thus, we cannot directly apply \cite[Thm. 25.8]{combettes1}. Instead, our elementary proof exploits \textit{restricted} nonexpansiveness properties of $T_1$. {We note that the assumptions on $F$ and $\mathbf{F}$ could be relaxed to hold only locally around $x^*$ and $\mathbf{x}^*$, in which case all results become local. We also note that the class of quadratic games satisfies all assumptions globally.} Given a globally known parameter $\delta$, each agent can {\it independently} choose its local step sizes $\tau_i$, $\nu_i$, and $\sigma_i$ with the rule in \eqref{step_size_choice}, such that ${\Phi}$ in \eqref{metric_matrixBis} is positive definite. In the case of uniform player step-sizes the step-size bound in \eqref{step_size_choice} simplifies to $\tau \leq (\|\bm{A} \quad \bm{L}_\lambda \| + \delta)^{-1}$. The bounds in \eqref{step_size_choice} and Theorem \ref{thm_convergence} recover those in \cite{YiPavelCDC1_2017} (set $c\!=\!0$) and those in \cite{PavelCDC2018} (set $c=1$). \end{remark} \section{Nash-Cournot game over a network}\label{sec:numerical} In this section we consider a Nash-Cournot game over a network, as in \cite{shanbhag1}, \cite{cournotgame}, generalized by introducing additional market capacities constraints or equivalently globally shared coupling affine constraints. This type of network Cournot game appeared also in the numerical studies of \cite{vanderSchaar} (penalty-based algorithm, reaching a region near the pure penalized NE), and \cite{YiPavelCDC1_2017} (dual-distributed algorithm), both assuming perfect opponents' decision information. Other practical decision problems in engineering networks can be described by a Nash-Cournot game over a network, e.g. rate control games in communication networks \cite{shanbhag4}, demand-response games in smart-grid networks \cite{YeHu_TAC_2017}. Consider a set of $N$ firms (players/agents) involved in the production of a homogeneous commodity that compete over $m$ markets, $M_1,\cdots,M_m$ (Figure \ref{fig_network_cournot_game}). Firm $i$, $i \in \mathcal{N}$ participates in the competition in $n_i$ markets by deciding to produce and deliver $ x_i \in \mathbf{R}^{n_i}$ amount of products to the markets it connects with. Its production is limited as $x_i \in \Omega_i \subset \mathbf{R}^{n_i}$. Firm $i$ has a local matrix $A_i\in \mathbb{R}^{m \times n_i}$ (with elements $1$ or $0$) that specifies which markets it participates in. The $j$-th column of $A_i$, $[A_i]_{:j}$ has its $k$-th element as $1$ if and only if player $i$ delivers $[x_i]_j$ amount of production to market $M_k$; all other elements are $0$. Therefore, $A_1,\cdots,A_N$ can be used to specify a bipartite graph that represents the connections between firms and markets (see Figure \ref{fig_network_cournot_game}). Denote $n=\sum_{i=1}^N n_i$, $ x=[x_i]_{i \in \mathcal{N}}\in \mathbb{R}^{n}$, and $A=[A_1,\cdots,A_N] \in \mathbb{R}^{m\times n}$. Then $A \, x\in \mathbb{R}^{m}= \sum_{i=1}^N A_i x_i$ is the total product supply to all markets, given the action profile $x$ of all firms. Each market $M_k$ has a maximal capacity $r_k >0$, so that $Ax \leq r$, where $r=[r_k]_{k=1,\dots,m} \in \mathbf{R}^m$, should be satisfied; we consider $b_i = \frac{1}{N} r$. Suppose that $P: \mathbf{R}^m \rightarrow \mathbf{R}^m$ is a price vector function that maps the total supply of each market to the corresponding market's price. Each firm has a local production cost $c_i(x_i): \Omega_i \rightarrow \mathbf{R}$. Then the local objective function of company (player) $i$ is $J_i(x_i,x_{-i})= c_i(x_i)-P^T(Ax)A_ix_i$, dependent on the other firms' production profile $x_{-i}$. \begin{figure} \begin{center} \begin{tikzpicture}[->,>=stealth',shorten >=0.3pt,auto,node distance=2.1cm,thick, rect node/.style={rectangle, ball color={rgb:red,0;green,20;yellow,0},font=\sffamily,inner sep=1pt,outer sep=0pt,minimum size=12pt}, wave/.style={decorate,decoration={snake,post length=0.1mm,amplitude=0.5mm,segment length=3mm},thick}, main node/.style={shape=circle, ball color=green!1,text=black,inner sep=1pt,outer sep=0pt,minimum size=12pt},scale=0.85] \foreach \place/\i in {{(-3.1,3.1)/1},{(-3.2,2.2)/2}, {(-3.3,-0.3)/3}, {(-3.4,-1.4)/4}, {(-2.5,3.5)/5}, {(-2.1,0.5)/6}, {(-0.6,1.2)/7}, {(-1.3,-0.6)/8}, {(-1.4,-1.4)/9}, {(0.1,3.5)/10}, {(0.6,2.1)/11}, {(1.8,0.2)/12}, {(1.3,-1.3)/13}, {(2.4,3.4)/14}, {(1.5,1.5)/15}, {(2.1,-1.1)/16}, {(3.2,3.2)/17}, {(3.3,2.3)/18}, {(3.4,1.4)/19}, {(3.5,0.5)/20}} \node[main node] (a\i) at \place {}; \node at (-3.1,3.1){\rm \color{black}{$1$}}; \node at (-3.2,2.2){\rm \color{black}{$2$}}; \node at (-3.3,-0.3){\rm \color{black}{$3$}}; \node at (-3.4,-1.4){\rm \color{black}{$4$}}; \node at (-2.5,3.5){\rm \color{black}{$5$}}; \node at (-2.1,0.5){\rm \color{black}{$6$}}; \node at (-0.6,1.2){\rm \color{black}{$7$}}; \node at (-1.3,-0.6){\rm \color{black}{$8$}}; \node at (-1.4,-1.4){\rm \color{black}{$9$}}; \node at (0.1,3.5){\rm \color{black}{${10}$}}; \node at (0.6,2.1){\rm \color{black}{${11}$}}; \node at (1.8,0.2){\rm \color{black}{${12}$}}; \node at (1.3,-1.3){\rm \color{black}{${13}$}}; \node at(2.4,3.4) {\rm \color{black}{${14}$}}; \node at (1.5,1.5){\rm \color{black}{${15}$}}; \node at (2.1,-1.1){\rm \color{black}{${16}$}}; \node at (3.2,3.2){\rm \color{black}{${17}$}}; \node at (3.3,2.3){\rm \color{black}{${18}$}}; \node at(3.4,1.4) {\rm \color{black}{${19}$}}; \node at (3.5,0.5){\rm \color{black}{${20}$}}; \foreach \place/\x in {{(-1.2,2.8)/1},{(-3,1)/2},{(-2.2,-1)/3}, {(0,0)/4}, {(1,0)/5}, {(2,2)/6}, {(2.5,1)/7}} \node[rect node] (b\x) at \place {}; \node at (-1.2,2.8){\rm \color{red}{$M_1$}}; \node at (-3,1){\rm \color{red}{$M_2$}}; \node at (-2.2,-1){\rm \color{red}{$M_3$}}; \node at (0,0){\rm \color{red}{$M_4$}}; \node at (1,0){\rm \color{red}{$M_5$}}; \node at (2,2){\rm \color{red}{$M_6$}}; \node at (2.5,1){\rm \color{red}{$M_7$}}; \path[->,blue,thick] (a1) edge (b1); \path[->,blue,thick] (a2) edge (b1); \path[->,blue,thick] (a2) edge (b2); \path[->,blue,thick] (a3) edge (b2); \path[->,blue,thick] (a4) edge (b3); \path[->,blue,thick] (a5) edge (b1); \path[->,blue,thick] (a6) edge (b1); \path[->,blue,thick] (a6) edge (b2); \path[->,blue,thick] (a6) edge (b3); \path[->,blue,thick] (a6) edge (b4); \path[->,blue,thick] (a7) edge (b4); \path[->,blue,thick] (a8) edge (b3); \path[->,blue,thick] (a8) edge (b4); \path[->,blue,thick] (a9) edge (b3); \path[->,blue,thick] (a10) edge (b1); \path[->,blue,thick] (a10) edge (b4); \path[->,blue,thick] (a10) edge (b6); \path[->,blue,thick] (a11) edge (b4); \path[->,blue,thick] (a11) edge (b5); \path[->,blue,thick] (a12) edge (b5); \path[->,blue,thick] (a13) edge (b5); \path[->,blue,thick] (a14) edge (b6); \path[->,blue,thick] (a15) edge (b5); \path[->,blue,thick] (a15) edge (b6); \path[->,blue,thick] (a15) edge (b7); \path[->,blue,thick] (a16) edge (b5); \path[->,blue,thick] (a16) edge (b7); \path[->,blue,thick] (a15) edge (b7); \path[->,blue,thick] (a17) edge (b6); \path[->,blue,thick] (a17) edge (b7); \path[->,blue,thick] (a18) edge (b7); \path[->,blue,thick] (a19) edge (b7); \path[->,blue,thick] (a20) edge (b7); \end{tikzpicture} \end{center} \caption{Network Nash-Cournot game: An edge from $i$ to $M_k$ on this graph implies that agent/firm $i$ participates in Market $M_k$.}\label{fig_network_cournot_game} \end{figure} \begin{figure} \begin{center} \begin{tikzpicture}[->,>=stealth',shorten >=0.3pt,auto,node distance=2.1cm,thick, rect node/.style={rectangle,ball color=blue!10,font=\sffamily,inner sep=1pt,outer sep=0pt,minimum size=12pt}, wave/.style={decorate,decoration={snake,post length=0.1mm,amplitude=0.5mm,segment length=3mm},thick}, main node/.style={shape=circle,ball color=green!1,text=black,inner sep=1pt,outer sep=0pt,minimum size=12pt},scale=0.85] \foreach \place/\i in {{(-3,2)/1},{(-2,2)/2}, {(-1,2)/3}, {(0,2)/4}, {(1,2)/5}, {(2,2)/6}, {(3,2)/7}, {(3,1)/8}, {(3,0)/9}, {(3,-1)/10}, {(3,-2)/11}, {(2,-2)/12}, {(1,-2)/13}, {(0,-2)/14}, {(-1,-2)/15}, {(-2,-2)/16}, {(-3,-2)/17}, {(-3,-1)/18}, {(-3,-0)/19}, {(-3,1)/20}} \node[main node] (a\i) at \place {}; \node at (-3,2){\rm \color{black}{$1$}}; \node at (-2,2){\rm \color{black}{$2$}}; \node at (-1,2){\rm \color{black}{$3$}}; \node at (0,2){\rm \color{black}{$4$}}; \node at (1,2){\rm \color{black}{$5$}}; \node at (2,2){\rm \color{black}{$6$}}; \node at (3,2){\rm \color{black}{$7$}}; \node at (3,1){\rm \color{black}{$8$}}; \node at (3,0){\rm \color{black}{$9$}}; \node at (3,-1){\rm \color{black}{${10}$}}; \node at (3,-2){\rm \color{black}{${11}$}}; \node at (2,-2){\rm \color{black}{${12}$}}; \node at (1,-2){\rm \color{black}{${13}$}}; \node at (0,-2) {\rm \color{black}{${14}$}}; \node at (-1,-2){\rm \color{black}{${15}$}}; \node at (-2,-2){\rm \color{black}{${16}$}}; \node at (-3,-2){\rm \color{black}{${17}$}}; \node at (-3,-1){\rm \color{black}{${18}$}}; \node at(-3,0) {\rm \color{black}{${19}$}}; \node at (-3,1){\rm \color{black}{${20}$}}; \path[-,blue,thick] (a1) edge (a2); \path[-,blue,thick] (a2) edge (a3); \path[-,blue,thick] (a3) edge (a4); \path[-,blue,thick] (a4) edge (a5); \path[-,blue,thick] (a5) edge (a6); \path[-,blue,thick] (a6) edge (a7); \path[-,blue,thick] (a7) edge (a8); \path[-,blue,thick] (a8) edge (a9); \path[-,blue,thick] (a9) edge (a10); \path[-,blue,thick] (a10) edge (a11); \path[-,blue,thick] (a11) edge (a12); \path[-,blue,thick] (a12) edge (a13); \path[-,blue,thick] (a13) edge (a14); \path[-,blue,thick] (a14) edge (a15); \path[-,blue,thick] (a15) edge (a16); \path[-,blue,thick] (a16) edge (a17); \path[-,blue,thick] (a17) edge (a18); \path[-,blue,thick] (a18) edge (a19); \path[-,blue,thick] (a19) edge (a20); \path[-,blue,thick] (a1) edge (a20); \path[-,blue,thick] (a2) edge (a15); \path[-,blue,thick] (a6) edge (a13); \end{tikzpicture} \end{center} \caption{Communication graph $\mathcal{G}_c$: Firms $i$ and $j$ are able to exchange their local $\mathbf{x}^i$ and $\mathbf{x}^j$ if there exists an edge between them on this graph. }\label{fig_G_c_graph} \end{figure} In the classical, centralized-information setting each firm is assumed to have instantaneous access to the others' actions $x_{-i}$. This may be impractical in a large network of geographically distributed firms, \cite{cournotgame}. For example, consider that Figure \ref{fig_network_cournot_game} depicts a group of $N=20$ firms located in different continents that participate in $m=7$ markets, with no centralized communication system between them. Since players are unable to directly observe the actions of all others, they engage in local, non-strategic information exchange, to mitigate their lack of global, centralized information. Firms/players may communicate with a local subset of neighbouring firms in a peer-to-peer manner, via some underlying \textit{communication infrastructure}, hence a distributed partial-information setting. A communication network formed $\mathcal{G}_c$ between the firms prescribes how they communicate locally their production decision, \cite{shanbhag1}. In this situation, the communication network is formed by the players who are viewed as the nodes in the network. In this example, we consider that most of the communication is between firms on the same continent, with one or at most two firms in each continent having a direct connection to another firm on another continent. One such instance of the communication network $\mathcal{G}_c$ is shown in Figure \ref{fig_G_c_graph}. Firms $i$ and $j$ are able to exchange their local variables if there exists an edge between them on this graph. Various other topologies can be considered, with different connectivity. \vspace{-0.2cm} \subsection{Assumptions} Consider that firm $i$'s production cost is a strongly convex, quadratic function $c_i(x_i)=x_i^T Q_i x_i+q_i^T x_i$ with $Q_i\in \mathbf{R}^{n_i \times n_i}$ symmetric and $Q_i \succ 0$ and $q_i\in \mathbf{R}^{n_i}$. Consider that market $M_k$'s price is a linear function of the total commodity amount supplied to it, $p_k(x)= \bar{P}_k - \chi_k [Ax]_{k}$ (known as a linear inverse demand function) with $\bar{P}_k, \chi_k \!>\!0$. We show that all assumptions required for Algorithm \ref{dal_1} are satisfied. Denote $P=[p_k]_{k=1,m}: \mathbf{R}^n \rightarrow \mathbf{R}^m$, $\bar{P}=[\bar{P}_k]_{k=1,m} \in \mathbf{R}^m$, $\Xi=diag ([\chi_k]_{k=1,m}) \in \mathbf{R}^{m\times m}$, so that $P=\bar{P}-\Xi Ax$ is the vector price function, and $P^TA_ix_i$ is the payoff of firm $i$ obtained by selling $x_i$ amount to the markets that it connects with. Thus, the objective function of player $i$ is, \vspace{-0.15cm} \begin{eqnarray} &J_i(x_i,x_{-i}) =c_i(x_i)- (\bar{P}-\Xi A x)^T A_ix_i, \, \text{ and } \label{network_cournot_game_function} \\ &\hspace{-0.5cm} \nabla_i J_i(x)= \nabla c_i(x_i) \!+\! A_i^T \Xi A_i x_i \!-\! A_i^T (\bar{P}\!-\!\Xi A x), \label{Fi_ex1_0} \end{eqnarray} where $ \nabla c_i(x_i) = 2 Q_i x_i + q_i$. Then, with $x=[x_i]_{i \in \mathcal{N}}$, $A=[A_1, \cdots A_N]$, $\nabla c(x) = 2 diag ([Q_i]_{i \in \mathcal{N}}) \, x + [q_i]_{i \in \mathcal{N}}$, we can write $F(x) = [\nabla_iJ_i(x)]_{i\in \mathcal{N}}$ compactly as compactly as, \vspace{-0.15cm} \begin{equation}\label{F_ex1} F(x)= Q \, x + h, \quad \text{ where } \, Q := \Sigma + A^T \Xi A, \end{equation} $\Sigma := diag \big ([2 Q_i \!+\!A_i^T \Xi A_i]_{i \in \mathcal{N}} \big)$ and $h := [q_i]_{i \in \mathcal{N}} \!-\! A^T\bar{P}$. Since $Q_i\succ 0$ and $\Xi \succ 0$ (by $\chi_k >0$), it follows that $\Sigma \succ 0$ and $ A^T \Xi A \succeq 0$, hence $Q \succ 0$. Thus, $F(x)$ is strongly monotone ($\mu = s_{min} (Q) >0$), and Lipschitz continuous with $\theta_0 = \|Q\|$ where $\|Q\| = \sigma_{\max} (Q)$, and Assumptions ~\ref{assum1}, \ref{strgmon_Fassump} are satisfied. {We show next that Assumption~\ref{Lipchitz_boldFassump} is satisfied and $\theta=\theta_0$. \\ Using \ \eqref{Fi_ex1_0} with $x$ replaced by $\mathbf{x}^i = (x_i,\mathbf{x}^i_{-i})$, yields \vspace{-0.15cm} $$ \nabla_i J_i(\mathbf{x}^i) = \nabla c_i(x_i) + A_i^T \Xi A_i x_i- A_i^T \, (\bar{P}-\Xi A \mathbf{x}^i). $$ Thus, $\mathbf{F}(\mathbf{x}):=[\nabla_iJ_i(\mathbf{x}^i)]_{i\in \mathcal{N}}$, \eqref{pseudogradient_EKT}, is given by $\mathbf{F}(\mathbf{x}) \!= \!\nabla c (x) \! + \! diag \big ([A_i^T \Xi A_i]_{i\in \mathcal{N}} \big) x \! - \! A^T\bar{P} \! + \! diag \big( [A_i^T \Xi A]_{i \in \mathcal{N}}\big) \mathbf{x} $ where $\mathbf{x} = [\mathbf{x}^i]_{i\in \mathcal{N}}$. Combining the first three terms (with $\nabla c (x) $, $x=\mathcal{R} \mathbf{x}$, $\Sigma$ and $h$ defined above), and $diag \big ( [\mathcal{R}_i A^T \Xi A]_{i \in \mathcal{N}} \! \big) =\mathcal{R}( I_N \otimes A^T \Xi A)=$ for the last term, we can write $\mathbf{F}(\mathbf{x}) = \Sigma \mathcal{R} \mathbf{x} + h+ \mathcal{R} (I_N \otimes A^T \Xi A) \, \mathbf{x}. $ Since $\Sigma$ is block-diagonal, $\Sigma \mathcal{R}= \mathcal{R} \! (I_N \otimes \Sigma)$, so that $\mathbf{F}(\mathbf{x}) \! = \! \mathcal{R} \big (I_N \otimes (\Sigma \!+ \! A^T \Xi A) \big ) \, \mathbf{x} + h $, which, with $Q$ as in \eqref{F_ex1}, is \vspace{-0.15cm} \begin{equation}\label{boldF_ex1_final} \mathbf{F}(\mathbf{x})= \mathcal{R} (I_N \otimes Q)\,\mathbf{x} + h. \end{equation} Hence, $\|\mathbf{F}(\mathbf{x}) -\mathbf{F}(\mathbf{y}) \| \leq \| \mathcal{R} (I_N \otimes Q)\| \| \mathbf{x} - \mathbf{y} \| \leq \| \mathcal{R}\| \| I_N \otimes Q\| \| \mathbf{x} - \mathbf{y} \| \leq \|Q\| \| \mathbf{x} - \mathbf{y} \| $, since $ \| \mathcal{R}\| =1$ and $\| I_N \otimes Q\| = \| Q \|$. Hence, $\mathbf{F}(\mathbf{x})$ is Lipschitz and Assumption \ref{Lipchitz_boldFassump} holds with $\theta =\theta_0= \|Q\|$. } \vspace{-0.2cm} \subsection{Numerical results} Consider Figure \ref{fig_network_cournot_game} ($N\!=\!20$ and $m\!=\!7$). For the communication graph $\mathcal{G}_c$ in Fig. \ref{fig_G_c_graph}, with weighted adjacency matrix $W=[w_{ij}]$ having all its nonzero elements as $1$, $\lambda_2(L) = 0.102$. We consider $ \bm{0}\leq x_i \leq X_i $ where each component of $X_i$ is randomly drawn from $(5,10)$. Each market $M_k$ has a maximal capacity of $r_k$, where $r_k$ is randomly drawn from $(1,2)$. Player $i$'s objective function is taken as \eqref{network_cournot_game_function}, where in $c_i(x_i)=x_i^T Q_i x_i+q_i^T x_i$, $Q_i$ is diagonal with its entries randomly drawn from $(1,8)$, and each component of $q_i$ is randomly from $(1,2)$. In the price function $ P=\bar{P}-\Xi Ax$, $\bar{P}_k$ and $\chi_k$ are randomly drawn from $(10,20)$ and $(1,3)$, respectively. For $Q$, \eqref{F_ex1}, this yields $s_{\min}(Q) = 1.001=\mu$, $s_{\max}(Q) = 2.09=\theta$, and the lower bound for $c$ in Lemma \ref{boldRF_plus_cL_strgmon_lemma} is $62.5$. We set $c=100$ and $\tau_i=0.003$, $\nu_i=0.02$ and $\sigma_i=0.003$ for all firms, which satisfy \eqref{step_size_choice}. The results for the implementation of Algorithm \ref{dal_1} in the partial-decision setting, where the primal and dual variables are exchanged over the sparsely connected graph $\mathcal{G}_c$ (Fig.~\ref{fig_G_c_graph}), are shown in Fig. \ref{fig_sim_3_100}, \ref{fig_sim_2_100}. \begin{figure} \centering \includegraphics[width=3.5in]{fig_3_c100_f1.pdf}\\ \caption{The trajectories of local decisions $x_{i,k}$ for selected players ($c=100$) }\label{fig_sim_3_100} \end{figure} \begin{figure} \centering \includegraphics[width=3.5in]{fig_2_c100_f1.pdf}\\ \caption{The trajectories of dual variables $\lambda_{i,k}$ for selected players ($c=100$) }\label{fig_sim_2_100} \end{figure} The algorithm converges to the same GNE found by \cite{YiPavelCDC1_2017}, with a comparable rate of convergence. Unlike \cite{YiPavelCDC1_2017}, here the primal variables are not perfectly known, but estimated. In fact, the lower bound for $c$ in Lemma \ref{boldRF_plus_cL_strgmon_lemma} is quite conservative. For comparison, we set $c=10$ and increase the step-sizes ten times (still satisfying \eqref{step_size_choice}). The simulation results for the same initial conditions are shown in Fig. \ref{fig_sim_3_10} and indicate fast convergence. \begin{figure} \centering \includegraphics[width=3.5in]{fig_3_c10_f1.pdf}\\ \caption{The trajectories of local decisions $x_{i,k}$ for selected players ($c=10$) }\label{fig_sim_3_10} \end{figure} \vspace{-0.3cm} \section{Conclusions}\label{sec_concluding} In this paper, we considered a partial-decision information setting and we proposed a fully-distributed, primal-dual algorithm for computation of a variational GNE in noncooperative games with globally-shared affine coupling constraints. The algorithm is motivated by a forward-backward splitting method for finding zeros of a sum of doubly-augmented monotone operators. We proved its convergence with fixed step-sizes over any connected graph, by leveraging monotone operator-splitting techniques. In future work we will consider mechanism designs so that players faithfully report their variables. \vspace{0.2cm} \noindent {\bf Acknowledgements:} The author would like to acknowledge Bolin Gao's help in performing the numerical experiments. \vspace{-0.3cm}
\section{Acknowledgement} We'd like to thank Chanda Phelan and David Jurgens for their valuable feedback. \section{Conclusion} In this work, we study community-on-community conflict. We describe a mechanism for determining the social and anti-social homes for authors based on commenting behavior. From these, we construct `conflict edges' to map the conflicts on Reddit. Using our approach, we allow for a contextual definition of anti-social behavior based on local subreddit behavior. This provides a different perspective than studying global-norm violating behaviors. We find that most conflicts (77.2\%) are reciprocated, but the intensities from both sides do not necessarily match up. Larger subreddits are more likely to be involved in more subreddit conflicts due to their large user-base, but most of these conflicts are minor, and this does not imply large-scale communal misbehavior. On the other hand, we find that high average conflict intensity and a large fraction of subreddit users perceived negatively in other subreddits may have implications for communal misbehavior. Finally, we explore temporal patterns in conflicts and find that subreddits that target multiple others, will shift their main conflict focus over time. We believe this analysis can be applied to other social media sites which display community structure, create early warning systems for norm-violating communities and help encourage discussion about community-wide misbehavior in social media. \section{The Subreddit Conflict Graph} \subsection{Constructing the Conflict Graph} To construct the conflict graph, we apply the following strategy. If $k$ authors have a social-home in subreddit $A$, and an anti-social home in subreddit $B$, we can create a weighted directed \textit{conflict edge} from $A$ to $B$. If we create these edges for all subreddit pairs, we have a graph of antagonistic subreddit relations. Weights for these edges must be normalized as different subreddits have a different number of users. Thus, a raw author count (i.e., common authors with a social home in $A$ and anti-social home in $B$) is misleading. Larger subreddits would dominate in weights as more authors often means more controversial authors. For convenience, we refer to the `source' of the edge as the \textit{instigating} subreddit and the `destination' as the \textit{targeted} subreddit. We normalize the raw controversial author counts by the number of common authors in both subreddits. Furthermore, for each subreddit pair, we require that there are at least five controversial authors between them to ensure that we are not misidentifying a conflict due to very few controversial authors (i.e. if there is $k_1$ authors with social home in subreddit $A$ and anti-social home in subreddit $B$, and $k_2$ authors with social home in subreddit $B$ and anti-social home in subreddit $A$, $k_1+k_2$ must be at least five). We emphasize that the weight, direction, or even existence, of an edge from subreddit $A$ to $B$, is very different from an edge from $B$ to $A$. \subsection{Eliminating Edges Present due to Chance} While defining conflict between a pair of subreddits, we need to make sure that users are not perceived negatively in the attacked subreddit by chance. For two subreddits $A$ and $B$ with $n_{common}$ common users and $n_{actual}$ users perceived positively in subreddit $A$ but negatively in subreddit $B$ (we only consider users who posted more than 10 times in both subreddits), we calculate the number of users who can be perceived negatively in subreddit $B$ by chance. First, we define an empirical multinomial distribution of comment types for subreddit $B$, i.e., we calculate the probabilities of a random comment in subreddit $B$ being positive (upvoted), negative (downvoted) or neutral. To create this multinomial distribution, we only use comments from users who posted more than ten times in subreddit $B$ as these are the users we consider when declaring controversial authors. For a common user $i$, if $i$ posted $n_i$ times in subreddit $B$, we sample $n_i$ comments from the probability distribution and calculate if he/she is perceived negatively in the sample. We sample all common users and count the total number of users perceived negatively in subreddit $B$. We repeat this experiment 30 times to create a sampling distribution of the expected number of negatively perceived users and calculate the $z$-score of $n_{actual}$ using this sampling distribution. We only retain conflicts from $A$ to $B$, where this $z$-score is greater than 3, i.e., the number of users perceived negatively in the attacked subreddit is significantly higher than the number expected from random chance. The final set of subreddits (nodes) and associated edges are the \textit{conflict graph}. \subsection{Conflict Graph Properties} The final subreddit conflict graph for 2016 consists of 746 nodes and 11,768 edges. This is a small fraction of active subreddits in 2016 (around 76,000) which is, in part, due to the low amount of `multi-community posting' on Reddit~\cite{Hamilton2017} (i.e., very few authors regularly post to more than one `home' community). As we require multi-community posts to create an edge, the result is that many subreddits are `free floating' and are removed from consideration. Of the 746, nine were banned sometime between the end of 2016 and April of 2018: \sr{PublicHealthWatch} (a subreddit dedicated to documenting the `health hazards' of, among others, LGBTQ groups), \sr{altright}, \sr{Incels} (involuntary celibate), \sr{WhiteRights}, \sr{european}, \sr{uncensorednews}, \sr{europeannationalism}, \sr{DarkNetMarkets} and \sr{SanctionedSuicide}. An additional six became `private' (requiring moderator approval to join and post), which includes a couple of controversial subreddits: \sr{Mr\_Trump} and \sr{ForeverUnwanted}. The conflict graph consists of 5 components, with the giant component containing 734 nodes. The next largest component consists of only 6 nodes representing different sports streaming subreddits (\sr{nflstreams}, \sr{nbastreams}, \sr{soccerstreams} etc.). Through manual coding of subreddits we identify the following high-level categories: political subreddits (e.g. \sr{politics}, \sr{The\_Donald}, \sr{svenskpolitik}) discussion subreddits, video game subreddits (e.g. \sr{Overwatch}, \sr{pokemongo}), sports fan clubs, location-focused subreddits (e.g. \sr{canada}, \sr{Seattle}, \sr{Michigan}, \sr{Atlanta}), subreddits for marginalized groups (e.g. \sr{atheism}, \sr{DebateReligion}, \sr{TrollXChromosomes}, \sr{lgbt}, \sr{BlackPeopleTwitter}), *porn subreddits (these are image sharing subreddits with their name ending with porn, they are not pornographic in nature -- e.g. \sr{MapPorn}, \sr{HistoryPorn}) and NSFW subreddits (e.g. \sr{nsfw}, \sr{NSFW\_GIF}). Because of our use of 2016 data and the associated (and contentious) election, political subreddits are heavily represented in the conflict graph. Figure~\ref{fig:liberal} shows the ego network for the subreddit \sr{Liberal} in the conflict graph. \begin{figure}[h] \centering \includegraphics[scale=1]{figs/liberal-new.pdf} \caption{Ego network for the subreddit \sr{Liberal}. Thicker edges denote higher conflict intensity.} \label{fig:liberal} \end{figure} Edge weights in the conflict graph are often low. On average, only 3.57\% (median is 1.70\%) of authors in the `conflict source' subreddit (i.e., their social home) post to the target subreddit (i.e., their anti-social home). There are, however, edges with extremely high weights. The highest edge weight in our data is 85.71\% from \sr{The\_Donald} to \sr{PanicHistory}. However, in this case, this is due to the disproportionate difference in size of the two (they share only seven common authors). Thus, a high conflict intensity does not necessarily mean that a large fraction of originating subreddit users are antagonistic to the target subreddit. Nonetheless, it does point to the fact that larger subreddits with many controversial authors can overwhelm a smaller subreddit. The high edge-weight here indicates the degree to which this happens. Using the subreddit conflict graph, we can isolate the main source and targets of conflicts and understand where conflicts are one-sided or mutual. \textbf{Are conflicts reciprocal?} We find that if a conflict edge exists between subreddit $A$ and $B$, in 77.2\% cases the inverse edge will \textit{exist}. Calculating the Spearman correlation between conflict intensities of pairs of reciprocated edges, $\rho(5126)=-0.111, p < 0.0001$, we observe a weak (but significant) negative relationship. Figure~\ref{fig:attack} depicts the outgoing conflict (source) intensity versus incoming conflict (the conflict target) intensity. This indicates that a targeted subreddit usually reciprocates, but the intensity is usually not proportional. \begin{figure}[h] \centering \includegraphics[scale=0.55]{figs/attack_scatter.pdf} \caption{Conflict intensity vs intensity of reciprocation in the subreddit conflict graph (log-scale). Un-reciprocated edges appear at the bottom and left edge.} \label{fig:attack} \end{figure} \textbf{Which subreddits are most targeted in 2016?} The indegree of a subreddit roughly indicates the number of other subreddits targeting it. The weighted sum of these edges (weighted indegree) corresponds to the intensity. The top 10 most targeted subreddits by indegree are \sr{politics}, \sr{SubredditDrama}, \sr{AdviceAnimals}, \sr{EnoughTrumpSpam}, \sr{atheism}, \sr{SandersForPresident}, \sr{The\_Donald}, \sr{PoliticalDiscussion}, \sr{technology} and \sr{KotakuInAction} respectively. However, when we order subreddits by \textit{total incoming conflict intensity} (see Table~\ref{table:wt_indeg}) the list is somewhat different. In both lists, we observe that the most targeted subreddits are social and political discussion forums as well as forums that discuss Reddit itself. The heavy presence of political forums can be attributed to the 2016 US presidential election. We try to deduce if, in general, the most targeted subreddits by degree are also the most targeted subreddits by average incoming intensity (total intensity/number of sources) and vice versa. When contrasting indegree to average intensity for subreddits that are targeted by at least one subreddit (we have 673 such subreddits), we find a weak positive correlation with Spearman $\rho(673) = 0.242, p < 0.0001$. A subreddit targeted by many subreddits is not necessarily targeted with high intensity. Conversely, subreddits targeted by only a few others can nonetheless be targeted with high intensity. \begin{table}[htb] \centering \begin{adjustbox}{max width=\columnwidth} \begin{tabular}{|c|c|c|} \hline \textbf{Subreddit} & \textbf{Indegree} & \textbf{Weighted indegree} \\ \hline \sr{SubredditDrama} & 272 & 19.51 \\ \hline \sr{EnoughTrumpSpam} & 217 & 13.25 \\ \hline \sr{BestOfOutrageCulture} & 46 & 10.59 \\ \hline \sr{ShitPoliticsSays} & 48 & 10.29 \\ \hline \sr{Enough\_Sanders\_Spam} & 48 & 9.80 \\ \hline \sr{sweden} & 81 & 9.62 \\ \hline \sr{KotakuInAction} & 168 & 9.19 \\ \hline \sr{ShitAmericansSay} & 94 & 8.83 \\ \hline \sr{PoliticalDiscussion} & 185 & 8.08 \\ \hline \sr{vegan} & 71 & 7.26 \\ \hline \end{tabular} \end{adjustbox} \caption{Top 10 most targeted subreddits by total incoming intensity.}\label{table:wt_indeg} \end{table} \textbf{Which are the most conflict `instigating' subreddits in 2016?} By using the conflict graphs outdegree (weighted or not) we can similarly find the largest conflict sources. The top-10 subreddits ranked by outdegree are \sr{politics}, \sr{AdviceAnimals}, \sr{The\_Donald}, \sr{SandersForPresident}, \sr{WTF}, \sr{technology}, \sr{atheism}, \sr{SubredditDrama}, \sr{EnoughTrumpSpam} and \sr{PoliticalDiscussion}. When ordered by total intensity, the top-10 list changes to include more news, politics, and controversy focused subreddits (Table~\ref{table:wt_outdeg}). This list also includes a now banned subreddit (\sr{uncensorednews}). However, we observe that most of these subreddits have low average conflict intensity (i.e., intensity per edge is low). If we order by average intensity (Table~\ref{table:avg_outdeg}), we find that subreddits targeting very few others (usually 1 or 2 subreddits) show up at top spots. However, we find that the subreddits at the first, third and ninth position of this list (\sr{europeannationalism}, a Nazi subreddit, \sr{PublicHealthWatch}, an anti-LGBT subreddit and \sr{WhiteRights}) are banned by Reddit. A controversial now private subreddit (\sr{ForeverUnwanted}) also appears in this list. This may have implications for identifying problematic subreddits. As before, we can check if the subreddits most often at the source of a conflict (by outdegree) are also the most instigating (by average conflict intensity). Using 719 `source' subreddits in our conflict graph, we find a weak positive correlation between the number of targeted subreddits and the average outgoing conflict intensity (Spearman $\rho(719) = 0.189, p < 0.0001$), which falls in line with our previous discussion. \begin{table}[htb] \centering \begin{adjustbox}{max width=\columnwidth} \begin{tabular}{|c|c|c|} \hline \textbf{Subreddit} & \textbf{Outdegree} & \textbf{Weighted outdegree} \\ \hline \sr{The\_Donald} & 260 & 17.75 \\ \hline \sr{politics} & 542 & 10.15 \\ \hline \sr{conspiracy} & 141 & 7.39 \\ \hline \sr{KotakuInAction} & 152 & 7.35 \\ \hline \sr{uncensorednews} & 113 & 7.14 \\ \hline \sr{AdviceAnimals} & 268 & 6.76 \\ \hline \sr{SandersForPresident} & 211 & 6.62 \\ \hline \sr{CringeAnarchy} & 148 & 6.12 \\ \hline \sr{ImGoingToHellForThis} & 114 & 5.99 \\ \hline \sr{Libertarian} & 92 & 5.86 \\ \hline \end{tabular} \end{adjustbox} \caption{Top 10 subreddits (conflict source) ranked by total conflict intensity.}\label{table:wt_outdeg} \end{table} \begin{table}[htb] \centering \begin{adjustbox}{max width=\columnwidth} \begin{tabular}{|c|c|c|} \hline \textbf{Subreddit} & \textbf{Outdegree} & \textbf{Average outdegree} \\ \hline \sr{europeannationalism} & 1 & 0.75 \\ \hline \sr{OffensiveSpeech} & 1 & 0.62 \\ \hline \sr{PublicHealthWatch} & 1 & 0.62 \\ \hline \sr{askMRP} & 1 & 0.57 \\ \hline \sr{ForeverUnwanted} & 2 & 0.50 \\ \hline \sr{theworldisflat} & 1 & 0.43 \\ \hline \sr{FULLCOMMUNISM} & 2 & 0.42 \\ \hline \sr{marriedredpill} & 1 & 0.38 \\ \hline \sr{WhiteRights} & 2 & 0.34 \\ \hline \sr{SargonofAkkad} & 2 & 0.33 \\ \hline \end{tabular} \end{adjustbox} \caption{Top 10 subreddits (conflict source) ranked by average conflict intensity.}\label{table:avg_outdeg} \end{table} \textbf{Do larger subreddits get involved in more conflicts due to their size?} We find that larger subreddits are more likely to get involved in both incoming and outgoing conflicts. Using number of unique authors who posted more than 10 times in 2016 in the subreddit as a measure of subreddit size, we find moderate positive correlation between both size and number of incoming conflicts (Spearman $\rho(673) = 0.403, p < 0.0001$), and size and outgoing conflicts (Spearman $\rho(719) = 0.457, p < 0.0001$). However, taking conflict intensities into account, we find size and average incoming conflict intensity is moderately negatively correlated (Spearman $\rho(673) = -0.594, p < 0.0001$). Similarly, size and average outgoing conflict intensity is also weakly negatively correlated (Spearman $\rho(719) = -0.222, p < 0.0001$). This tells us that subreddits with larger size are more likely to be involved in conflicts just because there are more authors commenting in them, but average conflict intensity is not indicative of subreddit size. \subsubsection{Node properties} Edge weights alone do not tell us if controversial authors are particularly prevalent in a specific subreddit. Rather, it only indicates the fraction of common users who are sanctioned (norm-violating) in the target subreddits. However, these common users might represent only a small fraction of users of a subreddit. This is especially possible for the larger subreddits. To determine which subreddits are the social home for \textit{many} controversial authors, we use three additional metrics: \textit{con\_author\_percent} is the percentage of controversial authors who make their social home in a subreddit relative to the number of authors who posted in that subreddit (more than 10 times in the year); \textit{avg\_subs\_targeted} and \textit{median\_subs\_targeted} are the average and median of number of subreddits that these controversial authors `target.' These numbers can tell us (a) what fraction of a subreddit are engaged in conflict, and (b) are they engaging in broad (across many subreddits) or focused conflicts. We limit our study to subreddits with at least 20 controversial authors who have a social home on that subreddit (overall, we find 698 subreddits meet this criterion). Removing smaller subreddits minimally affects the top-10 subreddits (see Table~\ref{table:con_percent}) by con\_author\_percent (only \sr{theworldisflat}, with 11 controversial authors, is removed from the list). We refrain from listing one pornographic subreddit in the table at rank 8. \begin{table}[htb] \centering \begin{adjustbox}{max width=\columnwidth} \begin{tabular}{|c|c|c|c|} \hline \textbf{Subreddit} & \textbf{Con\_author\_percent} & \textbf{Average} &\textbf{Median}\\ \hline \sr{PublicHealthWatch} & 35.25 & 2.44 & 2.0\\ \hline \sr{OffensiveSpeech} & 34.78 & 2.86 & 2.0\\ \hline \sr{WhiteRights} & 32.60 & 3.19 & 2.0\\ \hline \sr{ThanksObama} & 32.59 & 2.34 & 1.5\\ \hline \sr{europeannationalism} & 32.43 & 2.77 & 2.0\\ \hline \sr{subredditcancer} & 27.51 & 2.33 & 2.0\\ \hline \sr{subredditoftheday} & 24.90 & 1.94 & 1.0\\ \hline \sr{POLITIC} & 23.94 & 1.91 & 1.0\\ \hline \sr{undelete} & 23.04& 2.13 & 1.0\\ \hline \sr{SRSsucks} & 22.18 & 2.07 & 1.0\\ \hline \end{tabular} \end{adjustbox} \caption{Top 10 subreddits with highest percentage of positively perceived controversial authors (with at least 20). The average and median columns correspond to \textit{avg\_subs\_targeted} and \textit{median\_subs\_targeted} respectively.}\label{table:con_percent} \end{table} Most subreddits in top 10 list are either political forums or somewhat controversial in nature. To lend further credence to this measure, \sr{PublicHealthWatch} (an anti-LGBT subreddit, rank 1), \sr{WhiteRights} (rank 3) and \sr{europeannationalism} (a Nazi subreddit, rank 5) score highly with our metric and were recently banned by Reddit. It is also important to note that most controversial authors have only one anti-social home. Thus in almost all cases, median\_subs\_targeted is 1. The only exceptions are the first six subreddits in the table~\ref{table:con_percent}, \sr{The\_Farage} (median is 2) and \sr{sjwhate} (median is 2). Note that all banned subreddits shown in this table have a median of 2. The median con\_author\_percent for all 698 subreddits is 4.09\%, and the lowest is 0.36\%. It is worth noting that, the three banned subreddits in this list targeted only one or two subreddit each but with very high conflict intensity (e.g., \sr{europeannationalism} attacked \sr{AgainstHateSubreddits} with conflict intensity of 0.75). All three subreddits also show up in the list of most conflict-source subreddits by average conflict intensity. This shows that a subreddit does not have to target multiple other subreddits to be problematic. Compared to the top-10 subreddits by con\_author\_percent, large political subreddits in the most instigating subreddit list (conflict source) had a lower percentage of controversial authors who engage in conflict with other subreddits (e.g., \sr{The\_Donald}(8.09\%), \sr{SandersForPresident}(6.75\%), \sr{politics}(5.71\%)). However, in many cases, these values are higher than the median. \subsubsection{Banned subreddits} Three out of nine banned subreddits in the conflict graph rank within the top 10 when ranked by con\_author\_percent and average conflict intensity. Table~\ref{table:banned_stats} show rank (and value) by con\_author\_percent and average conflict intensity for all nine banned subreddits (lower ranks means higher con\_author\_percent and higher average intensity respectively). We observed that moderately low ranks in both measures for three other banned subreddits. Two controversial moderated subreddits \sr{Mr\_Trump} (rank 37 by con\_author\_percent and rank 20 by average intensity) and \sr{ForeverUnwanted} (rank 74 by con\_author\_percent and rank five by average intensity) also rank low when ranked by both measures. High con\_author\_percent means that a large fraction of the corresponding subreddit is participating in norm-violating behavior and high average intensity means that a large fraction of common authors between the source and target subreddits are norm-violating. Low ranks by both these measures should indicate that the corresponding subreddit is misbehaving as a community. This is supported by the fact that 6 out of 9 banned subreddits and two controversial subreddits (both set to private by moderators of the respective subreddits) display this behavior. We emphasize again that subreddits can be banned due to their content and not due to the conflict they caused. Such subreddits will not rank low in these two measures. \begin{table}[htb] \centering \begin{adjustbox}{max width=\columnwidth} \begin{tabular}{|c|c|c|} \hline \textbf{Subreddit} & \textbf{Con\_author\_percent rank (value)} & \textbf{Average conflict intensity rank (value)}\\ \hline \sr{PublicHealthWatch} & 1 (35.25) & 2 (0.62)\\ \hline \sr{europeannationalism} & 5 (32.43) & 1 (0.75)\\ \hline \sr{WhiteRights} & 3 (32.60) & 9 (0.34)\\ \hline \sr{altright} & 23 (18.18) & 19 (0.24)\\ \hline \sr{european} & 31 (17.41) & 24 (0.20)\\ \hline \sr{Incels} & 183 (7.87) & 57 (0.11)\\ \hline \sr{uncensorednews} & 13 (19.94) & 123 (0.06)\\ \hline \sr{DarkNetMarkets} & 635 (1.59) & 494 (0.02)\\ \hline \sr{SanctionedSuicide} & 475 (2.94) & 199 (0.04)\\ \hline \end{tabular} \end{adjustbox} \caption{Banned subreddits and their ranks and values by average conflict intensity and con\_author\_percent.}\label{table:banned_stats} \end{table} \section{Co-Conflict Communities} \subsection{Creating the Co-conflict Graph} Although most controversial authors have only one anti-social home, there are nonetheless patterns of conflict directed from one subreddit against multiple others. Subreddits targeted by same set of authors gives us further insight about these authors and the subreddits they call home. Using all subreddits from the conflict graph, we can create graphs that map the subreddits that are co-targeted. In the co-conflict graph, nodes are still subreddits. Edges are determined by generating a weighted edge between two subreddits $A$ and $B$ if the Jaccard coefficient between the set controversial authors, who have anti-social homes in $A$ and $B$, is positive. The Jaccard coefficient denotes how many of such authors $A$ and $B$ have in common compared to distinct negatively perceived controversial authors in both subreddits. If $X$ and $Y$ denotes the set of such authors in subreddit $A$ and $B$ respectively, the Jaccard coefficient between $X$ and $Y$ is defined as: \begin{center} $Jaccard(X,Y) = \frac{X \cap Y}{X \cup Y}$ \end{center} We also make sure that there are at least 2 common negatively perceived controversial authors between subreddits $A$ and $B$, so that we do not misidentify an edge due to one single author. \subsection{Co-conflict Graph Properties} As majority of controversial authors misbehave in only one subreddit, the co-conflict graph has many disconnected components. We only focus on the largest connected component (i.e. the giant component) which consists of 237 nodes and 780 edges. Unlike the subreddit conflict graph, the co-conflict graph is undirected. Furthermore, edge semantics are different as edges denotes the similarity between two subreddits. Common network analysis algorithms can be applied to this graph more intuitively. Use of community detection, for example, can help us determine which groups of subreddits (rather than pairs) are `co-targeted.' There are multiple algorithms for community detection in undirected networks~\cite{Fortunato2010survey} (e.g., FastGreedy, InfoMap, Label Propagation, Louvain or Multilevel, Spinglass and Walktrap). The algorithms have different trade-offs~\cite{AldecoaM13,lancichinetti_community_2009,Prat-Perez2014}, though generally both Louvain and Infomap are shown to perform well. Louvain or multilevel algorithm~\cite{blondel08,conf/isda/MeoFFP11} is based on modularity maximization, where modularity is a measure of cohesiveness of a network. An attractive property of Louvain is that it follows a hierarchical approach by first finding small, cohesive communities and then iteratively collapsing them in a hierarchical fashion. This approach on the co-attacked graph produced reasonably sized communities and the results of the community detection algorithm were very stable (i.e. do not change much on different runs). Note that, we use the weighted Louvain algorithm for this purpose. \subsection{Community Detection Results} We evaluate the communities using $\mu$-score and clustering coefficient (CC). $\mu$-score is defined as fraction of edges from within the community to outside the community compared to all edges originating from the community. The clustering coefficient of a node is the fraction of connected neighbor pairs compared to all neighbor pairs. For a community, the CC is the average of clustering coefficients of all nodes in the community. In general, low $\mu$-score and high CC denotes a `good' community. Using the weighted multilevel algorithm on the co-attacked graph we find 15 distinct communities. Table~\ref{table:cotroll_com} shows exemplar subreddits per community, size of the community, $\mu$-score and clustering coefficient for subreddits with at least 10 nodes in them. \begin{table*}[htb] \begin{adjustbox}{max width=\textwidth} \begin{tabular}{|c|p{6.5cm}|c|c|c|p{7cm}|} \hline \textbf{No} & \textbf{Example subreddits} & \textbf{Size} & \textbf{$\mu$-score} & {cc} & description \\ \hline 1 & \sr{politics}, \sr{PoliticalDiscussion}, \sr{hillaryclinton}, \sr{SandersForPresident}, \sr{EnoughTrumpSpam}, \sr{Enough\_Sanders\_Spam}, \sr{AskTrumpSupporters}, \sr{SubredditDrama} & 74 & 0.33 & 0.41 & mostly politics and political discussion subreddits\\ \hline 2 & \sr{KotakuInAction}, \sr{conspiracy}, \sr{undelete}, \sr{MensRights}, , \sr{PublicFreakout}, \sr{WikiLeaks}, \sr{worldpolitics}, \sr{Political\_Revolution}, \sr{europe}, \sr{The\_Donald} & 39 & 0.20 & 0.29 & Political subreddits, controversial subreddits\\ \hline 3 & \sr{nsfw}, \sr{NSFW\_GIF}, \sr{woahdude}, \sr{cringepics}, \sr{trashy}, \sr{WatchItForThePlot} & 34 & 0.23 & 0.38 & mostly NSFW subreddits, subreddits making fun of others\\ \hline 4 & \sr{nba}, \sr{nfl}, \sr{baseball}, \sr{Patriots}, \sr{canada}, \sr{toronto}, \sr{ontario} & 16 & 0.17 & 0.15 & sports subreddits, Canada related subreddits\\ \hline 5 & \sr{TopMindsofReddit}, \sr{AgainstHateSubreddits}, \sr{worstof}, \sr{ShitAmericansSay}, \sr{SRSsucks}, \sr{TrollXChromosomes} & 15 & 0.19 & 0.24 & Subreddits focusing on other subreddits\\ \hline 6 & \sr{Overwatch}, \sr{DotA2}, \sr{GlobalOffensive}, \sr{NoMansSkyTheGame}, \sr{leagueoflegends} & 11 & 0.06 & 0.00 & video game related subreddits\\ \hline 7 & \sr{guns}, \sr{progun}, \sr{Firearms}, \sr{gunpolitics}, \sr{shitguncontrollerssay} & 10 & 0.06 & 0.23 & gun-related subreddits\\ \hline 8 & \sr{relationships}, \sr{OkCupid}, \sr{AskMen}, \sr{AskWomen}, \sr{niceguys}, \sr{instant\_regret}, \sr{sadcringe}, \sr{TheBluePill} & 10 & 0.39 & 0.51 & relationship subreddits, satirical subreddits\\ \hline \end{tabular} \end{adjustbox} \caption{Communities in co-conflict network with at least 10 nodes. For each community, exemplar subreddits, size of the community, $\mu$-score and clustering coefficient(cc) is shown}\label{table:cotroll_com} \end{table*} Figure~\ref{fig:co-attacked} shows the co-conflict graph and its communities. In general, most communities show low $\mu$-score and low clustering coefficient due to presence of star-like structures (i.e. a large number of nodes are connected to one single node). For example, \sr{politics} is connected to 103 other subreddits. Smaller subreddit communities are topically more cohesive compared to larger communities. For example, community 6 (video game subreddits) and 7 (gun-related subreddits) in table~\ref{table:cotroll_com} are both topically very cohesive. \begin{figure}[h] \centering \includegraphics[scale=0.3]{figs/co-attacked_annotated.png} \caption{The Co-conflict Graph. Different communities are shown in different colors. 1 denotes is \sr{politics}, a subreddit demonstrating star pattern. 2 denotes the gun-related subreddit community and 3 denotes community of video game subreddits.} \label{fig:co-attacked} \end{figure} It is worth re-emphasizing that the co-conflict graph does not necessarily mean that a pair of subreddits in the same community are `friendly' and do not have a conflict with each other. For example, \sr{Christianity} and \sr{atheism} belong to same community and there are many authors who have a social home in \sr{Christianity} and anti-social home in \sr{atheism}. Similarly, \sr{SandersForPresident} and \sr{Enough\_Sanders\_Spam} are in the same community and are very much ``at war''. This is mostly due to presence of aforementioned star-like structures. For example, \sr{Republican} and \sr{democrats} both are only connected to \sr{politics} and thus belong in the community containing \sr{politics}. This does not mean that \sr{Republican} and \sr{democrats} have a common group of people perceived negatively. \section{Dataset} In our research, we focus on Reddit (\url{www.reddit.com}) both due to its similarity (in features) to many other discussion boards and its vast scale. Reddit is a social aggregator and discussion forum for millions of individuals who regularly post news, video, images or text and discuss them in different comment threads. Reddit divides itself into focused subreddits which discuss particular topics or perform specific kinds of social aggregation (e.g., image or video sharing). In each subreddit, user-submitted content is referred to as a Reddit \textit{post}, and a post is discussed via different dedicated \textit{comment threads}. Each post and comment can be rewarded or sanctioned by other Reddit users using upvotes and downvotes. Within each subreddit, comments can also be flagged or moderated by subreddit-specific moderators. Individuals who behave inappropriately can also be banned from specific subreddits. For the analysis presented here, we used all publicly available Reddit comments from 2016. This was a subset of the multi-year Reddit data (posts, authors, comments, etc.) compiled by Baumgartner~\cite{pushshift}. We specifically mined commenting behavior (rather than posting) for building conflict graphs. Comments are much more prevalent than posts, and anti-social behavior in Reddit often involves inflammatory comments rather than posts. For each comment, we make use of the following metadata: author of the comment, which subreddit the comment was posted on and how many upvotes and downvotes the comment received. We found that there are 9,752,017 unique authors who commented at least once in Reddit in our sample. Though largely a `human population,' bots can also be programmed to generate comments. Of the 9.7M authors, 1,166,315 were `highly active,' posting more than 100 comments throughout the year. On average, a Reddit user posted in 7.2 subreddits and commented 76.2 times in 2016. As may be expected, most Reddit users are pro-social. In 2016, we find that 79.2\% of authors (across all of Reddit) have at least 90\% of their comments upvoted. \section{Discussion} In this paper, we demonstrate a quantitative method for identifying community-to-community conflicts by aggregating users who behave differently depending on the community they interact with. We define social and anti-social homes of a user based on a local perception of norm-compliance and norm-violation (which we measure by reward and sanction through voting). This method allows us to find conflict in any social network with `noisy' community structure. Though we focus on Reddit in a specific year (2016), we believe the work is more broadly usable both across time and other social media sites. Before discussing in which situations our approach may or may not be usable, we briefly summarize our key findings. We find that community-to-community conflicts are usually reciprocal but mutual conflict intensities usually do not match up. We identify which subreddits generated most conflict and which subreddits were most targeted. By analyzing subreddits banned by Reddit in relation to our measures (e.g., average conflict intensity, a high percentage of positively perceived controversial authors, etc.) we illustrate how our technique may be useful for identifying problematic subreddits. Co-conflict subreddit communities show that subreddit conflicts are not random in nature, as we observe topically similar subreddits usually belong to the same co-conflict community. We perform a preliminary analysis of temporal patterns in subreddit conflicts and find that the conflict focus usually shifts over time. Below we focus on the generalizability and limitations of our findings and approach. Specifically, we discuss the appropriateness and alternatives to using up/down-votes to determine conflicts, contrast of a subreddit conflict with topically opposite subreddits, robustness of the threshold parameters, the potential of communal misbehavior versus behavior of only a few members of a given community and the co-conflict graph. \subsection{Downvotes for determining community conflicts} A downvoted comment in a particular subreddit may be a reaction to a number of factors ranging from innocuous norm-violation, being off-topic, presenting a non-conforming viewpoint, low-effort posts (e.g. memes), reposts, and truly malicious behavior. Furthermore, social news aggregation websites like Reddit generally skew towards positive feedback, and are susceptible to social influence effects~\cite{Muchnik647}. Because any individual comment, or even author, may receive up- or down-votes due to these factors, we rely on aggregate signals in our analysis. Thus, a user having many comments with downvotes (these comments may have more upvotes compared to downvotes) or downvoted comments at all, might point to existence of an anti-social home of the user. However, we opt for a more stringent definition of anti-social home due to two reasons. First, Reddit provides a comment score which is simply the number of upvotes minus the number of downvotes, but does not provide the exact number of up and downvotes as a measure of reducing spam-bot activity ~\footnote{\url{https://www.reddit.com/wiki/faq}}. Thus, we can not use the number of up and downvotes of a comment provided by Reddit as a reliable metric. Furthermore, a user in a subreddit might have downvotes (and a few downvoted comments) due to being new in the subreddit (i.e., not knowing all the rules) or brigading, where users from antagonistic subreddits downvote random or targeted comments as a `downvote brigade'. However, we would like to point out that our definition and threshold parameters of social and anti-social homes are not set in stone and can be easily adapted for similar definitions or threshold parameters, without changing the rest of the algorithmic pipeline to determine the conflict graph. It is also worth repeating that a downvote does not provide a \textit{global} quality assessment of a comment. Rather, a downvoted comment within a subreddit signifies that this particular subreddit perceives the comment as low quality. This is a localized definition of quality defined by the subreddit and it is consistent with Brunton's model of spam~\cite{brunton2012constitutive}. Globally, these comments might not be seen as norm-violating or low-quality. We acknowledge the fact that users may receive negative feedback not for their own antisocial behavior, but for the antagonistic stance of the receiving community. We do not assume that, for a conflict edge, the instigating community is a `community of aggressors'. In fact, depending on the viewpoint, it might be viewed as a `refuge for social outcasts.' New users in a subreddit are more susceptible to innocuous norm-violation due to them not knowing all rules of a new subreddit, but with time they tend to learn. To eliminate these users from the list of controversial users, we enforce a minimum threshold of comments in a subreddit. Excluding these users, we use downvote within a subreddit to determine subreddit conflicts and not as an indicator of the global quality of the comment. \subsection{Subreddit conflict due to ideological differences} Many subreddit conflicts in the subreddit conflict graph are between subreddits with topically or ideologically opposing viewpoints. This is expected given the high presence of political subreddits in the graph. However, identifying subreddits with ideologically differing viewpoints does not signify a subreddit conflict. Similarly, topical differences do not explain all subreddit conflicts. Two subreddits with opposing ideologies may engage in a civil discussion about the topic, may not engage at all or be part of a subreddit conflict. In many cases, engagement is very low or non-existent. An example of this is \sr{askscience} and \sr{theworldisflat}~\cite{Datta2017z2}. Similarly, the conflict edge from \sr{The\_Donald} to \sr{PanicHistory} can not be fully explained by topical opposition. On the other hand, the presence of subreddit conflicts between many ideologically antagonistic subreddits works as a sanity check and provide insight into what kind of ideological opponents are more likely to engage in community level conflicts. \subsection{Robustness of threshold parameters} We employ multiple thresholds to ensure proper conflict identification. Although some of the thresholding can be eliminated via other methods~\cite{Martincommunity2vec}, we use this approach for computational simplicity and effectiveness. Nonetheless, threshold parameters must still be tuned for the particular dataset and application. We discuss our philosophy behind choosing different parameters and justify our choice via a set of small-scale sensitivity analyses. We focus on key differences for different threshold values. The first threshold is the number of comments by a user. We only consider users who commented more than 100 times to ensure that we perform our analysis on active users. However, we find that our results are quite robust to change in the threshold. Considering users who commented more than 50 times we see around 10\% increase in the number of controversial authors. On the other hand, a stricter threshold of 200 reduces the number by 16\%. The conflict graphs generated using these thresholds also show little change. We observe 3.1\% increase in conflict graph nodes and 1.1\% increase in conflict edges using threshold 50, and 4.2\% decrease in nodes and 2.7\% decrease in edges using a threshold 200. Removing overall low activity accounts from consideration removes malicious sockpuppet accounts (i.e., a single user uses multiple accounts usually unlinked with each other). Unfortunately, we can not directly account for these users as we do not have the data. However, with knowledge of sockpuppets, we can merge multiple accounts before thresholding, which retains the behavior of the sockpuppet account in the aggregate. The next major threshold we use is determining the minimum number of comments for a user to have a social or anti-social home. We settled for users having more than 10 comments in a subreddit. This threshold works as a trade-off between adding genuine social and anti-social homes for users with lower activity, possibly in smaller subreddits and falsely identifying social and anti-social homes due to low user activity. Using a lower threshold of more than five comments adds 131\% more controversial authors, which in turn adds 124\% more nodes and 378\% more edges in the conflict graph. On the other hand, using a stricter threshold of more than 20 comments, eliminated 63\% controversial authors and 62\% nodes and 86\% edges in the conflict graph. This stricter threshold also eliminates five of nine banned subreddits from the conflict just because they are not very large in size. It can be argued that different thresholds should be used for social and anti-social homes as one-off malicious comments from many users can overwhelm subreddits. However, due to ease of account creation in Reddit, these one-off comments are often done via `throwaway accounts' created for the explicit purpose of anti-social behavior and it is difficult to link these sockpuppets to specific communities. Moreover, it is very difficult to identify truly malicious one-off comments from innocuous norm-violations or low-effort posting as we do not have labeled data and deciphering the true intention behind these comments are often context-sensitive (i.e. same comment can be perceived as malicious or non-malicious depending on the context). Our experience is lowering the threshold for determining anti-social homes add many false conflict edges. We choose to err on the side of caution by having a somewhat strict threshold without eliminating most smaller low activity subreddits. We acknowledge that while this approach finds social and anti-social home for long-term misbehaving users, it does not capture sudden conflicts risen from strong external stimuli (e.g., \textit{2015 AMAgeddon}) or when long-standing contributors to a community suddenly starts `misbehaving'~\cite{hardaker2010trolling}. The thresholds for determining conflict edges (at least five controversial authors behaving differently in a pair of subreddits) and co-conflict graph edges (at least two controversial authors perceived negatively in a pair of subreddits) are somewhat lenient, as our definition of a controversial author is quite strict. We observe, a stricter threshold in both above-mentioned cases, eliminates smaller low-activity subreddits from consideration. \subsection{Identifying communal misbehavior} Many conflict edges in the conflict graph have low intensity and most subreddits have low con\_author\_percent value. In other words, only a few individuals in a subreddits compared to subreddit size are controversial authors. We can infer that getting involved in subreddit conflicts does not imply communal misbehavior. In fact, larger subreddits are more likely to be involved in more conflicts due to their size. However, there is an important distinction in a conflict edge compared to a few pathological individuals behaving badly. We determine conflicts via controversial authors, which means the users who are perceived negatively in the target subreddit are perceived positively in the source subreddit. This implies either these controversial authors behave very differently in the source compared to the target, or users in the source subreddit support the controversial author's behavior. We do not look for such distinctions in this paper. However, this distinction may be useful to isolate in future work. To determine community-wide misbehavior we primarily look into what percentage of active subreddit members are positively perceived controversial authors (con\_author\_percent). For many banned subreddits (where we infer communal misbehavior because these were banned) we observe that more than 30\% of subreddit users fall into this category. Many banned subreddits also show high average outgoing conflict intensity. In general, Reddit users restrict themselves to posting in only a few subreddits~\cite{Hamilton2017}. Thus, a conflict edge with high intensity shows that whatever little interaction the participating subreddits have, is toxic. Notably, due to high variance of subreddit sizes, only a few people from a large subreddit can potentially overwhelm a smaller subreddit even if the number of misbehaving users is very low compared to the size of the larger subreddit. We believe that both high con\_author\_percent and high average outgoing conflict intensity implies communal misbehavior. We would emphasize that this is not the only way a community can misbehave. Abusive language, anti-social or unlawful behavior within the subreddit can also point to communal misbehavior and can lead to subreddit bans. Moreover, we would like to encourage discussion about communal behavior versus behavior of only a few members in the community in a general sense. It is not always clear what threshold one should abide by when declaring a particular behavior as `communal' (e.g., what percentage of community members must behave in a certain way to consider that behavior as communal). This discussion applies to Reddit as well as many other online social platforms which exhibit community patterns. We believe that the con\_author\_percent measure for banned subreddits can be used as a starting point of identifying community-wide misbehavior at least for different subreddits. \subsection{Co-conflict graph} The co-conflict graph embodies anti-social home to anti-social home relationships among the same set of subreddits as the conflict graph. As 82\% of the controversial authors have only a single anti-social home, the co-conflict graph is sparser compared to the conflict graph. Communities in the co-conflict graph identify which meta-subreddit groups are targeted together. As one might expect, some of the co-conflict graph communities are extremely topic-coherent (gun-related and video-game subreddits). However, other groupings provide additional insights. For example, a larger subreddit, when targeted together with many comparatively smaller subreddits, forms a star pattern. The meta-subreddit groups are not necessarily targeted by another meta-subreddit groups as we observe a lot of conflicts are generated within the co-conflict subreddit communities. Interestingly, a social home to social home relationship graph form a very dense structure and does not exhibit community behavior, which means that we can not readily classify conflict between different subreddit communities using this method. \subsection{Limitations} Using controversial authors to find subreddit conflicts has some limitations. First, this method does not take into account comments deleted by users or moderators (this data is not available for collection). Some subreddits are especially aggressive in deleting downvoted or moderated comments. In some cases, misbehaving authors in a subreddit are banned from further posts. As with comments, we do not have records of this type of moderation. When a subreddit aggressively bans many people, it can change the conflict graph from a static and dynamic perspective. A clear example of this is \sr{The\_Donald}, which banned thousands of individuals over its lifetime (these banned individuals formed a subreddit \sr{BannedFromThe\_Donald}, with a subscriber count of 2,209 in November of 2016 and over 27,000 in July of 2018). These individuals do not show up as controversial authors as their comments are gone. We also do not account for sockpuppetry, i.e., having multiple accounts, one for normal posting behavior on Reddit and others for misbehaving. Presence of many users with sockpuppets can skew the estimation of controversial authors in different subreddits. If data such as bans on the source of sockpuppet accounts can be determined, this data could easily be incorporated in our algorithmic pipeline by updating the definition of anti-social homes. For example, if we know the users who are banned from a particular subreddit, we declare that these users have an anti-social home in the subreddit they are banned from. In our current analysis, we do not filter bots (software applications that generate comments) from our list of authors. However, strictly malicious bots -- those with \textit{only} anti-social homes -- do not change our conflict graph as they are not counted among the controversial authors. Occasionally, bots can show up as controversial authors. These include moderator bots (e.g., \textit{AutoModerator}). It is worth a future study to understand why a bot can be perceived positively or negatively depending on the subreddit. This might mean that bots can intentionally, or not, violate norms for some subreddits while complying with others. Though bots represent a small fraction of Reddit users, this behavior would be interesting for future study. One final limitation of our model is that \textit{correlated} multi-community posting may appear as a conflict edge. For example, members of community $A$ (a subreddit for a specific computer game) are found to conflict with community $B$ (a feminist subreddit). However, it may not be appropriate to say that $A$ conflicts with $B$. The topics of the two communities are completely orthogonal. In this situation, it might be due to the presence of a third subreddit, $C$ (e.g., an anti-feminist subreddit) that conflicts with $B$. It simply happens that many members of $A$ (the game) also have a social-home on $C$ (the anti-feminist subreddit). It would thus be more accurate to say that $C$ conflicts with $B$. One approach for handling this is to ensure that there is some topical correspondence between the communities we are considering (based on text). This eliminates the $A-B$ edge but retains $C-B$. It is nonetheless possible that we may want to know that the $A-B$ link exists. Moderators of subreddit $A$ might want to be made aware of this correlation and take action. \subsection{Implications} Although we perform our analysis on Reddit, our analysis is equally applicable in other social media with inherent or inferred community structure with associated community feedback. For example, we can perform a similar analysis on Facebook pages and groups, online news communities and Twitter hashtag communities (people who tweeted a particular hashtag are part of that hashtag community). We quantify user behavior based on upvotes and downvotes in a particular community, and this data is more easily available for many social media websites compared to a list of banned or otherwise sanctioned users from a particular community. Our approach is highly adaptable and can incorporate new information (e.g., banned and sockpuppet accounts). The analysis is also fully automated and highly parallelizable which increases the adaptability for a very large amount of data. In addition to providing insight into communities, we also believe that our work can be used for moderation purposes. We observe that several banned subreddits rank very high on particular metrics for measuring conflict. We can calculate these measures for monthly (or otherwise temporal) subreddit conflict graphs and see how different subreddits rank in these measures over time. This observation can be used to monitor problematic subreddit behavior as a whole or create an early-warning system based on machine learning where we treat currently banned subreddits as positive examples of communal misbehavior and use the metrics above as features. \section{Identifying Inter-community Conflicts} To define the \textit{conflict graph} between subreddits we need first to identify edges that capture community-on-community `attacks.' We would like these edges to be directed (as not all conflict is reciprocated) and weighted (to indicate the strength of the conflict). Our goal is not to only identify `passive' ideological opposition but also behaviors where one subreddit actively engages with the other. This distinction is important as there are instances where two subreddits are discussing the same topic through different ideologies (as determined through text analysis), but have very low author overlap. For example, the \sr{askscience} (discussion forum for science-related topics) and \sr{theworldisflat} (forum for scientific evidence that the world is flat) could be considered to be ideologically opposed~\cite{Datta2017z2}. However, there are very few authors who post in both subreddits, meaning there is no engagement and no `conflict' by our definition. These individuals do not agree but largely leave each other alone. Instead, we focus on identifying individuals that post to multiple subreddits and behave \textit{differently} depending on the subreddit. In our model, behaviors, such as commenting, can be norm-compliant or norm-violating. Norm-compliant are those behaviors that the community finds agreeable in that they are consistent both with the way behaviors (e.g., message posting) should be done and/or the content of the message itself. Norm-violating are those behaviors that are disagreeable in the same way (how they're posted or what is in them). Norm-violating behavior can include traditionally anti-social behaviors: flame wars, griefing, spamming, trolling, baiter, brigading, baiting, fisking, crapflooding, shitposting, and trash talking. This, again, is consistent with Brunton's spam definition~\cite{brunton2012constitutive}. The appeal of this localized definition of spam is that each community can assert what they consider social or anti-social behavior (i.e., norm-compliant and norm-violating) and can make local decisions to reward or sanction such behaviors respectively. Our inferential goal is to operationalize social and anti-social behavior by leveraging reward and sanction behaviors as indicators. For this purpose, we use up- and down-votes. Obviously, not all compliant behaviors are rewarded through up-votes, nor are all norm-violating sanctioned through down-votes (banning being a notable alternative). Other metrics for norm-violation may include identifying banned users or users whose comments are regularly removed by moderators. Unfortunately, such data is not readily available (removed comments and authors will be missing from the dataset). Posts can also be marked as `controversial' to signal undesirable behavior, but these are not always anti-social per se. Additionally, both banning and controversial post `tagging' may not be reliably imposed. Upvoting and downvoting, however, are specifically part of the incentive structure for Reddit and are both uniformly applied and ubiquitous. \begin{figure}[h] \centering \includegraphics[scale=0.65]{figs/cscw_conflictgraph_vis.pdf} \caption{General methodology for identifying conflicts and creating the conflict graph.} \label{fig:conflictgraph_vis} \end{figure} An individual who reliably produces enough \textit{measurable norm-compliant behavior} (e.g., many upvoted messages) can be said to have a \textit{social home} in that community. Likewise, an individual that produces a substantial amount of \textit{measurable norm-violating behavior} (i.e., many downvotes) is said to have an \textit{anti-social home} in that community. An individual can have multiple social and multiple anti-social homes. Because our goal is to find conflict \textit{edges} we do not consider authors that are \textit{only} social or \textit{only} anti-social. Those who are globally norm-violating (e.g., spammers, malicious bots, etc.) and are negatively treated in all subreddits in which they post are removed from consideration. Figure~\ref{fig:conflictgraph_vis} (left) illustrates this idea. A second key aspect in building the conflict graph is in aggregation. One \textit{particular} individual may have a social home and an anti-social home. However, from the single example, we can not infer that the other members of that person's social home would endorse the messages the person is posting to the other subreddit. Instead, we look for signals in the aggregate. If there are many individuals, who cross-post to two subreddits--- where one subreddit is clearly a social home, and the other is clearly an anti-social home---we infer that a conflict exists. This conflict need not be reciprocated, but as we show below, it often is. We can roughly quantify the anti-social behavior of a user within a subreddit if he/she has more downvoted comments compared to upvoted comments. Note that a single comment can have multiple upvotes and downvotes. Reddit automatically upvotes a user's own comment (all comments in Reddit start with one upvote). We consider the user's upvote as a `baseline' as we assume the author views his or her own comment positively\footnote{The algorithms described in this paper can be applied with or without a individuals' personal upvotes. However, we note that exclusion of this number may slightly change the descriptive statistics we report.}. We say a comment is \textit{downvoted} (in aggregate) if the total number of downvotes for the comments exceeds upvotes, and \textit{upvoted} when upvotes exceed downvotes. Similarly, we determine that a user has shown social behavior if they have more upvoted comments (rewarded, norm-compliant) compared to downvoted ones (sanctioned, norm-violating) within a subreddit. To distinguish between an author's `home' and simply a `drive-by' comment, we enforce a threshold (we call this \textit{significant presence}) of more than ten comments in the subreddits over the course of the year (2016). This threshold also ensures that we can observe enough up and down votes for any particular author. Additionally, new authors in a subreddit might break some unfamiliar rules, and receive downvotes initially. Our threshold gives sufficient data to determine if they `learned.' We also enforce that the user has more than 100 total posts in 2016, which ensures that they have an overall significant presence on Reddit. As authors were automatically assigned to \textit{default subreddits} (\sr{AskReddit}, \sr{news}, \sr{worldnews}, \sr{pics}, \sr{videos}), many Reddit authors began by posting in these groups~\footnote{Though this does not impact our analysis (for 2016 data), we note that default subscription was replaced in 2017 with a dynamic popular subreddit homepage.}. Norms (and norm-compliance) in these subreddits may be significantly different from rest of the subreddits. Using our definition of social homes, a large number of users have at least some default subreddit as their social home or anti-social home just because they started by posting in these forums. For this reason, we exclude default subreddits from our analysis. \subsection{Controversial Authors} We denote an author with at least one social and one anti-social home as a \textit{controversial author} (the purple figures in Figure~\ref{fig:conflictgraph_vis}). In 2016, 1,166,315 authors had more than total 100 comments over the year. After filtering for significant presence in subreddits, we found 23,409 controversial authors. This indicates that only about 2\% of the more prolific Reddit users fall into this category. Among the controversial authors, 82\% have only a \textit{single} anti-social home. The vast majority (92.5\%) of controversial authors have \textit{more} social than anti-social homes. This indicates that these authors differ from the conventional idea of a ``troll'' who misbehaves in every forum they participate in. This also means that a typical controversial author focuses his/her `misbehavior' on a small number (usually 1) subreddits. This result is consistent with Reddit users being loyal (in posting) to a small set of subreddits~\cite{Hamilton2017}. In aggregate, if there are many controversial authors that have a social home in subreddit $A$ and anti-social home in subreddit $B$, we view this to be a directed conflict from $A$ against $B$. We call this a \textit{conflict edge}. The sum of all these edges, after some additional filtering, captures the \textit{conflict graph} (Figure~\ref{fig:conflictgraph_vis}, right). Our approach has the benefit that aggregation can eliminate various types of noise. While upvoting/downvoting is noisy at the level of any particular message, aggregation at the author level allows us to look for \textit{consistent} behaviors (i.e., are messages from an author always rewarded in one place and sanctioned in another?). Noise at the level of a \textit{particular} controversial author is similarly mitigated by aggregation (are there \textit{multiple} individuals being rewarded in one place and sanctioned in the other?). \section{Introduction} Anti-social behavior in social media is not solely an individual process. Communities can, and do, antagonize other groups with anti-social behaviors. Similarly, both individuals and communities can be sanctioned in reaction to this behavior. On Reddit, for example, individuals can be banned or otherwise be sanctioned (e.g., have their posts down-voted). Likewise, entire subreddits can also be sanctioned when multiple individuals use the community as a platform for generating conflict, in violation of general Reddit norms. Critically, the form of anti-social behavior at the community level can be quite varied. The ability to identify and coordinate with others means that actions considered anti-social for the individual can be expanded to group settings. A group can thus act anti-socially--- producing mass spamming and trolling, flame wars, griefing, baiting, brigading, fisking, crapflooding, shitposting, and trash talking---against both individuals and other subreddits~\cite{Kumar18, schneiderimpoliteness}. On Reddit, as in other discussion boards, the ability to create (multiple) accounts under any pseudonym can further exacerbate such behaviors. Although a vast majority of users are generally norm-compliant, anonymity can lead to less inhibited behavior from users~\cite{Suler04}. In aggregate, the result is an entire embedded network of subreddit-to-subreddit conflicts inside of the Reddit ecosystem. Research has found specific instances of these conflicts. Our goal is to inferentially identify the structure and dynamics of this \textit{community-to-community} conflict network at scale. To achieve this, we address a number of challenges. First among them is the lack of explicit group membership. Group `membership' in Reddit, and systems like it, can be vague. While subscriptions are possible, individuals can display member-like behaviors by posting to subreddits they are not part of. Such behaviors---subscription and posting---are not, however, a clear indication of the individual's `social homes.' An individual can display both social and anti-social behaviors within the community via posting. Instead, what we seek is not simply to identify an individual's `home' but to further discriminate between \textit{social homes} and \textit{anti-social homes}. To achieve this separation, we apply a definition that extends Brunton's construct of spam: a community defines spam as (messaging) behavior that is not consistent with its rules and norms~\cite{brunton2012constitutive}. That is, we seek to separate \textit{norm-complaint} behaviors that indicate social membership and those that are \textit{norm-violating} (indicating an anti-social home). Rather than relying on a global definition of norms, we utilize the sanctioning and rewarding behavior of individual subreddits in response to norm violation and compliance respectively. An explicit measure we leverage is up- and down-voting on posted comments. While these are not the only kind of sanctions and rewards, they are (a) consistently used, and (b) can be aggregated both at the individual and community levels. As we demonstrate below, inference based on these lower level signals can help identify broader conflicts. A further appeal of the bottom-up approach is that the converse, top-down identification of sanctions at the subreddit level, does not provide a clear indication of conflict. First, this signal is sparse as the banning of subreddits remains rare. Except for explicit \textit{brigading}, which are (hard to detect) coordinated attacks on another subreddit, community-based anti-social behaviors may not result in a community being sanctioned. Second, even when a sanction is employed it may be due to other reasons than community-on-community attacks. For example, subreddits such as \sr{fatpeoplehate} (a fat-shaming subreddit) and \sr{europeannationalism} (a Nazi subreddit) have been banned but not necessarily due to any specific `attack' but rather non-compliance with Reddit-wide norms on hate speech. Our bottom-up inference is different in that we can identify pairs of social and anti-social homes and aggregate these to find conflicts. Specifically, we can find authors implicated in conflicts---which we call \textit{controversial authors}---by identifying those that have both social \textit{and} anti-social homes. From this, we can say that if multiple authors have a social-home in subreddit $A$ \textit{and} an anti-social home in subreddit $B$, then there is a directed conflict between $A$ and $B$. By finding aggregate patterns using all Reddit comments from 2016 (9.75 million unique users and 743 million comments), we can construct the subreddit \textit{conflict graph} at scale. Furthermore, we demonstrate how the directed edges in our graph can be weighted as a measure of \textit{conflict intensity}. The process of identifying conflict edges and their associated weights is complicated by the inherent noise in behaviors and high-variance of community sizes. A specific contribution of our work is the use of different aggregation and normalization techniques to more clearly identify the conflict graph. Using this graph, we can determine not only the broad landscape of community-to-community conflicts but to answer specific questions as well: Which subreddits are most often instigators of conflict (versus targets)? Are conflicts reciprocal and are they proportional in intensity? Does `attacking' multiple subreddits imply broad misbehavior by members of that subreddit or the work of just a few individuals? Are certain subreddits targeted `together?' Do conflicts shift over time? Briefly, we find that subreddit conflicts are often reciprocal, but the conflict intensity is weakly negatively correlated with the intensity of the `response.' We also find the larger subreddits are more likely to be involved in a large number of subreddit conflicts due to their size. However, our analysis of the fraction of users involved can isolate situations where both relative and absolute counts of involved authors are high. Additionally, we find different patterns of conflict based on intensity. For example, a single subreddit targeting many others may divide its attention, resulting in decreased intensity across the targets. On the other hand, we find anecdotal evidence that subreddits which act as social homes to many controversial authors and have high average conflict intensity against other subreddits often display communal misbehavior. Because of the longitudinal nature of our data, we are also able to perform a dynamic analysis to isolate temporal patterns in the conflict graph. We find, for example, that subreddits that conflict with multiple other subreddits change their main focus over time. Our specific contributions are mapping the static and dynamic subreddit conflict networks across Reddit. We identify group membership and define the concept of social and anti-social homes as a way of defining conflicts. By analyzing the different static and temporal patterns in subreddit conflicts, we provide evidence for mechanisms that can identify communal misbehavior. We provide a baseline for quantifying conflicts in Reddit and other social networks with `noisy' community structure and where individuals can behave (and misbehave) in a communal fashion. Our work has implications in identifying community features which can be used to automatically monitor community (mis)behavior in such social networks as an early warning system. \section{Related Work} \subsection{Conflicts in Social Media} Undesirable behavior in online communities are widely studied in social media research. Qualitative analysis often focuses on identifying and characterizing different types of inappropriate online behaviour or provides case studies in different forums. Analysis of Usenet news, for example, helped explore identity and deception~\cite{donath1999identity}. General anti-social behaviors~\cite{hardaker2010trolling} can also manifest in `site-specific' ways as in the trolling and vandals on Wikipedia~\cite{Shachaf2010}, or griefing and combative strategies in Second Life~\cite{Chesney2009}. Predicting trolls and other anti-social behavior is another well explored research area. For example, researchers have studied the connection between trolling and negative mood which provided evidence for a `feedback' loop that contributes to further trolling~\cite{Cheng17anyone}. In the context of \textit{prediction}, several studies focused on detecting certain anti-social behaviors on specific sites (e.g., vandalism in Wikipedia~\cite{Adler2011,Kumar2015}). Others have attempted to predict both anti-social behaviors or sanctions. Examples of the former include finding sockpuppets (same user using multiple accounts) on discussion sites~\cite{Kumar2017sockpuppet} and Twitter~\cite{GalnGarca2013SupervisedML}. Within Reddit, Kumar et al.~\cite{Kumar18} studied controversial hyperlink cross-postings between subreddits to identify community conflict. Examples of the latter (sanction prediction) include future banning based on comments~\cite{Cheng15antisocial} and using abusive content on one forum to predict abuse on others~\cite{Chandrasekharan2017}. The bulk of research has emphasized the behavior of individuals rather than inter-community anti-social behavior (rare exceptions emphasized specific types of anti-social behavior). While we draw upon this literature to understand individual trolling, our focus is on a broad definition of higher-order inter-community conflicts. That is, our aim is to identify inter-community conflict (rather than individual-on-individual or individual-on-community) by developing behavioral mapping mechanisms in the context of the broader network. \subsection{Trolling in Reddit} Individual trolling in Reddit is predominantly studied through content analysis (e.g., ~\cite{merritt2012analysis}). A key result for Reddit has been comparing the differences between a smaller number of communities in terms of trolling behavior. For example, Schneider performed a contrastive study on intercultural variation of trolling by two subreddits, \sr{ShitRedditSays} and \sr{MensRights}~\cite{schneiderimpoliteness}. Most related to our work is the study by Kumar et al.~\cite{Kumar18} which found that very few subreddits are responsible for the majority of conflicts. This has implications to the conflict graphs we construct in that we may expect key conflict `nodes.' More recently, there has been research on interventions (e.g., banning) to combat anti-social behavior. For example, Chandrasekharan et al.~\cite{Chandrasekharan2017ban} studied the effect of banning two particular subreddits, \sr{fatpeoplehate} and \sr{CoonTown}, to combat hate-speech. However, this work does not elaborate on subreddit-to-subreddit relations before or after the ban. Subreddit relations are discussed from an ideological frame by identifying subreddits which discuss the same topic from different point of views~\cite{Datta2017z2}. However, this approach does not capture conflict explicitly. \subsection{Signed Social Networks} We analyze subreddit conflicts by creating a subreddit conflict graph, which can be viewed as a \textit{signed graph} (where all the edges are marked negative). Use of signed graphs for trolling detection is uncommon but has been explored in past research. Kunegis et al.~\cite{Kunegis2009} predicted trolls and negative links in Slashdot (a technological news website and forum where users are able to tag other users as `friend' or `foe'). Multiple studies~\cite{Wu2016,Shahriari2014} proposed models to rank nodes in signed social networks. Signed networks incorporate both positive and negative edges. In our case, it is difficult to make claims about positive relations in the conflict graph. Because most individuals are norm-compliant, edges constructed between two \textit{social} homes may be an artifact of authors being largely norm-compliant and simply reflect correlated interests. In contrast, an author that displays both norm-compliant and norm-violating behaviors provides a better indication of likely conflict. \begin{comment} - Trolling in social media\\ - Trolling in Reddit\\ - Subreddit wars\\ \eytan{I would suggest trying to get through this sooner rather than later, it will help you frame some of your findings and possibly identify key RQs} \end{comment} \section{Conflict Dynamics} One interesting question for our conflict graphs is how they change over time? It is possible that controversial authors maintain the same social and anti-social homes over time. Conversely, a subreddit with controversial authors may `shift' its negative behaviors to different subreddits over time. To better understand these dynamics, we study this in both an aggregate manner (i.e. does the most targeted and most instigating subreddits vary each month or do they remain mostly static?), and from the perspective of a few individual subreddits (how does rank of a particular subreddit among most targeted and most instigating subreddits vary over time?). To do so, we created conflict graphs for each month in 2016. These monthly graphs use the same set of subreddits and the same set of controversial authors used in constructing the yearly conflict graph. We focus this preliminary analysis on subreddits that targeted five or more other subreddits over the year and model how their `conflict focus' varies. That is, do they specifically focus on a single subreddit over all months, or does their most targeted subreddit in a specific month vary from month to month? To determine this, we count the number of times the most targeted subreddit for each conflict source subreddits change from one month to the next. We call this the \textit{change\_count} for the attacking subreddit. By definition, change\_count can vary from 0 (most targeted subreddit did not change in all 12 months) to 11 (most targeted subreddit changed every month). If a subreddit did not target any other in a particular month, but targeted some subreddit in the next (or vice versa), we count that as a change. Figure~\ref{fig:change_count} shows the distribution of change\_count for source subreddits. \begin{figure}[htbp!] \centering \includegraphics[scale=0.55]{figs/top_attacking_change_count_month_half.pdf} \caption{Change count for source subreddits who targeted at least 5 subreddits } \label{fig:change_count} \end{figure} On average, we find that change\_count is 6.91 (median of 7), which means that most subreddits shifts their primary focus over time. We find only 2 subreddits did not change their target at all in 12 months. One example of this is \sr{CCW} (concealed carry weapons subreddit) targeting \sr{GunsAreCool} (a subreddit advocating for gun control in USA). Because of the 2016 US election, the monthly `most targeted' and `most instigating' subreddits are still predominantly political. However, some subreddits only appear in the beginning of the year (e.g. \sr{SandersForPresident} is in the list of top 3 most instigating subreddits for the first four months, \sr{The\_Donald} is the top 3 most targeted subreddit list for the first 3 months) or end of the year (e.g. \sr{EnoughTrumpSpam} is in the list of top 10 most targeted subreddits for the last 7 months and during that time, it is the most targeted subreddit). On the other hand, some subreddits show remarkable consistency -- \sr{The\_Donald} is always the most instigating subreddit (for all 12 months) and \sr{politics}, \sr{SubredditDrama} are always in the top 10 most targeted subreddits list. \begin{comment} \begin{figure*} \begin{adjustbox}{max width=\textwidth} \centering \begin{minipage}{\columnwidth} \centering \includegraphics[width=\linewidth]{figs/most_attacked_month.pdf} \captionof{figure}{Rank by intensity of being targeted for four political subreddits over 2016.} \label{fig:attacked_month} \end{minipage} \hspace{0.05\linewidth} \begin{minipage}{\columnwidth} \centering \includegraphics[width=\linewidth]{figs/most_attacking_month.pdf} \captionof{figure}{Rank by conflict intensity for four political subreddits over 2016.} \label{fig:attacking_month} \end{minipage} \end{adjustbox} \end{figure*} \end{comment} \begin{figure}[htbp!] \centering \includegraphics[scale=0.55]{figs/most_attacked_month.pdf} \captionof{figure}{Rank by intensity of being targeted for four political subreddits over 2016.} \label{fig:attacked_month} \end{figure} \begin{figure}[htbp!] \centering \includegraphics[scale=0.55]{figs/most_attacking_month.pdf} \captionof{figure}{Rank by conflict intensity for four political subreddits over 2016.} \label{fig:attacking_month} \end{figure} Figures~\ref{fig:attacked_month} and~\ref{fig:attacking_month} illustrate the rank of four political subreddits related to the US presidential election (\sr{The\_Donald}, \sr{EnoughTrumpSpam}, \sr{SandersForPresident} and \sr{Enough\_Sanders\_Spam}). The figures capture the rank of these in the most targeted (largest indegree in the conflict graph) and most instigating lists (largest outdegree) respectively. These demonstrate both the pattern of stable conflict as well as varying ones. Perhaps the most important observation from these plots is how mirrored they are. \sr{The\_Donald} is always the most instigating subreddit and it is consistently targeted back. \sr{EnoughTrumpSpam} gained popularity during March 2016 and gradually became more instigating in the next two months. For the last seven months of 2016, \sr{EnoughTrumpSpam} is the most targeted subreddit. \sr{SandersForPresident} is near the top in both most targeted and most instigating list until the end of July 2016 and from November 2016. However, in three months between July and November, this subreddit did not have any antagonistic relation with any other subreddit as it was shutdown after US political conventions in July and subsequently brought back after in November. \sr{Enough\_Sanders\_Spam} was formed in July 2016 and instantly became highly targeted due to its content. This shows that, a subreddit instigating/targeted can be highly dependant on external events.
\section{Introduction} The celebrated results by Choquet-Bruhat \cite{CB} and Choquet-Bruhat and Geroch \cite{CBG} ensure that the metric of a globally hyperbolic \ncambios{(say, Ricci-flat)} spacetime $(M,g)$ is determined by Cauchy data on a Cauchy hypersurface $\Sigma$. Such data (a Riemannian metric, the {\em a posteriori} second fundamental form) are subject to some constraints (Gauss and Codazzi); \gcambios{when the Lorentzian metric $g$ is prescribed, further results can be obtained for other fields satisfying hyperbolic equations.} The existence of a smooth and spacelike Cauchy hypersurface $\Sigma$ for any such $(M,g)$ ensures the well-posedness of the Cauchy problem; moreover, the existence of a splitting for the full spacetime $M$ as a orthogonal product $(\mathds R\times \Sigma, g=-\Lambda d\tau^2 +g_\tau)$, where $\tau$ is a Cauchy temporal function, shows the consistency of the notion of predictability from each ``instant'' of time to another, \gcambios{ apart from other advantages. } These two existence results where obtained at a topological level by Geroch \cite{geroch} and at the differentiable and metric levels in \cite{BS03, BernalSanchez}; a full and self-contained development of the Cauchy problem has been carried out recently in the painstaking book by Ringstr\"om \cite{ringstrom}. In the present article, such a splitting as well as other causal properties, will be extended to the case of \ncambios{{\em globally hyperbolic spacetimes-with {\em (smooth, conformal)} -timelike-boundary}.} The Cauchy problem in this class of spacetimes was studied by Friedrich and Nagy \cite{Friedrich} and the class of spacetimes was systematically studied in Sol\'{\i}s' thesis \cite{didier}. Globally hyperbolic spacetimes (without boundary) can be characterized as those strongly causal spacetimes whose intrinsic {\em causal boundary} points are not naked singularities. In a natural way, the timelike boundary ${\partial M}$ of our class of spacetimes is composed by all the naked singularities (see the \gcambios{Appendix A}); so, the these singularities become the natural place to impose boundary conditions. Chrusciel, Galloway and Solís \cite{kaluzaklein} proved a version of topological censorship for this class of spacetimes; notably, such a class includes asymptotically anti-de Sitter ones. More precisely, we will show that any globally hyperbolic spacetime-with-timelike-boundary $({\overline{M}}, g)$ admits a Cauchy splitting $\mathds R\times \bar{\Sigma}$ where $\bar{\Sigma}=\Sigma \cup \partial \Sigma$ is a Cauchy hypersurface-with-boundary $\partial \Sigma$. From the PDE viewpoint, this suggests that the Cauchy problem will be consistently well-posed in this class of spacetimes as a {\em mixed} Cauchy problem for a symmetric positive linear differential equation \cite{Friedrich, friedrichs}. Now, not only the Cauchy data on $\bar{\Sigma}$ $(\equiv \{0\} \times \bar{\Sigma})$ but also boundary data on $\partial M \equiv \mathds R \times \partial \Sigma$ (under suitable compatibility constraints at $\{0\} \times \partial \Sigma$) must be provided, resembling the behavior of the elementary wave equation. Background on this mixed problems has been developed recently by Valiente-Kroon and Carranza \cite{valiente, valiente2, valiente3}; see also the article by Enciso and Kamran \cite{encisokamran} (including its expanded version \cite{encisokamran2}). Applications to wave equations and quantum field theory on curved spacetimes were obtained by Lupo \cite{lupo, lupophd} in the general case and by Dappiagi, Drago and Ferreira \cite{DDF} in the static case, so extending works by B\"ar, Ginoux and Pf\"affle \cite{Bar}, among others. From the technical viewpoint, the splitting will be obtained by constructing a Cauchy temporal function $\tau$ such that $\nabla \tau$ is tangent to the boundary (everywhere on $\partial M$). This technical condition will turn out essential to obtain a ${\partial M}$-orthogonal splitting by flowing through the integral curves of a suitable normalization of the gradient $\nabla \tau$. Such a $\tau$ will be constructed by the following procedure: (a) check the $C^0$-stability of Cauchy temporal functions in the set of all the Lorentzian metrics on ${\overline{M}}$ (this will make irrelevant any $C^2$ details of $g$ on ${\partial M}$), (b) reduce the problem to the simplified case of a metric $g^*$ with \gcambios{a product} structure close to ${\partial M}$, (c) extend symmetrically $g^*$ to the {\em double manifold} ${\overline{M}}^d$ (which becomes then a globally hyperbolic spacetime without boundary) and (d)~obtain a Cauchy temporal function for ${\overline{M}}^d$ which is invariant by a reflection on ${\partial M}$. This last problem can be regarded as a simple case of a result by M\"uller \cite{muller2016} about Cauchy temporal functions invariant by a compact conformal group; the question (a) will be studied in Section \ref{s_Stab} and the others in Section \ref{s4}. For comparisons with the case without boundary, we will consider the approach by using locally defined smooth temporal functions in the original papers \cite{BS03, BernalSanchez}, which has shown to be very flexible for a variety of questions \cite{BS06, MS, muller2016}. However, some different smoothability procedures with many other applications have been developed since then, namely: Fathi and Siconolfi \cite{fathi}, using methods inspired by weak-KAM theory, applicable to cone structures; Chrusciel, Grant and Minguzzi \cite{CGM}, inspired by Seifert's approach to smoothability in spacetimes \cite{seifert}; and Bernard and Suhr \cite{bernardshur}, inspired by Conley theory, applicable to possibly non-continuous closed cone structures. Similar conclusions seem to hold if any of these alternative approaches were considered. Summing up, quite a few properties about causality and the causal ladder will be revisited for spacetimes-with-timelike-boundary, with the following main aim : \begin{thm}\label{t0} Any globally hyperbolic $n$ spacetime-with-timelike-boundary $({\overline{M}},g)$ \ncambios{(see Defn. \ref{defn})} admits a Cauchy temporal function $\tau$ whose gradient $\nabla \tau$ is tangent to $\partial M$. As consequence, ${\overline{M}}$ splits smoothly as a product $\mathds R\times \bar \Sigma$, where $\bar \Sigma$ is a ($n-1)$ \ncambios{manifold-with-boundary}, the metric can be written (with natural abuses of notation) as a parametrized orthogonal product \begin{equation} \label{e_split} g= -\Lambda d\tau^2 + g_\tau \, , \end{equation} where $\Lambda: \mathds R \times \bar \Sigma \rightarrow \mathds R$ is a positive function, $g_\tau$ is a Riemannian metric on each slice \{\tau\} \times \bar \Sigma$ varying smoothly with $\tau$, and these slices are spacelike Cauchy \ncambios{hypersurfaces-with-boundary.} Moreover, ${\overline{M}}$ can be isometrically embedded in Lorentz-Minkowski ${\mathbb L}^N$ for some $N\in \mathds N$, the interior $M$ of ${\overline{M}}$ is always causally continuous, the boundary ${\partial M}$ is a (possibly non-connected) globally hyperbolic spacetime without boundary, and: (a) the restriction of $\tau$ to $M$ extends the known orthogonal splitting of globally hyperbolic spacetimes to this class of causally continuous spacetimes without boundary, (b) the restriction of $\tau$ to ${\partial M}$ provides a Cauchy temporal function for the boundary whose levels are acausal in\footnote{\label{f0} The global hyperbolicity of ${\overline{M}}$ implies directly the global hyperbolicity of ${\partial M}$ and, so, the existence of a Cauchy temporal function in each connected component of ${\partial M}$. However, the global splitting ensures that the different connected components can be syncronized in an acausal one when looked at ${\overline{M}}$. Such a property becomes natural from the PDE viewpoint commented above (notice that different connected components of ${\partial M}$ are permitted, even if ${\overline{M}}$ will be assumed connected with no loss of generality).} ${\overline{M}}$. \end{thm} It is worth pointing out that all the procedures to be used will be conformally invariant, so, the \gcambios{results } will be also applicable to the case of a conformal boundary. Moreover, the splitting of those spacetimes without boundary which can be seen as the interior $M$ of a globally hyperbolic one with boundary ${\overline{M}}$, has its own interest. In particular, it permits to extend results about linking and causality by Chernov and coworkers to a bigger class of spacetimes, recall \cite{Ch}. The paper is organized as follows. In Section \ref{s2}, some basic preliminaries are introduced. Many of them are known or expected from standard techniques; anyway, they will become relevant later. In Subsect.~\ref{s2.1}, the double manifold is used for extensions of \ncambios{manifolds-with-boundary}, and relations between the time-orientations of ${\overline{M}}, {\partial M}$ and $M$ are pointed out. Gaussian coordinates are introduced and shown to yield a local version of the splitting~\eqref{e_split} (Cor.~\ref{c_localsplitting}). In Subsect.~\ref{s2.2}, the causal ladder is introduced. Our choices of the definitions allow us a reasonably self-contained development. In particular, the basic properties of the lower levels of the ladder (until stably causal) are quickly checked there. \bcambios{In Subsect.~\ref{s2.3}, causal continuous curves are discussed, and an intrinsic approach for its regularity (locally Lipschitz or, more properly for some cases where the reparametrization is taken into account, $H^1$) is introduced following \cite[Appendix A]{CFS}. This permits to obtain intrinsically limit curves within the same class of curves (Prop. \ref{p2.11}) and will circumvent subtleties which appear for other notions of causal continuous curves (recall Remark \ref{r_Didier}). By completeness, in Subsect. \ref{s2.4} this regularity is compared with the usual piecewise smoothness considered in the literature. Even though this issue does not affect to the chronological relation (Prop. \ref{p_futuresmooth}, Remark \ref{r_futuresmooth}), an example in the Appendix B shows that the causal relation is different depending on the class of curves used. However, a spacetime which is globally hyperbolic by using piecewise smooth curves, it will be also globally hyperbolic by using $H^1$-ones (Prop. \ref{otro}). So, our choice of $H^1$ curves is not only important for technical consistency in proofs, but also because the class of globally hyperbolic spacetimes where our results apply becomes bigger.} In Section \ref{s3}, the framework of Geroch's topological splitting is revisited in order to include boundaries. Even though most of the properties here are transplanted from the case without boundary, we make a fast review to emphasize some differences and provide a reasonably self-contained study. In Subsect. \ref{s3.2}, after checking that the role of admissible measures can be extended to the case with boundary, we reconstruct the higher levels of the causal ladder (Thm. \ref{t_ladder}), determine the causal properties inherited by the boundary ${\partial M}$ and the interior $M$ at each level, and provide the necessary (counter-) examples (Remark \ref{r_counterexamples}). Technically, Prop. \ref{p_dist} and \ref{p_creer} summarize the main properties which can be transplanted directly from the case without boundary; for the remainder, short proofs are provided. In Subsect. \ref{s3.3}, we go over Geroch's technique to find the required Cauchy time function (Thm. \ref{t_geroch}). With this aim, some properties of achronal sets and hypersurfaces with boundary are revisited (recall Defn. \ref{d_achronal} and, then, Prop. \ref{pf}). In Section \ref{s_Stab}, the stability of both global hyperbolicity and Cauchy temporal functions is proved in the case with boundary. This question has interest in its own right, and will be used to simplify the proof of the existence of orthogonal splitting in the case with boundary. Recall that, in the case without boundary, the stability of a globally hyperbolic metric $g$ on $M$ was also studied by Geroch \cite{geroch}. This question becomes equivalent to showing that there exists a metric $g'$ with strictly bigger cones (i.e. $g<g'$) which is globally hyperbolic (as all the metrics $g''$ with $g''\leq g'$ will be globally hyperbolic too). As Geroch's time function $t$ may be a non-time function for any $g'>g$ (recall that even in the smooth case the levels of $t$ may be degenerate hypersurfaces), this question was non-trivial at that moment; however, the problem was widely simplified when a Cauchy temporal function $\tau$ was proved to exist (see Section 3 of \cite{BM} in the arxiv version, and \cite{S}). Indeed, a stronger result holds because $\tau$ becomes stable as a Cauchy temporal function (i.e. $\tau$ is also Cauchy temporal for some $g'>g$ and, thus, any $g''<g'$), and, then, the stability of global hyperbolicity appears as a direct consequence, as will be checked here (see Remark \ref{r_A}). Anyway, different proofs of the stability of $g$ with interest in its own right were found by Benavides and Minguzzi \cite{BM} and by Fathi and Siconolfi \cite{fathi}. As explained in Subsect. \ref{s_Stab1}, we will prove stability of both global hyperbolicity (by means of a direct proof for the sake of completeness) and Cauchy temporal functions (assuming that they have been constructed with no restriction on ${\partial M}$ as in \cite{BernalSanchez})\footnote{This was carried out in the unpublished arxiv paper \cite{S}, which is essentially incorporated here.}, i.e.: \begin{quote} {\em For a spacetime-with-timelike-boundary $({\overline{M}}, g)$, global hyperbolicity is a stable property. What is more, for any Cauchy temporal function $\tau$ of $({\overline{M}}, g)$ there exists a globally hyperbolic metric with wider cones $g'>g$ such that $\tau$ is Cauchy temporal for $g'$ and, thus, for any other Lorentz metric (necessarily globally hyperbolic) $g''\leq g'$. } \end{quote} Apart from the interest in its own, stability will simplify widely the procedure to obtain the tangency of $\nabla \tau$ to ${\partial M}$ in Thm. \ref{t0}. Indeed, our procedure will stress that possible problems associated to, say, the bending of ${\partial M}$ or its non-convexity, will have a ``higher order'' than the requirements for $\tau$ (and, thus, will be negligible). In Subsect. \ref{s_Stab2} we will see how to construct globally hyperbolic perturbations of $g$ (eventually, maintaining the Cauchy temporal character of a prescribed one $\tau$ for $g$) and in Subsect. \ref{s_Stab3} such perturbations are shown to yield the stability results. In Section \ref{s4}, after an overall explanation of the simplified procedure, Thm. \ref{t0} is proved. A discussion on the type of problems which can be proven transplanting directly the techniques for the case without boundary is also carried out (Remark \ref{r_final}, \ref{r_A}). Moreover, a simple application of the techniques shows that every globally hyperbolic spacetime-with-timelike-boundary can be regarded as the closure of an open subset included in a globally hyperbolic spacetime without boundary (Corollary \ref{c_extension_globhip}). Finally, the \gcambios{Appendix A} justifies rigourously that, in a globally hyperbolic spacetime-with-timelike-boundary, the boundary $\partial M$ is composed by all the naked singularities of the spacetime (Thm. \ref{naked}). As these singularities are regarded naturally as a subset of the intrinsic causal boundary $\partial^cM$ (the pairs $(P,F)$ with $P\neq\emptyset\neq F$, see Remark \ref{nakedsingu}), the essential ingredients of $\partial^cM$ are reviewed first for the sake of completeness. \bcambios{The Appendix B provides the counterexample about piecewise smooth causal curves commented above. } \section{Preliminaries on spacetimes-with-timelike-boundary}\label{s2} \subsection{Generalities: boundaries, time-orientation and coordinates} \label{s2.1} {\bf \ncambios{Manifolds-with-boundary}.} In what follows ${\overline{M}}$ will denote a {\em connected} $C^r$ {\em $n$ \ncambios{manifold-with-boundary}}, being $n\geq 2$. Any function or tensor field will be {\em smooth} when it is as differentiable as possible (compatible with the $C^r$ character of ${\overline{M}}$); along the paper, $C^1$ will be enough for the metric $g$, and the elements to be obtained (as the Cauchy temporal function) will maintain the maximum differentiability. ${\overline{M}}$ is then locally diffeomorphic to (open subsets of) a closed half space of $\mathds R^n$; $M$ will denote its {\em interior} and ${\partial M}$ its {\em boundary}. For any $p\in {\overline{M}}$, $T_p{\overline{M}}$ will denote its $n$-dimensional tangent space while for $p\in{\partial M}$, $T_p{\partial M}$ is the $(n-1)$-dimensional tangent space to the boundary. Such a ${\overline{M}}$ can be regarded as a closed subset of the so-called {\em double manifold} ${\overline{M}}^d$, a $C^r$ $n$-manifold (without boundary) obtained by taking two copies of ${\overline{M}}$ and identifying homologous boundary points (in particular, partitions of unity for ${\overline{M}}$ can be constructed from ${\overline{M}}^d$ using ${\overline{M}}^d\setminus {\overline{M}}$ as an extra open subset). Lorentzian and Riemannian metrics on ${\overline{M}}$ are particular cases of {\em semi-Riemannian metrics}, i.e. non-degenerate metric tensors (of constant index). Background on \ncambios{manifolds-with-boundary} can be seen in \cite[Section 9]{Lee}, for example. Next, we emphasize a basic property (see \cite[Prop. 3.1]{LuisTesis} for a proof). \color{blue}{\begin{prop}\label{pp} Regarding ${\overline{M}}$ as a closed subset of ${\overline{M}}^d$, any semi-Riemannian metric $g$ on ${\overline{M}}$ can be extended to some open subset $ \widetilde{M} \subset {\overline{M}}^d$ with $\overline{M}\subset \widetilde{M}$. \end{prop} \begin{rem} {\em Recall: (a) in general, the metric defined on two copies of $({\overline{M}},g)$ cannot be extended as a smooth metric on $\overline{M}^d$, (b) in the Riemannian case, $g$ can be extended to the whole ${\overline{M}}^d$, but in the Lorentzian case this may be non-possible (for example, if ${\overline{M}}$ is an even-dimensional closed half-sphere, ${\overline{M}}^d$ admits no Lorentzian metric). }\end{rem}} \bigskip \noindent {\bf Time-orientation and spacetimes.} Let us recall some basic notions for spacetimes-with-timelike-boundary. Usual notions for Lorentzian manifolds without boundary such as causal or timelike vectors (here, following conventions in \cite{O, MSCH}) are extended to the case with boundary with no further mention (see \cite{Galloway, didier} for further background). \begin{defi}\label{defn} A {\em Lorentzian manifold with timelike boundary} $(\overline{M},g)$, $\overline{M}=M\cup \partial M$, is a Lorentzian \ncambios{manifold-with-boundary} such that the pullback $i^{*}g$, with $i:\partial M \hookrightarrow M$ the natural inclusion, defines a Lorentzian metric on the boundary. A {\em spacetime-with-timelike-boundary} is a time-oriented Lorentzian manifold with timelike boundary. \end{defi} By {\em time-oriented} we mean that a time cone has been chosen continuously (i.e., locally selected by a continuous timelike vector field $X$) on all ${\overline{M}}$. \color{blue}{The pull-back $i^*$ will be dropped} when there is no possibility of confusion \color{blue}{and the time-orientation is assumed implicitly. If $g,g'$ are two Lorentzian metrics on ${\overline{M}}$, the notation $g<g'$ (resp. $g\leq g'$) means that any future-directed causal vector for $g$ is future-directed timelike (resp. causal) for $g'$.} The following result ensures that no additional subtleties on time-orientations appear because of the presence of the boundary. Its proof uses standard background for the case without boundary, see \cite[Lemma 5.32, Prop. 5.37]{O}. \begin{prop} \label{extendfield} The following properties are equivalent for any Lorentzian manifold with timelike boundary $(\overline{M},g)$: (i) $(\overline{M},g)$ is time-orientable. (ii) $(M,g)$ and $({\partial M},g)$ are time-orientable. (iii) There exists a timelike vector field $T$ on all ${\overline{M}}$ tangent to $T_{{\hat p}}\partial M$ at each ${\hat p}\in{\partial M}$. (iv) There exists a timelike vector field $T$ on all ${\overline{M}}$. \smallskip \noindent Therefore, for any spacetime-with-timelike-boundary, ${\partial M}$ is naturally a spacetime \ncambios{(without boundary and possibly non-connected, consistently with footnote \ref{f0}).} \end{prop} \noindent {\em Proof.} (i) $\Rightarrow$ (ii) Notice that if $X$ selects the time-orientation on some neighborhood $U\subset {\overline{M}}$, then its orthogonal projection on $T_{\hat{p}}\partial M$ for each $\hat{p}\in U\cap \partial M$ selects continuously a time orientation on $U\cap \partial M$. (ii) $\Rightarrow$ (iii) As $(M,g)$ has no boundary, it admits a smooth timelike vector field $T^M$, and each connected part $C$ of ${\partial M}$ will admit also a smooth timelike vector field $T^C$. For each ${\hat p} \in C$, consider a coordinate chart $(U_{{\hat p}},(x^{0},x^{1},...,s))$ adapted to the boundary, i.e. $s^{-1}(0)=U_{{\hat p}} \cap C$, and extend the (restricted) vector field $T^{C} \mid_{U_{{\hat p}} \cap C}$ to the coordinate chart $U_{{\hat p}}$ by making the components of the vector field independent of the $s$ coordinate. Let $T^C[\hat p]$ be such an extension. As the set of points $\hat{p}\in C$ for which the time orientation determined by $T^C[{\hat p}]$ and $T^M$ agree on $U_{\hat{p}}\cap M$ is both open and closed in $C$, we can choose $T^C$ so that both agree for all ${\hat p}\in C$. Repeating this for all the connected components of ${\partial M}$, considering the covering of ${\overline{M}}$ provided by $M$ and all $U_{{\hat p}}, {\hat p} \in {\partial M}$, and taking a partition of unity subordinate to this covering, one gets a timelike vector field $T^0$ defined on some neighbourhood $U$ of ${\partial M}$ which is also tangent to ${\partial M}$. So, if $\{\mu, 1-\mu\}$ is a partition of the unity of $\overline{M}$ subordinate to the covering $\{U,M\}$, the required vector field is just $T=\mu T^0+(1-\mu) T^M$. The implications (iii) $\Rightarrow$ (iv), (iv) $\Rightarrow$ (i) and the last assertion are trivial. \ \rule{0.5em}{0.5em} \smallskip \bigskip \noindent {\bf Gaussian coordinates.} The following coordinates specially well adapted to the boundary will be useful. Let $\hat{p} \in \partial M$ and take a chart in the boundary $(\hat{U},x^{0},x^{1},\ldots,x^{n-2})$, with $\hat{U} \subset \partial M$ connected and relatively compact, satisfying $g(\partial_{0},\partial_{0})=-1$, $\partial_{0}$ future-directed on $\hat U$, and $\{\partial_{0},\ldots,\partial_{n-2}\}$ an orthonormal basis at $T_{\hat{p}}\partial M$. Since $\partial M$ is timelike, there exists a unitary spacelike vector field $N$ on ${\partial M}$ which is orthogonal to the boundary \color{blue}{and points out into $M$.} Extend the previous coordinate system to a chart of $\hat p$ in ${\overline{M}}$ by using the geodesics with initial data $(q,N_{q})$, $q \in \hat{U}$, that is, consider the geodesic $\gamma_{q}(s)=\exp_{q}(s\cdot N_{q})$, $s\geq 0$, and regard its affine parameter $s$ as a transverse coordinate. This provides the required coordinate system $(\hat{U} \times [0,s_+ ), (x^{0},x^{1},\ldots,x^{n-2}, x^{n-1}=s))$ of $\overline{M}$ for some $s_+>0$ small enough. Since $\partial_{s}|_{{\partial M}}=N$ is orthogonal to the boundary, $g(\partial_{s},\partial_{j})=0$ on $U:=\hat{U} \times [0,s_+)$ for all $j=0,\ldots,n-2$ (see for example \cite[pp. 42-4 ]{Wald}), and the metric $g$ can be written as \begin{equation}\label{e_Gaussian} g=\color{blue}{\sum_{i,j=0}^{n-2}} g_{ij}(\hat x ,s)dx^{i}dx^{j}+ds^{2}, \qquad \color{blue}{\hbox{where} \, \hat x=(x^{0},x^{1},\ldots,x^{n-2}).} \end{equation} Moreover, $\hat U$ and $s_+$ are taken small enough so that the gradient $\nabla x^0$ is timelike (i.e., the slices of $x^0$ are spacelike) on $U$. Any coordinate system constructed as above will be called a {\em Gaussian chart adapted to the boundary}, or just {\em Gaussian coordinates}. When necessary, the image of the coordinates will be a {\em cube}, that is, $(-\epsilon,\epsilon)^{n-1}\times [0,\epsilon)$ for some $\epsilon>0$. When $p\in M$, the name {\em Gaussian coordinates} will refer just a normal neighborhood of $p$, and the term {\em cube} to the subset $(-\epsilon,\epsilon)^{n}$. As a simple consequence, the local version of the desired splitting for globally hyperbolic spacetimes follows: \begin{cor} \label{cor}\label{c_localsplitting} For each $\hat{p}\in\partial M$ there exists a product neighborhood $V=(-\epsilon, \epsilon ) \times \bar{V}_0$, where $\bar{V}_0$ is a spacelike embedded hypersurface with boundary, such that both factors are $g$-orthogonal and $g$ can be written as a parametrized product \[ g=- \Lambda d\tau^2+g_{\tau},\qquad \tau: (-\epsilon, \epsilon ) \times \bar{V}_{0} \rightarrow(-\epsilon, \epsilon ) \; \; \hbox{(natural projection)}, \] where $\Lambda=-1/g(\nabla \tau,\nabla \tau)$ is a function on $V$ and $g_{\tau}$ is a Riemannian metric on $\{\tau\} \times \bar{V}_{0}$ depending smoothly on $\tau$. \end{cor} \begin{proof} Take any Gaussian coordinates of $\hat p$, put $\tau:=x^0$, $\bar V_0=\tau^{-1}(0)$ and recall that, by \eqref{e_Gaussian}, $\nabla \tau$ must be tangent to ${\partial M}$ on the boundary. So (taken a smaller hypersurface $\bar V_0$ and neighborhood) the flow of the vector field $-\nabla \tau/|\nabla \tau|^{2}$ is well defined and moves $\bar V_0$ yielding the product neighboorhod $V=(-\epsilon,\epsilon)\times \bar{V}_0$ (the expression of the metric becomes then standard, see the end of the proof of Prop.~ 2.4 in \cite{BernalSanchez}). \end{proof} \subsection{Conditions on causality and lower levels of the causal ladder}\label{s2.2} For any spacetime-with-timelike-boundary $({\overline{M}},g)$, the usual notation $\ll, \leq, I^\pm(p), J^\pm(p), $ will be used for the chronological and causal relations and the chronological and causal future/past of any $p\in {\overline{M}}$; so, say, $I^+(p,U)$ will denote the chronological future obtained by using curves entirely contained in the subset $U\subset {\overline{M}}$. There is, however, a subtlety regarding the degree differentiability of the future-directed and past-directed causal curves necessary to compute $J^\pm(p)$. They will not be necessarily piecewise smooth but just locally Lipschitz up to a reparametrization (or $H^1$ taking into account the reparametrization); such curves must be differentiable almost everywhere and the derivative must be either future-directed causal or past-directed causal whenever it exists. This question will be discussed in more detail in Section \ref{s2.3} and stated explicitly as Convention \ref{convention}. In what follows $cl$ will denote closure. \begin{prop}\label{p_opentrans} (a) The binary relation $\ll$ is open (in particular, $I^\pm(p)$ are open in ${\overline{M}}$). (b) For any $p,q,r\in {\overline{M}}$, $p\ll q\leq r \Rightarrow p\ll r$, $p\leq q\ll r \Rightarrow p\ll r$. (c)~$J^\pm(p)\subset cl(I^\pm(p))$. (d) $I^{\pm}(p,M)=I^{\pm}(p) \cap M$ for all $p \in M$. \end{prop} \noindent {\em Proof.} Properties (a), (b), (c) are easy to check (see \cite[Prop. 3.5, 3.6, 3.7]{didier}). To prove $I^{+}(p,M)=I^{+}(p)\cap M$, the inclusion $\subset$ is trivial. So, let $q \in I^{+}(p) \cap M$, and take some (piecewise smooth) future-directed timelike $\gamma:[0,1] \rightarrow \overline{M}$ with $\gamma(0)=p, \gamma(1)=q \in M$. Consider any vector field $N \in \mathfrak{X}(\overline{M})$ which extends the pointing-inward unit normal on $\partial M$ (this can be always done, as ${\partial M}$ is closed), any smooth function $f:[0,1] \rightarrow \mathbb{R}^{+}$ vanishing only at $0,1$, and the vector field $V$ on $\gamma$ defined by $V(t)=f(t)N_{\gamma(t)}$ for all $t\in [0,1]$. For the fixed-endpoints variation of $\gamma$ corresponding to the variational vector $V$, longitudinal curves close to $\gamma$ are still timelike and cannot touch ${\partial M}$. In conclusion, $q \in I^{+}(p,M)$. \ \rule{0.5em}{0.5em} \smallskip \begin{rem}\label{nuevo} {\em Property (d) can be naturally extended to points at the boundary as follows: for any $p\in\overline{M}$, $I^{\pm}(p)\cap M$ is the set of $q\in M$ such that there exists a future/past -directed timelike $\gamma$ with ${\rm Im}(\gamma)\setminus\{p\}\subset M$ joining $p$ with $q$. } \end{rem} In the case of spacetimes without boundary, there is a well-known causal ladder of spacetimes, each step admitting several characterizations (see \cite{Beem, MSCH}). Most of the ladder and characterizations can be transplanted directly to the case of spacetime-with-timelike-boundary. Here, we will focus just on globally hyperbolic spacetimes, postponing the systematic study of other causal subtleties for future work. So, we will make a fast summary of the standard steps of the ladder just making simple choices on the definitions and properties to be used in a self-contained way. \begin{defi} A spacetime-with-timelike-boundary $(\overline{M},g)$ is: \begin{itemize}\item {\em chronological} (resp. {\em causal}) if it does not contain closed timelike (resp. causal) curves, \item {\em future} (resp. {\em past}) {\em distinguishing}. if the equality $I^{+}(p)=I^{+}(q)$ (resp. $I^{-}(p)=I^{-}(q)$) implies $p=q$, that is, if the set-valued map $I^+:\overline{M} \rightarrow P(\overline{M})$ (resp. $I^-:\overline{M} \rightarrow P(\overline{M})$), where $P(\overline{M})$ is the power set of $\overline{M}$, is one-to-one. It is {\em distinguishing}, when it is both future and past distinguishing. \item {\em strongly causal} if for all $p\in {\overline{M}}$ and any neighborhood $U\ni p$ there exists another neighborhood $V \subset U$, $p\in V$, such that any causal curve with endpoints in $V$ is entirely contained in $U$. \end{itemize} \end{defi} \begin{defi} A subset $W$ of a spacetime-with-timelike-boundary $(\overline{M},g)$ is {\em causally convex } if $J^{+}(x)\cap J^{-}(y) \subset W$ for any $x,y \in W$ (equivalently, if any causal curve with endpoints in $W$ must remain in $W$). Given an open neighborhood $U\subset {\overline{M}}$, a subset $W\subset U$ is {\em causally convex} {\em in $U$} when $W$ is causally convex as a subset of $U$, regarding $U$ as a spacetime-with-timelike-boundary. \end{defi} \begin{lemma}\label{cc} Let $(\overline{M},g)$ be a spacetime-with-timelike-boundary. For any $p\in {\overline{M}}$ and any neighborhood $V\ni p$ there exists a sequence of nested neighborhoods $\{W_m\} \subset V$, $W_{m+1}\subset W_m$, $\{p\}=\cap_m W_m$, such that all $W_m$ are causally convex in $V$. \end{lemma} \begin{proof} This can be proved as in the case without boundary \cite[Thm. 2.14, Lemma 2.13]{MSCH} (now requiring the nested neighborhoods just to be causally convex instead of globally hyperbolic). Namely, given $V$, one takes (Gaussian) coordinates centered at $p$, $(V',x^i)$, $V'\subset V$, a standard flat metric $g^+$ in these coordinates with $g<g^+$ (say, $g^+= -\epsilon (dx^0)^2+\sum_i (dx^i)^2 +ds^2$, with $\epsilon >0$ small and, eventually, choosing a smaller $V'$) and $W_m:= I^+(x^0=-1/m, 0,\dots,0)\cap I^-(x^0=1/m, 0,\dots,0)$ for large $m$. \end{proof} \ncambios{ \begin{prop} \label{imprisoned $(\overline{M},g)$ is strongly causal if and only if each $p\in{\overline{M}}$ admits arbitrarily small causally convex neighbourhoods, that is, for any neighbourhood $U\ni p$ there exists a causally convex neighbourhood $W\ni p$ contained in $U$. \end{prop} } \begin{proof} We will focus on the the implication to the right (to the left is trivial). Since $(\overline{M},g)$ is strongly causal, given an open neighborhood $U$ of $p$, there exists a smaller neighborhood $V\subset U$, $p\in V$, such that any closed causal curve with extreme points in $V$ is totally contained in $U$. From Lemma \ref{cc}, there exists some neighborhood $W\subset V$ of $p$ which is causally convex in $V$. The property above satisfied by $V$ ensures that $W$ must be causally convex (in $\overline{M}$) as well. \end{proof} \ncambios{Then, following the case without boundary (see \cite[Prop. 3.13]{Beem} or \cite[Lemma 14.13]{O}; see also \cite[Sect. 3.6.2]{MSCH}), full details are written in \cite[Prop. 3.7]{LuisTesis}, we deduce: \begin{cor}\label{imprisonedb} If $(\overline{M},g)$ is strongly causal then causal curves are not partially imprisoned on compact sets, that is, for any future-directed causal curve $\gamma:[a,b) \rightarrow \overline{M}, a<b\leq \infty$ which cannot be extended continuously to $b$, and any compact set $K\subset \overline{M}$, there exists some $s_0\in [a,b)$ such that $\gamma(s)\not\in K$ for all $s\geq s_0$. \end{cor} } \begin{prop}\label{p_ord_lowerlevels} In any spacetime-with-timelike-boundary: \ncambios{strongly causal implies distinguishing; moreover, future or past distinguishing implies causal, which in turn implies chronological.} \end{prop} \begin{proof} The first implication follows as in the case without boundary \cite[Lemma 3.10]{MSCH} (see \cite[Prop. 3.7(a)]{LuisTesis} for full details); this also happens for the second one (a contradiction follows easily by applying the transitivity relations in Prop. \ref{p_opentrans}), and the last one is trivial. \end{proof} Following the ladder, $({\overline{M}},g)$ is {\em stably causal}, when it admits a {\em time function}, i.e., a continuous function $\tau$ which increases strictly on all future-directed causal curves. This step admits some classical characterizations which are stated next only for the sake of completeness. \ncambios{The equivalence among these characterizations can be done transplanting the techniques in the case without boundary, and the proof will be sketched in Subsection \ref{s4.1}, just after Remarks \ref{r_final}, \ref{r_A}.} \begin{prop}\label{p_stable} For a spacetime-with-timelike-boundary $(\overline{M},g)$ they are equivalent: \begin{enumerate} \item It admits a time function (i.e., the spacetime is stably causal). \item It admits a temporal function $\tau$ (i.e., $\tau$ is smooth with timelike past-directed $\nabla \tau$). \item There exists a strongly causal metric $g'$ with $g<g'$. \end{enumerate} In this case, the spacetime-with-timelike-boundary is also strongly causal. \end{prop} The higher levels of the ladder (related to Geroch's proof of the splitting) will be revisited in Section \ref{s3}. Its definitions (as optimized in \cite{BS07, MSCH} for the case without boundary) \ncambios{are given hereunder. First, recall that the natural topology in $P(\overline{M})$ is the one admitting as a basis the sets $\{U_K: K\subset \overline{M}$ is compact$\}$, where $U_K=\{A\subset \overline{M}: A\cap K=\emptyset\}$, see \cite[Def. 3.37 to Prop. 3.38]{MSCH}.} \begin{defi} A spacetime-with-timelike-boundary $({\overline{M}},g)$ is: \begin{itemize} \item \ncambios{{\em causally continuous}, when the set valued functions $I^{\pm}:\overline{M} \rightarrow P(\overline{M})$ are both one to one (that is, the spacetime is distinguishing) and continuous (for the natural topology in $P(\overline{M})$);} \item {\em causally simple}, when it is causal and all $J^+(p), J^-(p), p\in {\overline{M}}$ are closed; \item {\em globally hyperbolic}, when it is causal and all $J^+(p)\cap J^-(q)$, $p,q\in {\overline{M}}$ are compact. \end{itemize} \end{defi} \subsection{Continuous vs Lipschitz/$H^1$ causal curves}\label{s2.3} Even though the basic definitions in Lorentzian Geometry are carried out with smooth elements (in particular, causal curves are regarded as piecewise smooth), {\em continuous causal} curves are required for relevant purposes. Indeed, a key result is the {\em limit curve theorem} \cite[Prop. 3.31]{Beem} which, under some hypotheses, ensures the existence of a limit curve to a sequence of causal ones, being the limit only continuous causal (even if the causal curves in the sequence are smooth). In the case of distinguishing spacetimes (without boundary), a continuous future-directed causal curve $\gamma: I\subset \mathds R \rightarrow M$ is any continuous curve that preserves the causal relation, that is, satisfying: $t,t'\in I$ and $t<t'$ implies $\gamma(t)<\gamma(t')$, see \cite[Prop. 3.19]{MS}; for non-distinguishing spacetimes, this property is required to be satisfied locally in arbitrarily small neighbourhoods, see \cite[Sect. 3.5]{MS}. Continuous causal curves in a spacetime (without boundary) are known to satisfy a locally Lipschitz condition. This condition allows us to identify these curves (when conveniently reparametrized) with $H^1$ curves. \bcambios{We prefer to speak about $H^1$ curves because, on the one hand, parametrized curves are considered along this paper and, on the other, $H^1$ is the natural regularity for the convergence of curves, not necessarily causal, in other problems, as when spacelike geodesics are studied \cite{CFS, Masiello}.} More precisely, recall that a curve $\gamma:J \rightarrow \mathds R^n$ defined on a compact interval $J$ is $H^1$ when it is absolutely continuous (equally, it satisfies both differentiability almost everywhere and the Fundamental Theorem of Calculus, $ \gamma(t)=\gamma(0)+ \int_{0}^{t} \gamma'(s)ds$, $t\in J$) and $\gamma'$ is $L^2$ integrable; the set of all such curves is the {\em Sobolev space} $H^{1}(J,\mathbb{R}^{n})$. \bcambios{Clearly, Lipschitz curves are $H^1$ and, conversely,} any $H^1$ curve $\gamma$ with $|\gamma'|$ bounded a.e. by a constant is Lipschitz; \bcambios{so}, both conditions will be interchangeable for continuous causal curves. The following is a natural extension to any interval $I$ and \ncambios{manifold-with-boundary} (see \cite[\S 3.1.3]{LuisTesis} for further details). \begin{defi}\label{d_contcausalcurve} Let ${\overline{M}}$ be an $n$ \ncambios{manifold-with-boundary} and $I\subset \mathds R$ any interval. A continuous curve $\gamma:I \rightarrow {\overline{M}}$ is a $H^1$-{\em curve} if, for any local chart $(U,\varphi)$, $\varphi \circ \gamma\mid_{J}$ belongs to $H^{1}(J,\mathbb{R}^{n})$ for all compact intervals $J\subset \gamma^{-1}(U)$. The space of $H^1$-curves from $I$ to ${\overline{M}}$ will be denoted $H^{1}(I,{\overline{M}})$. In the case that $({\overline{M}},g)$ is a spacetime-with-timelike-boundary, $\gamma$ is called {\em future (resp. past) -directed $H^1$-causal} if it is $H^1$ and its a.e. derivative is future (resp. past) -directed $H^1$-causal; $\gamma$ is {\em $H^1$-causal} if it is either future or past-directed $H^1$-causal. \end{defi} For manifolds without boundary, it is proven in \cite[Appendix A]{CFS} that a curve is $H^1$-causal if and only if it is continuous causal (in the sense described above) up to a reparametrization; moreover, from the proof it is also clear that the reparametrization can be always carried out locally by using any temporal function (in this case, $\gamma$ can be regarded as a Lipschitz function, according to the discussion above Defn. \ref{d_contcausalcurve}). \ncambios{Recall that a curve $\gamma$ is a {\em limit curve} of a sequence of curves $\{\gamma_n\}$ on $M$ if there is a subsequence $\{\gamma_m\}$ such that for all $p\in$ Im$( \gamma)$, each neighborhood of $p$ intersects all but finitely many of the $\gamma_m$’s.} Then, the classical theorem of limit curves is also valid in the framework of spacetimes-with-timelike-boundary and $H^{1}$-causal curves, see \cite[Prop. 3.31]{Beem} and \cite[Lemma 3.23]{didier}, namely, just extending $({\overline{M}},g)$ to a manifold without boundary (Prop. \ref{pp}) and applying the results in this case (see \cite[Prop. 3.16]{LuisTesis} for details), i.e.: \begin{prop}\label{p2.11} Let $({\overline{M}},g)$ be a spacetime-with-timelike-boundary and $\{\gamma_m\}_m$ a sequence of future-directed inextensible $H^1$-causal curves. If $p \in {\overline{M}}$ is an accumulation point \ncambios{of $\{\gamma_m\}_m$}, then there exists a limit curve $\gamma$ of $\{\gamma_{m}\}_{m}$ which is a future-directed inextensible $H^1$-causal curve which crosses $p$. \end{prop} \begin{rem}\label{r_Didier} {\em For any strongly causal spacetime-with-timelike-boundary the following alternative notion of continuous causal curve was introduced in Solis' Ph.D. Thesis, see \cite[Def. 3.19 and below]{didier}: a continuous curve $\gamma:I \rightarrow {\overline{M}}$ is {\em future-directed causal} if for any $t_{0} \in I$ there exists a $\widetilde{M}$-convex neighbourhood $U_{0}$ around $\gamma(t_{0})$ (where $(\widetilde{M},\widetilde{g})$ is a spacetime without boundary that extends $({\overline{M}},g)$, see Prop. \ref{pp}) and an interval $[a,b] \subset I$ such that for all $s,t \in [a,b]$ with $s \leq t_{0} \leq t$, one has $\gamma(t) \in J^{+}(\gamma(s),U_{0} \cap {\overline{M}})$. This definition is shown to be independent of the chosen $(\widetilde{M},\widetilde{g})$, and causality relations in $({\overline{M}},g)$ defined by using such continuous curves become equivalent to the classical ones with piecewise smooth ones, see \cite[Remarks 3.20 and 3.21]{didier}. However, it is not obvious from the proof in \cite[Lemma 3.23]{didier}, whether the limit curve theorem for such curves will yield a limit curve which is also continuous causal according to previous definition. \bcambios{Indeed, Appendix B shows a spacetime with ($C^\infty$) timelike boundary containing two points which can be connected by means of a $H^1$-causal curve but not by a piecewise smooth one.} }\end{rem} \bcambios{Such problems will be circumvented here by assuming that the regularity of the causal curves is $H^1$, and computing the causal futures and past consistently with these curves (Convention \ref{convention} below). Indeed, reasoning as in \cite{didier} with $H^1$ curves, we deduce the following key proposition, which is an extension to the case with boundary of the corresponding classical limit curves results in \cite[Prop. 3.34, Cor. 3.32]{Beem}.} \begin{prop}\label{otro} (1) Let $(\overline{M},g)$ be a strongly causal spacetime-with-timelike-boundary. Suppose that $\{\gamma_n\}$ is a sequence of causal curves defined on $[a,b]$ such that $\gamma_n(a)\rightarrow p$, $\gamma_n(b)\rightarrow q$. A causal curve $\gamma:[a,b]\rightarrow \overline{M}$ with $\gamma(a)=p$ and $\gamma(b)=q$ is a limit curve of $\{\gamma_n\}$ \bcambios{(according to the definition recalled above Prop. \ref{p2.11})} iff there is a subsequence $\{\gamma_m\}$ of $\{\gamma_n\}$ which converges to $\gamma$ in the $C^0$ topology on curves. (2) Let $(\overline{M},g)$ be a globally hyperbolic spacetime-with-timelike-boundary. Suppose that $\{p_n\}$ and $\{q_n\}$ are sequences in $\overline{M}$ converging to $p$ and $q$ in $\overline{M}$, resp., with $p\neq q$, and $p_n\leq q_n$ for each $n$. Let $\gamma_n$ be a future-directed causal curve from $p_n$ to $q_n$ for each $n$. Then there exists a future-directed causal limit curve $\gamma$ which joins $p$ to $q$. \end{prop} \subsection{Piecewise smooth vs $H^1$ causal curves}\label{s2.4} \bcambios{The example in the Appendix B shows that the causal future (and, then, the notion of global hyperbolicity) is, in general, different, when computed either with piecewise smooth or with $H^1$-curves. However, in this subsection (which is independent of the remainder up to the final Convention \ref{convention}), we will check:} \begin{enumerate} \item \label{i1} \bcambios{ The chronological futures and pasts are equal when computed with piecewise smooth timelike curves or with $H^1$-curves which are timelike in any reasonable sense (Prop. \ref{p_futuresmooth}, Remark \ref{r_futuresmooth}). } \item \label{i2} Any spacetime which is globally hyperbolic when its causal futures and pasts are computed by means of piecewise smooth curves, it is also globally hyperbolic when they are computed with $H^1$ ones (Prop. \ref{l}), showing Appendix B a counterexample to the converse. \end{enumerate} \bcambios{Let us start with item \ref{i1}. \begin{prop}\label{p_futuresmooth} Let $(\overline{M},g)$ be a spacetime-with-timelike-boundary, $p,q\in {\overline{M}}$ and $\gamma: [\tau_0,\tau_1] \rightarrow \overline{M}$ a future-directed $H^1$-causal curve from $p$ to $q$ which satisfies that, whenever it is parametrized by a local temporal function $\tau$, there exists some $\nu>0$ such that $g(\gamma',\gamma')<-\nu$ a.e. Then, there exists a future-directed timelike piecewise smooth curve from $p$ to $q$. \end{prop}} \begin{proof} Consider first the local case around $p$, i.e., $\gamma$ is included in some convenient coordinate neighborhood of $p$. We will focus on the case $p\in \partial M$, and our proof will hold in the case $p\in M$ with no modification (however, the result is known in the case without boundary, where normal and convex neighborhoods can be used, see \gcambios{ \cite[Sect. 3.2]{Beem} \cite[Lemma 14.2]{O}, \cite[Appendix A]{CFS}}). Take $V=(-\epsilon,\epsilon) \times \bar V_{0}$ as in Cor. \ref{cor}, being cl$(V)$ compact and included in a Gaussian chart with product coordinates chart $(\tau,y^{1},..., y^{n-2}, y^{n-1}\equiv s) $ defined on a cube (with $\{s=0\}$ equal to $V\cap \partial M$). As causality is conformally invariant, we can also assume $g=-d\tau^{2}+g_{\tau}$. As a first simplification, the problem can been reduced to the case when the metric is just the standard Lorentz-Minkowski one $\langle\cdot, \cdot \rangle$ in the chosen coordinates. To check this, narrow slightly the timelike cone at $p$ (that is, consider the Lorentzian scalar product $(-1+\epsilon) d\tau^{2}+g_{\tau}$ at $p$ for small $\epsilon>0$) and extend it as a flat Lorentzian metric $\langle\cdot, \cdot \rangle$ on $V$ with constant coordinate components. Reducing $V$ if necessary, $\gamma$ satisfies $\langle \gamma', \gamma' \rangle < -\nu'$, for some $\nu'>0$ smaller than $\nu$ ($\nu'$ will be relabelled as $\nu$). In order to compute $H^1$-norms and distances, we will consider the natural Euclidean metrics in these coordinates for both, $V$ and $\bar V_0$. In what follows, $|\cdot |_0$ will denote both the norm associated with the natural flat Riemannian metric $\langle\cdot, \cdot \rangle_0$ on $\bar V_0$ (and the usual norm of $\mathds R^{n-1}$). In these coordinates, let $p=(0,y_0=0)$, $q=(\tau_1,y_1)$ and put \begin{equation}\label{e_cgamma} \gamma(\tau)= (\tau,y^{1}_\gamma (\tau), \ldots ,y^{n-2}_\gamma(\tau), y^{n-1}_\gamma(\tau)= s_\gamma(\tau)) \; \equiv (\tau,y_\gamma (\tau)), \; \tau \in [0,\tau_{1}]; \end{equation} recall that $y_\gamma$ is Lipschitz with $|y'_\gamma(\tau)|_0^2 < 1-\nu$, a.e. As a second simplification, it is sufficient to ensure that $p$ and the points of a sequence $\{q_m\}\rightarrow q$ can be joined by means of smooth timelike curves. The reason is that, choosing some small $\delta\in (0,\tau_1)$ and picking the point $q_\delta$ with $\tau(q_\delta)=\tau_1-\delta$ in the same integral curve of $\partial_\tau$ as $q$, the following claim holds: $\gamma$ can be used to construct another future-directed $H^1$-causal curve $\gamma_\delta$ from $p$ to $q_\delta$ with $\langle \gamma'_\delta,\gamma'_\delta \rangle <-\nu/2$ a.e. Thus, all the points in some neighborhood of $q_\delta$ can be connected with $q$ by means of a smooth timelike curve, and the problem is reduced to connect (by means of smooth timelike curves) $p$ and a sequence $\{q_m\}\rightarrow q_\delta$ (then, relabel $q_\delta$ as $q$ and $\nu/2$ as $\nu$). To check the claim, let $\delta:= (\sqrt{1+\nu/2} -1) \tau_1/\sqrt{1+\nu/2}$ and $ \tau_\delta :=\tau_1-\delta$. Clearly, the curve $$\gamma_\delta: [0,\tau_\delta] \longrightarrow V, \qquad \gamma_\delta(\tau):=\left(\tau, y_\gamma \left( \sqrt{1+\nu/2}\, \cdot \tau \right)\right),$$ connects $p$ and $q_\delta:=(\tau_\delta, y_1)$, and writing $\gamma_\delta (\tau)=(\tau, y_\delta (\tau))$ as in \eqref{e_cgamma}: \begin{equation}\label{e_nu} \langle \gamma'_\delta, \gamma'_\delta \rangle = -1 + \langle y'_\delta, y'_\delta \rangle_0 = -1 + (1+\nu/2) \, |y'_\gamma |_0^2 < -1 + (1+\nu/2) (1-\nu) <-\nu/2 \quad \hbox{a.e.} \end{equation} Taking into account the previous two simplifications, the problem can be reduced to the following analytic one. Let $y_\gamma$ as above \eqref{e_cgamma} and $\epsilon >0$ small, then find some smooth ($C^{\infty}$ in our coordinates) curve $x_{\epsilon}$ satisfying: \begin{equation}\label{e4bis1} x_{\epsilon}: [0, \tau_1]\longrightarrow \bar V_0 \quad (\hbox{thus,} \; s\circ x_{\epsilon} \geq 0), \quad x_{\epsilon}(0)=0, \quad |x_{\epsilon}(\tau_{1} )-y_{1}|_0\leq \epsilon, \end{equation} and \begin{equation}\label{e4bis11} l_\epsilon(\tau_1) \leq \tau_1, \qquad \hbox{where} \quad l_\epsilon(\tau)=\int_{0}^{\tau} \sqrt{|x_{\epsilon}'(\bar \tau)|^2_0 + \frac{\nu}{2} } \; \, d\bar \tau , \quad \forall \tau\in [0,\tau_1]. \end{equation} Indeed, in this case the curve $\gamma_{\epsilon}(\tau)=(l_\epsilon( \tau),x_{\epsilon}(\tau))$ will be $C^{\infty}$ and timelike from $p=(0,0)$ to $q'_\epsilon:=(l_\epsilon(\tau_1), x_{\epsilon}(\tau_1) )$. As $q_\epsilon:=(\tau_1, x_{\epsilon}(\tau_1 ))$ lies in the same integral curve of $\partial_\tau$ as $q'_\epsilon$ with $\tau(q'_\epsilon)=l_\epsilon(\tau_1) \leq \tau_1= \tau(q_\epsilon)$, a piecewise smooth timelike curve from $p$ to $q_\epsilon$ also exists. Thus, the result follows from $\lim_{\epsilon \rightarrow 0} q_{\epsilon} =q$. To solve this analytic problem, each component $x_\epsilon^i$ of $x_\epsilon$ will be obtained by means of a covolution $x_\epsilon^i(\tau)=(y^i_\gamma \star \rho_\epsilon)(\tau)$, where $\rho_\epsilon$ is some mollifier. Indeed, put $\epsilon_m:=1/m$ and $x_m:=x_{\epsilon_m}$. For each Lipschitz function $y^i_\gamma: [0,\tau_1]\rightarrow \mathds R$, covolution allows us to find a sequence of functions $\{x^i_m\}_m\subset C^{\infty}([0,\tau_1])$ such that: (a) $|y^i_\gamma-x^i_m|<1/m$, (b)~for some $L>0$, all $x^i_m$ are $L$-Lipschitz and (c) the sequence of derivatives $\{(x^i_m)'\}_m$ converge pointwise to $(y^i_\gamma)'$ a.e. in $[0,\tau_1]$ (for the last property, use for example \cite[Th. 4.1, p. 146]{EG}). Taking into account that $x_m^i(0)=0$ can be assumed additionally (otherwise, recall (a) and add a suitable constant to $x_m^i$), a sequence of curves $\{x_m\}_m$ satisfying the properties in \eqref{e4bis1} is obtained (to ensure $s\circ x_m (=x_m^{n-1})\geq 0$, choose a positive mollifier $\rho_\epsilon$). What is more, the conditions (a) and (b) imply that all the sequences $\{x^i_m\}_m$ and $\{(x^i_m)'\}_m$ are bounded by constants, while (c) implies the pointwise convergence of the corresponding integrands in \eqref{e4bis11} to the limit (expressed in terms of $y'_\gamma$). So, applying the theorem of dominated convergence, the sequence $\{l_m(\tau_1):=l_{\epsilon_m}(\tau_1)\}_m$ converges to: $$ \int_{0}^{\tau_1} \sqrt{|y_\gamma'|_0^2(\tau) + \frac{\nu}{2}} \; d\tau < \; \tau_1, $$ (recall $|y_\gamma'|_0^2<1-\nu$ a.e., see below \eqref{e_cgamma}), and \eqref{e4bis11} holds, as required. Finally, to go from the previous local result to the global one, a standard procedure is followed. Namely, given $\gamma$, for each $\tau\in I:=[\tau_0,\tau_1]$ the local case ensures the existence of some $\delta_\tau>0$ such that, if $\tau'\in (\tau-\delta_\tau,\tau) \cap I$ (resp. $\tau'\in (\tau ,\tau+\delta_\tau ) \cap I$ then there exists a a piecewise smooth future-directed timelike curve starting at $\gamma(\tau')$ and ending at $\gamma(\tau)$ (resp. starting at $\gamma(\tau)$ and ending at $\gamma(\tau')$). Thus, the result follows by taking a Lebesgue number $\delta$ for the obtained open covering of $I$, a partition of $I$ with diameter smaller than $\delta$, and, then, joining each pair of consecutive points for the partition by means of such a smooth timelike curve. \end{proof} \begin{rem}\label{r_futuresmooth} {\em \bcambios{Notice that the conditions imposed in Prop \ref{p_futuresmooth} on $\gamma$ would be a natural definition of being a {\em (future-directed) $H^1$-timelike curve} defined on a compact interval (for non-compact intervals, the definition would be that the restriction of $\gamma$ to any compact interval were $H^1$-timelike in the previous sense). Indeed, clearly, {\em a piecewise smooth curve is timelike in the usual sense if and only if it is $H^1$-timelike as above}.} One could consider a more general definition of $H^1$-timelike curve, by relaxing the inequality $g(\gamma',\gamma')<-\nu$ a.e. into $g(\gamma',\gamma')<0$ a.e. Such a definition would have the drawback that, even if $\gamma$ is smooth, it might be $H^1$-timelike in this generalized sense but not in the usual one. Indeed, this would happen when $\gamma'$ is timelike everywhere but in some points, where it is either lightlike or zero; for example, when $\gamma'$ is lightlike either at a finite number of points, or at a sequence of points and its limit. Even though the proof of Prop.~\ref{p_futuresmooth} might be extended to this general case, we do not feel that this generalized notion of $H^1$-timelike (or any possible alternative, even if it yielded a different sense of the chronological relation) would be useful. Roughly, the reason is that all the $H^1$-causal curves (in particular those with $g(\gamma',\gamma')<0$ a.e., or which were $H^1$-timelike in any reasonable sense) can be approached by sequences of $H^1$-timelike curves $\{\gamma_k\}$ with $g(\gamma'_k,\gamma'_k)<-1/k$ a.e. (namely, locally, if $\gamma=(\tau,y_\gamma(\tau))$ put $\gamma_k=(\tau,\sqrt{1-1/k} \, \cdot y_\gamma(\tau))$), eventually maintaining one fixed endpoint $p\in {\overline{M}}$. For these curves, Prop. \ref{p_futuresmooth} applies; thus, in particular, the corresponding $H^1$-causal future (or past) of $p$ lie in the closure of its chronological future (or past) computed by means of piecewise smooth timelike curves. }\end{rem} Following the discussion of item \ref{i2}, let $J^\pm_{ps}(p)$ be the causal future/past of $p\in{\overline{M}}$ when computed with piecewise smooth causal curves, and $J^\pm_{H^1}(p)$ when computed with $H^1$-causal ones. \begin{prop}\label{l} Let $(\overline{M},g)$ be a spacetime-with-timelike-boundary. If it satisfies the definition of global hyperbolicity computing the causal futures and pasts by using piecewise smooth causal curves, then $J^{\pm}_{ps}(p)=J^{\pm}_{H^{1}}(p)$ for all $p\in \overline{M}$. So, in this case, $(\overline{M},g)$ also satisfies global hyperbolicity by using $H^1$-causal curves. \end{prop} \begin{proof} \bcambios{Let us reason for the future. As $ J^{+}_{ps}(p) \subset J^{+}_{H^{1}}(p)$ is trivial, it is sufficient to check:} \begin{equation}\label{eqq} J^{+}_{H^{1}}(p) \subset cl(I^{+}(p))\subset cl(J^{+}_{ps}(p))=J^{+}_{ps}(p) \qquad\forall p \in \overline{M}. \end{equation} The second inclusion is trivial (recall that $I^+(p)$ is computed with piecewise smooth curves, as discussed above) and the equality means that, in the piecewise smooth case, the causal simplicity of the spacetime follows from its global hyperbolicity (which is proven easily as in the case without boundary or the $H^1$ one, see Lemma \ref{ppp} below). For the first inclusion in \eqref{eqq}, recall that its local version (namely, $p$ admits an open neighborhood $V\subset\overline{M}$, such that $J^{+}_{H^{1}}(q,V) \subset cl(I^{+}(q,V)$ for all $q \in V$) follows from an observation in Remark \ref{r_futuresmooth}: whenever $\gamma=(\tau,y_\gamma(\tau))$ is $H^1$-causal, then $\gamma_k=(\tau,\sqrt{1-1/k} \, \cdot y_\gamma(\tau))$ approaches $\gamma$, it satisfies $g(\gamma_k',\gamma_k')\leq -1/k$ a.e. and, then, Prop.~\ref{p_futuresmooth} applies. To go from this local version to the global one \eqref{eqq}, the following slight modification of the procedure in the proof of Prop. \ref{p_futuresmooth} is carried out. Take any $q \in J_{H^{1}}^{+}(p)$ and let $\gamma: I\rightarrow {\overline{M}}$ be some future-directed $H^{1}$ causal curve joining $p$ with $q$. From the local result, for any $\gamma(r)$, $r\in I$, there exists some open neighbourhood $V_{\gamma(r)}$ such that $J^{+}(q',V_{\gamma(r)})_{H^{1}} \subset cl(I^{+}(q',V_{\gamma(r)}))$ for all $q'\in V_{\gamma(r)}$. So, take a Lebesgue number $\delta>0$ for the open covering $\{\gamma^{-1}(V_\gamma(r)), r\in I\}$ of $I=[a,b]$, and choose a partition $\{r_{0}=a<r_{1},\ldots,<r_{l-1}<r_l=b\}$ with diameter smaller than $\delta$. The case $l=1$ is trivial, and assume by induction that \eqref{eqq} holds for $l-1$. Let $r$ be so that $\gamma([r_{l-1},r_{l}]) \subset V_{\gamma(r)}$ and, thus, $\gamma(b) \in cl(I^{+}(\gamma(r_{l-1}),V_{\gamma(r)}))$. So, there is a sequence $\{q_m\}\rightarrow q$ such that $\gamma(r_{l-1})\in I^{-}(q_m,V_{\gamma(r)})$ for all $m$. Therefore, for each $q_m$ all the points in some neighborhood $U_m\ni \gamma(r_{l-1})$ lie in $I^-(q_m,V_{\gamma(r)})$. By the hypothesis of induction, some $u_m\in U_m$ belongs to $I^+(p)$ and, so, $p\ll u_m \ll q_m$ for all $m$, as required. \end{proof} \begin{conv}\label{convention} {\em \bcambios{In what follows, all the causal curves will be $H^1$-causal, all the futures and pasts are computed with $H^1$-curves and all the corresponding causal definitions are carried out accordingly. Consistently, from now on, $J^\pm(p)$ means $J^\pm_{H^1}(p)$. For timelike curves, classical piecewise smooth regularity will be used.} \bcambios{As a summary, the consistency of this convention comes from the following facts. About $H^1$-causal curves: (a) they are equivalent to classical continuous causal curves in manifolds without boundary, (b) they are intrinsic (extensions $\widetilde{M}$ of ${\overline{M}}$ are not required), (c) they are preserved by limit curves in the same way as in the case without boundary, and (d) they lead to a more general notion of globally hyperbolic \bcambios{spacetime-with-boundary}, where our results apply. About piecewise smooth timelike curves: (a)~they can connect the same endpoints as $H^1$-timelike ones, and (b) $H^1$-causal curves can be approched by piecewise smooth timelike ones, even fixing one of the endpoints.} } \end{conv} \section{ Topological splitting and Geroch's equivalence }\label{s3} \subsection{Higher steps of the causal ladder.}\label{s3.2} Geroch's proof of the topological splitting of any globally hyperbolic spacetime (without boundary) $(M,g)$ is based on the existence of a time function constructed by computing certain volumes using an appropriate measure $m$. The conditions to be satisfied by $m$ are very mild; indeed, they are satisfied by the measure associated to any semi-Riemannian metric $g^*$ such that the total volume of the manifold is finite (so, one can choose $g^*$ conformal to the original Lorentzian metric $g$). However, following Dieckmann (\cite{Dieckmann}; see also \cite[section 3.7]{MSCH}) the abstract properties required for a measure on ${\overline{M}}$ will be recalled first. Given the \ncambios{spacetime-with-boundary} $(\overline{M},g)$, $\overline{M}=M \cup \partial M$, consider the $\sigma$-algebra $\mathfrak{A}(\tau_{\overline{M}} \cup \overline{Z})$ \color{blue}{generated by} the topology $ \tau_{\overline{M}}$ of $ \overline{M}$ in addition to the set $\overline{Z}$ containing the \color{blue}{zero-measure} sets of $\overline{M}$. Since $M$ is an open subset of $\overline{M}$, the $\sigma$-algebra $\mathfrak{A}(\tau_{M} \cup Z)$ of $M$ coincides with the induced $\sigma$-algebra of $\mathfrak{A}(\tau_{\overline{M}} \cup \overline{Z})$ over $M$, that is, with the set $\{E \cap M \mid E \in \mathfrak{A}(\tau_{\overline{M}} \cup \overline{Z})\}$. In a natural way, the {\em measures} on the previous $\sigma$-algebras will be called just measures on ${\overline{M}}$ or $M$, consistently. It is straightforward to check that if $m$ is a measure on $M$ then it induces naturally a measure $\overline{m}$ on ${\overline{M}}$ just imposing $\overline{m}(\partial M)=0$, that is, \[ \overline{m}(A):=m(A \cap M)\quad\hbox{for any $A \in \mathfrak{A}(\tau_{\overline{M}} \cup \overline{Z})$.} \] \begin{defi}\label{d_admissible} A measure $\overline{m}$ on ${\overline{M}}$ is {\em admissible} when it satisfies: \begin{enumerate} \item $\overline{m}(\overline{M})<\infty$; \item $\overline{m}(U)>0$ for any open subset $U \subset \overline{M}$; \item $\overline{m}(\dot I^{\pm}(p))=0$ ($\dot I^{\pm}(p)$ denotes the topological boundary of $I^{\pm}(p)$ in ${\overline{M}}$ ), $\forall p \in \overline{M}$; \item \ncambios{$\overline{m}$ is {\em inner regular}, i.e.} for any open subset $U \subset \overline{M}$ there exists a sequence $\{K_{n}\}_{n}\subset \overline{M}$ of compact subsets such that $K_{n} \subset K_{n+1}$, $K_{n} \subset U$ for all $n$ and $\overline{m}(U)=\lim_{n} \overline{m}(K_{n})$. \end{enumerate} \end{defi} \begin{prop}\label{p_admiss} If $m$ is an admissible measure on $M$ then the induced measure $\overline{m}$ on ${\overline{M}}$ is also admissible. \end{prop} \begin{proof} Properties 1, 2, 4 in Def. \ref{d_admissible} are straightforward. To prove 3, it is enough to check, say, $m(\dot I^{-}(p) \cap M)=0$. This holds because it is an achronal edgeless subset of $M$, since $\dot I^{-}(p)$ can be written locally as a graph by using Cor. \ref{cor}. \ncambios{(Notice also the inclusions $I^+(p)\subset cl(I^+(p)) \subset cl(J^+(p))=cl(I^+(p))$, so the measure of $I^+(p)$ coincides with the measure of $cl(J^+(p))$.)} \end{proof} \begin{rem} {\em An alternative way to define an admissible measure $\overline{m}$ on ${\overline{M}}$ is to consider any admissible measure on an extension $\tilde{M}$ of $({\overline{M}}, g)$ (as in Prop. \ref{pp}) and taking the restriction to ${\overline{M}}$.} \end{rem} In what follows, an admissible measure $\overline{m}$ is fixed on ${\overline{M}}$. \begin{defi} The function $t^{-}(p):=\overline{m}(I^{-}(p))$ (resp. $t^{+}(p):=-\overline{m}(I^{+}(p))$) is the {\em past} (resp. {\em future}) {\em volume function} associated to $\overline{m}$. \end{defi} Trivially, the volume functions are non-decreasing on any future-directed causal, but they are constant on any closed causal curve. The next two propositions hold as in the case without boundary (we refer to \cite[Sect. 3.2.1]{LuisTesis} for detailed proofs). \begin{prop}\label{p_dist} If $(\overline{M},g)$ is past (resp. future) distinguishing, the volume function $t^-$ (resp. $t^+$) is (strictly) increasing over any future-directed causal curve $\gamma$. \end{prop} \begin{prop}\label{p_creer} For any spacetime with timelike boundary $({\overline{M}},g)$ the following properties are equivalent: \begin{enumerate} \item The set valued function $I^+$ (resp. $I^-$) is continuous on ${\overline{M}}$. \item The volume function $t^+$ (resp. $t^-$) is continuous on ${\overline{M}}$. \item $({\overline{M}}, g)$ is {\em past} (resp. {\em future}) {\em reflecting}, that is, for all $p, q\in {\overline{M}}$: $q\in cl(I^+(p)) \Rightarrow p\in cl(I^-(q)) \qquad\hbox{(resp. $p\in cl(I^-(q)) \Rightarrow q\in cl(I^+(p))$.)}$ \end{enumerate} So, a distinguishing spacetime-with-timelike-boundary is causally continuous if and only if some/any of the previous equivalent properties (for the future and the past) hold, or equivalently, if and only if both volume functions $t^+, t^-$ are time functions. \end{prop} The following result will allow to complete the implications of the ladder, taking into account the optimized definitions of global hyperbolicity and causal simplicity used here (consistent with \cite{BS07}). \begin{lemma}\label{ppp} Let $(\overline{M},g)$ be a spacetime-with-timelike-boundary. (a) If it is causally simple then it is causally continuous. (b) If it is globally hyperbolic then it is causally simple. \end{lemma} \noindent {\bf Proof:} (a) We have to prove that is both distinguishing and (future and past) reflecting, \ncambios{recall Prop. \ref{p_creer}}. For the former, following \cite{BS07}, if $p\neq q$ but, say, $I^+(p)=I^+(q)$ then choose any sequence $\{q_n\}\rightarrow q$ with $q\ll q_n$ and, thus, $p\ll q_n$. Then $q\in cl(I^+(p))=cl(J^+(p))=J^+(p)$ (the first equality by Prop. \ref{p_opentrans} and the second by hypothesis). Analogously, $p\in J^+(q)$ and there is a closed causal curve with endpoints at $p$ crossing $q$. For the latter property, causal simplicity implies $J^{\pm}(p)=cl(I^{\pm}(p))$ and, thus, the reflectivity becomes equivalent to the trivially true property $q\in J^+(p) \Leftrightarrow p\in J^-(q)$. (b) Following \cite[Props. 3.16, 3.17]{didier}), let us check that, say, $J^+(p)$ is closed. Let $r= \lim_m r_m$ with $r_m\in J^+(p)$. Since ${\partial M}$ is timelike, there exists some $q\in I^+(r)$ and $r_m\in I^-(q)$ for large $m$. Then, $r\in cl(J^+(p)\cap J^-(q))= J^+(p)\cap J^-(q)$ (the latter by global hyperbolicity), and thus, $r\in J^+(p)$. \ \rule{0.5em}{0.5em} \smallskip \begin{thm}\label{t_ladder} Let $({\overline{M}},g)$ be a spacetime-with-timelike-boundary. \begin{enumerate} \item If $({\overline{M}},g)$ is causally continuous then it is stably causal. Moreover, $(M,g|_M)$ is causally continuous and $({\partial M},g|_{{\partial M}})$ is stably causal. \item If $({\overline{M}},g)$ is causally simple then it is causally continuous. \item If $({\overline{M}},g)$ is globally hyperbolic then it is causally simple. Moreover, $({\partial M},g|_{{\partial M}})$ is globally hyperbolic too. \end{enumerate} \end{thm} {\em Proof.} 1. The first assertion follows because any of the volume functions $t^+,t^-$ provides the required time function (recall Prop. \ref{p_creer}). Moreover, $\partial M$ is also stably causal because, trivially, the restrictions of these functions to ${\partial M}$ are also time functions. The causal continuity of the interior $M$ is again a consequence of Prop. \ref{p_creer} taking into account that $t^\pm$ are both continuous on all ${\overline{M}}$ and their restrictions on $M$ agree with the volume functions for the measure $m$ on $M$. Indeed, as $I^\pm(p,M)= I^\pm(p)\cap M$ (Prop.~\ref{p_opentrans}), $m(I^\pm(p,M))=\overline{m}(I^\pm(p))$ for all $p\in M$, and the result follows. 2. This is just Lemma \ref{ppp} (a). 3. The first assertion is just Lemma \ref{ppp} (b). The last assertion follows from \cite[Prop. 3.15]{didier}, we include the proof for completeness. As ${\partial M}$ is strongly causal, from previous items 1 and 2 it is enough to check that $cl(J^+(p,{\partial M})\cap J^-(q,{\partial M}))$ is compact (see \cite[Lemma 4.29]{Beem}). Now, any sequence in this subset admits a subsequence converging to some $r \in J^+(p) \cap J^-(q)$ and, as ${\partial M}$ is closed in ${\overline{M}}$, $r \in cl(J^+(p,{\partial M})\cap J^-(q,{\partial M}))$. \begin{rem}\label{r_counterexamples} {\em Thm. \ref{t_ladder} and Prop. \ref{p_ord_lowerlevels} allow us to reobtain the strict ordering of all the steps in the classical causal ladder in the case with boundary. The following examples show, in particular, that the inherited properties for $M$ and ${\partial M}$ are optimal. (1) Start with the closed half space of Lorentz-Minkowski 3-space $\{(t,x,y)\in {\mathbb L}^3: y\geq 0\}$ and remove the line $L=\{(0,x,0) \mid x \geq 0\}$. Since the interior $M$ is causally continuous and the continuous extension of the $M$-volume functions to the whole ${\overline{M}}$ agree with the volume functions on ${\overline{M}}$, the spacetime ${\overline{M}}$ is causally continuous (recall Prop. \ref{p_creer}), but, clearly, ${\partial M}$ is not (see Fig. \ref{fig1}). \begin{figure}[hbt!] \centering \ifpdf \setlength{\unitlength}{1bp}% \begin{picture}(240,150)(0,0) \put(0,0){\includegraphics[scale=.25]{NonCausallyContinuousB}} \put(150.00,48.00){\fontsize{14.23}{17.07}\selectfont $L$} \put(08.00,98.90){\fontsize{14.23}{17.07}\selectfont $\partial M$} \put(83,100.00){\fontsize{09.50}{0.0}\selectfont $p$} \put(82.30,118.00){\fontsize{09.50}{0.0}\selectfont $p'$} \put(220.30,25.00){\fontsize{14.23}{17.07}\selectfont $M$} \put(82,35.00){\fontsize{09.00}{0.0}\selectfont $y$} \put(84,55.900){\fontsize{09.00}{0.0}\selectfont $x$} \put(68.5,67.50){\fontsize{09.00}{0.0}\selectfont $t$} \put(64,42){\fontsize{09.00}{0.0}\selectfont $0$} \end{picture}% \else \setlength{\unitlength}{1bp}% \begin{picture}(240,150)(0,0) \put(0,0){\includegraphics[scale=.25]{NonCausallyContinuousB}} \put(150.00,48.00){\fontsize{14.23}{17.07}\selectfont $L$} \put(08.00,98.90){\fontsize{14.23}{17.07}\selectfont $\partial M$} \put(83,100.00){\fontsize{09.50}{0.0}\selectfont $p$} \put(82.30,118.00){\fontsize{09.50}{0.0}\selectfont $p'$} \put(220.30,25.00){\fontsize{14.23}{17.07}\selectfont $M$} \put(82,35.00){\fontsize{09.00}{0.0}\selectfont $y$} \put(84,55.900){\fontsize{09.00}{0.0}\selectfont $x$} \put(68.5,67.50){\fontsize{09.00}{0.0}\selectfont $t$} \end{picture}% \fi \caption{\label{fig1} \bcambios{The spacetime-with-timelike-boundary ${\overline{M}}=\{(t,x,y) \in {\mathbb L}^3 \mid y \geq 0\} \setminus L$, where $L=\{(0,x,0) \mid x \geq 0\}$, with the Lorentzian metric $g=-dt^2+dx^2+dy^2$ and timelike boundary $\partial M = \{(t,x,y) \in {\mathbb L}^3 \mid y=0\}$ is depicted. If we take a point $p' \in {\partial M}$ slightly to the future of $p \in \partial M$, then, the volume function restricted to the boundary is not continuous at $p$. So, $({\partial M},g\mid_{\partial M})$ is not causally continuous. }} \end{figure} (2) Consider now ${\overline{M}}={\mathbb L}^3\setminus C$, where $C$ is the timelike cylinder $\mathds R\times D$, being $D$ the disk $\{x^2+y^2<1\}\subset \mathds R^2$. Clearly, $J^+(p,M)$ is not closed whenever there exists a future-directed lightlike half-line $l$ starting at $p\in M$ and tangent to $C$ at some point $\hat q\in C$; indeed, the points in $l$ beyond $\hat q$ will lie in $cl(J^+(p,M))\setminus J^+(p,M)$. That is, in general $M$ is not causally simple, even if ${\overline{M}}$ is globally hyperbolic with timelike boundary. \begin{figure}[hbt!] \centering \ifpdf \setlength{\unitlength}{1bp}% \begin{picture}(160,140)(0,0) \put(0,0){\includegraphics[scale=.25]{Causallysimpleint}} \put(-10.00,108.90){\fontsize{14.23}{17.07}\selectfont $M$} \put(40.00,108.90){\fontsize{14.23}{17.07}\selectfont ${\partial M}$} \put(0,0){\fontsize{11.50}{0.0}\selectfont $p$} \put(88,70.00){\fontsize{11.50}{0.0}\selectfont $\hat q$} \put(158.90,122.90){\fontsize{14.23}{17.07}\selectfont $r$} \put(45.00,33.90){\fontsize{15.50}{0.0}\selectfont $l$} \end{picture}% \else \setlength{\unitlength}{1bp}% \begin{picture}(160,140)(0,0) \put(0,0){\includegraphics[scale=.25]{Causallysimpleint}} \put(-10.00,108.90){\fontsize{14.23}{17.07}\selectfont $M$} \put(40.00,108.90){\fontsize{14.23}{17.07}\selectfont ${\partial M}$} \put(0,0){\fontsize{11.50}{0.0}\selectfont $p$} \put(88,70.00){\fontsize{11.50}{0.0}\selectfont $\hat q$} \put(158.90,122.90){\fontsize{14.23}{17.07}\selectfont $r$} \put(45.00,33.90){\fontsize{15.50}{0.0}\selectfont $l$} \end{picture}% \fi \caption{\label{cylinder02}\bcambios{Observe that the lightlike line $l$ touches the timelike boundary ${\partial M}$ at a unique point $\hat{q}$. So, if we consider the spacetime (without boundary) $(M,g)$ then the points $p$ and $r$ are not causally related in $M$. However, we have that $r \in cl(J^{+}(p,M)) \setminus J^{+}(p,M)$, so, $(M,g)$ is not causally simple.}} \end{figure} (3) Finally, consider the closure of the previous cylinder, $\overline{C}= \mathds R\times \overline{D}\subset {\mathbb L}^3$, take the arc $A=\{(0,\cos \theta,\sin \theta): 0\leq \theta \leq \pi/4\}$ and consider the spacetime ${\overline{M}} = \overline{C}\setminus A$ (see Fig. \ref{cylinder01}). Clearly, $\partial M$ is not causally continuous. However, ${\overline{M}}$ (and also $M$) is causally simple. Indeed, for each $p\in M$, it is obvious not only that $J^\pm(p,M)$ is closed but also that so is $J^{\pm}(p)$. This happens even if $p\in {\partial M}$ because any $q (\neq p)$ in the boundary of $J^{\pm}(p)$ can be joined with $p$ by means of a lightlike segment included in $M$ up to the endpoints. \ncambios{(From a more general viewpoint, this property happens because ${\partial M}$ is strongly light-convex; see \cite[Sect. 3.2 and Thm. 3.5]{CGS} for further background and results.)} \begin{figure}[hbt!] \centering \ifpdf \setlength{\unitlength}{1bp}% \begin{picture}(95,140)(0,0) \put(0,0){\includegraphics[scale=.25]{Cylinder01v02}} \put(-29.00,118.90){\fontsize{14.23}{17.07}\selectfont $\partial M$} \put(20.00,108.90){\fontsize{14.23}{17.07}\selectfont $M$} \put(110,30.00){\fontsize{11.50}{0.0}\selectfont $p$} \put(95,70.00){\fontsize{11.50}{0.0}\selectfont $A$} \put(-8.00,105.90){\fontsize{11.50}{0.0}\selectfont $q$} \end{picture}% \else \setlength{\unitlength}{1bp}% \begin{picture}(95,140)(0,0) \put(0,0){\includegraphics[scale=.25]{Cylinder01v02}} \put(-29.00,118.90){\fontsize{14.23}{17.07}\selectfont $\partial M$} \put(20.00,108.90){\fontsize{14.23}{17.07}\selectfont $M$} \put(110,30.00){\fontsize{11.50}{0.0}\selectfont $p$} \put(95,70.00){\fontsize{11.50}{0.0}\selectfont $A$} \put(-8.00,105.90){\fontsize{11.50}{0.0}\selectfont $q$} \end{picture}% \fi \caption{\label{cylinder01}\bcambios{The timelike boundary ${\partial M}$ is not causally continuous. In fact, the future volume function of ${\partial M}$ \gcambios{ will not be continuous at $p$ (check this by taking $p' \in {\partial M}$ slightly to the past of $p \in {\partial M}$); so, neither is ${\partial M}$ causally simple. } However, the spacetime-with-timelike-boundary ${\overline{M}}$ is causally simple since any point $q \in \partial J^{+}(p)$ can be connected by a lightlike \gcambios{segment which is included in $M$ except, at most, its endpoints.} }} \end{figure} } \end{rem} \subsection{Cauchy hypersurfaces and extended Geroch's proof.} \label{s3.3} Formally, our notion of Cauchy hypersurface for a spacetime-with-timelike-boundary is equal to the minimal one developed in \cite{O} for the case without boundary. \begin{defi}\label{d_CauchyHyp} Let $(\overline{M},g)$ be a spacetime-with-timelike-boundary. An achronal set $\bar{\Sigma}\subset \overline{M}$ is a {\em Cauchy hypersurface} if it is intersected exactly once by every inextensible timelike curve. \end{defi} Next, let us check some properties of Cauchy hypersurfaces (in particular, that they are truly hypersurfaces) by adapting the approach in \cite[pp. 413-415]{O}. \begin{defi}\label{d_achronal} Let $({\overline{M}},g)$ be a spacetime-with-timelike-boundary of dimension $n$. (1) A subset $\bar S\subset {\overline{M}}$ is a {\em (embedded) topological hypersurface transverse to ${\partial M}$} if for any $p\in \bar S$ there exists an open neighborhood $V\subset {\overline{M}}$ of $p$ and a homeomorphism $\phi: V \rightarrow (-\epsilon,\epsilon)\times N$, where $N$ is an open subset of $\mathds R^{n-2}\times [0,\epsilon)$, such that $\phi(V\cap \bar S)=\{0\}\times N$. In this case, $\bar S$ is {\em locally Lipschitz} if the previous homeomorphism can be chosen Lipschitz when written in smooth coordinates. (2) The {\em edge} of an achronal set $A \subset \overline{M}$ is the set of all the points $p \in cl(A)$ such that, for every open neighborhood $U\subset \overline{M}$ of $p$, there exists a timelike curve contained in $U$ from $I^{-}(p,U)$ to $I^{+}(p,U)$ that does not intersect $A$. \end{defi} \begin{prop}\label{pf} Let $(\overline{M},g)$ be a spacetime-with-timelike-boundary. An achronal set $A$ with $A\cap {\rm edge}(A)=\emptyset$ is a locally Lipschitz hypersurface transverse to ${\partial M}$. \end{prop} \begin{proof} The condition on ${\rm edge}(A)$ implies that the achronal set $A\cap M$ contains no edge points, thus, from \cite[Prop. 14.25]{O}) $A\cap M$ is a topological hypersurface without boundary in $(M,g)$. So, let $\hat{p} \in A \cap \partial M\neq\emptyset$ and let us construct a Lipschitz topological chart $(V,\phi)$ centered at $\hat{p}\in V \subset \overline{M}$ as in Defn. \ref{d_achronal} (1). Since $A\cap {\rm edge}(A)=\emptyset$, there exists some open neighbourhood $U$ of $\hat{p}$ such that any timelike curve contained in $U$ going from $I^{-}(\hat{p},U)$ to $I^{+}(\hat{p},U)$ intersects $A$. Without loss of generality, we can assume that $(U,\psi=(x^{0},\ldots,x^{n-1}))$ is a Gaussian chart centered at $\hat{p}$ such that $\psi(U)$ is a cube. Consider the subset $(-\epsilon,\epsilon) \times N_0 \subset \psi(U) $, where $N_0=\{ y\in \mathds R_+^{n-1}: (0,y)\in \psi(U)\}$. The required neighbourhood $V\ni\hat p$ will be $V=\psi^{-1}((-\epsilon, \epsilon) \times N)$, where $N\subset N_0$ is any (half) open ball centered at $0$ for the natural Euclidean metric $|\cdot |$ in the coordinates $\hat x:=(x^1, \dots, x^{n-1})$, with small radius so that $N$ is relatively compact in $N_0$ and the slices $x^0=\pm \epsilon/2$ satisfy: \[ \{q\in \bv V \ev : x^0(q)=-\epsilon/2\} \subset I^-(\hat{p},U)\quad\hbox{and}\quad \{q\in \bv V \ev : x^0(q)=\epsilon/2\} \subset I^+(\hat{p},U) \] (this can be achieved trivially because $\partial_0$ is timelike). Now, the integral curve of $\partial_0$ starting at any $(0,y)\in \{0\}\times N$ must intersect both $I^-(\hat{p},U)$ and $I^+(\hat{p},U)$. Thus, it must intersect $A$ (recall $U\supset V$ and $\hat p\not\in {\rm edge} (A)$) in a point $y_q$, which is unique by the achronality of $A$. So, $A \cap V$ can be regarded as the graph of the function $h:N \rightarrow (-\epsilon, \epsilon)$, $h(q):=x^0(y_{q})$. To show that $h$ is Lipschitzian will be enough because, in this case, the desired chart $\phi$ on $V$ is just: $$ \phi(\psi^{-1}(x^0,\ldots,x^{n-1}))= (x^0-h(x^{1},\ldots,x^{n-1}), x^{2},\ldots,x^{n-1})$$ The Lipschitz condition will be checked with respect to the distance $|\cdot |$ induced in $V$ by $\psi$ from the Euclidean one. Recall first that, as $cl(V)$ is compact and $\partial_0$ is timelike, there exists some small $c>0$ such that the flat Lorentzian metric $g_c=-c^2 (dx^0)^2 + \sum_{i=1}^{n-1}(dx^i)^2$ satisfies $g_c <g$. The Lipschitz condition $|h(x)-h(y)| < c^{-1}| x-y|$ must hold for all $x, y \in N$ because, otherwise, the points $(h(x), x), (h(y),y)$ would be (future or past) causally related for $g_c$ and, thus, for $g$ (in contradiction with the achronality of $A$). \end{proof} Other properties of achronal sets (including a converse to Prop. \ref{pf}) can be found in \cite[Sect. 3.2.3]{LuisTesis}. Next, we focus on consequences for Cauchy hypersurfaces. \begin{cor}\label{co} (1) An achronal set $A$ with ${\rm edge}(A)=\emptyset$ is a closed (as a subset of ${\overline{M}}$) locally Lipschitz hypersurface transverse to $\partial M$. (2) Let $F \neq \emptyset, {\overline{M}}$ be a future set (i.e $I^+(F)=F$). Then, its topological boundary $\dot F$ is an achronal closed locally Lipschitz hypersurface transverse to $\partial M$. (3) Any Cauchy hypersurface $\bar{\Sigma}$ of $(\overline{M},g)$ is an achronal closed locally Lipschitz hypersurface with boundary transverse to ${\partial M}$. \end{cor} \begin{proof} (1) Prop. \ref{pf} implies that $A$ is a locally Lipschitz hypersurface transverse to $\partial M$. Closedness follows directly from the general inclusion $cl(A) \setminus A \subset {\rm edge}(A)$, which happens because, if $q \in cl(A) \setminus A$, no timelike curve through $q$ can intersect $A$ ($A$ achronal implies $cl(A)$ achronal, as the chronological relation is also open in the case with boundary; recall Prop. \ref{p_opentrans} (a)) and, so, $q \in {\rm edge}(A)$. (2) Taking into account elementary properties of transitivity (Prop. \ref{p_opentrans}), $$I^{+}(\dot F) \subset \hbox{interior}(F),\quad I^{-}(\dot F) \subset \overline{M} \setminus cl(F), \quad\hbox{in particular,}\quad I^{+}(\dot F) \cap I^{-}(\dot F)=\emptyset . $$ From this last equality $\dot F$ is achronal. From the part (1), to prove ${\rm edge}(\dot F)=\emptyset$ suffices and, since $\dot F$ is closed, ${\rm edge}(\dot F) \subset \dot F$, that is, to prove ${\rm edge}(\dot F)\cap \dot F=\emptyset$ suffices too. Assuming $p\in {\rm edge}(\dot F)\cap \dot F$, there exists a timelike curve starting at $I^-(p)$ (thus, in $\overline{M} \setminus cl(F)$) and ending at $I^+(p)$ (in ${\rm int}(F)$) without crossing $\dot F$, a contradiction. (3) Clearly, ${\overline{M}}$ is the disjoint union $\overline{M}=I^{+}(\bar{\Sigma}) \cup \bar{\Sigma} \cup I^{-}(\bar{\Sigma})$. So, $\bar{\Sigma}$ is the boundary of the future set $F=I^{+}(\bar{\Sigma})$ and the part (2) applies. \end{proof} Next, let us re-take the existence of a Cauchy time function. Let \begin{equation}\label{geroch} t: \overline{M} \rightarrow \mathbb{R},\quad t(p):=\ln\left(-\frac{t^{-}(p)}{t^{+}(p)}\right) \end{equation} be a {\em Geroch function}. From Thm. \ref{t_ladder} and Prop. \ref{p_creer}, this function is continuous for any globally hyperbolic spacetime-with-timelike-boundary. Thus, we have the elements to extend Geroch's equivalence to the case with boundary. \begin{thm}\label{t_geroch} For any globally hyperbolic spacetime-with-timelike-boundary $(\overline{M},g)$, the Geroch function $t$ in \eqref{geroch} is a (acausal) Cauchy time function, that is, $t$ is a time function and all its levels are acausal Cauchy hypersurfaces. Thus, if $\bar{\Sigma}_0=t^{-1}(0)$ then ${\overline{M}}$ is homeomorphic to $\mathds R\times \bar{\Sigma}_0$, and any other Cauchy hypersurface $\bar{\Sigma}$ is homeomorphic to $\bar{\Sigma}_0$. Conversely, any spacetime-with-timelike-boundary admitting a Cauchy hypersurface is globally hyperbolic. \end{thm} \begin{proof} As the sum $t$ of the time functions $\ln t^-$ and $\ln (-t^+)$ is also a time function, its levels are acausal, and $t$ will be Cauchy if, for any inextensible past-directed causal curve $\gamma:(a,b) \rightarrow \overline{M}$, \[ \lim_{s \rightarrow a} t^{-}(\gamma(s))=0, \qquad ( \hbox{and analogously} \; \lim_{s \rightarrow b} t^{+}(\gamma(s))=0), \] so that $\lim_{s \rightarrow a} t(\gamma(s))=-\infty$ and $\lim_{s \rightarrow b} t(\gamma(s))=\infty$ (as in the case without boundary). To check $\lim_{s \rightarrow a} t^{-}(\gamma(s))=0$, recall that the measure of ${\overline{M}}$ can be approximated by compact subsets (Prop. \ref{p_admiss}). So, for any $\epsilon>0$ there exists some compact $K\subset \overline{M}$ with $\overline{m}({\overline{M}}\setminus K)<\epsilon$ and one has just to show that there exists $s_{0} \in (a,b)$ such that $I^{-}(\gamma(s_{0})) \cap K=\emptyset$ (as this implies $ t^-(\gamma(s))=\overline{m}(I^{-}(\gamma(s))) \leq \overline{m}({\overline{M}})-m(K)<\epsilon, $ for all $s \leq s_{0}$). Assuming by contradiction the existence of a sequence $\{s_{m}\} \rightarrow a$ with $I^{-}(\gamma(s_{m})) \cap K \neq \emptyset$ for all $m$, there exists a sequence $\{r_{m}\}_{m} \subset K$ with $r_{m} \in I^{-}(\gamma(s_{m}))$; by the compactness of $K$, $\{r_{m}\} \rightarrow r \in K$ up to a subsequence. Taking $p \in I^{-}(r)$ and some fixed $q=\gamma(c)$, one has $p \ll r_{m} \ll \gamma(s_{m}) \ll q$ for large $m$. This implies $\gamma(a,c] \subset J^{+}(p) \cap J^{-}(q)$, that is, a past inextensible causal curve is imprisoned in the compact subset $J^{+}(p) \cap J^{-}(q)$, which contradicts \ncambios{Cor. \ref{imprisonedb}}. To obtain the homeomorphism, Prop. \ref{extendfield} ensures the existence of a future-directed timelike vector field $T \in \mathfrak{X}(\overline{M})$ whose restriction to $\partial M$ is tangent to $\partial M$. With no loss of generality, $T$ can be chosen unit for some auxiliary complete Riemannian metric $g_{R}$ on $\overline{M}$. Then, $T$ is complete and, so, its integral curves are inextensible timelike curves in $\overline{M}$. From the part (a), $t$ diverges along the integral curves of $T$, and each integral curve of $T$ intersects $\bar{\Sigma}_{0}=t^{-1}(0)$ at a unique point $x\in \bar{\Sigma}_0$, which will be regarded as the initial point of each integral curve $\gamma_x$ of $T$. So, every $p\in \overline{M}$ can be written univocally as $\gamma_x(t)$ for some $x\in \bar{\Sigma}_0$ and $t\in \mathds R$. Therefore, the map $\Psi: {\overline{M}}\rightarrow \mathds R\times \bar{\Sigma}_0$, $p\mapsto (t,x)$ is continuous, bijective and maps boundaries into boundaries. For the continuity of $\Psi^{-1}$, recall that, in the case without boundary, it is straightforward by the theorem of invariance of the domain. In the case with boundary just apply it to the double manifold ${\overline{M}}^d$. That is, notice that the identification of homologous points of the two copies of ${\overline{M}}$ yields also an extended hypersurface without boundary $\bar{\Sigma}_0^d$ (recall that Cor. \ref{co} (3) ensures that the boundary of $\bar{\Sigma}_0$ is included in $ \partial M$); so, extend naturally $\Psi$ to a continuous bijective map $\Psi^d: {\overline{M}}^d \rightarrow \mathds R\times \bar{\Sigma}_0^d$, which will be then a homeomorphism. Moreover, for any Cauchy hypersurface $\bar{\Sigma}$ clearly $\Psi(\bar{\Sigma})$ can be regarded as the graph of a locally Lipschitz function $h:\bar{\Sigma}_0\rightarrow \mathds R$. So, the continuos map $\bar{\Sigma}_0\ni x \mapsto (h(x),x) \in \Psi(\bar{\Sigma})$ is the required homeomorphism. Finally, the converse follows as in the case without boundary (see \cite[Th.8.3.10]{Wald}, \cite[Cor. 14.39]{O} for the proof) just taking into account that the limit curve theorem (which is the essential tool for that case) still holds here (Prop. \ref{p2.11}). \end{proof} \section{Stability}\label{s_Stab} \subsection{Results for global hyperbolicity and Cauchy temporal functions}\label{s_Stab1} Next, our aim is to prove the following two theorems. \begin{thm}[Stability of global hyperbolicity] \label{T0} Let $({\overline{M}}, g)$ be a globally hyperbolic spacetime-with-timelike-boundary. Then, there exists a metric $g'>g$ (thus, necessarily with timelike boundary) which is also globally hyperbolic. \end{thm} This result will be used to prove that such a spacetime $({\overline{M}}, g)$ admits a Cauchy temporal function $\tau$ {\em with gradient} $\nabla\tau$ {\em tangent to} ${\partial M}$ by reducing the problem to the simple case when ${\partial M}$ is totally geodesic. However, once the existence of such functions is established, the following stronger stability result for the restrictive properties of the obtained $\tau$ will become interesting in its own right. \begin{thm}[Stability of Cauchy temporal functions] \label{T1} If $\tau$ is a Cauchy temporal function for a globally hyperbolic metric $g$ with $\nabla\tau$ tangent to $\partial M$, then there exists $g'$ with wider timecones, $g< g'$, such that $\tau$ is also a Cauchy temporal function for $g'$ with $g'$-gradient tangent to ${\partial M}$. Moreover, $\tau$ is Cauchy temporal for any $g''\leq g'$ (with $g''$-gradient not necessarily tangent to ${\partial M}$). In particular, its level sets $\bar \Sigma_{\tau_0}$, $\tau_0\in \mathds R$, are spacelike Cauchy hypersurfaces for any such $g''$. \end{thm} \begin{rem} {\em (1) As in the case without boundary, the last assertion of Thm. \ref{T1} does not hold for an arbitrary Geroch time function $t$ (even if $t$ is smooth) because its levels may be degenerate. That is, independently of the presence of the boundary, we can say that a smooth time function $\tau$ for $g$ is also a smooth time function for some $g'>g$ if and only if $\tau$ is a temporal function for $g$. (2) We will give a direct complete proof of Thm. \ref{T0} for the sake of completeness, which may have interest to compare with previous techniques in \cite{ geroch, BM, fathi}. However, it is worth emphasizing that most of this proof can be skipped (in fact, this was done in the unpublished reference \cite{S}, whose techniques are incorporated here). Indeed, from the hypotheses of Thm. \ref{T0} one can construct a Cauchy temporal function $\tau_0$ on $\overline{M}$ {\em with no restriction on} ${\partial M}$ just by working exactly as in the case without boundary (say, as in \cite{BernalSanchez} or \cite{MS}, see also Remark \ref{r_final}). From here, one can reproduce the proof of Thm. \ref{T0} developed in the following subsections, but skipping the subtle details associated to working there with a Geroch time function instead of a temporal one (see Remark \ref{r_A} for further details). Summing up, Thms. \ref{T0} and \ref{T1} (with Remark \ref{r_A}) yield two proofs of stability in both the case with and without boundary, one of them direct (and more technical) and the other one by using an auxiliary Cauchy temporal function $\tau_0$ \ncambios{(compare with \cite[Sect. 6]{geroch} and the Section 3 in \cite{BM}, arxiv version).} }\end{rem} \subsection{Techniques to perturb $g$ maintaining Cauchy hypersurfaces}\label{s_Stab2} To prove Thm. \ref{T0}, let $t$ be a prescribed Geroch's time function on $({\overline{M}},g)$, so that, topologically ${\overline{M}} \equiv \mathds R\times \bar \Sigma$ with $\bar \Sigma$ Cauchy and acausal. We will also consider a complete Riemannian metric $g_R$ on $\overline{M}$ with associated distance $d_R$. For any two non-empty subsets $A,B\subset {\overline{M}}$ we denote $J(A,B):=J^+(A)\cap J^-(B)$. Moreover, $d_R(A,B)$ will denote the $d_R$-distance between $A$, $B$ (i.e., the infimum of the set $\{d_R(x,y): x\in A,\, y\in B\}$) and $d_H(A,B)$ the Hausdorff distance associated with $d_R$ between the two sets (i.e., the infimum of the $r\geq 0$ such that $d_R(x,B)\leq r$ for all $x\in A$ and $d_R(A,y)\leq r$ for all $y\in B$). The latter will be applied to relatively compact subsets $A,B\subset {\overline{M}}$ (recall that $d_H$ becomes a true distance in the set of compact non-empty subsets). When $A=\{p\}, p\in {\overline{M}}$, the notation will be simplified to $A=p$. Let $\omega$ be the 1-form metrically associated with any timelike vector field on $\overline{M}$. For any function $\alpha \geq 0$ on $\overline{M}$, consider the metric: \begin{equation} \label{ealpha} g_\alpha=g-\alpha \cdot \omega ^2. \end{equation} Whenever $\alpha>0$, one has $g< g_\alpha$. We will add the subscript $\alpha$ to denote elements computed with $g_\alpha$ (for example, $J_\alpha^+(p)$ is the $g_\alpha$-causal future of $p$). Our final aim is to prove that some $\alpha>0$ can be chosen small enough so that $g_\alpha$ remains causal with compact $J_\alpha (p,q)$ for all $p,q$, and thus, $(\overline{M},g_{\alpha})$ is globally hyperbolic with timelike boundary. Let us introduce a working definition. \begin{defi}\label{dper} Fix an open neighborhood $U_0\subset {\overline{M}} $ bounded by two $t$-levels, i.e. $U_0\subset J(\bar \Sigma_{t_-},\bar \Sigma_{t_+})$, for some ${t_-},{t_+}$, which will be assumed to be optimal\footnote{That is, with no loss of generality we will always assume that no $t'_-\geq t_-$, $t'_+\leq t_+$ satisfy $U_0\subset J(\bar \Sigma_{t'_-},\bar \Sigma_{t'_+})$ if some of the two inequalities is strict.}. Let $C_0\subset {\overline{M}}$ be a closed subset included in $U_0$, and choose $\epsilon_0>0$. A $t$-{\em perturbation of $g$ with wider timecones on $C_0$, support in $U_0$ and $d_H$-distance smaller than $\epsilon_0$}, is any smooth function $\alpha\geq 0$ satisfying: (i) $\alpha>0$ on $C_0$ (thus, $g< g_\alpha$ on $C_0$), (ii) $\alpha \equiv 0$ outside $U_0$ (i.e., $g \equiv g_\alpha$ on $\overline{M}\backslash U_0$), (iii) $g_\alpha$ is globally hyperbolic and it admits $\bar \Sigma_{t_-}$, $\bar \Sigma_{t_+}$ (and, thus, all $\bar \Sigma_t$, $t\in \mathds R\setminus [t_-,t_+]$) as Cauchy hypersurfaces. (iv) the following bounds hold for all $p\in J(\bar \Sigma_{t_-},\bar \Sigma_{t_+})$: \begin{center} \bcambios{ $d_H(J(p,\bar \Sigma_{t'_+}), J_\alpha(p,\bar \Sigma_{t'_+}))<\epsilon_0 \quad\hbox{if $t'_+\in [t(p),t_+]$}$, } \bcambios{ $d_H(J(\bar \Sigma_{t'_-},p), J_\alpha(\bar \Sigma_{t'_-},p))<\epsilon_0 \quad\hbox{if $t'_-\in [t_-, t(p)]$}$, } \bcambios{ $d_H(p, J_\alpha(p,\bar \Sigma_{t'_+}))<\epsilon_0 \quad \hbox{if $t'_+\in [t_-,t(p)]$ and $J_\alpha(p,\bar \Sigma_{t'_+})\neq \emptyset$}$, } \bcambios{ $d_H(p, J_\alpha(\bar \Sigma_{t'_-},p))<\epsilon_0 \quad \hbox{if $t'_-\in [t(p),t_+]$ and $J_\alpha(\bar \Sigma_{t'_-},p)\neq \emptyset$}$. } \end{center} \em \end{defi} \begin{rem}\label{r_zcompact} {\em The conditions in this definition imply strong restrictions on the sets \bcambios{of} type $ J_\alpha(p,\bar \Sigma_{t'_+}))$ such as {\em compactness}. Indeed, $d_H(J(p,\bar \Sigma_{t'_+}), J_\alpha(p,\bar \Sigma_{t'_+}))$ $<\epsilon_0$ implies that $J_\alpha^+(p) \cap \bar \Sigma_{t'_+}$ lies in a compact set $D$ of $\bar \Sigma_{t'_+}$. Hence \begin{equation}\label{b} J_{\alpha}(p,\bar \Sigma_{t'_+})=J_{\alpha}(p,J_{\alpha}^+(p)\cap\bar \Sigma_{t'_+})=J_{\alpha}(p,D). \end{equation} As the global hyperbolicity of $g_\alpha$ implies that $J_\alpha(A,B)$ is compact for any compact $A,B\subset {\overline{M}}$, the set $J_\alpha(p,\bar \Sigma_{t'_+})=J_\alpha(p,D)$ in (\ref{b}) is compact too. In particular, $J_\alpha^+(p) \cap \bar \Sigma_{t'_+}=J_\alpha(p,\bar \Sigma_{t'_+})\cap \bar \Sigma_{t'_+}$ is also compact. Notice also that, if $d_H(J(p,\bar \Sigma_{t'_+}), J_\alpha(p,\bar \Sigma_{t'_+}))<\epsilon_0$, then for any $\alpha'$ with $0\leq\alpha'\leq \alpha$ one has $J(p,\bar \Sigma_{t'_+}) \subset J_{\alpha'}(p,\bar \Sigma_{t'_+})\subset J_{\alpha}(p,\bar \Sigma_{t'_+})$, and thus, $d_H(J(p,\bar \Sigma_{t'_+}), J_{\alpha'}(p,\bar \Sigma_{t'_+}))<\epsilon_0$.. Finally, recall also that if $\alpha$ is such a perturbation then so is $\alpha/N$ for any $N>1$. }\end{rem} \begin{lemma}\label{L1} {\em (Existence of a $t$-perturbation for a compact set)}. For any compact $K_0\subset \overline{M}$, any open neighborhood $U_0\subset J(\bar \Sigma_{t_-},\bar \Sigma_{t_+})$ of $K_0$ bounded by two $t$-levels $t_\pm$ and any $\epsilon_0>0$, there exists a $t$-perturbation of $g$ as in Defn. \ref{dper} \bcambios{with $C_0=K_0$}. \end{lemma} \begin{proof} With no loss of generality, we can assume that the closure $cl(U_0)$ is compact (otherwise, take any compact $K_0'$ with $K_0\subset {\rm int}(K_0')$, redefine $U_0$ as $U_0\cap {\rm int} (K_0)$ and, eventually, take a bigger $t_-$ and smaller $t_+$ to ensure that they remain optimal). Let $\alpha\geq 0$ be any function with support in $U_0$ and $\alpha>0$ on $K_0$. We will check that the required properties hold for some $\alpha_m:=\alpha/m, m\in \mathds N$ with large $m$. Recall that, necessarily, $K:=J_\alpha(cl(U_0), \bar \Sigma_{t_+})\cup J_\alpha(\bar \Sigma_{t_-},cl(U_0))$ is equal to $J(cl(U_0), \bar \Sigma_{t_+})\cup J(\bar \Sigma_{t_-},cl(U_0))$ and, so, it is compact. Let us see first that $g_{\alpha_m}$ is strongly causal for large $m$. Assume by contradiction that the strong causality of each $g_{\alpha_m}$ is violated at some $p_m\in {\overline{M}}$. Necessarily,\footnote{\label{foota}Otherwise, trivially, $p_m\in J(\Sigma_-,\Sigma_+)$ and $p_m$ would admit neighborhood $V$ in $ J(\Sigma_-,\Sigma_+)\setminus K$ where strong causality is violated. However, no causal curve starting at some $q\in V$ would cross $U_0$ (as $q\in K$ otherwise). So, strong causality would be violated in $(\bar M, g)$, a contradiction.} $p_m\in K$ and, up to a subsequence, it will converge to some $p\in K$. Around $p$, choose a small neighborhood $\tilde W$ with $(\tilde W,g_\alpha)$ intrinsically strongly causal, and a smaller one $W\subset\subset \tilde W$ which is $g_{\alpha}$-causally convex in $\tilde W$. Up to a finite number, $p_m\in W$ and, thus, there exists some $g_{\alpha_m}$-causal curve $\rho_m$ with endpoints in $W$ not included in $\tilde W$; indeed, all $\rho_m$ must escape $\tilde W$ and come back. Necessarily, $\rho_m$ is entirely contained in $K$ (recall footnote \ref{foota}). As all $\rho_m$ are $g_\alpha$-causal, the sequence $\{\rho_m\}$ will have a limit curve $\rho$ (also included in $K$) starting at $p$ \gcambios{which is ($H^1$-) causal } for all\footnote{Here, a small subtlety appears. In a strongly causal spacetime, any limit curve of causal curves is causal. \bcambios{Instead, when the spacetime is not strongly causal, limit curves may be non-causal. Even if one can assure in this last case that at least one causal limit curve exists \cite[Prop. 3.31]{Beem}, this result is not enough for our purposes, namely: given any $h$, the subsequence $\{\rho_{h+m}\}_m$ contains $g_{\alpha_h}$-causal curves, and the result provides a limit curve $\rho^h_\infty$ which is $g_{\alpha_h}$-causal, {\em nevertheless it depends on} $h$. Note, however, that the {\em procedure} to find such a causal limit curve implies directly that the $g_\alpha$-causal limit curve (say, obtained for $h=1$) is also $g_{\alpha_h}$-causal for all $h$. Indeed, notice first that, for each point $p$, a ball of small radius in any chart is convex for both $g$ and all $g_{\alpha_m}$ with large $m$ (see the proof of \cite[Prop. 1.2]{P}); then, reason as in the proof of \cite[Prop. 3.31]{Beem}, that is, apply Arzela's theorem to the sequence of curves parametrized with respect to an auxiliary complete Riemannian metric, and work locally around each limit point on a convex neighborhood $U$ as above.}} $g_{\alpha_m}$, which implies that $\rho$ is $H^1$-causal for $g$ too. Indeed, the velocity of $\rho$ (whenever it is differentiable) must be causal for all $g_m$ and, as $\{g_{\alpha_m}\}\rightarrow g$ (uniformly on all ${\overline{M}}$ by construction), it is causal for $g$. Moreover, since $\rho$ remains in the compact set $K$, a contradiction with the strong causality of $g$ appears: either $\rho$ is closed or it is inextensible but imprisoned in a compact subset. Now, let us check that, for any $m$ such that $g_{\alpha_m}$ is strongly causal, the property {\em (iii)} in Defn. \ref{dper} holds. Indeed, no inextensible future-directed $g_{\alpha_m}$ -causal curve $\gamma: \mathds R\rightarrow \overline{M}$ can be partially imprisoned to the future (resp. past) in the compact set $K$. So, either $\gamma$ does not intersect $K$ (and, trivially, will cross $\bar \Sigma_{t_+}, \bar \Sigma_{t_-}$ once) or there is a last point $\gamma(s_0^+)$ (resp. $\gamma(s_0^-)$) such that $\gamma|_{(s_0^+,\infty)}$ (resp. $\gamma|_{(-\infty,s_0^-)}$) does not intersect $K$. In this case, as $\gamma(s_0^+)\in J^-(\bar \Sigma_{t_+})$ (resp. $\gamma(s_0^-)\in J^+(\bar \Sigma_{t_-})$), then $\gamma|_{[s_0^+,\infty)}$ (resp. $\gamma|_{(-\infty, s_0^-]}$) touches $\bar \Sigma_{t_+}$ (resp. $\bar \Sigma_{t_-}$) exactly once. Clearly, $\gamma|_{(s_0^-, s_0^+)}$ cannot touch $\bar \Sigma_{t_+}$ (resp. $\bar \Sigma_{t_-}$) at some $\gamma(s_0)$ with $s_0\in (s_0^-, s_0^+)$ because in this case $\gamma$ would be contained in $I^+(\bar \Sigma_{t_+})$ (resp. $I^-(\bar \Sigma_{t_-})$) beyond $s_0$ towards $+\infty$ (resp. $-\infty$). \bcambios{To prove that {\em (iv)} in Defn. \ref{dper} also holds for $\alpha_m$ with large $m$, in the remainder the value of $m$ will be bigger than the value $m_0$ obtained above, which ensures the strong causality and, then, the global hyperbolicity, of $g_{\alpha_m}$.} \bcambios{Assume by contradiction that the first inequality in {\em (iv)} does not hold for $\alpha_m$ with big $m$, that is, there exists $q_m\in J(\bar \Sigma_{t_-},\bar \Sigma_{t_+})$ and $t^m_+ \in [t(q_m), t_+]:$ \begin{equation} \label{e_ef2} d_H(J(q_m,\bar \Sigma_{t^m_+}),J_{\alpha_m}(q_m,\bar \Sigma_{t^m_+}))\geq\epsilon_0, \end{equation} for diverging values of $m\geq m_0$. Necessarily, $q_m\in K$ and there exists $r_m \in J(q_m,\bar \Sigma_{t^m_+})$, $r_m' \in J_{\alpha_m}(q_m,\bar \Sigma_{t^m_+})$ such that $ d_R(r_m,r'_m) = d_H(J(q_m,\bar \Sigma_{t^m_+}),J_{\alpha_m}(q_m,\bar \Sigma_{t^m_+}))\geq\epsilon_0$ for each $m$. Up to subsequences, we can assume that $\{q_m\}, \{r_m\}, \{r_m'\}$ converge to some $q,r,r' \in K$, resp., and $\{t^m_+\}\rightarrow t_+' \in [t(q), t_+]$. Necessarily, $ d_R(r,r') \geq \epsilon_0$ and $r'\not\in J(q,\bar \Sigma_{t'_+})$. However, the $g_{\alpha_m}$-causal curves $\gamma_m$ from $q_m$ to $r'_m$ will have a $g$-causal limit curve $\gamma$ starting at $q$ and arriving at $r'$, that is, $r'\in J^+(q)$. As $t(r')\leq \limsup t(r'_m)\leq \limsup t^m_+=t'_+$, the contradiction $r'\in J^+(q,\bar \Sigma_{t'_+})$) follows.} \bcambios{Now, assume that the third inequality in {\em (iv)} does not hold (the other two cases would be analogous), that is, there exists $ t^m_+ \in [t_-,t(q_m))$ (so, $J(q_m,\bar \Sigma_{t^m_+})\subset \{q_m\}$) with $$ d_H(q_m,J_{\alpha_m}(q_m,\bar \Sigma_{t^m_+}))\geq\epsilon_0, $$ for diverging values of $m\geq m_0$. Up to subsequences, $\{q_m\}$ converges to some $q \in K$ and $\{t^m_+\}\rightarrow t_+'$ ($\in [t_-,t(q)]$). Take a point $r'_m\in J_{\alpha_m}(q_m,\bar \Sigma_{t^m_+})))$ which realizes the Hausdorff distance to $\{q_m\}$, thus $d_R(q_m,r'_m)\geq\epsilon_0$. Choose any second point $r''_m\in J_{\alpha_m}^+(r'_m) \cap \bar \Sigma_{t^m_+}$ (which must exist from the definition of $J_{\alpha_m}(q_m,\bar \Sigma_{t^m_+})$, possibly $r_m''=r_m'$). Up to subsequences, $\{r_m'\}\rightarrow r'\in K$ and $\{r_m''\}\rightarrow r''\in \bar \Sigma_{t'_+} \cap K$; moreover, \begin{equation} \label{e_ef} d_R(q,r')\geq \epsilon_0>0. \end{equation} Now, the sequence $\{\gamma_m\}$ of future-directed $g_{\alpha_m}$-causal curves from $q_m$ to $r_m''$ through $r_m'$ must have a limit curve $\gamma$ which is $H^1$-causal for $g$. As $g$ is globally hyperbolic, $\gamma$ goes from $q$ to $r''$ through $r'$. Moreover, as $t$ is a $g$-time function, $t(q)\geq t(r'')=t'_+$ and the equality must hold (recall $t(r''_m)=t^ m_+ \leq t(q_m)$ by hypothesis). As $\bar \Sigma_{t(q)}$ is $g$-acausal; $\gamma$ must be a constant and $q=r'=r''$, in contradiction with \eqref{e_ef}.} \end{proof} \begin{prop}\label{L2} {\em (Existence of a $t$-perturbation for a strip)}. Let $C$ be the closed strip $J(\bar \Sigma_{t_1},\bar \Sigma_{t_2})$, $t_1<t_2$, let $U=(t_-,t_+)\times \bar \Sigma$ be a neighborhood of $C$ (i.e. $t_-<t_1, t_2<t_+$), and choose $\epsilon>0$. Then, there exists a $t$-perturbation of $g$ for $C, U$ and $\epsilon$ as in Defn.~\ref{dper}. \end{prop} \begin{proof} We can assume that $\bar \Sigma$ is not compact (otherwise, the result would follow directly from Lemma \ref{L1}). Let $\{B_m\}$ be an exhaustion of $\bar \Sigma$ by compact subsets, i.e. $B_m \subset {\rm int}(B_{m+1})$ (where the interior of $B_{m+1}$ is regarded as a subset of the topological space $\bar \Sigma$) and $\bar \Sigma =\cup_m B_m$. By convenience, put $B_0 :=B_{-1} :=\emptyset$, and let $K_m:=[t_1,t_2]\times B_m$ and $U_m:=(t_-,t_+)\times {\rm int}(B_{m+1})$ for all $m\in \mathds N \cup \{0,-1\}$; recall $K_m\subset U_m$. Let us construct $\alpha$ inductively as follows. Consider first a perturbation $\alpha_1$ obtained by applying Lemma \ref{L1} to the compact set $K_1$, its neighborhood $U_1$ and putting $\epsilon_0 =:\epsilon_1$ equal to $\epsilon/2$. Set $\sigma(1)=1$. Assuming inductively that $\alpha_m$ has been defined (and, thus, the corresponding globally hyperbolic metric $g_{\alpha_m}$), let $\sigma(m+1)$ be the first integer greater than $\sigma(m)$ such that \begin{equation} \label{Ej} J_{\alpha_m}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+})\cup J_{\alpha_m}(\bar \Sigma_{t_-},cl(U_{\sigma(m)}))\subset U_{\sigma(m+1)-1}\cup \bar \Sigma_{t_-}\cup \bar \Sigma_{t_+} \end{equation} ($\sigma(m+1)$ exists as the subset of the left-hand side is compact). Now, obtain $\alpha_{m+1}$ by applying Lemma \ref{L1} to the metric $g_{\alpha_m}$, the compact set $K_{\sigma(m+1)}\setminus {\rm int}(K_{\sigma(m)})$, its neighborhood $U_{\sigma(m+1)}\setminus cl(U_{\sigma(m)- 2 })$ and choosing some positive $\epsilon_0 =: \epsilon_{m+1} \leq \epsilon/2^{m+1}$ small so that, the relations \eqref{Ej} still hold when the causal futures and pasts are computed with $g_{\alpha_{m+1}}$ instead of $g_{\alpha_{m}}$. Namely, $\epsilon_{m+1} $ is taken also smaller than the minimum of: \begin{eqnarray}\label{e_arr1} d_R\left([t_-,t_+]\times \dot B_{\sigma(m+1)-1} \, , \; J_{\alpha_m}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+})\cup J_{\alpha_m}(\bar \Sigma_{t_-},cl(U_{\sigma(m)}))\right) , \\ \label{e_arr2} d_R\left( [t_-,t_+]\times \dot B_{\sigma(m)-1} \, , \; J_{\alpha_{m}}(cl(U_{\sigma(m-1)}),\bar \Sigma_{t_+})\cup J_{\alpha_{m}}(\bar \Sigma_{t_-},cl(U_{\sigma(m-1)}))\right) \end{eqnarray} (where $\dot U$ denotes the topological boundary of the corresponding subset, and the distance in the second line is taken into account only for $m>1$). Notice that both (\ref{e_arr1}) and (\ref{e_arr2}) are positive, as both are distances between compact disjoint sets; in particular, the second distance is lower bounded by $$ d_R\left( [t_-,t_+]\times \dot B_{\sigma(m)-1} \, , \; J_{\alpha_{m-1}}(cl(U_{\sigma(m-1)}),\bar \Sigma_{t_+})\cup J_{\alpha_{m-1}}(\bar \Sigma_{t_-},cl(U_{\sigma(m-1)}))\right) - \epsilon_m>0. $$ \ncambios{In fact, if $A, B, C$ are three compact subsets of ${\overline{M}}$ then $ d_R(A,C)\leq d_R(A,B)+d_H(B,C)$, and apply this to $A=[t_-,t_+]\times \dot B_{\sigma(m)-1}$, $B=J_{\alpha_{m}}(cl(U_{\sigma(m-1)}),\bar \Sigma_{t_+})\cup J_{\alpha_{m}}(\bar \Sigma_{t_-},cl(U_{\sigma(m-1)})) $ and $C=J_{\alpha_{m-1}}(cl(U_{\sigma(m-1)}),\bar \Sigma_{t_+})\cup J_{\alpha_{m-1}}(\bar \Sigma_{t_-},cl(U_{\sigma(m-1)}))$.} These requirements for $\epsilon_{m+1}$ ensure, for all $k\geq 1$: \begin{equation}\label{Ej2} \begin{array}{c} J_{\alpha_{m+ 2 }}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+})= J_{\alpha_{m+ 2 + k}}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+}), \\ J_{\alpha_{m+ 2 }}(\bar \Sigma_{t_-},cl(U_{\sigma(m)}))= J_{\alpha_{m+ 2+ k}}(\bar \Sigma_{t_-},cl(U_{\sigma(m)})). \end{array} \end{equation} \ncambios{Recall, for the first eqn. \eqref{Ej2}: $J_{\alpha_{m+1}}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+}) \subset U_{\sigma(m+1)-1}$ (once determined the value of $\sigma(m+1)$, by using the bound (\ref{e_arr1}) for $\epsilon_{m+1}$), $J_{\alpha_{m+2}}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+}) \subset U_{\sigma(m+1)-1}$ (use (\ref{e_arr2})) and $J_{\alpha_{m+2+k}}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+}) = J_{\alpha_{m+2}}(cl(U_{\sigma(m)}),\bar \Sigma_{t_+})$ (because $U_{\sigma(m+1)-1}\cap (U_{\sigma(m+3)}\setminus cl(U_{\sigma(m+2)-2}) =\emptyset$).} Each metric $g_{\alpha_m}$ satisfies the properties (iii) and (iv) in Def. \ref{dper} and it can be regarded as a $t$-perturbation of the original metric $g$ with perturbing function $\alpha_1+\dots +\alpha_m$. Moreover, clearly, for each compact subset $Z\subset {\overline{M}}$ there exists some $m_0\in \mathds N$ such that (a) $\alpha_m(Z)\equiv 0$ for all $m\geq m_0$ and (b) the property \eqref{Ej2} holds if $cl(U_{\sigma(m)})$ is replaced by $Z$. Assertion (a) allows to define $\alpha$ as the locally finite sum $\alpha:= \sum_m \alpha_m$, and let us check that, then, $g_\alpha$ satisfies the properties stated in Defn. \ref{dper}. By construction, $g_\alpha$ satisfies (i) and (ii). For (iii), apply the assertion (b) to $Z=\{p\}$, $p\in U_0$ and recall that all $g_{\alpha_m}$ satisfied (iii). Finally, for (iv), putting $g_{\alpha_0}:=g$, $$d_H(J(p,\bar \Sigma_{t'_+}), J_{\alpha}(p,\bar \Sigma_{t'_+}))\leq \sum_{k=0}^{m-1} d_H(J_{\alpha_{k}}(p,\bar \Sigma_{t'_+}), J_{\alpha_{k+1}}(p,\bar \Sigma_{t'_+})) \leq \sum_{k=0}^{m-1} \epsilon_k <\epsilon $$ and the result follows taking into account the assertion (b) again. \end{proof} \subsection{Proofs of the main results} \label{s_Stab3} \noindent {\em Proof of Thm. \ref{T0}.} Consider the closed strips $C_{k}=[k-1, k+2]\times \bar \Sigma$ and open ones $U_{k}=$ $(k-2, k+3)\times \bar \Sigma$ for each integer $k\in \mathds Z$, and choose the complete Riemannian metric $g_R$ so that $d_R(\bar \Sigma_{k+k'/3}, \bar \Sigma_{k+(k'+1)/3})>1$ for all $k\in\mathds Z, k'\in\{0,1,2\}$. Construct a $t$-perturbation $\alpha_k$ for each $C_k$, $U_k$ as in Prop. \ref{L2} with $\epsilon_0=1/2$ for all $k$. Now, take any smooth function $\alpha >0$ on ${\overline{M}}$ such that $\alpha<\alpha_k$ on each strip $C_k$. \ncambios{ To construct such an $\alpha$, consider the (continuous, positive) function $\hat \alpha_k$ obtained as the minimum of $\{\alpha_{k-1}, \alpha_{k}, \alpha_{k+1}\}$ on each strip $[k,k+1]\times \bar\Sigma$, $k\in\mathds Z$. Merge all the functions $\hat\alpha_k$'s on the strips into a single function $\hat \alpha$ on all ${\overline{M}}$ just by choosing the minimum between $\hat\alpha_k$ and $\hat\alpha_{k+1}$ on each slice $\bar \Sigma_{k}$. As $\hat \alpha$ is positive and lower semi-continuous, one can choose a smooth $\alpha$ satisfying $0<\alpha<\hat\alpha$ by means of a standard partition of unity argument.} Let us check that $g_\alpha$ can be chosen as the required metric $g'$. Trivially, $g_\alpha>g$. In order to prove that $(\overline{M},g_{\alpha})$ is globally hyperbolic, consider first the following. \bigskip \noindent {\em Claim.} Let $p\in {\overline{M}}$ and $q\in J_\alpha^+(p)$. Any future-directed $g_{\alpha}$-causal curve $\rho$ from $p$ to $q$ is included in the strip $(t(p)-1,t(q)+1))\times \bar \Sigma$. In particular, $ J_\alpha^+(p)\cap \bar \Sigma_{t_0}=\emptyset$ if $t_0\leq t(p)-1$. Moreover, for each $t_0\in \mathds R$, $ J_\alpha(p,\bar \Sigma_{t_0})$ and $ J_\alpha(\bar \Sigma_{t_0}, p)$ are compact. \smallskip Assuming the claim, the result follows easily. Indeed, (strong) causality holds at any $p\in {\overline{M}}$ because, otherwise, any closed causal loop $\rho$ would be contained in the strip $(t(p)-1,t(p)+1))\times \bar \Sigma$. However, this strip is included in the closed strip $C_{k_p}$, where $k_p$ is the integer part of $t(p)$. As $g_\alpha \leq g_{\alpha_{k_p}}$ on $C_{k_p}$, the closed $g_{\alpha}$-causal curve $\rho$ is also causal for $g_{\alpha_{k_p}}$, in contradiction with the global hyperbolic character of $g_{\alpha_{k_p}}$. Finally, notice that $J_\alpha^+(p)\cap J_\alpha^-(q)$ is the intersection of the compact sets $J_\alpha(p,\bar \Sigma_{t_q+1})$ and $ J_\alpha(\bar \Sigma_{t(p)-1}, q)$. \bigskip \noindent {\em Proof of the Claim.} For the first assertion, assume by contradiction that there exists a first point $q'$ with $t(q')=t(p)-1$ crossed by $\rho$ (a similar contradiction would appear at the last point where $\rho$ left the region $t\leq t(q)+1$). Let $p'$ be the last point before $q'$ crossed by $\rho$ with $t(p')=t(p)$; trivially, $q'\in J_{\alpha}^+(p')$. The portion of $\rho$ from $p'$ and $q'$ is entirely contained in the strip $C_{k_p}$, thus $q'\in J_{\alpha_{k_p}}^+(p')$. So, putting $t_0=t(q')$ ($=t(p)-1$) and taking into account Defn. \ref{dper} (iv): \begin{equation} \label{e_lat0} d_H(p', J_{\alpha_{k_p}}(p',\bar \Sigma_{t_0}))<\epsilon_0=1/2. \end{equation} This is a contradiction because $q'\in J_{\alpha_{k_p}}(p',\bar \Sigma_{t_0})$ and, by our choice of $g_R$, $d_R(p',q')>1$. For the last assertion, let us reason for $J_\alpha(p,\bar \Sigma_{t_0})$. If $t_0 \leq t(p)$, then $J_\alpha(p,\bar \Sigma_{t_0})$ is entirely included in the strip $[t(p)-1,t(p)+1]\times \bar \Sigma$, which is included in the strip $C_{k_p}$. By applying Remark \ref{r_zcompact} to $g_{\alpha_{k_p}}$ we deduce that $J_{\alpha_{k_p}}(p,\bar \Sigma_{t_0})$ is compact. Then, taking into account that $\alpha\leq \alpha_{k_p}$, necessarily $J_{\alpha}(p,\bar \Sigma_{t_0})\subset J_{\alpha_{k_p}}(p,\bar \Sigma_{t_0})$, and so, $J_{\alpha}(p,\bar \Sigma_{t_0})$ is also compact. Assume inductively that compactness hold when $t_0\leq t(p)+k$, and consider $t(p)+k<t_0\leq t(p)+k+1$. Then, both $ J_\alpha(p,\bar \Sigma_{t(p)+k})$ and $D_0:= J^+_\alpha(p) \cap \bar \Sigma_{t(p)+k}$ are compact by hypothesis, and $J_\alpha (D_0, \bar \Sigma_{t_0})$ must lie in the strip $C_{k_p+k}$. So (using analogously the global hyperbolicity of $g_{\alpha_{k_p+k}}$ and $\alpha \leq \alpha_{k_p+k}$), $J_\alpha (D_0, \bar \Sigma_{t_0})$ is compact and the result follows by noticing $J_\alpha(p,\bar \Sigma_{t_0})= J_\alpha(p,\bar \Sigma_{t(p)+k})\cup J_\alpha (D_0, \bar \Sigma_{t_0}) $. \ \rule{0.5em}{0.5em} \smallskip \begin{rem}\label{r_bound_alpha}{\rm Recall that all the perturbed metrics constructed so far are of the form~\eqref{ealpha}. Indeed, the globally hyperbolic metric has been obtained for some $\alpha>0$. Obviously, any other metric as in \eqref{ealpha} constructed with some function $\alpha'>0$ such that $\alpha'\leq \alpha$ would be globally hyperbolic too (the Cauchy hypersurfaces for $g_\alpha$ would be also Cauchy for $g_{\alpha'}$ as $g_{\alpha'}\leq g_{\alpha}$). }\end{rem} Next, let us focus on the stability of Cauchy temporal functions. \smallskip \noindent {\em Proof of Thm. \ref{T1}}. The proof of Thm. \ref{T0} will be mimicked by choosing $\omega = d\tau$, which is metrically equivalent to the timelike vector field $-\partial_t/\Lambda$ in the orthogonal splitting $(\mathds R\times \bar \Sigma, g\equiv -\Lambda d\tau^2 + g_\tau)$ associated with the Cauchy temporal function $\tau$. So, \begin{equation}\label{E4} g_\alpha= g-\alpha d\tau^2 =-(\Lambda+\alpha)d\tau^2 + g_\tau. \end{equation} Recall that, now, {\em for all the metrics $g_\alpha$, $\alpha \geq 0$, the slices $\bar \Sigma_\tau$ remain spacelike}. This is an important difference with Thm. \ref{T0}, where all the slices for Geroch function $t$ might be non $g_\alpha$-acausal for any $\alpha$. So, in both Lemma \ref{L1} and Lemma \ref{L2}, not only the slices $\bar \Sigma_t$, $t\in \mathds R\setminus (t^-,t^+)$ are Cauchy but also all the slices with $t\in (t^-,t^+)$ \ncambios{(this follows from the proof of those lemmas, but can be also noticed because any closed spacelike hypersurface contained in the region between two disjoint Cauchy hypersurfaces is Cauchy too, see for example \cite[Corollary 11]{BS03}).} Therefore, we can follow the proof of Thm. \ref{T0} but we do not need to replace $\tau$ as was done for the function $t$ (inductively replaced by some $t_m$ to construct a Cauchy time $t_\infty$): simply, $\tau$ remains equal at all the steps of the proof and becomes a Cauchy temporal function for $g_\alpha$. Recall also that, as the expression \eqref{E4} remains valid for any perturbed metric $g_\alpha$, all the $g_\alpha$-gradients of $\tau$ remain tangent to ${\partial M}$. $\Box$ \begin{rem}\label{R_que_pena} {\em Notice that the metrics $g_\alpha$ in \eqref{E4} \bcambios{(or more generally (\ref{ealpha}))} with $\alpha>0$ not only satisfy $g<g_\alpha$ but also $-g_\alpha(v,v)>-g(v,v)$ whenever $v$ is $g$-causal. \gcambios{Morevoer, for} any $\alpha\geq 0$, one has: $$ \nabla \tau=-\frac{\partial_{\tau}}{\Lambda}, \quad \nabla_{g_\alpha}\tau=-\frac{\partial_{\tau}}{\Lambda+\alpha}, \quad \hbox{thus,} \quad -g(\nabla_{g_\alpha}\tau, \nabla_{g_\alpha}\tau)= -d\tau(\nabla_{g_\alpha}\tau)=\frac{1}{\Lambda+\alpha}.$$ Therefore, if the Cauchy temporal function $\tau$ is steep for $g_\alpha$ (i.e., $\Lambda + \alpha\leq 1$) then, it is also steep for $g$ ($\Lambda\leq 1$). Conversely, if $\tau$ is steep for $g$ and $\alpha$ is chosen bounded $\alpha\leq C$ then the Cauchy temporal function $\sqrt{1+C} \, \tau$ is steep for $g_\alpha$. } \end{rem} \begin{rem}\label{r_stably} {\em In connection with the proof of Prop. \ref{p_stable} (implication $2 \Rightarrow 3$), it is clear now that, if one considers any stably causal spacetime and $\tau$ is a temporal function for $g$, then $\tau$ is also temporal for all the metrics with wider cones $g_\alpha$ constructed in \eqref{E4}, for any $\alpha\geq 0$. }\end{rem} \section{The Cauchy orthogonal decomposition.} \label{s4} Throughout this section, $(\overline{M},g)$ will be globally hyperbolic with timelike boundary. \subsection{Simplification of the problem by using stability } Next, our aim is to show that the problem of existence of $\tau$ in Thm. \ref{t0} can be reduced to the case of a new metric $g^*$ with a simple product behaviour around ${\partial M}$. First, let us globalize Gaussian coordinates. \begin{lemma}[Existence of a global tubular neighborhood] There exists a smooth function $\rho: \partial M \rightarrow \mathds R$, $\rho>0$, such that the orthogonal exponential map \begin{equation} \label{Exp} \exp^\perp: \{(\hat p, s)\in \partial M\times [0,\infty): 0\leq s < \rho(\hat p)\}\rightarrow\overline{M} , \qquad (\hat p,s)\mapsto \exp_{\hat p}(s\,N_{\hat{p}}) \end{equation} is a diffeomorphism onto its image $E$, where $N_{\hat{p}}$ is the pointing-inward $\partial M$-orthogonal unit vector at $\hat{p}$. This will be called {\em tubular neighborhood} of ${\partial M}$. \end{lemma} \begin{proof} The technique is standard. Start with a Gaussian neighborhood around each $\hat p\in {\overline{M}}$ with normal coordinate $s\in [0,\epsilon_{\hat p})$, take an exhaustion by compact sets $\{\hat K_m\}_m$, $\hat K_m\subset $ int$(\hat K_{m+1})$ (even if ${\partial M}$ has infinitely many connected components, this can be done by intersecting ${\partial M}$ with closed balls of radius $m$ for a complete Riemannian metric on ${\overline{M}}^d$ centered in a freely chosen point), determine $\epsilon_{\hat p_m}$ such that $\exp^\perp$ satisfies the required properties on $\hat{K}_m\times [0,\epsilon_{\hat p_m})$ and choose $\rho>0$ such that $\rho<\epsilon_{\hat p_m}$ on $\hat{K}_m\setminus \hat K_{m-1}$. \end{proof} Elements on $E$ and their preimages by $\exp^\perp$ will be identified with no further mention. In particular, $E$ is endowed with the (${\partial M}$-orthogonal, geodesic) vector field $\partial_s$. \begin{prop}\label{R1} Let $g'>g$ be globally hyperbolic (as obtained in Thm. \ref{T0}). Then, there exist another Lorentzian metric $g^*$ on ${\overline{M}}$ satisfying: (a) $g\leq g^* <g'$ on ${\overline{M}}$, and so, $g^*$ is also globally hyperbolic. (b) On some $g^*$-tubular neighborhood $E$ of ${\partial M}$, each $p\in E$ admits a neighborhood of type $\hat U \times [0,\epsilon)\subset E$, where $g^*$ is a product metric $g^*= \hat g_0 +ds^2$, being $\hat g_0$ a Lorentzian metric on $\hat U\subset {\partial M}$. \end{prop} \begin{proof} As $g'>g$, we can choose a metric $\hat g_0$ on ${\partial M}$ such that \begin{equation}\label{e_z1} g|_{{\partial M}} < \hat g_0 < g'|_{{\partial M}} \quad \hbox{and} \quad -\hat g_0(v,v)>-g(v,v) \; \hbox{for all} \, g\hbox{-causal} \; v\in T({\partial M} ), \end{equation} and such that the (locally) product metric \begin{equation}\label{e_z2} g_0:= \hat g_0 + ds^2 \end{equation} defined in some tubular neighborhood $E'$ of ${\partial M}$, satisfies \begin{equation}\label{e_z3} g<g_0< g' \quad \hbox{on} \, E' \; \quad \hbox{and} \quad -\hat g_0(v,v)>-g(v,v) \; \hbox{for all} \, g\hbox{-causal} \; v\in TE'. \end{equation} Indeed, notice that $g|_{{\partial M}} < g'|_{{\partial M}}$ are globally hyperbolic metrics on the manifold ${\partial M}$ (Thm. \ref{t_ladder} (3)) and $\hat g_0$ can be constructed as a metric $g_\alpha$, $\alpha>0$, in Remark \ref{R_que_pena} (1), ensuring both assertions in \eqref{e_z1}. Moreover, as $\partial_s$ is unit and $g$-orthogonal with both $g_0$ and $g$, this also ensures $g<g_0$ on all the points of ${\partial M}$ and (choosing a smaller $\alpha$ if necessary) $g_0<g'$ on ${\partial M}$. Thus, reducing $E'$ if necessary, both assertions in \eqref{e_z3} also hold. Now, take any smaller tubular neighborhood $E$ with $cl(E)\subset E'$ (say, the associated with the function $\rho/2$ in equation \eqref{Exp}). Consider the covering $\{E',{\overline{M}}\setminus E\}$ of ${\overline{M}}$, choose a subordinate partition of unity $\{\mu, 1-\mu\}$ with supp$(\mu)\subset E'$ and construct \begin{equation} \label{EG} g^*=\mu g_0 + (1-\mu)g . \end{equation} By the second assertion in \eqref{e_z3}, $g\leq g* \leq g_0$; thus (by the first assertion), $g^*$ fulfills (a). The \bcambios{requirement (b)} \bcambios{holds} because $g^*=g_0$ on the whole $E$. \end{proof} \begin{rem}{\em On $E$, both $g$ and $g^*$ can be written in Gaussian coordinates as in \eqref{e_Gaussian}; however, the dependence on $s$ of $g_{ij}(\hat x,s)$ is dropped for $g^*$.} \end{rem} \begin{lemma}[Reduction to a local product around ${\partial M}$]\label{L_reduction} For any $g^*$ as in Prop.~\ref{R1}: (a) if $\tau$ is Cauchy temporal for $g^*$, then so is it for $g$. (b) if the $g^*$-gradient $\nabla^* \tau$ of $\tau$ is tangent to ${\partial M}$, then so is the $g$-gradient $\nabla \tau$. \end{lemma} \begin{proof} (a) $g\leq g^*$ implies that $\tau$ is $g$-Cauchy temporal (the $g$-orthogonal to $\nabla \tau$ is tangent to a $\tau$-slice, which is $g^*$-spacelike, and thus, $g$-spacelike). (b) On ${\partial M}$, $g(\nabla \tau,\partial_s)=d\tau(\partial_s)= g^*(\nabla^*\tau , \partial_s)=0$, thus $\nabla \tau$ is tangent to ${\partial M}$. \end{proof} \begin{rem}\label{R_pena} {\em As a summary, Thm. \ref{T0}, Prop. \ref{R1} and Lemma \ref{L_reduction} yield: {\em in order to obtain a Cauchy temporal function $\tau$ for $g$ with $\nabla \tau$ tangent to ${\partial M}$ (as required for Thm. \ref{t0}), one can assume, with no loss of generality, that $g$ satisfies the local product property stated for $g^*$ in Prop. \ref{R1} \bcambios{(b)} } (otherwise, work with $g^*$ itself). }\end{rem} \subsection{Proof of Theorem \ref{t0}}\label{s4.1} \noindent {\it Proof}. \bcambios{First, let us prove the first assertion of Thm. \ref{t0}, that is, any globally hyperbolic spacetime-with-timelike-boundary admits a temporal function $\tau: {\overline{M}} \rightarrow \mathds R$ whose gradient $\nabla \tau$ is tangent to ${\partial M}$. Take} two copies of $({\overline{M}},g)$ and identify their homologous points along the boundary ${\partial M}$ in order to obtain the double manifold ${\overline{M}}^d$. Now, ${\overline{M}}^d$ inherits not only a structure of smooth manifold (without boundary) but also a smooth metric $g^d$. Indeed, $g$ is assumed to satisfy the properties stated for $g^*$ in Prop. \ref{R1} (by Remark \ref{R_pena}). So, the local product structure of any tubular neighborhood $E$ of ${\partial M}$ yields directly the smoothness of both the exponential and the metric around ${\partial M} \subset M^d$ (just work in Gaussian coordinates). Moreover, the natural reflection $i: {\overline{M}}^d \rightarrow {\overline{M}}^d$ (which maps each point in its homologous one) becomes an isometry for $g^d$. Notice that $g^d$ is globally hyperbolic because any pair of homologous Cauchy hypersurfaces with boundary in each copy merges into a continuous Cauchy hypersurface without boundary of $({\overline{M}}^d,g^d)$. So, the main result in \cite{muller2016} (applied with 0 invariant Cauchy hypersurfaces) ensures the existence of a Cauchy temporal function $\tau^d$ on ${\overline{M}}^d$ which is invariant by $i$. Therefore, the restriction $\tau$ of $\tau^d$ to ${\overline{M}}$ becomes a Cauchy temporal function, and its gradient must be tangent to the boundary as $i_*(\nabla \tau)=\nabla\tau$ on the set ${\partial M}$ (of fixed points for $i$), \bcambios{as required}. \bcambios{ As stated in Theorem \ref{t0}, some consequences of the existence of a Cauchy temporal function $\tau$ with gradient $\nabla \tau$ tangent to ${\partial M}$ are: (a) ${\overline{M}}$ splits as a product manifold $\mathds R \times \bar \Sigma$, where $\bar \Sigma$ is a spacelike Cauchy hypersurface-with-boundary, and (b) the metric $g$ splits globally $g=-\Lambda d \tau^2+g_\tau$ as in Eq. \ref{e_split}. In fact, choosing a slice $\bar \Sigma=\tau^{-1}(0)$ and moving it with the flow of $-\nabla \tau/|\nabla\tau|^2$ yields $(a)$ and $(b)$ easily (as in Cor. \ref{cor} or \cite[Prop.~2.4]{BernalSanchez}). } \bcambios{Next, let us check the isometric embeddability of $({\overline{M}},g)$ into ${\mathbb L}^N$}. Notice that the technique in \cite{MS} works whenever a steep Cauchy function $\tilde \tau$ is obtained (that is, the requirement of tangency of $\nabla \tilde \tau$ to ${\partial M}$ necessary for the orthogonal splitting can be dropped now). In order to find such a $\tilde \tau$, the same procedure as in \cite{MS} can be used. \ncambios{This is straightforward because the technique in \cite{MS} is based in local functions type $\mathtt{j}_{p}(\cdot):=\exp(-1/d(p,\cdot)^2)$, where $d$ is the Lorentzian distance. Moreover, the required local functions can be chosen in a very flexible way (for example, taking the distance associated with a $C^0$-close flat metric $h_0$ with $-h_0(v,v)>-g(v,v)$ on any $g$-causal $v$). So, the constructive technique works in the same way even if, now, $p$ may belong to ${\partial M}$.} \bcambios{The remainder of the assertions in Thm. \ref{t0} concerns $M$ and ${\partial M}$. By Thm. \ref{t_ladder}, $M$ is causally continuous and ${\partial M}$ is globally hyperbolic. Morevoer, the restriction of $\tau:{\overline{M}} \rightarrow \mathds R$ to $M$ also determines an orthogonal splitting on $(M,g)$; so, the spacetimes in the class of the causally continuous ones that can be regarded as the interiors of globally hyperbolic spacetimes-with-timelike-boundary, do admit a global orthogonal splitting too. Finally, the restriction of $\tau$ to the boundary becomes a Cauchy temporal function on ${\partial M}$ trivially and its levels $\tau^{-1}(\tau_0)\cap {\partial M}$ are acausal in ${\overline{M}}$, as so are the whole levels $\tau^{-1}(\tau_0)$. } $\Box$ \begin{rem}\label{r_final} {\em As emphasized above, the proof of isometric embeddability in ${\mathbb L}^n$ does not require the steep Cauchy temporal function $\tau$ for $g$ having gradient tangent to ${\partial M}$ and, thus, it can be proven by using the same techniques as in the case without boundary. Analogously, other problems on smoothability can be proved directly as in the case without boundary. For example: (a) Geroch's topological splitting (Thm. \ref{t_geroch}) can be improved into a smooth one just noticing that the same procedure as in \cite{BS03} gives a spacelike Cauchy hypersurface $\bar \Sigma$, and moving it by using the flow of any timelike vector field $T$ tangent to ${\partial M}$ (as obtained in Prop. \ref{extendfield} (iii), and choosing $T$ complete). (b) The technique in \cite{BernalSanchez} directly gives also a Cauchy temporal function $\tau_0$ and, this, a smooth foliation of ${\overline{M}}$ by Cauchy hypersurfaces (however, they are not necessarily orthogonal to ${\partial M}$). (c) The extensions of the classical equivalences of the notion of stably causal spacetime to the case with boundary rely also on the case without boundary (as described in Prop. \ref{p_stable}). (d) As in the case without boundary (see \cite{MS}), stably causal spacetimes-with-boundary can be conformally embedded in some Lorentz-Minkowski spacetime ${\mathbb L}^N$ for big $N$. } \end{rem} \begin{rem}\label{r_A} {\em Finally, let us revisit how, if one assumed the existence of the Cauchy temporal function $\tau_0$ (as in Remark \ref{r_final} (b) above), the proof of Thm. \ref{T0} is widely simplified. First, one would take $\omega=d\tau_0$ in \eqref{ealpha}, so that $g_\alpha$ can be written as in \eqref{E4}. Thus, $\tau_0$ is directly a temporal function for $g_\alpha$. This implies that, in Def. \ref{dper} (iv), \bcambios{neither the case $ t'_+\in [t_-,t(p))$ and $J_\alpha(p,\bar \Sigma_{t'_+})\neq \emptyset$ (nor $J_\alpha(p,\bar \Sigma_{t(p)})\neq \{p\}$), nor the case $t'_-\in (t(p),t_+]$ and $J_\alpha(\bar \Sigma_{t'_-},p)\neq \emptyset$ (nor $J_\alpha(\bar \Sigma_{t(p)},p)\neq \{p\}$) can hold.} So, they should not be taken into account in the proof of Lemma \ref{L1}; what is more, in this lemma it is not necessary to prove (strong) causality, and all the slices $\tau_0=$ constant become directly spacelike and, then, acausal and Cauchy for $g_\alpha$ (this was not true even for smooth Geroch's functions). These properties also hold in Prop. \ref{L2}; so, the claim in the proof of Thm. \ref{T0} is not needed. }\end{rem} \ncambios{We are now in conditions to sketch the proof of Proposition \ref{p_stable}.} \medskip \ncambios{ \noindent {\em Proof of Prop. \ref{p_stable}.} 1 $\Rightarrow$ 2. The same smoothing procedure as in the case without boundary \cite{BernalSanchez, SanchezSaoPaulo} holds, as no additional condition is required for $\nabla\tau$ on the boundary (see Remark~\ref{r_final}). 2 $\Rightarrow$ 3. Even if $\overline{M}$ does not split globally as a product, the temporal function $\tau$ still allows to write $g$ as $-\Lambda d\tau^2+g_\tau$ where $\Lambda>0$ is a function on ${\overline{M}}$ and $g_\tau$ a Riemannian metric on the bundle Ker$(d\tau)$. So, for any positive function $\alpha>0$ the metric $g_\alpha=-(\Lambda+\alpha)d\tau^2+g_\tau $ satisfies $g_\alpha>g$ and it is also stably causal. Indeed, $\tau$ is a temporal function also for $g_\alpha$ because the gradients of $\tau$ for $g$ and $g_\alpha$ are pointwise proportional and their $g$ and $g_\alpha$-orthogonal bundles are equal to Ker$(d\tau)$, that is, positive definite (see also Remark \ref{r_stably}). 3 $\Rightarrow$ 1. Hawking's proof for the case without boundary \cite[Prop. 6.4.9]{Hawking} also works here, because it is based on the integration of chronological futures and pasts type $I^\pm(p)$ by using and admissible measure $m$ independent of the metric such that both ${\partial M}$ and the boundaries of $I^\pm(p)$ have zero measure (these are the same reasons why Geroch's construction of Cauchy time functions also work in the case with boundary, as detailed in Section \ref{s3}). The last assertion is trivial from the assertion 3; however, a direct proof from 1 is easy to obtain (see \cite[Remark 3.9(b)]{LuisTesis}). $\Box$} \medskip As a simple consequence of our techniques, let us check that any globally hyperbolic spacetime-with-timelike-boundary can be regarded as the closure of an open subset in a globally hyperbolic spacetime without boundary (thus, strengthening Prop. \ref{pp}). \begin{cor}\label{c_extension_globhip} For any globally hyperbolic spacetime-with-timelike-boundary $({\overline{M}},g)$ there exists a globally hyperbolic spacetime without boundary $(\mathring{M},\mathring{g})$ with the same dimension and an isometric embedding $i:\overline{M} \hookrightarrow \mathring{M}$. \end{cor} \begin{proof} Consider first the globally hyperbolic metric $g^{d}$ on all the double manifold satisfying $g<g^{d}$ on ${\overline{M}}$ (see the beginning of this subsection) as well as the extension $\tilde{g}$ of $g$ to some $\widetilde{M} \subset {\overline{M}}^{d}$ as in Prop. \ref{pp}. Taking a smaller $\widetilde{M}$ if necessary, we can assume that \begin{equation} \tilde{g} < g^{d} \;\; \hbox{on} \;\; \widetilde{M}\quad\hbox{and}\quad {\overline{M}}\subset\widetilde{N}\subset {\rm cl}(\widetilde{N})\subset\widetilde{M}\subset {\overline{M}}^{d}\quad\hbox{for some open subset $\widetilde{N}$ of $\widetilde{M}$.} \end{equation} Let $\tau^{d}$ be the Cauchy temporal function on $({\overline{M}}^{d},g^{d})$ (see the beginning of this subsection), and consider the corresponding orthogonal splitting ${\overline{M}}=\mathds R \times \bar \Sigma \subset \widetilde{M} \subset \mathds R \times \Sigma^{d}\equiv {\overline{M}}^{d}$. Then, on $\widetilde{M}$ we can write: \begin{equation} \tilde{g}=-\tilde{\Lambda}(d\tau^{d})^{2} + \tilde{g}_{\tau^{d}}. \end{equation} Let $\mu$ be a bump function satisfying $\mu({\overline{M}})\equiv 1$ and $\mu({\overline{M}}^{d} \setminus \widetilde{N})\equiv 0$. Let us check that the required extension is $\mathring{M}:=\mu^{-1}((0,1])$ (note that ${\overline{M}} \subset \mathring{M} \subset \widetilde{N}\subset {\rm cl}(\widetilde{N})\subset \widetilde{M} \subset {\overline{M}}^{d}$; in particular, ${\rm cl}(\mathring{M})\subset \widetilde{M}$), and $\mathring{g}=-\mathring{\Lambda}(d\tau^{d})^{2} + \tilde{g}_{\tau^{d}}$ with $\mathring{\Lambda}:=\mu \tilde{\Lambda}$. Clearly, $(\overline{M},g)$ is isometrically embedded into the spacetime of the same dimension $(\mathring{M},\mathring{g})$. Moreover, $\tau^{d}$ is a temporal function for $(\mathring{M},\mathring{g})$ as $\mathring{g} (\leq \tilde{g}) < g^{d}$. So, it is enough to check that the slices $\{\tau^{d}=c \mid c\in \mathds R \} \cap \mathring{M}$ are Cauchy, that is, we will check that $\tau^{d}\mid_{\mathring{M}}$ is Cauchy temporal for $(\mathring{M},\mathring{g})$. Let $\gamma$ be an inextensible future-directed causal curve in $(\mathring{M},\mathring{g})$. Then, $\gamma$ is also causal in $({\overline{M}}^{d},g^{d})$ and we can reparametrize it with $\tau^{d}$, that is, $\gamma:(a,b) \rightarrow \mathring{M}\subset \mathds R \times \Sigma^{d}= \overline{M}^d$, $\gamma(\tau)=(\tau,x(\tau))$. If, say $b<\infty$ (the case $-\infty < a$ is analogous) then necessarily $\exists \, x_{b} \in \Sigma^{d}$ and, taking into account that $\{b\} \times \Sigma^{d}$ is Cauchy for $(\overline{M}^d,g^d)$, \begin{equation} \lim_{\tau \rightarrow b} \gamma(\tau)=(b,x_{b}) \in cl(\mathring{M}) \setminus \mathring{M} \subset \mathds R \times \Sigma^{d}\equiv {\overline{M}}^{d}\quad\hbox{($cl(\mathring{M})\equiv$closure of $\mathring{M}$ in ${\overline{M}}^{d}$).} \end{equation} As $\gamma$ is $\mathring{g}$-causal one has: \[ \mu(\gamma(\tau)) \tilde{\Lambda}(\gamma(\tau)) \geq \tilde{g}_{\tau^{d}}(x'(\tau),x'(\tau)). \] Thus, writing $\tilde{g}_{\tau^{d}}$ in coordinates $\tilde{g}_{ij}$ around $(b,x_b)$: \[ \tilde{\Lambda}(\gamma(\tau)) \geq \tilde{g}_{ij}(\gamma(\tau)) \frac{\dot{x}^{i}(\tau) \dot{x}^{j}(\tau)}{\mu(\gamma(\tau))}. \] If $\epsilon>0$ is the minimum eigenvalue of $\tilde{g}_{ij}(\gamma(\tau))$ in a neighbourhood of $(b,x(b))$ and $\Lambda_{0}(>0)$ is the maximum of $\tilde{\Lambda}$ in this neighbourhood: \begin{equation} \label{eqcor} \Lambda_{0} > \epsilon \, \frac{||\dot{x}(\tau)||_{0}^{2}}{\mu(\gamma(\tau))}, \end{equation} where $|| \cdot ||_{0}$ denotes the standard Euclidean metric in the coordinates $(x^{1},\ldots,x^{n})$. However, as $\mu(b,x_b)=0$ one has a contradiction with (\ref{eqcor}) by expanding in a series: \[ \mu(\gamma(\tau))= \mu((b,x_b))+ {\frac{\partial \mu}{\partial x_{i}}(\mu(b,x_b))} \dot{x}^{i}+ {\frac{\partial^{2} \mu}{\partial x_{i} x_{j}}(\mu(b,x_b))} \dot{x}^{i} \dot{x}^{j}+o(||\dot{x}||_0^{3})= o(||\dot{x}||_0^{3}). \] The last equality \bcambios{holds} because $(b,x_b)$ belongs either to the boundary or to the support of~$\mu$. \end{proof} \section{Appendix A: naked singularities and the causal boundary} Clearly, all the points of the timelike boundary ${\partial M}$ of ${\overline{M}}$ correspond to (conformally invariant) naked singularites of $M$. In this Appendix, globally hyperbolic spacetimes-with-timelike-boundary are characterized as those containing all its naked singularities. Before proceeding, we need to recall some basic notions and properties associated to the causal boundary (c-boundary) of spacetimes without boundary. \subsection{Brief review on the c-completion of spacetimes} We refer to \cite{causalb, Flores} for further details and proofs (see also the original article \cite{GerochIdealPointsSpaceTime1972}). A past set $P\subset M$ (i.e., $P\neq\emptyset$, $I^-(P)=P$) that cannot be written as the union of two proper subsets, both of which are also past sets, is said to be an {\em indecomposable past} set (IP). It can be shown that an IP either coincides with the past of some point of the spacetime, i.e., $P=I^{-}(p)$ for $p\in M$, or else $P=I^{-}(\gamma)$ for some inextendible future-directed timelike curve $\gamma$. In the former case, $P$ is said to be a {\em proper indecomposable past set} (PIP), and in the latter case $P$ is said to be a {\em terminal indecomposable past set} (TIP). These two classes of IPs are disjoint. The {\em common past} of a given set $S\subset M$ is defined by \[\downarrow S:=I^{-}(\{p\in M:\;\; p\ll q\;\;\forall q\in S\}).\] The corresponding definitions for {\em future sets}, IFs, TIFs, PIFs, {\em common future}, etc., are obtained just by interchanging the roles of past and future, and will always be understood. The set of all IPs constitutes the so-called {\it future $c$-completion} of $(M,g)$, denoted by $\hat{M}$. If $(M,g)$ is strongly causal, then $M$ can naturally be viewed as a subset of $\hat{M}$ by identifying every point $p\in M$ with its respective PIP, namely $I^-(p)$. The {\it future $c$-boundary} $\hat{\partial} M$ of $(M,g)$ is defined as the set of all its TIPs. Therefore, upon identifying $M$ with its image in $\hat{M}$ by the natural inclusion as outlined above, \[ \hat{\partial} M \equiv \hat{M} \setminus M. \] The definitions of \textit{past $c$-completion} $\check{M}$ and {\it past $c$-boundary} $\check{\partial}M$ of $(M,g)$ are readily defined in a time-dual fashion using IFs. Next, we introduce the so-called {\em Szabados relation} (or \textit{$S$-relation}) between IPs and IFs: an IP $P$ and an IF $F$ are {\em S-related}, denoted $P\sim_{S}F$, if $P$ is a maximal IP inside $\downarrow F$ and $F$ is a maximal IF inside $\uparrow P$. In particular, for any $p \in M$, it can be shown that $I^-(p) \sim_{S} I^+(p)$. \begin{defi}\label{d1} The {\em (total) c-completion} $\overline{M}^c$ is composed by all the pairs $(P,F)$ formed by $P\in \hat{M}\cup\{\emptyset\}$ and $F\in \check{M}\cup\{\emptyset\}$ such that either \begin{itemize} \item[i)] both $P$ and $F$ are non-empty and $P\sim_{S}F$; or \item[ii)] $P=\emptyset$, $F \neq \emptyset$ and there is no $P'\neq \emptyset$ such that $P'\sim_{S}F$; or \item[iii)] $F=\emptyset$, $P \neq \emptyset$ and there is no $F'\neq\emptyset$ such that $P\sim_{S}F'$. \end{itemize} The original manifold $M$ is then identified with the set $\{(I^{-}(p),I^{+}(p)): p\in M\}$, and the {\em c-boundary} is defined as $\partial^c M\equiv\overline{M}^c\setminus M$. \end{defi} \begin{rem} \label{nakedsingu} {\em Any pair $(P,F)\in \partial^c M$, with $P \neq \emptyset \neq F$, will be called a {\em naked singularity}. Notice that, necessarily $P=I^-(\gamma)$ for some inextendible future-directed timelike curve, and $\gamma$ must lie in the past of any $z\in F$ (a dual assertion follows by interchanging the role of $P$ and $F$). According to a classical physical interpretation, $\gamma$ may represent a particle dissapearing of the spacetime, and all this process can be seen at $z$. Conversely, whenever such a $z, \gamma$ ($\gamma\subset I^-(z)$) exist, a pair $(P,F)\in\partial^c M, P \neq \emptyset \neq F$ must appear. Clearly, such a notion of naked singularity is conformally invariant. However, one expects that the physically relevant representatives of the conformal class will present curvature-related divergences along such $\gamma$'s which make the spacetime inextensible. } \end{rem} Having defined the set structure of the $c$-completion, the next step is to extend the chronological relation in $(M,g)$ to the $c$-completion as follows: \begin{equation} (P,F)\ll (P',F')\;\;\iff\;\; F\cap P'\neq\emptyset. \label{eq:7} \end{equation} Next, let us define the {\em future chronological limit operator} $\hat{L}$ on $\hat{M}$ as follows. Given a sequence $\sigma=\{P_{n}\}_{n}\subset \hat{M}$ of IPs and $P\in \hat{M}$, we set \begin{equation} \label{eq:3} P\in \hat{L}(\sigma)\iff \left\{\begin{array}{l} P\subset \mathrm{LI}(\sigma)\\ P \hbox{ is a maximal IP in }\mathrm{LS}(\sigma), \end{array}\right. \end{equation} \bcambios{ \[ \hbox{where}\quad \begin{array}{lll} LI(\sigma) &:=& \{x \in M \, : \, \mbox{ $x$ belongs to all but finitely many $P_n$'s}\}, \\ LS(\sigma) &:=& \{x \in M \, : \, \mbox{ $x$ belongs to infinitely many $P_n$'s}\}. \end{array} \] } Again, by simply interchanging past and future sets we may analogously define the {\it past chronological limit operator} $\check{L}$ on $\check{M}$. Then, the {\em future (resp. past) chronological topology on $\hat{M}$ (resp. $\check{M}$)} is the derived topology associated to the limit operator $\hat{L}$ (resp. $\check{L}$), that is, the topology whose {\em closed sets} are those subsets $C \subset \hat{M}$ (resp. $C \subset \check{M}$) such that $\hat{L}(\sigma) \subset C$ (resp. $\check{L}(\sigma) \subset C$) for any sequence $\sigma$ of elements of $C$. \smallskip In order to define the chronological topology on the full $c$-boundary, first define a limit operator $L$ on $\overline{M}^c$ as follows: given a sequence $\sigma=\{(P_{n},F_{n})\}\subset\overline{M}^c$, put \begin{equation} \label{eq:4} (P,F)\in L(\sigma)\iff \left\{ \begin{array}{l} P\in \hat{L}(P_{n}) \hbox{ if $P\neq \emptyset$}\\ F\in\check{L}(F_n) \hbox{ if $F\neq \emptyset$}. \end{array} \right. \end{equation} By definition, the {\em chronological topology on $\overline{M}^c$} is the derived topology $\tau_L$ associated to the limit operator $L$ defined in (\ref{eq:4}), that is, the topology whose {\em closed sets} are those subsets $C \subset \overline{M}^c$ such that $L(\sigma) \subset C$ for any sequence $\sigma$ of elements of $C$. The following result (see \cite[Thm. 3.27]{causalb}) summarizes the key properties of the chronological topology. \begin{thm} \label{thm:mainc-completion} Let $(M,g)$ be a strongly causal spacetime and consider its associated $c$-completion $\overline{M}^c$ endowed with the chronological relations and chronological topology defined in (\ref{eq:7}) and (\ref{eq:4}), respectively. Then, the following statements hold. \begin{itemize} \item[1.] \label{item:mismatopologia}The inclusion $M\hookrightarrow \overline{M}^c$ is continuous, with an open dense image. In particular, $\partial^c M$ is closed in ${\overline{M}}^c$ and the topology induced on $M$ by the chronological topology on $\overline{M}$ coincides with the original manifold topology. \item[2.] The chronological topology is second-countable and $T_1$ (but not necessarily $T_2$). \item[3.] \label{item:chains} Let $\{x_n\}\subset M$ be a {\em future (resp. past) chain}, i.e., a sequence satisfying that $x_n\ll x_{n+1}$ (resp. $x_{n+1}\ll x_{n}$) for all $n$. Then, \[ \begin{array}{c} L(\left\{ x_{n} \right\})=\left\{ (P,F)\in \overline{M}^c: P=I^-(\left\{ x_n \right\}) \right\} \\ \hbox{(resp. $L(\left\{ x_{n} \right\})=\left\{ (P,F)\in \overline{M}^c: F=I^+(\left\{ x_n \right\}) \right\})$.} \end{array} \] \item[4.] \label{item:c-completioncompleta} The c-completion is {\em complete} in the following sense: given any (future or past) chain $\{x_n\}\subset M$, necessarily $L(\left\{ x_{n} \right\}) \neq \emptyset$, i.e. any (future or past) chain converges in $\overline{M}^c$. \item[5.] The sets $I^{\pm}((P,F))\subset\overline{M}^c$ are open for all $(P,F)\in \overline{M}^c$. \end{itemize} \end{thm} \subsection{Main result} It is worth emphasizing the following result in the case without boundary \cite[Cor. 4.34]{causalb}: \begin{quote} {\em Let $(M,g)$ be a spacetime which admits a conformal boundary ${\partial M}$ such that ${\overline{M}}=M\cup {\partial M}$ is $C^1$ and ${\partial M}$ {\em chronologically complete} (i.e., each inextensible future/past-directed timelike curve in $M$ has an endpoint in $\partial M$). $M$ is globally hyperbolic if and only if ${\partial M}$ {\em does not admit timelike points} (i.e., $T_{\hat p}({\partial M})$ is everywhere either a spacelike or a lightlike hyperplane).} \end{quote} This result suggests that, for a globally hyperbolic \ncambios{spacetime-with-timelike-boundary}, the boundary should contain all the naked singularities. The formal statement and proof of this assertion will be given in Th. \ref{naked} below. Previously, Lemma \ref{diamondclosure} will extend the basic results \cite[Lemma 3.4]{BE}, \cite[Thm. 2.3]{Harris} to the case of a strongly causal spacetime-with-timelike-boundary. \begin{rem} {\em The hypotheses which ensure that the (conformal) boundary ${\partial M}$ of a \ncambios{spacetime-with-boundary} ${\overline{M}}$ can be identified with the c-boundary $\partial^cM$ of its interior $M$ and, moreover, that the c-completion ${\overline{M}}^c$ agrees with the \ncambios{spacetime-with-boundary} ${\overline{M}}$, were analyzed in \cite[Section 4]{causalb}, see specially Thm. 4.26, Cor. 4.28 and Thm. 4.32 therein. In particular, it is straightforward to check that, the boundary ${\partial M}$ of any spacetime-with-timelike-boundary ${\partial M}$ is {\em regularly accessible}. Essentially, this means that ${\partial M}$ cannot present a variety of pathologies which occur for arbitrary conformal embeddings, and ${\partial M}$ can be regarded as a part of the causal boundary. Indeed, ${\partial M}$ can be identified with the whole $\partial^cM$ (and ${\overline{M}}$ with ${\overline{M}}^c$) when ${\partial M}$ is both regularly accessible and chronologically complete, see \cite[Th. 4.16]{causalb}. Anyway, here we will make a self-contained development adapted to our purposes. } \end{rem} \ncambios{We will abuse of notation in the remainder by writing $I^{\pm}(p,M)$ instead of $I^{\pm}(p)\cap M$ for any $p\in \overline{M}$ (recall Remark \ref{nuevo}).} \begin{lemma} \label{diamondclosure} Let $(\overline{M},g)$ be a strongly causal spacetime-with-timelike-boundary. (1) If $cl(J^{+}(p) \cap J^{-}(q))$ is compact for all $p,q \in \overline{M}$ then $(\overline{M},g)$ is globally hyperbolic with timelike boundary. (2) Let $\hat x\in \overline{M}$ and $\{x_n\}$ be a sequence in $\overline{M}$ such that $I^-(x,M)\in \hat L (\{I^-(x_n,M)\})$. Then $\{x_n\}$ converges to $\hat x$ with the manifold topology of ${\overline{M}}$. \end{lemma} \begin{proof} (1) Essentially, we will follow the proof of \cite[Lemma 4.29]{Beem}. It suffices to show that $J^{+}(p) \cap J^{-}(q)\subset\overline{M}$ is closed for every $p,q \in \overline{M}$. By contradiction, suppose that $r \in cl(J^{+}(p) \cap J^{-}(q)) \setminus J^{+}(p) \cap J^{-}(q)$. Then, there exists $\{r_{n}\} \subset J^{+}(p) \cap J^{-}(q)$ such that $r_{n} \rightarrow r$. Let $\gamma_{n}:[0,1) \rightarrow \overline{M}$ be inextensible future-directed causal curves such that $\gamma_{n}(0)=p$, $r_{n} \in \gamma_n$ and $q \in \gamma_{n}$ for all $n$. By Prop. \ref{p2.11} there exists a future-directed causal limit curve $\gamma:[0,1) \rightarrow \overline{M}$ of $\{\gamma_{n}\}$ such that $\gamma(0)=p$. Since $(\overline{M},g)$ is strongly causal, the inextensible causal curve $\gamma:[0,1) \rightarrow \overline{M}$ is not imprisoned on the compact subset $cl(J^{+}(p) \cap J^{-}(q))$. Hence, there exists $x \in {\rm Im}(\gamma)$ such that $x \not \in cl(J^{+}(p) \cap J^{-}(q))$. From the notion of limit curve, any neighborhood of $x\in Im(\gamma)$ intersects all but finitely many of the $\gamma_n$'s. So, we can assume without restriction the existence of a sequence $x_n \in Im(\gamma_n)$ such that $\{x_{n}\}$ converges to $x$. Since $x \not \in cl(J^{+}(p) \cap J^{-}(q))$ we also have that $x_{n} \not \in cl(J^{+}(p) \cap J^{-}(q))$ for all $n$ large enough. So taking into account that $\gamma_{n} \subset J^{+}(p)$, it follows that $x_{n} \not \in J^{-}(q)$ for large $n$. Hence $q$ lies between the points $p$ and $x_{n}$ on $\gamma_{n}$, i.e, $p \leq r_{n} \leq q \leq x_{n}$ for large $n$. Denote by $\gamma \mid_{[p,x]}$ the portion of $\gamma$ between the point $p$ and $x$, and by $\gamma_{n} \mid_{[p,x_{n}]}$ the portion of $\gamma_{n}$ between the points $p$ and $x_{n}$. From Prop. \ref{otro} (1), we may assume, by taking a subsequence of $\{\gamma_{n}\mid_{[p,x_{n}]}\}$ if necessary, that $\{\gamma_{n}\mid_{[p,x_{n}]}\}$ converges to $\{\gamma\mid_{[p,x]}\}$ in the $C^0$ topology of curves. Since $q \in \gamma_{n} \mid_{[p,x_{n}]}$, necessarily $q \in \gamma \mid_{[p,x]}$. On the other hand, since $r_{n} \leq q$ and $r_{n} \rightarrow r$, necessarily $r \in \gamma\mid_{[p,x]}$ and $r\leq q$. Therefore, $r \in J^{+}(p) \cap J^{-}(q)$, a contradiction. (2) We will follow the reasoning in the implication to the left of \cite[Thm. 2.3]{Harris}. Assume by contradiction that $x_{n} \not \rightarrow \hat x$. Then, there exists a relative compact open neighbourhood $U \ni \hat x$ ($U\subset {\overline{M}}$), and a subsequence $\{x_{n_{k}}\}$ with $x_{n_{k}} \not \in U$ for all $k$; by strong causality, $U$ can be assumed causally convex (Prop. \ref{imprisoned}). Consider a future chain $\{z_{n}\} \subset I^{-}(\hat{x},M)$ such that $z_{n} \rightarrow \hat{x}$. For $n$ sufficiently large, $z_{n} \in U$. Since $z_{n} \ll \hat{x}$, there exists $K_{n}\in \mathbb{N}$ such that $z_{n} \ll x_{n_{k}}$ for $k \geq K_{n}$. So, there is a timelike curve $\gamma_{n}^{k}$ in $\overline{M}$ from $x_{n}$ to $z_{n_{k}}$. Since $x_{n_{k}} \not \in U$, $\gamma^{k}_{n}$ exits $U$ at some point $y_{n_{k}} \in \dot{U}$. For each $n$, the curves $\{\gamma_{n}^{k} \mid k \geq K_{n}\}$ have a future-directed causal limit curve $\gamma_{n}$ in $\overline{M}$ from $z_{n}$ to some point $y_{n} \in \dot{U}$. Moreover, the sequence of curves $\{\gamma_{n}\}$ has a future-directed causal limit curve $\gamma$ in $\overline{M}$ from $\hat{z}$ to some $y \in \dot{U}$ as $\gamma$ cannot remain imprisoned in $cl(U)$. Let $I^{-}(y,M)=I^{-}(\gamma,M)$ and note that $I^{-}(y,M) \subset LI(\{I^{-}(x_{n_{k}},M)\})$. In fact, take $w \in I^{-}(y,M)$, then $y \in I^{+}(w,M)$, so, for large $n$, we have that $y_{n} \in I^{+}(w,M)$. Therefore, for $k$ large enough, $y_{n_k} \in I^{+}(w,M)$. Since $y_{n_k} \ll x_{n_{k}}$, necessarily $x_{n_{k}} \in I^{+}(w,M)$ for large $k$. Hence, $(I^-(\hat{x},M)\subsetneq)I^{-}(y,M)\subset LI(I^-(x_{n_k},M))$, in contradiction with $I^-(\hat{x},M)\in \hat{L}(I^-(x_n,M))\subset\hat{L}(I^-(x_{n_k},M))$. \end{proof} \begin{thm} \label{naked} Let $(\overline{M},g)$ be a strongly causal spacetime-with-timelike-boundary. The following sentences are equivalent: \begin{itemize} \item [(a)] $(\overline{M},g)$ is a globally hyperbolic spacetime-with-timelike-boundary. \item [(b)] $\partial M$ contains all the naked singularities, i.e., for any pair $(P,F)$ in the c-boundary $\partial^{c}M$, with $P\neq \emptyset \neq F$, there exists $\hat{z} \in \partial M$ such that $(P,F)=(I^{-}(\hat{z},M),I^{+}(\hat{z},M))$. \end{itemize} \end{thm} \begin{proof} (a) $\Rightarrow$ (b). Let $(P,F) \in \partial^{c}M$ with $P \neq \emptyset \neq F$. Take chains $\{p_{n}\}$, $\{q_{n}\} \subset M$ generating $P$ and $F$, respectively. Then, for some $p_0, q_0\in M$ (which could be included as the first element of each chain) we have $$p_{n}, q_{n} \in I^{+}(p_0,M) \cap I^{-}(q_0,M) \subset I^{+}(p_0) \cap I^{-}(q_0) \subset J^{+}(p_0) \cap J^{-}(q_0).$$ The compactness of $J^{+}(p_0) \cap J^{-}(q_0)$ implies the existence of $\hat{z}, \hat{z}'\in \partial{M}$ such that $p_{n} \rightarrow \hat{z}$ and $q_{n} \rightarrow \hat{z}'$ respectively (since $(\overline{M},g)$ is strongly causal we can ensure that previous limits hold for the entire sequences, not only for some subsequences of them). Assume by contradiction that $\hat{z} \neq \hat{z}'$. Since $p_{n} \ll q_{n}$, there exists future-directed timelike curves $\gamma_{n}:[0,1] \rightarrow M$ joining each $p_{n}$ and $q_{n}$ with $\gamma_{n}(0)=p_{n} \rightarrow \hat{z}$ and $\gamma_{n}(1)=q_{n} \rightarrow \hat{z}'$. Since $(\overline{M},g)$ is globally hyperbolic, Prop. \ref{otro} (2) implies the existence of a causal limit curve $\gamma:[0,1] \rightarrow \overline{M}$ so that $\gamma(0)=\hat{z}$ and $\gamma(1)=\hat{z}'$. Take some $0<s_0<1$ such that $\hat{z} < \gamma(s_{0}) < \hat{z}'$. Note that $I^{-}(\gamma(s_{0}),M) \subset \downarrow F$. In fact, if $p \in I^{-}(\gamma(s_{0}),M)$ then $\gamma(s_{0}) \in I^{+}(p)$. So, taking into account that $\gamma$ is a limit curve and $I^{+}(p)$ is an open set, there exists a subsequence $\{\gamma_{n_{k}}\}$ and a subsequence $\{s_{n_{k}}\} \subset [0,1]$ such that $\gamma_{n_{k}}(s_{n_{k}}) \in I^{+}(p)$. This implies $p \ll \gamma_{n_{k}}(s_{n_{k}}) \ll q_{n_{k}}$, and so, $p\ll q_{n_{k}}$ for all $k$, which implies $I^{-}(\gamma(s_{0}),M) \subset \downarrow F$, as required. In conclusion, to prove $P \subsetneq I^{-}(\gamma(s_{0}),M)(\subset \downarrow F)$ suffices, as this would contradict $P\sim_s F$. First, let us justify the identity $P=I^{-}(\hat{z},M)$ by proving the following \smallskip \noindent {\em Claim 1:} If $\beta:[a,b) \rightarrow \overline{M}$ is a future-directed timelike curve such that $\beta(t) \rightarrow p$ ($\beta$ is continuously extendible to $p$) then $I^{-}(p)=I^{-}(\beta)$. \smallskip \noindent {\em Proof of the Claim 1.} For the inclusion to the right, take any $w \in I^{-}(p)$. Then, $p \in I^{+}(w)$ and, taking into account that it is an open, necessarily $\beta(t) \in I^{+}(w)$ for large $t$. So, $w \in I^{-}(\beta)$. For the inclusion to the left, take now $w \in I^{-}(\beta)$. Then, $w \ll \beta(t_{0})$ for some $t_{0} \in [a,b)$ and, taking into account that $\beta$ is continuously extendible to $p$, necessarily $w \ll \beta(t_{0}) \ll p$. So, $w \in I^{-}(p)$. $\Box$ \smallskip Taking into account the previous claim, to show $I^{-}(\hat{z},M)(=P)\subsetneq I^{-}(\gamma(s_0),M)$ suffices. We already know that $I^{-}(\hat{z}) \subsetneq I^{-}(\gamma(s_0))$ (from Prop. \ref{p_ord_lowerlevels}, $(\overline{M},g)$ is distinguishing). Assume by contradiction that $I^{-}(\hat{z},M)=I^{-}(\gamma(s_{0}),M)$. Since $\partial M$ is smooth, we can take future-directed timelike curves $\sigma_{i}:[0,1) \rightarrow M \subset \overline{M}$, $i=1,2$, such that $\sigma_{1}(1)=\hat{z} \in \partial M$ and $\sigma_{2}(1)=\gamma(s_{0}) \in \partial M$. Moreover, these curves satisfy $I^{-}(\hat{z},M)=I^{-}(\sigma_1,M)$ and $I^{-}(\gamma(s_0),M)=I^{-}(\sigma_2,M)$. Since each curve $\sigma_{i}$, $i=1,2$, is future-directed timelike, necessarily $\sigma_{i} \subset I^{-}(\sigma_{i},M)$ for $i=1,2$. Moreover, from the initial assumption, $\sigma_{1} \subset I^{-}(\sigma_{2},M)$ and $\sigma_{2} \subset I^{-}(\sigma_{1},M)$. Hence $I^{-}(\sigma_{1}) \subset I^{-}(\sigma_{2})$ and $I^{-}(\sigma_{2}) \subset I^{-}(\sigma_{1})$, and thus, $I^{-}(\sigma_{1})=I^{-}(\sigma_{2})$. Indeed, let us prove that, say, $I^{-}(\sigma_{1}) \subset I^{-}(\sigma_{2})$. If $w_{0} \in I^{-}(\sigma_{1})$ then $w_{0} \ll \sigma_{1}(t)$ for some $t \in [0,1)$. Since $\sigma_{1} \subset I^{-}(\sigma_{2},M)$, necessarily $w_{0} \ll \sigma_{1}(t) \ll \sigma_{2}(s)$, which implies that $w_{0} \ll \sigma_{2}(s)$, and thus, $w_{0} \in I^{-}(\sigma_{2})$. The proof of $I^{-}(\sigma_{2}) \subset I^{-}(\sigma_{1})$ is analogous. In conclusion, we have proved that $I^{-}(\sigma_{2})=I^{-}(\sigma_{2})$ whenever $\sigma_{1}(t) \rightarrow z$ and $\sigma_{2}(t) \rightarrow \gamma(s_{0})$, which implies $I^{-}(z)=I^{-}(\gamma(s_{0}))$, a contradiction. \medskip (a) $\Leftarrow$ (b). From Lemma \ref{diamondclosure} (1), it suffices to show that $cl(J^{+}(p) \cap J^{-}(q))\subset \overline{M}$ is (sequentially) compact for any $p,q \in \overline{M}$. To this aim, consider any sequence $\{z_{n}\} \subset cl(J^{+}(p) \cap J^{-}(q))$. It is not a restriction to assume that $\{z_{n}\} \subset J^{+}(p) \cap J^{-}(q)$ (otherwise, replace $\{z_{n}\}$ by some other sequence $\{z'_n\}$ in $J^{+}(p) \cap J^{-}(q)$ such that $d_{R}(z'_{n},z_{n})<1/n$ for some auxiliary Riemannian metric $g_{R}$ on $\overline{M}$). In order to prove that $\{z_{n}\}$ converges to some $z \in cl(J^{+}(p) \cap J^{-}(q))$, first note that every \color{blue}{$z_{n} \in J^{+}(p) \cap J^{-}(q)$} satisfies $I^{-}(p,M) \subset I^{-}(z_{n},M)$ and $I^{+}(q,M) \subset I^{+}(z_{n},M)$. Hence, \cite[Prop. 5.3]{causalb2} ensures the existence of some IP $P$ and some IF $F$ containing $I^{-}(p,M)$ and $I^{+}(q,M)$, respectively, such that, up to a subsequence, \begin{equation}\label{eq} P\in \hat{L}(\{I^{-}(z_{n},M)\})\quad\hbox{and}\quad F\in \check{L}(\{I^{+}(z_{n},M)\}). \end{equation} In particular, $\emptyset\neq P \subset \downarrow F$ and $\emptyset\neq F \subset \uparrow P$. In the case that $P=I^{-}(z,M)$ for some $z \in M$ (and analogously for $F$), the closedness of ${\partial M}$ (see Thm. \ref{thm:mainc-completion}) and (\ref{eq:3}) imply that $z_{n} \in M$ for large $n$ and $z_{n} \rightarrow z$ with the manifold topology. So, only the case when both $P$ and $F$ are terminal (in $M$) must be taken into account. In this case, it suffices to show that $P\sim_S F$, since then, by hypothesis, $P=I^-(z,M)$ for some $z\in{\partial M}$, and Lemma \ref{diamondclosure} (2) gives the result. So, assume by contradiction that $P\not\sim_S F$. Choose any $F'$ which is a maximal IF in $\uparrow P$ containing $F$. If $P\sim_S F'$ holds, again by hypothesis we have $F=I^+(z,M)$ for some $z\in{\partial M}$, and Lemma \ref{diamondclosure} (2) implies that $z_n\rightarrow z$ (anyway, this case could not hold because, then, one would also have $F'\in \check{L}(\{I^+(z_n,M)\})$, in contradiction with the second expression in (\ref{eq})). So, the problem is reduced to the following claim. \smallskip \noindent {\em Claim 2:} If $F'$ is a maximal IF in $\uparrow P$ then $P$ must be a maximal IP in $\downarrow F'$. In particular, $P\sim_S F'$. \smallskip \smallskip \noindent {\em Proof of the Claim 2.} Assume by contradiction that $P \subsetneq P' \subset \downarrow F'$. Then, $(P',F') \in \overline{M}^{c}$. Let $z' \in \overline{M}$ be the point such that $(P',F')=(I^-(z'),I^+(z'))$ (which exists by hypothesis) and consider future-directed chains $\{p_{i}\}$ and $\{p_{i}'\}$ generating $P$ and $P'$, respectively, such that $p_{i} \ll p_{i}'$ for all $i$. So, there exists some inextensible past-directed timelike curves $\gamma_i$ joining $p_{i}'$ with $p_{i}$ for all $i$. Since $\{p_{i}'\}$ converges to $z'$, from Prop. \ref{p2.11} there exists a past-directed causal limit curve $\gamma:[0,1) \rightarrow \overline{M}$ with $\gamma(0)=z'$. Next, we consider two excluding cases: \begin{itemize} \item There exists $q_0\in {\rm Im}(\gamma)$ and some subsequence $\{p_{i_k}\}$ such that $p_{i_k}\rightarrow q_0$. Note that we can directly exclude the case $q_0=z'$, since, otherwise, $p_{i_k}\rightarrow z'$, and thus, $P=I^{-}(z',M)=P'$ (see Claim 1), a contradiction. In this case, take $s_{0}\in (0,1)$ and $\{s_{i_k}\}$ such that $\gamma(s_0)=q_0\neq z'$ and $p_{i_k}=\gamma_{i_k}(s_{i_k})$ for all $k$. \item There is no subsequence of $\{p_i\}$ converging to some point of $\gamma$; in this case, take any $s_0\in (0,1)$, and define $q_0:=\gamma(s_0)$. Since $\gamma$ is a limit curve, there exists $\{s_{i_{k}}\}$ such that $\gamma_{i_k}(s_{i_k})\rightarrow q_0$. Moreover, we can assume additionally $p_{i_k} \ll \gamma_{i_k}(s_{i_k})$ for all $k$. Indeed, otherwise we can assume, up to a subsequence, $\gamma(s_{i_k}) \ll p_{i_k}$. By Prop. \ref{otro} (1) $\{\gamma_{i_{k}}\mid_{[0,s_{i_{k}}]}\}$ converges in the $C^0$-topology to $\gamma \mid_{[z^{'},q_{0}]}$. Thus, any relatively compact neighborhood of $Im(\gamma_{[z',q_{0}]})$ contains all the points $p_{i_k}$ up to a subsequence, in contradiction with the hypothesis of non-convergence. \end{itemize} \noindent Trivially, $I^{+}(z',M) \subset I^{+}(q_{0},M)$ and we will prove $I^{+}(q_{0},M) \subset \uparrow P$ with a reasoning valid in both cases. If $w \in I^{+}(q_{0},M)$ then $q_{0} \in I^{-}(w)$, and taking into account that $\gamma_{i_k}(s_{i_k})\rightarrow q_0$, we have that $\gamma_{i_{k}}(s_{i_{k}}) \in I^{-}(w)$. So, $p_{i_{k}} \ll w$. Therefore, $p \ll p_{i_{k}} \ll w$ for any $p\in P$ and any $k$ large enough, and thus, $I^{+}(q_{0},M) \subset \uparrow P$. Summarizing, we have proved $I^{+}(z',M) \subset I^{+}(q_{0},M)\subset \uparrow P$. On the other hand, since $z' \neq q_{0}$, \cite[Lemma 4.6]{causalb} ensures that $F'(=I^{+}(z',M)) \subsetneq I^{+}(q_{0},M)$, in contradiction with the maximality of $F'$ into $\uparrow P$. $\Box$ \end{proof} \section{Appendix B: Piecewise smooth and $H^1$ causal relations are different} Next, our aim will be to show that there exists a spacetime-with-timelike-boundary which can be written as a product $(\overline{M}= \mathds R\times \bar \Sigma, g=-d\tau^2 +g_0)$ such that the causal future of some point computed by using piecewise $C^{\infty}$ smooth causal curves is {\em strictly contained} in its causal future computed with $H^1$-causal curves. Moreover, ${\overline{M}}$ will be globally hyperbolic or not, depending on whether the causal relation is computed by using $H^1$-curves or piecewise smooth ones. The problem is reduced to construct a complete $C^\infty$-Riemannian manifold with boundary $(\bar \Sigma,g_0)$ containing two points $P_0$, $P_\infty$, which cannot be connected by means of any minimizing path with piecewise smooth regularity. This problem was studied by R. Alexander and S. Alexander \cite{AA}, who proved that the completeness of $g_0$ implies the existence of a minimizing path $\alpha$, but only $C^1$ regularity is assured for $\alpha$. So, assuming that such a $\alpha:[0,T]\rightarrow \bar \Sigma$ cannot be piecewise smooth and it is parametrized by arc-length, the curve $\gamma(t)=(t,\alpha(t)), t\in [0,T]$, becomes $H^1$-causal (indeed, $C^1$ and lightlike) and it connects $(0,P_0)$ with $(T,P_\infty)$. However, these points cannot be connected by means of a piecewise smooth lightlike curve $\tilde \gamma$, as the projection of $\tilde \gamma$ on $\bar \Sigma$ would be a piecewise smooth minimizer. It is worth pointing out that such $P_0$ and $P_\infty$ can be connected in $\bar \Sigma$ by means of arbitrarily close piecewise smooth curves $\gamma_k$ with lengths $T_k \searrow T$. However, this does not permit to connect $(0,P_0)$ and $(T,P_0)$ by means of piecewise smooth lightlike curves, but only $(0,P_0)$ and each $(T_k,P_0)$ (these points can also be joined by smooth timelike ones). Being ${\overline{M}}$ a product, its global hyperbolicity in the $H^1$-causal case can be proven by checking that the slices $\tau=$ constant are Cauchy (exactly as in the case without boundary \cite[Theorem 3.66]{Beem}), while its non-global hyperbolicity in the piecewise smooth case (indeed, its non-causal simplicity) follows just because $J^+_{ps}((0,P_0))$ ($\not\ni (T,P_\infty)$) is not closed. In order to find $(\bar \Sigma,g_0)$ as claimed above, the proof in \cite{AA} makes apparent that there is no any reason to expect piecewise smooth differentiability for the minimizers. Anyway, the explicit counterexample is depicted in Fig. \ref{boundary} is sketched next. \begin{figure}[hbt!] \centering \ifpdf \setlength{\unitlength}{1bp}% \begin{picture}(150,150)(0,0) \put(0,0){\includegraphics[scale=.25]{Boundary.pdf}} \put(105.00,55.00){\fontsize{10.25}{0.0}\selectfont $\color{red} f$} \put(170.00,95.00){\fontsize{10.25}{0.0}\selectfont $\color{blue} h$} \put(115.00,-07.00){\fontsize{10.25}{0.0}\selectfont $x_m$} \end{picture}% \else \setlength{\unitlength}{1bp}% \begin{picture}(150,150)(0,0) \put(0,0){\includegraphics[scale=.25]{Boundary.pdf}} \put(105.00,55.00){\fontsize{10.25}{0.0}\selectfont $\color{red} f$} \put(170.00,95.00){\fontsize{10.25}{0.0}\selectfont $\color{blue} h$} \put(115.00,-07.00){\fontsize{10.25}{0.0}\selectfont $x_m$} \end{picture}% \fi \caption{\label{boundary} \gcambios{Function $f$ that determines the boundary of $(M_0,g_0)$. Note that $f$ is obtained by adding to the graph of $h$ infinitely many humps of decreasing size towards 0.}} \end{figure} Concretely, $(\bar \Sigma,g_0)$ will be a closed subset of $\mathds R^2$ (in natural coordinates $(x,y)$) type \[ \bar \Sigma:=\{(x,f(x))\in\mathds R^2:\; x\leq f(x)\},\quad \hbox{for some $C^\infty$-smooth function $f:\mathds R\rightarrow \mathds R$. } \] First, consider the smooth function $h:{\mathbb R}\rightarrow {\mathbb R}$, \[ h(x):=\left\{\begin{array}{cc} 0 & \hbox{if $x\leq 0$} \\ e^{-1/x^2} & \hbox{if $x>0$.}\end{array}\right. \] Take the sequence of points $(P_m)$ with $P_m:=(x_m,h(x_m))\in {\rm graph}(h)$ \gcambios{for all $m> 5$} with $x_m=1/m$. For each $m$, consider the function $h_m:\mathbb{R}\rightarrow \mathbb{R}$ such that $h_m(x_m)=0$ and whose first derivative coincides with the following bump-cavity function (see Fig. \ref{hmprima}) \[ h'_m(x)=\left\{\begin{array}{ll} K_m e^{\lambda_{m}^+(x)} & \hbox{if $x\in (x_m-\epsilon_m,x_m)$} \\ -K_m e^{\lambda_{m}^-(x)} & \hbox{if $x\in (x_m,x_m+\epsilon_m)$} \\ 0 & \hbox{otherwise,}\end{array} \right. \] where \[ \lambda_m^{\pm}(x)=-\frac{1}{1-\left(\frac{2}{\epsilon_m}x\pm 1-\frac{2x_m}{\epsilon_m}\right)^2},\quad K_m=m^3e^{-m^2}\quad \hbox{and}\quad \epsilon_m=1/m^2. \] \begin{figure}[hbt!] \centering \ifpdf \setlength{\unitlength}{1bp}% \begin{picture}(150,150)(0,0) \put(0,0){\includegraphics[scale=.25]{Funcionhmprima.pdf}} \put(60.00,60.00){\fontsize{10.25}{0.0}\selectfont $h_{m}'$} \put(79.99,4.00){\fontsize{10.25}{0.0}\selectfont $x_m$} \put(115.00,4.00){\fontsize{10.25}{0.0}\selectfont $x_m+\epsilon_m$} \put(25.00,4.00){\fontsize{10.25}{0.0}\selectfont $x_m-\epsilon_m$} \end{picture}% \else \setlength{\unitlength}{1bp}% \begin{picture}(150,150)(0,0) \put(0,0){\includegraphics[scale=.25]{Funcionhmprima.pdf}} \put(60.00,60.00){\fontsize{10.25}{0.0}\selectfont $h_{m}'(x)$} \put(79.99,-07.00){\fontsize{10.25}{0.0}\selectfont $x_m$} \put(115.00,-07.00){\fontsize{10.25}{0.0}\selectfont $x_m+\epsilon_m$} \put(25.00,-07.00){\fontsize{10.25}{0.0}\selectfont $x_m-\epsilon_m$} \end{picture}% \fi \caption{\label{hmprima}\gcambios{Function $h_m'$. The derivatives of any order to $h'_m$ vanish at $x_{m}$ and $x_{m}\pm\epsilon_m$. }} \end{figure} Then, the required function $f$ is just (see Fig. \ref{boundary}): \[ f:\mathbb{R}\rightarrow\mathbb{R},\qquad f(x):=h(x)+\sum_{m=1}^{\infty}h_m(x). \] Notice that $f$ is $C^\infty$ because so are $h$ and all $h_m$, and: (a) at each $x\in \mathds R$ there is at most one non-vanishing $h_m$ because of our choice of $\epsilon_m$, and (b) for all $k\in \mathds N$, the $k$-th derivative of $f$ satisfies $\lim_{x\searrow 0}f^{(k)}(x)=0$ \gcambios{because $K_m/\epsilon_m^{2k}$ bounds $h_m^{(k)}$} and our choice of $K_m$ ensures $\lim_{m\rightarrow\infty} K_m/\epsilon_m^{2k}=0$. For any point $P_0=(x_0, h(x_0))$ with $x_0>0$ and $P_\infty=(0,0)$ the minimizer $\alpha$ will not be piecewise smooth at $P_0$, because it will have $C^2$-breaks which accumulate at $P_\infty$. The idea is the following. Outside the regions $I_m\times \mathds R$, with $I_m:=(x_m-\epsilon_m,x_m+\epsilon_m)$, $\alpha$ must remain in the boundary $\partial \Sigma$ (i.e., $\alpha$ parametrize graph$(f)=$ graph$(h)$), because of the \gcambios{convexity of $\partial\Sigma$ respect to $\Sigma$}. However, $\alpha$ must abandon $\partial \Sigma$ at each interval $I_m$ (whenever $x_m+\epsilon_m< x_0$). Indeed, $\alpha$ must remain in $\Sigma$ and, thus, be a segment of $\mathds R^2$ in some maximal region $(x_m^-,x_m^+)\times \mathds R$ with $x_m-\epsilon <x_m^-<x_m^+<x_m+\epsilon$. Even more, at $x_m^-$, $\alpha$ must be tangent to $\partial\Sigma$ and it must remain in the boundary for close $x<x_m^-$. Nevertheless, as \gcambios{one will have} $f''(x_m^-)\neq 0$ , $\alpha$ is not $C^2$-smooth at $x_m^-$. In order to check these properties, notice: \begin{itemize} \item[(A)] The line \gcambios{$l_1$} tangent to the graph of $f$ at $x_m-\epsilon_m$ remains strictly below of the graph of $f$ \gcambios{ for all $x\geq x_m-\epsilon_m$} (see Fig. \ref{lineastf}); \gcambios{in particular $(x_m+\epsilon_m,f(x_m +\epsilon_m))$ lies above $l_1$. } Indeed, this follows because $h$ is convex, $f(x_{m}-\epsilon_m)=h(x_{m}-\epsilon_m)$ and $f\geq h$. \item[(B)] The line \gcambios{$l_2$} tangent to the graph of $f$ at $x_{m}-3\epsilon_m/4$ passes strictly over the graph of $h$, and thus, of $f$, at $x_m+\epsilon_m$ (see Fig. \ref{lineastf}); \gcambios{in particular $(x_m+\epsilon_m,f(x_m +\epsilon_m))$ lies below $l_2$.} This follows from: $ f(x_m-3\epsilon_m/4)=h(x_m-3\epsilon_m/4)+h_m(x_m-3\epsilon_m/4)>h(x_m-3\epsilon_m/4)$, $f'(x_m-3\epsilon_m/4)>h_m'(x_m-3\epsilon_m/4) \gcambios{> K_m/e^2=m^3e^{-m^2-2}>\frac{h(x_m+\epsilon_m)-h(x_m-3\epsilon_m/4)}{7\epsilon_m/4}.} $ \gcambios{(for the last inequality, $4m^2h(x_m+\epsilon_m)/7< 6m^2e^{-m^2-2}\leq K_m/e^2$ when $m>5$).} \end{itemize} \begin{figure}[hbt!] \centering \ifpdf \setlength{\unitlength}{1bp}% \begin{picture}(150,200)(0,0) \put(0,0){\includegraphics[scale=.25]{FuncionFlineas.pdf}} \put(45,8.00){\fontsize{09.25}{0.0}\selectfont $\color{red} x_{m}^-$} \put(15.00,-6.00){\fontsize{09.25}{0.0}\selectfont $x_m-\epsilon_m$} \put(55.00,-7.00){\fontsize{09.25}{0.0}\selectfont $x_m-\frac{3 \epsilon_m}{4}$} \put(135,8.00){\fontsize{09.25}{0.0}\selectfont $\color{red} x_{m}^+$} \put(145,-7.00){\fontsize{09.25}{0.0}\selectfont $x_{m}+\epsilon_m$} \put(145,80.00){\fontsize{09.25}{0.0}\selectfont $l_1$} \put(145,165.00){\fontsize{09.25}{0.0}\selectfont $l_2$} \end{picture}% \else \setlength{\unitlength}{1bp}% \begin{picture}(150,200)(0,0) \put(0,0){\includegraphics[scale=.25]{FuncionFlineas.pdf}} \put(45,8.00){\fontsize{09.25}{0.0}\selectfont $\color{red} x_{m}^-$} \put(15.00,-6.00){\fontsize{09.25}{0.0}\selectfont $x_m-\epsilon_m$} \put(55.00,-7.00){\fontsize{09.25}{0.0}\selectfont $x_m-\frac{3 \epsilon_m}{4}$} \put(135,8.00){\fontsize{09.25}{0.0}\selectfont $\color{red} x_{m}^+$} \put(145,-7.00){\fontsize{09.25}{0.0}\selectfont $x_{m}+\epsilon_m$} \put(145,80.00){\fontsize{09.25}{0.0}\selectfont $l_1$} \put(145,165.00){\fontsize{09.25}{0.0}\selectfont $l_2$} \end{picture}% \fi \caption{\label{lineastf}\gcambios{The line $l_1$ tangent to $f$ at $x_m-\epsilon_m$ lies strictly under the graph of $f$ (in black) for $x \geq x_m+\epsilon_m$. On the other hand, the line $l_2$ tangent to $f$ at $x_m-\frac{3\epsilon_m}{4}$ lies strictly over the graph of $f$. So, some line (segment in red) exists tangent to $f$ at two different points $x_m^-\in (x_m-\epsilon_m,x_m-3\epsilon_m/4)$, $x_m^+\in (x_m-3\epsilon_m/4,x_m+\epsilon_m )$.}} \end{figure} From (A) and (B), there exists some (minimum) $x_{m}^-\in (x_{m}-\epsilon_m,x_{m}-3\epsilon_m/4)$ such that the line tangent to $f$ at $(x_m^-,f(x_m^-))$ is also tangent to $f$ at $(x_m^+,f(x_m^+))$, for some \gcambios{ first $x_m^+> x_m-3\epsilon/4$ } (in particular, $x_m^+>x_m^-$). This implies that the minimizing curve $\alpha$ leaves the graph of $f$ between $(x_m^+,f(x_m^+))$ and $(x_m^-,f(x_m^-))$, and there $\alpha$ turns into a segment tangent to $f$ at those points (see Fig. \ref{lineastf}). Moreover, since \[ f''(x)>0\quad\hbox{for all $x\in (x_m-\epsilon_m,x_m-3\epsilon_m/4)$}, \] in particular, $f''(x_m^-)\neq 0$, and $\alpha$ is not $C^2$ at $(x_{m}^-,f(x_m^-))$, as required. \section*{Acknowledgments} Part of the results of this article are included in the PhD thesis \cite{LuisTesis}, and the comments by I. Costa e Silva (U. F. Santa Catarina, Florianopolis), O. M\"uller (Humboldt U. Berlin), D. Sol\'{\i}s (U. F. Yucat\'an) and S. Suhr (U. Bochum), on the whole PhD thesis are warmly acknowledged. We also acknowledge the assessment by D. Azagra (U. Complutense de Madrid) on section \ref{s2.4} and the comments by F. Finster (U. Regensburg) on reference~\cite{friedrichs}. \gcambios{Finally, we are very grateful to the referees for their careful reading of the paper and valuable suggestions and comments.} All the authors are partially supported by the coordinated research projects MTM2016-78807-C2-1-P (MS) and MTM2016-78807-C2-2-P (LA \& JLF) funded by MINECO (Spanish Ministerio the Econom\'{\i}a y Competitividad) and ERDF (European Regional Development Fund). LA has also enjoyed a grant funded by the Consejo Nacional de Ciencia y Tecnolog\'{\i}a (CONACyT), M\'exico.
\subsection*{} \bibliographystyle{SIAM}
\section{Introduction}\label{intro} In this note we consider $2$-dimensional free boundary minimal surfaces in the Euclidean ball $B^n$. The free boundary condition implies that these minimal surfaces meet the boundary of the ball orthogonally. Such surfaces arise as critical points of the area functional for relative cycles in the ball and as extremals for the Steklov problem \cite{FS1,FS2}. The simplest free boundary minimal surfaces in the ball are the equatorial disk and the critical catenoid. Recently, Ambrozio and Nunes \cite{AN} proved a characterization of the equatorial disk and the critical catenoid in the $3$-dimensional ball by a pinching condition involving the length of the second fundamental form and the support function: \begin{theorem}[Ambrozio-Nunes]\label{an} \textit{Let $\Sigma^2$ be a compact free boundary minimal surface in $B^3$. Assume that for all points $x \in \Sigma$, \begin{eqnarray}\label{gap} |x^{\perp}|^2\, |A(x)|^2\leq 2 \end{eqnarray} where $x^{\perp}$ denotes the normal component of the point $x\in \Sigma$ and $A$ denotes the second fundamental form of $\Sigma$. Then \begin{enumerate} \item $|x^{\perp}|^2\,|A(x)|^2\equiv 0$ and $\Sigma$ is an equatorial disk; \item $|x_0^{\perp}|^2\,|A(x_0)|^2=2$ at some point $x_0\in \Sigma$ and $\Sigma$ is a critical catenoid. \end{enumerate}} \end{theorem} Theorem \ref{an} share similarities with a classical theorem of Chern, do Carmo, and Kobayashi \cite{CCK} (see also Lawson \cite{L}) which characterizes the equatorial spheres and the Clifford hypersurfaces in $\mathbb{S}^{n+1}$ and the Veronese surface in $\mathbb{S}^4$ as the only minimal submanifolds of dimension $n$ in $\mathbb{S}^{n+p}$ satisfying the inequality $|A|^2\leq n\bigg/\bigg(2- \frac{1}{p}\bigg)$. Despite the analogy, the proof of Theorem \ref{an} given in \cite{AN} is quite different. Besides working in dimension two, the codimension one is crucially used in some steps of the proof. The authors in \cite{AN} ask the question weather Theorem \ref{an} can be generalized to higher ambient dimension and submanifold co-dimension. In this note we answer their question positively in the special case of $2$-dimensional surfaces in the ball of any dimension, see Theorem \ref{our result} below. Our proof follows closely the arguments in \cite{AN} and it is based on three ingredients: Fraser and Schoen's Uniqueness Theorem for free boundary minimal disks, a standard dimension reduction argument, and an analysis of nodal sets for solutions of an elliptic system of partial differential equations. We remark that Theorem \ref{an} was recently generalized to geodesic balls in the $3$-dimensional hyperbolic space and the hemisphere in \cite{HS}. Our proof also applies to these settings and their result can be extended in a similar way as discussed here. Finally, we mention that the pinching condition (\ref{gap}) also characterizes the plane and the catenoid among properly embedded minimal surfaces without boundary in $\mathbb{R}^3$ (see Remark \ref{remark} below). A version of this result was first proved by Meeks, P\'{e}rez, and Ros in \cite[Section 7]{MPR}. \section{Preliminaries} The next two lemmas are standard, for the benefit of the reader we include their proofs. \begin{lemma} \label{mean curvature equation} \textit{Let $\Sigma^k$ be a minimal submanifold in $\mathbb{R}^{n}$ given by the graph of the function $u:U\subset \mathbb{R}^k\rightarrow \mathbb{R}^{n-k}$ where $u(x)=(u_1(x),\ldots,u_{n-k}(x))$. Then for every $l=1,\ldots,n-k$ \begin{eqnarray}\label{mean curvature} \frac{a_{ij}(\nabla u_1,\ldots,\nabla u_{n-k})}{\sqrt{1+|\nabla u_l|^2}}\,D_{ij} u_l=0, \end{eqnarray} for some smooth functions $a_{ij}(\nabla u_1,\ldots,\nabla u_{n-k})$.} \end{lemma} \begin{proof} Parametrize $\Sigma$ as $\varphi(x)=(x,u_1(x),\ldots,u_{n-k}(x))$. The coordinate basis for $\Sigma$ is given by \[D_{x_i}\varphi= (0,\ldots,1,\ldots, D_{x_i}u_1,\ldots, D_{x_i}u_{n-k}),\] for $i\,=\,1,\ldots,k$. It follows that \begin{equation}\label{metrica inversa} g_{ij}=\delta_{ij}+ \sum_{l=1}^{n-k}D_{x_i}u_l\,D_{x_j}u_l\quad \text{and}\quad g^{ij}=a_{ij}(\nabla u_1,\ldots,\nabla u_{n-k}). \end{equation} Now we consider for each $l\,=\, 1,\ldots, n-k$ the unit normal vector \[N_l=\frac{1}{\sqrt{1 + |\nabla\,u_l|^2}}(-D_{x_1}u_l,\ldots, -D_{x_k}u_l,0,\ldots, 1,\ldots, 0).\] A simple computation gives \begin{eqnarray*}(N_l)_{x_i}&=&\bigg(\frac{1}{\sqrt{1 + |\nabla\,u_l|^2}}\bigg)_{x_i}\sqrt{1+ |\nabla u_l|^2}\,N_l+ \\ &&\frac{1}{\sqrt{1 + |\nabla\,u_l|^2}} (-D_{x_1x_l}^2u_l,\ldots, -D_{x_k x_l}^2u_l,0\ldots,0). \end{eqnarray*} Consequently, \[(A_{N_l})_{ij}=\langle -d N_l(\varphi_{x_i}),\varphi_{x_j}\rangle=\frac{1}{\sqrt{1 + |\nabla\,u_l|^2}}D_{x_i x_j}^2u_l. \] Since $\Sigma^k$ is minimal, $0=g^{ij}(A_{N_l})_{ij}$ and by (\ref{metrica inversa}) we obtain \[\frac{a_{ij}(\nabla u_1,\ldots,\nabla u_{n-k})}{\sqrt{1 + |\nabla\,u_l|^2}} D_{ij} u_l\,=\,0.\] \end{proof} \begin{lemma}\label{difference equation} \textit{If $u,v: U\subset \mathbb{R}^k\rightarrow \mathbb{R}^p$ are smooth maps satisfying (\ref{mean curvature}), then the difference $\varphi=u-v$ satisfies, for each $l=1,\ldots,p$, the equation \begin{eqnarray*} \frac{a_{ij}(\nabla u)}{\sqrt{1+ |\nabla u_l|^2}}D_{ij}(\varphi_l) + \sum_{m=1}^{p}b_j^m(\nabla u,\nabla v) D_{j} (\varphi_m)=0, \end{eqnarray*} for some smooth functions $a_{ij}(\nabla u)$ and $b_j^m(\nabla u,\nabla v)$.} \end{lemma} \begin{proof} As $u_l$ and $v_l$ satisfy equation (\ref{mean curvature}), therefore \begin{eqnarray*} 0=\frac{a_{ij}(\nabla u)}{\sqrt{1+ |\nabla u_l|^2}}D_{ij}u_l &-& \frac{a_{ij}(\nabla v)}{\sqrt{1+ |\nabla v_l|^2}}D_{ij}v_l \\ = \frac{a_{ij}(\nabla u)}{\sqrt{1+ |\nabla u_l|^2}}D_{ij}u_l &-& \frac{a_{ij}(\nabla u)}{\sqrt{1+ |\nabla u_l|^2}}D_{ij}v_l \\ &+& \frac{a_{ij}(\nabla u)}{\sqrt{1+ |\nabla u_l|^2}}D_{ij}v_l - \frac{a_{ij}(\nabla v)}{\sqrt{1+ |\nabla v_l|^2}}D_{ij}v_l \\ =\frac{a_{ij}(\nabla u_l)}{\sqrt{1+ |\nabla u_l|^2}}D_{ij}(\varphi_l) &+& \bigg(\frac{a_{ij}(\nabla u)}{\sqrt{1+ |\nabla u_l|^2}} - \frac{a_{ij}(\nabla v)}{\sqrt{1+ |\nabla v_l|^2}}\bigg)D_{ij}v_l. \end{eqnarray*} Now, let $F_{ij}: \mathbb{R}^k\times\cdots\times \mathbb{R}^k\rightarrow \mathbb{R}$ be the function defined by \[F_{ij}(z_1,\ldots,z_{p})= \frac{a_{ij}(z_1,\ldots,z_{p})}{\sqrt{1+ |z_l|^2}}.\] By the Fundamental Theorem of Calculus we can write \begin{eqnarray*} F_{ij}(\nabla u)- F_{ij}(\nabla v)=\bigg(\int_{0}^{1}dF_{ij}(\nabla u + t(\nabla v - \nabla u))dt\bigg)\nabla (u-v). \end{eqnarray*} The lemma follows by setting $b_q^m$ to be \begin{eqnarray*} b_q^m=\bigg(\int_{0}^{1}dF_{ij}(\nabla u + t(\nabla v - \nabla u))dt\bigg)_{qm}\, D_{ij}v_l\,D_q (u-v)_m. \end{eqnarray*} \end{proof} The next lemma, which is essentially contained in \cite{HS}, concerns nodal sets for solutions of elliptic equations. We add the proof in order to include solutions of elliptic system of equations. \begin{lemma}[Hardt-Simon \cite{HS}]\label{size nodal set} \textit{Let $u: U\subset \mathbb{R}^n\rightarrow \mathbb{R}^p$ be a smooth map which satisfies for each $k=1,\ldots,p$ an elliptic equation of the form: \begin{eqnarray}\label{pde} a_{ij}(x)D_{ij} u_k + \sum_{l=1}^{p}b_j^l(x) D_j u_l+ \sum_{l=1}^{p}c_l(x)\,u_l=0, \end{eqnarray} where $a_{ij}$, $b_j$, and $c_l$ are smooth functions. Let's assume that $a_{ij}$ is positive definite, and that $|b_j|\leq C$ and $|c_l|\leq C$ for some constant $C>0$. If the order of vanishing of $u_l$ at $u_l^{-1}(0)$ is finite for each $l$ and if $x_0 \in u^{-1}(0)\cap |Du|^{-1}(0)$, then \[ u^{-1}(0)\cap |Du|^{-1}(0)\cap B_r(x_0)\] decomposes into a countable union of subsets of a pairwise disjoint collection of $n-2$-dimensional smooth submanifolds.} \end{lemma} \begin{proof} We define for each integer $q=1,2,\ldots$ the set \begin{equation} S_q=\{x:D^{\alpha}u_l(x)=0,\, \forall\, |\alpha|\leq q,\,\, \forall l\,\, \text{and}\,\, D^{q +1}u_{l_0}(x)\neq 0\,\, \text{for some}\,\,l_0 \}. \end{equation} We first note that if $x \in u^{-1}(0)\cap|Du|^{-1}(0)$ and $r>0$ is small enough, then \begin{eqnarray}\label{zero set} u^{-1}(0)\cap |Du|^{-1}(0)\cap B_r(x) = \cup_{q=1}^{d} S_q \cap B_r(x), \end{eqnarray} where $d-1$ is the order of vanishing of $u$ at $x$. Now for each $x \in S_q$ we consider a multi-index $\beta$ such that $|\beta|= q-1$ and $\text{Hess}(D^{\beta}u_{l_0})(x)\neq 0$ for some $l_0$. Applying $D^{\beta}$ to both sides of (\ref{pde}) with $k=l_0$ and recalling that $D^{\alpha}u_{l}(x)=0$ for every multi-index $\alpha$ such that $|\alpha|\leq q$ we obtain \[a_{ij}(x)D_{ij}( D^{\beta}u_{l_0})(x)=0.\] Using that $a_{ij}$ is positive definite and that $\text{Hess}(D^{\beta}u_{l_0})(x)\neq 0$ we conclude that $\text{rank}(\text{Hess}(D^{\beta}u_{l_0})(x)\geq 2$. Thus there exist indexes $i_1$ and $i_2$ for which $\text{grad}(D_{i_1}D^{\beta}u_{l_0})(x)$ and $\text{grad}(D_{i_2}D^{\beta}u_{l_0})(x)$ are linearly independent. This implies that for small $r>0$ that \[B_r(x)\cap (D_{i_1}D^{\beta}u_{l_0})^{-1}(0)\cap (D_{i_2}D^{\beta}u_{l_0})^{-1}(0) \] is a $n-2$-dimensional submanifold $\Sigma_{x,r,\beta}$ which contains $B_r(x)\cap S_q$. In view of (\ref{zero set}) we conclude that for each $x\in u^{-1}(0)\cap |Du|^{-1}(0)$ there exist $r>0$ and smooth $n-2$-dimensional submanifolds $\Sigma_{x,r,q_1},\ldots, \Sigma_{r,x,q_s}$ for which \begin{eqnarray}\label{n-2} B_r(x)\cap u^{-1}(0)\cap|Du|^{-1}(0)\subset \cup_{j=1}^s \Sigma_{x,r,q_j}. \end{eqnarray} The Lemma follows from (\ref{n-2}). \end{proof} \begin{lemma}\label{unique continuation} \textit{If $\Sigma_1$ and $\Sigma_2$ are $2$-dimensional minimal surfaces in $\mathbb{R}^n$ having a tangential intersection of infinite order at $x_0\in\Sigma_1\cap\Sigma_2$, then $\Sigma_1=\Sigma_2$.} \end{lemma} \begin{proof} Let $v_k: \Omega \rightarrow \mathbb{R}^n$ be minimal map parameterizing a neighborhood of $\Sigma_k$ for each $k=1,2$ and assume that $v_k(0)=x_0$. We can assume that the coordinates $z=x+y\, i$ in $\Omega$ are isothermal for both $v_1$ and $v_2$. As $v_k$ is minimal, each coordinate $v_k^i$, $i=1,\ldots, n$, is harmonic, which implies by the conformal invariance of the Laplacian that $ \partial_{\overline{z}}\partial_z v_k^i=0 $. Hence, if we define $v(z)=v_1(z)- v_2(z)$, then each component of $\partial_{z} v$ is holomorphic, i.e., $\partial_{\overline{z}}\partial_zv^i=0$. Since $z=0$ is an infinite order zero of $v$, the analytic continuation property for holomorphic functions implies that $v\equiv 0$. Therefore, $\Sigma_1=\Sigma_2$. \end{proof} \section{Proof of theorem} \begin{theorem}\label{our result} \textit{Let $\Sigma^2$ be a compact free boundary minimal surface in $B^n$. Assume that for all points $x \in \Sigma$, \begin{equation}\label{pinching} |x^{\perp}|^2|A(x)|^2\leq 2, \end{equation} where $x^{\perp}$ denotes the normal component of $x$. Then \begin{enumerate} \item $|x^{\perp}|^2|A(x)|^2\equiv 0$ and $\Sigma^2$ is a flat equatorial disk. \item $|x_0^{\perp}|^2|A(x_0)|^2=2$ at some point $x_0\in\Sigma^2$ and $\Sigma^2$ is the critical catenoid inside a $3$-dimensional linear subspace. \end{enumerate}} \end{theorem} \begin{lemma}\label{hessian} \textit{Let $\Sigma^2$ be a free boundary minimal surface in $B^n$ and $f$ be the function $f:\Sigma^2 \rightarrow \mathbb{R}$ defined by $$f(x)=\frac{|x|^2}{2},\,\, x \in \Sigma^2.$$ Then $\nabla^{\Sigma} f= x^{\top}$ for every $x \in \Sigma$ and \begin{eqnarray}\label{hessiana formula} \text{Hess}_{\Sigma}\,f(x)(X,Y)=\langle X,Y\rangle + \langle A(X,Y),\overrightarrow{x}\rangle. \end{eqnarray}} \end{lemma} \begin{proof} Given $X\in \mathcal{X}(\Sigma)$, then \[ X(f)= \frac{1}{2} X \langle \overrightarrow{x},\overrightarrow{x}\rangle= \langle X, \overrightarrow{x}\rangle= \langle X, x^{\top}\rangle. \] Hence, $\nabla^{\Sigma} f(x)= x^{\top}$. The hessian of $f$ is then given by \begin{eqnarray*} Hess_{\Sigma}\,f\,(X,Y)&=& \langle \nabla_X\nabla f,Y\rangle= \langle \overline{\nabla}_X \nabla f,Y\rangle = \langle \overline{\nabla}_X (x- x^{\perp}),Y\rangle \\ &=& \langle X,Y\rangle -\langle \overline{\nabla}_X x^{\perp},Y\rangle= \langle X,Y\rangle + \langle x^{\perp},\overline{\nabla}_XY\rangle \\ &=& \langle X,Y\rangle + \langle A(X,Y),\overrightarrow{x}\rangle, \end{eqnarray*} where $X$ and $Y$ are vector fields in $\mathcal{X}(\Sigma)$. \end{proof} \begin{lemma}\label{hessiana positiva} If $|x^{\perp}|^2|A(x)|^2\leq 2$, then $\text{Hess}_{\Sigma}f\geq0$. \end{lemma} \begin{proof} Let $\{e_1,e_2\}$ be an orthonormal base of $T\Sigma$ given by eigenvectors of $\text{Hess}_{\Sigma}f$. The respective eigenvalues are $\overline{\lambda}_i= 1 + \langle A(e_i,e_i),\overrightarrow{x}\rangle$. We want to prove that $\overline{\lambda}_i\geq 0$ for $i=1,2$. \begin{equation}\label{cauchy-schwarz} \overline{\lambda}_1^2 + \overline{\lambda}_2^2= 2+ \sum_{i=1}^{2}\left< A(e_i,e_i),\overrightarrow{x}\right>^2\leq 2 + \sum_{i=1}^{2}|A(e_i,e_i)|^2x^{\perp}|^2\leq 2 + |A|^2|x^{\perp}|^2, \end{equation} where we used the Cauchy-Schwarz inequality in the first inequality. Since$(\overline{\lambda}_1+ \overline{\lambda}_2)^2= 4$, we conclude that \[ 2\,\overline{\lambda}_1\,\overline{\lambda}_2\geq2 - |A|^2\,|x^{\perp}|^2\geq 0. \] Hence, $\overline{\lambda}_1$ and $\overline{\lambda}_2$ have the same sign. As $\overline{\lambda}_1+ \overline{\lambda}_2= 2$, the lemma is proved. \end{proof} \begin{definition} Given a $2$-dimensional free boundary minimal surface $\Sigma^2$ in $B^n$ we define \begin{eqnarray}\label{C} C(\Sigma)= \{x\in \Sigma: f(x)\,=\,m_0\,:=\, \min_{\Sigma}\,f\}. \end{eqnarray} \end{definition} The conormal vector of a free boundary minimal surface $\Sigma$ being normal to the boundary of the ball implies that $\partial\Sigma$ is convex on $\Sigma$. Using this fact and that $\text{Hess}_{\Sigma}f\geq 0$, we obtain: \begin{lemma}\label{total convexity} If $\Sigma$ is a free boundary minimal surface in $B^n$ satisfying $\text{Hess}_{\Sigma}f\geq 0$, then the set $C(\Sigma)$ is totally convex on $\Sigma$, meaning that every geodesic segment with extremities in $C(\Sigma)$ is in $C(\Sigma)$. \end{lemma} Before we start proving Theorem \ref{our result}, let us recall a simple fact from Riemannian Geometry that we will use later. Let $c:[a,b]\rightarrow M$ be a curve in a Riemannian manifold $M$ and $P_s:T_{c(a)}M\rightarrow T_{c(s)}M$ the parallel transport map along $c$. Let $\Delta$ be a correspondence which associates for each $s\in [a,b]$ a $j$-dimensional subspace $\Delta(s)\subset T_{c(s)}M$. The distribution $\Delta(s)$ is called parallel if $P_s(\Delta(a))= \Delta(s)$ for every $s \in [a,b]$. \begin{lemma}[Spivak \cite{S}]\label{parallel lema} \textit{If $\frac{DV}{ds}(s)\in \Delta(s)$ whenever $V$ is a vector field in $\Delta(s)$, then $\Delta(s)$ is parallel along $c$.} \end{lemma} \begin{proof}[Proof of Theorem \ref{our result}] By Lemma \ref{hessiana positiva}, the inequality (\ref{pinching}) implies that $\text{Hess}_{\Sigma}\,f \geq 0$. Let us show this implies that $\Sigma$ is diffeomorphic to either a disk or an annulus. If $\Sigma$ is simply connected, then $\Sigma$ is topologically a disk. Hence, we assume that $\pi_1(\Sigma, x)\neq \{0\}$, where $x$ is chosen to lie in $C(\Sigma)$. By minimizing the length in a nontrivial homotopy class $[\alpha]\in \pi_1(\Sigma,x)$ among closed loops passing through the fixed point $x\in C(\Sigma)$, we obtain a geodesic loop $\gamma: [0,1]\rightarrow \Sigma$, where $\gamma(0)=\gamma(1)=x$; this follows from the fact that $\partial \Sigma$ is convex on $\Sigma$ due to the free boundary condition. We claim that $\gamma^{\prime}(0)=\gamma^{\prime}(1)$ and $C(\Sigma)=\gamma([0,1])$. If either one of those properties are not true, then the total convexity of $C(\Sigma)$ guarantees that an open set $U$ of $\Sigma$ is contained in $C(\Sigma)$. In this case, $\text{Hess}_{\Sigma}f\equiv 0$ over $U$. Hence, \[\langle A(X,Y),\overrightarrow{x}\rangle = -\,\langle X,Y\rangle. \] Since $\overrightarrow{x}$ is a constant length normal vector to $\Sigma$ along $U$, we conclude that the mean curvature of $\Sigma$ in the direction of $\overrightarrow{x}$ is non-zero, a contradiction. Therefore, $C(\Sigma)$ is a smooth simple closed geodesic. Note that this implies that $\pi_1(\Sigma)$ is cyclic, from this we obtain that $\Sigma$ is an annulus. If $\Sigma^2$ is a minimal disk, then Fraser and Schoen's theorem in \cite{FS} implies that $\Sigma^2$ is an equatorial disk and $|x^{\perp}|^2\,|A(x)|^2\equiv 0$. If $\Sigma^2$ is an annulus, then $C(\Sigma)$ is a smooth simple closed geodesic. This implies that $\overline{\lambda}=0$ is an eigenvalue of $\text{Hess}_{\Sigma}\,f(x_0)$ for every $x_0\in C(\Sigma)$ and $(\overline{\lambda}_1^2+ \overline{\lambda}_2^2)=(\overline{\lambda}_1+\overline{\lambda}_2)^2$. On the other hand, \[ \sum_{i=1} \overline{\lambda}_i^2= 2 + \langle A(e_i,e_i),\overrightarrow{x}\rangle^2\leq 2+ |x^{\perp}|^2\,|A(x)|^2\leq 4= \bigg(\sum_{i=1}\overline{\lambda}_i\bigg)^2. \] Hence, $\langle \sum_{i=1}^{2}A(e_i,e_i),\overrightarrow{x}\rangle^2= |A(x)|^2|x^{\perp}|^2=2$ for every $x\in C(\Sigma)$. It follows from the Cauchy-Schwarz inequality that \begin{eqnarray}\label{quase umbilica} A(e_i,e_i)=\langle A(e_i,e_i),\frac{\overrightarrow{x}}{|x|}\rangle \frac{\overrightarrow{x}}{|x|}. \end{eqnarray} Consequently, if $e_1$ is tangent to $C(\Sigma)$, then \[ \overline{\nabla}_{e_1}e_1=\langle A(e_i,e_i),\frac{\overrightarrow{x}}{|x|}\rangle \frac{\overrightarrow{x}}{|x|}, \] since $C(\Sigma)$ is a geodesic on $\Sigma$. Thus, $C(\Sigma)$ is also a geodesic in $\partial B_{2\,m_0}^{n+1}(0)$, i.e., a round circle. Now we consider the normal distribution $E$ along $C(\Sigma)$ defined by \[E=\{\xi: \xi\in \mathcal{X}^{\perp}(\Sigma)|_{C(\Sigma)} \quad \text{and}\quad \langle \xi,\overrightarrow{x}\rangle=0\}.\] It follows from (\ref{quase umbilica}) that for every $\xi \in E$ the following is true: \[\overline{\nabla}_{\gamma'(t)}\xi \in E.\] Lemma \ref{parallel lema} implies that the distribution $E$ is parallel along $C(\Sigma)$. Hence, $E$ is a constant $(n-2)$-dimensional plane throught the origin. Therefore, there exists a critical catenoid $\Sigma_c$ which is tangent to $\Sigma$ along $C(\Sigma)$. Near $x_0\in C(\Sigma)$ we write $\Sigma$ and $\Sigma_c$ locally as a graph over $T_{x_0}\Sigma$. Hence, $\Sigma_c=\text{graph}(f_c)$ and \[ \text{div}\bigg(\frac{\nabla f_c}{\sqrt{1+ |\nabla f_c}|^2}\bigg)=0.\] Similarly, $\Sigma=\text{graph}(u)$, where $u:\mathbb{R}^2=T_{x_0}\Sigma \rightarrow \mathbb{R}^{n-1}$, and by Lemma \ref{mean curvature equation} \[ \frac{a_{ij}(\nabla u_1,\ldots,\nabla u_{n-1})}{\sqrt{1+ |\nabla u_i}|^2}D_{ij} u_i=0. \] for every $i \in {1,\ldots, n-1}$. Lemma \ref{difference equation} implies that the difference $v=u-f_c$ satisfies a linear PDE of the following form: \[ \frac{a_{ij}(\nabla u)}{\sqrt{1+ |\nabla u_k|^2}} D_{ij} v_k + \sum_{l=1}^{n-1}b_j^l(\nabla u,\nabla f_c) D_j v_l=0, \] for each $k=1,\ldots, n-1$. Note that $v$ vanishes on $x_0$ and the order of vanishing is finite by Lemma \ref{unique continuation}. Therefore, $\mathcal{H}^1(v^{-1}(0)\cap |\nabla v|^{-1}(0)= 0$ by Lemma \ref{size nodal set}. This is a contradiction since $\Sigma$ and $\Sigma_c$ are tangent along $C(\Sigma)$ and $\text{dim}\,C(\Sigma)=1$. We conclude that $v\equiv 0$ near $x_0$ and the theorem follows from standard analytic continuation property for minimal surfaces. \end{proof} \begin{remark}\label{remark} The same proof works for $2$-dimensional minimal surfaces properly embedded in $\mathbb{R}^n$; the conclusion in this case is that such a surface $\Sigma^2$ satisfying (\ref{gap}) is either simply connected or the catenoid. In the special case $n=3$, we can invoke the classification of properly embedded simply connected minimal surfaces by Meeks and Rosenberg \cite{MR} to conclude that $\Sigma$ is either the plane, the catenoid, or the helicoid. A simple computation shows that the helicoid does not satisfy (\ref{gap}). \end{remark}
\section{Introduction} The first fundamental results on analytic properties of almost complex structures (in several variables) are due to Newlander - Nirenberg \cite{NeNi} and Nijenhuis - Woolf \cite{NiWo}. After the seminal work by M.Gromov \cite{Gr} the theory of pseudoholomorphic curves in almost complex manifolds became one of the most powerful tools of the symplectic geometry and now is rapidly increasing. According to the Nijenhuis - Woolf theorem, every almost complex manifold $(M,J)$ locally (near every point) contains plenty of pseudoholomorphic curves i.e. open Riemann surfaces embedded to $M$ compatibly with an almost complex structure $J$. Another object which always exists locally is (strictly) plurisubharmonic functions; they in turn are indespensable for symplectic applications (also being of independent interest, of course). For these reasons the study of pseudoholomorphic curves and plurisubharmonic functions have many common points with the case of usual complex manifolds (i.e. with the case of integrable complex structures), although the almost complex proofs often require much more involved tools from elliptic PDEs and the non-linear analysis. A serious difference with respect to the integrable case arises when one tries to consider holomorphic functions on an almost complex manifold i.e. the solutions $f$ of the equation $\overline\partial_J f = 0$. In the case of complex dimension $ > 1$, for a "generically choosen" almost complex structure $J$ all (even only locally defined!) holomorphic functions are constant. Thus an attempt to extend directly the function theory in several variables to the almost complex case is fruitless. A remarkable progress here was done by S.Donaldson \cite{D}. Here considered the almost holomorphic functions $f$ which locally satisfy the Beltrami type condition $\parallel \overline\partial_J f \parallel \le \varepsilon \parallel \partial_J f \parallel$ with $\varepsilon < 1$ (one can say that these functions are subsolutions of the multidimensional Beltrami operator). Such objects always exist locally for each almost complex structure $J$. If $J$ is compatible with some symplectic structure, the zero set of an almost holomorphic function is a symplectic hypersurface. Using these tools, S. Donaldson obtain a symplectic analog of the Lefschetz hyperplane section theorem having fundamental consequences in the symplectic geometry. The approach of Donaldson provides the second Complex Analysis tool for the symplectic geometry, quite independently from Gromov's theory. This is a partial motivation of the present paper. Donaldson's work opens a natural way to develop a function theory on almost complex manifolds. The idea is to study classes of functions imposing suitable assumptions on the $\overline\partial_J$-part of differential . The assumptions depend on the problem under investigation. For example, local properties of subsolutions to the Beltrami operator have some common points with usual holomorphic functions and are in the focus of Donaldson's theory. In the present paper we study boundary properties and choose other type of conditions. This is well-known in the function theory that many boundary properties of functions $f$ in domains of $\mathbb C^n$ with some boundary control over the $\overline\partial f$ (i.e. the subsolutions to the $\overline\partial$-equation) are similar to the ones of usual holomorphic functions. Sometimes such functions are called asymptotically holomorphic; they were succesfully applied, for instance, in the works of \cite{NiWeY, NaRu, Ro, PiKh,Fo} and in many others. The goal of the present paper is to study some boundary properties of their almost complex analogs. It is worth to stress that locally there are plenty of such functions on any almost complex manifold and so they represent a natural object for study. There exist several ways to define the boundary control over the $\overline\partial_J f$ and their choice usually depend on boundary properties which are under the study. In the present paper we establish the Chirka - Lindel\"of and Fatou type theorems for bounded $C^1$-functions $f$ with bounded $\overline\partial_J f$ on a strictly pseudoconvex domain in an almost complex manifold $(M,J)$ (see resp. Theorem \ref{Thm1} and \ref{Thm2}). The main results are contained in Sections 3 and 4; we potspone a detailed duscussion of our methods and relations with previous results until these sections in order to avoid a long introduction. Here I only mention that the main results are inspired by the works and methods of E.Stein \cite{St}, E.Chirka \cite{Ch} and A.Sadullaev \cite{Sa1} which now became classical; one can consider the obtained results as their generalization. \section{ Almost complex manifolds and almost holomorphic functions} In this rather long preliminary section we recall basic notions of the almost complex geometry making our presentation more convenient for specialists in Analysis. A reader could find much more detailed information in \cite{Aud}. Everywhere through this paper we assume that manifolds and almost complex structures are of class $C^\infty$ (the word "smooth" means the regularity of this class); notice the main results remain true under considerably weaker regularity assumptions. \subsection{ Almost complex manifolds} Let $M$ be a smooth manifold of dimension $2n$. {\it An almost complex structure} $J$ on $M$ is a smooth map which associates to every point $p \in M$ a linear isomorphism $J(p): T_pM \to T_pM$ of the tangent space $T_pM$ such that $J(p)^2 = -I$; here $I$ denotes the identity map of $T_pM$. Thus, every linear map $J(p)$ is a complex structure on a vector space $T_pM$ in the usual sense of Linear Algebra. A couple $(M,J)$ is called {\it an almost complex manifold} of complex dimension n. Note that every almost complex manifold admits the canonical orientation represented by $(e_1,Je_1,....,e_n,Je_n)$ where $(e_1,....,e_n)$ is any complex basis of $(T_pM,J(p))$. One of the most important examples is provided by the {\it standard complex structure} $J_{st} = J_{st}^{(2)}$ on $M = \mathbb R^2$; it is represented in the canonical coordinates of $\mathbb R^2$ by the matrix \begin{eqnarray} \label{J_st} J_{st}= \left( \begin{array}{cll} 0 & & -1\\ 1 & & 0 \end{array} \right) \end{eqnarray} More generally, the standard complex structure $J_{st}$ on $\mathbb R^{2n}$ is represented by the block diagonal matrix $diag(J_{st}^{(2)},...,J_{st}^{(2)})$ (usually we drop the notation of dimension because its value will be clear from the context). As usual, setting $iv := Jv$ for $v \in \mathbb R^{2n}$, we identify $(\mathbb R^{2n},J_{st})$ with $\mathbb C^n$; we use the notation $z = x + iy = x + Jy$ for the standard complex coordinates $z = (z_1,...,z_n) \in \mathbb C^n$. Let $(M,J)$ and $(M',J')$ be smooth almost complex manifolds. A $C^1$-map $f:M' \to M$ is called $(J',J)$-complex or $(J',J)$-holomorphic if it satisfies {\it the Cauchy-Riemann equations} \begin{eqnarray} \label{CRglobal} df \circ J' = J \circ df. \end{eqnarray} This is easy to check that a map $f: \mathbb C^n \to \mathbb C^m$ is $(J_{st},J_{st})$-holomorphic if and only if each component of $f$ is a usual holomorphic function. Every almost complex manifold $(M,J)$ can be viewed locally as the unit ball $\mathbb B$ in $\mathbb C^n$ equipped with a small (in any $C^m$-norm) almost complex deformation of $J_{st}$. The following statement is often very useful. \begin{lemma} \label{lemma1} Let $(M,J)$ be an almost complex manifold. Then for every point $p \in M$, every $m \geq 0$ and $\lambda_0 > 0$ there exist a neighborhood $U$ of $p$ and a coordinate diffeomorphism $z: U \rightarrow \mathbb B$ such that $z(p) = 0$, $dz(p) \circ J(p) \circ dz^{-1}(0) = J_{st}$, and the direct image $ z_*(J): = dz \circ J \circ dz^{-1}$ satisfies $\vert\vert z_*(J) - J_{st} \vert\vert_{C^m(\overline {\mathbb B})} \leq \lambda_0$. \end{lemma} \proof There exists a diffeomorphism $z$ from a neighborhood $U'$ of $p \in M$ onto $\mathbb B$ satisfying $z(p) = 0$; after an additional linear change of coordinates one can achieve $dz(p) \circ J(p) \circ dz^{-1}(0) = J_{st}$ (this is a classical fact from the Linear Algebra). For $\lambda > 0$ consider the isotropic dilation $h_{\lambda}: t \mapsto \lambda^{-1}t$ in $\mathbb R^{2n}$ and the composition $z_{\lambda} = h_{\lambda} \circ z$. Then $\lim_{\lambda \rightarrow 0} \vert\vert (z_{\lambda})_{*}(J) - J_{st} \vert\vert_{C^m(\overline {\mathbb B})} = 0$ for every $m \geq 0$. Setting $U = z^{-1}_{\lambda}(\mathbb B)$ for $\lambda > 0$ small enough, we obtain the desired statement. In what follows we often denote the structure $z^*(J)$ again by $J$ viewing it as a local representation of $J$ in the coordinate system $(z)$. Recall that an almost complex structure $J$ is called {\it integrable} if $(M,J)$ is locally biholomorphic in a neighborhood of each point to an open subset of $(\mathbb C^n,J_{st})$. In the case of complex dimension 1 every almost complex structure is integrable. In the case of complex dimension $> 1$ integrable almost complex structures form a highly special subclass in the space of all almost complex structures on $M$; an efficient criterion of integrablity is provided by the classical theorem of Newlander - Nirenberg \cite{NeNi}. \bigskip \subsection{Pseudoholomorphic discs} Let $(M,J)$ be an almost complex manifold of dimension $n > 1$. For a "generic" choice of an almost complex structure, any holomorphic (even locally) function on $M$ is constant. Similarly, $M$ does not admit non-trivial $J$-complex submanifolds (that is, submanifolds with tangent spaces invariant with respect to $J$) of complex dimension $> 1$. The only (but fundamentally important) exception arises in the case of pseudoholomorphic curves i.e. $J$-complex submanifolds of complex dimension 1: they always exist locally. Usually pseudoholomorphic curves arise in connection with solutions $f$ of (\ref{CRglobal}) in the special case where $M'$ has the complex dimension 1. These holomorphic maps are called $J$-complex (or $J$-holomorphic or {\it pseudoholomorphic} ) curves. Note that we view here the curves as maps i.e. we consider parametrized curves. We use the notation $\mathbb D = \{ \zeta \in \mathbb C: \vert \zeta \vert < 1 \}$ for the unit disc in $\mathbb C$ always assuming that it is equipped with the standard complex structure $J_{{\rm st}}$. If in the equations (\ref{CRglobal}) we have $M' = \mathbb D$ ; we call such a map $f$ a $J$-{\it complex disc} or a {\it pseudoholomorphic disc} or just a holomorphic disc when the structure $J$ is fixed. A fundamental fact is that pseudoholomorphic discs always exist in a suitable neighborhood of any point of $M$; this is the classical Nijenhuis-Woolf theorem (see \cite{NiWo}). Here it is convenient to rewrite the equations (\ref{CRglobal}) in local coordinates similarly to the complex version of the usual Cauchy-Riemann equations. Everything will be local, so (as above) we are in a neighborhood $\Omega$ of $0$ in $\mathbb C^n$ with the standard complex coordinates $z = (z_1,...,z_n)$. We assume that $J$ is an almost complex structure defined on $\Omega$ and $J(0) = J_{st}$. Let $$z:\mathbb D \to \Omega,$$ $$z : \zeta \mapsto z(\zeta)$$ be a $J$-complex disc. Setting $\zeta = \xi + i\eta$ we write (\ref{CRglobal}) in the form $z_\eta = J(Z) Z_\xi$. This equation can be in turn written as \begin{eqnarray} \label{holomorphy} z_{\overline\zeta} - A(z)\overline z_{\overline\zeta} = 0,\quad \zeta\in\mathbb D. \end{eqnarray} Here a smooth map $A: \Omega \to Mat(n,\mathbb C)$ is defined by the equality $L(z) v = A \overline v$ for any vector $v \in \mathbb C^n$ and $L$ is an $\mathbb R$-linear map defined by $L = (J_{st} + J)^{-1}(J_{st} - J)$. It is easy to check that the condition $J^2 = -Id$ is equivalent to the fact that $L$ is $\overline\mathbb C$-linear. The matrix $A(z)$ is called {\it the complex matrix} of $J$ in the local coordinates $z$. Locally the correspondence between $A$ and $J$ is one-to-one. Note that the condition $J(0) = J_{st}$ means that $A(0) = 0$. If $z'$ are other local coordinates and $A'$ is the corresponding complex matrix of $J'$, then, as it is easy to check, we have the following transformation rule: \begin{eqnarray} \label{CompMat} A' = (z_z' A + { z}_{\overline z}')({\overline z}_{\overline z}' + {\overline z}_{ z}'A)^{-1} \end{eqnarray} (see \cite{SuTu}). Note that one can view the equations (\ref{holomorphy}) as a quasilinear analog of the Beltrami equation for vector-functions. From this point of view, the theory of pseudoholomorphic curves is an analog of the theory of quasi-conformal mappings. \bigskip Recall that for a complex function $f$ {\it the Cauchy-Green transform} is defined by \begin{eqnarray} \label{CauchyGreen} Tf(\zeta) = \frac{1}{2 \pi i} \int\int_{\mathbb D} \frac{f(\omega)d\omega \wedge d\overline\omega}{\omega - \zeta} \end{eqnarray} This is the main analytic tool in the theory of pseudoholomorphic curves. This is classical that the operator $T$ has the following properties: \begin{itemize} \item[(i)] $T: C^r(\mathbb D) \to C^{r+1}(\mathbb D)$ is a bounded linear operator for every non-integer $r > 0$ ( a similar property holds in the Sobolev scales, see below). Here we use the usual H\"older norm on the space $C^r(\mathbb D)$. \item[(ii)] $(Tf)_{\overline\zeta} = f$ i.e. $T$ solves the $\overline\partial$-equation in the unit disc. \item[(iii)] the function $Tf$ is holomorphic on $\mathbb C \setminus \overline\mathbb D$. \end{itemize} Fix a real non-integer $r > 1$. Let $z: \mathbb D \to \mathbb C^n$, $z: \mathbb D \ni \zeta \mapsto z(\zeta)$ be a $J$-complex disc. Since the operator $$\Psi_{J}: z \longrightarrow w = z - TA(z) \overline {z}_{\overline \zeta} $$ takes the space $C^{r}(\overline{\mathbb D})$ into itself, we can write the equation (\ref{CRglobal}) in the form $(\Psi_J(z))_{\overline \zeta} = 0$. Thus, the disc $z$ is $J$-holomorphic if and only if the map $\Psi_{J}(z):\mathbb D \longrightarrow \mathbb C^n$ is $J_{st}$-holomorphic. When the norm of $A$ is small enough (which is assured by Lemma \ref{lemma1}), then by the implicit function theorem the operator $\Psi_J$ is invertible and we obtain a bijective correspondence between $J$-holomorphic discs and usual holomorphic discs. This easily implies the existence of a $J$-holomorphic disc in a given tangent direction through a given point of $M$, as well as a smooth dependence of such a disc on a deformation of a point or a tangent vector, or on an almost complex structure; this also establishes the interior elliptic regularity of discs. \bigskip Let $(M,J)$ be an almost complex manifold and $E \subset M$ be a real submanifold of $M$. Suppose that a $J$-complex disc $f:\mathbb D \to M$ is continuous on $\overline\mathbb D$. We some abuse of terminology, we also call the image $f(\mathbb D)$ simply by a disc and twe call he image $f(b\mathbb D)$ by the boundary of a disc. If $f(b\mathbb D) \subset E$, then we say that (the boundary of ) the disc $f$ is {\it glued} or {\it attached} to $E$ or simply that $f$ is attached to $E$. If $\Gamma \subset b\mathbb D$ is an arc and $f(\Gamma) \subset E$, we say that $f$ is glued or attached to $E$ along $\Gamma$. \subsection{The $\overline\partial_J$-operator on an almost complex manifold $(M,J)$} Consider now the second special class (together with pseudoholomorphic curves) of holomorphic maps. Consider first the situation when $J$ be an almost complex structure defined in a domain $\Omega\subset\mathbb C^n$; one can view this as a local coordinate representation of $J$ in a chart on $M$. A $C^1$ function $F:\Omega\to\mathbb C$ is $(J,J_{st})$-holomorphic if and only if it satisfies the Cauchy-Riemann equations \begin{eqnarray} \label{CRscalar} F_{\overline z} + F_z A(z) =0, \end{eqnarray} where $F_{\overline z} = (\partial F/\partial \overline{z}_1,...,\partial F/\partial \overline{z}_n)$ and $F_z = (\partial F/\partial {z}_1,...,\partial F/\partial {z}_n)$ are viewed as row-vectors. Indeed, $F$ is $(J,J_{st})$ holomorphic if and only if for every $J$-holomorphic disc $z:\mathbb D \to \Omega$ the composition $F \circ z$ is a usual holomorphic function that is $\partial (F \circ z) /\partial\overline{\zeta} = 0$ on $\mathbb D$. Then the Chain rule in combination with (\ref{holomorphy}) leads to (\ref{CRscalar}). Generally the only solutions to (\ref{CRscalar}) are constant functions unless $J$ is integrable (then $A$ vanishes identically in suitable coordinates). Note also that (\ref{CRscalar}) is a linear PDE system while (\ref{holomorphy}) is a quasilinear PDE for a vector function on $\mathbb D$. Every $1$-differnitial form $\phi$ on $(M,J)$ admits a unique decomposition $\phi = \phi^{1,0} + \phi^{0,1}$ with respect to $J$. In particular, if $F:(M,J) \to \mathbb C$ is a $C^1$-complex function, we have $dF = dF^{1,0} + dF^{0,1}$. We use the notation \begin{eqnarray} \label{d-bar} \partial_J F = dF^{1,0} \,\,\,\mbox{and}\,\,\, \overline\partial_J F = dF^{0,1} \end{eqnarray} In order to write these operators explicitely in local coordinates, we find a local basic in the space of (1,0) and (0,1) forms. We view $dz = (dz_1,...,dz_n)^t$ and $d\overline{z} = (d\overline{z}_1,...,d\overline{z}_n)^t$ as vector-columns. Then the forms \begin{eqnarray} \label{FormBasis} \alpha = (\alpha_1,..., \alpha_n)^t = dz - A d\overline{z} \,\,\, \mbox{and} \,\, \overline\alpha = d\overline{z} - \overline A dz \end{eqnarray} form a basis in the space of (1,0) and (0,1) forms respectively. Indeed, it suffices to note that for 1-form $\beta$ is (1,0) (resp. $(0,1)$) for if and only if for every $J$-holomorphic disc $z$ the pull-back $z^*\beta$ is a usual (1,0) (resp. $(0,1)$) form on $\mathbb D$. Using the equations (\ref{holomorphy}) we obtain the claim. Now we decompose the differential $dF = F_zdz + F_{\overline{z}} d\overline{z} = \partial_J F + \overline\partial_J F$ in the basis $\alpha$, $\overline\alpha$ using (\ref{FormBasis}) and obtain the explicit expression \begin{eqnarray} \label{d-bar2} \overline\partial_J F = (F_{\overline{z}} (I - \overline{A}A)^{-1} + F_z (I - A\overline{A})^{-1}A)\overline\alpha \end{eqnarray} It is easy to check that the holomorphy condition $\overline\partial_J F = 0$ is equivalent to (\ref{CRscalar}) because $(I - A\overline{A})^{-1} A (I - \overline{A} A) = A$. Thus \begin{eqnarray*} \overline\partial_J F = (F_{\overline{z}} + F_z A)(I - \overline{A}A)^{-1}\overline\alpha \end{eqnarray*} We note that the term $(I - A\overline A)^{-1}$ as well as the forms $\alpha$ affect only the non-essential constants in local estimates of the $\overline\partial_J$-operator near a boundary point which we will perfom in the next sections. So the reader can assume that this operator is simply given by the left hand of (\ref{CRscalar}). Let $F$ be a complex function of class $C^1$ on a (bounded) domain $\Omega$ in an almost complex manifold of dimension $n$. We call a function $f$ a {\it subsolution of the $\overline\partial_J$ operator } or simply $\overline\partial_J$-subsolution on $\Omega$ if $\parallel \overline\partial_J F \parallel $ is uniformly bounded on $\Omega$ that is there exists a constant $C > 0$ such that \begin{eqnarray} \label{AlHol} \parallel \overline\partial_J F (z)\parallel \le C \end{eqnarray} for all $z \in \Omega$. Here we use the norm with respect to any fixed Riemannian metric on $M$. Obviously, non-constant $\overline\partial_J$-subsolutions exist in a sufficiently small neighborhhod of any point of $M$. In fact any function $F$ of class $C^1$ in an open neighborhhod of the compact set $\overline\Omega$ is a $\overline\partial_J$-subsolution on $\Omega$. Let $F$ be a $\overline\partial_J$-subsolution on $\Omega$. Suppose that $A$ is the complex matrix of $J$ in a local chart $U$ and $z:\mathbb D \to U$ is a $J$-complex disc. It follows by the Chain Rule and (\ref{holomorphy}) that $$(F \circ z)_{\overline\zeta} = (F_{\overline z} + F_zA){\overline z}_{\overline\zeta}.$$ Thus, if $h: \mathbb D \to \Omega$ is a $J$-complex disc of class $C^1(\overline\mathbb D)$, then the composition $F \circ h$ has a uniformly bounded $\overline\partial$-derivative on $\mathbb D$ that is $F \circ h$ is a $\overline\partial_{J_{st}}$-subsolution on $\mathbb D$. Note that the upper bound on the $\overline\partial (F \circ h)$ depends only on the upper bound on $\overline\partial_J F$ from (\ref{AlHol}) and the $C^1$ norm of $h$ on $\overline\mathbb D$. In particular, if $(h_t)$ is a family of $J$-complex discs in $\Omega$ and $C^1$-norms of these discs are uniformly bounded with respect $t$, then the norms $\parallel\overline\partial_J (F \circ h_t) \parallel$ are bounded uniformly in $t$ as well. \subsection{Plurisubharmonic functions on almost complex manifolds: the background} For the convenience of readers we recall some basic notions concerning plurisubharmonic functions on almost complex manifolds. Let $u$ be a real $C^2$ function on an open subset $\Omega$ of an almost complex manifold $(M,J)$. Denote by $J^*du$ the differential form acting on a vector field $X$ by $J^*du(X):= du(JX)$. Given point $p \in M$ and a tangent vector $V \in T_p(M)$ consider a smooth vector field $X$ in a neighborhood of $p$ satisfying $X(p) = V$. The value of the {\it complex Hessian} ( or the Levi form ) of $u$ with respect to $J$ at $p$ and $V$ is defined by $H(u)(p,V):= -(dJ^* du)_p(X,JX)$. This definition is independent of the choice of a vector field $X$. For instance, if $J = J_{st}$ in $\mathbb C$, then $-dJ^*du = \Delta u d\xi \wedge d\eta$; here $\Delta$ denotes the Laplacian. In particular, $H_{J_{st}}(u)(0,\frac{\partial}{\partial \xi}) = \Delta u(0)$. Recall some basic properties of the complex Hessian (see for instance, \cite{DiSu}): \begin{lemma} \label{pro1} Consider a real function $u$ of class $C^2$ in a neighborhood of a point $p \in M$. \begin{itemize} \item[(i)] Let $F: (M',J') \longrightarrow (M, J)$ be a $(J', J)$-holomorphic map, $F(p') = p$. For each vector $V' \in T_{p'}(M')$ we have $H_{J'}(u \circ F)(p',V') = H_{J}(u)(p,dF(p)(V'))$. \item[(ii)] If $f:\mathbb D \longrightarrow M$ is a $J$-complex disc satisfying $f(0) = p$, and $df(0)(\frac{\partial}{\partial \xi}) = V \in T_p(M)$ , then $H_J(u)(p,V) = \Delta (u \circ f) (0)$. \end{itemize} \end{lemma} Property (i) expresses the holomorphic invariance of the complex Hessian. Property (ii) is often useful in order to compute the complex Hessian on a given tangent vector $V$. Let $\Omega$ be a domain $M$. An upper semicontinuous function $u: \Omega \to [-\infty,+\infty[$ on $(M,J)$ is {\it $J$-plurisubharmonic} (psh) if for every $J$-complex disc $f:\mathbb D \to \Omega$ the composition $u \circ f$ is a subharmonic function on $\mathbb D$. By Proposition \ref{pro1}, a $C^2$ function $u$ is psh on $\Omega$ if and only if it has a positive semi-definite complex Hessian on $\Omega$ i.e. $H_J(u)(p,V) \geq 0$ for any $ p \in \Omega $ and $V \in T_p(M)$. A real $C^2$ function $u:\Omega \to \mathbb R$ is called {\it strictly $J$-psh} on $\Omega$, if $H_J(u)(p,V) > 0$ for each $p \in M$ and $V \in T_p(M) \backslash \{ 0\}$. Obviously, these notions are local: an upper semicontinuous (resp. of class $C^2$) function on $\Omega$ is $J$-psh (resp. strictly) on $\Omega$ if and only if it is $J$-psh (resp. strictly) in some open neighborhood of each point of $\Omega$. A useful observation is that the Levi form of a function $r$ at a point $p$ in an almost complex manifold $(M,J)$ coincides with the Levi form with respect to the standard structure $J_{st}$ of $\mathbb R^{2n}$ if {\it suitable} local coordinates near $p$ are choosen. Let us explain how to construct these adapted coordinate systems. As above, choosing local coordinates near $p$ we may identify a neighborhood of $p$ with a neighborhood of the origin and assume that $J$-holomorphic discs are solutions of (\ref{holomorphy}). \begin{lemma} \label{normalization} There exists a second order polynomial local diffeomorphism $\Phi$ fixing the origin and with linear part equal to the identity such that in the new coordinates the complex matrix $A$ of $J$ (that is $A$ from the equation (\ref{holomorphy})) satisfies \begin{eqnarray} \label{norm} A(0) = 0, A_{z}(0) = 0 \end{eqnarray} \end{lemma} Thus, by a suitable local change of coordinates one can remove the terms linear in $z$ in the matrix $A$. We stress that in general it is impossible to get rid of first order terms containing $\overline z$ since this would impose a restriction on the Nijenhuis tensor $J$ at the origin. I have learned this result from unpublished E.Chirka's notes; see .\cite{DiSu} for the proof. In \cite{SuTu} it is shown that, in an almost complex manifold of (complex) dimension 2, a similar normalization is possible along a given embedded $J$-holomorphic disc. \subsection{Boundary properties of subsolutions of the $\overline\partial$-operator in the unit disc} Denote by $W^{k,p}(\mathbb D)$ (we need only $k=0$ and $k=1$) the usual Sobolev classes of functions having generalized partial derivatives up to the order $k$ in $L^p(\mathbb D)$ ; thus, $W^{0,p}(\mathbb D) = L^p(\mathbb D)$. We will always assume that $p > 2$. Consider {\it the Cauchy transform} \begin{eqnarray} \label{Cauchy} Kf(\zeta) = \frac{1}{2 \pi i} \int_{b\mathbb D} \frac{f(\omega)d\omega \wedge d\overline\omega}{\omega - \zeta} \end{eqnarray} Recall that $K$ is a bounded linear map in classes $C^r(b\mathbb D) \to C^(\mathbb D)$ for every $r> 0$ non-integer, as well as in $L^q(b\mathbb D) \to L^q(\mathbb D)$ for $1 \le q \le \infty$. This is classical that properties of the Cauchy-Green operator $T$ in the Sobolev scale are similar to the regularity in the H\"older classes (see \cite{Ve}): \begin{itemize} \item[(i)] $T: W^{0,p}(\mathbb D) \to W^{1,p}(\mathbb D)$ is a bounded linear operator. \item[(ii)] $(Tf)_{\overline\zeta} = f$ i.e. $T$ solves the $\overline\partial$-equation in the unit disc (Sobolev's derivatives are used here). \item[(iii)] the function $Tf$ is holomorphic on $\mathbb C \setminus \overline\mathbb D$ and vanishes at infinity. Furthemore, $Tf$ is $(1-2/p)$-H\"older continuous on $\mathbb C$ and the operator $T: W^{0,p}(\mathbb D) \to C^{1-2/p}(\mathbb C)$ is bounded. \item[(iv)] $KTf(\zeta) = 0$ for $\zeta \in \mathbb D$. \end{itemize} Denote also by $\parallel f \parallel_\infty = \sup_\mathbb D \vert f \vert$ the usual $\sup$-norm on the space $L^\infty(\mathbb D)$ of complex functions bounded on $\mathbb D$. Various versions of the following Lemma were used by several authors (see \cite{Fo, PiKh, NaRu}). \begin{lemma} \label{SchwarzLemma} Let $f \in L^\infty(\mathbb D)$ and $f_{\overline\zeta} \in L^p(\mathbb D)$ for some $p > 2$. Then \begin{itemize} \item[(a)] $f$ admits a non-tangential limit at almost every point $\zeta \in b\mathbb D$. \item[(b)] if $f$ admits a limit along a curve in $\mathbb D$ approaching $b\mathbb D$ non-tangentially at a boundary point $e^{i\theta} \in b\mathbb D$, then $f$ admits a non-tangential limit at $e^{i\theta}$. \item[(c)] for each positive $r < 1$ there exists a constant $C = C(r) > 0$ (independent of $f$) such that for every $\zeta_j \in r\mathbb D$, $j=1,2$ one has \begin{eqnarray} \label{SchwarzIn} \vert f(\zeta_1) - f(\zeta_2)\vert \le C (\parallel f \parallel_\infty + \parallel f_{\overline\zeta} \parallel_{L^p(\mathbb D)} ) \vert \zeta_1 - \zeta_2\vert ^{1-2/p} \end{eqnarray} \end{itemize} \end{lemma} \proof The regularity property (i) implies $Tf_{\overline\zeta} \in W^{1,p}(\mathbb D)$; in view of (iii) there exists $C_1 > 0$ independent of $f$ such that \begin{eqnarray} \label{Sch1} \vert Tf_{\overline\zeta}(\zeta_1) - Tf_{\overline\zeta}(\zeta_2)\vert \le C_1 \parallel f_{\overline\zeta} \parallel_{L^p(\mathbb D)} \vert \zeta_1 - \zeta_2\vert ^{1-2/p} \end{eqnarray} The function $g = f - Tf_{\overline\zeta}$ is bounded on $\mathbb D$ and its generalized derivative vanishes: $g_{\overline\zeta} = 0$ on $\mathbb D$. Hence $g$ is holomorphic and (a), (b) follow respectively from the classical Fatou and Lindel\"of theorems for holomorphic functions. Denote by $g^* \in L^\infty(b\mathbb D)$ and $f^*\in L^\infty(b\mathbb D)$ the non-tangential boundary value functions of $g$ and $f$ respectively. It is classical that $g$ satisfies the Cauchy formula on $\mathbb D$ that is $g(\zeta) = Kg^*(\zeta) = Kf^*(\zeta) - KTf_{\overline\zeta}(\zeta) = Kf^*(\zeta)$ for each $\zeta \in \mathbb D$; here we have used the property (iv). Thus, the generalized Cauchy formula $f = K f^* + Tf_{\overline\zeta}$ holds on $\mathbb D$. We have the estimate $\parallel Kf^* \parallel_\infty \le \parallel f \parallel_\infty$ and by the Cauchy estimates the holomorphic function $Kf^*$ is 1-Lipschitz on every $r\mathbb D$ with a Lipschitz constant $C(r)\parallel f \parallel_\infty$. In combination with (\ref{Sch1}) this proves (c). \section{The Chirka-Lindel\"of principle for strictly pseudoconvex domains} First we introduce an almost complex analog of an admissible approach which is classical in the case of $\mathbb C^n$, see \cite{St,Ch}. Let $\Omega$ be a smoothly bounded domain in an almost complex manifold $(M,J)$. Fix a hermitian metric on $M$ compatible with $J$; a choice of such metric will not affect our results since it changes only constant factors in estimates. We measure all distances and norms with respect to the choosen metric. Let $p \in b\Omega$ be a boundary point. {\it A non-tangential approach} to $b\Omega$ at $p$ can be defined as the limit along the sets \begin{eqnarray} \label{NonTan1} C_\alpha(p) = \{ q \in \Omega: dist(q,p) < \alpha \delta_p(q) \}, \,\,\, \alpha > 1. \end{eqnarray} Here $\delta_p(q)$ denotes the minimum of distances from $q$ to the tangent plane $T_p(b\Omega)$ and to $b\Omega$. We need to define a wider class of regions. {\it An admissible approach} to $b\Omega$ at $p$ is defined as the limit along the sets \begin{eqnarray} \label{Ad1} A_{\alpha}(p) = \{ q \in \Omega: d_p(q) < (1+\alpha)\delta_p(q), \, dist(p,q)^2 < \alpha \delta_p(q) \}, \,\, \alpha > 0. \end{eqnarray} Here $d_p(q)$ denotes the distance from $q$ to the holomorphic tangent space $H_p(b\Omega) = T_p(b\Omega) \cap J T_p(b\Omega)$. As in the classical case of $\mathbb C^n$, an admissible region approaches $b\Omega$ transversally in the normal direction and can be tangent in directions of the holomorphic tangent space. \begin{definition} A function $F:\Omega \to \mathbb C$ has an admissible limit $L$ at $p \in b\Omega$ if $\lim_{A_\alpha(p) \ni q} F(q) = L$ for all $\alpha > 0$. \end{definition} In what follows we denote by $b\mathbb D^+ = \{ e^{i\theta}: \theta \in [0,\pi] \}$ the upper-semi-circle. \begin{definition} Let $\Omega$ be a smoothly bounded domain in an almost complex manifold $(M,J)$ of complex dimension $n$. Assume that $f: \mathbb D \to \Omega$ is a $J$-complex disc of class $C^1(\overline\mathbb D)$ such that $f(b\mathbb D^+)$ is contained in $b\Omega$ and is transverse to $b\Omega$. Let also $\gamma: [0,1[ \to \mathbb D$ be a real curve of class $C^1([0,1])$, $\gamma(1) = i$ approaching $b\mathbb D$ non-tangentially at $i$. Then the curve $\tau:= f \circ \gamma$ is called an admissible $p$-curve, where $p = f(i) \in b\Omega$. \end{definition} \begin{definition} A function $F$ defined on $\Omega$ has a limit $L \in \mathbb C$ along an admissible $p$-curve if there exists a $p$ curve $\tau$ such that $\lim_{t \to 1} (F \circ \tau)(t) = L$. \end{definition} As in the classical case, a smoothly bounded domain $\Omega$ in $(M,J)$ is called {\it strictly pseudoconvex} if for every boundary point $p \in \Omega$ there exists a neighborhood $U$ of $p$ and a strictly $J$-plurisubharmonic function $\rho$ with non-vanishing gradient on $U$, such that $\Omega \cap U = \{ \rho < 0 \}$. Note that we do not need the existence of global defining strictly plurisubharmonic functions for $\Omega$ since all results are purely local. Our first main result is the following analog of the Chirka - Lindel\"of principle \cite{Ch}. \begin{thm} \label{Thm1} Let $\Omega$ be a smoothly bounded strictly pseudoconvex domain in an almost complex manifold $(M,J)$ of complex dimension $n$. Suppose that $F:\Omega \to \mathbb C$ is a bounded function of class $C^1(\Omega)$ and $\parallel\overline\partial_J F\parallel$ is bounded on $\Omega$. If $F$ has a limit along an admissible $p$-curve for some $p \in b\Omega$, then $F$ has the admissible limit at $p$. \end{thm} Before proceed the proof we make some comments. Theorem \ref{Thm1} imposes two restrictions which are not present In the main result of E.Chirka \cite{Ch}. First, we assume that $\Omega$ is strictly pseudoconvex although \cite{Ch} deals with much wider classes of domains. In particular, admissible regions in the sense of Chirka can be tangent to $b\Omega$ along complex submanifolds of higher dimension which can be contained in $b\Omega$. However, for a generic almost complex structure such complex submanifolds do not exist. Furthermore, any smooth boundary can be touched at a given point from inside by a strictly psedoconvex domain which allows to apply Theorem \ref{Thm1}. Second, in Chirka's theorem an admissible curve does not need to be contained in a complex disc. However, this assumption is sufficient for the most applications of Theorem \ref{Thm1}. \bigskip The local geometry of strictly pseudoconvex hypersurfaces in an almost complex manifold is similar to the case of $\mathbb C^n$ because of Lemma \ref{normalization}. However, there is some difference. In the case of $\mathbb C^n$ every strictly pseudoconvex hypersurface can be locally approximated by an osculating sphere or, equivalently, by the Siegel domain (the Heisenberg group). This is the standard and useful tool in local analysis on strictly pseudoconvex hypersurfaces. In the almost complex case the same remains true only in complex dimension 2. When the dimension is $> 2$, there exist an infinity local model almost complex structures which provides a local approximation; a choice of the model is determined by the first order jet of $J$ at a boundary point. All these model structures are strictly pseudoconvex and homogeneous. There are first appeared in \cite{GaSu} and later their geometry has been intensively studied. We proceed the proof in several steps. First approximate a strictly pseudoconvex hypersurface by a suitable model structure. Then we establish Theorem for such a structure. The general result then follows by a perturbation argument. \subsection{Local approximation by homogeneous models} To begin with, choose local coordinates near a boundary point according to Lemma \ref{normalization}. In these coordinates a local defining function of $\Omega$ is strictly plurisubharmonic with respect to $J$ and $J_{st}$. It follows from the transformation rule (\ref{CompMat}) that the normalization conditions (\ref{norm}) are invariant with respect to usual (that is $J_{st}$) biholomorphic transformations. This is well-known that using such (polynomial of degree at most two) transformations one can define $\Omega$ in a neighborhood of the origin by \begin{eqnarray} \label{norm2} \rho(z) = y_n + \vert 'z \vert^2 + o(\vert z \vert^2) < 0 \end{eqnarray} where $'z = (z_1,....,z_{n-1})$. Notice that the normalization conditions (\ref{norm}) still hold in these coordinates. Next for each $\lambda > 0$ we consider non-isotropic dilations \begin{eqnarray} \label{dilations} d_\lambda: ('z,z_n) \mapsto (\lambda^{-1/2} {'z}, \lambda^{-1}z_n) = ('w,w_n). \end{eqnarray} The image $\Omega_\lambda:= d_\lambda(\Omega)$ is defined by $$\rho_\lambda:= \lambda^{-1}\rho(\lambda^{1/2}{'z},\lambda w_n) < 0$$ This is well-known (and is easy to check) that $\rho_\lambda$ converges uniformly on every compact subset of $\mathbb C^n$ to the function \begin{eqnarray} \label{model1} \rho_0 = {\rm Im\,} w_n + \vert 'w \vert^2 \end{eqnarray} as $\lambda \to 0$. Denote by $J_\lambda:= (d_\lambda)_*(J)$ the representation of $J$ in the new coordinates; let also $A_\lambda(w)$ denotes the complex matrix of $J_\lambda$. Becuse of (\ref{norm}) the complex matrix of $J$ has the expansion $A(z) = L(\overline z) + O(\vert z \vert^2)$. Here $L$ is the linear part which depends only on $\overline z$. An elementary computation based on the transformation rule (\ref{CompMat}) shows that the functions $A_\lambda$ converge uniformly on every compact subset of $\mathbb C^n$ as $\lambda \to 0$, to the matrix function \begin{eqnarray} \label{model2} A_0: ('w,w_n) \mapsto -\left( \begin{array}{clll} 0 & \dots & 0 & 0\\ \dots & \dots & \dots & \dots\\ 0 & \dots & 0 & 0 \\ l_1(\overline{'w})& \dots & l_{n-1}(\overline{'w}) & 0 \end{array} \right ) \end{eqnarray} Here every $l_j$ in the last line is a complex linear function in $\overline{'w}$. Furthermore, every $l_j$ coincides with the restriction of the corresponding entry of the initial matrix function $L$ on the subspace $('w,0)$. Denote by $J_0$ the almost complex structure with the matrix $A_0$. We call the domain (\ref{model1}) equipped with the almost complex structure $J_0$ {\it a model structure}. The following properties of these structures are immediate: \begin{itemize} \item[(i)] every model structure is strictly pseudoconvex; \item[(ii)] the non-isotropic dilations (\ref{dilations}) are biholomorphic automorphisms of every model structure; in particular, each model structure is homogeneous. \end{itemize} Thus, model structures play the role of the Heisenberg group in the almost complex analysis on strictly pseudoconvex domains. In general, model structures are not integrable and there exists an infinity of biholomorphically non-equivalent model structures. The only exceptional case arises in dimension $2$ where all model structures are equivalent to $J_{st}$. Indeed, in this case the only non-zero entry of $A_0$ is $l_1(w_1) = a\overline{w}_1$ for some $a \in \mathbb C$. Using the transformation rule (\ref{CompMat}) one sees that the map $(w_1,w_2) \mapsto (w_1,w_2 + a\overline{w_1}^2/2)$ takes $A_0$ to $0$ that is $J_0$ becomes $J_{st}$. Obviously, after such a change of coordinates we obtain a domain biholomorphic to $\Omega_0$. Thus, in complex dimenson 2 the infinity of homogeneous models reduces to the usual ball with the standard complex structure. \subsection{Case of model structures} Here we establish the Chirka-Lindel\"of principle for the simplest case of model structures (\ref{model1}), (\ref{model2}). Note that for all these structures the complex normal line $\mathbb C \ni \zeta \mapsto ('0,\zeta)$ is $J_0$-complex. We will consider the case of an admissible $0$-curve which is contained in this line. We begin with the classical case of the $J_{st}$ which is the only one arising in dimension 2. Here the model structure is represented by the Siegel domain $\Omega_0$: \begin{eqnarray} \label{Heisn1} \rho(z) = y_2 + \vert z_1 \vert^2 < 0 \end{eqnarray} equipped with the standard complex structure $J_{st}$. Without loss of generality assume that the metric is the standard Euclidean (this choice affects only inessential constants in estimates). We use the notation $f(x) \sim g(x)$ for two functions $f(x),g(x)$ when there exists a constant $C > 0$ such that $C^{-1} g(x) \le f(x) \le C g(x)$. In what follows the value of constants $C$ can change from line to line. We have $T_0(b\Omega_0) = \{ y_2 = 0 \}$ and $H_0(b\Omega_0) = \{ z_2 = 0 \}$. Note that $$dist(z,b\Omega_0) \sim \vert \rho(z) \vert \le \vert y_2 \vert = dist(z,T_0(b\Omega_0)).$$ Hence we can assume $\delta_0(z) = \vert\rho(z)\vert$. Since $dist(z,H_0(b\Omega_0)) = \vert z_2 \vert$, for each $\alpha > 0$ the admissible region $A_\alpha(0)$ is defined by the conditions \begin{eqnarray} \label{angle1} \vert z_2 \vert < (1 + \alpha) \vert \rho(z) \vert \end{eqnarray} and \begin{eqnarray} \label{angle2} \vert z \vert^2 < \alpha\vert \rho(z) \vert \end{eqnarray} The complex normal plane $(0,z_2)$ intersects $\Omega_0$ in the half-plane $\{(0,z_2): y_2 < 0 \}$ and the first inequality (\ref{angle1}) defines a non-tangential region there (which tends to this half-plane when $\alpha$ increases). Fix a point $(0,z_2^0)$ which satisfies (\ref{angle1}). Consider a complex line through the point $(0,z^0_2)$: \begin{eqnarray} \label{Heisn2} f_a: \mathbb C \ni \zeta \mapsto (a\zeta, z^0_2) \end{eqnarray} and parallel to $H_0(b\Omega_0)$. A simple calculation shows that the second assumption (\ref{angle2}) is equivalent to the fact that $f_a(\mathbb D) \subset A_\alpha(0)$ when \begin{eqnarray} \label{Heisn3} \vert a \vert \sim \vert y_2^0\vert^{1/2} \end{eqnarray} Clearly, this family of complex discs fills exactly the region $A_\alpha(0)$ when $(0,z_2^0)$ satisfies the first condition. Next we consider the general case. Here the model structure is represented by the domain \begin{eqnarray} \rho(z) = y_n + \vert 'z \vert^2 < 0 \end{eqnarray} and the Cauchy-Riemann equations (\ref{holomorphy}) have the form \begin{eqnarray} \label{ModEq} \left\{ \begin{array}{cccc} & &(z_1)_{\overline\zeta} = 0, \\ & & ...\\ & & (z_{n-1})_{\overline\zeta} = 0, \\ & & (z_n)_{\overline\zeta} = \sum_{j=1}^{n-1} l_j(\overline{'z})(\overline{z}_j)_{\overline\zeta} \end{array} \right. \end{eqnarray} The admissible regions are defined by the conditions \begin{eqnarray} \label{angle3} \vert z_n \vert < (1 + \alpha) \vert \rho(z) \vert \end{eqnarray} and \begin{eqnarray} \label{angle4} \vert z \vert^2 < \alpha\vert \rho(z) \vert \end{eqnarray} Consider any non-zero holomorphic tangent vector $v = (v_1,...,v_{n-1},0) \in H_0(b\Omega_0)$. Fix a point $('0,z_n^0)$ satisfying the assumptions (\ref{angle3}). Consider a pseudoholomorphic disc of the form \begin{eqnarray} \label{discs1} \left\{ \begin{array}{cccc} & & f(v,z_n^0): \mathbb D \ni \zeta \mapsto f(v,z_n^0)(\zeta), \\ & & 'z = v\zeta,\\ & & z_n = z_n^0 + l(v)\overline\zeta^2 + \overline{l(v)}\zeta^2. \end{array} \right. \end{eqnarray} Here $l(v)$ is a suitable linear function in $v$ making $f$ a solution of the system (\ref{ModEq}). Note that the disc $f$ remains $J_0$-complex if we add to its $z_n$-component any term holomorphic with respect to $J_{st}$. Our choice of this term does not affect the imaginary part of the map $z_n$ which remains equal to the constant $y_n^0$. Then as above, this disc is contained in $A_\alpha(0)$ when $\vert v \vert \sim \vert y_n^0\vert^{1/2}$ and the obtained family of discs fills the region $A_\alpha(0)$. After reparametrization we can assume that $\parallel v \parallel = 1$ and $f(v,z_n^0)$ is defined on the disc of radius $\sim \vert y_n^0 \vert^{1/2}$. We sum up. Our construction of filling the admissible region $A_\alpha(0)$ consists of two steps. \begin{itemize} \item[(i)] First, we have the $J_0$-complex disc (in fact, this disc is parametrized by the half-plane $\Pi = \{ {\rm Im\,} \zeta < 0 \}$) of the form $f^0: \Pi \ni \zeta \mapsto ('0,\zeta)$. This disc is transverse to $b\Omega$; more precisely, it belongs to the complex normal line. \item[(ii)] Second, we have the family (\ref{discs1}) of $J_{0}$-complex discs $f(v,z_n^0)$ filling the region $A_\alpha(0)$. \item[(iii)] Every map $f(v,z_n^0)$ is defined on the disc of radius $\sim \vert y_n^0\vert^{1/2}$, and is "parallel " (up to the second order terms) to $H_0(b\Omega)$; \item[(iv)] the centre $f(v,z_n^0)(0)$ of the disc is the point $('0,z_n^0)$ which lies in the non-tangential region in the transverse disc $f^0(\Pi)$; \item[(v)] the unit tangent vector $v$ in the centre of the disc is parallel to $H_0(b\Omega)$. \end{itemize} Now we prove Theorem \ref{Thm1} for the case of a model structure. We suppose that $\Omega = \Omega_0$ with $J = J_{0}$. Furthermore, assume that the transverse disc $f$ coincides with the disc $f^0$ along the complex normal. Let $F:\Omega_0 \to \mathbb C$ be a bounded $C^1$-function and $\parallel\overline\partial_{J_0} F \parallel$ also is bounded on $\Omega_0$. Then the restriction $F \circ f^0$ is a bounded function on $\Pi$ and $(F \circ f^0)_{\overline\zeta}$ is bounded as well. Furthermore, $F \circ f^0$ admits a limit $L$ along a non-tangential $0$-curve $\gamma$. By (b) Lemma \ref{SchwarzLemma} the function $F \circ f^0$ admits the limit $L$ along any non-tangential region in $\Pi$. Let now $z \in A_\alpha(0)$. Then there exists (a unique) unit vector $v$ and a point $z_n^0$ in the non-tangential region on $f^0(\Pi)$ such that the disc $f(v,z^0_n)$ contains the point $z$ that is $z = f(v,z_n^0)(\zeta)$ for some $\zeta$ with $\vert \zeta \vert \le C \vert y_n^0 \vert^{1/2}$. Since also $f(v,z_n^0)(0) = z_n^0$, by (c) Lemma \ref{SchwarzLemma} we have the estimate (for any $0 < \tau < 1/2$): $$\vert F(z) - F('0,z_n^0) \vert = \vert (F \circ f(v,z_n^0))(\zeta) - (F \circ f(v,z_n^0))(0) \vert \le C \vert y_n^0 \vert^\tau$$ Since $F('0,z_n) \to L$ as $y_n^0 \to 0$, we conclude that $F(z) \to L$. \subsection{Deformation argument and proof of Theorem \ref{Thm1}} In order to prove Theorem \ref{Thm1} in general setting we construct a family of pseudoholomorphic discs with properties similar to the case of model structures. Locally every strictly pseudoconvex hypersurface is a small deformation of a model structure; a family of discs with required properties will in turn arise as a small deformation of discs constructed explicetly for the model case. We assume that we are in the hypothesis of Theorem; everything is local so $p = 0$. First we consider the simplest case proving the existence of a limit along the non-tangential region $C_\alpha(0)$. Here the assumption of strict pseudoconvexity of $\Omega$ is irrelevant. As in the proof of Lemma \ref{lemma1}, consider isotropic dilations $h_\lambda$. One can assume that a local defining function of $\Omega$ has the form $y_n + o\vert z \vert $. We argue quite similarly to the case of model structures but using the isotropic dilations $h_\lambda$ instead on the non-isotropic dilations $d_\lambda$. Using the similar notations, we obtain a family of domains $\Omega_\lambda$ with almost complex structures $J_\lambda$ which for each $\lambda > 0$ are biholomorphic to $(\Omega,J)$. When $\lambda \to 0$, these domains converge to the half-space $\Omega_0 = \{ y_n < 0 \}$ and $J_\lambda$ converge to $J_{st}$ in any $C^m$ norm. Every non-tangential region for $\Omega_0$ is filled by a family of $J_{st}$-holomorphic discs as follows. First we have the transverse disc $f^0:\Pi \to \Omega$ defined as above. Second, we obtain the filling by the discs $\zeta \mapsto v\zeta + ('0,z_n^0)$ where $v = (v_1,...,v_{n-1},0)$ and $z_n^0$ lies in the non-tangent region in $\Pi$. Now, by the Nijenhuis-Woolf theorem, this construction is stable under small perturbation of the almost complex structure, that is, we have a family with similar properties for $(\Omega_\lambda,J_\lambda)$ for $\lambda > 0$ small enough. This gives the proof for $(\Omega_\lambda,J_\lambda)$ and so for $(\Omega,J)$ because they are biholomorphic. \bigskip Now we prove the existence of a limit in an admissible region $A_\alpha(0)$. There are at least two ways to proceed. We will work with the structures $J_\lambda = (d_\lambda)_*(J)$ obtained from $J$ by non-isotropic dilations (\ref{dilations}); we also keep the notations $\Omega_\lambda$ introduced above. Let $f$ be a transverse $J$-complex disc given by hypothesis of Theorem \ref{Thm1}. It is more convenient to assume that $f$ is defined on the half-plane $\Pi = \{ {\rm Im\,} \zeta < 0 \}$, is of class $C^1$ up to the boundary and takes the segment $[-1,1]$ to $b\Omega$; after a holomorphic reparametrization we can assume $f(\zeta) = ('a,\zeta,\zeta) + o(\vert \zeta \vert)$. Then each disc $f_\lambda(\zeta):= (d_\lambda \circ f)(\lambda \zeta)$ is glued to $b\Omega_\lambda$ along $[-1/\lambda, 1/\lambda]$. The family $(f_\lambda)$ converges uniformly on compact subsets of $\overline \Pi$ to the $J_0$-complex disc $f^0:\zeta \mapsto ('0,\zeta)$ glued to $\Omega_0$. This is exactly the one considered in the model case. It suffices to prove the existence of a filling family of discs for $J_\lambda$ and $\Omega_\lambda$ when $\lambda$ is small enough. But this follows directly from the results on stability and deformation of pseudoholomorphic discs established in \cite{SuTu2}. Indeed, it is proved there (in a general setting) that a psedoholomorphic disc generates a family of nearby discs which are also pseudoholomorphic (for almost complex structures close enough to the initial one). The proof is somewhat inspired by the elementary argument of Nijenhuis-Woolf based on the implicit function theorem, but is more involved technically. It is based on an analysis of the Cauchy-Riemann equations (\ref{CRglobal}) linearized along a pseudoholomorphic disc; this provides the surjectivity of the linearized operator in a suitable scale (the H\"older or Sobolev one) necessary for the implicit function theorem. These stability result can be applied to the complex normal disc $f^0$ and to the family (\ref{discs1}) in complex tangent direction. This provides the existence of a filling family of disc for $(\Omega_\lambda),J_\lambda)$ and proves theorem. The second approach is more elementary. First we observe that there are no problem with deformation of the "complex normal" disc $f^0$ since $J_0 \vert f^0 = J_{st}$. Hence the implicit function theorem can be applied similarly to the argument of Nijenhuis-Woolf. In order to construct a deformation of the family (\ref{discs1}) it suffices to apply the argument from Proposition 4.2 of \cite{DiSu}. It is proved there that for each positive eigenvalue of the Levi form of the boundary there exists a pseudoholomorphic disc tangent to this direction and touching the boundary from outside at this point. By the Nijenhuis-Woolf theorem this disc generates a family of discs which enters to the domain in a prescribed holomorphic tangent direction at the centre. The stability of such a family follows again from the implicit function argument, see more details in \cite{DiSu}. \section{The Fatou theorem} As an application of the Chirka -Lindel\"of principle we establish a Fatou type results for $\overline\partial_J$-subsolutions. For holomorphic functions in $\mathbb C^n$ the first versions of the Fatou theorem are due to E.Stein \cite{St} and E.Chirka \cite{Ch}. Our approach is inspired by A.Sadullaev \cite{Sa1}. We will deal with some standard classes of real submanifolds of an almost complex manifold. A submanifold $E$ of an almost complex $n$-dimensional $(M,J)$ is called {\it totally real} if at every point $p \in E$ the tangent space $T_pE$ does not contain non-trivial complex vectors that is $T_pE \cap JT_pE = \{ 0 \}$. This is well-known that the (real) dimension of a totally real submanifold of $M$ is not bigger than $n$; we will consider in this paper only $n$-dimensional totally real submanifolds that is the case of maximal dimension. A real submanifold $N$ of $(M,J)$ is called {\it generic} if the complex span of $T_pN$ is equal to the whole $T_pM$ for each point $p \in N$. A real $n$-dimensional submanifold of $(M,J)$ is generic if and only if it is totally real. \bigskip A totally real manifold $E$ can be defined as \begin{eqnarray} \label{edge} E = \{ p \in M: \rho_j(p) = 0 \} \end{eqnarray} where $\rho_j:M \to \mathbb R$ are smooth functions with non-vanishing gradients. The condition of total reality means that for every $p \in E$ the $J$-complex linear parts of the differentials $d\rho_j$ are (complex) linearly independent. A subdomain \begin{eqnarray} \label{wedge} W = \{ p \in M: \rho_j < 0, j = 1,...,n \}. \end{eqnarray}t is called {\it the wedge with the edge} $E$. \bigskip Our main result here is the following \begin{thm} \label{Thm2} Let $E$ be a generic submanifold of the boundary $b\Omega$ of a smoothly bounded strictly pseudoconvex domain $\Omega$ in an almost complex manifold $(M,J)$ of complex dimension $n$. Suppose that $F:\Omega \to \mathbb C$ is a bounded function of class $C^1(\Omega)$ and $\parallel\overline\partial_J F\parallel$ is bounded on $\Omega$. Then $F$ has an admissible limit at almost every point of $E$. \end{thm} Note that the Hausdorff $n$-meausure on $E$ here is defined with respect to any metric on $M$; the condition to be a subset of measuro zero in $E$ is independent of such a choice. In view of the following Lemma it suffices to consider the case where $E$ is totally real. \begin{lemma} \label{lemma2} Let $N$ be a generic $(n+d)$-dimensional ($d > 0$) submanifold of an almost complex $n$-dimensional manifold $(M,J)$. Suppose that $K$ is a subset of $N$ of non-zero Hausdorff $(n+d)$-measure. Then there exists a (local) foliation of $N$ into a family $(E_s), s \in \mathbb R^{d}$ totally real $n$-dimensional submanifolds such that the intersection $K \cap E_s$ has a non-zero Hausdorff $n$-measure for each $s$ from some subset of non-zero Lebesgue measure in $\mathbb R^{d}$. \end{lemma} Here the Hausdorff measure is defined with respect to any Riemannian metric on $M$; the assumption that $K$ has a positive $n$-measure is independent on a choice of such metric. \proof Let $p$ be a point of $M$ such that $K$ has a non-zero measure in each neighborhood of $p$. Choose local coordinates $z$ near $p$ such that $p = 0$ and $J(0) = J_{st}$. After a $\mathbb C$-linear change of coordinates $N = \{ x_j + o(\vert z \vert) = 0, j = n-d+1,...,n\}$. After a local diffeomorphism with the identical linear part at $0$ we obtain that $N = \mathbb R^d(x_1,...,x_d) \times i\mathbb R^n(y)$. In the new coordinates the condition $J(0) = J_{s}$ still holds and every slice $E_s = \{ z \in N: x_1 = s_1,...,x_d= s_d\}$ is totally real. Now we conclude by the Fubini theorem. \bigskip Our proof of Theorem \ref{Thm2} uses the result of \cite{Su1}. There exist a wedge $W \subset \Omega$ of the form (\ref{wedge}) with the edge $E$, and a family of $J$-complex discs $h_t: \mathbb D \to W$, of class $C^r(\overline\mathbb D)$ (with fixed $r > 1$) and smoothly depending on a parameter $t \in \mathbb R^{n-1}$, such that the following holds \begin{itemize} \item[(i)] $h_t(b\mathbb D^+) \subset E$ for every $t$; here $bD^+ = \{e^{i\theta}: \theta \in [0,\pi]\}$ is the upper semi-circle. \item[(ii)] the curves $h_t(b\mathbb D^+)$ form a foliation of $E$. \item[(iii)] every $h_t(b\mathbb D^+)$ is transverse to $b\Omega$. \item[(iv)] if $X_t \subset b\mathbb D^+$ is a subset of measure zero for every $t$, then $\cup_t h_t(X_t)$ ia a subset of measuro zero in $E$. \end{itemize} The function $F \circ h_t$ satisfies assumption of Lemma \ref{SchwarzLemma}. By (a) of this Lemma that for every $t$ the functon $F \circ h_t$ admits a non-tangential limit almost everywhere on $b\mathbb D^+$. Applying Theorem \ref{Thm1} we obtain that $F$ admits an admissible limt almost everywhere on $h_t(b\mathbb D^+)$. This implies theorem. \bigskip I conclude the paper by some remarks. (1) Clearly, Theorems \ref{Thm1} and \ref{Thm2} are purely local that is they hold on an open strictly pseudoconvex piece of the boundary. (2) As it was mentioned, the smoothness assumptions (on $M$, $J$, $b\Omega$) can be considerably weakened. (3) It is quite probable that more precise results can be obtained even using only the methods of the present work, but I prefere to avoid technical complications. More advanced results will be considered in forthcoming works. (4) I hope that the methods of the present paper will allow to study boundary properties of other classes of functions on almost complex manifolds. One of the natural problems is to study boundary properties of almost holomorphic functions in the sense of S.Donaldson. To the best of my knowledge, the only result in this direction is due to M.Peyron \cite{Pe} who proved that a generic totally real manifold is a boundary uniqueness set for such functions. {\footnotesize
\section{Introduction} Travel-time tomography is used to determine the underlying structure of the earth and how seismic waves propagate through that structure. This weakly nonlinear problem is formulated as a data-fitting inverse problem and solved using iterative optimization techniques. Data quality and availability are key constraints and can drastically influence the merit of the results~\cite{phillips1991comparison,landro2002uncertainties,landro2008effect}. Hence, researchers often use prior information to denoise and interpolate the data prior to inversion. Parsimonious representations~\cite{candes2006near,Recht2010guaranteed} of the data in transform domains such as Fourier~\cite{sacchi} and Curvelet~\cite{herrmann2008non} have been used in exploration seismology~\cite{hennenfent2008simply,kumar2015efficient}, along with low-rank representations~\cite{aravkin2014fast,splittingschemes}. We focus on regional seismology --- in particular, we want to analyze data obtained by the Imaging Magma Under St. Helens (iMUSH) project, a multi-year effort to image and infer the architecture of the greater Mount St. Helens, WA, magmatic system \cite{2017AGUFMcarl,2017AGUkiser}. The data collected from this experiment comprises {active experiments}~\cite{kiser2016vpvs} that initiate seismic tremors and record their waves/reverberations at different stations, and {passive experiments} that record seismic waves from natural earthquakes. Collected data has a range of fidelities, and different subsets inform different parameters for 3D $S$- and $P$-wave velocities and hence geometries of the structure underlying Mount St. Helens. Travel times are inverted to obtain 3D seismic velocity models and image complex subsurface structures, including low velocity zones. The efficacy of the approach depends on the quality of the data, which is affected by noise from roads, streams, ocean waves, and wind. The signal to noise ratio (SNR) of the data depends on the earthquake size, distance from the seismometer, and attenuation structure of the earth. Data is scarce because many landscape features are impassable; typical station spacing is 10km. Arrival times are chosen by operators, who assign uncertainties for particular earthquakes based on confidence in seismic readings. Low-magnitude events in particular are often difficult to distinguish from noise. Our goal is to denoise available data, and spatially interpolate to additional locations that might increase resolution and stability of the overall inverse problem. Since we know the data is corrupted by uncertainty and noise, the problem is a good match for {level-set} optimization formulations~\cite{aravkin2016level} that minimize a regularizer subject to a prescribed level of data fit. We propose a relaxation formulation that allows misfit constraints while (1) penalizing rank of a tessellation that captures redundancy of features across sources, and (2) enforcing smooth features consistent with the underlying physical model. We develop an efficient block-coordinate algorithm for this formulation, and compare the approach with a variety of competing formulations and algorithms. The paper proceeds as follows. In Section~\ref{sec:Review} we review relevant formulations and algorithms for interpolation and denoising. In Section~\ref{sec:Relax}, we develop the extended model formulation and the relaxation method to solve it. Section~\ref{sec:data} describes the data used and how it fits into a low-rank interpolation scheme. In Section~\ref{sec:results} we evaluate the approach and compare it against alternatives for denoising and interpolating Mount St. Helens data. \section{Preliminaries} \label{sec:Review} In this section, we set up the notation, review prior information used in interpolation and denoising, and discuss different types of standard optimization formulations needed to implement such approaches. \subsection{Notation} We use the following notation conventions in the paper. Lowercase variables ($x$) denote vectors, while uppercase variables ($X$) represent matrices. Calligraphic uppercase letters ($\mathcal{A}$) are used for operators or functionals. The terms $(R_x, R_y)$ represent a receiver coordinate grid while $(S_x, S_y)$ represent the source coordinate grid. Single source/receiver coordinates are specified with an index $i$, as in $(S_{x_i}S_{y_i})$. The variable $\Omega$ is used to represent the entire 4-dimensional source/receiver space and generically the interpolation space. \subsection{Formulations for Low-rank Interpolation} The goal of low-rank matrix completion is to accurately estimate the missing data entries of a matrix $X \in \mathbb{R}^{m\times n}$ from observed entries. Low-rank structure is often inferred if completed $X$ has few non-zero singular values and experiences entry repetition. Borrowing some formulation from \cite{aravkin2014fast}, let $\mathcal{T} \subset \{1,\dots,n\} \times \{1, \dots, m\}$ be the set of observed entries, which is created by the sampling operator $\mathcal{A}:\mathbb{R}^{n\times m} \rightarrow \mathbb{R}^{n\times m}$ via element-wise selection \[ \mathcal{A}(X) = \begin{cases} X_{ij}, \quad \mbox{if} \ (i,j)\in \mathcal{T}, \\ 0, \quad (i,j)\not\in\mathcal{T} \end{cases} \] for which the observed data $b$ can be written as $b = \mathcal{A}(X) + \epsilon$ for $\epsilon = \mathcal{A}(\epsilon)\in \mathbb{R}^{n\times m}$. Here, $\epsilon$ represents the data corruption of observed entries via some noise distribution. In formulating the problem, the nuclear norm \[ \|X\|_* = \sum_{j =1}^{\min(n,m)} \hat{\sigma}_j (X), \] with $\hat\sigma_j$ the singular values of $X$, is used as a proxy for rank. The classic formulations that balance data fit with regularization are \begin{eqnarray} \label{eq:tikhonov} &\min_{X\in\mathbb{R}^{n\times m}} \|X\|_* + \frac{1}{\sigma}\|\mathcal{A}(X) - b\|_2\\ \label{eq:ivanov} &\min_{X\in\mathbb{R}^{n\times m}}\quad \|\mathcal{A}(X) - b \|_2 \quad \mbox{s.t.} \quad \|X\|_* \leq \tau \\ \label{eq:morozov} &\boxed{\min_{X\in\mathbb{R}^{n\times m}} \|X\|_* \quad \mbox{s.t.}\quad \|\mathcal{A}(X) - b \|_2 \leq \sigma}. \end{eqnarray} These formulations are known as Tichonoff, Ivanov, and Morozov regularization~\cite{oneto2016tikhonov}, respectively. The misfit-constraint Morozov variant~\eqref{eq:morozov} is best suited for situations where a good estimate of the uncertainty, $\sigma$, is available. To simplify exposition, we will focus on Morozov-type formulations. \subsection{Smoothness constraints} In travel time tomography, smoothness and continuity between gridpoints is a reasonable prior, since the geological structure of the crust exhibits the traits of approximately homogeneous media. Smoothness is enforced by introducing a penalty term $\|\mathcal{L}(X)\|_2^2$, with $\mathcal{L}$ the discretization of the Laplacian operator. In 1D, it is a tridiagonal difference matrix operating on the vectorized $X$; in 2D, it has four off-diagonal elements. Enforcing smoothness and low-rank structure combines local and global information. A Morozov formulation, with $\gamma$ balancing the regularizers, is given by \begin{equation} \label{eq:MorozovS} \min_X \|X\|_* + \frac{1}{2\gamma}\|\mathcal{L}(X)\|_2^2 \quad \mbox{s.t.}\quad \ \|\mathcal{A}(X) - b\|_2\leq \sigma. \end{equation} \subsection{Factorized Formulations} \label{sec:factform} Theoretical properties of matrix completion via nuclear-norm minimization have been extensively studied \cite{candes2010Matcompnoise,Candes2009matcompconvex}. The theoretical appeal of convex formulations is tempered by computational considerations --- algorithms that optimize $\|X\|_*$ require a full matrix decision variable, and full or partial singular value decompositions (SVDs) at each iteration. An efficient alternative is to use matrix factorization formulations~\cite{aravkin2014fast}, writing $X = LR^T$, with $L\in\mathbb{R}^{n\times k}, R\in \mathbb{R}^{m\times k}$. From \cite{Recht2010guaranteed}, we have the characterization \[ \|X\|_* = \inf_{L, R: X = LR^T} \frac12 (\|L \|_F^2 + \|R\|_F^2), \] which allows us to replace $\|X\|_*$ in any formulation by $\frac12 (\|L \|_F^2 + \|R\|_F^2)$ for any factorization $X=LR^T$. For example, the three formulations~\eqref{eq:tikhonov}-\eqref{eq:morozov} become \begin{eqnarray} \label{eq:tikhonovF} &\min_{L\in\mathbb{R}^{n\times k},\ R\in\mathbb{R}^{m\times k}} \frac12 \|L\|_F^2 + \frac12 \|R\|_F^2 + \frac{1}{\sigma}\|\mathcal{A}(LR^T) - b\|_2\\ \label{eq:ivanovF} &\min_{L\in\mathbb{R}^{n\times k},\ R\in\mathbb{R}^{m\times k}}\quad \|\mathcal{A}(LR^T) - b \|^2 \quad \mbox{s.t.} \quad \|L\|_F^2 + \|R\|_F^2 \leq 2\tau \\ \label{eq:morozovF} &\boxed{\min_{L\in\mathbb{R}^{n\times k},\ R\in\mathbb{R}^{m\times k}} \frac12 \|L\|_F^2 + \frac12 \|R\|_F^2 \quad \mbox{s.t.}\quad \|\mathcal{A}(LR^T) - b \|_2 \leq \sigma}, \end{eqnarray} where $k \ll \min(n, m)$, and the memory requirements are reduced from $mn$ to $k(n+m)$. No SVDs are required; formulation~\eqref{eq:tikhonovF} is smooth, formulation~\eqref{eq:ivanovF} requires simple projections onto the Frobenius-norm ball, and formulation~\eqref{eq:morozovF} can be solved using~\eqref{eq:ivanovF} via root-finding as described by~\cite{aravkin2014fast}. Our goal here is to solve the factorized Morozov formulation corresponding to~\eqref{eq:MorozovS}: \begin{equation} \label{eq:MorozovSF} \min_{L, R}\frac12 \|L\|_F^2 + \frac12 \|R\|_F^2 + \frac{1}{2\gamma}\|\mathcal{L}(LR^T)\|_2^2\quad \mbox{s.t.}\quad\ \| \mathcal{A}(LR^T) - b\|_2\leq \sigma. \end{equation} In particular, this formulation incorporates both local and global structure, and gives a misfit target $\sigma$. It requires a new algorithm, since~\eqref{eq:MorozovSF} cannot be solved by the level-set approach of~\cite{aravkin2014fast}. The only available alternative is to use Tichonoff-type formulations (see Section~\ref{sec:alt}). Our main technical contribution is a nonconvex splitting algorithm for problem~\eqref{eq:MorozovSF}, developed in the next section. \section{Relaxed Joint Inversion} \label{sec:Relax} The main challenge of the factorized Morozov formulation~\eqref{eq:MorozovSF} is the data-misfit constraint. To solve the problem, we propose a {\it relaxation} following the ideas of~\cite{zheng2018fast}. In particular, we introduce an auxiliary variable $W \approx LR^T$: \begin{equation} \label{eq:MorozovSFR} \min_{L, R, W}\frac12 \|L\|_F^2 + \frac12 \|R\|_F^2+ \frac{1}{2\gamma}\|\mathcal{L}(W)\|_2^2 + \frac{1}{2\eta} \|W - LR^T\|_F^2 \quad \mbox{s.t.}\quad\ \|\mathcal{A}(W) - b\|_2\leq \sigma. \end{equation} Problem~\eqref{eq:MorozovSFR} is a relaxation for problem~\eqref{eq:MorozovSF}, since $W$ approximates $X = LR^T$; in particular $\|W-LR^T\| = \mathcal{O}(\eta)$. The salient modeling features of~\eqref{eq:MorozovSF} are still preserved. We can now design a simple block-coordinate descent algorithm by iteratively optimizing in each of $(L,R,W)$, detailed in Algorithm~\ref{alg:block-descent-smooth}. \begin{algorithm}[H] \caption{Block-Coordinate Descent for~\eqref{eq:MorozovSFR}.} \label{alg:block-descent-smooth} \begin{algorithmic}[1] \State{\bfseries Input:} $W_0, L_0, R_0$ \State{Initialize: $k=0$.} \While{not converged} \Let{$L_{k+1}$}{$\left(I +\eta R_k^TR_k\right)^{-1}(\eta W_kR_k)$} {\Comment{ {\scriptsize Solves $\frac12 \|L\|_F^2 + \frac{1}{2\eta} \|W_k - LR_k^T\|_F^2 $}}} \Let{$R_{k+1}$}{$(\eta W_k^T L_{k+1})\left(I + \eta L_{k+1}^TL_{k+1}\right)^{-1}$} \Comment{{\scriptsize Solves $ \frac12 \|R\|_F^2 + \frac{1}{2\eta} \|W_k - L_{k+1}R^T\|_F^2$}}\vspace{.1in} \Let{$W_{k+1}$}{$\arg\min_{W}\frac{1}{2\gamma}\|\mathcal{L}(W)\|_2^2 + \frac{1}{2\eta} \|W - L_{k+1}R_{k+1}^T\|_F^2 \quad \mbox{s.t.}\quad \|\mathcal{A}(W) - b\|_2\leq \sigma $} \Let{$k$}{$k+1$} \EndWhile \State{\bfseries Output:} $W_k, L_k, R_k$ \end{algorithmic} \end{algorithm} Steps $4$ and $5$ of Algorithm~\ref{alg:block-descent-smooth} are simple least squares updates; each minimizes~\eqref{eq:MorozovSFR} in $L$ and $R$ respectively, with the remaining variables held fixed. Algorithm~\ref{alg:block-descent-smooth} converges to a stationary point of~\eqref{eq:MorozovSFR} by~\cite[Theorem 4.1]{tseng2001convergence}. In particular, $f(L,R,W)$ has a unique minimum in each coordinate block with the remaining blocks held fixed, which satisfies condition (c) of the theorem. The uniqueness of the minima are clear from the closed form solutions in steps 4 and 5, and from the strong convexity of the $W$ subproblem in step 6. Step $6$ is solved using an efficient root-finding method described below. The equivalent penalized problem with penalty parameter $\lambda$ is given by \begin{equation} \label{eq:wlam} w(\lambda) := \arg\min_{w} \frac{1}{2\gamma}\|Lw\|_2^2 + \frac{1}{2\eta} \|w - d_{k+1}\|_F^2 + \frac{\lambda}{2} \|Aw - b\|^2, \end{equation} where $w = \mbox{vec}(W)$, $L$ is a sparse matrix that encodes the action of the Laplacian on $w$, $A$ is a sparse mask that pulls out the entries of $w$ to compare with $b$, and $d_{k+1} = \mbox{vec}(L_{k+1}R_{k+1}^T)$. The root finding method obtains the smallest value of $\lambda$ satisfying $\|\mathcal{A} w(\lambda) - b\|_2\leq \sigma$. Taking the gradient of the objective defining $w(\lambda)$ in~\eqref{eq:wlam} and setting it equal to $0$, we find an explicit formula \begin{equation} \label{eq:tr} w(\lambda) = \left(\frac{1}{\gamma} (L^TL) + \frac{1}{\eta} I + \lambda A^TA\right)^{-1}\left( \frac{1}{\eta}d_{k+1} + \lambda A^Tb\right). \end{equation} We need only find the smallest $\lambda \geq 0$ so that $\|Aw(\lambda)-b\|_2 = \sigma$. The special case $\lambda = 0$ occurs when the constraint is satisfied at the least squares solution $w(0)$ in~\eqref{eq:tr}: \[ \left\|A \left(\frac{1}{\gamma} (L^TL) + \frac{1}{\eta} I \right)^{-1}\left( \frac{1}{\eta}d_{k+1} \right)-b\right\| \leq \sigma, \] In all other cases, we have \[ f(\lambda) := \sigma - \|Aw(\lambda)-b\|_2, \quad f'(\lambda) = -\frac{\langle A^TAw(\lambda)-b, \nabla_\lambda w(\lambda) \rangle.}{\|Aw(\lambda)-b\|_2} \] We compute the quantity $\nabla_\lambda w(\lambda)$ required to evaluate $f'(\lambda)$ using the complex step method~\cite{martins2001connection}, instead of differentiating~\eqref{eq:tr} directly. The root-finding update is given by \[ \lambda^+ := \lambda - \frac{f(\lambda)}{f'(\lambda).} \] The expensive step~\eqref{eq:tr} is implemented using Cholesky factors of the sparse matrix $\left(\frac{1}{\gamma} (L^TL) + \frac{1}{\eta} I + \lambda A^TA\right)$. This system only changes when $\eta$ is updated. \subsection{Alternative Approaches for Low-Rank \& Smooth Inversion} \label{sec:alt} There are alternative ways to model problem~\eqref{eq:MorozovSFR}. We consider two formulations and algorithms to compare with Algorithm~\eqref{alg:block-descent-smooth}. \paragraph {Nuclear-norm formulation using FISTA. } A simple convex formulation that uses smoothness, data misfit, and a rank proxy (nuclear norm) is given by \begin{equation} \min_X \frac{\lambda}{2}\|\mathcal{A}(X) - b\|^2 + \frac{1}{2\gamma}\|\mathcal{L}(X)\|^2 + \|X\|_* \label{eq:fista} \end{equation} Formulation~\eqref{eq:fista} is the sum of a smooth and a simple function, and can be solved using projected gradient or Fast Iterative Shrinkage-Thresholding Algorithm (FISTA)~\cite{beck2009FISTA}, detailed in Algorithm~\ref{alg:fista}. This class of algorithms can be viewed as an extension of the classical gradient algorithm and is attractive due to its simplicity. The step size $\alpha$ is the reciprocal of the largest singular value of $(\lambda\mathcal{A}^*\mathcal{A} + \gamma^{-1} \mathcal{L}^T\mathcal{L})$, and the operator $S_{\alpha}$ is the soft-thresholding operator: \[ S_{\alpha}(\Sigma)_{ii} = \max(0, \Sigma_{ii} - \alpha). \] \begin{algorithm}[H] \caption{FISTA for~\eqref{eq:fista}.} \label{alg:fista} \begin{algorithmic}[1] \State{\bfseries Input:} $X^0 = X^{-1} \in \mathbb{R}^{m\times n}, \ t^0 = t^{-1} = 1$ \State{Initialize: $k=0$} \While{not converged} \Let{$Y_{k}$}{$ X_k + \frac{t_{k-1}-1}{t_k}(X_k - X_{k-1})$} \Let{$G_k$}{$Y_k - \alpha\left((\lambda \mathcal{A}^*\mathcal{A} + \gamma^{-1} \mathcal{L}^T\mathcal{L}){\mathrm{vec}}(Y_k) - \lambda \mathcal{A}^*b\right)$} \Let{$U, \Sigma, V^T$}{$\texttt{svd}(G_k)$} \Let{$X_{k+1}$}{$US_{\alpha}(\Sigma)V^T$} \Let{$t_{k+1}$}{$\frac{1+\sqrt{1+4(t^{k})^2}}{2}$} \Let{$k$}{$k+1$} \EndWhile \State{\bfseries Output:} $X_k$ \end{algorithmic} \end{algorithm} Algorithm~\ref{alg:fista} uses gradients of the smooth terms, which requires appying $\mathcal{A}$, $\mathcal{L}$ and their adjoints, and the prox operator of $\|\cdot\|_*$, which requires thresholding on singular values computed via SVD (steps 6,7). These steps become prohibitively expensive as the dimensions of $X$ grow. \paragraph{Smooth Factorized Formulation with L-BFGS.} To avoid the SVD steps of Algorithm~\ref{alg:fista}, we use the factorization strategy described in Section~\ref{sec:factform}: \begin{equation} \label{eq:lbfgs} \min_{L,R} \frac{\lambda}{2}\|\mathcal{A}(LR^T) - b\|^2 + \frac{1}{2\gamma}\|\mathcal{L}(LR^T)\|^2 + \frac{1}{2}\|L\|_F^2 + \frac{1}{2}\|R\|_F^2. \end{equation} Formulation~\eqref{eq:lbfgs} is smooth with respect to the decision variables $L$ and $R$, and at larger scales, the limited memory BFGS (L-BFGS)~\cite{NocedalWright.optim.2000} algorithm is a reasonable choice. In the next section, we describe the travel-time interpolation problem for regional seismology, evaluate low rank and smooth regularization, and compare the performance of Algorithm~\ref{alg:block-descent-smooth} for~\eqref{eq:MorozovSFR} to those of FISTA (Algorithm~\ref{alg:fista}) on~\eqref{eq:fista} and L-BFGS on~\eqref{eq:lbfgs}, in terms of computational efficiency and quality of reconstruction. \section{Interpolation of synthetic travel time iMUSH data} \label{sec:data} \subsection{iMUSH Project and Data } Mount St. Helens is the most active volcano in the Cascades arc. The Imaging Magma Under St. Helens (iMUSH) project was designed to illuminate the magmatic system beneath the volcano using a variety of geophysical and petrological methods, including active source, local earthquake, and ambient noise seismic tomography. For the passive source seismic portion of the iMUSH project, 70 broadband seismometers were deployed from 2014 to 2016 within a 100km diameter circle around the mountain; these have an average station spacing of 10km, and are supplemented by permanent stations maintained by the Pacific Northwest Seismic Network (PNSN) and a temporary array of 20 broadband seismometers deployed by AltaRock Energy in June to November of 2016 During 2014-2016, over 400 earthquakes of magnitude 0.5 or greater occurred within 100km of Mount St. Helens. In addition, 23 borehole shots were set off during the summer of 2014 as part of the active source portion of iMUSH \cite{kiser2016vpvs}. These sources generated $P$- and $S$-waves which were recorded at the temporary and permanent networks by analysts, yielding over 12000 $P$-wave and 6000 $S$-wave arrival times. The arrival times were inverted to obtain 3D seismic velocity models and relocated hypocenters \cite{2017AGUFMcarl} using the program struct3DP (written by Robert Crosson and based on previous codes used by Symons and Crosson, 1997). The 3D $P$- and $S$-wave velocity models provide much greater detail than 1D velocity models used by the PNSN to locate earthquakes, or previous tomographic experiments in the area that focused on a smaller \cite{crosson1989helens,WAITE2009113} or broader scale \cite{moran1999rainier}. The inversion system used by struct3DP is very large, with millions of parameters, and extremely scarce across the domain. It is regularized using an anisotropic 3D Laplacian operator which acts to smooth the velocity model in each spatial dimension, while allowing more variation in the vertical dimension. This tomographic inversion method depends on the overall quality of the data as well as the source-receiver raypath coverage. Data quality can vary depending on factors such as local noise sources (i.e. roads, rivers, animals, wind etc.), subsurface and near-surface path effects, distance from the hypocenter, attenuation, and source size. In the iMUSH local earthquake tomography, each travel time was assigned an uncertainty by an analyst based on characteristics of the seismic waveform. The raypath coverage depends on the location of both sources and seismometers, whose distribution is affected by road access in a rugged volcanic landscape, land ownership, winter snow depth, and station outages. Our goal here is to {\it increase} the raypath coverage for use in earthquake tomography by simulating seismometer locations and observations by interpolating noisy data. This is particularly useful for areas within the study region that did not have seismometers installed or which had seismometers out of service for extended periods of time. This experiment interpolates {\it synthetic} travel time residuals, which are calculated with respect to travel times predicted by a 1D velocity model. Travel times vary on the order of tens of seconds, while travel time residuals are generally between -1 and 1 seconds. We obtain synthetic travel times by using the forward modeling portion of the struct3DP code, which uses a finite difference 3D eikonal equation solver \cite{vidale19903dfd,hole19953dfdreflection}. These travel times are calculated for the best-fit 3D model from the iMUSH local earthquake tomography and compared to travel times through the PNSN S4 \cite{pavlis1983vstruct} 1D velocity model to obtain the synthetic residual. Similarly, for observed travel times, we subtract the travel time predicted through the 1D model from the observed travel time to obtain the observed residual. Here, we define the experimental data. While raw iMUSH/PNSN data exists at station locations around the mountain (see blue dots in Figure \ref{fig:stations}), these iMUSH/PNSN stations are not gridded. Approximations or projections of this raw data onto the grid have yielded poor results for all of the aforementioned algorithms. To circumvent this issue for the time being, we instead conduct a forward problem with the 3D eikonal equation solver and use the best-fit 3D model to generate synthetic results for uniformly gridded stations in a square of 70km to 165km (with origin being at latitute 45.2, longitude -123.7). For the rest of this paper, we refer to the travel-time residuals between these synthetic travel times and those predicted by the 1D PNSN S4 model as the \textit{true} data, or $X_{true}$. To generate observations for the interpolation schemes, we subsample this data down to 15\% of total grid coverage over all sources by picking synthetic gridded stations near raw iMUSH/PNSN stations. This is a subset of synthetic stations meant to represent the distribution of the real-world stations that recorded the event. This subsampled data is then corrupted with noise. For each station, we generate a standard deviation parameter from the uniform distribution (0.03-0.15)(s); this captures each synthetic station's inherent uncertainty. The deviation range is based on raw iMUSH uncertainties recorded over the two year period. Then, for each station's data, we add zero mean random gaussian noise generated using that station's deviation parameter to create the \textit{observed} data, or $X_{obs}$. \subsection{Description of source tensor construction} In order to apply the methods of Section~\ref{sec:Relax}, we have to specify a matricization of the data. The matricization we use is derived from the receiver grid, which is represented as a 95km-wide mesh with 5 kilometer spacing centered near Mount St. Helens. Again, the station grid is centered near the mountain and roughly coincides with the 70 stations deployed for 2 years. Each entry in the matrix represents a point on this uniform receiver grid. Missing entries are designated by zeros, while observed entries are represented with the travel time residuals relative to the 1D model. Our experiments in this paper focus mainly on synthetic residuals of the nonlinear 3D modeled data relative to the 1D model, which provide a `ground truth' dataset we use to evaluate and compare interpolation techniques. \begin{figure} \centering \subfigure[Spatial locations of the sources (`*') around Mount St. Helens ($\Delta$). The box represents the edges of the uniform $20\times 20$ station grid. The grid panel (c) is taken from the source marked with a red `*'.]{\label{fig:sourceloc}\includegraphics[width=65mm]{./figs/sources64.jpg}}\qquad \subfigure[Receiver grid for a single source with the most datapoints. Black `*' represent synthetic stations on a grid, while blue `.' represent iMUSH/PNSN stations off-grid. ]{\label{fig:stations}\includegraphics[width=65mm]{./figs/stations64.jpg}} \subfigure[\textit{True} residual data for the receiver grid in panel (b). ]{\label{fig:rec_samp}\includegraphics[width=65mm]{./figs/res_model_single1.jpg}} \caption{Data information for synthetic test.} \label{fig:grid_info} \end{figure} Each source represents a wave moving through the same media. The underlying physical model suggests enforcing smoothness between station gridpoints. We further improve interpolation with low-rank methods by finding a tessellation of source-receiver grid matrices in which full data exhibits fast decay of singular values, while subsampled data does not. Intuitively, such a tessellation reflects the redundancy of features across sources. Our combined goal is to interpolate $X$ from a subset of observations by penalizing rank across sources, and nonsmooth local features. Each source $i$ at $(S_{x_i}S_{y_i})$ has an associated receiver grid of observations $(R_x, R_y)\in (70, 165\text{km})\times (70, 165\text{km})$; each axis lies between 70km and 165km with 5km spacing. The observation grid was chosen to lie close to the mountain and to contain a relatively large number of sensors (see Figure \ref{fig:stations}). Initially, we observed 64 sources, where each source recorded at most 80 receivers (out of the potential 400). Source locations for the 64 sources are shown in Figure \ref{fig:sourceloc}, and a sample receiver grid for a particular source is given in Figure \ref{fig:stations} and Figure \ref{fig:rec_samp} is the \textit{true} data for that grid. The observed residual data is recorded in 3D tensor format with dimension $(n_{R_x}, n_{R_y}, n_s)$, where $n_{R_x}=20, n_{R_y} = 20, n_s = 64$ for the experiments. Since observed residual data is a tensor, we have to choose a matricization (unfolding of the 3D tensor into a matrix) to exploit the induced low-rank structure. \begin{figure} \centering \subfigure[Subsampled matricization $(R_x,R_y)\times(S_xS_y)$; the missing data (zeros) go across the rows.]{\label{fig:model_subsamp_form1}\includegraphics[width=65mm]{./figs/model_sub_rxrysxsy.jpg}}\qquad \subfigure[Subsampled matricization $(R_x, S_x)\times(R_y, S_y)$; missing entries (zeros) are are interwoven throughout the matrix.]{\label{fig:model_subsamp_form2}\includegraphics[width=65mm]{./figs/model_sub_rxsxrysy.jpg}} \caption{Different tensor formulations for low-rank interpolation.} \label{fig:tensor_info} \end{figure} We consider two such matricizations: 1) $(R_x,R_y)\times(S_xS_y)$, where we group receivers along columns and sources along rows, and 2) $(R_x,S_x)\times(R_y,S_y)$, where each receiver grid is block-inserted into the underlying matrix. On a 20x20 receiver grid with 64 sources, the first matricization $X\in\mathbb{R}^{400\times 64}$, depicted in Figure \ref{fig:model_subsamp_form1}, is obtained by letting $\Omega \in\mathbb{R}^{R_x,R_y} = \mathbb{R}^{400\times 1}$ be the vectorized receiver grid for single source $S_{x_i}S_{y_i}$ with $i = 1,\ldots, n_s$. The second matricization $X\in\mathbb{R}^{160\times160}$, depicted in Figure \ref{fig:model_subsamp_form2}, is obtained by letting $\Omega\in\mathbb{R}^{R_x\times R_y} = \mathbb{R}^{20\times 20}$ be the nested receiver grid for single source $S_{x_i}S_{y_i}$. The subsampling scheme is crucial for the approach. The ideal situation is for the subsampled data to have high rank (slow decay of singular values), while the full data has low rank (fast decay of singular values). Then, it is feasible to recover the full volume by penalizing rank while matching observed data. The first matricization does not satisfy this simple requirement: the subsampled matrix is itself low-rank and has rows and columns made up of zeros. Therefore we use the second matricization with tessellated sources, which indeed satisfies the requirement, see Figure \ref{fig:sval_decay}. In both matricizations, the sources are organized from high-energy to low-energy. In formulation 1, the sources are arranged such that the source with the greatest absolute residual values is in the first column and the least absolute residuals is in the last. \begin{figure}[H] \begin{center} \includegraphics[width=0.7\textwidth]{./figs/prelim_figs/model_sval_decay.jpg} \caption{Singular value decay for matricization formulations 1 and 2 of the interpolation tensor. } \end{center} \label{fig:sval_decay} \end{figure} In formulation 2, the source with the greatest energy is in the top left, and the least in the bottom right; the energy then decays by source column (ie the next highest energy is the source immediately below in the row of sources). This produces an even slower decrease in singular values when receiver grid points are omitted. \section{Application to Synthetic Data} \label{sec:results} First, we evaluate the accuracy of using both smoothness and low-rank, compared to using either property alone. Then, we compare the speed and robustness of the new algorithm with competitors: FISTA (Algorithm \ref{alg:fista}, Equation \ref{eq:fista}) and L-BFGS (Equation \ref{eq:lbfgs}). All tests use a tensored grid with the number of sources $n_s = 64$, and grid sizes $n_{R_x}, n_{R_y}=20$ for $R_x, R_y \in (70, 165)$ evenly spaced at 5km. The subsampling rate for every test is approximatestely $15$\%. We set the value $k$ (for the $LR^T$ formulation) to be 40 for all algorithms. For all plots, north is up. First, we compare the `low-rank only' formulation~\eqref{eq:MorozovS} with the `smoothing only' formulation \begin{align*} \min_W \|\mathcal{L}(W)\|_2^2 \quad \mbox{s.t.}\quad \|\mathcal{A}(W) - b\|_2\leq \sigma. \end{align*} For this test, we use the inequality constraint $\|\mathcal{A}(W) - b\|_2\leq \sigma$; the equality constraint ($\mathcal{A}(W) = b$) is infeasible. This requires a root-finding algorithm nearly identical to the $W$-update of Algorithm~\ref{alg:block-descent-smooth} in Section~\ref{sec:Relax}. For the low-rank formulation, we use the matricization in Figure \ref{fig:model_subsamp_form2}. The convergence criteria ($l_2$-norm of minimized variable(s) iterate difference) for all algorithms is $10^{-10}$. All model hyper-parameters are shown in Table \ref{tab:params}. \begin{table}[H] \caption{\label{tab:params}Model hyper-parameters. We set $\gamma = 6.45\times10^{-7}$ for all algorithms except low-rank and smoothing only (where it is not used). The smoothing only formulation requires a root-finding problem for the inequality constraint, and has no Max Iteration value corresponding to block-coordinate-descent portion. For FISTA, the step-size $\alpha = \|\mathcal{L}\|_2^{-2}$, the reciprocal of the largest singular value of $\mathcal{L}$. In the joint formulation, we update $\eta$ every 30 iterations; in the low-rank only, we update every 100 iterations.} \begin{indented} \item[]\begin{tabular}{|l|l|l|l|l|l|l|l|l|l|l|l|l} \hline Alg & $\lambda$ & $\eta$ & $\eta_f$ & Max Iterations &$\sigma$ \\ \hline Combined - VR Exact& 0.0111 & 0.5 &4.17 & 90 & 0 \\ Combined - VR Noise& 0.0111 & 0.5 &4.17 & 90 & 3.719\\ FISTA & $2.2222\times 10^{-4}$ & --- & --- & 1500 & ---\\ L-BFGS & $1.1111\times 10^{-4}$ & --- &--- & 1500 & ---\\ Smooth only& --- & --- &--- & --- & 3.719 \\ Low-rank only & --- &1.0 & 4.17 & 500 & 3.719\\ \hline \end{tabular} \end{indented} \end{table} For the proposed relaxation algorithm, $\eta$ is updated by $\eta_+ = \eta_f\eta$ for $\eta_f = \frac{\sum_{i}\hat\sigma_i}{k}$ at every 30th iteration. Here, $\hat\sigma_i$ are the singular values of the pre-interpolated matrix. For low-rank only (with the $l_2$-norm), we update $\eta$ ever 100 iterations. Increasing $\eta$ can accelerate the algorithm~\cite{zheng2018fast}. The interpolated results for these two schemes and the \textit{true} data are shown in Figure \ref{fig:lrsm_all} with root-mean-squared (RMS) errors for both observed and interpolated data listed in Table \ref{tab:results}. The RMS error is calculated with respect to \textit{true} data, and is split into two categories: RMS for \textit{true} data at locations that were observed (designated $\mathcal{A}(X_{true})$ or obs), and RMS for \textit{true} data for locations that were not observed (given by the complement $\mathcal{A}^\mathsf{c}(X_{true})$ or int). Recall that in this context, \textit{true} data refers to the residuals of the 3D model compared to the PNSN S4 1D velocity model uncorrupted by noise. The RMS is not weighted by uncertainties. While the low-rank only interpolation can accurately capture the observed data, it fails to reproduce the missing data. In Figure \ref{fig:lr_int}, the low-rank interpolation produces mono-color bands across the tensor: when entries for a receiver coordinate are missing in every source, the low-rank mechanism places zeros in the entire row or column. Likewise, if there is a single observed receiver in an entire row or column of the matrix, that value is propagated through every other entry in that row or column. The sparsity of the data impairs low-rank only interpolation, which gives good results at sampling ratio of 70\% and above (these results not shown), but is less effective in our context. Smoothing alone, shown in Figure \ref{fig:sm_int} can capture major model dynamics, yet overestimates observed data worse than other methods and does not overall match data as well as other methods (see Table \ref{tab:results}). While the scale on Figure \ref{fig:sm_int} breaches is capped at 1.2, smoothing only actually has values larger than 1.5 in the bright yellow section, and the observed differences are also larger (Figure \ref{fig:sm_diff_all}). It also makes sense that smoothing alone would out-perform low-rank alone, since the underlying model used to generate data is inherently smooth. Some of the overall residual patterns are matched (larger residual energies are correctly placed around larger observed residuals), but the magnitude of the residuals is incorrect across all sources. A blown-up version of Figure \ref{fig:lrsm_all} for the source with the highest number of observed data ponts is shown in Figure \ref{fig:lrsm_single}. Both low-rank only and smoothing only formulations are inadequate for our application, especially with sparse data. \\ \begin{figure}[H] \centering \subfigure[Low-rank.]{\label{fig:lr_int}\includegraphics[width=60mm]{./figs/interpolated_lr_all.jpg}} \subfigure[Smoothing. ]{\label{fig:sm_int}\includegraphics[width=60mm]{./figs/interpolated_sm_all.jpg}} \subfigure[Observed model residuals, $X_{obs}$. ]{\label{fig:obs_all}\includegraphics[width=60mm]{./figs/obs_res_all.jpg}} \subfigure[\textit{True} model residuals, $X_{true}$. ]{\label{fig:model_true}\includegraphics[width=60mm]{./figs/res_model_all.jpg}} \caption{Full tensor results for Low-rank and smoothing only.} \label{fig:lrsm_all} \end{figure} \begin{figure}[H] \centering \subfigure[Low-rank.]{\label{fig:lr_int_single}\includegraphics[width=60mm]{./figs/interpolated_lr_single1.jpg}} \subfigure[Smoothing only. ]{\label{fig:sm_int_single}\includegraphics[width=60mm]{./figs/interpolated_sm_single1.jpg}} \subfigure[Observed model residuals. ]{\label{fig:obs_single}\includegraphics[width=60mm]{./figs/obs_single.jpg}} \subfigure[\textit{True} model residuals. ]{\label{fig:model_true_single}\includegraphics[width=60mm]{./figs/res_model_single1.jpg}} \caption{Results for a single source with Low-rank and smoothing only.} \label{fig:lrsm_single} \end{figure} In contrast, we show in Figure ~\ref{fig:algcomp_all} that using both types local and global information can meaningfully interpolate the data. This can be done with the new joint formulation as well as unconstrained formulations that use FISTA and L-BFGS algorithms; so we also test the efficacy of the new approach against these two competitors. We consider two different choices of our variable relaxation algorithm: $\sigma = 0$ and $\sigma>0$. In the latter case, we assume that we do not know the true data misfit, and use available uncertainties to set $\sigma = \sqrt{\sum_{i = 1}^n0.06^2}\approx 3.72 (s)$ for $n$ being the size of $b$. The true data misfit is actually $\|b -\mathcal{A}(X_{true})\|_2 = \sigma_{true} = 5.85(s)$ where $\mathcal{A}(X_{obs})=b$ is our {observed} data. The results for tensored and single-source matrix-completion are shown in Figures \ref{fig:algcomp_all} and \ref{fig:algcomp_single}, and in Table~\ref{tab:results}. The new approach (in bold) achieves better results than competing methods in similar amounts of compute time. Setting $\sigma>0$ in the variable relaxation scheme produces smaller RMS values, and in particular recovers missing data with higher accuracy. \begin{table}[H] \caption{\label{tab:results}Different formulations for model residuals with sampling rate of 15\%. Terminal feasibility is $\|\mathcal{A}(X) - b\|_2 -\sigma$ at the algorithm's termination (which would mean $l_2$-norm data misfit where $\sigma=0$). Note that the feasibility is calculated against observed data while RMS is calculated against \textit{true} data. Recall that (obs) signifies $\mathcal{A}(X_{true})$, while (int) stands for $\mathcal{A}^\mathsf{c}(X_{true})$.} \begin{indented} \item[]\begin{tabular}{|l|l|l|l|l|l|l|l|l|l|l|l|l} \hline Alg & Terminal Feasibility &Time (s) & RMS (obs) & RMS (int) \\ \hline \textbf{Combined - VR Exact}& \textbf{0.0031} & \textbf{10.81} & \textbf{0.09 }& \textbf{0.110} \\ \textbf{Combined - VR Noise}& \textbf{1.18e-08}& \textbf{19.84}& \textbf{0.06 }& \textbf{0.100} \\ FISTA & 0.081 & 12.30 & 0.09 & 0.119\\ L-BFGS &0.074 & 57.22 &0.09 & 0.128\\ Smooth only& 0.0016 & 5.42 & 0.06 & 0.125 \\ Low-rank only& 0.058 & 1.27 & 0.08 & 0.216\\ \hline \end{tabular} \end{indented} \end{table} Table~\ref{tab:results} also shows the degree to which algorithms match the feasibility constraint. FISTA and L-BFGS use penalties rather than constraints, so the precise data-misfit level is hard to control. The terminal feasibility is 0.08(s) for FISTA and 0.075(s) for L-BFGS, which means for each individual point, the values are close to fitting the observed entries. FISTA's feasibility level settles at approximately 0.08(s) and does not change after about 1000 iterations; similar behavior is seen in L-BFGS. Variable relaxation schemes can match the feasibility constraint to a high accuracy, with the explicit inequality constraint matching close to numerical precision. With both smoothness and low-rank regularization, fitting observed data inexactly yields a better interpolation for missing data. Figure \ref{fig:algcomp_all} shows that variable relaxation inexact data fit (subfigure \ref{fig:vr_int}) has fewer contrasts overall when compared to the fits obtained using exact fit and competing algorithms. Focusing on a single source in Figure \ref{fig:algcomp_single}, we can see that the inequality constraint produces a smoother image for each particular source. While each algorithm effectively captures high energy area in the northwest corner of the plot, most algorithms overestimate the amount of energy that is actually present; variable relaxation with $\sigma>0$ gets the closest values. All algorithms tend to smooth out the observed entries, and tend to be less accurate the fewer entries there are in a designated space, notably around the corners of the receiver grid. Generally speaking, the combination of smoothness and low-rank works much better for interpolating the interior station grid rather than extrapolation near the edges. Figures \ref{fig:algcomp_diff_all} (full tensor) and \ref{fig:algcomp_diff_single} (single source) depict the absolute values of the results for each algorithm and the true value. Figure \ref{fig:algcomp_diff_all} shows that some sources are estimated very poorly, with the main error contributions coming further away from the mountain. Zooming in to a particular source, Figure \ref{fig:algcomp_diff_single} shows how much each algorithm overestimates the high-energy in the northwest corner of the map, primarily because the observed data in that corner is also very large. Certain artifacts of the interpolation schemes are seen more vividly in the difference plots. For instance, slightly northeast of the center, there is a higher energy region where very few data points are collected. This is very pronounced in the L-BFGS case (Figure \ref{fig:lbfgs_diff_single}) but less pronounced in the variable relaxation case (Figure \ref{fig:vr_diff_single}). Overall, the amount of error present in the $\sigma>0$ variable relaxation case is lower than all the other schemes. \\ \begin{figure}[H] \centering \subfigure[Variable relaxation ($\sigma>0$).]{\label{fig:vr_int}\includegraphics[width=60mm]{./figs/interpolated_vr_all.jpg}}\qquad \subfigure[Variable relaxation ($\sigma=0$). ]{\label{fig:vrs0_int}\includegraphics[width=60mm]{./figs/interpolated_vrs0_all.jpg}} \subfigure[FISTA. ]{\label{fig:fista_int}\includegraphics[width=60mm]{./figs/interpolated_fista_all.jpg}}\qquad \subfigure[L-BFGS. ]{\label{fig:lbfgs_int}\includegraphics[width=60mm]{./figs/interpolated_lbfgs_all.jpg}} \subfigure[\textit{True} model residuals, $X_{true}$. ]{\label{fig:model_true_alg}\includegraphics[width=60mm]{./figs/res_model_all.jpg}} \caption{Full tensor results for different algorithms and formulations.} \label{fig:algcomp_all} \end{figure} \begin{figure}[H] \centering \subfigure[Variable relaxation ($\sigma>0$).]{\label{fig:vr_int_single}\includegraphics[width=60mm]{./figs/interpolated_vr_single1.jpg}} \subfigure[Variable relaxation ($\sigma=0$). ]{\label{fig:vrs0_int_single}\includegraphics[width=60mm]{./figs/interpolated_vrs0_single1.jpg}} \subfigure[FISTA. ]{\label{fig:fista_int_single}\includegraphics[width=60mm]{./figs/interpolated_fista_single1.jpg}} \subfigure[L-BFGS. ]{\label{fig:lbfgs_int_single}\includegraphics[width=60mm]{./figs/interpolated_lbfgs_single1.jpg}} \subfigure[Observed model residuals. ]{\label{fig:obs_single2}\includegraphics[width=60mm]{./figs/obs_single.jpg}} \subfigure[\textit{True} model residuals. ]{\label{fig:model_true_alg_single2}\includegraphics[width=60mm]{./figs/res_model_single1.jpg}} \caption{Single source results for the different algorithms.} \label{fig:algcomp_single} \end{figure} \begin{figure}[H] \centering \subfigure[Variable relaxation ($\sigma>0$).]{\label{fig:vr_diff_all}\includegraphics[width=60mm]{./figs/difference_vr_all.jpg}} \subfigure[Variable relaxation ($\sigma=0$). ]{\label{fig:vrs0_diff_all}\includegraphics[width=60mm]{./figs/difference_vrs0_all.jpg}} \subfigure[FISTA. ]{\label{fig:fista_diff_all}\includegraphics[width=60mm]{./figs/difference_fista_all.jpg}} \subfigure[L-BFGS. ]{\label{fig:lbfgs_diff_all}\includegraphics[width=60mm]{./figs/difference_lbfgs_all.jpg}} \subfigure[Low-Rank only.]{\label{fig:lr_diff_all}\includegraphics[width=60mm]{./figs/difference_lr_all.jpg}} \subfigure[Smoothing only. ]{\label{fig:sm_diff_all}\includegraphics[width=60mm]{./figs/difference_sm_all.jpg}} \caption{Full tensor $|X - X_{true}|$ for all algorithms. Note the significant scaling difference in the FISTA result.} \label{fig:algcomp_diff_all} \end{figure} \begin{figure}[H] \centering \subfigure[Variable relaxation ($\sigma>0$).]{\label{fig:vr_diff_single}\includegraphics[width=60mm]{./figs/difference_vr_single1.jpg}} \subfigure[Variable relaxation ($\sigma=0$). ]{\label{fig:vrs0_diff_single}\includegraphics[width=60mm]{./figs/difference_vrs0_single1.jpg}} \subfigure[FISTA. ]{\label{fig:fista_diff_single}\includegraphics[width=60mm]{./figs/difference_fista_single1.jpg}} \subfigure[L-BFGS. ]{\label{fig:lbfgs_diff_single}\includegraphics[width=60mm]{./figs/difference_lbfgs_single1.jpg}} \subfigure[Low-Rank only.]{\label{fig:lr_diff_single}\includegraphics[width=60mm]{./figs/difference_lr_single1.jpg}} \subfigure[Smoothing only. ]{\label{fig:sm_diff_single}\includegraphics[width=60mm]{./figs/difference_sm_single1.jpg}} \caption{$|X - X_{true}|$ for all algorithms in a single source.} \label{fig:algcomp_diff_single} \end{figure} Finally, we turn to singular value decay and convergence history. The singular value decay is shown in Figure \ref{fig:svd_total}, and a log-log convergence plot appears in Figure \ref{fig:obj_total}. With the exception of the smoothing-only implementation, all algorithms match the SVD decay well. In Figure \ref{fig:obj_total}, L-BFGS and FISTA have similar convergence histories while L-BFGS is relatively slow compared to the FISTA (and indeed all other algorithms) in compute time. The proposed approach converges faster than competing methods, and also matches the SVD decay of the ground truth datasets. \begin{figure}[H] \centering \subfigure[Data misfit decay. ]{\label{fig:obj_total}\includegraphics[width=60mm]{./figs/obj_total.jpg}} \subfigure[SVD decay for interpolated matrices.]{\label{fig:svd_total}\includegraphics[width=60mm]{./figs/svd_total.jpg}} \caption{Convergence information for different algorithms.} \label{fig:conv} \end{figure} \section{Conclusions and Future Directions} Travel time tomography suffers from data collection constraints, reducing model resolution. We proposed an interpolation scheme that combines both local smoothness and low-rank information from a carefully chosen tessellation of the data to estimate residual values at prospective stations. To implement the scheme, we developed a new relaxation approach that is flexible enough to allow multiple regularizers, and efficient in practice. We used it to estimate data from missing stations with a relatively high degree of accuracy (measured against a synthetic ground-truth dataset), in the presence of observation noise in available data. The algorithm is more flexible than available alternatives, and in particular can fit available data to a prescribed error level. The new approach is competitive with standard alternatives, and offers new functionality to interpolate with both local and global structure over data fitting constraints. It is important to note that none of the methods do well estimating where there are very few data stations. This can be observed in Figure \ref{fig:algcomp_diff_single}, where the left most row between $R_y=140$ and $R_y = 160$. The proximity of at least one station increases the accuracy of our scheme. Our next steps are to interpolate noisy data on a non-uniform grid and see if we can improve resolution in the seismic velocity inverse problem. In the experiments we presented, we used a synthetic dataset as `ground truth' to evaluate interpolation algorithms. The ultimate goal is to interpolate `missing' stations not present in the dataset, and see whether we can improve resolution of challenging regions within the upper crust near Mount St. Helens. \section{Acknowledgements} R. Baraldi acknowledges support from the Department of Energy Computational Science Graduate Fellowship, which is provided under grant number DE-FG02-97ER25308. C. Ulberg and K. Creager were supported by National Science Foundation grant number EAR-1358512. The work of A. Aravkin was supported by the Washington Research Foundation Data Science Professorship. \section{References} \bibliographystyle{abbrv}
\section{Introduction} The macroscopic properties of a wide variety of biophysical, environmental and engineered systems hinge on the behavior of molecules at solid or liquid interfaces. Characterizing the structure and dynamics of these interfacial species under their native environmental conditions is a formidable experimental challenge. Because the interfaces in such systems are typically buried under some material (\textit{e.g.}\ air, aqueous solutions, or organic tissue) the use of atoms or electrons as probes is usually precluded. In these cases nondestructive, all-optical spectroscopies are natural candidates to gain such insight. However, the lack of interfacial sensitivity of linear approaches often makes it difficult to distinguish the spectral response of molecules at interfaces from the similar spectral response of a much larger numbers of molecules in the adjoining bulk phases. Much work in the last 25 years has demonstrated that the laser-based, nonlinear optical technique, vibrational sum frequency generation (v-SFG) spectroscopy enables probing the spectral response of molecules with interfacial specificity \cite{zhu87,she89,bai95,lam05,zha94,ric02,hun87,sto09,che02,dav10}. To perform a v-SFG measurement infrared, $\text{E}_{\text{IR}}({{\omega }_{\text{IR}}})$, and visible, $\text{E}_{\text{vis}}({{\omega }_{\text{vis}}})$, laser pulses are overlapped spatially and temporally at an interface and the field emitted at the sum of the frequencies of the two incident beams detected $\text{E}_{\text{SFG}}({{\omega}_{\text{SFG}}})$. \begin{equation}\label{e:basic} {{\text{E}}_{\text{SFG}}} \propto {{\chi }^{(2)}}({{\omega}_{\text{SFG}}}={{\omega}_{\text{IR}}}+{{\omega}_{\text{vis}}}):\text{E}_{\text{vis}}\text{E}_{\text{IR}} \end{equation} The spectral phase and amplitude of the generated SFG signal is a function of the phases and amplitudes of the interacting light pulses and the complex second order susceptibility ${{\chi }^{(2)}}$. Latter contains the desired spectroscopic information.\cite{she03} Its imaginary part describes resonances in the sample and carries similar information as a typical absorption spectrum. The interface sensitivity originates meanwhile from the symmetry properties of ${{\chi }^{(2)}}$. The sign of its imaginary part is related to the orientation of the oscillating dipole\cite{she13,she06}. By flipping orientation of the dipole by 180 deg. the SFG signal changes its phase by 180 deg. resulting in a sign flip of the second order susceptibility. This leads to the cancellation of the SFG contributions in presence of centro-symmetry (under electric dipole approximation). Consequently, if v-SFG is applied to a sample consisting of two different centro-symmetric or amorphous media the generated SFG signal purely originates from the interface regions where the symmetry is broken. Applying v-SFG spectroscopy to such samples consequently yields interfacial specificity combined with information on the orientation of the corresponding species. v-SFG spectroscopy at interfaces is usually performed such that there are no sample resonances at either the visible and the SFG frequencies. The second order susceptibility is then typically dominated by vibrational resonances yielding a vibrational fingerprint of the interfacial species. By analyzing its imaginary part deep insight into the molecular structure of an interface can be gained. The characteristic positions of resonance peaks allow in principle for the identification and characterization of interfacial molecular species and their amplitudes are related to the corresponding populations while the sign of the peaks reveals their orientation. For most samples, however, the measured $\chi^{(2)}$ is composed of a linear superposition of, possibly multiple, resonant and nonresonant contributions all of which are complex. Those individual contributions can largely differ in amplitude, phase, and symmetry which can make the resulting spectrum difficult to interpret. For its decomposition it is first essential to measure the complex $\chi^{(2)}$ and not its square modulus ${{\left| {{\chi }^{(2)}} \right|}^{2}}$ as it is the case in most common SFG spectrometers \cite{lam05,tia14,ric98,lag10}. Such homodyned techniques measure the intensity of the generated SFG signal without phase resolution which gives rise to undesired interference cross terms between the different contributions of the second order susceptibility. On the other hand, employing heterodyned techniques where the generated SFG field is interfered with a reference SFG signal (local oscillator) the phase information is preserved and the complex susceptibility can be determined \cite{she13,ji07,che10,nih09}. However, the isolation of the optical response from a specific molecular species can still be very challenging \textit{e.g.}\ if its contribution is not the dominating component in the complex spectrum of $\chi^{(2)}$; in fact it is often the molecular species with low interface populations which are of particular interest (\textit{e.g.}\ protons at interfaces). The signal is then typically buried under much more intense spectral features and appears as a slight modification of the spectral phase and amplitude of the overall susceptibility. It is our aim to develop a phase sensitive SFG-spectrometer that is capable of resolving such small signals to enable the investigation of molecular species which only sparsely populate the interface. A possible way to clearly identify a small spectroscopic signature of a particular molecular species in a vibrational spectrum is by altering its spectral response in one or a set of reference spectra. The reference could be a sample where the species is simply absent (or present with a different concentration) or where its vibrational resonances spectrally are shifted (\textit{e.g.}\ by isotope labeling). Another possibility is the distinction of the different contributions by different symmetry (changing angles and polarizations of the interacting laser pulses). All these techniques have in common that one needs to resolve a small change in spectral phase and amplitude in the measured overall ${{\chi }^{(2)}}$ between two or multiple acquired data sets. The different acquisitions might thereby involve the physical exchange of samples and/or subsequent scans of a sample under modified experimental conditions. The \textit{sensitivity}\ of the spectroscopy to detect the desired species is then given by the accuracy at which phase and amplitude of $\chi^{(2)}$ can be determined in the different acquisitions in combination with the signal to noise ratio achieved in the resulting spectra. Obtaining a high level of accuracy is, however, a tremendous experimental challenge as the relative phases of laser pulses tend to drift and also their intensities and spectra typically show significant changes with time. These temporal changes directly lead to phase and amplitude uncertainties between subsequent measurements and diminish their comparability. An elimination of such drifts by active or passive stabilization of the SFG spectrometer is rather unpractical because it involves extensive technical measures. It should be noted that very small changes of relative beam paths (by a few tens of nanometer) already lead to dramatic phase shifts at visible (SFG) frequencies. Another source of inaccuracy is related to the non-collinear beam geometry that is (for practical reasons) commonly implemented in heterodyned SFG spectrometers. It makes the phase and amplitude of the generated SFG signal sensitive to the sample position. As a consequence it is very challenging to maintain phase and amplitude accuracy upon exchange of samples \cite{nih13}. Furthermore, it makes it extremely difficult to obtain reliable data from liquid samples where the position of the interface may constantly change due to evaporation. Finally, the data recorded in heterodyned SFG spectroscopy typically contain considerable amount of noise. This has mainly two reasons. On the one hand SFG signals generated at interfaces are in general very weak and therefore difficult to detect, on the other hand compared to spectroscopic techniques employing incoherent or continuous wave light sources the SFG signals tend to show relatively large intensity fluctuations. These fluctuations result from the fact that the heterodyned SFG signal is generated by the nonlinear interaction of three ultrashort laser pulses with the sample (infrared pulse, visible upconversion pulse, local oscillator pulse). This process amplifies any types fluctuations of the initial pulses which can hardly be removed. Additional noise can originate from phase jitter in the interference between the local oscillator and the SFG signal. Overall, these technical limitations clearly reduce the ability of common phase sensitive SFG-spectrometers to resolve small spectral features which typically restricts v-SFG studies to the investigation of molecular species that yield large, dominating SFG signals. In this study we describe a newly developed phase sensitive, time domain v-SFG spectrometer that addresses all of the technical challenges mentioned above. By combining a full collinear beam geometry with a method for simultaneous referencing we achieve unpreceded accuracy in phase and amplitude between sample and reference measurements. Moreover, employing the technique of balanced detection in combination with a special data treatment we very efficiently reduce noise. These improvements represent a significant technical advancement which will allow for phase resolved v-SFG studies of $\chi^{(2)}$ components which are too small to be detected via more conventional approaches. \section{(Collinear) Time Domain SFG Spectrometer} To acquire phase resolved v-SFG spectra we chose a rather unconventional heterodyned, full time domain approach because it offers considerable advantages compared to the more commonly used frequency domain techniques as discussed in reference \cite{laa11}. \begin{figure}[htbp] \begin{center} \includegraphics[width=0.3\textwidth]{figures/fig_1} \caption{Schematic representation of time domain heterodyned SFG spectroscopy. The interaction of the infrared (black) and the upconversion pulse (red) with the sample generates an SFG signal (blue) which interferes with the local oscillator (green). Scanning the time delay t$_{\text{IR}}$ modulates the relative phases between the SFG signal and LO which produces the desired interferogram.} \label{f:tds} \end{center} \end{figure} The heterodyned v-SFG signal is generated by the interaction of ultrashort/broadband infrared, upconversion and local oscillator pulses (see Figure \ref{f:tds}). The LO is produced by combining the upconversion pulse with a fraction of the infrared in a nonlinear crystal securing a well-defined phase relationship between all three pulses. A variable time delay $t_{IR}$ is introduced between the infrared and the upconversion pulses while the timing between the upconversion and LO pulses is fixed at nearly zero delay. The interaction of infrared and upconversion pulses with the sample generates a sum frequency signal that subsequently interferes with the LO. By scanning $t_{IR}$ the relative phase between the SFG signal and the LO is modulated at infrared frequencies producing an interferogram. Fourier transformation of the interferogram then yields the IR frequency resolved complex second order spectrum. The generated SFG field $\text{E}_{\text{SFG}}$ can mathematically be expressed as the convolution of the interacting light fields $\text{E}_{\text{vis}}$ and $\text{E}_{\text{IR}}$ with the second order response function $R^{\text{(2)}}$ of the sample (where $t_{1}$ is the time elapsed following the IR interaction, $t_{2}$ the time elapsed following the vis, $t_{\text{IR}}$ the delay between the IR and vis pulses and $t$ is time). \begin{equation}\label{e:sig1} \begin{aligned} \text{E}_{\text{SFG}}(t,t_{\text{IR}}) \propto \int_{0}^{\infty} dt_{2}\int_{0}^{\infty}dt_{1}R^{\text{(2)}}(t_{2},t_{1})\text{E}_{\text{vis}}(t-t_{2}+t_{\text{IR}})\\ \text{E}_{\text{IR}}(t-t_{2}-t_{1}) \end{aligned} \end{equation} Assuming no sample resonances at either, the upconversion- or the SFG frequency, $R^{\text{(2)}}$ can be split into the product of a resonant interaction with the infrared field $R^{\text{(2)}\dag}$ and a nonresonant interaction with the visible field. The response function of a nonresonant interaction can meanwhile be approximated by a delta function $\delta$. \begin{equation}\label{e:R} R^{\text{(2)}}(t_{2},t_{1}) \approx R^{\text{(2)}\dag}(t_{1})\delta(t_{2}) \end{equation} Implementing this approximation into equation \ref{e:sig1} yields, \begin{equation}\label{e:sig2} \text{E}_{\text{SFG}}(t,t_{\text{IR}}) \propto \text{E}_{\text{vis}}(t+t_{\text{IR}}) \left[R^{\text{(2)}\dag}\otimes\text{E}_{\text{IR}}(t) \right] \end{equation} with the convolution operator $\otimes$. The measured heterodyned signal intensity $\text{I}_{\text{het}}$ is subsequently given by \begin{equation}\label{e:het1} \text{I}_{\text{het}}(t_{\text{IR}}) \propto \int_{-\infty}^{\infty}dt \left(\text{E}_{\text{LO}}(t+t_{\text{IR}})+ \text{E}_{\text{SFG}}(t,t_{\text{IR}}) \right)^{2} \end{equation} where $\text{E}_{\text{LO}}$ denotes the local oscillator field. Filtering out all contributions \emph{except} the interference term (by balanced detection, see next section) reduces equation \ref{e:het1} to \begin{equation}\label{e:het2} \text{I}_{\text{het,bal}}(t_{\text{IR}}) \propto \int^{\infty}_{-\infty}dt \left( \text{E}_{\text{LO}}(t+t_{\text{IR}})\text{E}_{\text{SFG}}(t,t_{\text{IR}}) \right) \end{equation} Combining equations \ref{e:het2} and \ref{e:sig2} leads to the following expression, \begin{equation}\label{e:het3} \begin{aligned} \text{I}_{\text{het,bal}}(t_{\text{IR}}) \propto \int^{\infty}_{-\infty}dt \left(R^{\text{(2)}\dag}\otimes\text{E}_{\text{IR}}(t)\left[\text{E}_{\text{vis}}(t+t_{\text{IR}})\text{E}_{\text{LO}}(t+t_{\text{IR}})\right]\right) \\ = R^{\text{(2)}\dag}\otimes \text{E}_{\text{IR}}(t)\circ \left[\text{E}_{\text{vis}}(t)\text{E}_{\text{LO}}(t)\right] \end{aligned} \end{equation} where $\circ$ is the correlation operator. After Fourier transformation of equation \ref{e:het3} and under application of the convolution theorem we obtain \begin{equation}\label{e:fhet1} \mathcal{F}\left(\text{I}_{\text{het,bal}}\left(t_{\text{IR}}\right) \right)\propto \chi^{(2)}(\omega)\text{E}_{\text{IR}}(\omega)\cdot\left[\mathcal{F}\left(\text{E}_{\text{vis}}(t)\text{E}_{\text{LO}}(t)\right)\right]^{*} \end{equation} with the Fourier transform operator $\mathcal{F}$ and the complex second order susceptibility $\chi^{(2)}$. The symbol * represents the complex conjugate of the resulting spectrum after Fourier transformation and accounts for the correlation operator in equation \ref{e:het3}. In a last step, all the factors containing the laser fields can be combined to a single complex spectrometer function $\mathcal{S}(\omega)$ simplifying equation \ref{e:fhet1} to \begin{equation}\label{e:fhet2} \mathcal{F}\left(\text{I}_{\text{het,bal}}\left(t_{\text{IR}}\right) \right)\propto \chi^{(2)}(\omega)\cdot\mathcal{S}(\omega) \end{equation} Importantly, the spectrometer function can be obtained by a reference measurement and any additional phase and amplitude effects (\textit{e.g.}\ from linear and nonlinear Fresnel factors \cite{poo11,blo62}) on the involved laser pulses can in principle be included in equation \ref{e:fhet1}. Once the sample independent spectrometer function is determined, phase and amplitude of $\chi^{(2)}$ can precisely be extracted from the interferometric measurement using equation \ref{e:fhet2}. As shown in Figure \ref{f:tds} we implement this time domain approach in a full collinear beam geometry \cite{xu15,Wang17}. Because the incident LO, IR and vis beams all experience exactly the same optical path extracted phase and amplitude do not depend sensitively on the positioning of the sample and the the measurement is insensitive to vibrations and drifts of optics (including the sample) behind the point of beam combination. Additionally, wave vector conservation now requires that the angle in which the SFG signal is emitted is independent of infrared frequency. This highly simplifies the acquisition of phase resolved SFG spectra in large frequency ranges because there is no need of realignment of the local oscillator and should even allow straightforward extension to ultrabroadband infrared sources \cite{sti17}. Practically, the time domain approach allows the substitution of single channel detectors (avalanche photo diodes or photomultipliers) for multi-pixel CCD arrays. In general such detectors offer higher sensitivity, lower noise, greater range of wavelength applicability and the possibility of acquiring spectra of each laser shot without loss in sensitivity, all at a fraction of the cost. \section{Phase and Amplitude Stabilization} As noted above, our collinear spectrometer is theoretically insensitive to small changes in the common beam path of the three laser pulses. This insensitivity allows us to include an oscillating mirror in the setup that alternately (500 Hz) samples two different spots in the sample area without phase shifts or jitter. By placing the sample and the reference in the spots sampled by the mirror, we are able to perform phase resolved SFG measurements with shot-to-shot referencing (quasi simultaneous referencing). A single experiment thus collects both a sample and a reference spectrum and thus no substituting of a reference in the beam path is necessary (see SI for details of reference measurement calibration). \begin{figure}[htbp] \begin{center} \includegraphics[width=0.47\textwidth]{figures/fig_2c} \caption{Measurement of the errors in phase and amplitude. Upper panel: A) interferometric raw data, lower panel: evolution of the B) phase and C) amplitude error with time from subsequent interferometric scans. Red crosses: phase/amplitude deviations from the respective mean values (without referencing); blue dots: phase/amplitude deviation from the reference (simultaneous referencing)} \label{f:phase_e} \end{center} \end{figure} We quantified this, theoretical, improvement in phase and amplitude stability by measuring the phase resolved non-resonant SFG response of a spot on a silver mirror, referenced to itself (with the second sampled spot on the same mirror), in consecutive scans over 70 minutes with and without simultaneous referencing. Figure \ref{f:phase_e} shows the resulting phase and amplitude errors for each scan. Clearly without simultaneous referencing, and despite our collinear geometry, significant temporal drifts in both phase ($\approx 20^{\circ}$) and amplitude ($\approx 18\%$) occur over timescales of 1 hour. Performing the measurement with simultaneous referencing (blue dots), these drifts are effectively removed. The residual inaccuracy in phase and amplitude can be estimated by the standard deviations of the measured errors, 0.8 degree and 0.8\% respectively, and are an improvement of one order of magnitude over the non-referenced case. We note in passing that we found, in preliminary experiments, the relative phase and amplitude between sample and reference to persist for time windows significantly larger than those shown in Figure \ref{f:phase_e} (see \textit{e.g.}\ section 6). Provided collinearity is maintained even spectrometer realignments had little impact. Such stability implies that our ability to conduct very-long heterodyned v-SFG measurements if necessary is limited only by the stability of the laser and the sample. The high precision and stability of the measured phase and amplitude in our v-SFG spectrometer is, to our knowledge, not possible existing heterodyned v-SFG spectrometers. \section{Increasing Signal to Noise Ratio} Given a heterodyned v-SFG spectrometer capable of characterizing phase and amplitude with high precision, our ability to make accurate heterodyned v-SFG measurements is limited by the signal to noise ratio. To evaluate our sensitivity requires quantifying the noise sources. The light intensity generated in our heterodyned SFG experiment can be described by equation \ref{e:het_a} (see supporting information). \begin{equation}\label{e:het_a} {{\text{I}}_{het}}({{t}_{\text{IR}}})={{\text{I}}_{\text{LO}}}+\text{I}_{\text{SFG}}^{\max }\cdot \mathcal{A}({{t}_{\text{IR}}})+2\sqrt{{{\text{I}}_{\text{LO}}}I_{\text{SFG}}^{\max }}\cdot \mathcal{J}({{t}_{\text{IR}}}) \end{equation} I\textsubscript{LO} and I\textsubscript{SFG} are the intensities of the local oscillator and the SFG signal, respectively while the normalized amplitude function $\mathcal{A}({{t}_{IR}})$ accounts for the dependence of the generated SFG signal on t\textsubscript{IR}. The normalized interferogram, $\mathcal{J}({{t}_{IR}})$, contains the desired spectroscopic information. Equation \ref{e:het_a} shows that there are three contributions to the measured intensity: the LO intensity, which is independent of $t_{\text{IR}}$ and is the first term, the signal from the sample, which slowly varies with $t_{\text{IR}}$ and the third term that describes the interference. The amplitude of the interference signal scales with the square root of the LO intensity and can consequently be increased by raising I\textsubscript{LO}. This suggests that one might use a larger $I_{LO}$ to bring weak signals above the noise floor of the detector \cite{sti08}. However, to evaluate the efficiency of this amplification requires understanding how the overall noise varies as function of the LO intensity. For reasons of simplicity we consider in what follows the four types of noise that are typically dominant. (i) \emph{Background noise} sources that are independent of light intensity such as dark current from the detector, thermal noise in the electronic components, and readout noise in the acquisition device. Since background noise is independent of the LO intensity signal enhancement directly leads to a reduction of its impact. (ii) \emph{Shot noise} originating in the quantum mechanics of light detection. If the light level at the detector is very low the particle nature of the light becomes apparent in form of shot noise that scales with the square root of the light intensity that reaches the detector $\text{I}_{het}$. With an intense local oscillator $\text{I}_{het}\approx \text{I}_{\text{LO}}$: the shot noise shows the same scaling with the LO intensity as the interference signal. Thus, as pointed out previously by Pool et al \cite{poo11}, the shot noise contribution to the S/N ratio is essentially independent of the LO intensity. (iii) \emph{Signal intensity fluctuations} that originate from fluctuations in laser intensity (see introduction) and scale linearly with signal intensity. For an intense local oscillator the \emph{signal intensity} noise in $\text{I}_{het}$ increases linear with LO intensity. Because the cross term in equation \ref{e:het_a}, the term we wish to isolate, scales with the square root of the LO intensity, increasing I\textsubscript{LO} results in a decrease of the S/N ratio. As a result of this scaling intensity noise quickly grows to the largest noise contribution in heterodyned SFG experiments and is often the main cause of a poor S/N ratio. (iv) \emph{Amplification noise}, originating from the detector and signal processing elements, also generally scales linearly with signal intensity. These simple scaling arguments suggest that increasing S/N in $\text{I}_{het}$ requires controlling amplification and signal intensity noise. While the former can only be reduced by a careful choice of ultra-stable detectors and amplifiers, intensity noise can be greatly reduced by employing so-called balanced detection \cite{laa11,ful04,jon09}. In this approach the LO and the sample SFG response are initially set to orthogonal polarization (horizontal and vertical) and thus do not interfere. They are both then propagated through an achromatic waveplate that rotates both polarizations by $45^{\circ}$. All beams are subsequently split again into a horizontal and a vertical polarization component using a polarizing beam splitter. The resulting two beam portions now show interference between the LO and the SFG signals but with opposite signs in the interference term. By simultaneously measuring both intensities in separate detectors (a and b) and subtracting the results one isolates the interference term yielding equation \ref{e:het_d}. \begin{equation}\label{e:het_d} {\text{I}}^{(a)}_{het,bal}({{t}_{IR}})-{\text{I}}^{(b)}_{het,bal}({{t}_{IR}})=2\sqrt{{{\text{I}}_{\text{LO}}}\text{I}_{\text{SFG}}^{\max }}\cdot \mathcal{J}({{t}_{IR}}) \end{equation} The contribution of the \emph{signal intensity noise} now only scales with the square root of the LO intensity reducing its impact on the signal to noise ratio. However, we can go one step further. Intensity noise is present in both beams, the local oscillator and the SFG from the sample. Since both are generated by the same pair of infrared and upconversion pulses their intensity fluctuations are correlated. We can express this mathematically by introducing the noiseless parameter $r$. \begin{equation}\label{e:het_e} {{\text{I}}_{\text{LO}}}=r\cdot \text{I}_{\text{SFG}}^{\max } \end{equation} Combining equations \ref{e:het_a} and \ref{e:het_e} and forming the quotient between the difference and the sum of the detector outputs yields \begin{equation}\label{e:het_h} \frac{{\text{I}}^{(a)}_{het,bal}({{t}_{\text{IR}}})-{\text{I}}^{(b)}_{het,bal}({{t}_{\text{IR}}})}{{\text{I}}^{(a)}_{het,bal}({{t}_{\text{IR}}})+{\text{I}}^{(b)}_{het,bal}({{t}_{\text{IR}}})}\approx \frac{2\cdot \mathcal{J}({{t}_{\text{IR}}})}{\sqrt{r}} \end{equation} The quotient in equation \ref{e:het_h} is now a quantity that is free from any intensity noise. However, this is only strictly valid in absence of other noise contributions. To evaluate the improvement in S/N under realistic conditions we performed a noise simulation described in detail in the supporting information. In the simulation we determined the S/N ratio (with a set of physically plausible values for the four noise contributions) as function of the LO intensity for three cases: simple heterodyning (based on equation \ref{e:het_a}), heterodyning with balanced detection and taking the difference of the detector outputs (equation \ref{e:het_d}), and heterodyning with balanced detection taking the quotient of the difference and the sum (equation \ref{e:het_h}). The result of the simulation is depicted in figure \ref{f:noise_sim}A) showing a clear improvement in S/N ratio for the cases 2 and 3. As we show in detail in the SI, the amount of improvement is a function of the exact composition of the overall noise. As expected, the improvement increases with growing relative contribution of the intensity noise. Another important result from the simulation is the existence of a maximum in the signal to noise ratio at a particular intensity of the local oscillator (in the example at $r\approx 50)$. The exact position of this maximum depends again on the details of the noise composition and must be determined based on the noise characteristics of the spectrometer in use. The intensity of the LO can then be tuned to this value to maximize the S/N of the spectrometer. \begin{figure}[htbp] \begin{center} \includegraphics[width=0.45\textwidth]{figures/fig_3} \caption{A) Simulation of the signal to noise ratio as function of the local oscillator intensity for a set of test parameters; B) Signal to noise ratios from experiment (solid bars) and simulation (transparent bars); case 1 simple heterodyned SFG; case 2 heterodyned SFG with balanced detection and taking the difference of the detector outputs; case 3 heterodyned SFG with balanced detection and taking the quotient of the difference and the sum of the detector outputs.} \label{f:noise_sim} \end{center} \end{figure} \begin{figure*} \begin{center} \includegraphics[width=0.9\textwidth]{figures/fig_5} \caption{Diagram of the interferometer. The main portion shows the entire interferometer in the top view. The inset shows the sample area viewed from the side.} \label{f:interfer} \end{center} \end{figure*} To test the improvement of the S/N ratio in our spectrometer experimentally the time delay t\textsubscript{IR} was moved to the maximum in the interferogram and the heterodyned SFG signals from a gold surface were recorded for 10,000 laser shots. From these data traces the S/N ratios were extracted according to cases 1 to 3. The results are presented in figure \ref{f:noise_sim}B) (solid bars). Again, we see a significant enhancement of the S/N ratio for cases 2 and 3. The total improvement amounts to one order of magnitude compared to the simple heterodyned case (case 3 vs. case 1). Note that this improvement corresponds to a decrease in the required averaging by about two orders of magnitude. The quantitative agreement between simulation and experiment clearly shows both that the four types of noise we identify are sufficient to describe our spectrometer's performance and that balanced detection effectively eliminates the largest contributor \footnote{For details of the experimental quantification of each noise source, by blocking different beams in the spectrometer, see the Supporting Information}. \section{Experimental} Infrared and 800 nm upconversion pulses are generated by a commercial, Ti:Sapphire based, 1 kHz, regenerative amplifier that produces femtosecond pulses at 800 nm. A portion of this pulse energy is then converted to the infrared using a commercially available optical parametric amplifier and difference frequency generation set-up (for details see Supporting Information) and sent into the interferometer. The design of the interferometer is depicted in Figure \ref{f:interfer}. The infrared beam that enters the interferometer is split into two portions by a beam splitter (ZnSe window). The weak (ca. 8\%) reflected portion is used for generation of the local oscillator and the strong transmitted for sum frequency generation at the sample. The reflected part passes through two free standing wire grid polarizers (Infraspecs) allowing for tunable attenuation and polarization control. The beam is then transmitted through the first incoupling optic, \textit{i.e.}\ a 2 mm thick Ge window with a custom coating that is highly reflective in the visible to near infrared (upconversion beam and LO) and highly transmissive in the mid-infrared (2.5-13 $\mu$m). At the surface of this incoupling optic the 800 nm upconversion beam is superimposed onto the infrared in a collinear fashion. Two lenses (20 cm \ce{CaF2}, and 100 cm BK7 for the infrared and the visible beams, respectively) that are placed in each beam path before the incoupling optic focus the two beams into a common spot in a thin z-cut quartz window (50 $\mu$m thick) generating a weak sum frequency signal (the local oscillator, LO). The intensity and polarization of the local oscillator (LO) can be controlled by adjusting the polarization and intensity of the infrared pulses using the two polarizers inside the IR beam path in combination with rotating the quartz wafer about its z-axis. This is possible due to the symmetry of the second order susceptibility tensor of $\alpha$-quartz \cite{lu03}. One therefore maintains full tunability of the LO at any given intensity and polarization of the upconversion beam. Behind the quartz wafer three beams are co-propagating colinearly, the 800 nm, the LO, and the infrared. The infrared is filtered out by a thin shortpass filter, while the remaining (800 nm and LO) are collimated by an off axis (15$^{\circ}$) parabolic mirror. The two beams subsequently enter a delay line with a computer controlled miniature piezo translation stage (PI, Q-521-330) before they get combined with the second infrared beam at the surface of a second incoupling optic (same type as incoupling optic 1). At this point, there are again three laser beams co-propagating , the 800 nm upconversion beam, the local oscillator and the second infrared portion. The three pulses are then focused by a second off axis (15 deg.) parabolic mirror. Using a two-mirror periscope right behind the parabolic mirror (see inset Figure \ref{f:interfer}) the beams are directed downwards at an incidence angle of 72 degree onto the sample which is placed horizontally in the focus of the three beams. The second mirror in this periscope is an oscillating mirror mounted on a galvo motor that oscillates at 500 Hz alternately sampling two different spots at the sample position (separation of ca. 1 cm). After the sample the reflected beams pass through a second mirror periscope before the two different beam paths (sample and reference) are recombined on a beam splitter. The generated SFG signals (LO and SFG from the sample/reference) are collimated by a lens and the 800 nm and IR frequencies are filtered out by two stacked shortpass filters. The laser beam now consists of the pure heterodyned SFG signal from the sample/reference, leaves the interferometer and is detected employing balanced detection. After passing through an achromatic waveplate the beams are split into two portions by a polarizing beam splitter cube (Thorlabs, CCM1-PBS252). The two resulting beams are each focused onto an avalanche photodiode (Thorlabs, APD410A2) where the intensity of the heterodyned SFG signal is measured. The signals from the two APDs are then integrated by gated integrators (SRS, Boxcar Averager) and finally digitalized. More experimental details including data acquisition and treatment as well as the calibration of the translation stage movement are given in the supporting information. \section{Example: SFG Experiment on $\alpha$-Quartz} \begin{figure*} \begin{center} \includegraphics[width=0.9\textwidth]{figures/fig_8} \caption{Referenced, phase resolved SFG measurement of the z-cut quartz surface. A) Interferometric raw data as function of the azimuthal angle (corrected for drifts in phase and amplitude); B) time domain signals from the two extracted components; C) azimuthal dependence of the amplitude for the two components; D) same as C) represented in polar coordinates.} \label{f:quartz} \end{center} \end{figure*} With this new spectrometer in hand we demonstrate its performance by showing first results that we obtained from phase resolved SFG measurements of $\alpha$-quartz. Due to its non-centrosymmetric crystal structure $\alpha$-quartz is bulk SFG active. The off resonant bulk SFG response has been well studied and is commonly used as internal or external phase reference \cite{lu03,Ohno16}. However, a phase resolved isolation of the SFG contribution from the surface has so far not been achieved. The effective second order susceptibility $\chi_{_{eff}}^{(2)}$ that is measured in SFG experiments performed in external reflection geometry can be expressed by the following equation \begin{equation}\label{e:b_s} {\chi _{_{eff}}^{(2)}=\chi _{S}^{(2)}+i\chi _{B}^{(2)}} \end{equation} where $\chi _{S}^{(2)}$ and $\chi _{B}^{(2)}$ represent the surface and bulk contributions, respectively. If all interacting laser fields are off resonant $\chi _{S}^{(2)}$ and $\chi _{B}^{(2)}$ are real but their contributions to the effective susceptibility are phase shifted by 90 deg. with respect to each other. The phase of the optical response is therefore a good indicator to determine its origin. Several studies have shown that $\chi_{_{eff}}^{(2)}$ in the case of $\alpha$-quartz is dominated by the bulk response, the measured susceptibility is therefore in good approximation imaginary \cite{sun16}. The bulk nonlinear susceptibility has the well-known threefold azimuthal symmetry which is governed by the crystal symmetry. The surface contribution, however, should have at least one component that originates from the macroscopic potential asymmetry in the direction along the surface normal. This component is isotropic in the surface plane and should therefore possess ${{C}_{\infty }}$ symmetry. The isolation of the isotropic surface signal is, however, far from trivial: Compared to $\chi _{B}^{(2)}$ the isotropic component is small and is therefore completely buried under the bulk response. Furthermore, the two contributions only differ in their phases and symmetry. On the other hand, this challenging task is precisely the type of problem that we wish to solve with our spectrometer. We therefore measured the off resonant SFG response from a z-cut quartz sample in ppp \footnote{ppp means that the infrared, the upconversion, and the detected SFG pulses are p polarized} polarization as function of the azimuthal angle with our phase resolved spectrometer. A second, stationary z-cut quartz was placed in the second sampled spot serving as reference. To ensure pure off resonant interactions the experiment was carried out at an infrared frequency of 2800 $c{{m}^{-1}}$. For each azimuthal angle (scanned in steps of 5 deg.) the entire interferogram from sample and reference was recorded. In a subsequent step the resulting sample interferograms were corrected for changes in spectral phase and amplitude in the corresponding reference spectra (removing any temporal drifts in phase and amplitude over the course of the experiment). The corrected interferometric raw data are depicted in figure \ref{f:quartz}A). At a first glance the result shows the well-known threefold symmetry of the bulk contribution, however, a closer look into the regions where the bulk contribution vanishes reveals that the phases in the interferograms shift. This indicates the presence of at least a second contribution. To isolate this second component we performed a linear decomposition of the time-domain data based on singular value decomposition and found that the data can indeed be well described by the superposition of two components with different symmetry. The azimuthal dependence of these two components and the corresponding time-domain signals are shown in figures \ref{f:quartz}B) and C). The first component shows the expected threefold symmetry whereas the second component is isotropic. Furthermore, comparing the corresponding time domain signals shows a relative phase shift of 90 deg. between the two signals while their magnitude spectra are nearly equal. This suggests the isotropic contribution originates from the sample surface. The overall amplitude of this second component is meanwhile about ten times smaller than the bulk contribution (but still well resolved). This corresponds to a difference in intensity of the two radiated signals of two orders of magnitude which explains why it is so difficulty to detect this signal with homodyned SFG spectrometers. The perfect match between these experimental results and the theoretical considerations shown above are in strong favor of our preliminary interpretation that the isolated second component is indeed the isotropic surface contribution of the measured second order susceptibility. To our knowledge, this signal has not been directly measured before. For a detailed characterization of this second contribution more experiments and analysis are obviously required, however, this is beyond the scope of this article. What this experiment demonstrates, however, is that we are now indeed capable of retrieving a small SFG signal that is buried in a complex SFG spectrum. The decomposition does not only reveal its contribution but also recovers its complex spectrum. As shown before, the analysis of the phases even allows us to attribute the different signals to surface and bulk origin, respectively. The success of the decomposition clearly shows that over the entire duration of the experiment (4 h) even smallest drifts in the spectral phases and amplitudes were successfully suppressed. \section{Summary and Outlook} We have described a new spectrometer design that allows for the acquisition of extended data sets of complex, low noise SFG spectra with high accuracy in spectral phase and amplitude. The high precision of the data makes it possible to use linear numerical algebra methods (\textit{e.g.}\ singular value decomposition) for the decomposition of the spectra into their different contributions as shown the section 6. With these possibilities in hand we can extent our SFG studies towards species whose cross section is too weak or whose interface population is too small to be detected with the current state-of-the-art instruments. A possible application is \textit{e.g.}\ the investigation of the structure and dynamics of protons at interfaces, a topic which is currently heavily debated \cite{Noam16} and a system where the precision that we achieved with our technique will be crucial. \providecommand{\latin}[1]{#1} \makeatletter \providecommand{\doi} {\begingroup\let\do\@makeother\dospecials \catcode`\{=1 \catcode`\}=2\doi@aux} \providecommand{\doi@aux}[1]{\endgroup\texttt{#1}} \makeatother \providecommand*\mcitethebibliography{\thebibliography} \csname @ifundefined\endcsname{endmcitethebibliography} {\let\endmcitethebibliography\endthebibliography}{} \begin{mcitethebibliography}{34} \providecommand*\natexlab[1]{#1} \providecommand*\mciteSetBstSublistMode[1]{} \providecommand*\mciteSetBstMaxWidthForm[2]{} \providecommand*\mciteBstWouldAddEndPuncttrue {\def\unskip.}{\unskip.}} \providecommand*\mciteBstWouldAddEndPunctfalse {\let\unskip.}\relax} \providecommand*\mciteSetBstMidEndSepPunct[3]{} \providecommand*\mciteSetBstSublistLabelBeginEnd[3]{} \providecommand*\unskip.}{} \mciteSetBstSublistMode{f} \mciteSetBstMaxWidthForm{subitem}{(\alph{mcitesubitemcount})} \mciteSetBstSublistLabelBeginEnd {\mcitemaxwidthsubitemform\space} {\relax} {\relax} \bibitem[Zhu \latin{et~al.}(1987)Zhu, Suhr, and Shen]{zhu87} Zhu,~X.~D.; Suhr,~H.; Shen,~Y.~R. {Surface vibrational spectroscopy by infrared-visible sum frequency generation}. \emph{Physical Review B} \textbf{1987}, \emph{35}, 3047--3050\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Shen(1989)]{she89} Shen,~Y.~R. {Surface Properties Probed by Second-Harmonic and Sum-Frequency Generation}. \emph{Nature} \textbf{1989}, \emph{337}, 519--525\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Bain(1995)]{bai95} Bain,~C.~D. {Sum-Frequency Vibrational Spectroscopy of the Solid-Liquid Interface}. \emph{Journal of the Chemical Society-Faraday Transactions} \textbf{1995}, \emph{91}, 1281--1296\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Lambert \latin{et~al.}(2005)Lambert, Davies, and Neivandt]{lam05} Lambert,~A.~G.; Davies,~P.~B.; Neivandt,~D.~J. {Implementing the Theory of Sum Frequency Generation Vibrational Spectroscopy: A Tutorial Review}. \emph{Applied Spectroscopy Reviews} \textbf{2005}, \emph{40}, 103--145\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Zhang \latin{et~al.}(1994)Zhang, Gutow, and Eisenthal]{zha94} Zhang,~D.; Gutow,~J.; Eisenthal,~K.~B. {Vibrational Spectra, Orientations, and Phase Transitions in Long-Chain Amphiphiles at the Air/Water Interface: Probing the Head and Tail Groups by Sum Frequency Generation}. \emph{Journal of Physical Chemistry} \textbf{1994}, \emph{98}, 13729--13734\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Richmond(2002)]{ric02} Richmond,~G.~L. {Molecular Bonding and Interactions at Aqueous Surfaces as Probed by Vibrational Sum Frequency Spectroscopy}. \emph{Chemical Reviews} \textbf{2002}, \emph{102}, 2693--2724\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Hunt \latin{et~al.}(1987)Hunt, Guyot-Sionnest, and Shen]{hun87} Hunt,~J.~H.; Guyot-Sionnest,~P.; Shen,~Y.~R. {Observation of C-H Stretch Vibrations of Monolayers of Molecules Optical Sum-Frequency Generation}. \emph{Chemical Physics Letters} \textbf{1987}, \emph{133}, 189--192\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Stokes \latin{et~al.}(2009)Stokes, Chen, Walter, and Geiger]{sto09} Stokes,~G.~Y.; Chen,~E.~H.; Walter,~S.~R.; Geiger,~F.~M. {Two Reactivity Modes in the Heterogeneous Cyclohexene Ozonolysis under Tropospherically Relevant Ozone-Rich and Ozone-Limited Conditions}. \emph{Journal of Physical Chemistry A} \textbf{2009}, \emph{113}, 8985--8993\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Chen \latin{et~al.}(2002)Chen, Shen, and Somorjai]{che02} Chen,~Z.; Shen,~Y.~R.; Somorjai,~G.~A. {Studies of Polymer Surfaces by Sum Frequency Generation Vibrational Spectroscopy}. \emph{Annual Review of Physical Chemistry} \textbf{2002}, \emph{53}, 437--465\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Davies(2010)]{dav10} Davies,~P.~B. {Interference Effects in the Sum Frequency Generation Spectra of Thin Organic Films. II: Applications to Different Thin-Film Systems}. \emph{Journal of Chemical Physics} \textbf{2010}, \emph{133}, 034705\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Shen(2003)]{she03} Shen,~Y.~R. \emph{The principles of nonlinear optics}, wiley classics library ed.; Wiley classics library; Wiley-Interscience: Hoboken, N.J., 2003\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Shen(2013)]{she13} Shen,~Y. {Phase-Sensitive Sum-Frequency Spectroscopy}. \emph{Annual Review of Physical Chemistry} \textbf{2013}, \emph{64}, 129--150\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Shen and Ostroverkhov(2006)Shen, and Ostroverkhov]{she06} Shen,~Y.~R.; Ostroverkhov,~V. Sum-Frequency Vibrational Spectroscopy on Water Interfaces: Polar Orientation of Water Molecules at Interfaces. \emph{Chemical Reviews} \textbf{2006}, \emph{106}, 1140--1154\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Tian and Shen(2014)Tian, and Shen]{tia14} Tian,~C.~S.; Shen,~Y.~R. Recent progress on sum-frequency spectroscopy. \emph{Surface Science Reports} \textbf{2014}, \emph{69}, 105--131\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Richter \latin{et~al.}(1998)Richter, Petralli-Mallow, and Stephenson]{ric98} Richter,~L.~J.; Petralli-Mallow,~T.~P.; Stephenson,~J.~C. Vibrationally resolved sum-frequency generation with broad-bandwidth infrared pulses. \emph{Optics Letters} \textbf{1998}, \emph{23}, 1594--1596\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Lagutchev \latin{et~al.}(2010)Lagutchev, Lozano, Mukherjee, Hambir, and Dlott]{lag10} Lagutchev,~A.; Lozano,~A.; Mukherjee,~P.; Hambir,~S.~A.; Dlott,~D.~D. Compact broadband vibrational sum-frequency generation spectrometer with nonresonant suppression. \emph{Spectrochimica Acta Part A: Molecular and Biomolecular Spectroscopy} \textbf{2010}, \emph{75}, 1289--1296\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Ji \latin{et~al.}(2007)Ji, Ostroverkhov, Chen, and Shen]{ji07} Ji,~N.; Ostroverkhov,~V.; Chen,~C.-Y.; Shen,~Y.-R. {Phase-Sensitive Sum-Frequency Vibrational Spectroscopy and Its Application to Studies of Interfacial Alkyl Chains}. \emph{Journal of the American Chemical Society} \textbf{2007}, \emph{129}, 10056--10057\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Chen \latin{et~al.}(2010)Chen, Hua, Huang, and Allen]{che10} Chen,~X.; Hua,~W.; Huang,~Z.; Allen,~H.~C. {Interfacial Water Structure Associated with Phospholipid Membranes Studied by Phase-Sensitive Vibrational Sum Frequency Generation Spectroscopy}. \emph{Journal of the American Chemical Society} \textbf{2010}, \emph{132}, 11336--11342\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Nihonyanagi \latin{et~al.}(2009)Nihonyanagi, Yamaguchi, and Tahara]{nih09} Nihonyanagi,~S.; Yamaguchi,~S.; Tahara,~T. {Direct Evidence for Orientational Flip-Flop of Water Molecules at Charged Interfaces: A Heterodyne-Detected Vibrational Sum Frequency Generation Study}. \emph{Journal of Chemical Physics} \textbf{2009}, \emph{130}, 204704\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Nihonyanagi \latin{et~al.}(2013)Nihonyanagi, Mondal, Yamaguchi, and Tahara]{nih13} Nihonyanagi,~S.; Mondal,~J.~A.; Yamaguchi,~S.; Tahara,~T. {Structure and Dynamics of Interfacial Water Studied by Heterodyne-Detected Vibrational Sum-Frequency Generation}. \emph{Annual Review of Physical Chemistry} \textbf{2013}, \emph{64}, 579--603\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Laaser \latin{et~al.}(2011)Laaser, Xiong, and Zanni]{laa11} Laaser,~J.~E.; Xiong,~W.; Zanni,~M.~T. {Time-Domain SFG Spectroscopy Using Mid-IR Pulse Shaping: Practical and Intrinsic Advantages}. \emph{Journal of Physical Chemistry B} \textbf{2011}, \emph{115}, 2536--2546\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Pool \latin{et~al.}(2011)Pool, Versluis, Backus, and Bonn]{poo11} Pool,~R.~E.; Versluis,~J.; Backus,~E. H.~G.; Bonn,~M. {Comparative Study of Direct and Phase-Specific Vibrational Sum-Frequency Generation Spectroscopy: Advantages and Limitations}. \emph{Journal of Physical Chemistry B} \textbf{2011}, \emph{115}, 15362--15369\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Bloembergen and Pershan(1962)Bloembergen, and Pershan]{blo62} Bloembergen,~N.; Pershan,~P.~S. {Light Waves at the Boundary of Nonlinear Media}. \emph{Physical Review} \textbf{1962}, \emph{128}, 606--622\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Xu \latin{et~al.}(2015)Xu, Wu, Sun, Dai, and Rao]{xu15} Xu,~B.; Wu,~Y.; Sun,~D.; Dai,~H.-L.; Rao,~Y. Stabilized phase detection of heterodyne sum frequency generation for interfacial studies. \emph{Optics Letters} \textbf{2015}, \emph{40}, 4472--4475\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Wang \latin{et~al.}(2017)Wang, Gao, and Xiong]{Wang17} Wang,~H.; Gao,~T.; Xiong,~W. Self-Phase-Stabilized Heterodyne Vibrational Sum Frequency Generation Microscopy. \emph{ACS Photonics} \textbf{2017}, \emph{4}, 1839--1845\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Stingel \latin{et~al.}(2017)Stingel, Vanselous, and Petersen]{sti17} Stingel,~A.~M.; Vanselous,~H.; Petersen,~P.~B. {Covering the Vibrational Spectrum with Microjoule Mid-Infrared Supercontinuum Pulses in Nonlinear Optical Applications}. \emph{Journal of the Optical Society of America B} \textbf{2017}, \emph{34}, 1163--1169\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Stiopkin \latin{et~al.}(2008)Stiopkin, Jayathilake, Bordenyuk, and Benderskii]{sti08} Stiopkin,~I.~V.; Jayathilake,~H.~D.; Bordenyuk,~A.~N.; Benderskii,~A.~V. {Heterodyne-Detected Vibrational Sum Frequency Generation Spectroscopy}. \emph{Journal of the American Chemical Society} \textbf{2008}, \emph{130}, 2271--2275\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Fulmer \latin{et~al.}(2004)Fulmer, Mukherjee, Krummel, and Zanni]{ful04} Fulmer,~E.~C.; Mukherjee,~P.; Krummel,~A.~T.; Zanni,~M.~T. {A Pulse Sequence for Directly Measuring the Anharmonicities of Coupled Vibrations: Two-Quantum Two-Dimensional Infrared Spectroscopy}. \emph{Journal of Chemical Physics} \textbf{2004}, \emph{120}, 8067--8078\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Jones \latin{et~al.}(2009)Jones, Ganim, and Tokmakoff]{jon09} Jones,~K.~C.; Ganim,~Z.; Tokmakoff,~A. {Heterodyne-Detected Dispersed Vibrational Echo Spectroscopy}. \emph{Journal of Physical Chemistry A} \textbf{2009}, \emph{113}, 14060--14066\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Rong and Hong-Fei(2003)Rong, and Hong-Fei]{lu03} Rong,~L.; Hong-Fei,~W. {Rotational Symmetry and Absolute Sign of Second-Order Susceptibility of $\alpha$-Quartz}. \emph{Chinese Physics Letters} \textbf{2003}, \emph{20}, 1269\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Ohno \latin{et~al.}(2016)Ohno, Saslow, Wang, Geiger, and Eisenthal]{Ohno16} Ohno,~P.~E.; Saslow,~S.~A.; Wang,~H.-f.; Geiger,~F.~M.; Eisenthal,~K.~B. {Phase-referenced nonlinear spectroscopy of the $\alpha$-quartz/water interface}. \emph{Nature Communications} \textbf{2016}, \emph{7}, 13587\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Sun \latin{et~al.}(2016)Sun, Liang, Xu, Zhu, Shen, and Tian]{sun16} Sun,~S.; Liang,~R.; Xu,~X.; Zhu,~H.; Shen,~Y.~R.; Tian,~C. Phase Reference in Phase-Sensitive Sum-Frequency Vibrational Spectroscopy. \emph{Journal of Chemical Physics} \textbf{2016}, \emph{144}, 244711\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \bibitem[Agmon \latin{et~al.}(2016)Agmon, Bakker, Campen, Henchman, Pohl, Roke, Th\"amer, and Hassanali]{Noam16} Agmon,~N.; Bakker,~H.~J.; Campen,~R.~K.; Henchman,~R.~H.; Pohl,~P.; Roke,~S.; Th\"amer,~M.; Hassanali,~A. Protons and Hydroxide Ions in Aqueous Systems. \emph{Chemical Reviews} \textbf{2016}, \emph{116}, 7642--7672, PMID: 27314430\relax \mciteBstWouldAddEndPuncttrue \mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct} {\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax \unskip.} \end{mcitethebibliography} \end{document}
\section{Introduction} \label{sec:intro} Graphs are everywhere, growing increasingly complex, and still lack scalable, interactive tools to support sensemaking. In a recent online survey conducted to gather information about how graphs are used in practice, graph analysts rated scalability and visualization as the most pressing issues to address~\cite{sahu2017ubiquity}. While graph drawing techniques have been developed to improve the layout of a graph in 2D, these approaches become less effective when visualizing modern day large graphs. As a response, advanced approaches such as ``super-noding''~\cite{abello2006ask, archambault2007grouse, archambault2007topolayout}, and edge bundling~\cite{holten2006hierarchical, cui2008geometry, alper2013weighted} have been designed to visually reduce the number of glyphs visible to a user. Some work abstracts graphs to higher-level representations, such as using contours and heat maps as a proxy for vertex density~\cite{lin2010contextour, cao2010facetatlas}, graph motifs for repeating structural patterns~\cite{dunne2013motif}, and overall graph summarizations~\cite{koutra2014vog}. New modes of exploration based on relevance and measures of ``interestingness'' have also been developed to explore large graphs without showing every vertex and edge~\cite{pienta2017facets, chau2011apolo, heer2004doitrees}. While these approaches may help users develop insights into a graph's functional properties, scalability, interaction, and extracting overall descriptive information about an unknown graph as it is being explored remain pressing issues in large graph exploration systems. \textit{Edge decomposition algorithms}, based on fixed points of degree peeling, show strong potential for helping users explore unfamiliar graph data~\cite{hohman2017playground, abello2014network}, because (1) they can discover peculiar subgraph patterns structurally similar or dissimilar to regular subgraphs; (2) they can quantify possible ``roles'' a vertex can play in the overall network topology; and (3) they scale to large graphs. In this ongoing work, we show how using scalable edge decompositions~\cite{abello2014network} as a central mechanism for navigation, exploration, and large data sensemaking can reveal interesting graph structure previously unknown to users. Our fast and scalable edge decomposition divides large graphs into an ordered set of \textit{graph layers} that is dependent only upon the topology of the graph. In this decomposition, edges are unique and participate in particular layers; however, vertices can be duplicated and exist in multiple layers at once; we call these vertices \textit{clones}. Graph layers help users identify potentially important substructures (e.g., quasi-cliques, multi-partite-cores), by automatically separating such patterns from the majority of the graph, while vertex clones allow one to link related layers together using \textit{cross-layer exploration}. Together, we introduce \textsc{Graph Playground}\xspace (\autoref{fig:ui}), an interactive graph exploration system that decompose large graphs quickly, generating explorable multi-layered representations that help graph data analysts interactively discover and make sense of peculiar graph structures. Through \textsc{Graph Playground}\xspace, we contribute: \begin{itemize}[leftmargin=3mm,topsep=3pt] \setlength\itemsep{0em} \item \textbf{New paradigm for graph exploration and navigation.} We propose a new paradigm for graph exploration and navigation centered around two novel components produced by our edge decomposition algorithm: graph layers and vertex clones. Graph layers are topologically and structurally interesting subgraphs of the original graph that can be analyzed independently; however, using vertex clones, vertices that exist in multiple layers, allows one to explore a graph across layers by providing a means to navigate local structure with a global context. \item \textbf{Fast, scalable edge decomposition via memory mapping and multithreading.} We present a fast and scalable edge decomposition algorithm using memory mapped I/O and multithreaded processes. We present decompositions on a wide range of graphs, varying in both size (e.g., up to hundreds of millions of edges) and domain (e.g., social networks, hyperlink networks, and co-occurrence networks) and tabulate computational timings and structural results. We can decompose graphs with millions of edges in seconds, and graphs with hundreds of millions of edges in minutes. \item \textbf{\textsc{Graph Playground}\xspace.} \textsc{Graph Playground}\xspace is a web-based interactive graph visualization system composed of three main linked views to help users explore and navigate large graphs. It uses GPUs for large force-directed graph layouts as well as accelerated 3D graphics to demonstrate how the edge decomposition divides the original graph into layers. \textsc{Graph Playground}\xspace simultaneously reveals ``peculiar'' subgraph structure discovered through the decomposition's layers, (e.g., quasi-cliques), and ``possible'' vertex roles in linking such subgraph patterns across layers. \end{itemize} \section{Illustrative Scenario} \label{sec:scenario} To illustrate how \textsc{Graph Playground}\xspace can help users explore large graphs and discover interesting structure, consider our user Don\xspace who wants to explore and make sense of a word embedding graph generated from Wikipedia from 2014. Word embeddings are an increasingly popular and important technique that turns words into high dimensional vectors (e.g., 300 dimensions)~\cite{bengio2003neural, mikolov2013efficient, pennington2014glove}. These word embeddings are used as input to many machine learning applications such as visual question answering~\cite{antol2015vqa} and neural machine translation~\cite{bahdanau2014neural}. Therefore it is important to make sense of what information a word embedding has captured and how well the embedding matches our understanding of language. Don\xspace's Wikipedia word embedding graph is generated using word vectors from GloVe, an unsupervised learning algorithm for obtaining vector representations for words~\cite{pennington2014glove}. The graph contains 65,870 vertices and 213,526 edges. Each vertex is a unique word, and an edge connects two words if the angular distance between their two word vectors is less than some threshold.\footnote{Angular distance is closely related to cosine similarity, and is an effective method for measuring the linguistic or semantic similarity of corresponding words~\cite{pennington2014glove}. For this graph, the threshold to connect two words is set to 0.9. Words with numbers/digits are removed from the dataset and are not considered. } \textbf{Visualizing edge decompositions.} Don\xspace is exploring the word embedding graph for the first time; therefore, he first wants to see a high-level, global representation of the graph. The Overview\xspace (\autoref{fig:ui}, left) is one of three main views in the \textsc{Graph Playground}\xspace user interface and visualizes a natural 3D representation of the edge decomposition's output that assigns each found graph layer a height based on its layer value. Don\xspace adjusts the vertical separation between layers, to better visualize patterns revealed by the decomposition. In the Overview\xspace, denser layers rise to the top of the 3D structure (e.g., quasi-cliques), while spare structures sink to lower layers (e.g., trees, stars). \textbf{Finding interesting graph layers.} Don\xspace now wants a more quantitative view of the graph. He inspects the graph Ribbon\xspace (\autoref{fig:ui}, middle), where each graph layer is encoded by a glyph that visualizes the graph layer's edge count, vertex count, clone count, the number of connected components, and the clustering coefficient. The Ribbon\xspace provides a compact, information-rich summarization of the edge decomposition using well-studied graph measures. Don\xspace can now more clearly see how many layers this graph has (31 total layers, with the highest value being 40), and how certain measures, such as their clustering coefficient density (bar color), vary over the layers. Don\xspace finds layer 8 interesting, because it is a highly dense layer, but it is further down in the Ribbon\xspace than the other dense layers. Don\xspace clicks the 8th graph layer glyph in the Ribbon\xspace. \textsc{Graph Playground}\xspace now displays layer 8 in the 2D Layers\xspace view (\autoref{fig:ui}, right). Don\xspace is presented with a handful of small tangled connected components (\autoref{fig:scenario}, left); however, the layouts of these components were computed with respect to the entire graph, but since we are only visualizing a particular layer from the edge decomposition, \textsc{Graph Playground}\xspace enables Don\xspace to perform a force-directed layout with respect to only this layer. When this is performed, Don\xspace watches as all the small components animate and reveal that layer 8 is a collection of highly dense small quasi-cliques (\autoref{fig:scenario}, right). This view is fully interactive: Don\xspace can zoom and pan over the graph layer, hovering over a vertex displays the vertex's label and highlights its immediate neighbors, and vertices can be selected and dragged around for maximum control over the graph layout. \textbf{Cross-layer exploration.} Recall that \textsc{Graph Playground}\xspace discovered a small collection of quasi-cliques in layer 8; Don\xspace begins exploring this layer by hovering over particular vertices to show their labels and immediate neighbors. Don\xspace discovers many interesting quasi-cliques of related words, such as one describing familial relationships (including words like ``daughter,'' ``husband,'' and ``grandparent''), one describing commonly injured body parts (including words like ``knee,'' ``ankle,'' and ``sprained''), and another elongated quasi-clique that describes the levels of negative \textit{surprise} one can experience (including words like ``annoyed,'' ``dismayed,'' and ``mortified''). Don\xspace then clicks on the ``Clone'' toggle, which colors and sizes vertices that are cloned in other layers red (\autoref{fig:scenario}, right). This reveals two findings: (1), many vertices in the quasi-clique also exist in other layers, showing that these vertices play other roles throughout the graph; and (2), some vertices only exists within this layer, and therefore play a singular role within the entire graph's structure. Don\xspace now has a solid understanding of this graph layer, and wishes to explore another. Instead of using the Ribbon\xspace and clicking on another layer, Don\xspace inspects the vertex ``dismayed'' from the negative ``surprise'' quasi-clique from earlier. \textsc{Graph Playground}\xspace reveals that it has vertex clones in layers 5 and 3. Don\xspace clicks on the layer 5 clone label for the word ``dismayed,'' and \textsc{Graph Playground}\xspace adds a visualization of layer 5 underneath the existing layer 8 visualization in the Layers\xspace view. \textsc{Graph Playground}\xspace focuses on both existences of ``dismayed'' by highlighting its vertex in layer 8 and accompanying clone in layer 5 blue and vertically aligns them in both layers, showing their roles in both graph layers. \begin{figure}[t] \centering \includegraphics[width=1.0\linewidth]{figures/scenario} \caption{ Layer 8 from the word embedding graph. On the left is the original layout computed with respect to the entire graph, but now that we have separated out layer 8 from the remaining graph, we can recompute its layout independently. This produces the layout on the right, where the cloned vertices are colored red and sized according to how many clones they have in the remainder of the graph. } \label{fig:scenario} \end{figure} \textbf{Local exploration with a global context.} Don\xspace now explores layer 5 starting from ``dismayed.'' By hovering over ``dismayed'' Don\xspace notices that its neighbors are similar to the neighbors in layer 8, but are indeed different words (including words like ``angered,'' ``displeased,'' ``embarrassed''). However, unlike layer 8, ``dismayed'' in layer 5 is connected to a larger connected component, and as Don\xspace follows the neighbors of ``dismayed'' throughout the component he notices the words transition from describing one's negative \textit{surprise} to more neutral words, e.g, ``shocked'' and ''surprised.'' Moreover, these neutral \textit{surprise} words form the center of the connected component, and continuing further reveals a new transition from neutral words to positive words such as ``remarkable,'' ``astounding,'' and ``extraordinarily.'' Don\xspace has now discovered that words describing \textit{surprise} are represented in this word embedding similar to how humans would think of them: one can be \textit{surprised}, however, the word ``surprised'' itself does not necessarily carry a positive nor negative meaning. Using \textsc{Graph Playground}\xspace, we see that neutral words like ``shocked'' and ``surprising'' bridge quasi-cliques of positive and negative \textit{surprise} words together. While Don\xspace performed this exploration by hand, \textsc{Graph Playground}\xspace automates this by instantly computing approximate shortest paths between selected pairs of vertices in a graph, with the extra ability to then add single vertices to find approximate shortest paths to the already existing path. We call this representation and mode of exploration the shortest-path-net\xspace via sequential egonet expansion, which is later discussed in \autoref{subsec:layers}. This allows a user to explore semantic information within a connected component of a graph layer, as well as view the information's transition from one side of a connected component to another. \textbf{Multiple exploration choices.} Since this component in layer 5 describing one's \textit{surprise} is much larger than the smaller quasi-clique in layer 8, Don\xspace now has multiple choices for continuing exploring this word embedding graph using \textsc{Graph Playground}\xspace: (1) visit the other connected components in layer 5, (2) backtrack to layer 8 and use the last clone of ``dismayed'' as a mechanism to perform further cross-layer exploration, or (3) return to the beginning and inspect the Overview\xspace and Ribbon\xspace for a completely different layer to explore. Regardless of what Don\xspace chooses, he can gain a better understanding of the word embedding graph both globally, by visualizing graph layer structure, and locally, by using vertex clones and shortest-path-net\xspace representations. \begin{figure*}[t] \centering \includegraphics[width=\textwidth]{figures/ui.png} \caption{ The \textsc{Graph Playground}\xspace user interface. \textsc{Graph Playground}\xspace is composed of three main views: the 3D Overview\xspace (left), the Ribbon\xspace (middle), and the Layers\xspace view (right). The Ribbon\xspace that splits the display can be dragged left and right to adjust the visible screen real estate that either the Overview\xspace or Layers\xspace view shows. In the figure, the vertex ``caeciliidae'' is selected, coloring it blue in both the Overview\xspace and Layers\xspace view. Here we see ``caeciliidae'' (a worm-like amphibian) in layer 30 bridges two quasi-cliques (families of birds and families of sea snails) together, while its clone in layer 25 participates in another single quasi-clique (families of land creatures).} \label{fig:ui} \end{figure*} \section{\textsc{Graph Playground}\xspace: Interactive Large Graph Exploration} \label{sec:design} Here we first describe the design challenges motivated by existing work for large graph exploration. For each challenge, we present our solution that guided the design decision for \textsc{Graph Playground}\xspace. The remaining three subsections each describe one of the main coordinated views of \textsc{Graph Playground}\xspace and highlight their core features for graph sensemaking; these include the 3D Overview\xspace (Section \ref{subsec:overview}), the Graph Ribbon\xspace (\autoref{subsec:ribbon}), and the Layers\xspace view (\autoref{subsec:layers}). \subsection{Challenges and Design Rationale} \label{subsec:challeneges} \begin{itemize}[leftmargin=0mm] \setlength\itemsep{1em} \item[] \textbf{Challenge 1: Variety of overlapping subgraph structure.} There are a variety of existing techniques that aim to discover structure and patterns in graphs. However, while these techniques may find individual structure and patterns, they do not link the findings together, nor do they explain how multiple patterns are associated with one another. Revealing such kinds of links between structure and pattern is a hallmark capability that is crucial to sensemaking~\cite{holyoak1997analogical, gentner1997structure}. \textbf{Our solution:} We utilize the dual nature of graph layers: (1) layers can be explored independently from one another, but more importantly, (2) layers can be linked together using vertex clones as a mechanism of traversal from layer to layer. We call this cross-layer exploration (see \autoref{fig:ui}). Visualizing the decomposition in 3D may help users more clearly see the overlapping graph structure, which could help them choose which layer of the graph to explore first. \item[] \textbf{Challenge 2: Local exploration of large graphs.} Since large graph exploration is difficult from both a visual and computational scalability perspective, querying a graph or considering subgraphs to explore locally can be helpful. However, often times the global context is lost using these approaches, as users do not know where in the graph they are exploring, or how different subgraphs are related to one another. \textbf{Our solution:} We design a novel visual summarization of the edge decomposition called the Graph Ribbon\xspace and embed it in the middle of the user interface (\autoref{fig:ui}). The Ribbon\xspace encodes each layer as a glyph and functions as a global map of the decomposition and graph. If a layer is selected to be visualized, a small triangle pointing left or right (denoting if the layer is visualized in the 3D Overview\xspace or the Layers\xspace view) is displayed next to that layer's glyph. We also design novel local exploration techniques within a graph layer (shortest-path-net\xspace via sequential egonet expansion) that help users explore graphs locally with a global context. \item[] \textbf{Challenge 3: Large graphs.} While many graphs are small and can be visualized in 2D with standard layouts, many modern graphs are growing increasingly large and complex. Not only is this problematic for data visualization itself, but also troublesome for engineering interactive tools. The sheer size of the data render many existing visualization tools unusable as they are often designed to visualize the entire graph. \textbf{Our solution:} We display a visual summarization of the edge decomposition (called the Ribbon\xspace) for a high-level view of the graph and its decomposition. Then, we can selectively load and visualize only the layers we desire, skirting scalability challenges that come with visualizing an entire graph at once. \end{itemize} \subsection{3D Graph Decomposition Overview} \label{subsec:overview} The left view of \textsc{Graph Playground}\xspace, called the Overview\xspace (\autoref{fig:ui}), visualizes graph decompositions in 3D and allows users to zoom, pan, and rotate the 3D structure in-browser and in real-time. Our edge decomposition divides large graphs into an ordered set of graph layers that is completely dependent upon the topology of the graph. Since the graph edge set is uniquely partitioned into graph layers, a natural approach to visualize the decomposition is to first perform a traditional 2D layout of the graph in the plane (this assigns vertices $x$ and $y$ coordinates); however, we now assign a $z$ coordinate to each vertex, where the $z$ coordinate is a function of the vertex peel value. Since graph layers are numerically ordered, when visualizing a decomposition in 3D the highest, most dense layers (e.g., quasi-cliques) rise to the top while the lower layers sink to the bottom (e.g., trees, stars). \textsc{Graph Playground}\xspace supports graphs with millions of vertices, but to compute an initial 2D layout is non-trivial; therefore, we use a GPU-accelerated implementation~\cite{brinkmann2017exploiting} of the Barnes-Hutt approximation~\cite{barnes1986hierarchical} to achieve large graph layouts in minutes. Users can display all graph layers at once or selectively add layers to the Overview\xspace. The Overview\xspace also contains options to help users explore and manipulate the 3D structure. These options include interactive sliders for adjusting the size of the vertices, the height of the layers (e.g., dragging this slider animates splitting the graph into its graph layers), and the spread of the layers (i.e., scaling the $x$ and $y$ positions of the nodes). The ``Animate'' button simply automates dragging the height slider to watch a short animation of the original 2D graph dividing into its 3D decomposition. Since navigating large 3D structures suffers from a distorted perspective, a ``Top View'' button is present to return the camera to its original position. This 3D Overview\xspace naturally visualizes how graphs decompose into layers and highlights how vertices can be cloned throughout multiple layers; if a vertex has clones, they will be stacked vertically along the $z$-axis (see the two blue vertex clones for ``caeciliidae'' in \autoref{fig:ui}, left). Lastly, in the right view of \textsc{Graph Playground}\xspace, discussed in \autoref{subsec:layers}, vertices can be selected to perform various tasks. When a vertex is selected, it is highlighted blue, as seen in \autoref{fig:ui} on the right where the vertex ``caeciliidae' is selected. We link the state from the Overview\xspace and the Layers\xspace view of \textsc{Graph Playground}\xspace, i.e., every selected vertex in the Layers\xspace view is also highlighted blue in the Overview\xspace (see the call out in \autoref{fig:ui}, left) , so users can always refer back to the 3D structure to see which vertices they have selected. \subsection{Graph Ribbon: Edge Decomposition Summarization} \label{subsec:ribbon} For each layer produced by the edge decomposition, we compute a set of measures that together provide a quantitative summary of the edge decomposition. We encode these measures for every layer as a horizontal bar glyph to create the visualization in the middle view of the \textsc{Graph Playground}\xspace user interface, called the Ribbon\xspace (\autoref{fig:ui}). While there are many diverse graph measures originating from graph theory, graph mining, and network science, we pick five distinct measures we think summarize the graph well; however, it should be noted that other measures can be computed for each layer and included in the Ribbon\xspace visualization for further analysis or specialized tasks. While inspecting graph measures on each layer independently can be enlightening, visualizing each metric across layers as a distribution highlights the power of the edge decomposition. Hovering over a layer displays a tooltip with the five computed measures displayed as numerical values for a given layer. The top of Ribbon\xspace includes a menu button that contains options to toggle each of the visualized measures, as well as a linear / log scale toggle for the axis. The Ribbon\xspace is not only a summarization of the edge decomposition; clicking on a specific layer's glyph displays that layer on the right of the user interface, discussed in detail in \autoref{subsec:layers}, while a Command+Click displays that layer in 3D in the Overview\xspace. Lastly, the entire Ribbon\xspace can be dragged using either of the arrows at the top to give more screen real estate to either the Overview\xspace or Layers\xspace view. Listed below are the five measures and how they are visualized in \textsc{Graph Playground}\xspace. \begin{figure}[tb] \centering \includegraphics[width=1.0\columnwidth]{figures/ribbon.png} \caption{ The Ribbon\xspace for the Wikipedia GloVe word embedding graph. The graph Ribbon\xspace summarizes the edge decomposition using graph measures such as the vertex count, the edge count, the cloned vertex count, clustering coefficient, and number of connected components. } \label{fig:ribbon} \end{figure} \subsection{Navigating and Exploring Graphs Using Graph Layers and Vertex Clones} \label{subsec:layers} The last of the three main views of \textsc{Graph Playground}\xspace is the Layers\xspace view (\autoref{fig:ui}, right). When a layer in the Ribbon\xspace is clicked, \textsc{Graph Playground}\xspace visualizes that specific layer as an interactive node-link diagram. This visualization is completely interactive: users can zoom and pan on the graph, as well as drag, pin, and select specific vertices. Hovering over a vertex highlights it, its edges, and its neighbors orange (\autoref{fig:ui}, right). The computed layer measures are listed in the top left corner of the Layers\xspace view. If the specified layer only contains a single connected component, a message is shown displaying how many edges the component requires to become a complete clique. Conversely, if the specified layer contains multiple connected components, a different message is shown displaying the largest connected component's vertex and edge count; a slider is also shown that hides components in order of their size, i.e., dragging the slider from left to right hides the smallest connected components, eventually showing the only the largest component in the graph layer. \textbf{Independent graph layer layouts.} \textsc{Graph Playground}\xspace supports multiple interactions for exploring within a single layer. Toggles are present for showing and hiding the vertices and edges of the layer. The ``Redraw'' toggle animates the layer unraveling using a precomputed independent force-directed layout to better show the decomposition's found structure (\autoref{fig:scenario}). However, users can also run a force-directed layout in-browser by clicking the ``Live Layout'' toggle; the layout computation continues until the toggle is turned off. This can be useful for computing a larger connected component's layout within a layer; by using the component slider to hide smaller components the desired larger component can be redrawn independently for better structural clarity. \textbf{Graph layer contour motifs.} The ``Motif'' toggle, when turned on, computes a contour map of the graph layer by performing kernel-density estimation (KDE) on the vertices of the layer. Options for adjusting the bandwidth and number of thresholds for the KDE are present underneath the toggle. This contour motif provides a higher-level, more abstract representation of a graph layer, creating a proxy for vertex density~\cite{lin2010contextour, cao2010facetatlas}. The contour motif is also instantly recomputed whenever a user drags a vertex or uses one of the above interactions to re-redraw a layer. {\renewcommand{\arraystretch}{1.1} \begin{table*}[tb] \caption{ Results for our fast and scalable edge decomposition algorithm across of number of different graphs varying in size and domain. Experimental timings are the average of 5 runs for each graph. We can decompose graphs with millions of edges in seconds, and graphs with hundreds of millions of edges in minutes. } \label{tab:algorithm-results} \centering \begin{tabular}{llrrrrr} \toprule \textbf{Graph} & \textbf{Graph Type} & \textbf{Vertices} & \textbf{Edges} & \textbf{Time} (sec.) & \textbf{Layers} & \textbf{Highest Peel} \\ \midrule Bible Names & co-occurrence & 1,774 & 9,131 & 0.01 & 12 & 15 \\ Google+ & social network & 23,628 & 39,242 & 0.02 & 10 & 13 \\ arXiv astro-ph & co-authorship & 18,771 & 198,050 & 0.10 & 47 & 56 \\ Amazon & co-purchase & 334,863 & 925,872 & 0.12 & 6 & 6 \\ US Patents & citation network & 3,774,768 & 16,518,947 & 11.73 & 41 & 64 \\ Pokec & social network & 1,632,803 & 30,622,564 & 12.33 & 44 & 70 \\ LiveJournal & social network & 4,847,571 & 68,993,773 & 120.70 & 179 & 510 \\ Wikipedia Links (German) & hyperlink network & 3,225,565 & 81,626,917 & 225.40 & 320 & 1656 \\ Orkut & social network & 3,072,441 & 117,184,899 & 91.84 & 91 & 253 \\ \bottomrule \end{tabular} \end{table*} } \textbf{Shortest-path-nets via sequential egonet expansion.} The ``Path'' button allows users to explore a single graph layer by building a shortest-path-net\xspace representation. When two vertices are selected within a graph layer, clicking the ``Path'' button will compute the shortest path between the vertices, or an approximation depending on the component size, highlight the computed path blue, and display the vertex labels along this path. A user can now select a third vertex somewhere else in the layer and click the ``Path'' once again to find an approximate shortest path from the third vertex to any other vertex along the existing path; iterating this process computes what we call a shortest-path-net\xspace via sequential egonet expansion. This mode of exploration is especially useful for observing the transition of semantic information from one side of a large connected component to another. \textbf{Vertex clones.} Lastly, the ``Clone'' toggle shows which vertices of a graph layer are clones or not. When toggled on, \textsc{Graph Playground}\xspace colors cloned vertices red and sizes each vertex according to how many clones that vertex has in the entire graph (see \autoref{fig:scenario}). When locally exploring a single graph layer, visualizing the vertex clones provides global context for how a particular vertex may participate in many graph layers at once. Conversely, vertices that do not have any clones remain colored gray, and stand out as ``secret agents'' within a particular layer. These vertices are equally informative, as all of their edges exist within a single layer, indicating that they play a singular role in the graph. Hovering over a vertex displays its label and lists the other layers its clones exist in. If a user clicks on one of the clones in the list, \textsc{Graph Playground}\xspace shows the selected layer underneath the original visualized layer and centers each of their displays on the selected vertex and its clone (see \autoref{fig:ui}, right). These vertices are now selected and synced, i.e., dragging one of the vertices will also drag the other, updating their position in both layers, reinforcing the notion that a single vertex can participate and influence multiple layers throughout an entire graph. For example, in \autoref{fig:ui} on the right, we see the blue vertex ``caeciliidae'' (a worm-like amphibian) in layer 30 bridges two quasi-cliques (families of birds and families of sea snails) together, while its clone in layer 25 participates in another single quasi-clique (families of land creatures). \section{Algorithm Results and System Design} \label{sec:technical} Recall our edge decomposition simultaneously reveals (1) peculiar subgraph structure discovered through the decomposition's layers, (e.g., quasi-cliques, multi-partite-cores), and (2) possible vertex roles in linking such subgraph patterns across layers. We utilize the edge decomposition based on fixed points of degree peeling by Abello et al.~\cite{abello2014network} and make improvements to increase its performance, both in computation speed and scalability. \subsection{Large Graph Decomposition Experimental Results} Our fast and scalable edge decomposition is implemented in C++; however, we improve performance by leveraging memory mapping~\cite{lin2014mmap} to load large graphs into memory. Recall that the edge decomposition runs traditional k-core decomposition $L$ times, where $L$ is the number of layers in the graph; therefore, we use a recent multithreaded implementation of k-core decomposition to achieve significant speedup~\cite{kabir2017parallel}. We report results on decomposing graphs using our fast and scalable implementation. We chose a wide range of of graphs, varying in both size (e.g. thousands to hundreds of millions of edges) and domain (e.g. social networks, hyperlink networks, and co-occurrence networks). We performed our experiments on a single commodity computer equipped with an Intel i7 6-core processor clocked at 3.3GHz and 32GB of RAM. For each graph, the timing result is averaged over 5 runs. All results are tabulated in \autoref{tab:algorithm-results}, which includes the graph, its vertex and edge count, the algorithm compute time without preprocessing steps, the number of layers each graph produces, and the highest peel value from the decomposition (since a graph with $L$ layers does not necessarily mean the $L$ layers correspond to $[1,2,3, \dots, L]$). We can decompose graphs with millions of edges in seconds, and graphs with hundreds of millions of edges in minutes. \subsection{System Design} For graph drawing, we use a force-directed technique to layout the original graph; however, in order to calculate the $(x,y)$ coordinates of every vertex in large graphs where typical force-directed layouts are slow and expensive to compute, we perform the layout computation using the Barnes-Hutt~\cite{barnes1986hierarchical} approximation on a GPU for significant speedup~\cite{brinkmann2017exploiting}. Computing the edge decomposition of our graph and the global graph layout are independent computations. When both are completed, we process their output together using Python to compute graph layer measures, vertex clones, and format the data to be ingested by \textsc{Graph Playground}\xspace. The visualization system is web-based and uses the latest JavaScript libraries to render elements to the screen, such as the now ubiquitously used D3~\cite{bostock2011d3} for manipulating SVGs and the GPU-powered library three.js (\url{https://threejs.org/}) for rendering the 3D graphics.
\section{Introduction} Several engineering experts attempted to simulate snow behavior for different applications such as movies, avalanche protection and prediction, ski, tires, civil infrastructures. Snow is an heterogeneous media. Simulating and modeling its mechanical response at large scale require a detailed analysis. Such analysis can be done in three steps. The first step concerns the design and validation of mathematical model of small length and time scales describing the grain scale behavior and including most of relevant micro-mechanical processes. Static and dynamic properties including frequency and rate dependency are studied and modeled. secondly the small length and time scales model is used to link numerical simulation with meso-scale mechanical behavior of laboratory scales representative volumes. Third a macro-scale model is set with less complexity for simulating the large structure response. For most material, the first step can be skipped as only homogenized version of the true representative volumes is considered. However given the structure dependent mechanical response and the fracture properties of snow it is difficult to reach realistic modeling without this step. The conditions of interest in this study are slow, rapid and large deformation for which thermodynamic state of the material is important. The main objective of the presented model is to provide a reliable simulation tool for investigating the non-linearity, rate, load and temperature dependent mechanical response of snow with complex boundary and loading conditions in engineering. Two phases of snow are considered: the granular phase in which snow is an aggregation of contacting granules and the continuum phase a solid porous ice media. In the granular phase, ice grains are free to move and particles are characterized trough frictional and inelastic contact. In the continuum phase grains are bonded in a melting and re-crystallization cycle and form together a solid structure. The difficulty lay in capturing the geometry with accuracy and its evolution caused by slow or rapid processes at different time scales. The slow processes known as metamorphism include a melting and appreciable flow of a liquid phase followed by crystallization or a diffusion sintering driven by energy minimization. These processes are classified into three categories according to the temperature gradient: the equilibrium metamorphism (Equi-temperature) that turns the initial crystal into rounded, kinetic metamorphism that creates faceted grains and melt-freeze metamorphism for large round grains ~\cite{SnowSnowpack,Cresseri,Adams2008b}. The temperature gradient is behind formation of layers of different strength. A weak layer lead to high risk of avalanche in a snow pack. The rapid processes include mechanical rearrangement of grains, fracture and pressure sintering caused by external forces. This paper presents the short time scale behavior of snow with exception of wet snow. A coupled micro-beam lattice model and discrete particle model is proposed. \section{Modeling sintering effect of in snow dynamics} \subsection{Free sintering and pressure sintering} Snow behavior is characterized by fracture, creep, and the dimensions of its constrictions (bond between grains) created through sintering. The bonding and adhesion of ice have been largely studied in the past. Some effort were made to characterize the adhesive forces between bonded ice particles at different sintering time and temperature. When two spherical ice grains were brought in contact they became quickly bonded \cite{Faraday1859NoteRegelation,Nakaya1954,D.Kingery1960,Hobbs1964,Gubler1982,Kuroiwac,Szabo2007}. This phenomenon was first documented by Faraday \cite{Faraday1859NoteRegelation} in 1850 who noticed that two ice blocks became one when brought into contact. Most of experiments performed at large time scale (few minutes to days) showed that the neck growth can be attributed to mass transport to the contact area. These experiments showed a temperature dependent growth with a very rapid growth temperatures close to the melting point. However, separate studies show that sintering also happen at shorter time scale when the contact interface is under pressure. The shape of the bond are different, given the fact that the diffusion sintering is mainly caused by mass transport to the neck while the pressure sintering happen by increasing contact area through deformation (figure 1). Processes in both pressure and diffusion sintering are largely attributed to the presence of a quasi-liquid layer on the ice boundary \cite{Weyl1951,Nakaya1954,Jellinek1967} \cite{Fletcher1968} or the melting of the interface \cite{Gubler1982}. The thin quasi-liquid layer is almost always created at the surface of ice or water in an attempt to reduce the free energy, as surface ions change their electron distribution \cite{Weyl1951}. The thickness of the liquid layer was estimated to be around 10 nanometers \cite{Weyl1951} ie. Fletcher measured $1$ to $4$ $ nanometers$ \cite{Fletcher1968} between $-8 $ and $-1^o C$ and Jellinek $90$ $nonometers$ at $-1.8^oC$ \cite{Jellinek1967}. \begin{figure}[H] \begin{center} \includegraphics[scale=0.06]{b_difu_press_1.png} \caption { Geometry and mass transport in free (diffusion) sintering (left) and pressure sintering} \label{fig:f2} \end{center} \end{figure} Some quantitative studies presenting the effect of pressure in the initial stage of the sintering have emerged in the last decades \cite{Gubler1982,Szabo2007}. The pressure sintering is mainly due to regelation, a melting and freezing process by variation of the melting point according to the pressure. Ice regelation was first documented in a quantitative study carried by J. Thomson and W. Thomson \cite{Thomson1850} who called into question Faraday's quasi-liquid layer theory. Regelation is caused by an increase of pressure followed by a decrease attributable to variation of external forces, relaxation, progressive increase of surface area, local melting of asperities .... When passing from compression to tension, the liquid portion previously melted by pressure plus the portion from the quasi-liquid layer accumulated at the contact area freeze back and resist to the tension. Some portion of liquid for instance melted of asperities and liquid layer freeze while still under compression when the contact interface is widened by time dependent deformation. Experiments have shown that after fracture of the bond, the new surfaces of both particles recover. \subsection{Bond growth and evolution of porous structure} In the light of the above assumptions, the load carrying capacity $(f ^b_{max})$ of bonds created by pressure sintering can be calculated in two components. A first component $f _0 ^b$ being pressure independent is composed of resistance arising from rapid freezing of quasi-liquid layer at the contact and quasi-instantaneous capillary attraction \cite{Faraday1859NoteRegelation}. This component is present for both pressure and diffusion sintering. The second component $f ^b(p,t)$ which is pressure $(p)$, time $(t)$ and temperature $(T)$ dependent originates from contact interface being welded by melting and freezing. The later dependents on mechanical properties of ice and the loading condition. \begin{equation} f ^b_{max}=f _0^b + f^b(p,t,T) \end{equation} Pressure sintering cannot account for total adhesive forces experienced in ice-ice contact \cite{Jellinek1967}. However for short time scale, or appreciable pressure, the pressure dependent adhesive force is dominant. This was proved in the experiments performed by Nakaya \cite{Nakaya1954}, where cohesion increased more than ten time when the contact force was increased by ten. Since our focus is the short time scale only pressure sintering is considered. Diffusion caused neck growth are not considered throughout the simulation though initial micro-structures can be taken from any stage of the metamorphism. In order to apprehend the mechanical behavior of the complex structures resulting from pressure sintering, the structure of porous ice or snow is represented by discrete particles and bonded virtually by massless cylindrical beams. The ice grains are the particles and have frictional contact properties while the constrictions in the ice matrix are the beams connecting particle pairs \cite{Kabore2018Multi-scaleMechanics}. When the structure loses all its bonds it become granular media and can go back to its porous solid structure if given enough time and pressure to sinter again. Stress state at the contact area determines which framework is considered for assessing the mechanical response to external loads. For compressive stresses below the compressive strength, a time dependent bond growth or re-bonding mechanism due to visco-plasticity and melt-freeze mechanism occur. The growth of the bond area $(A_b)$ is directly linked to the viscous and plastic deformation of the ice particles and their equivalent radius $(r_{ij})$ as shown in equation 2. \begin{equation} A_b= \psi(u, r_{ij})\\ \end{equation} For torques, tensile and shear stresses, there is viscoelastic deformation accompanied by quasi-brittle fracture of the bonds. The micro-structure evolution is represented by coupling discrete particle model for the first mechanism and a lattice of Euler-Bernoulli micro-beam with fracture properties for the latter. The previous description applies to solid phase. When there is no bond or negligible bond radius i.e granular phase torques and shear resistance are computed according to frictional contact between particles. This conceptual model is consistent with the creep, collapse and flow mechanisms discussed in \cite{Bader1962}. \subsection{Viscoelasticity of Ice and snow} Under specific modeling constrains and for the sake of simplicity ice can be considered elastic. However, the conditions under which ice exhibits pure elasticity are so restricted and can hardly be met in real life \cite{Voitkovskii}. Attempts to characterize ice by means of young modulus under static experiments resulted in wide range of values with one order of magnitude difference \cite{HomerT.Mantis}. Measurement using high frequency are considered more reliable. Several researcher concluded that plasticity can be observed under any stress and the elastic limit is usually assumed to be null, similar to viscoelastic materials. The similarity of ice and viscous fluid has been pointed out by observation of glaciers flow and ice creep in laboratory. Figure 2 shows laboratory measurement of secondary creep rate of ice \cite{Barnes} according to the stress. \begin{figure}[H] \includegraphics[scale=0.5]{barnes.png} \caption {Stress dependence for of the creep rate Barnes 1971 \cite{Barnes}} \label{fig:f2} \end{figure} Pure elastic behavior of ice can be obtained at high strain rate\cite{Mellor} and hydrostatic compression of a single crystal \cite{Voitkovskii}. The main cause of viscous behavior in ice is its crystalline structure. Ice is generally found under polycrystalline form which is composed of single crystalline plates the order of magnitude of $10^2$ micrometer thick \cite{Voitkovskii}. In deed a single ice crystal can be characterized as elasto-plastic. Since polycrystalline ice is formed by plates the deformation is also dependent to the orientation of the crystals according to the applied stress. The deformation and creep of polycrystalline ice is characterized by basal dislocations gliding of ice crystals along the basal planes \cite{Barnes}. For randomly oriented crystals, deformation is accompanied by bending and shearing of the crystals. Since ice is often found at temperature closed to its melting point, its behavior is dominated by creep flow. The creep of ice is divided into tree stages. First stage is the transient creep characterized by a high strain rate that decreases rapidly to a limit. The limit is the secondary or steady state creep that is followed by tertiary creep which leads to failure. The decrease of strain rate during transient creep is about 2 order of magnitude \cite{Castelnau2008}. Most of the strain caused during transient creep is recoverable. The transient creep plays a significant role in ice and snow dynamics. Therefore for limited time, ice can be considered as a non-Newtonian viscoelastic fluid ~\cite{Bader1962}. \section{Integrated model for ice and snow dynamics} The model developed in this paper is a coupling between discrete particles method and damageable Euler-Bernouli beams lattice of grain scale to yield viscoplastic behavior at the macroscopic level. The compressive behavior of ice grains is described by a linear viscoelastic contact model with different creep mechanisms. Despite the fact that nonlinear models have been used to include secondary creep, it has been found that secondary creep is rarely obtained under limited time of observation and that tertiary creep usually happens during the transient creep for high stresses \cite{Duval1974}. Under shear, tension, bending and torsion, we use a viscoelastic quasi-brittle beam model for bonded grains and an elastic perfectly-plastic law for detached grains. \subsection{Elasticity and creep mechanics for compressive loads} Using Boltzmann principle and assuming linear viscoelasticity of ice, the displacement can be divided into three independent parts $u_e, u_v, u_{ve}$ (figure 3) in the displacement-time curve for constant loads similar to a Burger's material. \begin{figure}[H] \begin{center} \includegraphics[scale=0.25]{viscoeleastic1.png} \caption { Displacement-time curve describing vsicoelastic response} \label{fig:f2} \end{center} \end{figure} The first part of the displacement $u_e$ represents the amount of displacement attributed to instantaneous elastic response. After the load is removed, $u_e$ vanishes almost immediately. Then, a delayed displacement $u_d$ is gradually recovered. Finally, long after the load removal, a permanent displacement $u_v$ representing a Newtonian flow remains. This behavior usually represented by Burger's constitutive model is a series combination of Kelvin and Maxwell models (figure 4). $u_v$ and $u_e$ are calculated from the Maxwell element and $u_{ve}$ from the Kelvin element. \begin{figure}[H] \begin{center} \includegraphics[width=8.00cm]{Burger_model.png} \caption { Diagram of a four parameter burger material model} \label{fig:f2} \end{center} \end{figure} For the compressive behavior, we consider rate and loading history dependent equation of Burger's material \cite{Shapiro1997,Yosida,Bader1962} in the following force-displacement relation: \begin{equation} f^c + \big [\frac{c_d}{k_d} + c_i (\frac{1}{k_d} + \frac{1}{k_i}) \big ]\dot{f^c} + \frac{c_d c_i}{k_d k_i} \ddot{f^c} = c_i \dot{u} + \frac{c_d c_i}{k_d} \ddot{u} \end{equation} Where $c_i$ and $k_i$ are the instantaneous viscosity and stiffness constants, $c_d$ and $k_d$ the delayed viscosity and stiffness constants, $\dot{u}$ and $\ddot{u}$ are the first and second derivatives of the displacement. The instantaneous stiffness can be obtained from the young modulus if measured at high strain rate. \\ The equation $(1)$ is numerically solved for the normal force $f^c_n$ using the central finite difference scheme in the following order \cite{Chen}: \begin{equation} \begin{cases} A=1+\frac{k_d \Delta_t}{2 c_d }; \quad B=1-\frac{k_d \Delta_t}{2 c_d }\\ C=\frac{\Delta_t}{2 c_d A }+\frac{1}{k_i}+\frac{\Delta _t}{2 c_i}; \quad D=\frac{\Delta_t}{2 c_d A }-\frac{1}{k_i}+\frac{\Delta _t}{2 c_i}\\ f^c_n(t+1) = [u+u_d*(1-B/A) - f^c_n(t)*D]\frac{1}{C}\\ u_d(t+1)= \frac{1}{A}\bigg [ B u_d(t) + \frac{\Delta_t}{2c_d} \big [f^c_n(t+1)+f^c_n(t) \big] \bigg ] \\ \end{cases} \end{equation} The same procedure is applied to determine the tangential force $f^c_t$ in the absence of bonds by converting each of the four parameters into transverse their transverse values: \begin{equation} P'=\frac{P}{2(1+\nu)}\\ \end{equation} $\nu$ being the poison ratio. \subsubsection{Creep and Dynamical response} The four parameters in (3) can be obtained trough creep test with a compressive impulsion : \begin{equation} f^c=f_0 H(t) \end{equation} \begin{equation} H(t)=\begin{cases} 0 & \quad \text{if } t < 0\\ 1 & \quad \text{if } t\leq 0 \\ \end{cases} \end{equation} The response described in (3) can be reduced to the following using Laplace transformation : \begin{equation} u=f[\frac{1}{k_i} + \frac{t}{c_i} + \frac{1}{k_d} \big (1 - e^{-t \cdot t_r} \big)] \end{equation} The displacement in the two sections of the Kelvin element are identical and equal to the total delayed displacement. The total delayed displacement is recovered exponentially over time at a rate $t_r$ called relaxation time: $t_r = \frac{k_d}{c_d}$. The creep rate is the time derivative of the creep: \begin{equation} \dot{u}=f[ \frac{1}{c_i} + \frac{\tau}{k_d} e^{-t\cdot t_r } ] \end{equation} Note that the creep rate is the sum of the transient or primary creep rate $f \frac{t_r}{k_d} e^{-t\cdot t_r}$ and the steady-state or stationary creep rate $ \frac{f}{c_i}$. The transient creep is always present in ice \cite{Duval1974} and is well suited by the Burger's model. However Burger's model is only suitable for short time scale \cite{DiPaola2013} and poorly fit the long term and steady state creep. The longterm behavior may be captured using a nonlinear maxwell dash-pot. The model is also suited for dynamic behavior and response at much smaller time scale than quasi-static conditions. Many cases in engineering include dynamic stress or very short contact time (of order of microseconds) between particles. The response under such conditions can well be described in frequency domain. The equation (3) can be written in frequency domain in algebraic form using Lapace transform: \begin{equation} (1 +p_1 s + p_2 s^2)f(s)=( q_1 s + q_2 s^2)u(s) \end{equation} so that : \begin{equation} \frac{f(s)}{u(s)}=sK(s)= \frac{( q_1 s + q_2 s^2)}{(1 +p_1 s + p_2 s^2)} \end{equation} A sinusoidal loading of frequency $\omega$ leads to a phase shifted oscillatory displacement of frequency $\omega$ : \begin{equation} f=f_0sin(\omega t) \end{equation} \begin{equation} u=u_0 sin(\omega t + \phi) \end{equation} Where $\phi$ is the phase angle. This can be rewritten in the complex domain : \begin{equation} f=f _0 e^{i \omega t}= f _0 e^{i \omega t} \end{equation} \begin{equation} u=u _0 e^{-i\phi}e^{i \omega t}= u^* _0 e^{i \omega t} \end{equation} The complex compliance is: \begin{equation} g(\omega)=\frac{u_0^*}{f_0}=\frac{(1 +p_1 i\omega + p_2 ( i\omega )^2)}{( q_1 i\omega + q_2 ( i\omega )^2)} \end{equation} The phase angle $\phi$, dynamic compliance $g$, storage $g'$ and loss $g''$ compliances representing respectively the angle between force and displacement axis, the modulus, real and imaginary part of $g(\omega)$ can be expressed as: \begin{equation} g'=\frac{1}{k_m} + \frac{k_k}{k_k^2 + \omega ^2 C_k ^2} \end{equation} \begin{equation} g''=\frac{1}{\omega c_m} + \frac{\omega c_k}{k_k^2 + \omega ^2 C_k ^2} \end{equation} \begin{equation} g= \sqrt{g'^2 + g''^2} \end{equation} \begin{equation} \tan(\phi)= \frac{g''}{g'} \end{equation} The four viscoelastic parameters can also be obtained by fitting equation 16 and 18 to data from dynamic mechanical analysis or oscillatory shear rheometry. \subsection{Quasi-brittle fracture and collapse mechanics} \subsubsection{Bond model} The collapse in ice matrix is described by damageable bond network representing the constrictions in the ice matrix. Since constrictions are the weakest sections in the snow volume \cite{Ballard} they are expected to fail before any damageable stress is reached in the ice grains. Also, because they present small time to failure and designed for ( shear, tension and relative rotations) loading conditions, the maxwell unit in the model for compression is omitted \cite{Shapiro1997} for bonds. On the macroscopic level, the bonds between ice particles represent the majority of the constrictions in a snow mass. Therefore, bonds created trough sintering are approximated by cylindrical beams which sections are approximately equal to the area of the constrictions. It was observed that elastic-brittle bonds were only suitable for fracture in large structures similar to Linear Fracture Mechanics (LEFM) but have limitations in small size structures. This issue was addressed recently by many investigators ~\cite{Kim2008,Kim2009,Tarokh2014,Galouei2015a,Liu2018} who used bonded particles to analyses fracture of small and medium size structures of quasi-brittle materials. Some softening laws have been introduced to redress the overestimation of liberated kinetic energy after fracture of brittle bonds. These laws include bilinear \cite{Kim2009} exponential \cite{Liu2018} cohesive residual strength beyond the yield point of the material. Furthermore the brittleness in numerical simulation is proportional to the chosen particle size \cite{Tarokh2014}. The exponential softening law is in the form of : \begin{equation} f=f_y e^{-\frac{G_f}{\tau} (u-u_l)}; \qquad G_f=\int_{0}^{\infty} {f d u_\Delta} \end{equation} Where $u_\Delta=u-u_l$, $G_f$ is the fracture energy, $f_y = A_b \tau $ is the limit force for a specimen with strength $\tau$. \begin{figure*}[h] \begin{center} \includegraphics[scale=0.32]{bond_constitutive.png} \caption {Bonding beam (a) Force-displacement law in tension, (b) shear with for constant normal compressive force $f_n^c$ (b) Loading conditions of the bond : bending torque $t_\theta$, torsion torque $t_\phi$, tensile displacement $u_n$, shear displacement $u_s$} \label{fig:f2} \end{center} \end{figure*} The general equation of a homogeneous beam under dynamic load can be formulated as a function strains and distortions using Euler-Lagrange equations : \begin{equation} \begin{cases} EA_b\frac{\partial^2 u_n }{\partial x^2} + \eta A_b \frac{\partial^2 u_n}{\partial t\partial x} + f_n^b= \rho A_b \frac{\partial^2 u_n}{\partial t^2}\\ GJ\frac{\partial^2 \phi }{\partial x^2} + \eta J \frac{\partial^3 \phi}{\partial t\partial x^2} + t_\phi= \rho J \frac{\partial^2 \phi}{\partial t^2}\\ EI\frac{\partial^4 u_t }{\partial x^4} + \eta I \frac{\partial^5 u_t}{\partial t\partial x^4} +\frac{\partial t_\theta}{\partial x} + f_t^b= \rho A_b \frac{\partial^2 u_t}{\partial t^2} \end{cases} \end{equation} \begin{equation} \begin{cases} \theta = \frac{\partial u_t }{\partial x}= \Delta t (n \times \omega _i - n \times \omega _j)\\ \phi=\Delta t (n \cdot \omega _i - n \cdot\omega _j)n\\ \end{cases} \end{equation} Where $f_n$ and $f_t$ are the unbalanced normal and transverse loads, $u_n$ and $u_t$ the normal and transverse displacement, $\phi$ is the relative spin along the normal direction or twisting angle and $\theta $ the bending angle. $\omega _i$ and $\omega _j$ are the angular velocities. The parameters $E$, $G$, $\eta_n$ and $\eta_t$ are the Kelvin elastic moduli and viscosities of ice in normal and shear direction. The Saint-Venant assumptions is considered for the twist about neutral axis or shear center (torsion) neglecting the warping torsional moment. Under compression, the resulting bonding beam start thickening and the bond area $A_b$ increases. When loaded, the resistance forces and torques of the bond are calculated as follow : \begin{equation} \begin{pmatrix} f_n^b \\ f_t^b \\ t_\phi \\ t_\theta \end{pmatrix}=\begin{pmatrix} \eta_n A_b \frac{\dot{u}_n}{ l_b} +EA_b \frac{u_n}{l_b} \\ \eta_t A_b \frac{\dot{u}_t}{ 2r_b} +GA_b \frac{u_t}{2r_b} \\ \eta_t \frac{\pi r_b^4\dot{\phi}}{2l_b}+ G\frac{\phi \pi r_b^4}{2 l_b} \\ \eta_n \frac{\pi r_b^4\dot{\theta} }{4l_b}+ E\frac{\pi r_b^4\theta }{4l_b} \end{pmatrix} \end{equation} After fracture fracture of a bond, softening functions are used to dissipate energy until the fracture energy is considerably released : \begin{equation} \begin{pmatrix} f_n^b \\ f_t^b \\ t_\phi \\ t_\theta \end{pmatrix}_f=\begin{pmatrix} f_n^b & f_t^b & t_\phi & t_\theta \end{pmatrix}_{limit} \begin{pmatrix} e^{-\frac{G_f}{\tau_n} (u_n-u_{nl})} \\ e^{-\frac{G_f}{\tau_s} (u_t-u_{tl})} \\ e^{-\frac{G_f}{\tau_s} r_b(\phi-\phi_l)} \\ e^{-\frac{G_f}{\tau_n} r_b(\theta-\theta_l)} \end{pmatrix} \end{equation} $u_{.l}$, $\phi_l$,$\theta_l$ are respectively the elastic limit of displacement, twist angle and bending angle. $\tau_s$ and $\tau_n$ are the shear and normal strength. The length of the beam $l_b$ is the distance between the center of mass of the particles and the bond area is equal to the contact area : \begin{align*} A_b \approx \pi r_{ij} u_n \\ \end{align*} A local coordinate is used for the pair particles, while the shear force and bending moment are stored in the global coordinate. The rotation of the local coordinate is taken into account for the shear, and torques. The angle of rotation $\varphi$ between the current normal $\vec{n_{t+1}}$ and previous $\vec{n_t}$ about an axis $\vec{n'}$: \begin{align} \vec{n}'=\vec{n}_t \times \vec{n}_{t+1} \\ \varphi = \arcsin{|n'|} \end{align} A rotation matrix in global coordinate is calculated from the rotation in local coordinate using quaternion transformation. The torques and shear forces in previous time step are rotated to the new local coordinate before being updated. \subsubsection{Quasi-brittle fracture}{ The fracture behavior of ice have been thoroughly studied in the past for different loading rates\cite{Schulson2006,Schulson2001,Schulson2009,Schulson1987}. It was found that ice grain of 1 to 2 mm size showed brittle behavior for strain rates above $10^{-7} s^{-1}$ in tension and above $10^{-3}s^{-1}$ in compression at $-10^o C$. These rates represents the transition zone between ductile and brittle behavior \cite{Schulson2001}. The transition rates are lower for larger sizes and for compressive loads, it decreases with temperature. The fracture behavior depends on the creep rate of the ice. The ductility at low rates is due to the fact that stress relaxation rate is high enough to inhibit stress concentration and crack growth. The failure criterion combining tensile and bending stress of the bond is expressed as follow \cite{Potyondy2004}: \begin{equation} \frac{f_n^b}{A_b}+\frac{4 t_t}{r_b A_b} < \tau_n \end{equation} In case of shear damage the Mohr-Coulomb criteria is used. The total shear resistance obey the Mohr-Coulomb shear strength. In the Mohr-Coulomb failure criteria, the shear strength is expressed as: \begin{align}{ \tau_s =\frac{f_n^c}{A_b} \mu_s + C } \end{align} The shear failure criterion combining shear and torsion stresses of the bond is expressed as follow : \begin{equation} \frac{f_t^b}{A_b}+\frac{4 t_n}{r_b A_b} < \tau_s \end{equation} $\mu_s$ is the coefficient of static friction and $\frac{f_n^c}{A_b} \mu_s$ is the residual strength after bond fracture and is always present in granular snow~\cite{Mellor}. This criterion fits well with our modeling, in such a way that the load carrying capacity of bonds are increasing with pressure and time. Since the bonds size are time and temperature-dependent the value of C is: \begin{align}{ C =A_b \tau _{ice} = \Psi(f^c_n, t^b, T ) \tau _{ice} } \end{align} Another important parameter in discrete particle model is the ratio between the size of the real material grains and the size of particles used. In addition to fracture poor resolution, large ratio may lead to some innacuracies due to the Hall$ - $Petch effect. The Hall$ - $Petch effect is the phenomenon in which materials are strengthening or weakening when their average grain size are changed. In fact it is observed that as the grain size get smaller the material exhibit higher strength. The tensile strength and grain size are therefore related through the following expression: \begin{align*} \tau _{ice}=\tau _0 + kd^x \\ \end{align*} For ice at $-10^oC$, $x=0.5$, $\tau _0 =0.6 MPa$, $k=0.002MPa \sqrt[]{m}$ \cite{Schulson2006}. $k$ is the strengthening coefficient. } \subsection{Friction and flow mechanics}{ After fracture, relative shearing and rotation still lead to viscoelastic and plastic displacements. The plastic displacement can be modeled as a Coulomb friction. Friction forces between particles play a significant role in macroscopic behavior of ice and snow and are major source of energy dissipation. \subsubsection{Relative sliding} For shear forces, the resistance is characterized by a static and kinetic friction coefficient $\mu_s$ and $\mu_k$. The static friction is the maximum limit of the residual shear resistance $f_t^c$ described above. Once the relative motion between particles become appreciable, the static friction resistance vanishes and is replaced by kinetic friction force. The frictional resistance force $f_t^c$ can be expressed for a normal contact force $f_n^c$ and a tractive force $ f_t$ as: \begin{align}{ f_t^c = \begin{cases} f_t ^c & \quad \text{if } f_t^c < \mu_s f_n^c\\ \mu_k f_n^c & \quad \text{if } f_t^c\geq {\mu_s f_n^c} \\ \end{cases} } \end{align} The kinetic friction is high for dry and rough surface, and low for smooth and wet surfaces. Moreover, It was observed that at very low sliding speed(a few centimeters a second) the kinetic and static friction coefficient for snow or ice are close ($10 \%$ difference) ~\cite{Bowden1953}. Unlike the static friction, the kinetic friction is higher at lower temperature ~\cite{Sukhorukov2013}. \subsubsection{Relative rolling and twisting} Some resistances arise when two ice grains roll against each other. The origin of this resistance may be attributed to the instantaneous cohesion and the elastic hysteresis at the contact area. In this study we consider the following viscoelastic constitutive relation \cite{Iwashita1998} for contact rolling: \begin{equation} \begin{cases} M^r= -k^r \Gamma _1 \theta_r -C_r \dot{\theta}\\ k^r = k^t r_{ij}^2 \end{cases} \end{equation} \begin{equation} \Gamma _1=\begin{cases} 1 & \quad \text{if } |k^r \theta_r| \leq \mu _r r_{ij} f^n\\ \frac{\mu _r R_r f^n}{|k^r \theta_r|} & \quad \text{if } |k^r \theta_r| > \mu _r R_r f^n\\ \end{cases} \end{equation} Where $ \mu _r$ is the coefficient rolling plastic moment. The reduced radius is $r_{ij}=\frac{r_ir_j}{r_i+r_j}$ for two grains and $r_{ij}=r_i$ for a grain $i$ against a wall $j$. The interparticle torsion for granular phase (not bonded) are neglected } \subsection{Motion integration} The motion of each particle in the system follows the Newton's second law of motion. For a particle $i$ the translational and rotational motion are updated according to the following equation: \begin{equation} \begin{cases} m_i\dot{v}_i = \sum_j f_{ij} + m_i g \\ I_i\dot{\omega}_i = \sum_j t_{ij} \end{cases} \end{equation} Where $\sum_j f_{ij}$ and $\sum_j t_{ij}$ are the sum of forces and torques of all interactions between a particle and its neighbors. $m_i$ is the mass of the particle. The motion of the particle is driven by the unbalanced forces resulting from contact forces in multiple contact environment. The interaction force and torque between two particles $i$ and $j$ are : \begin{equation} \begin{cases} f_{n,ij} =\begin{cases} f^c_{n,ij} \quad \textit{if $\dot{u}_{ij}^n>0$} \\ f^c_{n,ij} + \zeta_{ij} f_{n,ij}^b \quad \textit{if $\dot{u}_{ij}^n<0$} \end{cases}\\ f_{t,ij} =\zeta_{ij} f_{t,ij}^b + (1 - \zeta_{ij} )f_{t,ij}^c\\ t_{ij} = \zeta_{ij} t_{ij}^b + (1 - \zeta_{ij} )t_{ij}^c\\ t_{ij}^c = f_{t, ij}^c r_{ij} \end{cases} \end{equation} $f_{n,ij}^c$ and $f_{t,ij}^c$ are contact forces in normal and tangential direction, $t_{ij}^c$ contact torques, $f_{n,ij}^b$ and $f_{t,ij}^b$ bond forces in normal and tangential direction, $t_{ij}^b$ is the bond torque. $\zeta_{ij}$ is equal to one if the particles are bonded, and zero if not. Interaction forces are calculated according to constitutive model of ice presented above. In discrete element formulation, force-displacement relation is used to describe mechanical behavior in contrast to continuum mechanics where constitutive laws are often a stress-strain equations. Displacement of a particle is computed from the overlap (indentation) for each interaction. Hence for two particles the translational and rotational displacement is \cite{Luding2008} \begin{equation} \begin{cases} u_{ij}^n = r_i + r_j -|x_i -x_j| \\ u_{ij}^t = \Delta t (v_{ij} - n(n \cdot v_{ij}) )\\ v_r ^t=- r_{ij}' \Delta t (n \times \omega _i - n \times \omega _j)\\ v_r^n = r_{ij} \Delta t (n \cdot \omega _i - n \cdot\omega _j)n\\ \end{cases} \end{equation} The reduced radius and corrected reduced radius are respectively $r_{ij}=\frac{r_ir_j}{r_i+r_j}$; $r_{ij}'=\frac{(r_i-u_{ij}^n)(r_j-u_{ij}^n)}{r_i+r_j- u_{ij}^n}$. The total displacement is the sum of local displacements on the particle. We assume that all particles are at rest at the beginning of the simulation, thus no interaction force or residual stress are considered at time prior to the simulation start. Initial displacements usually used to best represent the geometry of sintered parts are removed from all displacement calculation throughout the simulation. In order to avoid the singularity problem while representing a particle's orientation with three Euler angles ($\alpha$, $\beta$, $\gamma$), a quaternion approach is used. \begin{equation} q = \begin{bmatrix} \ \cos(\frac{\beta}{2}) \cos(\frac{\alpha+\gamma}{2}) \\ \sin(\frac{\beta}{2}) \cos(\frac{\alpha-\gamma}{2}) \\ \sin(\frac{\beta}{2}) \sin(\frac{\alpha-\gamma}{2})\\ \cos(\frac{\beta}{2}) \sin(\frac{\alpha+\gamma}{2}) \end{bmatrix} \end{equation} the relative angular displacement between two particles is \begin{equation} q_{ij}=q_i-q_j \end{equation} For numerical stability, we chose the forth order Gear predictor-corrector algorithm \cite{Gear1967,SAMIEI2012} where the motion of each particle is predicted and corrected in the same time step. The prediction is based on Taylor expansion : \begin{equation} \begin{cases} \dot{v}_p(t+1)= \dot{v}(t)+ \frac{\partial ^3 x(t)}{\partial t^3}\Delta t\\ v_p(t+1)= v(t)+ \dot{v}(t) \Delta t + \frac{1}{2} \frac{\partial ^3 x(t)}{\partial t^3}\Delta t^2 \\ x_p(t+1) = x(t) + v(t) \Delta t + \frac{1}{2} \dot{v}(t) \Delta t^2 + \frac{1}{6} \frac{\partial ^3 x(t)}{\partial t^3}\Delta t^3\\ \end{cases} \end{equation} The motion is then corrected at next step: \begin{equation} \begin{cases} \delta=\frac{ f^I(t+1) + mg}{m}-\dot{v}_p(t+1)\\ \dot{v}(t+1)= \dot{v}_p(t+1)+ \delta \\ v(t+1)= v_p(t+1)+ \frac{5}{12}\delta \Delta t \\ x(t+1) = x_p(t+1) + \frac{1}{12}\delta \Delta t^2 \\ \end{cases} \end{equation} \section{Verification at grain scale} The fast sintering experiment consist of putting two spherical ice particles into contact with a given load for a short time and then applying separation force until fracture of the created bond. The applied load, fracture force and sintering time are then recorded. Szabo and Schneebeli performed such experiment by putting two cones of 3mm radius at the tip into contact for different times \cite{Szabo2007}. The fracture force $(f_{frac})$ also called sintering force vs time can be translated into strain vs time curve or indentation $d$ vs time using spherical contact mechanics. If the equivalent radius of the two spheres is $R_{eq}$ and the indentation $d$ is known, the bond area can be calculated as follow: \begin{equation} A_b=\pi R_{eq} d = \frac{f_{frac}}{\tau _n} \end{equation} Assuming that the tensile strength is constant under the experimental conditions, the indentation can be related to the fracture force as follow : \begin{equation} d = \frac{f_{frac}}{\pi \tau _n {eq}} \end{equation} \begin{table}[h!] \begin{center} \caption{Optimal Burgers parameters for short time creep } \label{tab:table1} \begin{tabular}{l|c|c|c|c|r} \textbf{Temperature} & \textbf{$c_i$} & \textbf{$c _ d$}& \textbf{$k _ i$} & \textbf{$k _ d$} & \textbf{$f_0^b$}\\ $^o C$ & $MNm. s $ & $MNm. s$ & $MNm$& $MNm$ & $N$\\ \hline -1 & 0.15385e+03 &15.698 & $9.10^3$ &0.30783 &0.08411\\ -5 & 0.39047e+03 &43.230 &$9.10^3$& 0.53908 &0.06535\\ -12 & 0.70373e+03 & 81.653 &$9.10^3$ &0.60423 &0.05\\ -23& 1.0444e+03 & 82.50 &$9.10^3$ &1.1561 &0.0298\\ \end{tabular} \end{center} \end{table} Under these assumptions, the fast sintering data can be exploited as creep data. Linear extrapolation of measured load dependent sintering force agrees with the existence of non null temperature dependent sintering force when no load has been applied. The load independent portion of the fracture force can be included into equation 42 : \begin{equation} d = \frac{f_{frac}-f_0^b}{\pi \tau _n {eq}} \end{equation} In this paper, the four parameters of the Burger's model and $f_0^b$ have been obtained by this approach using the damped least-squares (DLS) method. The results of this calibration process are presented in Figure 6 and the parameters are listed in Table 1. The bonds viscoelastic properties are calulated as following : \begin{align} E=(k_i+k_d)d \\ G=\frac{E}{2(1+0.3)}\\ \eta_t=\eta_n =c_i d \end{align} \begin{figure}[H] \includegraphics[scale=0.3]{Szabo_force_time.jpg} \caption {Model prediction vs fast sintering experiments (Szabo and Schneebeli 2007 \cite{Szabo2007})} \label{fig:f2} \end{figure} In the present model the growth rate of the bond between the particles is linearly dependent on the pressure at the interface. The pressure dependency is in agreement with the experimental data presented by Szabo and Schneebeli \cite{Szabo2007}. Figure 7 show results of fracture force vs applied pressure of two particles of $3mm$ radius for a sintering time of 250ms. It is worth mentioning that the rate at which the tensile load have been applied for the bond fracture are supposed to allow no appreciable viscous flow. \begin{figure}[H] \includegraphics[scale=0.35]{Szabo_force_load.jpg} \caption {Evolution of sintering force according to applied compressive force compared to experiment Szabo and Schneebeli \cite{Szabo2007}} \label{fig:f2} \end{figure} Time-temperature superposition can be used to establish the relation between viscosity and temperature. For ice, the Arrhenius relation have been used \cite{Barnes,Rist1994,GAGNON1995}. The Arrhenius type creep rate relation : \begin{equation} \dot{\epsilon}=c e^{-\frac{Q}{RT}} \end{equation} Barnes proposed a model that describes the secondary creep of ice in a temperature range of $0$ to $-48^o C$ and strain rate ranging between $10^{-9} s^{-1}$ and $10^{-2} s^{-1}$. The activation energy was sugested to be $120 J/mol$ for temperatures above $-8$ and $78 J/mol$ for temperatures below. Other researchers found much lower values for the activation energy $120 J/mol$ for $-40$ to $-20^o C$ \cite{Rist1994} and $101 J/mol$ for temperature range of $-16$ to $-1^o C$ by \cite{GAGNON1995}. The difference in activation energy is believed to come from some liquid at grain boundaries. Barnes also suggested that by this process the creep rate is supposed to be higher for decreasing grain size. This implies that the creep rate found in individual snow grains are higher than that macroscopic ice leading to even higher macroscopic creep rate of snow. Since densification and grain growth are linked, the creep rate is expected to decrease with increasing density \cite{Barnes,Bader1962}. In this study, the Williams-Landel-Ferry (WLF) model have been used to establish temperature dependency of viscosity constants: \begin{align} c (T)= a_i(T) c (T_0)\\ a_T=exp\big [\frac{-C1(T-T_0)}{C2+(T-T_0)}\big] \end{align} \begin{figure}[H] \includegraphics[scale=0.5]{parameters_temperature.jpg} \caption {Variation of viscosity constants with temperature} \label{fig:f2} \end{figure} As one can see in figure. 8 the variation of the delayed viscosity is pronounced between $-1$ and $-12^o C$. Below$-12^o C$ no significant increase is found where as the instantaneous viscosity linked to secondary creep still increase. From the experimental values the following empirical relation have been found: \begin{align} c _d (T)= e^ {2.571(T -T_0)/(-6.154+T -T_0)} \cdot c _i (T_0)\\ c _i (T)= e^ {2.586(T -T_0)/(-7.706+T -T_0)} \cdot c _i (T_0)\\ t _r (T)=\frac{c _d (T)}{k_d (T)} = e^ {-1.472\cdot 10^4(T -T_0)/(2.431\cdot 10^5+T -T_0)} \cdot t _r (T_0) \end{align} The reference temperature $T_0$ was taken to be $272.15K (-1^o C)$. \begin{figure}[H] \includegraphics[scale=0.5]{bouncing.jpg} \caption {Bouncing particle at different temperature } \label{fig:f2} \end{figure} Both viscosity constants $c _i$ and $c _i$ are function of temperature and increase with decreasing temperature. The elasticity constant are assumed to be constant with varying temperature and the values are chosen close to the Young modulus. The figure 9 illustrates the influence of temperature on the apparent restitution coefficient. An ice particle falling on ice surface of same temperature show lower restitution coefficient at higher temperature. Although no significant change is found above $-12^o C$. The fast sintering experiment was also performed by Gubler at different temperature \cite{Gubler1982}. The data extracted from experiments by Szabo and Schneebeli are also in agreement with Gubler's experiments. \begin{figure}[H] \includegraphics[scale=0.5]{plotGubler.jpg} \caption {Time evolution of fracture force according to time at $-10^oC$ } \label{fig:f2} \end{figure} \section{Conclusion} A conceptual model has been developed to mimic micromechanisms that take place in snow. The macroscopic behavior is governed by grain bonding, de-bonding leading to crack initiation and propagation and all processes that take place in the crack region. Interactions between ice grains are described using rheological models. Intergranular fracture mechanisms were introduced by the means of quasi-brittle bonds. The model also includes thermo-mechanical description of bond growth. An exponential softening law was used for post-peak behavior of the bonds. The main features can be summarized as follow: \begin{itemize} \item full microstructure is taken in to account for mechanical response; \item temperature dependent evolution of the microstructure by creep and sintering; \item size effect in fracture mechanism and rate dependent behavior. \end{itemize} \section*{References}
\section{Introduction} The discovery of non-zero neutrino masses and lepton flavor mixing by the reactor\cite{reac}, accelerator\cite{acc}, atmospheric\cite{atm} and solar\cite{sol} neutrino oscillation experiments have revealed the values of oscillation parameters such as mass squared differences $\Delta m_{21}^{2},|\Delta m_{31}^{2}|$ and mixing angles $,\theta_{12},\theta_{23},\theta_{13}$\cite{theta13}, to an unprecedented accuracy. At present, there are some unknown quantities in standard three-neutrino framework namely, $(i)$ sign of $\Delta m_{23}^{2}$, $(ii)$ the octant of $\theta_{23}$, $(iii)$ the $CP$-phase $\delta$. The difficulty in the determination of these unknowns is the existence of parameter degeneracy. To overcome these degeneracies one of the method is to combine data from different experiments. Recently this procedure has been adopted by various studies\cite{pd1,pd2,pd3}, where the synergy between different current as well as future experiments has been considered. In principle, future neutrino oscillation experiments have sensitivity reach to perform precision test of three neutrino oscillation paradigm and to probe new physics beyond standard model(SM). In neutrino oscillation experiments, one model-independent way to study new physics(NP) is given by the framework of non-standard interactions(NSI)\cite{ohlsson,miranda}. An alternative phenomena to explain neutrino flavor transitions, on the basis of NSI, was first proposed by Wolfenstein\cite{wolf}. Although, we know that they will show their effect in neutrino oscillation experiments at sub-leading level but, are important, with the emergence of next generation experiments like T2HK\cite{t2hk}, DUNE\cite{dune}, T2HKK\cite{t2hkk} etc., where such type of interactions can be probed. In general, the NSIs may manifest itself in propagation of neutrino through matter and the processes involved in its creation and detection. The possible manifestations of NSIs have been widely studied in the literature and bounds on NSI parameters have been derived from various experiments\cite{biggio,ohlsson2,ohlsson,miranda}. Furthermore, the model-independent bounds on NSI in production and detection regions are an order of magnitude stronger than the matter NSI\cite{biggio}. In this work, we focus on matter NSI which can be defined by dimension-six four-fermion operators as\cite{op1,op2} \begin{equation}\label{lagrangian} \mathcal{L}_{NSI}=2\sqrt{2}G_{F}\epsilon_{\alpha\beta}^{\zeta \mathcal{K}}\left[ \bar\nu_{\alpha}\gamma^{\rho}P_{L}\nu_{\beta}\right] \left[\bar\zeta\gamma_{\rho}P_{\mathcal{K}}\zeta\right]+ H.c., \end{equation} where $\alpha,\beta=e,\mu,\tau$, $\mathcal{K}=L,R$, $\zeta=u,d,e$ and $\epsilon_{\alpha\beta}^{\zeta \mathcal{K}}$ are dimensionless parameters indicating the strength of the new interaction having units of $G_{F}$. To probe matter NSI long baseline neutrino experiments(LBNE) are ideal because they are more sensitive towards neutral current interactions. The next generation LBNE such as Deep Underground Neutrino Experiment(DUNE)\cite{dune}, Tokai-to-Hyper-Kamiokande(T2HK)\cite{t2hk} and Tokai-to Hyper-Kamiokande-and-Korea(T2HKK)\cite{t2hkk} may reach the sensitivity to reveal NSI in neutrino sector. In the leptonic sector, the $CP$ violation can render leptogenesis mechanism which in turn may shed light on baryogenesis\cite{lep1,lep2}. It is very difficult to measure leptonic $CP$-violation in presence of NSI as it will is get bewildered by the existence of possible $CP$-violation generated by NSI itself. Undoubtedly, the existence of NSI have opened an entirely new window to explore NP beyond standard model. Previously, the authors of ref.\cite{pd1} have explored the $CP$ violation in the leptonic sector due to standard and non-standard interactions and studied parameter degeneracies in neutrino oscillations. In ref.\cite{pd2}, the degeneracies in LBNE from non-standard interactions has been studied and in ref.\cite{goswami1}, the authors have studied the impact of various parameter degeneracies introduced by non-zero NSI and the $CP$ precision of DUNE. The authors of refs.\cite{mehta} and \cite{goswami2} have explored the effects of NSI on $CP$ violation sensitivity and hierarchy sensitivity at DUNE, respectively. In ref.\cite{pd3} the authors have studied the sensitivity to mass hierarchy, the octant of $\theta_{23}$ and $CP$ phase $\delta$ in the future long baseline experiments T2HK and DUNE assuming standard interactions(SI) only. In the present work, we have focused on (i) resolving the SI degeneracies viz. hierarchy degeneracy and octant degeneracy in presence of discovery potential of NSI and (ii) resolving the degeneracy between standard and non-standard $CP$-phase, with DUNE and T2HKK experiments. We organize the paper as follows: in section II, we present the oscillation probability in presence of NSIs. We discuss about the simulation details and long baseline experiments DUNE and T2HKK, in section III. In section IV, we discuss the prospects to resolve parameter degeneracies in LBNEs. We have presented our results and subsequent discussion in section V. Finally, we conclude in section VI. \section{Oscillation Probabilities} The Hamiltonian for the neutrino propagation in presence of matter NSI can be written as, \begin{equation}~\label{hamiltonian} H=\frac{1}{2E}\left[U diag(0,\Delta m_{21}^{2},\Delta m_{31}^{2}){U}^{\dagger}+V\right], \end{equation} where, $U$ is the PMNS mixing matrix having three mixing angles$(\theta_{ij},i<j=1,2,3)$ and one $CP$ phase $\delta$, $\Delta m_{ji}^{2}\equiv m_{j}^{2}-m_{i}^{2}$. $V$ is the matter potential due to the neutrino interaction with matter, viz. \begin{equation}~\label{matterpotential} V=\mathcal{A}\left( \begin{array}{ccc} 1+\epsilon_{ee} & \epsilon_{e\mu}e^{i\delta_{e\mu}} & \epsilon_{e\tau}e^{i\delta_{e\tau}} \\ \epsilon_{e\mu}e^{-i\delta_{e\mu}} & \epsilon_{\mu\mu} & \epsilon_{\mu\tau}e^{i\delta_{\mu\tau}} \\ \epsilon_{e\tau}e^{-i\delta_{e\tau}}&\epsilon_{\mu\tau}e^{-i\delta_{\mu\tau}}&\epsilon_{\tau\tau} \end{array} \right), \end{equation} where, $\mathcal{A}\equiv 2\sqrt{2}G_{F}N_{e}(r)E$. The unit contribution in the first element of the matrix $V$ is due the matter term contribution from standard charged-current interactions. The diagonal element of $V$ are real i.e, $\delta_{\alpha\beta}=0$ for $\alpha=\beta$ and $\epsilon_{\alpha\beta}\equiv \sum_{\zeta,\mathcal{K}}\epsilon_{\alpha\beta}^{\zeta \mathcal{K}}\frac{N_{\zeta}}{N_{e}}$. The oscillation probability for $\mu\rightarrow e$ channel can be written as\cite{pd2} \begin{widetext} \begin{eqnarray}~\label{probability} \nonumber P(\nu_{\mu}\rightarrow\nu_{e})= && p^{2}f^{2}+2pqfg\cos\left(\Delta+\delta\right)+q^{2}g^{2}\\ \nonumber && +4\hat{A}\epsilon_{e\mu}\{pf[s_{23}^{2}f\cos\left(\delta_{e\mu}+\delta\right) +c_{23}^{2}g\cos\left(\Delta+\delta+\delta_{e\mu}\right)]\\ \nonumber && +qg[c_{23}^{2}g\cos\delta_{e\mu}+s_{23}^{2}f\cos(\Delta-\delta_{e\mu})]\}\\ \nonumber &&+4 \hat{A}\epsilon_{e\tau}s_{23}c_{23}\{pf\left[f\cos(\delta_{e\tau}+\delta)-g\cos(\Delta+\delta+\delta_{e\tau})\right]\\ \nonumber &&-qg\left[g\cos\delta_{e\tau}-f\cos(\Delta-\delta_{e\tau})\right]\}+4\hat{A}^2g^{2}c_{23}^{2}|c_{23}\epsilon_{e\mu}-s_{23} \epsilon_{e\tau}|^2\\ \nonumber &&+4\hat{A}^2f^{2}s_{23}^2|s_{23}\epsilon_{e\mu}+c_{23}\epsilon_{e\tau}|^2\\ \nonumber &&+8\hat{A}^2fgs_{23}c_{23}\{c_{23}\cos\Delta[s_{23}(\epsilon_{e\mu}^2-\epsilon_{e\tau}^{2})\\ \nonumber &&+2c_{23}\epsilon_{e\mu}\epsilon_{e\tau}\cos(\delta_{e\mu}-\delta_{e\tau})]\\ \nonumber &&-\epsilon_{e\mu}\epsilon_{e\tau} \cos(\Delta-\delta_{e\mu}+\delta_{e\tau})\}\\ &&+\mathcal{O}(s_{13}^2\epsilon,s_{13}\epsilon^{2},\epsilon^{3}), \end{eqnarray} \begin{eqnarray}~\label{parameter} p\equiv2s_{13}s_{23},q\equiv2rs_{12}c_{12}c_{23},r=|\Delta m_{21}^{2}/\Delta m_{31}^{2}|,(f,\bar{f})\equiv \frac{\sin[\Delta(1\mp\hat{A}(1+\epsilon_{ee}))]}{(1\mp\hat{A}(1+\epsilon_{ee}))},\\ g\equiv \frac{\sin(\hat{A}(1+\epsilon_{ee})\Delta)}{\hat{A}(1+\epsilon_{ee})}, \Delta\equiv\bigg|\frac{\Delta m_{31}^{2} L}{4E}\bigg|, \hat{A}\equiv\bigg|\frac{A}{\Delta m_{31}^{2}}\bigg|. \end{eqnarray} \end{widetext} where, $s_{ij}=\sin\theta_{ij},c_{ij}=\cos\theta_{ij},i<j$, $(i,j)=1,2,3$. Similar expression can be obtained for inverted hierarchy(IH) by replacing $\Delta m_{31}^{2}\rightarrow-\Delta m_{31}^{2}$ (i.e. $\Delta\rightarrow-\Delta, \hat{A}\rightarrow-\hat{A}, f\rightarrow-\bar{f}, g\rightarrow-g$ and $q\rightarrow-q$). The expression for antineutrino oscillation probability can be obtained by replacing $\hat{A}\rightarrow-\hat{A}, \delta\rightarrow-\delta$ and $\delta_{\alpha\beta}=-\delta_{\alpha\beta}$ in Eqn. (\ref{probability}). \section{Experimental Setups} Considering the sensitivity reach of the present and future long baseline neutrino oscillation experiments(for example, DUNE and T2HKK), It is very important to study the individual and collective effects of NSI parameters on parameter degeneracies. We have used GLoBES software\cite{glb1, glb2} with best-fit values and ranges of the neutrino mixing parameters, as given in \cite{data}, to simulate the DUNE and T2HKK. The experimental configurations considered in the present work are as follows: \subsection{DUNE} The DUNE experiment\cite{dune} with baseline 1300 km sends neutrinos from Fermilab to the Homestake mine in South Dakota. We adopted the DUNE CDR\cite{dune} with 35 kton liquid argon(LAr) detector setting on the axis with respect to the beam direction. There are various options for beam design and we choose the optimized design that utilizes an 80 GeV proton beam with a power of 1.0 MW, which corresponds to 5.0$\times 10^{20}$ protons on target per year. We assume 5 + 5 years of run time in neutrino and antineutrino modes, respectively. The total exposure comes is around 350 kt.MW.years. \subsection{T2HKK} The T2HKK experiment\cite{t2hkk} with two detectors one in the Kamioka mine, and a second in Korea. The Hyper-K detector (HK) is located in same place as the T2HK\cite{t2hk} experiment, with a $2.5^{o}$ off-axis-angle and a 295 km baseline. For the Korean detector(KD) we consider two options for the off-axis-angle: (a) T2HKK-2.5 with the same $2.5^{o}$ off-axis-angle, and (b) T2HKK-1.5 with a $1.5^{o}$ off-axis-angle. Both KD options are at a baseline of 1100 km. We assume the same neutrino beam as the T2HK experiment with an integrated beam power of 13 MW.years, which corresponds to total 2.7$\times 10^{22}$ POT. The total running time is 10 years with a ratio of 1:3 between neutrino and antineutrino modes. \section{Parameter Degeneracies} In general, the different set of oscillation parameter gives the same value of the oscillation probability resulting in parameter degeneracies. Because of this, the true solutions can get mimicked by the false solutions making it difficult to uniquely determine the parameters. In this section, we focus on parameter degeneracy which involve NSI. We explore the mass hierarchy degeneracy(sign degeneracy), the octant degeneracy and $CP$-phase degeneracy(SI and NSI $CP$-phase degeneracy) with future long baseline experiments DUNE and T2HKK. \subsection{Mass hierarchy degeneracy} In the determination of unknown neutrino mixing parameters an ambiguity exists in correlated way between $\delta$ and sign of $\Delta m_{31}^{2}$. The sign of $\Delta m_{31}^{2}$ can be determined by measuring interference between the vacuum and the matter effects. The simultaneous determination of $\delta$ and sign of $\Delta m_{31}^{2}$ can be done in long baseline experiments in both standard\cite {pd3} and non-standard cases \cite{pd1}. Thus, we study the prospects to resolve this degeneracy with two future long baseline experiments DUNE and T2HKK involving NSIs. Throughout this work we have considered the $\nu_\mu\rightarrow\nu_e$ channel to study various parameter degeneracies. We have obtained plots for DUNE and T2HKK for the two cases assuming (i) all NSI parameters non-zero, and (ii) only $\epsilon_{e\mu} ,\delta_{e\mu}$ are non-zero. \begin{figure*}[htp] \epsfig{file=fg1.eps, height=6cm, width=6cm}\hspace{1cm} \epsfig{file=fg2.eps, height=6cm, width=6cm} \end{figure*} \begin{figure*}[htp] \epsfig{file=fg3.eps, height=6cm, width=6cm}\hspace{1cm} \epsfig{file=fg4.eps, height=6cm, width=6cm} \caption{~\label{fig1}The appearance probability $P(\nu_{\mu}\rightarrow\nu_{e})$ with neutrino beam energy $E$ in GeV for DUNE(first row) and T2HKK(second row). The left(right) panel describes mass hierarchy assuming all($\epsilon_{e\mu}, \delta_{e\mu}$) NSI parameters non-zero.} \end{figure*} \subsection{Octant degeneracy} The oscillation probabilities for disappearance channels $1-P(\nu_{\mu}\rightarrow\nu_{e})$(neutrino) and $1-P(\bar{\nu_{\mu}}\rightarrow\bar{\nu_{e}})$(antineutrino) show main contribution from $\sin^{2}2\theta_{23}$. In case, $\theta_{23}$ is not maximal, we have two possibilities: either $\cos2\theta_{23}>0$ or $\cos2\theta_{23}<0$. This ambiguity creates two solutions $(\theta_{23},\delta)$ and $(90^{o}-\theta_{23},\delta')$. The resolution of uncertainty in $\theta_{23}$ due to octant degeneracy is important for precise measurement of $\theta_{23}$. We study this degeneracy in both neutrino and antineutrino mode with DUNE and T2HKK. \begin{figure*}[htp] \epsfig{file=fg5.eps, height=6cm, width=6cm}\hspace{1cm} \epsfig{file=fg6.eps, height=6cm, width=6cm} \end{figure*} \begin{figure*}[htp] \epsfig{file=fg7.eps, height=6cm, width=6cm}\hspace{1cm} \epsfig{file=fg8.eps, height=6cm, width=6cm} \caption{~\label{fig2}The appearance probability for neutrino(antineutrino) mode with neutrino beam energy $E$ in GeV for DUNE(first row) and T2HKK(second row). The Octant degeneracy is represented for neutrino mode(left panel) and for antineutrino mode(right panel).} \end{figure*} \subsection{$CP$ phase degeneracy} In presence of new physics there may appear additional sources of $CP$ violation other than due to Dirac-type $CP$ phase $\delta$. The $CP$ effects will, in general, include contributions from both standard and non-standard $CP$ phases. In this work we have investigated the prospects for disentanglement of standard($\delta$) and non-standard $CP$ phases with DUNE+T2HKK using $CP$ fractions. $F(\delta)$ and $F(\delta_{e\mu})$ are the $CP$ fractions corresponding to standard and non-standard $CP$ phases, respectively\cite{cpfraction}. \begin{figure*}[htp] \epsfig{file=fg9.eps, height=6cm, width=6cm}\hspace{1cm} \epsfig{file=fg10.eps, height=6cm, width=6cm} \caption{~\label{fig3}The $CP$ asymmetry with neutrino beam energy $E$ in GeV for DUNE+T2HKK(left panel) for both standard and non-standard $CP$ phases. The $CP$ fraction corresponding to both $\delta_{CP}$ and $\delta_{e\mu}$(right panel).} \end{figure*} \section{Results and Discussion} The degeneracy in sign of $\Delta m_{31}^{2}$ and $\delta$ can be resolved with the experiments which involve matter effects such as DUNE and T2HKK. In left(right) panel of Fig.(1), we have shown the mass hierarchy degeneracy assuming all($\epsilon_{e\mu}, \delta_{e\mu}$) NSI parameters, along with corresponding $CP$ phases, to be non-zero for DUNE and T2HKK experiments. The region between solid and dashed lines($-\pi/2\le\delta\le\pi/2$) correspond to the normal hierarchy(NH) whereas the region between dash-dotted and dotted lines($-\pi/2\le\delta\le\pi/2$) correspond to the inverted hierarchy(IH) of neutrino masses. The normal and inverted hierarchy regions overlap for DUNE and T2HKK experiments due to contributions from all the non-zero NSI parameters(left panel) making it difficult to resolve the mass degeneracy in these experiments. However, there is no overlap in the NH and IH regions for DUNE and T2HKK for energy range 1 to 4 GeV assuming only $\epsilon_{e\mu}$ and corresponding phase to be non-zero(right panel). Furthermore, the future long baseline experiments such as DUNE and T2HKK with higher statistics and better energy resolution focusing on neutrino beam energy 1 to 4 GeV may provide better opportunity to resolve mass hierarchy degeneracy. However, for the same energy range DUNE have brighter prospects to resolve the mass degeneracy than T2HKK. In Fig.(\ref{fig2}), we have shown the status octant degeneracies in DUNE and T2HKK. It is evident from Fig.(\ref{fig2}) that octant degeneracy can be resolved with DUNE and T2HKK experiments using combination of neutrino and antineutrino oscillation modes. In Fig.(\ref{fig2}), the region between solid and dashed lines($-\pi/2\leq\delta\leq\pi/2$) represents the lower octant(LO) and the region between dash-dotted and dotted lines($-\pi/2\leq\delta\leq\pi/2$) represents the higher octant(HO). The left(right) panel in Fig.(\ref{fig2}) represents neutrino(antineutrino) mode of DUNE and T2HKK experiments. For LO($\theta_{23}<45^{o}$), with $\delta=\pi/2$ and for HO($\theta_{23}>45^{o}$) with $\delta=-\pi/2$, both DUNE and T2HKK can resolve the octant degeneracies with neutrino mode only. Moreover, for LO with $\delta=-\pi/2$ and HO with $\delta=\pi/2$, octant degeneracies can be resolved with both DUNE and T2HKK with antineutrino mode only. Thus, in general, the neutrino and antineutrino modes are exigent to resolve octant degeneracy in DUNE and T2HKK experiments. The current and future neutrino oscillation experiments are diligently aiming at measuring neutrino mass hierarchy and $CP$ violating phase $\delta$. In presence of NSI (for example, assuming $\epsilon_{e\mu}$ and $\delta_{e\mu}$ non-zero) the situation becomes more complicated due to presence of additional sources of $CP$ violation. The nature may intromit $CP$ violation for wide range of $\delta$($\delta_{e\mu}$). In the present work, instead of focusing on measurement of $CP$ phases($\delta,\delta_{e\mu}$) we have obtained all possible $\delta(true)$ and $\delta_{e\mu}(true)$ values which are different from $CP$ conserving values of $\delta$ and $\delta_{e\mu}$ at certain confidence level obtained from neutrino oscillation experiments. It is advantageous to use $CP$ fraction formalism \cite{cpfraction} to study $CP$ violation and to disentangle the standard and non-standard $CP$ violation effects in neutrino oscillation experiments. The $CP$ fraction corresponding to $\delta(\delta_{e\mu})$ may be defined as the fraction $F(\delta)(F(\delta_{e\mu}))$ of total allowed range ($0$ to $2\pi$) over which $CP$ violation can be discovered for $\delta(true)(\delta_{e\mu}(true))$. We have fixed absolute values of NSI parameters to their true values and $\delta(test)$, $\delta_{e\mu}(test)$ to their $CP$ conserving values $(\delta,\delta_{e\mu})\in\{(0,0),(0,\pi),(\pi,0),(\pi,\pi)\}$ taking into account both mass hierarchies in test values. To disentangle the $CP$ violation effects from standard and non-standard $CP$ phases using $CP$ fractions we have shown the effect of the real NSI parameter ($\epsilon_{e\mu}$) on the $CP$ violation discovery reach for DUNE+T2HKK experiments. In Fig.(\ref{fig3}(a)), we have shown $CP$ asymmetry with neutrino beam energy $E$ for both $\delta$ and $\delta_{e\mu}$ for DUNE+T2HKK. In Fig.(\ref{fig3}(a)), the solid (dashed) line represents $\delta=0,\delta_{e\mu}=\pi/2(\delta=\pi/2,\delta_{e\mu}=0)$ case whereas, in Fig.(\ref{fig3}(b)), the solid (dashed) line represents the CP fraction corresponding to the $\delta_{e\mu}(\delta)$. The contribution to CP asymmetry from non-standard $CP$ phase $\delta_{e\mu}$ is more than the standard $CP$ phase $\delta$ for neutrino beam energy 1.5 to 7 GeV which is, also, evident from Fig.(\ref{fig3}(b)). The $CP$ degeneracy between standard and non standard $CP$ phases can be resolved in DUNE+T2HKK as the $CP$ fraction for $\delta$($F(\delta)\approx0.57$) is smaller than that of $\delta_{e\mu}$($F(\delta_{e\mu})\approx0.76$). \section{Conclusions} In conclusion, we have investigated the sensitivities of DUNE and T2HKK experiments to resolve mass hierarchy and octant degeneracies in presence of matter NSI. We have, also, studied the $CP$ phase degeneracy due to standard and non-standard $CP$ phases for DUNE+T2HKK. We find that the mass hierarchy degeneracy cannot be resolved in presence of all NSI parameters due to their large experimental uncertainties(Figs.1(a) and 1(c)). However, it can be resolved for neutrino beam energy range 1 to 4 GeV in case of one non-zero NSI parameter $\epsilon_{e\mu}$ and corresponding NSI $CP$ phase$\delta_{e\mu}$ for DUNE and T2HKK experiments(Figs.1(b) and 1(d)). Furthermore, for LO($\theta_{23}<45^{o}$), with $\delta=\pi/2$ and for HO($\theta_{23}>45^{o}$) with $\delta=-\pi/2$, both DUNE and T2HKK can resolve the octant degeneracies with neutrino mode only. Moreover, for LO with $\delta=-\pi/2$ and HO with $\delta=\pi/2$, octant degeneracies can be resolved with both DUNE and T2HKK with antineutrino mode only. Thus, combination of neutrino and antineutrino mode of DUNE and T2HKK can resolve the octant degeneracy. The contribution to CP asymmetry from non-standard $CP$ phase $\delta_{e\mu}$ is more than the standard $CP$ phase $\delta$ for neutrino beam energy 1.5 to 7 GeV(Fig.(3(a))) which is, also, evident from Fig.(\ref{fig3}(b)). The $CP$ fraction corresponding to NSI phase $\delta_{e\mu}$ is found to be larger than that of SI phase $\delta$(Fig.(\ref{fig3}(b))) in combined analysis of DUNE+T2HKK. Thus, the combination of DUNE and T2HKK experiments can, in principle, disentangle the standard and non-standard $CP$ phase degeneracy. \vspace{1cm} \textbf{\Large{Acknowledgements}}\\ The authors would like to thank Jogesh Rout for valuable discussions during this work. S. V. acknowledges the financial support provided by University Grants Commission (UGC)-Basic Science Research(BSR), Government of India vide Grant No. F.20-2(03)/2013(BSR). S. B. acknowledges the financial support provided by the Central University of Himachal Pradesh. The authors, also, acknowledge Department of Physics and Astronomical Science for providing necessary facility to carry out this work.
\section{Introduction} The area product and entropy product of the multi-horizon black holes has been interrogated in order to interpret the black hole entropy $\delta=$ {\Large $\frac{A}{4}$} at the imperceptible level. Previous researches indicated that the entropy product and area product for multi-horizon stationary, axisymmetric black holes are frequently free from Arnowitt-Deser-Misner (ADM) mass and rely only upon the charge, angular momentum etc. The researchers showed that the enropy of the outer and inner horizons in string theory and $M$-theory community are of the pattern \cite{1}-\cite{3} \begin{equation}\label{Z1} \delta_{\pm}=2\pi\big(\sqrt{N_{L}}\pm\sqrt{N_{R}}\big), \end{equation} where $N_{L}$ and $N_{R}$ are named for the left and right moving modes of a weakly coupled $2$-dimensional conformal field theory (CFT). The product $\delta_{+}\delta_{-}=4\pi^{2}\big(N_{L}-N_{R}\big)$ should be represented in integer multiples of $4\pi^{2}$ \cite{2}-\cite{5}. Absolutely, one could set up \begin{equation}\label{Z2} \delta_{+}\delta_{-}=(2\pi)^{2}(J^{2}+q_{1}q_{2}q_{3}q_{4}), \end{equation} and \begin{equation}\label{Z3} \delta_{+}\delta_{-}=(2\pi)^{2}(J_{1}J_{2}+q_{1}q_{2}q_{3}), \end{equation} for $4$ and $5$ dimensional black holes, respectively. These products are free from mass but surely rely upon charges and angular momenta. In $4$ dimension, the entropy product is represented by one angular momentum $J$ and four charges $q_{1}$, $q_{2}$, $q_{3}$, $q_{4}$. But in $5$ dimension, the entropy product is expressed by two angular momenta $J_{1}$, $J_{2}$ and three charges $q_{1}$, $q_{2}$, $q_{3}$. The researchers \cite{6}-\cite{9} illustrated that the entropy product of the outer and inner horizons of Kerr-Newman (KN) black hole has the expression \begin{equation}\label{Z4} \delta_{+}\delta_{-}=(2\pi)^{2}\bigg(J^{2}+\frac{q^{4}}{4}\bigg). \end{equation} It is really free from the mass $M$ of the black hole. Clearly, it relies upon the angular momentum $J$ and charge $q$ of the black hole. The universal nature of the entropy product of black ring and black string solutions have been discussed \cite{10}. The essential point is that the entropy product of inner and outer horizons could be adopted to decide whether the Bekenstein-Hawking entropy may be expressed as a Cardy formula, hence supporting some witness for CFT statement of the comparable microstates \cite{10,11,12}. Apparently, the Curir was the first who worked out at the area sum and entropy sum of Kerr black hole \cite{13}. The researchers have investigated the universal property of entropy sum of the ADS spacetime \cite{14}. It is a popular reality that outer horizon is an infinite red shift surface although inner horizon is an infinite blue shift surface \cite{15}. Therefore, when a spectator travel across the outer horizon $r = r_{+}$, pursuing a future directed time-like geodesic, is endlessly `lost' to an outer spectator and any radiation sent by such a spectator at the moment of crossing will be infinitely red shifted. Although, when the same spectator travel across the inner horizon $r = r_{-}$, pursuing a future directed time-like geodesic and at the moment of crossing he/she will encounter a panorama of the complete history of the exterior universe and any radiation sent by such a spectator at the moment of crossing will be infinitely blue shifted. This is the elementary dissimilarities between the outer and inner horizons. The entropy product and area product of multi-horizons are not forever universal i.e., mass freedom and occasionally they also unsuccessful. The author discussed that these possessions are also hold for Kerr-Newman-Taub-NUT (KNTN) black hole \cite{16}. The researcher surveyed that as a result of the existence of NUT (Newman-Unti-Tamburino) parameter what could be the differences are revealed in the Smarr's mass prescription \cite{17,18} and Christodoulou-Ruffini mass prescription counter to KN geometry. He also particularly validated that the first law of black hole thermodynamics does not influence for KNTN black hole. He additionally manifested that Smarr-Gibbs-Duhem relation does not establish for KNTN black hole. In \cite{19}, the authors scrutinized the thermodynamics of Kerr-Newman-Kasuya and Reissner-Nordstr\"{o}m black hole with a global monopole on the outer and inner horizons. We will discuss the universal behaviour for KN black hole in presence of quintessence \cite{20}. We will illustrate as a result of the existence of normalization factor what would be the differences reveal in the entropy sum, area sum, area product and entropy product in contrast with KN black hole. This is the main goal of this research paper. Applying the entropy product, we also compute the entropy bound, area bound and irreducible mass bound for both the horizons of KN black hole in presence of quintessence. These are fundamentally all geometrical bound which was first suggested by Penrose \cite{23} and now it is known as Penrose inequality. The formation of the paper is as follows. In Section \ref{Sec:A2}, we represent that the area product and entropy product of both the outer and inner horizons satisfy the universal properties by cause of the mass independence. Such products imply to be universal in nature. Whereas, the area sum and entropy sum of both the horizons do not show the universal properties by cause of the mass dependence. In Section \ref{Sec:A3}, we prove that the black hole mass or ADM mass can be demonstrated with regard to the area of both horizons. We find the Christodoulou-Ruffini mass prescription for KN spacetime in presence of quintessence in Section \ref{Sec:A4}. We further manifest the Christodoulou's irreducible mass product of the outer and inner horizons are free from mass. Lastly, we conclude in Section \ref{Sec:A5} \section{Kerr-Newman Black Hole in Quintessence}\label{Sec:A2} In Boyer-Lindquist coordinates, the KN metric in quintessence is determined by the following parameters i.e., the mass $M$, spin parameter $a$, electric charge $q$, quintessential field parameter $\omega_{q}$, angular momentum $J$ and normalization factor $c$. The metric of charge rotating black hole in presence of quintessence is given by \cite{20} \begin{eqnarray}\label{1} ds^{2}&=&-\frac{1}{\Sigma}\big(\Delta-a^{2}\sin^{2}\theta\big)dt^{2}-\frac{2}{\Sigma}\big(r^{2}+a^{2}-\Delta\big)a\sin^{2}\theta dtd\phi+\frac{1}{\Sigma}\sin^{2}\theta\Big(\big(r^{2}+a^{2}\big)^{2}-\Delta a^{2}\sin^{4}\theta\Big) d\phi^{2}\notag\\&&+\frac{\Sigma}{\Delta}dr^{2}+\Sigma d\theta^{2}, \end{eqnarray} where \begin{eqnarray}\label{A1} a&=&\frac{\emph{J}}{\emph{M}}, \notag\\ \Sigma&=& r^{2}+a^{2}cos^{2}\theta, \\ \Delta&=& r^{2}-2Mr+a^{2}+q^{2}-cr^{1-3\omega_{q}}. \end{eqnarray} The quintessence field parameter $\omega_{q}$ can take the value between $-1 <w_{q} < -\frac{1}{3}$. Let us consider the least upper bound of quintessential field parameter \begin{equation}\label{A3} w_{q}=-\frac{1}{3}. \end{equation} We can compute the radius of the horizons by the solution of the quadratic equation $\Delta=0$ \begin{equation}\label{3} r_{\pm}=\frac{M\pm\sqrt{M^{2}-\big(1-c\big)\big(a^{2}+q^{2}\big)}}{1-c},~~~~\text{where}~~~~r_{+}>r_{-}. \end{equation} In consideration of \begin{equation}\label{a} M^{2}-\big(1-c\big)\big(a^{2}+q^{2}\big)\geq0. \end{equation} The sum and product of the horizons are very beneficial results given as \begin{eqnarray} r_{+}+r_{-}&=&\frac{2M}{1-c},\label{4} \\ r_{+}r_{-}&=&\frac{a^{2}+q^{2}}{1-c}.\label{5} \end{eqnarray} Presently the area of the horizons is figured out as \begin{eqnarray}\label{2} A_{\pm}&=&\int_{0}^{2\pi}\int_{0}^{\pi} \sqrt{g_{\theta\theta} g_{\phi\phi}}d\theta d\phi\notag\\&=&4\pi\big(r_{\pm}^{2}+a^{2}\big). \end{eqnarray} The angular velocity at both horizons is computed as \begin{equation}\label{***} \Omega_{\pm}=\frac{a}{r^{2}_{\pm}+a^{2}}. \end{equation} The surface gravity of both horizons is given by \begin{eqnarray}\label{6} \kappa_{\pm}&=&\frac{\big(1-c\big)\big(r_{\pm}-r_{\mp}\big)}{2\big(r_{\pm}^{2}+a^{2}\big)}\notag\\&=&\frac{\big(1-c\big)^{2}\big(r_{\pm} -r_{\mp}\big)}{2\big(2Mr_{\pm}-a^{2}c-q^{2}\big)}, \end{eqnarray} where $\kappa_{+}>\kappa_{-}$. \\The semi classical Bekenstein-Hawking \cite{24},\cite{25} entropy of the horizons is found to be \begin{eqnarray}\label{7} \delta_{\pm}&=&\frac{A_{\pm}}{4}\notag\\&=&\pi\bigg(\frac{2Mr_{\pm}-a^{2}c-q^{2}}{1-c}\bigg). \end{eqnarray} The Hawking temperature at the horizons is given as \begin{eqnarray}\label{8} T_{\pm}&=&\frac{\kappa_{\pm}}{2\pi}\notag\\&=&\frac{\big(1-c\big)\big(r_{\pm}-r_{\mp}\big)}{4\pi\big(r_{\pm}^{2}+a^{2}\big)}. \end{eqnarray} Clearly $T_{+}>T_{-}$. \\The area sum of both the horizons \begin{equation}\label{8a} A_{+}+A_{-}=8\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg). \end{equation} It implies that the area sum of both the horizons relies upon the mass $M$, charge $q$, spin parameter $a$ and the normalization factor $c$. Thus, the area sum is not universal. \\Also, the product of area of both the horizons is \begin{equation}\label{9a} A_{+}A_{-}=(8\pi)^{2}\Bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\Bigg). \end{equation} Now the area product is free from mass $M$ but it surely relies upon the angular momentum $J$, charge $q$, spin parameter $a$ and the normalization factor $c$. Hence, the area product is universal. \\Likewise, we have worked out at the entropy sum and product of both the horizons \begin{equation}\label{10} \delta_{+}+\delta_{-}=2\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg), \end{equation} and \begin{equation}\label{11} \delta_{+}\delta_{-}=(2\pi)^{2}\bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\bigg). \end{equation} Here entropy sum relies upon the mass $M$ but entropy product does not rely upon it. \\We also calculate the entropy minus \begin{equation}\label{12} \delta_{\pm}-\delta_{\mp}=\frac{2\pi M\big(r_{\pm}-r_{\mp}\big)}{1-c}. \end{equation} The sum of entropy inverse is given as \begin{equation}\label{13} \frac{1}{\delta_{+}}+\frac{1}{\delta_{-}}=\frac{2M^{2}-\big(1-c\big)\big(a^{2}c+q^{2}\big)}{2\pi\big[4J^{2}+\big(a^{2}c+q^{2}\big)^{2}\big]}. \end{equation} The minus of entropy inverse is calculated as \begin{equation}\label{14} \frac{1}{\delta_{\pm}}-\frac{1}{\delta_{\mp}}=\mp\frac{4M\sqrt{M^{2}-\big(1-c\big)\big(a^{2}+q^{2}\big)}}{\pi\big[4J^{2}+\big(a^{2}c+q^{2}\big)^{2}\big]}. \end{equation} It shows that entropy minus, sum of entropy inverse and minus of entropy inverse rely upon mass $M$. \\We also computed Kerr like bound for Kerr-Newman black hole in presence of quintessence by using Eq. (\ref{a}) \begin{equation}\label{21} M^{4}-\big(1-c\big)\big(J^{2}+M^{2}q^{2}\big)\geq0. \end{equation} Also \begin{equation}\label{22} M^{2}=\frac{q^{2}(1-c)+\sqrt{q^{4}(1-c)^{2}+4J^{2}(1-c) }}{2}. \end{equation} In view of $\delta_+\geq\delta_-\geq0$, the entropy product (\ref{11}) permits \begin{equation}\label{17} \delta_{+}\geq\sqrt{\delta_{+}\delta_{-}}=\sqrt{(2\pi)^{2}\bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\bigg)}\geq\delta_{-}, \end{equation} and the entropy sum (\ref{10}) allows \begin{eqnarray*}\label{18a} 2\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg)=\delta_{+}+\delta_{-}\geq\delta_{+}\geq\frac{\delta_{+}\delta_{-}}{2} =\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg)\geq\delta_{-}. \end{eqnarray*} Consequently, the entropy bound of outer horizon is figured out as \begin{eqnarray}\label{19a} \pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg)\leq\delta_{+}\leq2\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg), \end{eqnarray} and the entropy bound of inner horizon is given as \begin{equation}\label{19} 0\leq\delta_{-}\leq\sqrt{(2\pi)^{2}\bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\bigg)}. \end{equation} The entropy bound helps us to find the area bound which we will discover in latter section. Observe that for the case $q=0$, we attain the entropy bound for Kerr black hole in presence of quintessence. Also for $a=0$, we acquire the entropy bound for Reissner-Nordstr\"{o}m (RN) black hole in presence of quintessence. In Table \ref{Atab:1}, we have figured out miscellaneous thermodynamical parameters for Kerr, RN and KN black holes in presence of quintessence for the quintessence field parameter $\omega{q}=-\frac{1}{3}$. \section{Mass Formula}\label{Sec:A3} Let us first calculate surface area to find mass formula for KN Black Hole in presence of quintessence. As reported by the Hawking's \cite{25}, the surface area of a black hole invariably non-negative, i.e., \begin{equation}\label{20} dA\geq 0. \end{equation} The surface area of KN black hole in presence of quintessence is fixed for inner and outer horizons. It can be written as \begin{equation}\label{20} A_{\pm}=4\pi\Bigg(\frac{2M^{2}}{1-c}-\frac{a^{2}c+q^{2}}{1-c}\pm\frac{2\sqrt{M^{4}-\big(1-c\big)\big(J^{2}+M^{2}q^{2}\big)}}{(1-c)^{2}}\Bigg). \end{equation} By flipping the Eq. \ref{20}), we can compute the black hole mass or ADS mass with regard to the area of both the horizons, \begin{equation}\label{24} M^{2}=\frac{(1-c)^{2}}{A_{\pm}}\Bigg[\frac{A_{\pm}^{2}}{16\pi}+\frac{A_{\pm}\big(a^{2}c+q^{2}\big)}{2(1-c)}+\frac{4\pi J^{2}}{(1-c)^{2}}+\pi\bigg(\frac{a^{2}c+q^{2}}{1-c}\bigg)^{2}\Bigg]. \end{equation} It is noteworthy that the mass can be shown with regard to the area of the outer and inner horizons. Presently, we can conclude the differential of mass for KN spacetime in presence of quintessence. It can be represented in four consistent quantities of both the horizons as \begin{equation}\label{29} dM=\Gamma_{\pm} dA_{\pm}+\Omega_{\pm} dJ+\Phi_{\pm}^{q}dq+\Phi_{\pm}^{a}da, \end{equation} where \begin{eqnarray} \Gamma_{\pm}&=&\frac{1}{2MA_{\pm}^{2}}\bigg[\frac{(1-c)A_{\pm}^{2}}{16\pi}-\frac{ a^{2}c(1-c)A_{\pm}}{2}-4\pi J^{2}-\pi\big(a^{2}c+q^{2}\big)^{2}\bigg],\label{A29}\\ \Omega_{\pm}&=&\frac{4\pi J}{MA_{\pm}},\label{B29}\\ \Phi_{\pm}^{q}&=&\frac{qA_{\pm}+4\pi q\big(a^{2}c+q^{2}\big)}{2MA_{\pm}},\label{C29}\\ \Phi_{\pm}^{a}&=&\frac{ac(1-c)A_{\pm}^{2}+4\pi acA_{\pm}\big(a^{2}c+q^{2}\big)}{2MA_{\pm}^{2}},\label{D29} \end{eqnarray} where \begin{eqnarray} \Gamma_{\pm}&=&\text{Effective surface tension of both the horizons},\notag\\ \Omega_{\pm}&=&\text{Angular velocity of both the horizons},\notag\\ \Phi_{\pm}^{q}&=&\text{Electromagnetic potentials of both the horizons for electric charge},\label{E29}\\ \Phi_{\pm}^{a}&=&\text{Electromagnetic potentials of both the horizons for spin parameter}.\notag \end{eqnarray} The mass $M$ (\ref{24}) is a homogeneous function of degree $\frac{1}{2}$ in $(A_{\pm}, J, Q^{2}, a^{2})$ i.e., $M\Big(\frac{1}{2}A_{\pm}, \frac{1}{2}J, \frac{1}{2}Q^{2}, \frac{1}{2}a^{2}\Big)=\frac{1}{2}M(A_{\pm}, J, Q^{2}, a^{2})$. By applying Euler's theorem, we can indicate the mass with regard to $ A_{\pm}$, $J$, $Q$ and $a$ as follows \begin{equation}\label{31} M=2\Gamma_{\pm} A_{\pm}+2\Omega_{\pm} J+\Phi_{\pm}^{q} Q+\Phi_{\pm}^{a}a, \end{equation} where $A_{\pm}$, $\Gamma_{\pm}$, $\Omega_{\pm}$, $\Phi_{\pm}^{q}$ and $\Phi_{\pm}^{a}$ are represented by \ref{20}), \ref{A29}), \ref{B29}), \ref{C29}) and \ref{D29}), respectively. \section{Christodoulou's Irreducible Mass bound}\label{Sec:A4} According to Penrose mechanism (later called Penrose process) \cite{26}, the surface area of mass increases when black hole transforms. Later on, Christodoulou has proved that irreducible mass $M_{\text{irr}}$ can not be altered by mode of any process. He showed that there is a connection between irreducible mass and surface area. Consequently, the irreducible mass $M_{\text{irr}}$ for the outer and inner horizons can be expressed as \begin{equation}\label{30} M_{\text{irr},\pm}=\sqrt{\frac{A_{\pm}}{16\pi}}=\frac{\sqrt{r_{\pm}^{2}+a^{2}}}{2}. \end{equation} We can indicate the area and angular velocity with regard to the irreducible mass \begin{equation}\label{32} A_{\pm}=16\pi (M_{\text{irr},\pm})^{2}, \end{equation} also \begin{equation}\label{33} \Omega_{\pm}=\frac{a}{4(M_{\text{irr},\pm})^{2}}. \end{equation} The product of the irreducible mass $M_{\text{irr}}$ involves the product of the area \begin{eqnarray} M_{\text{irr},+}M_{\text{irr},-}&=&\sqrt{\frac{A_{+}A_{-}}{(16\pi)^{2}}}.\label{34}\\ &=&\frac{\sqrt{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}}{4(1-c)}.\label{34} \end{eqnarray} It indicates that irreducible mass product is universal because it does not rely upon the mass of the black hole.\\ The Christodoulou-Ruffini mass prescription for KN spacetime in presence of quintessence can be expressed with regard to the irreducible mass $M_{\text{irr}}$, angular momentum $J$, charge $q$, spin parameter $a$ and normalization factor $c$ as \begin{equation}\label{36} M^{2}=\bigg(M_{\text{irr},\pm}(1-c)+\frac{q^{2}}{4M_{\text{irr},\pm}}\bigg)^{2}+\frac{J^{2}}{4(M_{\text{irr},\pm})^{2}}+\frac{a^{2}c}{4}\bigg(2(1-c) +\frac{a^{2}c}{4(M_{\text{irr},\pm})^{2}}+\frac{q^{2}}{2(M_{\text{irr},\pm})^{2}}\bigg). \end{equation} When we make charge parameter $q$ equals to zero, we acquire the following mass prescription \begin{equation}\label{37} M^{2}=\big(M_{\text{irr},\pm}(1-c)\big)^{2}+\frac{J^{2}}{4(M_{\text{irr},\pm})^{2}}+\frac{a^{2}c}{4}\bigg(2(1-c) +\frac{a^{2}c}{4(M_{\text{irr},\pm})^{2}}\bigg). \end{equation} It is the Christodoulou-Ruffini mass prescription for Kerr spacetime in presence of quintessence. When the spin parameter $a$ becomes zero, we attain the mass formula for RN black hole in presence of quintessence.\\ Forthwith, we are interested to find area bound and irreducible mass bound. In view of $r_{+}>r_{-}$, $A_+\geq A_-\geq 0$. Formerly, the area product shows \begin{equation}\label{38} A_{+}\geq\sqrt{A_{+}A_{-}}=\sqrt{(8\pi)^{2}\Bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\Bigg)}\geq A_{-}. \end{equation} The area sum indicates \begin{eqnarray}\label{39} 8\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg)=A_{+}+A_{-}\geq A_{+}\geq\frac{A_{+}+A_{-}}{2}=4\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg). \end{eqnarray} Therefore, the area bound for the outer horizon is given by \begin{equation}\label{40} 4\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg)\leq A_{+} \leq 8\pi\bigg(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\bigg). \end{equation} The area bound for the inner horizon is given by \begin{equation}\label{41} 0\leq A_{-}\leq \sqrt{(8\pi)^{2}\Bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\Bigg)}. \end{equation} \begin{table}[h!] \caption{A comparison of thermodynamical parameters for Kerr, RN and KN black holes in the presence of quintessence for the quintessence field paramter $\omega_{q}=-\frac{1}{3}$.} \label{Atab:1} {\renewcommand{\arraystretch}{1.55} \begin{tabular}{|C{3.25cm}|C{4cm}|C{4cm}|C{4.8cm}|} \hline $\text{Parameter}$ & $\text{Kerr BH}$ & $\text{RN BH}$ & $\text{KN BH}$ \\ \hline $r_{\pm}$ & $\frac{M\pm\sqrt{M^{2}-a^{2}(1-c)}}{1-c}$ & $\frac{M\pm\sqrt{M^{2}-q^{2}(1-c)}}{1-c}$ & $\frac{M\pm\sqrt{M^{2}-\big(1-c\big)\big(a^{2}+q^{2}\big)}}{1-c}$ \\ $r_{+}+r_{-}$ & $\frac{2M}{1-c}$ & $\frac{2M}{1-c}$ & $\frac{2M}{1-c}$ \\ $r_{+}r_{-}$ & $\frac{a^{2}}{1-c}$ & $\frac{q^{2}}{1-c}$ & $\frac{a^{2}+q^{2}}{1-c}$ \\ $A_{\pm}$ & $4\pi\Big(\frac{2Mr_{\pm}-a^{2}c}{1-c}\Big)$ & $4\pi\Big(\frac{2Mr_{\pm}-q^{2}}{1-c}\Big)$ & $4\pi\Big(\frac{2Mr_{\pm}-a^{2}c-q^{2}}{1-c}\Big)$ \\ $A_{+}+A_{-}$ & $8\pi\Big(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c}{1-c}\Big)$ & $8\pi\Big(\frac{2M^{2}}{(1-c)^{2}}-\frac{q^{2}}{1-c}\Big)$ & $8\pi\Big(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\Big)$ \\ $A_{+}A_{-}$ & $(8\pi)^{2}\Big(\frac{4J^{2}+a^{4}c^{4}}{4(1-c)^{2}}\Big)$ & $(8\pi)^{2}\bigg(\frac{4J^{2}+q^{4}}{4(1-c)^{2}}\bigg)$ & $(8\pi)^{2}\bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\bigg)$ \\ $\delta_{\pm}$ & $\pi\Big(\frac{2Mr_{\pm}-a^{2}c}{1-c}\Big)$ & $\pi\Big(\frac{2Mr_{\pm}-q^{2}}{1-c}\Big)$ & $\pi\Big(\frac{2Mr_{\pm}-a^{2}c-q^{2}}{1-c}\Big)$ \\ $\delta_{+}+\delta_{-}$ & $2\pi\Big(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c}{1-c}\Big)$ & $2\pi\Big(\frac{2M^{2}}{(1-c)^{2}}-\frac{q^{2}}{1-c}\Big)$ & $2\pi\Big(\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}\Big)$ \\ $\delta_{+}\delta_{-}$ & $(2\pi)^{2}\Big(\frac{4J^{2}+a^{4}c^{4}}{4(1-c)^{2}}\Big)$ & $(2\pi)^{2}\bigg(\frac{4J^{2}+q^{4}}{4(1-c)^{2}}\bigg)$ & $(2\pi)^{2}\bigg(\frac{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}{4(1-c)^{2}}\bigg)$ \\ $\kappa_{\pm}$ & $\frac{(1-c)^{2}(r_{\pm}-r_{\mp})}{2(2Mr_{\pm}-a^{2}c)}$ & $\frac{(1-c)^{2}(r_{\pm}-r_{\mp})}{2(2Mr_{\pm}-q^{2})}$ & $\frac{(1-c)^{2}(r_{\pm}-r_{\mp})}{2(2Mr_{\pm}-a^{2}c-q^{2})}$ \\ $\kappa_{+}+\kappa_{-}$ & $\frac{4M\big[a^{2}(1-c)-M^{2}\big]}{4J^{2}+a^{4}c^{2}}$ & $\frac{4M\big[q^{2}(1-c)-M^{2}\big]}{4J^{2}+q^{4}}$ & $\frac{4M\big[\big(1-c\big)\big(a^{2}+q^{2}\big)-M^{2}\big]}{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}$ \\ $\kappa_{+}\kappa_{-}$ & $\frac{(1-c)^{2}\big[a^{2}(1-c)-M^{2}\big]}{4J^{2}+a^{4}c^{2}}$ & $\frac{(1-c)^{2}\big[q^{2}(1-c)-M^{2}\big]}{4J^{2}+q^{4}}$ & $\frac{(1-c)^{2}\big[\big(1-c\big)\big(a^{2}+q^{2}\big)-M^{2}\big]}{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}$ \\ $T_{\pm}$ & $\frac{(1-c)^{2}(r_{\pm}-r_{\mp})}{4\pi(2Mr_{\pm}-a^{2}c)}$ & $\frac{(1-c)^{2}(r_{\pm}-r_{\mp})}{4\pi(2Mr_{\pm}-q^{2})}$ & $\frac{(1-c)^{2}(r_{\pm}-r_{\mp})}{4\pi(2Mr_{\pm}-a^{2}c-q^{2})}$ \\ $T_{+}+T_{-}$ & $\frac{2M\big[a^{2}(1-c)-M^{2}\big]}{\pi\big[4J^{2}+a^{4}c^{2}\big]}$ & $\frac{2M\big[q^{2}(1-c)-M^{2}\big]}{\pi\big[4J^{2}+q^{4}\big]}$ & $\frac{2M\big[\big(1-c\big)\big(a^{2}+q^{2}\big)-M^{2}\big]}{\pi\big[4J^{2}+\big(a^{2}c+q^{2}\big)^{2}\big]}$ \\ $T_{+}T_{-}$ & $\frac{(1-c)^{2}\big[a^{2}(1-c)-M^{2}\big]}{(2\pi)^{2}\big[4J^{2}+a^{4}c^{2}\big]}$ & $\frac{(1-c)^{2}\big[q^{2}(1-c)-M^{2}\big]}{(2\pi)^{2}\big[4J^{2}+q^{4}\big]}$ & $\frac{(1-c)^{2}\big[\big(1-c\big)\big(a^{2}+q^{2}\big)-M^{2}\big]}{(2\pi)^{2}\big[4J^{2}+\big(a^{2}c+q^{2}\big)^{2}\big]}$ \\ $M_{\text{irr},\pm}$ & $\sqrt{\frac{2Mr_{\pm}-a^{2}c}{4(1-c)}}$ & $\sqrt{\frac{2Mr_{\pm}-q^{2}}{4(1-c)}}$ & $\sqrt{\frac{2Mr_{\pm}-a^{2}c-q^{2}}{4(1-c)}}$ \\ $\big(M_{\text{irr},+}\big)^{2}+\big(M_{\text{irr},-}\big)^{2}$ & $\frac{2M^{2}-a^{2}c}{2(1-c)}$ & $\frac{2M^{2}-q^{2}}{2(1-c)}$ & $\frac{2M^{2}-a^{2}c-q^{2}}{2(1-c)}$ \\ $M_{\text{irr},+}M_{\text{irr},-}$ & $\frac{\sqrt{4J^{2}+a^{4}c^{4}}}{4(1-c)}$ & $\frac{\sqrt{4J^{2}+q^{4}}}{4(1-c)}$ & $\frac{\sqrt{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}}{4(1-c)}$ \\ $\Omega_{\pm}$ & $\frac{a(1-c)}{2Mr_{\pm}-a^{2}c}$ & $0$ & $\frac{a(1-c)}{2Mr_{\pm}-a^{2}c-q^{2}}$ \\ $\Omega_{+}+\Omega_{-}$ & $\frac{a\big[2M^{2}-a^{2}c(1-c)\big]}{2\big[4J^{2}+a^{4}c^{2}\big]}$ & $0$ & $\frac{a\big[2M^{2}-\big(1-c\big)\big(a^{2}c+q^{2}\big)\big]}{2\big[4J^{2}+\big(a^{2}c+q^{2}\big)^{2}\big]}$ \\ $\Omega_{+}\Omega_{-}$ & $\frac{a^{2}(1-c)^{2}}{4J^{2}+a^{4}c^{2}}$ & $0$ & $\frac{a^{2}(1-c)^{2}}{4J^{2}+\big(a^{2}c+q^{2}\big)^{2}}$ \\ \hline \end{tabular} } \end{table} We obtain the irreducible mass bound for the outer horizon of KN black hole in quintessence from the inequality \ref{40}) \begin{equation}\label{42} \frac{\sqrt{\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}}}{2}\leq M_{\text{irr},+} \leq \frac{\sqrt{\frac{2M^{2}}{(1-c)^{2}}-\frac{a^{2}c+q^{2}}{1-c}}}{\sqrt{2}}, \end{equation} and for the inner horizon, we have \begin{equation}\label{43} 0\leq M_{\text{irr},-}\leq\frac{\big[4J^{2}+\big(a^{2}c+q^{2}\big)^{2}\big]^{\frac{1}{4}}}{2\sqrt{1-c}}. \end{equation} The irreducible mass bound \ref{42}) is called Penrose inequality \cite{23}. \section{Conclusion}\label{Sec:A5} In this research work, predominantly we acquired area, angular velocity, entropy, surface gravity and Hawking temperature of inner and outer horizons for Kerr-Newman black hole in presence of quintessence. Additionally, we examined area sum, area product, entropy sum and entropy product. We investigated that the area product and entropy product are free from mass $M$ but these products surly rely upon the angular momentum $J$, charge $q$, spin parameter $a$ and the normalization factor $c$. We observed that these thermodynamic products are universal. We have studied that the area sum and entropy sum rely upon the mass $M$, charge $q$, spin parameter $a$ and the normalization factor $c$, so these sums are not universal. The black hole mass and Christodoulou-Ruffini mass for Kerr-Newman black hole in quintessence have been found. We have extracted the entropy bound from the area bound. We have studied that the irreducible mass product does not rely upon the mass $M$, so this product is also universal. We have indicated the area, angular velocity and Christodoulou-Ruffini mass in terms of irreducible mass. We have derived the Penrose inequality and have discussed the microscopic nature of the entropy.
\section{Introduction}\label{sec intro} \vskip.125in Furstenberg, Katznelson and Weiss \cite{FKW90} proved that if $A \subset {\Bbb R}^2$ has positive upper Lebesgue density and $A_{\delta}$ denotes its $\delta$-neighborhood, then, given vectors $u,v$ in ${\Bbb R}^2$, there exists $r_0$ such that, for all $r>r_0$ and any $\delta>0$, there exists $\{x,y,z\} \subset A_{\delta}$ forming a triangle congruent to $\{{\bf 0},ru,rv\}$, i.e., similar to $\{{\bf 0},u,v\}$ via scaling factor $r$. Under the same assumptions, Bourgain \cite{B86} proved in ${\Bbb R}^d$ that if $u^1, \dots, u^k \in {\Bbb R}^d$, $k \leq d$, there exists $r_0$ such that, for all $r>r_0$ and any $\delta>0$, there exists $\{x^1,x^2, \dots, x^{k+1}\} \subset A_{\delta}$ forming a simplex similar to $\{ {\bf 0}, u^1, \dots, u^k\}$ via scaling $r$. Moreover, Bourgain showed that if $k<d$ and the simplex is non-degenerate, i.e., of positive $k$-dimensional volume, then the conclusion holds with $\delta=0$, i.e., one can take $\{x^1,x^2, \dots, x^{k+1}\} \subset A$. He further showed that the conclusion does not in general hold when $\delta=0$, at least for $k=2=d$, using arithmetic progressions, i.e., degenerate triangles. The most general result of this type is due to T. Ziegler \cite{Z06}: \begin{theorem} \label{z06} Let $d\ge 2, k\ge 2$. Suppose $A \subset {\Bbb R}^d$ is of positive upper Lebesgue density, and let $A_{\delta}$ denote the $\delta$-neighborhood of $A$. Let $V=\{ {\bf 0}, v^1, v^2, \dots, v^{k}\} \subset {\Bbb R}^d$. Then there exists $r_0>0$ such that, for all $r>r_0$ and any $\delta>0$, there exists $\{x^1, \dots, x^{k+1}\} \subset A_{\delta}$ similar to $\{ {\bf 0}, v^1, \dots, v^{k}\}$ via scaling $r$. \end{theorem} The purpose of this paper is to prove variants of these results for compact sets of Hausdorff dimension $<d$, sometimes referred to as {\it thin sets}. In this context, it is impossible to obtain conclusions nearly as sweeping as those in Theorem \ref{z06}. For one thing, in compact sets the distances are necessarily bounded by the diameter of the set. A more fundamental problem is that it is known, for instance, that there exist compact subsets of ${\Bbb R}^2$ of full Hausdorff dimension that do not contain vertices of any equilateral triangle (Falconer \cite{Falc80}). Nevertheless, we are able to prove that if the Hausdorff dimension of a compact set is sufficiently large, then given any $r>0$ there exist many pairs of point configurations consisting of $(k+1)$ points of this set that are similar up to a translation and scaling by $r$. We also give extensions from similarities to multi-similarities, where there exist configurations in the set $E$ similar to each other via multiple scaling parameters. Moreover, as in \cite{B86}, we obtain the existence of {\it exactly} similar configurations, i.e., all of whose vertices are in $E$, not just in a $\delta$-neighborhood of $E$. \vskip.125in We need the following definition. Recall that a thin set $E$ supports a Frostman measure; see \cite{Mat95} for the definition of Frostman measures and their basic properties. \begin{definition} \label{kdistmeasuredef} Let $d \ge 2$, $1\le k\le d$, $E \subset {\Bbb R}^d$ a compact set, and $\mu$ be a Frostman measure on $E$. For $x^1,\dots, x^{k+1}\in\Bbb R^d$, let $\vec{v}\,_{k,d}(x^1, \dots, x^{k+1})\in {\Bbb R}^{k+1 \choose 2}=\Bbb R^{k(k+1)/2}$ be the vector with entries $|x^i-x^j|$, $1 \leq i<j \leq k+1$, listed in the lexicographic order. Denote points of ${\Bbb R}^{k(k+1)/2}$ by $\vec{t}\,=(t^{ij})$. \smallskip (i) Define a measure $\nu_{k}$ on ${\Bbb R}^{k(k+1)/2}$ induced by the measure $\mu$ on $E$ by the relation, for $f(\vec{t}\,) \in C_0\left({\Bbb R}^{k(k+1)/2}\right)$, \begin{equation} \label{kmeasuredef} \int_{{\Bbb R}^{k(k+1)/2}} f(\vec{t})\, d\nu_{k}(\vec{t}) :=\int \dots \int f\left(\vec{v}\,_{k,d}\left(x^1, \dots, x^{k+1}\right)\right)\, d\mu(x^1) \cdots d\mu(x^{k+1}). \end{equation} \vskip.125in (ii) Define the {\it $k$-simplex set} or {\it $(k+1)$-point configuration set} of $E$, \begin{equation} \label{def kset} \Delta_k(E):=\left\{\vec{v}\,_{k,d}(x^1, \dots, x^{k+1}): x^j \in E \right\}\subset {\Bbb R}^{k(k+1)/2}. \end{equation} Note that the $k$-simplex will necessarily be degenerate if $k>d$. \end{definition} The measure $\nu_k$ has total mass $\le \mu(E)^{k+1}$, and is supported on $\Delta_k(E)$. For $k\le d$, $\Delta_k(E)$ can be considered, modulo the symmetric group $S_{k+1}$ acting on the $x^i$, as the set of congruence classes of $(k+1)$-point configurations in $E$, or equivalently the set of (possibly degenerate) $k$-simplexes in $\Bbb R^d$ spanned by points of $E$. The action of the finite group $S_{k+1}$ is irrelevant for our results, which are expressed in terms of certain sets of configurations having positive measure. (The situation when $k>d$ is discussed below.) \vskip.125in The study of the Lebesgue measure of the distance set $\Delta_1(E)$ for thin sets was begun in 1986 by Falconer \cite{Falc86}. He proved that if $dim_{{\mathcal H}}(E)>\frac{d+1}{2}$, then the Lebesgue measure of $\Delta_1(E)$ is positive. Bourgain \cite{B94} improved Falconer's exponent in the plane to $\frac{13}{9}$ in 1994, and Wolff \cite{W99} further improved it to $\frac{4}{3}$ in 1999. In 2004, Erdo\u{g}an \cite{Erd06} improved the exponent in dimensions $d\ge 3$ to $\frac{d}{2}+\frac{1}{3}$, and this is where things stood for a long time until recent improvements. Recently, Du, Guth, Ou, Wang, Wilson and Zhang \cite{DGOWWZ18} proved that the Lebesgue measure of $\Delta_1(E)$ is positive if $dim_{{\mathcal H}}(E)>\frac{9}{5}$ for $d=3$ and $dim_{{\mathcal H}}(E)>\frac{d}2+\frac14+\frac{d+1}{4(2d+1)(d-1)}$ for $d\ge4$; this was improved to $dim_{\mathcal H}(E)>\frac{d^2}{2d-1}$ for $d \ge 4 $ by Du and Zhang \cite{DZ18}. Even more recently, Guth, Iosevich, Ou and Wang \cite{GIOW18} proved that if a planar set satisfies $dim_{{\mathcal H}}(E)>\frac{5}{4}$, then the Lebesgue measure of $\Delta_1(E)$ is positive. For $1< k \le d$, the best results known are due to Erdo\u{g}an, Hart and Iosevich \cite{EHI13} and Greenleaf, Iosevich, Liu and Palsson \cite{GILP13}. The former proved that ${\mathcal L}^{k(k+1)/2}(\Delta_k(E))>0$ if $dim_{{\mathcal H}}(E)>\frac{d+k+1}{2}$ and the latter obtained the threshold $\frac{dk+1}{k+1}$, improved to $\frac{8}{5}$ for $k=d=2$. \vskip.125in We note that all of these results, except for \cite{GIOW18}, are proven by establishing that the measure $\nu_k$ defined by \eqref{kmeasuredef} has a density in $L^2({\Bbb R}^{k(k+1)/2})$. \vskip.125in \begin{definition} \label{L2threshold} Let $d\ge 2,\, 1\le k$. The {\it $L^2$-threshold} for the $k$-simplex problem (or $(k+1)$-point configuration problem) in $\Bbb R^d$ is $$s_{k,d}:=\inf \left\{s: dim_{{\mathcal H}}(E)>s \implies \int_{\Delta_k(E)} \nu^2_k(\vec{t}) d\vec{t}<\infty \right\},$$ where $E$ runs over all compact sets $E \subset {\Bbb R}^d$. \end{definition} \vskip.125in The case of $k>d$ needs to be treated somewhat differently, since in that range the set $\Delta_k(E)\subset\mathbb{R}^{k(k+1)/2}$ has lower dimension than $\mathbb{R}^{k(k+1)/2}$ and so cannot have positive Lebesgue measure, regardless of the Hausdorff dimension of $E$. This stems from the fact that, when $k>d$, specifying the $k(k+1)/2$ pairwise distances between $k+1$ points in $\mathbb{R}^d$ gives an over-determined system: knowing only some of the distances determines the rest. Thus, although $\Delta_k(E)$ still makes sense, the setup has to be modified. In Chatzikonstantinou, Iosevich, Mkrtchyan and Pakianathan \cite{CIMP17} it was shown that for $k>d$ the set of congruence classes of $(k+1)$-tuples of elements of $E$ can be naturally viewed as a subset of ${\Bbb R}^{d(k+1)-{d+1 \choose 2}}$; if $m:=d(k+1)-\binom{d+1}{2}$ appropriately chosen distances are specified, then the other distances are determined, up to finitely many possibilities. Let $P$ be such a collection of $m$ edges. In the terminology of \cite{CIMP17}, $P$ is a maximally independent (in $\mathbb{R}^d$) subset of the edges of the complete graph on $k+1$ vertices. Extend the definition of $\vec{v}\,_{k,d}$ to the case $k>d$ by setting $\vec{v}\,_{k,d}(x^1, \dots, x^{k+1})=(|x^i-x^j)|_{(i,j)\in P}\in {\Bbb R}^{m}$, where the entries in the range are ordered lexicographically. Using this, we can define a measure $\nu_k$ on $\mathbb{R}^m$ and a set $\Delta_k(E)\subset\mathbb{R}^m$ similarly to (\ref{kmeasuredef}) and (\ref{kdistmeasuredef}). Note that $\nu_k$ and $\Delta_k(E)$ will depend on the choice of $P$, but for our purposes this is irrelevant, so we will fix a particular $P$ once and for all. \vskip.125in While $\vec{v}\,_{k,d}(x^1, \dots, x^{k+1})$ doesn't determine the congruence class of $(x^1,\dots,x^{k+1})$ uniquely, it identifies it up to a finite number of possibilities. The number of these possibilities is bounded above by a constant $u_{d,k}$, depending only on $d$ and $k$. In this sense, congruence classes of $(k+1)$-tuples of elements of a compact set $E$ in ${\Bbb R}^d$ for $k>d \ge 2$ can be naturally viewed as a subset of $\Bbb R^m$. It was shown in \cite{CIMP17} that if $k>d$ and the Hausdorff dimension of $E$ is greater than $d-\frac{1}{k+1}$, then the $m$-dimensional Lebesgue measure of the set of congruence classes of $(k+1)$-point configurations with endpoints in $E$ is positive, and, as with most of the results for $k\le d$, this was shown by first establishing that the measure $\nu_k$ defined by \eqref{kmeasuredef} has a density in $L^2(\mathbb{R}^m)$. \vskip.125in We now turn to the results of this paper. With the theorems of Furstenberg-Katznelson-Weiss, Bourgain and Ziegler in mind, obtaining more refined structural information about $\Delta_k(E)$ is of natural interest. In our setting, the questions need to reflect the fact that, since $E$ is compact, all the pairwise distances are bounded. We are going to prove that if $dim_{{\mathcal H}}(E)>s_{k,d}$, then among the $k$-simplexes of $E$, all possible similarity scaling factors occur, and do so with positive $\nu_k$-measure. Furthermore, we show that multi-similarities of arbitrarily high multiplicity occur as well. Thus, this holds for the values of $dim_{{\mathcal H}}(E)$ in all of the positive results referred to above, with the possible exception of \cite{GIOW18}. \vskip.125in To make this more precise, for $r\in\Bbb R_+:=(0,\infty)$ let \begin{equation}\label{def drk} \Delta_{k}^{r}(E):=\left\{\vec{t}\,\in \Delta_k\left(E\right): r\vec{t}\,\in \Delta_k\left(E\right)\right\}\subset \Delta_k\left(E\right), \end{equation} the set of all $k$-simplexes $\vec{t}\,$ in $E$ for which there is also a simplex in $E$ similar to $\vec{t}\,$ via the scaling factor $r$. Interchanging the roles of the two simplexes in such a pair, $\{\vec{t}\,,\, r\vec{t}\,\}\subset\Delta_k(E)$, note for later use that \begin{equation}\label{eqn rinverse} \Delta_{k}^{1/r}(E)=\Delta_{k}^{r}(E). \end{equation} \vskip.125in One can not only look for similar pairs $\{\vec{t}\,,r\vec{t}\,\}\subset \Delta_k(E)$, but more generally for similarities of higher multiplicity. \begin{definition}\label{def multi} A collection $\{\vec{t}\,,\, r_1\vec{t}\,,\, \dots ,\, r_{n-1}\vec{t}\,\}\subset \Delta_k(E)$, with $\{1,r_1,\dots, r_{n-1}\}$ pairwise distinct, is an {\it $n$-similarity of $k$-simplexes in $E$,} also referred to as a {\it multi-similarity of multiplicity $n$}. \end{definition} \vskip.125in Our main results are the following. All are obtained under the assumptions that $d \ge 2$; $1\leq k \leq d$; $E\subset{\Bbb R}^d$ is compact, $\mu$ is a Frostman measure on $E$ and $\nu_k$ is the measure induced by $\mu$ as in Def. \ref{kdistmeasuredef}. \begin{theorem} \label{main1} Let $d\ge 2,\, 1\le k$ and $E\subset\Bbb R^d$ compact. Suppose that $dim_{{\mathcal H}}(E)>s_{k,d}$, the $L^2$-threshold for the $k$-simplex problem. Then there is a uniform lower bound $$\nu_k(\Delta_k^r(E))\ge C(k,E)>0 \ \text{for all} \ r>0.$$ \end{theorem} \vskip.125in With the same notation and assumptions as in Thm. \ref{main1}, we also have: \begin{theorem} \label{main2} Suppose that $dim_{{\mathcal H}}(E)>s_{k,d}$. Then there exist distinct $r_1,r_2>0$, with $\nu_k\left(\Delta_k^{r_1}\left(E\right)\cap \Delta_k^{r_2}\left(E\right)\right)>0$. In fact, for any partition $\Bbb R_+=\coprod_{\alpha\in A} R_\alpha$ with each $R_\alpha\ne\emptyset$ and countable, there exist distinct $\alpha_1,\alpha_2\in A$ and $r_1\in R_{\alpha_1},\, r_2\in R_{\alpha_2}$, such that $\nu_k\left(\Delta_k^{r_1}\left(E\right)\cap \Delta_k^{r_2}\left(E\right)\right)>0$. \end{theorem} \vskip.125in \begin{theorem} \label{main3} Suppose that $dim_{{\mathcal H}}(E)>s_{k,d}$. Then for all $n\in\Bbb N$, there exists an $M=M(n,k,E)\in\Bbb N$ such that for any distinct $r_1,\dots,r_{M}\in\Bbb R_+$, there exist distinct $r_{i_1},\dots, r_{i_n}$ such that $$\nu_k\left(\Delta_k^{r_{i_1}}\left(E\right)\cap \Delta_k^{r_{i_2}}\left(E\right)\cap \cdots \cap \Delta_k^{r_{i_n}}\left(E\right)\right)>0.$$ \end{theorem} \vskip.125in \begin{remark} \label{remark main} More explicitly, Thm. \ref{main1} says that, given any $r>0$, there exist $(k+1)$-point configurations $\{x^1, x^2, \dots, x^{k+1}\}$ and $\{y^1, y^2, \dots, y^{k+1}\}$ in $E$ which are similar via the scaling factor $r$, i.e., there exists a translation $\tau \in {\Bbb R}^d$ and a rotation $\theta \in O_d({\Bbb R})$ such that $y^j=r \theta (x^j+\tau),\, 1\le j\le k+1$. In the language of Def. \ref{def multi}, among the $(k+1)$-point configurations or $k$-simplexes in $E$, there exist (many) similarities of multiplicity 2. \vskip.125in In fact, by Thm. \ref{main2} there exist triple-similarities in $E$, i.e., pairs $r_1,\, r_2$ of scalings and triples of $(k+1)$-point configurations, $\{x^j\},\, \{y^j\},\, \{z^j\}$ in $E$ such that $y^j=r_1 \theta_1 (x^j+\tau_1),\, z^j=r_2\theta_2(x^j+\tau_2)$ for appropriate $\theta_1,\theta_2\in O_d({\Bbb R})$ and $\tau_1,\tau_2\in\Bbb R^d$, and furthermore that $r_1,\, r_2$ can be arranged to lie in different subsets of a partition of $\Bbb R_+$ as stated. For example, decomposing $\Bbb R_+$ into the multiplicative cosets of $\Bbb Q_+$, there exist similarities of multiplicity 3 with $r_2/r_1$ irrational; similarly, replacing the positive rationals with the positive algebraic numbers, there exist such with $r_2/r_1$ transcendental. \vskip.125in Finally, Thm. \ref{main3} shows that there exist multi-similar $(k+1)$-point configurations in $E$ of arbitrarily high multiplicity, and that the scaling factors can be chosen to come from an arbitrary set of distinct elements of $\Bbb R_+$, as long as that set has large enough cardinality relative to the desired similarity multiplicity. \end{remark} \begin{remark} Denoting ${\bf x}=(x^1,\dots,x^{k+1})$, when $k>d$ the fact that $\vec{v}\,_{k,d}({\bf x})=\vec{v}\,_{k,d}({\bf y})$ does not imply that ${\bf x}$ and ${\bf y}$ are congruent and hence $\vec{v}\,_{k,d}({\bf x})=r\vec{v}\,_{k,d}({\bf y})$ doesn't imply ${\bf x}$ and ${\bf y}$ are similar. However, the conclusions of Remark \ref{remark main} still holds: Recall that $\vec{v}\,_{k,d}({\bf x})$ determines the congruence type of ${\bf x}$ up to at most $u_{d,k}$ choices. Using Thm. \ref{main3} with $nu_{d,k}$ instead of $n$ we see that $\exists{\bf x},{\bf x}_{i_1},\dots,{\bf x}_{i_{nu_{d,k}}}$ and $r_{i_1},\dots,r_{i_{nu_{d,k}}}$ such that $\vec{v}\,_{k,d}({\bf x}),r_{i_1}\vec{v}\,_{k,d}({\bf x}_1),\dots,r_{i_{nu_{d,k}}}\vec{v}\,_{k,d}({\bf x}_{nu_{d,k}})$ are all congruent. It follows that ${\bf x},{\bf x}_{i_1},\dots,{\bf x}_{i_{nu_{d,k}}}$ all fall within at most $u_{d,k}$ congruence classes and thus, by the pigeon hole principle, at least $n+1$ of them must be in the same congruence class. This argument, naturally, applies to the conclusions of Remark \ref{remark main} for the other Theorems as well. \end{remark} \vskip.25in \section{Proofs of Theorems \ref{main2} and \ref{main3}}\label{sec proofs23} We start by showing that Thms. \ref{main2} and \ref{main3} follow from Thm. \ref{main1} by measure-theoretic arguments. To prove Thm. \ref{main2}, let $\Bbb R_+=\coprod_{\alpha\in A} R_\alpha$ be a partition of $\Bbb R_+$ into a (necessarily uncountable) collection of nonempty countable subsets. From the definition \eqref{def drk}, it follows that each $\Delta_{k}^{r}(E)$ is $\nu_k$-measurable. Hence, if for each $\alpha\in A$, with slight abuse of notation we define the set $$ \Delta_k^\alpha(E):=\bigcup_{r\in R_\alpha} \Delta_{k}^{r}(E), $$ then, being a countable union of measurable sets, each $\Delta_k^\alpha(E)$ is $\nu_k$-measurable. Furthermore, combining $R_\alpha\ne\emptyset$, the monotonicity of $\nu_k$ and Thm. \ref{main1}, one sees that each $\nu_k(\Delta_k^\alpha(E))>0$. However, $\nu_k(\Delta_k(E))\le \mu(E)^{k+1}<\infty$, and no finite (or even $\sigma$-finite) measure space can be the pairwise disjoint union of an uncountable collection of measurable subsets of positive measure. Thus, there must exist $\alpha_1\ne \alpha_2$ such that $\Delta_k^{\alpha_1}(E)\cap \Delta_k^{\alpha_2}(E)\ne\emptyset$; it follows that there are $r_j\in R_{\alpha_j},\, j=1,2$, such that $\Delta_k^{r_1}(E)\cap \Delta_k^{r_2}(E)\ne\emptyset$. For the full claim of Thm. \ref{main2}, that there exist distinct $\alpha_1,\alpha_2\in A$ and $r_1\in R_{\alpha_1},\, r_2\in R_{\alpha_2}$, such that $\nu_k\left(\Delta_k^{r_1}\left(E\right)\cap \Delta_k^{r_2}\left(E\right)\right)>0$, first make a choice of one representative from each of the $R_\alpha$, choose an arbitrary countably infinite subset of these, and then apply Thm. \ref{main3}. \vskip.125in For the proof of Thm. \ref{main3}, we use the uniform lower bound from Thm. \ref{main1}, $\nu_k(\Delta_{k}^{r}(E))\ge C(E,k)>0,\, \forall r\in\Bbb R_+$, combined with $\nu_k(\Delta_k(E))<\infty$. Thm. \ref{main3} then follows from the following measure-theoretic pigeon-hole principle, which might be of independent interest and whose proof is deferred to the Appendix, Sec. \ref{sec app}. \begin{lemma}\label{lemma pigeon} Let $\mathcal X=(X,\mathcal M,\sigma)$ be a finite measure space. For $0<c<\sigma(X)$, let $\mathcal M_c=\{A\in\mathcal M: \sigma(A)\ge c\}$. Then, for every $n\in\Bbb N$, there exists an $N=N(\mathcal X,c,n)\in\Bbb N$ such that for any collection $\{A_1,\dots,A_N\}\subset \mathcal M_c$ of cardinality $N$, there is a subcollection $\{A_{i_1},\dots, A_{i_n}\}$ of cardinality $n$ such that $\sigma(A_{i_1}\cap\cdots\cap A_{i_n})>0$ and hence $A_{i_1}\cap\cdots\cap A_{i_n}\ne\emptyset$. \end{lemma} \vskip.125in \section{Proof of Theorem \ref{main1}} \label{sec proof1} \vskip.125in To keep the exposition simple, we first prove Thm. \ref{main1} in the case $k\le d$. In Sections \ref{sec proof1} and \ref{sec prop} we will assume $k\le d$. In the case $k>d$ the arguments are very similar. Essentially, since $\vec{v}\,_{k,d}(x^1, \dots, x^{k+1})$ determines the congruence type of $(x^1, \dots, x^{k+1})$ up to at most $u_{d,k}$ choices, the constant $u_{k,d}$ will appear throughout the proof. However, since the results here are up to multiplicative constants, this doesn't play any essential role. For $\epsilon>0$, define an approximation of $\nu_k$ on $\Bbb R^{k(k+1)/2}$ by \begin{equation} \label{kmeasureapprox} \nu^{\epsilon}_{k}(\vec{t})=\int \dots \int \prod_{1 \leq i<j \leq k+1} \sigma^{\epsilon}_{t_{ij}}(x^i-x^j) \prod_{l=1}^{k+1} d\mu(x^l), \end{equation} where $\sigma_t$ is the normalized surface measure on the sphere of radius $t$ in $\Bbb R^d$ and $\sigma_t^{\epsilon}(x):=\sigma_t*\rho_{\epsilon}(x)$, with $\rho \in C_0^{\infty}({\Bbb R^d})$, $\rho \ge 0$, $supp(\rho)\subset\{|t|<1\}$, $\int \rho=1$ and $\rho_{\epsilon}(x)=\epsilon^{-d} \rho(\epsilon^{-1}x)$. Then each $\nu^{\epsilon}_{k} \in C^\infty_0$ and $\nu^{\epsilon}_{k}\to \nu_k$ weak$^*$ as $\epsilon\to 0$. Thus, $$ \nu_k(\Delta_k^r(E))=\lim_{\epsilon\to 0} \int_{\Bbb R^{k(k+1)/2}} \nu_k^{\epsilon}(r\vec{t}) d\nu_k(\vec{t}).$$ By (\ref{kmeasuredef}), for $\epsilon$ fixed, $$\int_{\Bbb R^{k(k+1)/2}} \nu_k^{\epsilon}(r\vec{t}) d\nu_k(\vec{t})= \int \nu_k^{\epsilon}(r(x^1-x^2), \dots, r(x^k-x^{k+1})) d\mu(x^1) \dots d\mu(x^{k+1}).$$ Using the definition in (\ref{kmeasureapprox}), we see that this is \begin{equation} \label{pregilp} \approx \epsilon^{-{k+1 \choose 2}} \int \dots \int_{\left\{ \left|\,|x^i-x^j\right|-r\left|y^i-y^j|\, \right|<\epsilon;\, 1 \leq i<j \leq k+1\right\}} d\mu(x^1) \dots d\mu(x^{k+1})d\mu(y^1) \dots d\mu(y^{k+1}). \end{equation} Here, and throughout, we write $X\lesssim Y$ (resp. $X \approx Y$) if there exist constants $0<c<C$, depending only on $k$, $E$ and the choice of $\rho$ (and thus implicitly on $d$), such that $X \lesssim C Y$ (resp., $cY \leq X \leq CY$). \vskip.125in For each rotation $\theta \in O_d({\Bbb R})$, define a measure $\lambda_{r, \theta}$ on $\Bbb R^d$ by $$ \int f(z)\, d\lambda_{r, \theta}(z)=\int \int f(u-r\theta v)\, d\mu(u)d\mu(v),\, f\in C_0\left(\Bbb R^d\right).$$ This is the push-forward of $\mu\times\mu$ under the map $(u,v)\to u-r\theta v$, has total mass $||\lambda_{r,\theta}||=\mu(E)^2$, and is supported in $E-r\theta E$. The following shows that, for $E$ of the Hausdorff dimensions in question, for a.e. $\theta$, $\lambda_{r,\theta}$ is absolutely continuous with a density in $L^{k+1}(\Bbb R^d)$, which we denote by $\lambda_{r,\theta}(\cdot)$. Let $d\theta$ denote the Haar probability measure on $O_d(\Bbb R)$. \begin{proposition} \label{groupactionbasicth} With the notation above, $\liminf_{\epsilon \to 0}$ of the expression on the right hand side of (\ref{pregilp}) is \begin{equation} \label{kgilpest} \approx \int \int \lambda^{k+1}_{r, \theta}(z)\, dz\, d\theta. \end{equation} \end{proposition} \vskip.125in By definition, the quantity on the right hand side of (\ref{kgilpest}) is finite if $\dim_{\mathcal H}(E)>s_{k,d}$, the $L^2$-threshold for the $k$-simplex problem. Prop. \ref{groupactionbasicth} was proved in \cite{GILP13} in the case $r=1$; the proof in the general case is similar, but we supply it in the next section for the sake of completeness. \vskip.125in Continuing with the proof of Thm. \ref{main1}, by H\"older we have \begin{eqnarray}\label{eqn Holder} \mu(E)^2 &=& \int\int \lambda_{r,\theta}(z)\cdot 1\, dz\, d\theta \\ &\le& \left(\iint \lambda_{r,\theta}^{k+1}\left(z\right)\, dz\, d\theta\right)^{\frac1{k+1}} \times \left(\iint _{supp(\lambda_{r,\theta})\times O_d(\Bbb R)} 1^\frac{k+1}{k}\, dz\, d\theta\right)^{\frac{k}{k+1}}.\nonumber \end{eqnarray} Since $supp(\lambda_{r,\theta})$, being contained in $ E-r\theta E$, has Lebesgue measure $\lesssim (1+r^d) \mu(E)$, we divide both sides of \eqref{eqn Holder} by the second factor on the right hand side and raise to the $k+1$ power to obtain $$\mu(E)^{k+1}(1+r^d)^{-(k+1)}\lesssim \iint \lambda_{r,\theta}^{k+1}\left(z\right)\, dz\, d\theta.$$ Combining this with Prop. \ref{groupactionbasicth}, we conclude that, for $\dim_{\mathcal H}(E)>s_{k,d}$ and $0<r\le 1$, \begin{equation} \liminf_{\epsilon \to 0} \int \nu_k^{\epsilon}(r \vec{t}) d\nu_k(\vec{t}) \approx \int \int \lambda^{k+1}_{r,\theta}(z)\, dz\, d\theta \gtrsim 1 . \end{equation} It follows that $ \liminf_{\epsilon \to 0} \nu_k(\{\vec{t}: r \vec{t} \in \Delta_{k,\epsilon}(E)\}) \gtrsim 1,$ where $\Delta_{k,\epsilon}(E)$ is the $\epsilon$-neighborhood of $\Delta_k(E)$. Since the sets $\{\vec{t}: r \vec{t} \in \Delta_{k,\epsilon}(E)\}$ are nested as $\epsilon\searrow 0$, we conclude that, for $0<r\le 1$, \begin{equation} \label{eqn key} \nu_k(\{\vec{t}: r \vec{t} \in \Delta_k(E)\})\gtrsim 1. \end{equation} However, by \eqref{eqn rinverse}, $ \nu_k(\{\vec{t}: r \vec{t} \in \Delta_k(E)\})= \nu_k(\{\vec{t}: r^{-1} \vec{t} \in \Delta_k(E)\})$, so \eqref{eqn key} holds for $1\le r<\infty$ as well. This completes the proof of Thm. \ref{main1}, up to the verification of Prop. \ref{groupactionbasicth}. \section{Proof of Proposition \ref{groupactionbasicth}} \label{sec prop} We will follow closely the argument in \cite[Sec. 2]{GILP13}. It will be convenient to denote an ordered $(k+1)$-tuple $(x^1,\dots,x^{k+1})$ of elements of $\Bbb R^d$ by ${\bf x}$. If the corresponding set $\{x^1,\dots,x^{k+1}\}$ is a nondegenerate simplex (i.e., affinely independent), then $$\pi({\bf x}):=span\{x^2-x^1,\dots, x^{k+1}-x^1\}$$ is a $k$-dimensional linear subspace of $\Bbb R^d$. $\Delta({\bf x})$ will denote the (unoriented) simplex generated by $\{x^1,\dots,x^{k+1}\}$, i.e., the closed convex hull, which is contained in the affine plane $x^1+\pi({\bf x})$. Both $\pi({\bf x})$ and $\Delta({\bf x})$ are independent of the order of the $x^j$. If $\{x^1,\dots,x^{k+1}\}$ is similar to $\{y^1,\dots, y^{k+1}\}$ by a scaling factor $r$, then, up to permutation of $y^1,\dots, y^{k+1}$, there exists a $\theta\in\mathbb O(d) $ such that $x^j-x^1=r\theta(y^j-y^1),\, 2\le j\le k+1$, which is equivalent with $x^j-x^i=r\theta(y^j-y^i), 1\le i<j\le k+1$, and $\Delta({\bf x})=(x^1-r\theta y^1)+ r\theta\Delta({\bf y})$. \vskip.125in The group $\mathbb O(d)$ acts on the Grassmanians $G(k,d)$ and $G(d-k,d)$ of $k$ (resp., $d-k$) dimensional linear subspaces of $\Bbb R^d$, and if ${\bf x}$ is similar to ${\bf y}$, one has $\pi({\bf x})=\theta\pi({\bf y})$ and $\pi({\bf x})^\perp=\theta\big(\pi({\bf y})^\perp\big)$. The set of $\theta\in\mathbb O(d)$ fixing $\pi({\bf x})$ is a conjugate of $\mathbb O(d-k)\subset\mathbb O(d)$, and we refer to this as the \emph{stabilizer} of ${\bf x}$, denoted $\text{Stab}(\bx)$. \vskip.125in For ${\bf x},\, {\bf y}$ similar, let $\tilde{\theta}\in\mathbb O(d)$ be such that it transforms ${\bf y}$ to ${\bf x}$. I.e. we have $\pi({\bf x})=\tilde{\theta}\pi({\bf y})$ and $x^i-x^j=r\tilde{\theta}\omega(y^i-y^j)$ for all $\omega\in \text{Stab}(\by)$. For each ${\bf y}$, take a cover of $\mathbb O(d) / \text{Stab}(\by)$ by balls of radius $\epsilon$ (with respect to some Riemannian metric) with finite overlap. Since the dimension of $\mathbb O(d)/\text{Stab}(\by)$ is that of $\mathbb O(d) / \mathbb O(d-k)$, namely $$\frac{d(d-1)}{2} - \frac{(d-k)(d-k-1)}{2} = kd - \frac{k(k+1)}{2},$$ one needs $N(\epsilon)\lesssim \epsilon^{-\left(kd - \frac{k(k+1)}{2}\right)}$ balls to cover it. In these balls, choose sample points, $\tilde{\theta}_m({\bf y}),\, 1\le m\le N(\epsilon)$. \vskip.125in One sees that \begin{eqnarray*} & & \left\{({\bf x}, {\bf y}): \left||x^i-x^j|-r|y^i-y^j|\right|\leq \epsilon, \ 1 \leq i<j \leq k+1 \right\}\quad \\ & &\,\subseteq \bigcup\limits_{m=1}^{N(\epsilon)} \left\{({\bf x}, {\bf y}): \left|(x^i-x^j)-r\tilde{\theta}_m({\bf y}) \omega(y^i-y^j)\right|\lesssim \epsilon, \right. \\ & & \qquad\qquad\qquad\qquad \left. \,\forall\, 1 \leq i<j \leq k+1, \omega\in\text{Stab}(\by) \right\}. \end{eqnarray*} Thus, the right hand side of (\ref{pregilp}) is bounded above by \begin{eqnarray}\label{samplesum} \epsilon^{- \frac{k(k+1)}{2}} \sum\limits_{m=1}^{N(\epsilon)} \mu^{2(k+1)} \big\{({\bf x},{\bf y}) &:& \left|(x^i-x^j)-r\tilde{\theta}_m({\bf y}) \omega(y^i-y^j)\right|\lesssim \epsilon, \\\nonumber & & \quad \forall\, 1\, \leq i<j \leq k+1, \omega\in\text{Stab}(\by) \big\}. \end{eqnarray} When picking the $N(\epsilon)$ balls, if each point of $O(d)/Stab(y)$ is covered by at most $p=p(d)$ of the balls, then the quantity above becomes a lower bound when multiplied by $1/p$. Thus, the right hand side of (\ref{pregilp}) is $\approx$ to (\ref{samplesum}), which can also be written as \begin{multline} \label{gettingthere} \epsilon^{- kd} \sum\limits_{m=1}^{N(\epsilon)} \epsilon^{kd- \frac{k(k+1)}{2}}\mu^{2(k+1)} \{({\bf x},{\bf y}): \left|(x^i-r\tilde{\theta}_m({\bf y}) \omega y^i)-(x^j-r\tilde{\theta}_m({\bf y}) \omega y^j)\right|\lesssim \epsilon, \\ \forall\, 1 \leq i<j \leq k+1, \omega\in\text{Stab}(\by) \} . \end{multline} Since this holds for any choice of sample points $\tilde{\theta}_m({\bf y})$, we can pick these points such that they minimize (up to a factor of 1/2, say) the quantity \begin{multline*} \mu^{2(k+1)} \{({\bf x},{\bf y}): \left|(x^i-r\tilde{\theta}_m({\bf y}) \omega y^i)-(x^j-r\tilde{\theta}_m({\bf y}) \omega y^j)\right|\leq \epsilon, \, \\ \forall\, 1 \leq i<j \leq k+1, \omega\in\text{Stab}(\by) \} . \end{multline*} The $N(\epsilon)$ preimages, under the natural projection from $\mathbb O(d)$, of the balls used to cover $\mathbb O(d) / \text{Stab}(\by)$ are $\epsilon$-tubular neighborhoods of the preimages of the sample points $\tilde{\theta}_m({\bf y})$, which we denote $T_1^{\epsilon},\ldots,T_{N(\epsilon)}^{\epsilon}$. Since $dim(\mathbb O(d) / \text{Stab}(\by))=kd - \frac{k(k+1)}{2}$, each $T^\epsilon_m$ has measure $\sim \epsilon^{kd-\frac{k(k+1)}2}$ with respect to the Haar measure $d\theta$. Since the infimum over a set is less than or equal to the average over the set, it follows that \begin{multline*} \mu^{2(k+1)} \left\{({\bf x},{\bf y}): \left|(x^i-r\tilde{\theta}_m({\bf y}) \omega y^i)-(x^j-r\tilde{\theta}_m({\bf y}) \omega y^j)\right| \leq \epsilon, \right.\\\left.\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad \,\forall\, 1 \leq i<j \leq k+1, \omega\in\text{Stab}(\by) \right\} \\ \quad\approx \frac{1}{\epsilon^{kd - \frac{k(k+1)}{2}}} \int\limits_{T_m^{\epsilon}} \mu^{2(k+1)} \{({\bf x},{\bf y}): \left|(x^i-r\theta y^i)-(x^j-r\theta y^j)\right|\leq \epsilon, \ 1 \leq i<j \leq k+1 \} \, d\theta. \end{multline*} The quantity in (\ref{gettingthere}) is thus $$\approx \epsilon^{-kd} \sum\limits_{m=1}^{N(\epsilon)} \, \int\limits_{T_m^{\epsilon}} \mu^{2(k+1)} \{({\bf x},{\bf y}): \left|(x^i-r\theta y^i)-(x^j-r\theta y^j)\right|\leq \epsilon, \ 1 \leq i<j \leq k+1 \} d\theta,$$ which, since the $\{T_m^{\epsilon}\}$ have finite overlap, is $$\approx \epsilon^{-kd} \int \mu^{2(k+1)} \{({\bf x},{\bf y}): \left|(x^i-r\theta y^i)-(x^j-r\theta y^j)\right|\leq \epsilon, \ 1 \leq i<j \leq k+1 \} d\theta,$$ and taking the lim inf, we obtain something $\approx$ the expression (\ref{kgilpest}). This completes the proof of Proposition \ref{groupactionbasicth}, and thus Thms. \ref{main1}, \ref{main2}, and \ref{main3}. \section{Open question}\label{sec open} The following is a natural question pertaining to the subject matter of Thm. \ref{main1}: \vskip.125in \begin{itemize} \item In \cite{BIT16} it was shown that if $E$ is a compact subset of ${\Bbb R}^d$, of Hausdorff dimension greater than $\frac{d+1}{2}$, then there exists a non-empty open interval $I$ such that, for any $t \in I$, there exist $x^1, x^2, \dots, x^{k+1} \in E$ such that $|x^{j+1}-x^j|=t$, $1 \leq j \leq k$. In view of Thm. \ref{main1}, it seems reasonable to ask: given any $r>0$, do there exist $x,y,z \in E$ such that $|x-z|=r|x-y|$? This can be regarded as a pinned version of the case $k=1$ of Thm. \ref{main1}, in the sense that the endpoint $x$ is common to both segments whose length is being compared. Similar questions can be raised when $k>1$. \end{itemize} \section{Appendix: A measure-theoretic Pigeon Hole Principle}\label{sec app} Unable to find Lemma \ref{lemma pigeon} in the literature, and believing that it should be useful for other problems, we prove it here. Without loss of generality the total measure $\sigma(X)$ can be normalized to be equal to 1, so for the proof we restate the result as \begin{lemma}\label{lemma pigeon rev} Let $\mathcal X=(X,\mathcal M,\sigma)$ be a probability space. For $0<c<1$, let $\mathcal M_c=\{A\in\mathcal M: \sigma(A)\ge c\}$. Then, for every $n\in\mathbb{N}$, there exists an $N=N(\mathcal X,c,n)\in\nolinebreak\mathbb{N}$ such that, for any collection $\{A_1,\dots,A_N\}\subset \mathcal M_c$ of cardinality at least $N$, there is a subcollection $\{A_{i_1},\dots, A_{i_n}\}$ of cardinality $n$ such that $\sigma(A_{i_1}\cap\cdots\cap A_{i_n})>0$ and hence $A_{i_1}\cap\cdots\cap A_{i_n}\ne\emptyset$. \end{lemma} To start the proof, first we establish the following claim, which is a quantitative strengthening of the statement for $n=2$: \begin{claim}\label{claim} Let $\mathcal X=(X,\mathcal M,\sigma)$ be a probability space. Then for any $0<c<1$ there exists $P_c\in\mathbb{N}$ such that for any $N>P_c$, if $\{A_1,\dots,A_N\}\subset\mathcal{M}_c$, then there exist distinct $i,j\leq N$ such that $\sigma(A_i\cap A_j)\geq c^3/3$. \end{claim} \begin{proof} Suppose not. Let $S\subset(0,1)$ be the set of all $c\in(0,1)$ such that the statement of the claim is false, and suppose $c\in S$. Then for every $ N\in\mathbb{N}$ there exists a subset $\{A_1,\dots,A_{2N}\}\subset\mathcal{M}_c$ such that $\sigma(A_i)\geq c$ for all $i$ but $\sigma(A_i\cap A_j)<c^3/3$ for all $i\ne j$. Consider the sets $A_{2i-1}\cup A_{2i}$, $i=1,\dots,N$. We have \begin{equation*} \sigma(A_{2i-1}\cup A_{2i})=\sigma(A_{2i-1})+\sigma(A_{2i})-\sigma(A_{2i-1}\cap A_{2i}) > c+c-\frac{c^3}3=2c-\frac{c^3}3. \end{equation*} Since $\sigma(X)=1\geq\sigma(A_{2i-1}\cup A_{2i})$, this implies $1> 2c-\frac{c^3}3$. In particular, since $c<1$, we have $c\lesssim 0.52<3/5$; hence $[3/5,1)\cap S=\emptyset$. Moreover, \begin{align*} \sigma\big((A_{2i-1}&\cup A_{2i})\cap (A_{2j-1}\cup A_{2j})\big) \\&=\sigma\big((A_{2i-1}\cap A_{2j}) \cup(A_{2i-1}\cap A_{2j-1}) \cup(A_{2i}\cap A_{2j}) \cup(A_{2i}\cap A_{2j-1})\big) \\&\leq \sigma(A_{2i-1}\cap A_{2j}) +\sigma(A_{2i-1}\cap A_{2j-1}) +\sigma(A_{2i}\cap A_{2j}) +\sigma(A_{2i}\cap A_{2j-1}) \\&< 4\frac{c^3}3\leq \frac{(2c-c^3/3)^3}3\hbox{ since } 0<c<1. \end{align*} Thus, there exist $N$ sets, namely $A_1\cup A_2,\dots,A_{2N-1}\cup A_{2N}$, such that each has measure at least $f(c):=2c-\frac{c^3}3$ but all pairwise intersections have measure less than $\frac{f(c)^3}3$. Thus, we have shown that if $c\in S$ then $f(c)\in S$ as well. However if $0<c<1$, then there exists $k\in\mathbb{N}$ such that $f^k(c)>3/5$ and is thus $\notin S$ (where $f^k$ denotes $f$ composed with itself $k$ times). It follows that $S$ must be empty. $\hfill\Box\smallskip$ \end{proof} \vskip.125in We use Claim \ref{claim} as a building block for the proof of Lemma \ref{lemma pigeon rev}, which is by induction on $n$. If $n=1$, then we can take $N=1$, since any $A_{i_1}\in \mathcal{M}_c$ satisfies the statement. If $n=2$ then any $N\ge \lceil{ 1/c}\rceil$ suffices, since there cannot be more than $1/c$ pairwise disjoint sets of measure $\geq c$ each; alternatively, one may simply invoke Claim \ref{claim}. \vskip.125in Now suppose that the conclusion of Lemma \ref{lemma pigeon rev} holds for some $n$, $n\ge 2$. Set $N=2N(\mathcal{X},c^3/3,n)+P_c$, and suppose $\{A_1,\dots,A_N\}\subset\mathcal{M}_c$ is a collection of cardinality $N$. Since $N>P_c$, by Claim \ref{claim} there exist distinct $i,j\leq N$ such that $\sigma(A_i\cap A_j)>\frac{c^3}{3}$. Let $B_1=A_i\cap A_j$. Removing $A_i$ and $A_j$ from the collection we still have $N-2>P_c$ sets, so can find another pair whose intersection has measure at least $\frac{c^3}3$. Repeating this procedure $N(\mathcal{X},c^3/3,n)$ times, one finds sets $B_1,\dots,B_{N(\mathcal{X},c^3/3,n)}\in\mathcal{M}_{c^3/3}$. By the induction hypothesis there exist $0<i_1<i_2<\dots<i_n\leq N(\mathcal{X},c^3/3,n)$ such that $\sigma(B_{i_1}\cap\dots\cap B_{i_n})>0$. Since $B_{i_1}\cap\dots\cap B_{i_n}$ is the intersection of $2n$ distinct sets from the collection $\{A_1,\dots,A_N\}$, the intersection of any $n+1$ of those $2n$ will have positive measure, completing the induction step. $\hfill\Box\smallskip$
\section{Introduction} In the past three decades the lattice Boltzmann method (LBM)~\cite{Frisch1986,Benzi1992,Chen1998a}, particularly the lattice BGK (LBGK) single-relaxation-time (SRT) model~\cite{Bhatnagar1954,Chen1992,Qian1992}, has gained a tremendous popularity in many areas of fluid mechanics. Despite the great success, a number of deficiencies have long plagued LBGK. The most noticeable ones are perhaps the fixed unity Prandtl number, the sometimes poor numerical stability, and the various forms of violations of the Galilean invariance. Aiming at eliminating, or at least alleviating, these deficiencies, a number of efforts have been made to improve the collision model, including the multiple-relaxation-time (MRT) model~\cite{d'Humieres1992,d'Humieres2002} and its central-moment (CM) version~\cite{Geier2006}, the ``regularized'' models~\cite{Ladd1994a,Latt2006,Chen2006,Mattila2017,Coreixas2017}, and the Hermite expansion based high-order MRT model~\cite{Shan2007,Chen2014b}. These models, suggested with their own purposes and assumptions, all enjoyed success of various degrees and shared the commonality that the moments of the distribution are individually manipulated. One of the aims of the present work is to offer a coherent view that can hopefully provide a theoretical framework within which the essence of the aforementioned models can be examined. The unity Prandtl number is a well-known artifact of the BGK model which relaxes all moments at the same rate. A few remedies in continuum, \textit{e.g.}, the ellipsoid-statistical BGK~\cite{Gross1959,Holway1966,Andries2001} and the Shakhov model~\cite{Shakhov1972} were suggested to introduce additional parameters in the target distribution so that the heat flux is decoupled from stress tensor. In the LB realm, McNamara \textit{et al}~\cite{McNamara1997} implemented a LB collision operator with a different eigenvalue for the third moments with respect to the \textit{peculiar velocity} to adjust the thermal conductivity. In the MRT model of d'Humieres \textit{et al}~\cite{d'Humieres2002,Lallemand2003}, the distribution function is decomposed into eigen-vectors corresponding to the lowest raw moments to each of which a separate relaxation time is assigned. Theoretically this should allow a variable Prandtl number. However, as the recovery of the heat equation requires accurate discrete representation of the third moments~\cite{Nie2008a} which is not possible on the types of lattices that the MRT was developed with, the MRT was mostly advocated as a stability improvement. However, the idea of assigning a separate relaxation time to each of the moments was generalized to high-order LBM to allow a variable Prandtl number~\cite{Shan2007}. In practical simulations, the MRT model was observed to drastically improve the numerical stability at high Reynolds numbers~\cite{Lallemand2000,d'Humieres2002}. It is now generally agreed that this improvement is due to the filtering of the ``ghost'' modes that are not adequately represented by the discrete velocities~\cite{Nie2008a}. Similar improvements was indeed achieved by the ``regularized'' models which trim the under-resolved moments~\cite{Ladd1994a,McNamara1995,Latt2006,Chen2006}. More recently, the regularization approach was extended to high-order LB~\cite{Malaspinas2015,Mattila2017,Coreixas2017}, leading to further enhanced numerical stabilities. The problem of Galilean invariance has been known since the days of the lattice Gas Cellular Automaton (LGA) fluid models~\cite{Frisch1986}. Due to discretization, the hydrodynamic equations differs from the Navier-Stokes-Fourier (NSF) equations by some velocity-dependent terms. Most of these problems have been fixed in the LBGK model~\cite{Chen1992,Qian1992} except the so-called ``cubic'' error~\cite{Qian1993} which results in velocity-dependent viscosity and/or thermal diffusivity. This is now understood as being caused by not retaining sufficient moments when the BGK equation is discretized in velocity space and can be completely eliminated by using higher-order equilibrium distributions and lattices~\cite{Nie2008a}. Partial removal of this error is also possible by explicitly correcting the incomplete third moments~\cite{Dellar2014}. In the high-order MRT model, another violation of Galilean invariance emerged in the energy equation when the second and third moments are relaxed at different rates. More recently this error was removed by explicitly requiring the third moments to take a particular form that yields the NSF equations~\cite{Chen2014b}, in a similar fashion that the equilibrium distribution was modified for a similar purpose~\cite{Chen1992}. Nevertheless, it is not clear how this approach can be extended to the relaxation of higher-order moments. The cascaded LB~\cite{Geier2006} (CLB) extends the MRT by performing moment relaxation in the reference frame moving with the fluid, leading to a cascade of equations where the relaxations of the higher moments involves those of the lower ones. Significant improvement of numerical stability has been observed in simulations~\cite{Ning2016} which is understandable as moment expansion in the relative frame, \textit{i.e.}, \textit{central moments} (CMs) expansion, intrinsically has a faster convergence and hence a better numerical performance. As the derivation of the CLB is rather involved, it is difficult to be extended beyond the second order to address the unity Prandtl number problem. Also, the complete restoration of Galilean invariance in the viscous term also requires correct handling of the third moments~\cite{Nie2008a}. The viscosity observed in the simulation~\cite{Geier2006} does show a velocity-dependency despite its small achievable value. As far as this author is aware of, there hasn't been any numerical evidence that CLB has corrected the cubic error. Lastly, we note that in continuum kinetic theory, moment expansion is almost always in CMs~\cite{Grad1949a}. However, to compute the CMs with discrete velocities \textit{via} quadrature, the abscissas must be chosen in the moving frame and become variables themselves. Sun \textit{et al}~\cite{Sun2000,Sun2003a} devised an \textit{adaptive} LB in which the CMs are computed such way and fast convergence were indeed achieved. The downside is that a complicated particle streaming scheme involving interpolation has to be adopted. If the advantages of simple streaming-collision algorithm and linear advection are preferred, the discrete velocities must be fixed in the absolute frame. Here, extending the ideas in Ref.~\cite{Shan2007}, we derive a generic high-order MRT collision model by separate relaxation of the central moments. We first note that common to the MRT, regularizations, and cascaded collision models is the extraction of the moments from the discrete distribution function. Moments computed by discrete summation are not guaranteed to be the same as the corresponding velocity integrals in continuum. Namely, the equality: \begin{equation} \label{eq:moments} \sum_{i = 1}^d f(\bxi_i)\bxi_i\cdots\bxi_i = \int f(\bxi)\bxi\cdots\bxi d\bxi, \end{equation} may or may not hold depending on both the nature of $f$ and the discrete velocities. In case it doesn't, the hydrodynamic equations of the discrete model must be re-derived, \textit{e.g.}, by Chapman-Enskog (CE) calculation. Our formulation here is based on the previous works~\cite{Shan1998,Shan2006b} where the LB equation was formulated as a special velocity-space discretization of the continuous BGK equation. In the classic CE calculation of the BGK equation~\cite{Huang1987}, the hydrodynamic equations depend only on the leading CM's of the distribution function instead of its entirety. Provided that the discrete velocities form a sufficiently accurate quadrature and the equilibrium distribution is a finite-order truncation of the Maxwellian, Eq.~(\ref{eq:moments}) is guaranteed up to certain order, and the hydrodynamic equations are guaranteed to be the same as those obtained from the continuous BGK equation. The derivation is simple, generic and lattice-independent. The obtained model has a tunable Prandtl number and Galilean invariant viscous and thermal dissipations. At the lowest order, the result of Ref.~\cite{Chen2014b} is recovered. In addition, numerical stability similar to or better than those of the regularized models are achieved. The work is organized as the following. Theoretical formulation is presented in Sec.~\ref{sec:LBE}, where, after laying out necessary background, we first define a transform between the moments and the discrete distribution in Sec.~\ref{sec:DHT}. In Sec.~\ref{sec:REG} Some previous LB collision models are examined within this framework. In Sec.~\ref{sec:MRT} the general conditions for the collision term to yield NSF equations are obtained by examining the CE procedure with BGK collision operator~\cite{Chapman1970,Huang1987}. Using these conditions, a generic high-order MRT collision model is then constructed in terms of its Hermite expansion. Numerical verifications are provided in Sec.~\ref{sec:NUM}, and further discussions and conclusions are in Sec.~\ref{sec:discussion}. Some relations between the moments and Hermite coefficients in the absolute and relative frames are given in Appendix~\ref{sec:apdx}. \section{Theoretical derivation} \label{sec:LBE} The LB equation can be viewed as the projection of the following continuous Boltzmann-BGK equation into a low-dimensional Hilbert space spanned by the leading Hermite polynomials~\cite{Shan1998,Shan2006b}: \begin{equation} \label{eq:boltzmann} \pp ft + \bxi\cdot\nabla f + \bg\cdot\nabla_\xi f = \Omega(f). \end{equation} Here, $f$, $\bxi$ and $\bg$ are the single-particle distribution, the peculiar velocity and the external body force respectively, $\nabla_\xi$ the gradient operator in velocity space, and $\Omega(f)$ the BGK single-relaxation-time (SRT) collision model~\cite{Bhatnagar1954}: \begin{equation} \label{eq:bgk} \Omega = -\frac 1\tau\left[f - \f{0}\right], \end{equation} and $\f{0}$ the Maxwellian: \begin{equation} \label{eq:maxwellian} \f{0} = \frac\rho{(2\pi\theta)^{D/2}} \exp\left[-\frac{|\bxi - \bu|^2}{2\theta}\right], \end{equation} where $\rho$, $\bu$ and $\theta$ are respectively the dimensionless fluid density, velocity, and temperature~\cite{Shan2006b}. Hermite polynomials in high dimensions were extensively treated by Grad~\cite{Grad1949}. Throughout the paper, we use a slightly different notation which is standard in Tensor Analysis. First define the \textit{symmetrization} operator: \begin{equation} \mbox{Sym}(\bm{A})\equiv\frac{1}{r!}\sum A_{i_1\cdots i_r}, \end{equation} where, $\bm{A}$ is a rank-$r$ tensor and the summation is over the $r!$ permutations of the $r$ indexes. The \textit{symmetric product} of two tensors, $\bm{A}$ and $\bm{B}$, is denoted by $\bm{AB}$ and defined as: \begin{equation} \bm{AB}\equiv\mbox{Sym}(\bm{A}\otimes\bm{B}), \end{equation} where $\otimes$ stands for the normal tensor product. The symmetric product has the following properties: \begin{enumerate} \item commutativity: $\bm{AB} = \bm{BA}$; \item associativity: $(\bm{AB})\bm{C} = \bm{A}(\bm{BC})$; \item distributivity: $(\bm{A}+\bm{B})\bm{C} = \bm{AC} + \bm{BC}$. \end{enumerate} Hereinafter all tensor products are symmetric unless otherwise noted. \subsection{The discrete Hermite transform} \label{sec:DHT} Critical to our formulation of the MRT collision operator is the extraction of the velocity moments from the \textit{discrete} distributions. For the hydrodynamic equations to be the NSF equations, we must ensure that the moments so obtained are exactly the continuum hydrodynamic moments, \textit{i.e.}, Eq.~(\ref{eq:moments}) must hold. Similar to the Discrete Fourier Transforms (DFT), for a function that is a finite Hermite series, a transform between its moments and discrete function values can be defined \textit{via} Gauss quadrature~\cite{Krylov1962,Stroud1971}. First, the Hermite polynomials form an ortho-normal basis of the $D$-dimensional function space w.r.t.\ the inter-product $\langle f, g\rangle \equiv\int\omega fgd\bxi$, where $\omega(\bxi)$ is the weight function: \begin{equation} \frac 1{(2\pi)^{D/2}} \exp\left[-\frac{|\bxi|^2}2\right]. \end{equation} For any function $f$ such that $f/\omega$ is square-integrable, the following general Fourier series exists: \begin{equation} \label{eq:dht-a} f(\bxi) = \omega(\bxi)\sum_{n=0}^\infty\frac 1{n!}\ba{n}:\bH{n}(\bxi), \end{equation} where, \begin{equation} \label{eq:dht-b} \ba{n} = \int f(\bxi)\bH{n}(\bxi)d\bxi,\quad n = 0, \cdots, \infty, \end{equation} is the $n$-th Hermite coefficients, and `:' denotes full tensor contraction. Since $\bH{n}(\bxi)$ is a polynomial in $\bxi$, $\ba{n}$ is essentially a combination of the velocity moments. For an $N$-th degree polynomials, $p(\bxi)$, there exists a set of abscissas and associated weights, $\{\bxi_i, w_i: i = 1, \cdots, d\}$, such that: \begin{equation} \label{eq:quad} \int\omega(\bxi) p(\bxi)d\bxi = \sum_{i=1}^dw_ip(\bxi_i). \end{equation} Particularly, quadrature rules with abscissas coincide with a Bravais lattice, \textit{aka} ``on-lattice'' quadratures, can be obtained by solving a \textit{linear programming} problem~\cite{Shan2006b,Philippi2006,Chikatamarla2009,Shan2010c,Shan2016}. Consider the $N$-th order truncation of Eq.~(\ref{eq:dht-a}): \begin{equation} f_N(\bxi) \equiv \omega(\bxi)\sum_{n=0}^N\frac 1{n!}\ba{n}:\bH{n}(\bxi). \end{equation} Obviously $f_N/\omega$ is an $N$-th order polynomial. Eq.~(\ref{eq:dht-b}) can be written as: \begin{equation} \ba{n} = \int\omega(\bxi) \left[\frac{f_N(\bxi)\bH{n}(\bxi)}{\omega(\bxi)}\right]d\bxi. \end{equation} Noting that the term inside the brackets is an $(N+n)$-th degree polynomial, by Eq.~(\ref{eq:quad}) we have: \begin{equation} \label{eq:an} \ba{n} = \sum_{i=1}^d f_i\bH{n}(\bxi_i),\quad n = 0, \cdots, Q-N, \end{equation} where $\bxi_i$ and $w_i$ are respectively the abscissas and weights of a degree-$Q$ quadrature rule, and: \begin{equation} \label{eq:fi} f_i \equiv \frac{w_if_N(\bxi_i)}{\omega(\bxi_i)} = w_i\sum_{n=0}^N\frac 1{n!}\ba{n}:\bH{n}(\bxi_i). \end{equation} Eqs.~(\ref{eq:an}) and (\ref{eq:fi}) define an isomorphic transform between $\ba{n}$ and $f_i$, allowing the hydrodynamic moments to be exactly computed from the discrete distribution and \textit{vice versa}. As shown previously~\cite{Shan2006b}, $f_i$ are exactly the discrete distribution of LB. By Eq.~(\ref{eq:an}), the leading moments are the familiar expressions defining density, $\rho$, velocity, $\bu$, and kinetic energy density, $\epsilon$: \begin{equation} \rho = \sum_{i=1}^df_i,\quad \rho\bu = \sum_{i=1}^df_i\bxi_i,\quad \rho(u^2 + 2\epsilon) = \sum_{i=1}^df_i\xi_i^2. \end{equation} The dynamic equations for $f_i$ are obtained by directly evaluating Eq.~(\ref{eq:bgk}) at $\bxi_i$. After space and time discretization, we can write the LBGK equation in the following form: \begin{equation} \label{eq:lbgk} f_i(\bx + \bxi_i, t+1) = \left(1 - \omega\right)f_i + \omega\f{0}_i, \end{equation} where $\omega\equiv 1/\tau$ is the collision frequency. Writing $f_i = \f{0}_i + \f{1}_i$ with $\f{1}_i$ being the \textit{non-equilibrium} part of the distribution, the LBGK equation also has the equivalent form: \begin{equation} f_i(\bx + \bxi_i, t+1) = \f{0}_i + \left(1 - \omega\right)\f{1}_i. \end{equation} \subsection{Regularization and the general MRT model} \label{sec:REG} Eqs.~(\ref{eq:an}) and (\ref{eq:fi}) also provide a natural decomposition of the discrete distribution, $f_i$, into components corresponding to the moments. Substituting Eq.~(\ref{eq:an}) into Eq.~(\ref{eq:fi}), we have: \begin{equation} f_i = w_i\sum_{n=0}^N\frac 1{n!}\sum_{j=1}^d\bH{n}(\bxi_j):\bH{n}(\bxi_i)f_j. \end{equation} Defining the $d\times d$ \textit{projection matrices}: \begin{equation} \label{eq:m} M^{(n)}_{ij} = \frac{w_i}{n!}\bH{n}(\bxi_i):\bH{n}(\bxi_j), \end{equation} $M^{(n)}_{ij}f_j$ is the component of $f_i$ corresponding to the $n$-th moment. Summing up the leading $N$ components, we have the \textit{regularization} operator: \begin{equation} \label{eq:reg} \widehat{f_i} = \sum_{n=0}^NM_{ij}^{(n)}f_j, \end{equation} which takes a discrete distribution and trims its Hermite components higher than $N$. A regularized BGK model similar to that of Ref.~\cite{Latt2006} can then be generally written as: \begin{equation} \label{eq:lbgk-reg} f_i(\bx + \bxi_i, t+1) = \left(1 - \omega\right)\widehat{f_i} + \omega\f{0}_i. \end{equation} The collision term on the r.h.s.\ is characterized by three parameters: the collision frequency, $\omega$, the projection order, $N$, and the truncation order of $\f{0}$, $M$, which is not necessarily the same as $N$. In case $f_i$ contains no moments beyond the $N$-th order, $\widehat{f_i} = f_i$. Obviously, when $M \leq N$, we have: \begin{equation} \widehat{\f{0}_i} = \f{0}_i. \end{equation} In that case, Eq.~(\ref{eq:lbgk-reg}) can be written as: \begin{equation} f_i(\bx + \bxi_i, t+1) = \f{0}_i + \left(1 - \omega\right)\widehat{\f{1}_i}, \end{equation} which is essentially an SRT regularized LB that discards all components of the distribution that correspond to moments higher that what can be accurately represented by $f_i$. By assigning a separate relaxation time to each of the Hermite components of $\f{1}$, the previous MRT LB model~\cite{Shan2007} can be written as: \begin{equation} f_i(\bx + \bxi_i, t+1) = \f{0}_i + \sum_{n=2}^N\left(1 - \omega_n\right)M^{(n)}_{ij}\f{1}_j, \end{equation} where the summation starts from two because the zeroth and first moments of $\f{1}$ vanish due to mass and momentum conservation. \subsection{The multi-relaxation-time collision model} \label{sec:MRT} We now turn to the conditions for the collision operator to yield NSF equations by examining how the NSF equations are derived with the BGK collision model~\cite{Huang1987}. The hydrodynamic equations are the conservation laws of mass, momentum and energy, all velocity moments. Taking these moments of Eq.~(\ref{eq:boltzmann}), the right-hand-side vanishes, and the left-hand-side contains the following additional central moments: \begin{equation} \bsigma = \int f\bc\bc d\bc,\quad\mbox{and}\quad \bm{q} = \frac 12\int f c^2\bc d\bc, \end{equation} which are identified as the \textit{pressure tensor} and \textit{heat flux}. We need to express $\bm{\sigma}$ and $\bm{q}$ in terms of $\rho$, $\bu$, $\theta$ and their derivatives to close the conservation equations. At the zeroth order, $f$ is taken to be the local Maxwellian of Eq.~(\ref{eq:maxwellian}) which yields $\bsigma^{(0)} = \rho\theta\bdelta$ and $\bm{q}^{(0)}=\bm{0}$. On substituting into the conservation equations, we have Euler's equations. Next, on substituting $f = \f{0} + \f{1}$ into Eq.~(\ref{eq:boltzmann}) and ignoring $\f{1}$ on the left-hand-side, we have: \begin{equation} \label{eq:c-moment} \left(\pp{}t + \bxi\cdot\nabla + \bg\cdot\nabla_\xi\right)\f{0} \cong -\omega\f{1}. \end{equation} The first approximation, $\f{1}$, can be obtained after expressing the l.h.s.\ in terms of $\rho$, $\bu$, $\theta$ and their spatial derivatives by the chain rule of differentiation and the Euler's equation. Taking the corresponding moments, we have: \begin{subequations} \label{eq:sigma} \begin{eqnarray} \sigma^{(1)}_{ij} &=& -\tau\rho\theta\left[\pp{u_i}{x_j} + \pp{u_j}{x_i}-\frac 2D\delta_{ij}\nabla\cdot\bu\right],\\ \bm{q}^{(1)} &=& -\frac{D+2}2\tau\rho\theta\nabla\theta. \end{eqnarray} \end{subequations} On substituting the above into the conservation equations we have the NSF equations. Evident from this procedure is that the form of the hydrodynamic equations is completely determined by $\bsigma^{(1)}$ and $\bm{q}^{(1)}$. As long as the collision term satisfies the following condition: \begin{equation} \label{eq:omega} \int\Omega\bc^nd\bc = -\omega_n\int\f{1}\bc^nd\bc, \quad\mbox{for}\quad n = 2, 3. \end{equation} $\bsigma^{(1)}$ and $\bm{q}^{(1)}$ will have the same form as Eqs.~(\ref{eq:sigma}) with $\omega$ replaced by $\omega_2$ and $\omega_3$ respectively. The hydrodynamic equations will be the same NSF equations but separately tunable viscosity and thermal diffusivity. More generally, it is natural to demand that Eq.~(\ref{eq:omega}) is satisfied for all $n$. This way, each of the CM's is relaxed at its own rate. Since the set of monomials, $\{\bc^{n}\}$, is a complete basis of the functional space, by specifying all moments of $\Omega$, we specify $\Omega$ itself completely. We now construct the collision operator in terms of its Hermite coefficients. Let the $n$-th Hermite coefficients of $\Omega$ and $\f{1}$ in absolute frame be denoted by $\ba{n}_\Omega$ and $\ba{n}_1$ respectively, and those in the relative frame by $\bb{n}_\Omega$ and $\bb{n}_1$. Due to the conservations of mass and momentum, we must have $\ba{0}_1 = \ba{1}_1 = 0$, and hence $\ba{0}_\Omega = \ba{1}_\Omega = 0$. By Eqs.~(\ref{eq:trans-a}), we have $\bb{0}_1 = \bb{1}_1 = \bb{0}_\Omega = \bb{1}_\Omega = 0$, and: \begin{subequations} \label{eq:trans-s} \begin{eqnarray} \bb{2} &=& \ba{2},\\ \bb{3} &=& \ba{3} - 3\bu\ba{2},\\ \bb{4} &=& \ba{4} - 4\bu\ba{3} + 6\bu^2\ba{2}. \end{eqnarray} \end{subequations} The Hermite expansions of $\Omega$ and $\f{1}$ in the relative frame are: \begin{subequations} \begin{eqnarray} \Omega &=& \omega(\bc)\sum_{n=2}^N\frac 1{n!}\bb{n}_\Omega:\bH{n}(\bc),\\ \f{1} &=& \omega(\bc)\sum_{n=2}^N\frac 1{n!}\bb{n}_1:\bH{n}(\bc). \end{eqnarray} \end{subequations} Writing $\bc^n$ in terms of $\bH{n}(\bc)$ by Eqs.~(\ref{eq:hermite-r}) and using the orthogonality relations, we have: \begin{subequations} \begin{eqnarray} \int\Omega\bc^2d\bc &=& \frac{1}{2!}\bb{2}_\Omega,\\ \int\Omega\bc^3d\bc &=& \frac{1}{3!}\bb{3}_\Omega,\\ \int\Omega\bc^4d\bc &=& \frac{1}{4!}\bb{3}_\Omega + \frac{6}{2!}\bdelta\bb{2}_\Omega, \end{eqnarray} \end{subequations} and similar expressions for $\int\f{1}\bc^nd\bc$. On substituting into Eq.~(\ref{eq:omega}), we arrive at a hierarchy of equations of which the leading few are: \begin{subequations} \begin{eqnarray} \bb{2}_\Omega &=& -\omega_2\bb{2}_1,\\ \bb{3}_\Omega &=& -\omega_3\bb{3}_1,\\ \label{eq:b3} \bb{4}_\Omega + 72\bdelta\bb{2}_\Omega &=& -\omega_4\left[\bb{4}_1 + 72\bdelta\bb{2}_1\right]. \end{eqnarray} \end{subequations} Converting $\bb{n}$ to $\ba{n}$ using Eq.~(\ref{eq:trans-s}), we have: \begin{subequations} \begin{eqnarray} \ba{2}_\Omega &=& -\omega_2\ba{2}_1,\\ \ba{3}_\Omega &-& 3\bu\ba{2}_\Omega = -\omega_3\left[\ba{3}_1 - 3\bu\ba{2}_1\right],\\ \ba{4}_\Omega &-& 4\bu\ba{3}_\Omega + 6(\bu^2+12\bdelta)\ba{2}_\Omega = \nonumber\\ &-&\omega_4\left[\ba{4}_1 - 4\bu\ba{3}_1 + 6(\bu^2+12\bdelta)\ba{2}_1\right]. \end{eqnarray} \end{subequations} Straightforwardly, $\ba{n}_\Omega$ can be solved as: \begin{subequations} \label{eq:mrt} \begin{eqnarray} \label{eq:mrt-a} \ba{2}_\Omega && = -\omega_2\ba{2}_1,\\ \label{eq:mrt-b} \ba{3}_\Omega && = -\omega_3\ba{3}_1 + 3(\omega_3 - \omega_2)\bu\ba{2}_1,\\ \ba{4}_\Omega && = -\omega_4\ba{4}_1 + 4(\omega_4 - \omega_3)\bu\ba{3}_1 \nonumber\\ -&& 6[(\omega_4 + \omega_2 - 2\omega_3)\bu^2+12(\omega_4-\omega_2)\bdelta]\ba{2}_1, \end{eqnarray} \end{subequations} which are the Hermite coefficients of $\Omega$ in the absolute frame. For comparison, the similar coefficients of the BGK and the high-order MRT~\cite{Shan2007} operators are respectively: \begin{equation} \label{eq:regnmrt} \ba{n}_\Omega = -\omega\ba{n}_1,\quad\mbox{and}\quad \ba{n}_\Omega = -\omega_n\ba{n}_1. \end{equation} We first note that when all the relaxation times are the same, all three are identical. Second, as far as the second moments are concerned, relaxations of the central and raw moments are equivalent. This is in agreement with some of the numerical observation~\cite{Ning2016}. Third, the correction to the third moments, \textit{i.e.}, the second term on the right-hand-side of Eq.~(\ref{eq:mrt-b}), recovers the result in Ref.~\cite{Chen2014b}. The computation of the collision process goes as the following. Given the post-streaming distribution, $f_i$, its non-equilibrium part is $\f{1}_i = f_i - \f{0}_i$, from which $\ba{n}_1$, and $\ba{n}_\Omega$ in turn, can be calculated by Eqs.~(\ref{eq:an}) and (\ref{eq:mrt}). $\Omega_i$ is then obtained from $\ba{n}_\Omega$ using Eq.~(\ref{eq:fi}), and finally the post-collision distribution is updated using the following lattice Boltzmann equation: \begin{equation} f_i(\bx + \bxi_i, t+1) = \hat{f_i} + \Omega_i. \end{equation} \section{Numerical verification} \label{sec:NUM} In this section we numerically verify the CM-based MRT (CM-MRT) model. First the viscosity and thermal diffusivity were numerically measured \textit{via} the dynamics of the linear hydrodynamic modes in the presence of a translational flow. The numerical measurements are then compared with theoretical values. The independence of the transport coefficients on the translational flow, and hence the Galilean invariance in the dissipation terms, can then be verified. Secondly, a thorough and complete characterization of CM-MRT's numerical stability is beyond the scope of the present paper and deferred to a later publication. Here we choose to only present some preliminary results on the popular test case of the double shear layer~\cite{Brown1995,Minion1997}. The results seem to show that the CM-MRT is at least as stable as the regularized collision models. \subsection{Linear hydrodynamic modes test} \newcommand{\pe}{\mbox{Pe}} \newcommand{\re}{\mbox{Re}} \newcommand{\pr}{\mbox{Pr}} \newcommand{\ma}{\mbox{Ma}} We first give the theoretical predictions of the viscous, thermal and acoustic modes in the presence of a translational flow. Consider a small perturbations on top of a base flow with constant velocity. The density, velocity and temperature, all non-dimensionalized by the scheme in Ref.~\cite{Shan2006b}, are written as: \begin{equation} \label{eq:32} \rho = \rho_0 + \rho',\quad \bu = \bu_0 + \bu',\quad\mbox{and}\quad \theta = \theta_0 + \theta'. \end{equation} where the subscript $_0$ and the prices denote the quantities of the base flow and the perturbation respectively. The perturbation is in the form of a monochromatic wave: \begin{equation} \label{eq:modes} \left(\begin{array}{c}\rho'\\ \bu'\\ \theta' \end{array}\right) = \left( \begin{array}{c}\tilde{\rho}\\ \tilde{\bu}\\ \tilde{\theta} \end{array} \right)e^{\omega t+i\bm{k}\cdot(\bx - \bu_0t)}, \end{equation} where $\tilde{\rho}$, $\tilde{\bu}$ and $\tilde{\theta}$ are constant scaler amplitudes of the perturbations, $\omega$ and $\bk$ the frequency and wave vector, and $\bx$ the spatial coordinate. We first decompose the velocity perturbation into components parallel and perpendicular to the wave vector, \textit{i.e.}, we write $\tilde{\bu} = \tilde{u}_\parallel\bm{e}_\parallel + \tilde{u}_\perp\bm{e}_\perp$, where $\bm{e}_\parallel$ and $\bm{e}_\perp$ are unit vectors parallel and perpendicular to $\bk$. On substituting Eqs.~(\ref{eq:32}) and (\ref{eq:modes}) into the NSF equations, we obtain an eigen-system in the linear space of $(\tilde{\rho}, \tilde{u}_\parallel, \tilde{\theta}, \tilde{u}_\perp)^T$. The four eigen values give the dispersion relations, while the eigen-vectors define the corresponding amplitudes. Let $\gamma$ be the \textit{heat capacity ratio}, $\nu$ and $\eta$ the first and second \textit{kinematic viscosities}, and $\kappa$ the thermal diffusivity. Further non-dimensionalizing by defining the \textit{acoustic} Reynolds and P\'eclet numbers as $\re = c_s/\nu k$ and $\pe = c_s/\kappa k$, where $c_s\equiv \sqrt{\gamma\theta_0}$ is the \textit{sound speed} at temperature $\theta_0$. $\re$ and $\pe$ are related by $\pe = \re\cdot\pr$ where $\pr\equiv\nu/\kappa$ is the Prandtl number. The dimensionless dispersion relations are: \begin{subequations} \label{eq:dr} \begin{eqnarray} -\frac{\omega_v}{c_sk} &=& \frac 1{\re},\\ -\frac{\omega_t}{c_sk} &=& \frac 1{\pe} + \frac{(\gamma-1)\lambda}{\pe^3} + \mathcal{O}\left(\frac{1}{\pe^5}\right),\\ -\frac{\omega_\pm}{c_sk} &=& \frac{\gamma -\lambda}{2\pe} -\frac{(\gamma-1)\lambda}{2\pe^3} + \mathcal{O}\left(\frac{1}{\pe^5}\right)\nonumber\\ &\pm& i\left[1-\frac{(\gamma +\lambda)^2 - 4\lambda}{8\pe^2} + \mathcal{O}\left(\frac{1}{\pe^4}\right)\right], \end{eqnarray} \end{subequations} where $\omega_v$, $\omega_t$, and $\omega_\pm$ are the angular frequencies of the viscous, thermal, and acoustic modes respectively, $\lambda\equiv 1 + (\gamma-3)\Pr$ is a constant defined for brevity. Note that while the dispersion relation of the viscous mode is exact, the other three are solutions of a cubic characteristic equation and only their asymptotic expansions at the small-Pe limit are given. The numerical measurements were carried out as the following. First, given the desired amplitudes of the four modes, $\tilde{\rho}$, $\tilde{\bu}$ and $\tilde{\theta}$ were determined as the superposition of the four eigen-vectors. The perturbations, $\rho'$, $\bu'$ and $\theta'$, were then constructed according to Eqs.~(\ref{eq:modes}). Subsequently the amplitudes were determined by performing a spatial fast Fourier transform on a corresponding data field to extract the component of the given wave number. Noting that sound propagation is isentropic and thermal diffusion is isobaric, the data field for the viscous, thermal, and acoustic modes is $u_\perp$, the pressure, $p\equiv\rho\theta$, and entropy, $s\equiv c_v\ln(\theta\rho^{1-\gamma})$, respectively. Shown in Fig.~\ref{fg:amp} is the typical behavior of the linear mode amplitudes against their theoretical values. The CM-MRT model with a ninth-order 37-speed quadrature is used. The simulation was performed with $\nu = 0.1$ and $\kappa = 0.2$, yielding a Prandtl number of 0.5. The density, temperature and translational velocity of the base flow are $\rho_0 = 1$, $\theta_0 = 1.2$ and $\bu_0 = \bm{0}$ with the initial perturbation being a superposition of three monochrome viscous, thermal and standing acoustic wave, all with amplitude 0.001 and wave number $(1, 0)$, $(1,1)$ and $(1,0)$ respectively. The time histories were then fitted with the theoretical model of Eq.~(\ref{eq:modes}) to determine the angular frequencies. Comparing with Eqs.~(\ref{eq:dr}), the errors in $\omega_v$, $\omega_t$ and the real and imaginary parts of $\omega_\pm$ are respectively 0.17\%, 0.19\%, 0.19\% and 0.01\%. \begin{figure} \centering \begin{tikzpicture} \begin{semilogyaxis}[ ytickten={-1,0}, yticklabels={0.1, 1}, enlarge x limits=false, ymin=0.08, xlabel=Time, ylabel={Normalized amplitudes}, legend pos=south east, grid=major] \addplot[brown,mark=triangle,only marks] table[x=t, y=vis] {modes.dat}; \addplot[red, mark=square, only marks] table[x=t, y=thm] {modes.dat}; \addplot[blue, mark=o, only marks] table[x=t, y=acs] {modes.dat}; \addplot[domain=0:350,y domain=0.08:1, samples=500] {exp(-0.0004133*x)*abs(cos(0.0813*deg(x)))}; \addplot[domain=0:350] {exp(-0.0002755*x)}; \addplot[domain=0:350] {exp(-0.0011*x)}; \legend{Viscous mode,Thermal mode, Acoustic mode} \end{semilogyaxis} \end{tikzpicture} \caption{Typical time histories of the linear mode amplitudes. The simulation was performed using the 2D 37-velocity $E^{37}_{2,9}$ quadrature~\cite{Shan2016} on a $100\times 100$ double periodic lattice. Shown are the absolute values of the amplitudes of the viscous, thermal and standing acoustic waves all normalized with their initial values. The solid lines are theoretical results and symbols numerical measurements.} \label{fg:amp} \end{figure} Using this measurement mechanism, we first tested the grid convergence of the CM-MRT model with a number of high-order quadratures. As previously shown~\cite{Shan2016}, high-order quadrature rules with abscissas coincide with lattice nodes (on-lattice) that can accurately represent moments of any order can be found by solving a linear programming problem. The solutions form an polytope in the parameter space with its vertexes representing the quadratures with minimum number of velocities. In 2D, the minimum 7-th degree quadrature rules are the four $E^7_{2,17}$ rules, and the minimum 9-th degree rules are the four $E^9_{3,37}$ rules, all given in Ref.~\cite{Shan2016}. Shown in Fig.~\ref{fg:grid} are the relative errors in viscosity and thermal diffusivity measured by linear mode simulations using the CM-MRT model with all eight quadratures. All models demonstrate a second order spatial accuracy with the one using quadrature $E^7_{2,17}$-D being the most accurate. \begin{figure} \centering \begin{tikzpicture} \begin{loglogaxis}[ ylabel=Relative error in viscosity, grid=major, xtick={20, 40, 80, 160, 320}, xticklabels=\empty ] \addplot[mark=o] table[x index=0, y index=1] {convergence.dat}; \addplot[mark=x] table[x index=0, y index=3] {convergence.dat}; \addplot[mark=square] table[x index=0, y index=5] {convergence.dat}; \addplot[mark=triangle] table[x index=0, y index=7] {convergence.dat}; \addplot[red,mark=o] table[x index=0, y index=9] {convergence.dat}; \addplot[red,mark=x] table[x index=0, y index=11] {convergence.dat}; \addplot[red,mark=square] table[x index=0, y index=13] {convergence.dat}; \addplot[red,mark=triangle] table[x index=0, y index=15] {convergence.dat}; \legend{ {$E^7_{2,17}$-A}, {$E^7_{2,17}$-B}, {$E^7_{2,17}$-C}, {$E^7_{2,17}$-D}, {$E^9_{2,37}$-A}, {$E^9_{2,37}$-B}, {$E^9_{2,37}$-C}, {$E^9_{2,37}$-D} } \end{loglogaxis} \end{tikzpicture} \begin{tikzpicture} \begin{loglogaxis}[ xlabel=Grid resolution, ylabel=Relative error in thermal diffusivity, grid=major, xtick={20, 40, 80, 160, 320}, xticklabels={20, 40, 80, 160, 320} ] \addplot[mark=o] table[x index=0, y index=2] {convergence.dat}; \addplot[mark=x] table[x index=0, y index=3] {convergence.dat}; \addplot[mark=square] table[x index=0, y index=4] {convergence.dat}; \addplot[mark=triangle] table[x index=0, y index=5] {convergence.dat}; \addplot[red,mark=o] table[x index=0, y index=10] {convergence.dat}; \addplot[red,mark=x] table[x index=0, y index=12] {convergence.dat}; \addplot[red,mark=square] table[x index=0, y index=13] {convergence.dat}; \addplot[red,mark=triangle] table[x index=0, y index=14] {convergence.dat}; \legend{ {$E^7_{2,17}$-A}, {$E^7_{2,17}$-B}, {$E^7_{2,17}$-C}, {$E^7_{2,17}$-D}, {$E^9_{2,37}$-A}, {$E^9_{2,37}$-B}, {$E^9_{2,37}$-C}, {$E^9_{2,37}$-D} } \end{loglogaxis} \end{tikzpicture} \caption{Grid convergence of the CM-MRT model. Plotted are the relative errors in viscosity (top) and thermal diffusivity (bottom) using the $E^7_{2,17}$ and $E^9_{2,37}$ quadratures on a $L\times L$ lattice ranging from $L=20$ to $L=320$. The errors in viscosity of the four $E^9_{2,37}$ quadrature are almost identical and coincide on the graph. Although all models are second order, the magnitudes of the error can differ by a factor of approximately 4-5 among all quadrature rules. The quadrature $E^7_{2,17}$-D is found to have the best accuracy.} \label{fg:grid} \end{figure} We then used this apparatus to verify the Galilean invariance by including a translational velocity in the base flow, in a similar fashion as in Ref.~\cite{Chen2014b}. Specifically we set $\bu_0 = (0, u_0)$, and the initial perturbation consists of a viscous and a thermal wave, both with wave vector $\bk = (1, 0)$ and initial amplitude of 0.001. The base flow is in the transverse direction of the wave vector. Shown in Fig.~\ref{fg:galilean} are the errors in the measured viscosity and thermal diffusivity against $u_0$ using the MRT~\cite{Shan2007} and CM-MRT models. To be seen is that the errors in viscosity are small and identical, confirming the theoretical finding that the relaxations of raw and central moments at the second order are identical. The error in thermal diffusivity in MRT however increases linearly with $u_0$. This violation of Galilean invariance is eliminated in CM-MRT. \begin{figure} \centering \begin{tikzpicture} \begin{semilogyaxis}[ xlabel=$u_0$, ylabel={Relative Errors}, legend style={at={(0.96,0.5)}, anchor=east}, grid=major] \addplot[green,mark=x,only marks] table[x=u0, y=evm] {errors.dat}; \addplot[blue,mark=o,only marks] table[x=u0, y=etm] {errors.dat}; \addplot[red,mark=triangle,only marks] table[x=u0, y=evc] {errors.dat}; \addplot[brown,mark=square,only marks] table[x=u0, y=etc] {errors.dat}; \legend{ {Error in $\nu$, MRT}, {Error in $\kappa$, MRT}, {Error in $\nu$, CM}, {Error in $\kappa$, CM} } \end{semilogyaxis} \end{tikzpicture} \caption{Restoration of the Galilean invariance of transport coefficients by the CM-MRT model. Plotted are the relative errors in viscosity, $\nu$, and thermal diffusivity, $\kappa$, as measured from the linear mode tests using MRT and CM-MRT models, both with the $E^{37}_{2,9}$ quadrature on a $100\times 100$ lattice. On the horizontal axis is the magnitude of the translational velocity. The error in thermal diffusivity in the MRT model increases with $u_0$, breaking the Galilean invariance.} \label{fg:galilean} \end{figure} \subsection{Double shear layer test} The double-shear-layer (DSL)~\cite{Brown1995,Minion1997} is a well studied test case for numerical stability benchmark~\cite{Dellar2001, Dellar2003, Bosch2015, Mattila2015, Mattila2017, Coreixas2017}. The two-dimensional flow field is defined on a double periodic domain $0 \leq x, y \leq 1$ by: \begin{subequations} \begin{eqnarray} u_x &=& \left\{ \begin{array}{ll} u_0\tanh\rho(y-\frac 14), & \quad y \leq\frac 12\\ u_0\tanh\rho(\frac 34-y), & \quad y > \frac 12 \end{array}, \right.\\ u_y &=& \delta u_0\sin 2\pi\left[x + \frac 14\right], \end{eqnarray} \end{subequations} where $1/\rho$ measures the thickness of the shear layer, and $\delta$ a small parameter controlling the magnitude of the initial vertical perturbation. In simulations here, we chose $\rho = 80$ and $\delta = 0.05$ in accordance with the literature. All simulations are performed on a $L\times L$ square lattice where $L$ is the number of sites in one direction. In our notation~\cite{Shan2006b}, lengths are scaled by the lattice constant, $c$, and velocities by the isothermal sound speed, $c_s$. The Reynolds and Mach numbers are therefore $\re = u_0cL/\nu$ and $\ma = u_0$. Shown in Fig.~\ref{fg:dsl} are the typical vorticity fields simulated using D2Q9 with the resolutions $L=128$ and $L=256$ respectively. The occurrence of the secondary vortexes on the left is a well-known indication of insufficient resolution. \begin{figure} \begin{tikzpicture} \pgfplotsset{ axis x line=none, axis y line=none, width=2.2in, height=2.2in, enlarge x limits=0.01, enlarge y limits=0.01 } \matrix { \begin{axis} \addplot graphics[xmin=0,xmax=1,ymin=0,ymax=1]{D2Q9_BGK2_ISO_RE_1e4_MA_0_10_T3_1_000_128.png}; \end{axis} & \begin{axis} \addplot graphics[xmin=0,xmax=1,ymin=0,ymax=1]{D2Q9_BGK2_ISO_RE_1e4_MA_0_10_T3_1_000_256.png}; \end{axis} \\ }; \end{tikzpicture} \caption{Vorticity field at $t = 1$ in a double shear layer simulation using the D2Q9 BGK model. On the left, the simulation resolution is $128\times 128$, deemed insufficient as indicated by the spurious secondary vortexes that are absent in the better resolved case ($256\times 256$) on the right. The Reynolds number and Mach number are respectively 10,000 and 0.1 in both cases.} \label{fg:dsl} \end{figure} Extensive studies on the DSL were carried out to benchmark various collision models~\cite{Mattila2017,Coreixas2017}. For comparison, we also computed the stability boundary of the DSL using the isothermal MRT, isothermal CM-MRT and full thermal CM-MRT models on the same $L=128$ lattice. For a fixed pair of $\pr$ and $\re$, the maximum $\ma$ is defined as the highest $\ma$ that allows the simulation to be stably carried out till $t/t_c = 2$~\cite{Coreixas2017}. An iterative search algorithm was used to found the maximum $\ma$ for fixed $\pr$ and $\re$. Shown in Fig.~\ref{fg:converg} are the time histories of the averaged kinetic energy, $\langle u^2\rangle/u_0^2$, for an increasing sequence of Mach numbers at $\pr = 1$ and $\re = 10^7$ using the thermal CM-MRT. The maximum $\ma$ is determined at $0.2688$ in this case. \begin{figure} \centering \begin{tikzpicture} \begin{axis}[ xlabel=$t/t_c$, ylabel={Averaged kinetic energy $\langle u^2\rangle/u_0^2$}, legend style={at={(0.6,0.97)}, anchor=north}, grid=major] \addplot[mark=none,style=solid] table {D2Q37A_CM4_4_THM_RE_1e7_MA_0_2000_PR_1_000_128.dat}; \addplot[mark=none,style=dashed] table {D2Q37A_CM4_4_THM_RE_1e7_MA_0_2500_PR_1_000_128.dat}; \addplot[mark=none,style=dotted] table {D2Q37A_CM4_4_THM_RE_1e7_MA_0_2625_PR_1_000_128.dat}; \addplot[mark=square,style=solid,red] table {D2Q37A_CM4_4_THM_RE_1e7_MA_0_2688_PR_1_000_128.dat}; \addplot[mark=o,style=solid,blue] table {D2Q37A_CM4_4_THM_RE_1e7_MA_0_2750_PR_1_000_128.dat}; \legend{ {$\ma=0.2$}, {$\ma=0.25$}, {$\ma=0.2625$}, {$\ma=0.2688$}, {$\ma=0.2750$} } \end{axis} \end{tikzpicture} \caption{(Color online) Time histories of the averaged kinetic energy normalized by its initial value for a sequence of Mach number at $\pr=1$ and $\re=10^7$ using thermal CM-MRT on an $128\times 128$ lattice. At $\ma=0.275$ the simulation diverged and at $0.2688$ it barely survived beyond $t/t_c = 2$.} \label{fg:converg} \end{figure} Shown in Fig.~\ref{fg:stabilities} are the stability boundaries in the $\re$-$\ma$ plane using, from top to bottom, isothermal MRT, isothermal CM-MRT, and full thermal CM-MRT models. The same $E^9_{2,37}$-A quadrature was used in all cases and the truncation levels were $M=N=4$. In the isothermal cases, the temperature field was frozen at unity so that heat transfer is not simulated and $\tau_3$ becomes a free parameter with no direct impact on the hydrodynamic equations. To study its effect on numerical stability, the stability boundaries are plotted for a range of Prandtl numbers defined as $\pr\equiv \nu/\kappa$. It is evident from Fig.~\ref{fg:stabilities} that for the isothermal simulations with $\tau_3$ not too far from $\tau_2$, the MRT and CM-MRT perform similarly in terms of achievable Mach number and Reynolds number. Comparing with the best result of the regularized LBGK models~\cite{Mattila2017,Coreixas2017}, the present result ($\ma\sim 0.7$) is approximately 20\% better. For comparison, in the full thermal case, the maximum achievable Ma number drops to $\sim 0.25$ over a wide range of Prandtl number. Nevertheless, taking into account that the grid is severely under-resolved, this maximum is by no means implied as a limit in practical simulations. \begin{figure} \centering \begin{tikzpicture} \begin{semilogxaxis}[ ymin=0.5,ymax=0.8, ylabel={Maximum Mach number}, legend pos=south east, xticklabels=\empty, grid=major ] \addplot table[x index=0,y index=1] {D2Q37A_MRT4_4_ISO_stability.dat}; \addplot table[x index=0,y index=2] {D2Q37A_MRT4_4_ISO_stability.dat}; \addplot[mark=o] table[x index=0,y index=3] {D2Q37A_MRT4_4_ISO_stability.dat}; \addplot[mark=square] table[x index=0,y index=4] {D2Q37A_MRT4_4_ISO_stability.dat}; \addplot[mark=x] table[x index=0,y index=5] {D2Q37A_MRT4_4_ISO_stability.dat}; \legend{ {Pr = 0.01}, {Pr = 0.1}, {Pr = 1.}, {Pr = 10.}, {Pr = 100.} } \end{semilogxaxis} \end{tikzpicture} \begin{tikzpicture} \begin{semilogxaxis}[ ymin=0.5,ymax=0.8, ylabel={Maximum Mach number}, legend pos=south east, xticklabels=\empty, grid=major ] \addplot table[x index=0,y index=1] {D2Q37A_CM4_4_ISO_stability.dat}; \addplot table[x index=0,y index=2] {D2Q37A_CM4_4_ISO_stability.dat}; \addplot[mark=o] table[x index=0,y index=3] {D2Q37A_CM4_4_ISO_stability.dat}; \addplot[mark=square] table[x index=0,y index=4] {D2Q37A_CM4_4_ISO_stability.dat}; \addplot[mark=x] table[x index=0,y index=5] {D2Q37A_CM4_4_ISO_stability.dat}; \legend{ {Pr = 0.01}, {Pr = 0.1}, {Pr = 1.}, {Pr = 10.}, {Pr = 100.} } \end{semilogxaxis} \end{tikzpicture} \begin{tikzpicture} \begin{semilogxaxis}[ ymin=0.2,ymax=0.8, xlabel=Reynolds number, ylabel={Maximum Mach number}, grid=major ] \addplot table[x index=0,y index=1] {D2Q37A_CM4_4_THM_stability.dat}; \addplot table[x index=0,y index=2] {D2Q37A_CM4_4_THM_stability.dat}; \addplot[mark=o] table[x index=0,y index=3] {D2Q37A_CM4_4_THM_stability.dat}; \addplot[mark=square] table[x index=0,y index=4] {D2Q37A_CM4_4_THM_stability.dat}; \addplot[mark=x] table[x index=0,y index=5] {D2Q37A_CM4_4_THM_stability.dat}; \legend{ {Pr = 0.01}, {Pr = 0.1}, {Pr = 1.}, {Pr = 10.}, {Pr = 100.} } \end{semilogxaxis} \end{tikzpicture} \caption{Stability boundaries in the double shear layer simulation using isothermal MRT (top), isothermal CM-MRT (middle) and thermal CM-MRT (bottom) models. On the $y$-axis is the maximum Mach number ($u_0$) that the simulation can be carried out to $u_0t/Lc = 2$. For comparison, the Prandtl number is used as a measure of $\tau_3$ relative to $\tau_2$ in the top two isothermal cases although heat transfer is not simulated there.} \label{fg:stabilities} \end{figure} \section{Conclusions and Discussion} \label{sec:discussion} In summary, we propose a multiple-relaxation-time collision model by relaxing the central moments of the distribution function with individually assigned rates. The collision model is constructed in a way that guarantees that Chapman-Enskog calculation yields the correct hydrodynamic equation with separately tunable transport coefficients. Using binomial transform, the central moments are converted to raw moments for use in lattice Boltzmann models. It is theoretically shown and numerically verified that viscous and thermal dissipations are Galilean invariant and mutually independent, allowing a variable Prandtl number in CFD simulations. The derivation is simple, lattice-independent and applicable to moments of any order. Excellent numerical stability was also observed in the double-shear-layer test case. \begin{acknowledgments} This work was supported by the National Science Foundation of China Grants 91741101. \end{acknowledgments}
\section{Introduction} In 2000, Benjamini, H\"aggstr\"om, and Mossel \cite{bhm00} began the study of \textit{random graph homomorphisms into $\bb{Z}$}, alternatively known as \textit{graph-indexed random walks}. For a graph $G = (V,E)$ with distinguished vertex $v_0 \in E$, the \textit{$G$-indexed walks} are labelings of the following form: \begin{equation*} \mc{F}(G,v_0) := \left\{ f: V \to \bb{Z} \mid f(v_0) = 0, \{u,v\} \in E \implies |f(u) - f(v)| = 1\right\}. \end{equation*} As defined, such walks only exist when $G$ is bipartite, and so Loebl, Ne{\v{s}}et{\v{r}}il, and Reed \cite{lnj03} propose a model in which $\{u,v\} \in E$ implies $|f(u) - f(v)| \le 1$. These labelings are sometimes referred to as \textit{1-Lipschitz functions on graphs}, but here we will refer to them as \textit{lazy random walks} $\mathcal F'(G,v_0)$ for consistency of terminology. Following Benjamini, H\"aggstr\"om, and Mossel, let $f$ be a $G$-indexed walk chosen uniformly at random from $\mc{F}$ (or $\mathcal F'$, and consider properties such as the expected distance between a fixed pair of vertices and the expected range. Note that both of these quantities are invariant when adding a constant to all labels in a labeling of $G$, and as such are independent of the choice of $v_0$. We can then ignore the information of the choice of $v_0$ and simply refer to the space of labelings as $\mc{F}(G)$ (and $\mathcal F'(G)$). When comparing walks on different graphs, intuition would suggest that graph-indexed random walks on paths would be likely to have the largest range, and that adding more edges to a graph would necessarily bring vertices closer together in expectation. This second statement is not always true: Benjamini et al. exhibit a graph $G$ with two vertices $u$ and $v$, such that $\mathbb E(|f(u) - f(v)|)$ actually \textit{increases} upon adding an edge to $G$. Despite this, they also show for any $G, u, v$ that $\mathbb E(|f(u) - f(v)|)$ increases when $G$ is pared down to any path from $u$ to $v$, as one would expect. Moreover, a stronger statement holds--the distribution is \textit{stochastically dominated} by that of a path: \begin{theorem}[\cite{bhm00}, Theorem 2.8] Let $G = (V,E)$ be a bipartite, connected, finite graph, let $u,v \in V$ and let $P$ be any path from $u$ to $v$ in $G$. Then for all $k$, \begin{equation} \P_{f \in \mc{F}(G)}\left(|f(u)-f(v)| \ge k\right) \le \P_{f \in \mc{F}(P)} \left(|f(u)-f(v)| \ge k\right). \end{equation} \end{theorem} Stochastic domination is equivalent to stating that for any increasing $g$, the expectation of $g(|f(u)-f(v)|)$ is greater for a path than for any other graph. Taking $g(x) = x$ yields the weaker result that the expected difference between the labels of $u$ and $v$ is larger for a path, but domination also implies that quantities such as the expected squared distance are larger for the path as well. Loebl, Ne{\v{s}}et{\v{r}}il, and Reed prove a similar, but weaker, result in the lazy random walk setting: \begin{theorem}[\cite{lnj03}, Theorem 4] Let $G = (V,E)$ be a connected, finite graph (not necessarily bipartite) with $n$ vertices, let $u,v \in V$ and let $P$ be a path with $n$ vertices. Then for all $k$, \begin{equation} \bb{E}_{f \in \mc{F}'(G)}\left(|f(u)-f(v)|\right) \le \bb{E}_{f \in \mc{F}'(P)} \left(|f(u)-f(v)|\right). \end{equation} \end{theorem} For the purposes of this paper we define the range of a graph labeling $\mathrm{Range}(f) := \max_{u,v \in V} f(u) - f(v).$ Benjamini, H\"aggstr\"om, and Mossel make the following two conjectures regarding the range of a graph-indexed random walk: \begin{conjecture}[\cite{bhm00}, Conjecture 2.10] Let $G$ be a simple connected graph on $n$ vertices and let $P$ be the path on $n$ vertices. Then: \begin{itemize} \item (Weak). $\bb{E}_{f \in \mc{F}(G)}\mathrm{Range}(f) \leq \bb{E}_{f \in \mc{F}(P)}\mathrm{Range}(f)$. \item (Strong). $\P_{f \in \mc{F}(G)}(Range(f) \ge k) \leq \P_{f \in \mc{F}(P)}(Range(f) \ge k)$, for all $k$. \end{itemize} \end{conjecture} The conjecture may be analogously formulated in the lazy walk case. In the literature, there has been some progress made on the weak conjecture, and no progress made on the strong conjecture. Wu, Xu, and Zhu \cite{wxz16} resolve the weak conjecture in the affirmative for trees for both the standard and lazy random walks, and Bok and Ne{\v{s}}et{\v{r}}il \cite{bn18} extend this work to confirm the weak conjecture for unicyclic graphs. Loebl, Ne{\v{s}}et{\v{r}}il, and Reed \cite{lnj03} show that the expected range for any graph is bounded by some absolute constant multiple of the expected range of a path, in the lazy case. The main results of our paper resolve the strong conjecture in the affirmative for all trees in the lazy case, and for \textit{spiders}, trees with (at most) one vertex with degree greater than 2, in the standard case: \begin{theorem}\label{Main Result 1} Let $T$ be a tree on $n$ vertices and $P$ be the path on $n$ vertices. Then for all $k$, \begin{equation*} \P_{f \in \mc{F}'(T)}(Range(f) \ge k) \leq \P_{f \in \mc{F}'(P)}(Range(f) \ge k). \end{equation*} \end{theorem} \begin{theorem}\label{Main Result 2} Let $T$ be a spider on $n$ vertices and $P$ be the path on $n$ vertices. Then for all $k$, \begin{equation*} \P_{f \in \mc{F}(T)}(Range(f) \ge k) \leq \P_{f \in \mc{F}(P)}(Range(f) \ge k). \end{equation*} \end{theorem} \subsection{Remarks} The above definitions and conjectures are even more natural when restricted to trees. In the case of trees on $n$ vertices, there are always $2^{n-1}$ elements of $\mc{F}(T)$ (or $3^{n-1}$ in the lazy case), and consequently the computations of probabilities are replaced by enumerations of sets. The case of a tree-indexed random walk had been studied before the introduction of $G$-indexed random walks, although this earlier work was concentrated on infinite trees (for example, \cite{bp942, bp94}). Regarding graph homomorphisms specifically, much of the literature so far has been asymptotic and hence does not provide the exact precision required to show domination of distributions (see \cite{byy07, g03, k01}). In addition to the work mentioned above, Csikv{\'a}ri and Lin \cite{cl14} study random graph homomorphisms from trees into paths, the number of which is counted (in our notation) by $F^k(T)$, a key quantity we work with in the body of this paper. It may also be worth remarking on the obstacles that prevent extending the result for lazy walks to standard walks. A major problem in the standard case is as follows: let $P_3$ be the path with 3 edges. We are curious about $f_k^2(P_3)$, which we define later to be the number of valid ways to label the vertices with labels in $[0,2]$ such that the first vertex is labeled with $k$ and at least one vertex is labeled $2$. Intuitively, this quantity should increase as $k$ becomes closer to 2. However it does not: there are three labelings when $k=1$ and two when $k=2$. In what is likely a direct consequence of this, another problem arises: Consider the tree with 7 edges given by taking a path of 3 edges and appending a pair of leaves to both endpoints. This tree has two vertices of degree 3, but is not dominated by any other tree with seven edges other than the path of length seven. Consequently, no inductive argument that considers only one high-degree vertex at a time will be sufficient to handle this tree. \subsection{Acknowledgments} The first author would like to thank Jeff Kahn for suggesting this problem to him in 2017. This research was carried out in part at the Duluth REU, which is supported by NSF/DMS grant 1650947 and NSA grant H98230-18-1-0010, and by the University of Minnesota Duluth. \section{Preliminaries}\label{Prelims} We begin with the standard case, where adjacent vertices must have labels differing by exactly 1. \begin{definition} For a given tree $T$, let $F^k(T)$ be the number of labelings of $T$ with integers from $0$ to $k$ such that adjacent vertices are labeled with consecutive integers. Such labelings will be referred to as ``valid.'' \end{definition} \begin{definition} For a given tree $T$, let $f^k(T)$ be the number of labelings of $T$ (with, say, integers from $0$ to $k$) such that adjacent vertices are labeled with connected integers, up to equivalence by translation. \end{definition} \noindent \textit{Remark.} We may now restate the strong range conjecture as: \textit{$f^k(T) \ge f^k(P)$ for all $k$}. \begin{proposition} $f^k(T) = F^k(T) - F^{k-1}(T)$. \end{proposition} \begin{proof} Since every valid labeling bounded by $k-1$ is also a valid labeling bounded by $k$, $F^k(T) - F^{k-1}(T)$ counts the number of valid labelings of $T$ bounded by $k$ that are \textit{not} bounded by $k-1$, i.e. those for which at least one vertex is labeled $k$. Every equivalence class of labelings with range at most $k$ will have exactly one member in this set; simply translate the labeling so the maximum label equals $k$. \end{proof} \begin{definition}\label{F_i definition} For a tree $T$ with specified root, let $F_i^k(T)$ be the number of labelings of $T$ with labels in $\{0, \ldots, k\}$ such that the root is labeled $i$. Let $P_a = \{p_0, p_1, \ldots, p_a\}$ be the path with $a$ edges rooted at its endpoint $p_0$. For paths, let $F_{i \to j}^k(P_a)$ denote the number of valid labelings of $P_a$ such that the label of $p_0$ is $i$, and the label of $p_a$ is $j$. If, for example, $i < 0$, this quantity is simply 0. Similarly, if $i - j \not\equiv a \mod 2$, this quantity will be zero as well. \end{definition} \noindent \textit{Remark.} By reflection, we have that $F_i^k(T) = F_{k-i}^k(T)$. For paths in particular, we can condition on whether $p_1 - p_0$ is positive or negative to obtain the recursive formula $F_i^k(P_a) = F_{i+1}^k(P_{a-1}) + F_{i-1}^k(P_{a-1}).$ Similarly, given the first $a-1$ labels, we have no more than 2 choices for the final label, so $F_i^k(P_a) \le 2 F_i^k(P_{a-1})$. We continue with another intuitive result: a path has more labelings within a bounded interval when its root is closer to the center of that interval. \begin{lemma}\label{Center Is Bigger} $\left|i - \frac{k}{2}\right| \le \left|j - \frac{k}{2}\right| \Rightarrow F_i^k(P_a) \ge F_j^k(P_a). $ \end{lemma} \begin{proof} Note that for $k = 0$ or $1$, the result is trivial. For $k \ge 2$, we proceed by induction on $a$. When $a = 0$, both quantities are 1. Assume now the result holds for $a - 1$. By reflection, it suffices to consider $j \leq i \leq k/2.$ \begin{itemize} \item If $i \le k/2 - 1$, then for all $j < i$, we have $j+1 < i+1 \le k/2$ and $j-1 < i-1 \le k/2.$ Inductively, we obtain \begin{equation*} F_i^k(P_a) = F_{i+1}^k(P_{a-1}) + F_{i-1}^k(P_{a-1}) \ge F_{j+1}^k(P_{a-1}) + F_{j-1}^k(P_{a-1}) = F_j^k(P_a). \end{equation*} \item Otherwise, if $k$ is even and $i = k/2$, then \begin{equation*} F_i^k(P_a) = F_{k/2+1}^k(P_{a-1}) + F_{k/2-1}^k(P_{a-1}) = 2F_{k/2-1}^k(P_{a-1}) \ge F_{k/2-1}^k(P_{a}) \ge F_j^k(P_a). \end{equation*} \item Else, if $k$ is odd and $i = k/2-1/2$, then \begin{equation*} F_i^k(P_a) = F_{k/2+1/2}^k(P_{a-1}) + F_{k/2-3/2}^k(P_{a-1}) = F_{k/2-1/2}^k(P_{a-1}) + F_{k/2-3/2}^k(P_{a-1}) \ge F_{k/2-3/2}^k(P_{a}) \ge F_j^k(P_a). \end{equation*} \end{itemize} \end{proof} \begin{corollary}\label{Spider Center is Bigger} Let $T_{a_1, a_2, \ldots, a_l}$ be the spider with paths of length $a_1, a_2, \ldots, a_l$ emanating from a root. Then \begin{equation*} \left|i - \frac{k}{2}\right| \le \left|j - \frac{k}{2}\right| \Rightarrow F_i^k(T_{a_1,a_2,a_3,\ldots, a_l}) \ge F_j^k(T_{a_1,a_2,a_3,\ldots, a_l}). \end{equation*} \end{corollary} \begin{proof} By Lemma \ref{Center Is Bigger}, if $\left|j - \frac{k}{2}\right| \leq \left|i - \frac{k}{2}\right|$, we have \begin{equation*} F_j^k(T_{a_1,a_2,a_3,\ldots, a_l}) = \prod_{t = 1}^l F_j^k(P_{a_t}) \ge \prod_{t = 1}^l F_i^k(P_{a_t}) = F_i^k(T_{a_1,a_2,a_3,\ldots, a_l}). \end{equation*} \end{proof} \textit{Remark.} We will see that this result may be extended to any tree in the lazy case. The fact that there is no clear way to do this in the standard case prevents us from discussing trees other than spiders. \section{Main Results for Standard Walks}\label{Standard Results} \begin{lemma} \label{spidersums} Let $T_{a_1, a_2, \ldots, a_l}$ be the spider with paths of length $a_1, a_2, \ldots, a_l$ emanating from a root. Then \begin{equation*} F^k(T_{a_1,a_2,a_3,\ldots, a_l}) - F^k(T_{a_1 + a_2, a_3, \ldots ,a_l}) = \sum_{0 \leq i < j \le k} F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right)\left(F_{i}^k(T_{a_3,\ldots, a_l}) - F_{j}^k(T_{a_3,\ldots, a_l})\right). \end{equation*} \end{lemma} \begin{proof} We have: \begin{align*} F^k(T_{a_1,a_2,\ldots, a_l}) &= \sum_{i=0}^{k} F_i^k(P_{a_1})\cdots F_i^k(P_{a_l}) \\ &= \sum_{i=0}^{k} \sum_{j=0}^{k} F_{i \to j}^k(P_{a_1})F_{i}^k(P_{a_2})F_{i}^k(T_{a_3,\ldots, a_l})\\ &= \sum_{0 \leq i < j \le k} F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2})F_{i}^k(T_{a_3,\ldots, a_l}) +F_{j}^k(P_{a_2})F_{j}^k(T_{a_3,\ldots, a_l}) \right). \end{align*} and \begin{align*} F^k(T_{a_1+a_2,\ldots, a_l}) &= \sum_{i=0}^{k} F_i^k(P_{a_1+a_2})\cdots F_i^k(P_{a_l}) \\ &= \sum_{i=0}^{k} \sum_{j=0}^{k} F_{i \to j}^k(P_{a_1})F_{j}^k(P_{a_2})F_{i}^k(T_{a_3,\ldots, a_l})\\ &= \sum_{0 \leq i < j \le k} F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2})F_{j}^k(T_{a_3,\ldots, a_l}) +F_{j}^k(P_{a_2})F_{i}^k(T_{a_3,\ldots, a_l}) \right). \end{align*} Subtracting these equations and factoring yields the desired expression. \end{proof} We have now demonstrated that when combining two legs of a spider, $F^k$ increases. This would immediately be sufficient to show that $F^k$ for a spider is smaller than $F^k$ for a path. However we are concerned not directly with $F$, but rather with $f$, given by its partial differences. We continue by reproducing Lemma \ref{Center Is Bigger} for $f$: \begin{lemma}\label{1D Below Average} Let $i < j \leq k$ such that $\frac{i+j}{2} \leq \frac{k}{2}$. Then: $$0 \leq F_j^k(P_a) - F_i^k(P_a) \leq F_j^{k+1}(P_a) - F_i^{k+1}(P_a).$$ \end{lemma} \begin{proof} Positivity follows directly from Lemma \ref{Center Is Bigger}. For the second inequality we proceed in a similar manner to the proof of Lemma \ref{Center Is Bigger}: by induction on $a$, with special cases when $\frac{i+j}{2} = \frac{k}{2}$ and $\frac{i+j}{2} = \frac{k-1}{2}$. When $a = 0$ the result is trivial. For our first special case, if $\frac{i+j}{2} = \frac{k}{2}$, then $\left|i - \frac{k}{2}\right| = \left|j - \frac{k}{2}\right| = \frac{j - i}{2}$, and so the left-hand side is zero by symmetry, whereas the right-hand side is non-negative by the Lemma \ref{Center Is Bigger}. In fact, the second inequality (though not the first) still holds when $\frac{i+j}{2} = \frac{k+1}{2}$: the right-hand size is now 0 by symmetry, whereas the left-hand side is non-positive by Lemma \ref{Center Is Bigger}. It remains to verify the second inequality when $\frac{i+j}{2} \le \frac{k - 1}{2}$. Let $f_j^{k+1}(P_a) := F_j^{k+1}(P_a) - F_j^{k}(P_a)$. We can rewrite the desired inequality as: $$ f_j^{k+1}(P_a) \geq f_i^{k+1}(P_a). $$ Combinatorially, one can show that $f_j^{k+1}(P_a)$ counts the number of paths starting at $j$ of length $a$ such that at least one vertex is labeled $k+1$. Consequently, the following recursive formula holds for $j < k+1$: $$ f_j^{k+1}(P_a) = f_{j+1}^{k+1}(P_{a-1}) + f_{j-1}^{k+1}(P_{a-1}). $$ We continue inductively. Assume the statement holds for paths of length $a-1$, and recall that we know the desired inequality to always be true whenever $\frac{i+j}{2} \in \{\frac k2, \frac{k+1}{2}\}$. When $\frac{i+j}{2} \le \frac{k - 1}{2}$, either $i < 0$ (in which case the statement is trivial) or $j \le k - 1$. Inductively, we have shown that $f_{j+1}^{k+1}(P_{a-1}) \ge f_{i+1}^{k+1}(P_{a-1})$, and $f_{j-1}^{k+1}(P_{a-1}) \ge f_{i-1}^{k+1}(P_{a-1})$ whenever $i+1 < j+1 \leq k$ and $\frac{(i+1)+(j+1)}{2} \leq \frac{k+1}{2}$. Both of these conditions are satisfied by our hypotheses, and adding these two inequalities produces our desired statement. \end{proof} Following the pattern above, we may now reproduce Lemma \ref{Spider Center is Bigger} for $f$: \begin{lemma}\label{Bigger Difference} Let $T_{a_1, a_2, \ldots, a_l}$ be the spider with paths of length $a_1, a_2, \ldots, a_l$ emanating from a root, and let $i < j \leq k$ such that $\frac{i+j}{2} \leq \frac{k}{2}$. Then: \begin{equation*} 0 \leq F_{j}^k(T_{a_1,\ldots, a_l}) - F_{i}^k(T_{a_1,\ldots, a_l}) \leq F_{j}^{k+1}(T_{a_1,\ldots, a_l}) - F_{i}^{k+1}(T_{a_1,\ldots, a_l}). \end{equation*} \end{lemma} \begin{proof} As before, positivity follows directly from Corollary \ref{Spider Center is Bigger}. For the second inequality, we proceed by induction on $l$. When $l = 1$, this is just Lemma \ref{1D Below Average}. Otherwise, assume this is true for spiders with $l-1$ legs and rewrite the desired inequality as $$ f_j^{k+1}(T_{a_1,\ldots, a_l}) \geq f_i^{k+1}(T_{a_1,\ldots, a_l}). $$ Combinatorially, we have that $f_j^{k+1}(T_{a_1,\ldots, a_l})$ counts the number of trees of the given form with root labeled $j$, such that at least one vertex is labeled $k+1$. Thus we have either a vertex along $P_{a_1}$ labeled $k+1$, a vertex along one of the remaining paths labeled $k+1$, or both: $$ f_j^{k+1}(T_{a_1,\ldots, a_l}) = f_j^{k+1}(P_{a_1})F_j^{k}(T_{a_2,\ldots, a_l}) + F_j^{k}(P_{a_1})f_j^{k+1}(T_{a_2,\ldots, a_l}) + f_j^{k+1}(P_{a_1})f_j^{k+1}(T_{a_2,\ldots, a_l}). $$ Applying Lemma \ref{Center Is Bigger}, Corollary \ref{Spider Center is Bigger}, Lemma \ref{1D Below Average}, and the induction hypothesis as appropriate, we see each term becomes smaller when $j$ is replaced by $i$, which completes the proof. \end{proof} \begin{corollary}\label{Also Bigger} Let $T = T_{a_1, a_2, \ldots, a_l}$ be the spider with paths of length $a_1, a_2, \ldots, a_l$ emanating from a root, and let $i < j \leq k$ such that $\frac{i+j}{2} \geq \frac{k}{2}$. Then \begin{equation*} 0 \leq F_{i}^k(T) - F_{j}^k(T) \leq F_{i+1}^{k+1}(T) - F_{j+1}^{k+1}(T). \end{equation*} \end{corollary} \begin{proof} Positivity once again follows directly from Corollary \ref{Spider Center is Bigger}. For the second inequality, recall that reflection implies $F_{i}^k(T) = F_{k-i}^k(T)$. We see that the pair $(k - j, k - i)$ satisfies the hypotheses of Lemma \ref{Bigger Difference}, which yields: $$ F_{i}^k(T) - F_{j}^k(T) = F_{k-i}^k(T) - F_{k-j}^k(T) \leq F_{k-i}^{k+1}(T) - F_{k-j}^{k+1}(T) = F_{i+1}^{k+1}(T) - F_{j+1}^{k+1}(T) $$ \end{proof} We now prove the main result of this section. \begin{proof}[\bf Proof of Theorem \ref{Main Result 2}] We will combine one pair of legs of the spider at a time to inductively arrive at a path. Since $f^k(T)=F^k(T)-F^{k-1}(T)$ for any tree $T$, it suffices to show that \begin{equation*} F^k(T_{a_1,a_2,a_3,\ldots, a_l}) - F^k(T_{a_1 + a_2, a_3, \ldots ,a_l}) \leq F^{k+1}(T_{a_1,a_2,a_3,\ldots, a_l}) - F^{k+1}(T_{a_1 + a_2, a_3, \ldots ,a_l}). \end{equation*} From Lemma \ref{spidersums}, we have \begin{equation*} F^k(T_{a_1,a_2,a_3,\ldots, a_l}) - F^k(T_{a_1 + a_2, a_3, \ldots ,a_l}) = \sum_{0 \leq i < j \le k} F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right) \left(F_{i}^k(T_{a_3,\ldots, a_l}) - F_{j}^k(T_{a_3,\ldots, a_l})\right). \end{equation*} We now look at what happens to each term when we increase $k$ to $k+1$. For convenience we write $T' :=T_{a_3,\ldots,a_\ell}$. When $\frac{i+j}{2} \le \frac{k}{2}$, we compare to the $(i,j)$ summand for $k+1$, and claim: $$ F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right) \left(F_{i}^k(T') - F_{j}^k(T')\right) \le F_{i \to j}^{k+1}(P_{a_1}) \left(F_{i}^{k+1}(P_{a_2}) - F_j^{k+1}(P_{a_2})\right) \left(F_{i}^{k+1}(T') - F_{j}^{k+1}(T')\right) $$ We prove this inequality term-by-term. By definition $F_{i \to j}^k(P_{a_1}) \le F_{i \to j}^{k+1}(P_{a_1})$. By Lemma \ref{Bigger Difference}, we have that both $\left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right)$ and $\left(F_{i}^k(T_{a_3,\ldots, a_l}) - F_{j}^k(T_{a_3,\ldots, a_l})\right)$ are negative, and decrease when $k$ is replaced by $k+1$. Consequently the summand is positive and increases. On the other hand, when $\frac{i+j}{2} > \frac{k}{2}$, we compare to the $(i+1, j+1)$ summand for $k+1$, i.e. we claim: $$ F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right) \left(F_{i}^k(T') - F_{j}^k(T')\right) \le F_{i+1 \to j+1}^{k+1}(P_{a_1}) \left(F_{i+1}^{k+1}(P_{a_2}) - F_{j+1}^{k+1}(P_{a_2})\right) \left(F_{i+1}^{k+1}(T') - F_{j+1}^{k+1}(T')\right) $$ Again, the proof proceeds term-by-term. We have $F_{i \to j}^k(P_{a_1}) = F_{(k-i) \to (k-j)}^k(P_{a_1}) \le F_{(k-i) \to (k-j)}^{k+1}(P_{a_1}) = F_{i+1 \to j+1}^{k+1}(P_{a_1})$. From Corollary \ref{Also Bigger} we have that both $\left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right)$ and $\left(F_{i}^k(T_{a_3,\ldots, a_l}) - F_{j}^k(T_{a_3,\ldots, a_l})\right)$ are positive, and increase when $k$ is replaced by $k+1$ and $(i,j)$ by $(i+1, j+1)$. Consequently the summand is again positive, and increases when moving from $k$ to $k+1$, which completes the proof. \end{proof} \clearpage \section{The Lazy Random Walk Model} The results in Sections \ref{Prelims} and \ref{Standard Results} may be converted easily to the lazy case with few modifications. Abusing notation, in this section we will instead let $F^k(T)$ be the number of labelings of $T$ with integers from $0$ to $k$ such that adjacent vertices are labeled with either consecutive or identical integers. \begin{lemma}\label{lazy center is bigger} For any tree $T$ rooted at a vertex $v_0$, $|i-\frac k2| \le |j - \frac k2| \Rightarrow F_i^k(T) \ge F_j^k(T)$. \end{lemma} Compare this to Lemma \ref{Center Is Bigger} and Corollary \ref{Spider Center is Bigger} of the standard case. In the lazy case, we are able to easily extend this result to all trees, whereas in the standard case, there are some trees for which this statement is simply false (e.g. a star rooted at a leaf). \begin{proof} If $k = 0$ or $1$ the result is trivial. Otherwise, assume $k \ge 2$ and proceed inductively on $|V(T)|$. If $\deg(v_0) > 1$, then we can write $T = T_1 \cup T_2$ the union of two, nonempty trees rooted at $v_0$ that only overlap at $v_0$. In this case we have inductively $$ F_i^k(T) = F_i^k(T_1)F_i^k(T_2) \ge F_j^k(T_1)F_j^k(T_2) = F_j^k(T). $$ Otherwise, $\deg(v_0) = 1$. Then there is a unique edge $e = (v_0,v_1)$, and we consider labelings of the subtree $T'$ induced by deleting $v_0$. Without loss of generality assume $j+1 \le i \le \frac k2$. Then by triangle inequality, we have the following inequalities: $$ \left|i - \frac k2\right| \le \left|j+1 - \frac k2\right|,\quad \left|i+1 - \frac k2\right| \le \left|j - \frac k2\right|,\quad \left|i-1 - \frac k2\right| \le \left|j-1 - \frac k2\right|. $$ Matching terms and applying the inductive hypothesis, we obtain: $$ F_i^k(T) = F_{i-1}^k(T')+F_{i}^k(T')+F_{i+1}^k(T') \ge F_{j-1}^k(T')+F_{j+1}^k(T')+F_{j}^k(T') = F_j^k(T). $$ \end{proof} We continue by reproducing Lemmas \ref{1D Below Average} and \ref{Bigger Difference}, as well as Corollary \ref{Also Bigger} in the lazy case. Once again, we are now able to prove these statements for all trees. \begin{lemma}\label{lazy f center is better} Let $i < j \le k$ such that $\frac{i+j}2 \le \frac k2$. Then for any tree $T$ rooted at a vertex $v_0$, $$ 0 \le F_j^k(T) - F_i^k(T) \le F_j^{k+1}(T) - F_i^{k+1}(T). $$ \end{lemma} \begin{proof} Positivity follows directly from Lemma \ref{lazy center is bigger}, as well as the second inequality if either $\frac{i+j}{2} = \frac k2$ or $\frac{i+j}{2} = \frac{k+1}{2}$: in the former case the left-hand side is 0 and the right-hand side is non-negative, whereas in the latter case the right-hand side is 0 and the left-hand side is non-positive. It remains to prove the second inequality when $\frac{i+j}{2} \le \frac{k-1}{2}$. As before, proceed inductively on the size of $T$, and rewrite the inequality as: $$ f_j^{k+1}(T) \ge f_i^{k+1}(T). $$ If $\deg(v_0) > 1$, then we can write $T = T_1 \cup T_2$ the union of two nonempty trees rooted at $v_0$ that only overlap at $v_0$. In this case the inductive hypothesis and Lemma \ref{lazy center is bigger} allow us to compare term-by-term: \begin{align*} f_i^{k+1}(T) &= f_i^{k+1}(T_1)F_i^{k+1}(T_2)+F_i^{k+1}(T_1)f_i^{k+1}(T_2)+f_i^{k+1}(T_1)f_i^{k+1}(T_2)\\ &\ge f_j^{k+1}(T_1)F_j^{k+1}(T_2)+F_j^{k+1}(T_1)f_j^{k+1}(T_2)+f_j^{k+1}(T_1)f_j^{k+1}(T_2)\\ &= f_j^{k+1}(T). \end{align*} Otherwise, $\deg(v_0) = 1$. Then there is a unique edge $e = (v_0,v_1)$, and we consider labelings of the subtree $T'$ induced by deleting $v_0$. Via the combinatorial interpretation of $f$, for $i < k+1$ we have $f_i(T) = f_{i-1}(T')+f_i(T')+f_{i+1}(T')$. Since $\frac{i+1+j+1}{2} \le {k-1+2}{2} - {k+1}{2}$ by assumption, we can apply induction and match terms to obtain: $$ f_i^{k+1}(T) = f_{i-1}^{k+1}(T')+f_{i}^{k+1}(T')+f_{i+1}^{k+1}(T') \ge f_{j-1}^{k+1}(T')+f_{j}^{k+1}(T')+f_{j}^{k+1}(T') = f_j^{k+1}(T). $$ \end{proof} \begin{corollary}\label{lazy bigger too} Let $T$ be a tree and let $i < j \le k$ such that $\frac{i+j}{2} \ge \frac k2$. Then: $$ 0 \le F_i^k(T) - F_j^k(T) \le F_{i+1}^{k+1}(T) - F_{j+1}^{k+1}(T). $$ \end{corollary} \begin{proof} The symmetry of $F$ by reflection implies $F_i^k(T) = F_{k-i}^k(T)$. We see that the pair $(k-j,k-i)$ satisfies the hypotheses of Lemma \ref{lazy f center is better}, and so: $$ F_i^k(T) - F_j^k(T) = F_{k-i}^k(T) - F_{k-j}^k(T) \le F_{k-i}^{k+1}(T) - F_{k-j}^{k+1}(T) = F_{i+1}^{k+1}(T) - F_{j+1}^{k+1}(T). $$ \end{proof} \subsection{Completing the proof for lazy walks} \begin{proof}[Proof of Theorem \ref{Main Result 1}] Let $v_0$ be a vertex of $V$ with two bare paths emanating from it, so we can write $T = P_a \cup P_b \cup T'$ where $T'$ is the leftover vertices and edges not in $P_a$ or $P_b$. Inductively, it will suffice to demonstrate that $f_{k+1}(T) \ge f_{k+1}(T' \cup P_{a+b}$, as the process of combining the two paths $P_a$ and $P_b$ into one results in a tree with one fewer leaf, and therefore will eventually terminate in a path. Rewriting this inequality in terms of $F$, we want to demonstrate: $$ F^k(T) - F^k(T' \cup P_{a+b}) \le F^{k+1}(T) - F^{k+1}(T' \cup P_{a+b}). $$ We may expand both sides of this inequality in the same manner as Lemma \ref{spidersums}, e.g. the left-hand side becomes: $$ \sum_{0 \leq i < j \le k} F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right)\left(F_{i}^k(T') - F_{j}^k(T')\right). $$ We now investigate what happens to a single summand when we move from $k$ to $k+1$. When $\frac{i+j}{2} \le \frac{k}{2}$, we compare to the $(i,j)$ summand for $k+1$, and claim: $$ F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right) \left(F_{i}^k(T') - F_{j}^k(T')\right) \le F_{i \to j}^{k+1}(P_{a_1}) \left(F_{i}^{k+1}(P_{a_2}) - F_j^{k+1}(P_{a_2})\right) \left(F_{i}^{k+1}(T') - F_{j}^{k+1}(T')\right) $$ By definition $F_{i \to j}^k(P_{a_1}) \le F_{i \to j}^{k+1}(P_{a_1})$. By Lemma \ref{lazy f center is better}, we have that both $\left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right)$ and $\left(F_{i}^k(T') - F_{j}^k(T')\right)$ are negative, and decrease when $k$ is replaced by $k+1$. Consequently the summand is positive and increases. On the other hand, when $\frac{i+j}{2} > \frac{k}{2}$, we compare to the $(i+1, j+1)$ summand for $k+1$, i.e. we claim: $$ F_{i \to j}^k(P_{a_1}) \left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right) \left(F_{i}^k(T') - F_{j}^k(T')\right) \le F_{i+1 \to j+1}^{k+1}(P_{a_1}) \left(F_{i+1}^{k+1}(P_{a_2}) - F_{j+1}^{k+1}(P_{a_2})\right) \left(F_{i+1}^{k+1}(T') - F_{j+1}^{k+1}(T')\right) $$ Again, the proof proceeds term-by-term. We have $F_{i \to j}^k(P_{a_1}) = F_{(k-i) \to (k-j)}^k(P_{a_1}) \le F_{(k-i) \to (k-j)}^{k+1}(P_{a_1}) = F_{i+1 \to j+1}^{k+1}(P_{a_1})$. From Corollary \ref{lazy bigger too} we have that both $\left(F_{i}^k(P_{a_2}) - F_j^k(P_{a_2})\right)$ and $\left(F_{i}^k(T') - F_{j}^k(T')\right)$ are positive, and increase when $k$ is replaced by $k+1$ and $(i,j)$ by $(i+1, j+1)$. Consequently the summand is again positive, and increases when moving from $k$ to $k+1$, which completes the proof. \end{proof} \bibliographystyle{acm}
\section{Introduction} \label{intro} Molecular clouds are magnetized \citep[for a review, see][]{HeilesCrutcher2005} but with low ionization fractions \citep{MestelSpitzer1956,NakanoUmebayashi1986,UmebayashiNakano1990}. The canonical cosmic ray ionization rate in molecular clouds is $\zeta_\text{cr} \approx 10^{-17}$ s$^{-1} \exp\left(-\Sigma/\Sigma_\text{cr}\right)$ \citep{SpitzerTomasko1968,UmebayashiNakano1981}, where $\Sigma$ is the surface density of the gas, and $\Sigma_\text{cr}$ is the characteristic attenuation depth of cosmic rays. The dense regions ultimately collapse to form protostars \citep{Shu1977}, and observations have suggested the presence of large gas discs and outflows around these young (Class 0) objects \citep[e.g.][]{Dunham+2011,Lindberg+2014,Tobin+2015,Gerin+2017}. Despite the low ionization fractions, many recent simulations of magnetized star formation used ideal magnetohydrodynamics \citep[MHD; e.g.][]{PriceBate2007,HennebelleFromang2008,DuffinPudritz2009,HennebelleCiardi2009,Commercon+2010,Seifried+2011,BateTriccoPrice2014}, which assumes that the gas is sufficiently ionized such that the magnetic field is `frozen' into the gas. The simulations that included realistic magnetic field strengths (mass-to-flux ratios of 3--5 times critical) produced collimated outflows but no protostellar discs; the lack of discs is known as the magnetic braking catastrophe \citep[e.g.][]{AllenLiShu2003,PriceBate2007,MellonLi2008,HennebelleCiardi2009}. The simulations that included weak magnetic fields ($\gtrsim$10 times critical mass-to-flux ratio) produced weak outflows and large discs during the first hydrostatic core phase. If large discs rotated rapidly enough, then they could become dynamically unstable to a bar-mode instability, leading to the formation of trailing spiral arms, as seen in purely hydrodynamical simulations \citep[e.g.][]{Bate1998,SaigoTomisaka2006,SaigoTomisakaMatsumoto2008,MachidaInutsukaMatsumoto2010,Bate2010,Bate2011}. In attempts to form discs during the star forming process, recent three-dimensional simulations have accounted for the low ionization fractions by including a self-consistent treatment of non-ideal MHD \citep[e.g.][]{MachidaMatsumoto2011,Tomida+2013,TomidaOkuzumiMachida2015,Tsukamoto+2015oa,Tsukamoto+2015hall,WursterPriceBate2016,Tsukamoto+2017,Vaytet+2018,WursterBatePrice2018sd}. Rotationally supported discs have been found in simulations that include Ohmic resisitivity and/or ambipolar diffusion \citep[e.g.][]{TomidaOkuzumiMachida2015,Tsukamoto+2015oa,Vaytet+2018}, and 15-30~au discs were recovered when the Hall effect was included \citep[e.g.][]{Tsukamoto+2015hall,WursterPriceBate2016,Tsukamoto+2017} so long as the magnetic field was anti-aligned with the rotation axis, since this geometry promotes disc formation \citep{BraidingWardle2012accretion}. \newpage In this paper, which follows from the work presented in \citet{WursterBatePrice2018sd} (hereafter \citetalias{WursterBatePrice2018sd}), we model the gravitational collapse of a magnetised molecular cloud core using Ohmic resistivity, ambipolar diffusion and the Hall effect and the canonical cosmic ray ionization rate of \zetaeq{-17}. This is the first study to model the collapse to the stellar core phase \citep{Larson1969} that includes the three main non-ideal effects, uses the canonical cosmic ray ionisation rate of \zetaeq{-17}, and anti-aligns the initial magnetic field and rotation vectors. Previous studies have anti-aligned the vectors but stopped the evolution after the first core phase \citep{Tsukamoto+2015hall,Tsukamoto+2017}; aligned the vectors and evolved to the stellar core phase \citep{Tsukamoto+2015hall}; studied both alignments using a higher cosmic ray ionization rate \citepalias{WursterBatePrice2018sd}; excluded the Hall effect \citep{TomidaOkuzumiMachida2015,Tsukamoto+2015oa,Vaytet+2018}; or followed the long term evolution by forming sink particles \citep{WursterPriceBate2016}. This paper focuses on disc formation. We refer the reader to \citetalias{WursterBatePrice2018sd} for discussion of the stellar cores. In Section~\ref{sec:methods}, we summarise our methods and in Section~\ref{sec:ic} we present our initial conditions. Our results are presented in Section~\ref{sec:results} and we conclude in Section~\ref{sec:conc}. \section{Methods} \label{sec:methods} Our method is almost identical to that used by \citetalias{WursterBatePrice2018sd}. We solve the equations of self-gravitating, radiation non-ideal magnetohydrodynamics using the three-dimensional smoothed particle hydrodynamics (SPH) code \textsc{sphNG} that originated from \citet{Benz1990}, but has since been substantially modified to include a consistent treatment of variable smoothing lengths \citep{PriceMonaghan2007}, individual timestepping \citep{BateBonnellPrice1995}, radiation as flux limited diffusion \citep{WhitehouseBateMonaghan2005,WhitehouseBate2006}, magnetic fields \citep[for a review, see][]{Price2012}, and non-ideal MHD \citep{WursterPriceAyliffe2014,WursterPriceBate2016} using the single-fluid approximation. For stability of the magnetic field, we use the \citet{BorveOmangTrulsen2001} source-term approach, maintain a divergence-free magnetic field using constrained hyperbolic/parabolic divergence cleaning \citep{TriccoPrice2012,TriccoPriceBate2016}, and use the artificial resistivity from \citet{Phantom2017}; note that \citetalias{WursterBatePrice2018sd} used the artificial resistivity from \citet{TriccoPrice2013}. The non-ideal MHD coefficients \citep[for review, see][]{Wardle2007} are calculated using Version 1.2.1 of the \textsc{Nicil} library \citep{Wurster2016} using its default values. We include Ohmic resistivity, ambipolar diffusion and the Hall effect. At low temperatures ($T \lesssim 600$~K), cosmic rays are the dominant ionisation source and can ionise low mass ions ($m \sim 2.31$m$_\text{p}$, where m$_\text{p}$ is the proton mass), high-mass ions ($m \sim 24.3$m$_\text{p}$), and dust grains; the mutual interaction between the species can lead to further ionisation. The dust grains are comprised of a single species with radius $a_\text{g}=0.1\mu$m, bulk density $\rho_\text{bulk}=3$~\gpercc, and a dust-to-gas fraction of 0.01 \citep{Pollack+1994}. The dust is evolved as three populations, which are negatively, positively, and neutrally charged, respectively. \section{Initial conditions} \label{sec:ic} Our initial conditions are identical to those in \citet{BateTriccoPrice2014} and \citetalias{WursterBatePrice2018sd}. We place a 1~M$_{\odot}$ cold dense sphere of uniform density into warm background at a density ratio of 30:1, with the two phases in pressure equilibrium. The core has an initial radius of $R = 4\times 10^{16}$~cm, an initial sound speed of $c_\text{s} = \sqrt{p/\rho} = 2.2\times 10^{4}$~cm~s$^{-1}$, and solid body rotation about the $z$-axis of $\bm{\Omega}_0 = \Omega_0\hat{\bm{z}}$, where $\Omega_0 = 1.77 \times 10^{-13}$~rad s$^{-1}$. The entire domain is threaded with a magnetic field in the $z$-direction with a strength of $B_0 = 1.63 \times 10^{-4}$~G, equivalent to 5 times the critical mass-to-flux ratio. For the models that include non-ideal MHD, we consider both aligned (i.e. \BBpz) and anti-aligned (i.e. \BBnz) cases. The calculations use $3 \times 10^{6}$ equal-mass SPH particles in the core and $1.46 \times 10^{6}$ particles in the surrounding medium. \section{Results} \label{sec:results} Our suite of simulations consists of a purely hydrodynamical model (named HD), an ideal MHD model (named iMHD), and four non-ideal MHD models named \zetam{Z}{D}, where $Z$ represents the constant cosmic ray ionization rate such that \zetaeq{-Z}, and $D$ represents the direction of the magnetic field with respect to the rotation axis such that $D = + \ (-)$ represents \Bpz \ (\Bnz). Our focus is on \zetam{17}{\pm}, and the other models are included for reference and to emphasise the importance of a proper treatment of non-ideal MHD. \subsection{Column density evolution} Fig.~\ref{fig:rho} shows the face-on gas column density during the first and stellar core phases. As expected, a gravitationally unstable disc forms ($r \sim 60$~au) in the HD calculation that undergoes a gravitational bar-mode instability \citep{Bate1998,Durisen+2007} early in the first core phase, while no disc forms in iMHD in agreement with \citet{BateTriccoPrice2014}. In agreement with \citet{Tsukamoto+2015hall}, \zetamn{17} develops a large \sm25~au disc during the first core phase that becomes gravitationally unstable and forms spiral arms. By reversing the initial direction of the magnetic field, \zetamp{17} forms no disc during the first core phase. As the collapse proceeds from the first hydrostatic core to the stellar core, the bars in HD and \zetamn{17} collapse to form a spherical core. \begin{figure*} \centering \includegraphics[width=0.8\textwidth]{Figures/fig1.eps} \caption{Formation of gravitationally unstable discs in the presence of magnetic fields, showing the face-on gas column density at selected maximum densities (a proxy for time). The hydrodynamic model (top row) forms a \sm60~au disc that becomes bar-unstable and forms spiral arms, while the ideal MHD model (bottom row) forms no disc. The Hall effect in model \zetamp{17} prevents disc formation (third row), whereas the Hall effect increases the angular momentum contained in the disc in model \zetamn{17} (second row) to allow a gravitationally unstable \sm25~au disc to form.} \label{fig:rho} \end{figure*} Our study adopts different initial rotations, different initial magnetic field strengths and different microphysics governing the non-ideal MHD processes compared to \citet{Tsukamoto+2015hall}, suggesting that the bimodality of disc formation is robust to initial conditions. That is, for models with \zetaeq{-17}, the evolution is similar to HD if the initial magnetic field and rotation vectors are anti-aligned, and similar to iMHD if the vectors are aligned. \subsection{Angular momentum and magnetic braking} \begin{figure} \centering \includegraphics[width=\columnwidth]{Figures/fig2.eps} \vspace{-0.25cm} \caption{Evolution of the angular momentum in the first hydrostatic core (defined as the gas with \rhoge{-12}). The triangles represent when the discs becomes gravitationally unstable. The angular momentum in the first core is larger for models with lower ionization rates, and with initially anti-aligned magnetic field and rotation vectors.} \label{fig:fhc:LVrho} \end{figure} In the purely hydrodynamic calculation, conservation of angular momentum during the initial collapse to form the first hydrostatic core results in the formation of a gravitationally unstable disc of radius \sm60~au, as shown in the top row of Fig.~\ref{fig:rho}. Fig.~\ref{fig:fhc:LVrho} shows the evolution of the angular momentum in the first core, $L_\text{fc}$, where the first core is defined as all the gas with \rhoge{-12}. Magnetic fields are efficient at transporting angular momentum outwards, thus the first core in iMHD has \sm50 times less angular momentum than HD. As a result, a rotationally supported disc does not form in iMHD. Angular momentum directly affects the time evolution of the collapse. The length of time spent in the first core phase increases as the angular momentum of the first core increases. The exception to this trend is \zetamn{17}, which has an even longer first core phase (\smq630~yr) than the HD model (\smq590~yr) despite having slightly less angular momentum. This is because in \zetamn{17} the magnetic field supports the cloud against gravity and delays the collapse, extending the lifetime of the first hydrostatic core phase. In all simulations, total angular momentum is conserved within 1 per cent during the entire gravitational collapse through to stellar densities. The initial angular momentum in our simulations is $2.26\times10^{53}$~g~cm$^2$~s$^{-1}$, and, in \zetamn{17}, \sm6.5 per cent of this is contained in first hydrostatic core after its formation. \subsubsection{Ion and bulk velocities} Fig.~\ref{fig:vel} shows the azimuthally averaged radial and azimuthal velocities, $v_\text{r}$ and $v_\phi$, respectively, of both the ions and the single-fluid motion within $20^\circ$ of the midplane at \rhox \ \appx \ $10^{-7}$ for models \zetampn{17}. The ion velocity is given by \begin{equation} \bm{v}_\text{ion} = \bm{v} + \frac{\rho_\text{n}}{\rho}\left(\eta_\text{A}\frac{\bm{J}\times \bm{B}}{|B|^2} - \eta_\text{H}\frac{\bm{J}}{|B|}\right), \end{equation} where $\bm{v}$ is the single-fluid velocity calculated in the simulations, $\rho_\text{n}$ and $\rho$ are the neutral and total mass densities, respectively, $\bm{J}$ is the current density, and $\eta_\text{H}$ and $\eta_\text{A}$ are the coefficients for the Hall effect and ambipolar diffusion, respectively. \begin{figure} \centering \includegraphics[width=\columnwidth]{Figures/fig3.eps} \caption{Azimuthally averaged single-fluid and ion velocities within $20^\circ$ of the midplane at \rhoxapprox{-7} for models \zetamn{17} (top) and \zetamp{17} (bottom). The gas is rotating at sub-Keplerian velocities. The ions are rotating slower than the bulk rotational flow in \zetamn{17}, decreasing the magnetic braking and promoting disc formation.} \label{fig:vel} \end{figure} As the ionization rate is decreased, the coupling between the matter and magnetic fields decreases. In \zetamn{17}, the ions rotate slower than the bulk rotational flow. This results in decreased magnetic braking and a torque that spins up the material in the same direction as the initial flow \citep{KrasnopolskyLiShang2011}, such that the angular momentum is approximately half of that in model HD. This promotes disc formation. In \zetamp{17}, the ions rotate faster than the bulk rotational flow, dragging the magnetic field more rapidly around the disc. This creates a stronger toroidal magnetic field, which enhances magnetic braking and prevents the formation of a Keplerian disc. By reversing the direction of the initial magnetic field such that the magnetic field and rotation are initially aligned (i.e. \zetamn{17} $\rightarrow$ \zetamp{17}), the angular momentum in the first core decreases by a factor of \sm12. Similar trends hold for \zetampn{16} (not shown), although the difference between the ion and bulk velocities is smaller than in \zetampn{17}. In these models, the ionisation rate is high enough to modify the rotational profile, but not enough to reduce magnetic braking enough for a disc to form during this phase. Both \zetamp{17} and \zetamn{16} have similar angular momenta in the first core, indicating that both the cosmic ray ionisation rate and the initial magnetic field orientation are critical in determining the angular momentum content of the first core and hence disc formation. \subsubsection{Degree of centrifugal support of the discs} To determine if the gas is rotationally supported, we consider the ratio of centrifugal and pressure forces to the gravitational force, namely \begin{equation} \label{eq:q1} q_1 = \left| \frac{\frac{v_\phi^2}{r} + \frac{1}{\rho}\frac{\text{d}P}{\text{d}r}}{\frac{GM(r)}{r^2}}\right|, \end{equation} and the ratio of centrifugal force to the radial gravitational force, \begin{equation} \label{eq:q2} q_2 = \left| \frac{\frac{v_\phi^2}{r} }{\frac{GM(r)}{r^2}}\right|, \end{equation} where $P$ is gas pressure, $M(r)$ is the mass enclosed at radius $r$, and $G$ is Newton's gravitational force constant \citep[e.g.][]{Tsukamoto+2015oa,Tsukamoto+2015hall}. The ratios $q_1$ and $q_2$ are shown Fig.~\ref{fig:q:long} for HD and \zetamn{17} and Fig.~\ref{fig:q:short} for the remaining models; note that each figure has a different horizontal range. By the end of the first core phase (at \rhoxapprox{-7}), HD and \zetamn{17} have $q_1 > 1$ for $r \lesssim 25$ and 15~au, respectively, hence discs exist that are supported against gravity, and are in close to Keplerian rotation (Fig.~\ref{fig:vel}). Since $q_2> 0.5$, the disc is primarily supported by the centrifugal force (Fig.~\ref{fig:q:long}). These values are smaller than previously presented since the azimuthal averaging removes information about the extended spiral arms, which were considered in our previous estimate of the disc size. At this \rhox, none of the remaining models have rotationally supported discs. When we evolve the models through to the stellar core phase, then small, rotationally supported discs form in the remaining non-ideal MHD models. These discs are $r \approx 1-3$~au in radius (depending on ionization rate and magnetic field orientation), and are also primarily supported by the centrifugal force. Model iMHD has $q_2 \approx 0$, thus there is essentially no rotational support (Fig.~\ref{fig:q:short}). Our results for \zetampn{17} are in agreement with \citet{Tsukamoto+2015hall}. \begin{figure} \centering \includegraphics[width=\columnwidth]{Figures/fig4.eps} \caption{Ratio of centrifugal and pressure forces to the gravitational force ($q_1$ and $q_2$ as defined in Eqns.~\ref{eq:q1} and \ref{eq:q2}) for models that form discs during the first hydrostatic core phase. $q_1$ gives the ratio of the combination of the centrifugal and pressure forces to the radial gravitational force, while $q_2$ gives only the ratio of the centrifugal force to the radial gravitational force. The forces are computed for the gas within $20^\circ$ of the midplane at \rhoxapprox{-7} (solid) and \rhoxtwoapprox{8}{-2} (dashed). The horizontal lines are reference lines. At both densities, the disc in \zetamn{17} is rotationally supported, with the primary contribution from the centrifugal force.} \label{fig:q:long} \end{figure} \begin{figure} \centering \includegraphics[width=\columnwidth]{Figures/fig5.eps} \caption{As in Fig.~\ref{fig:q:long}, but for models that do not form discs during the first hydrostatic core phase. At \rhoxtwoapprox{8}{-2}, there are rotationally supported discs in the non-ideal MHD models; a rotationally supported disc does not form in iMHD.} \label{fig:q:short} \end{figure} The disc in \zetamn{17} is \sm10~au larger than we found in \citet{WursterPriceBate2016}. This is a result of our previous study using sink particles (which remove gas pressure of the central region) and a barotropic equation of state. We performed a set of additional simulations (not shown), and verified that models that use smaller sink particles form larger and more dense discs (when using the barotropic equation of state), and that models that use radiation hydrodynamics form larger discs than those using the barotropic equation of state. \subsection{Magnetic field evolution} \begin{figure} \centering \includegraphics[width=\columnwidth]{Figures/fig6.eps} \vspace{-0.25cm} \caption{Evolution of the maximum magnetic field strength as a function of maximum density. The horizontal axis begins near the start of the first core phase, when the magnetic field evolution diverges amongst the models. The grey reference lines correspond to the maximum densities shown in Figs.~\ref{fig:bar:rho} and \ref{fig:bar:B}. The triangle represents when the disc becomes gravitationally unstable. The maximum magnetic field strength in \zetamn{17} increases by an order of magnitude at \rhoxtwoapprox{2}{-9}, near which time the disc becomes bar-unstable.} \label{fig:BVrho} \end{figure} \begin{figure*} \centering \includegraphics[width=0.8\textwidth]{Figures/fig7.eps} \caption{Evolution of the gas column density for \zetamn{17}. The frames are chosen to highlight the bar formation and collapse. The bar forms half-way through the first core phase, and begins to collapse by the end of this phase, ultimately forming a spherical stellar core.} \label{fig:bar:rho} \end{figure*} \begin{figure*} \centering \includegraphics[width=0.8\textwidth]{Figures/fig8.eps} \caption{Evolution of the magnetic field strength in the midplane for \zetamn{17}. The frames are chosen to highlight the bar formation and collapse. The maximum magnetic field and maximum density are coincident only up until bar formation.} \label{fig:bar:B} \end{figure*} Fig.~\ref{fig:BVrho} shows the evolution of the maximum magnetic field strength with respect to maximum density. After the formation of the first core, the magnetic field is diffused out of the core in the non-ideal MHD models, such that at \rhoxapprox{-9}, the maximum magnetic field strength in the non-ideal models is approximately an order of magnitude lower than in the ideal MHD model. During the second collapse phase, the maximum magnetic field strengths grow as $B_\text{max} \propto \rho_\text{max}^{0.6}$ \citep[in agreement with, e.g.,][]{BateTriccoPrice2014,Tsukamoto+2015oa,Masson+2016,WursterBatePrice2018sd}. The lack of azimuthal symmetry in \zetamn{17} necessarily produces a more complex magnetic field structure. Figs.~\ref{fig:bar:rho} and \ref{fig:bar:B} show the evolution of the gas column density and magnetic field strength, respectively, of \zetamn{17}. We show slices in the x-y plane (that is, perpendicular to the rotation axis) with times chosen to highlight the formation and collapse of the bar. Asymmetries form during the first core phase, and a bar forms by \rhoxtwoapprox{2}{-9}; at this time, the magnetic field becomes concentrated at the ends of the bar, accounting for the sudden increase in $B_\text{max}$ shown in Fig.~\ref{fig:BVrho}. At the end of the bar, the diffusion timescale, $t_\eta \sim r^2/\eta$, is \sm$7\times10^3$~yr assuming $r \sim 1$~au and $\eta\sim10^{15}$~cm$^2$~s$^{-1}$. The latter value is representative of the physical resistivity values in the outer region of the bar. Nearer the centre of the core, the diffusion timescale is even longer. This diffusion timescale is longer than the evolutionary timescale of the bar (\appx80~yr; Figs.~\ref{fig:bar:rho} and \ref{fig:bar:B}), implying that the concentration of the magnetic field at the ends of the bar cannot be rapidly diffused away. As the bar evolves, gravitational torques funnel the gas along the bar (e.g. third column in the middle row of Figs.~\ref{fig:bar:rho} and \ref{fig:bar:B}), forming a compact core surrounded by a large disc; this is ultimately where the stellar core forms. As expected, the magnetic field becomes concentrated in this compact core, but is highly structured (Fig.~\ref{fig:bar:B}). \subsection{Outflows} As shown in \citetalias{WursterBatePrice2018sd}, decreasing the cosmic ray ionization rate in models with \Bnz \ decreases the speed of the first core outflows and broadens them. In agreement with this trend, \zetamn{17} shows a slow first core outflow; see Fig.~\ref{fig:vr}, which shows the radial velocity in a slice through the first core at \rhoxapprox{-7}. Although a similar `X'-shaped pattern is visible for all the non-ideal MHD models, the pattern in \zetamn{17} has only a narrow band of gas that is slowly outflowing ($v_\text{r} \lesssim 0.3$~\kms), while the surrounding material is falling at a slightly faster rate; the gas is accreting faster along both the equatorial and polar directions than along the diagonals. \begin{figure*} \centering \includegraphics[width=0.8\textwidth]{Figures/fig9.eps} \caption{Radial velocity in a slice through the first core for each of the calculations. The white contour is $v_\text{r} = 0$. There are no first core outflows in the purely hydrodynamics model, and there are narrow, slow outflows embedded in the centre of the diagonal infall of \zetamn{17}.} \label{fig:vr} \end{figure*} Given the high angular momentum in the disc of \zetamn{17}, outflows are not required to carry angular momentum away. By contrast, as the ionization rate is decreased for the models with \Bpz, the speed of the first core outflows increases and broadens. In all cases, the lower ionization rate reduces the magnetic field strength which accounts for the broadening of the outflows. Thus, at any given \zetacr, the difference in outflow speed is necessarily a result of the Hall effect\footnote{For models with \zetage{-15}, the initial direction of the magnetic field does not significantly affect the structure or velocity of the first core outflow.}. In the models with \Bpz, the Hall effect spins down the gas above and below the first core, which reduces the toroidal component of the magnetic field. As previously shown (e.g. \citealp{BateTriccoPrice2014}, \citetalias{WursterBatePrice2018sd}), lower ratios of toroidal-to-poloidal magnetic field strengths result in faster outflows. Shortly after the formation of the first core, the trend of decreasing ratios of toroidal-to-poloidal magnetic field strengths corresponds to increasing outflow speeds. \citet{Vaytet+2018} modelled the collapse through the first and stellar core phases using \zetaeq{-17}, however, their model included only ambipolar diffusion and Ohmic resistivity. They found no first core outflows, akin to our \zetamn{17} but contrary to \zetamp{17}. Their model had an initial $m=2$ perturbation and an initial faster rotation. Thus, their initial conditions promoted disc formation and hence they found results similar to our \zetamn{17}, in which the Hall effect is responsible for promoting disc formation. \subsection{Counter-rotating envelopes} During the first core phase, a counter-rotating envelope forms in \zetamn{17}, and at its most massive contains \sm$10^{-3}$~M$_\odot$ and extends to $r \sim 30$~au. The counter-rotating envelope dissipates with time and disappears completely by \rhoxtwoapprox{2}{-9}, just before the disc forms. This envelope is smaller and less vertically extended than those found by \citet{Tsukamoto+2015hall,Tsukamoto+2017}. Their initially stronger magnetic field strength and faster rotation likely required the larger envelope at larger radii to conserve angular momentum. Thus, counter-rotating envelopes are likely a transient feature, with their properties dependent on the Hall effect, ionization rates \citep[e.g.][]{WursterBatePrice2018ion}, and initial conditions. \section{Summary and conclusion} \label{sec:conc} In this study, we followed the collapse of a molecular cloud core through to the formation of the stellar core in a magnetized medium. We used a self-consistent treatment of non-ideal MHD, and used the canonical cosmic ray ionization rate of \zetaeq{-17}. We presented models with the magnetic field aligned and anti-aligned to the rotation axis since the Hall effect depends on the magnetic field orientation. We compared these models to partially ionized models with higher ionization rates (i.e. \zetaeq{-16}), an ideal MHD model and a purely hydrodynamical model. Our primary conclusions are as follows: \begin{enumerate} \item The magnetic braking catastrophe can be solved by the Hall effect if the magnetic field and rotation axis are anti-aligned. During the first core phase, the anti-aligned model with \zetaeq{-17} led to the formation of a gravitationally unstable \sm25~au disc. The aligned model formed no disc during this phase. Increasing the cosmic ray ionization rate by a factor of ten yielded models without discs in the first core phase for both magnetic field orientations. \item After the second collapse to form a stellar core, the aligned model with \zetaeq{-17} and both models with \zetaeq{-16} formed rotationally supported $1-3$~au discs. No such discs were formed when using ideal MHD. \item The model with \zetaeq{-17} where the initial magnetic field and rotation vectors are anti-aligned launched a weak $\lesssim 0.3$~\kms first core outflow, while its aligned counterpart launched the fastest (\appx3~\kms) first core outflow amongst our six models. \end{enumerate} By including the Hall effect in non-ideal MHD models that use the canonical cosmic ray ionization rate of \zetaeq{-17}, drastically different results can be produced depending on the initial orientation of the magnetic field. The Hall effect can qualitatively change the outcome, such that protostars produced from magnetized clouds can resemble results from purely hydrodynamical models (if the initial magnetic field and rotation vectors are anti-aligned) or ideal MHD models (if the vectors are initially aligned). These results are in agreement with \citet{Tsukamoto+2015hall} who used different initial conditions than presented here, suggesting that our findings are robust and independent of initial conditions, as long as \zetaeq{-17} is used. Thus we have demonstrated that formation of gravitationally unstable discs with radii more than 25~au is possible despite the presence of magnetic fields. This implies that such discs should indeed exist in the Class 0 phase. \section*{Acknowledgements} We would like to thank the referee for useful comments that improved the quality of this manuscript. JW and MRB acknowledge support from the European Research Council under the European Community's Seventh Framework Programme (FP7/2007- 2013 grant agreement no. 339248). DJP received funding via Australian Research Council grants FT130100034, DP130102078 and DP180104235. The calculations for this paper were performed on the DiRAC Complexity machine, jointly funded by STFC and the Large Facilities Capital Fund of BIS (STFC grants ST/K000373/1, ST/K0003259/1 and ST/M006948/1), and the University of Exeter Supercomputer, a DiRAC Facility jointly funded by STFC, the Large Facilities Capital Fund of BIS, and the University of Exeter. The research data supporting this publication will be openly available from the University of Exeter's institutional repository. Several figures were made using \textsc{splash} \citep{Price2007}.
\section{Introduction} Three-dimensional integral elasticity models for strong non-locality are usually defined by the integral linear constitutive relation for the stress $\sigma_{ij}$ in terms of the strain $\varepsilon_{ij}$ in the form \cite{Kroner}--\cite{Eringen2002} \be \label{int-cr} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \varepsilon_{kl} ({\bf r},t) + \int_{\mathbb{R}^3} c_{ijkl} ({\bf r}-{\bf r}^{\prime}) \, \varepsilon_{kl} ({\bf r}^{\prime},t) \, d{\bf r}^{\prime} , \ee where $C_{ijkl}$ is the local fourth-order elastic stiffness tensor and $c_{ijkl} ({\bf r}-{\bf r}^{\prime})$ is the nonlocal elastic stiffness tensor kernel that characterizes nonlocality of materials. In \cite{Aifantis1992}--\cite{Aifantis2003} it was suggested a generalization of the constitutive relations {classical elasticity} by a gradient modification that contains the Laplacian $\Delta$. {It reads} \be \label{H-1n} \sigma_{ij} = C_{ijkl} \, \varepsilon_{kl} - l^2_s \, C_{ijkl} \, \Delta \, \varepsilon_{kl} . \ee where {the newly appearing quantity} $l_s$ is an internal length scale parameter. For $l_s=0$, we have the classical case of Hooke's law. The {Lagrangian} term in equation (\ref{H-1n}) {-- also emerging from} the positive-definite {strain} energy density {and a corresponding variational formulation \cite{AA1997} resulted to stable and well-posed solutions of boundary value problems and enabled the removal of singularities from dislocations and cracks \cite{AA2011}--\cite{AifantisILG}}. To describe complex materials characterized by non-locality of power-law type and fractality, we should further generalize the gradient equation (\ref{H-1n}), {as already suggested by the authors \cite{TA2014},\cite{TA2015}}. Derivatives and integrals of non-integer orders \cite{SKM,KST} have a wide application in mechanics (for example see \cite{CM}--\cite{Povstenko2015}). The theory of fractional differential equations is powerful tool to describe materials and media with power-law non-locality, long-range memory and/or fractality. The fractional calculus can, in fact, be used to formulate a generalization of non-local theory of elasticity in both forms: fractional gradient elasticity (weak power-law non-locality) and fractional integral elasticity (strong power-law non-locality). In this paper, we consider fractional and fractal generalizations of gradient elasticity and plasticity models, including {the} rather popular GRADELA model, {as proposed and utilized by Aifantis and co-workers (see, for example \cite{AA2011}--\cite{AifantisILG}, as well as the references quoted therein), and focus on three cases : } \begin{itemize} \item The elasticity of linear materials with power-law non-locality that can be described by fractional Laplacians of non-integer order of the Riesz type. \item The elasticity of {nonlinear} materials with power-law nonlocality that can be described by fractional {Laplacians} of the Riesz and {Caputo} type. \item The elasticity of materials with fractal structure that can be described in the framework of continuum models by using the recently suggested vector calculus for non-integer dimensional space. \end{itemize} {We elaborate, in particular, on} the following non-standard generalizations of gradient stress-strain relation. (a) The fractional gradient elasticity with power-law non-locality \be \label{Gen-1a} \sigma_{ij} = C_{ijkl} \, \varepsilon_{kl} - l^2_s (\alpha) \, C_{ijkl} \, (- \, ^R\Delta)^{\alpha/2} \, \varepsilon_{kl} \ee where $(- \, ^R\Delta)^{\alpha/2}$ is the fractional generalization of the Laplacian in the Riesz form \cite{KST}. (b) The gradient elasticity for fractal materials \be \label{Gen-3} \sigma_{ij} = C_{ijkl} \, \varepsilon_{kl} - l^2_F (D,d) \, C_{ijkl} \, \Delta^{(D,d)} \, \varepsilon_{kl} \ee where $\Delta^{(D,d)}$ is the "fractal-Laplacian" \cite{CNSNS2015} that takes into account the power-law density of states of the fractal medium under consideration. {A new method is proposed for deriving} three-dimensional constitutive relation for fractional gradient elasticity {starting from} the integral relations for a nonlocal elastic continuum {and} using the fractional Taylor series in wave-vector space. It is well-known that constitutive relations for gradient models can be derived from relations for integral nonlocal models by using the Taylor series approximation in the coordinate space (see, for example, \cite{Aifantis2003}). Specific properties of derivatives of non-integer order do not allow us to use a fractional Taylor series for a direct generalization of {this} approach. {We thus} suggest to use a fractional Taylor series {expansion in the} wave-vector space instead of the coordinate space. This avoids the difficulties arising from the application of the fractional Taylor series in coordinate space. The physical basis of the proposed method is an assumption {pertaining to} fractional spatial dispersion for a {nonlocal elastic} continuum. {Fractional nonlinear elasticity is considered, by elaborating on} {model non-linear field equations} with fractional derivatives of non-integer order to describe materials with power-law non-locality and weak non-linearity. {A special constitutive equation (involving the second invariants of deviatoric stress and strain) is employed which can be used as a starting point for developing a fractional theory of gradient plasticity}. Using the perturbation method, we obtain corrections to linear constitutive relations, where the perturbations are caused by weak deviations from elasticity. Perturbations {caused} by fractional gradient nonlocality are also discussed. Fractal media and materials {in non-Euclidean space} can be described by different methods (see, for example, \cite{Enc2018} and references {quoted} therein).Fractal materials can be considered as special continua with non-integer physical dimensions (\cite{TarasovSpringer}). Continuum models {for} fractal materials {can be} formulated using the fractional integration of non-integer orders. The kernels of fractional integrations are interpreted as power-law densities of states, and orders of fractional integrals are equal to the physical dimensions of {the} material. In these models, the {concept} of density of states is applied in addition to the notion of distribution functions (such as density of mass), {thus allowing to} take into account the specific properties of fractal materials. {Their interesting feature is that while} they use fractional integration of non-integer order, the differential operators {that include the density of states} are of integer-order. {Such} models have been considered {earlier} by the {second author} \cite{PLA2005-1}--\cite{IJMPB2005-2}, {and more recently by other authors} \cite{MOS-01}--\cite{MOS-4}. Fractal materials can also be described by using continuum models with non-integer dimensional spaces (NIDS) \cite{Enc2018}, where integration and differentiation for NIDS are applied. The integration in non-integer dimensional space is well developed \cite{Collins}--\cite{Stillinger}, and it has a wide application in quantum field theory. Differentiation in non-integer dimensional space is considered in \cite{Stillinger}-\cite{PS2004}, {but in these papers} only a scalar Laplacian for NIDS {was suggested}. Recently a generalization of differential operators of first order (gradient, divergence, curl operators) and the vector Laplacian has been proposed in \cite{CNSNS2015,CSF2014}. The suggested vector calculus for NIDS allows us to expand the range of applications of continuum models of isotropic fractal materials. Generalizations of the gradient, divergence, curl operators and the vector Laplace operator for non-integer dimensional and fractional spaces to describe anisotropic fractal materials have been suggested in \cite{JMP2014}. Using the vector calculus for non-integer dimensional spaces, which is suggested in \cite{CNSNS2015,WM2016} to describe different properties of isotropic fractal media, it is possible to consider different problems of fractal gradient elasticity. The corresponding {governing} equations are differential equations with integer-order derivatives. Therefore the suggested vector calculus can allow us easy to solve the cylindrical and spherical (boundary value) problems for gradient elasticity theory of fractal materials by using tools of integer-order differential equations. The definitions of vector operators for non-integer dimensional spaces, can be realized for two cases: $d=D-1$ and $d \ne D-1$, where $D$ is the dimension of the considered fractal material region and $d$ is the dimension of it's boundary. {The plan of the papers is as follows :} In Section 2 we give a rigorous derivation of fractional gradient elasticity, starting from an integral type of constitutive law of nonlocal elasticity and adopting a fractional Taylor series expansion for its kernel in wave-vector space. This expansion generates fractional Laplacians of the Riesz type and the resulting fractional GRADELA model is solved by the Green's function and Fourier transform techniques. In Section 3, nonlinear elasticity effects are considered and a fractional constitutive equation involving fractional Laplacians of the Riesz and Caputo type is proposed. This nonlinear fractional constitutive equation can be utilized for constructing in the future extended fractional models of the standard deformation theory of plasticity. It is further used here to consider perturbations due to nonlinearity and fractional nonlocality. Finally in Section 4 we consider fractal gradient elasticity based on Laplacians for non-integer dimensional space, generalizing the usual Laplacian in Euclidean space. Various GRADELA models for fractal media are proposed and explicit form of the governing differential equations are derived for problems of radial symmetry. It is interesting that these equations for fractal media and Laplacians for non-integer dimensional space involve derivatives of integer order and, thus, they can be solved by resorting to existing methods. \newpage \section{Fractional Gradient Elasticity as an approximation of Nonlocal Elasticity} \subsection{Derivation of general constitutive relation for weak nonlocal elasticity} In this section we obtain constitutive relations for fractional gradient elasticity from integral constitutive relations for nonlocal materials by using a fractional Taylor series approximation in wave-vector space. We start from {an} integral constitutive relation {between stress and strain} that is a convolution in coordinate space. Then we {apply} a Fourier transform of the convolution to obtain a multiplication in the dual space (the wave-vector space). Using an assumption of weak power-law (fractional) non-locality, which gives a spatial dispersion, we apply a fractional Taylor series in the dual space to obtain an adequate approximation. Then we realize an inverse Fourier transform that gives a constitutive relation with {a} fractional Laplacian. As a result, we derive a fractional gradient constitutive relation with a fractional generalization of the Laplacian in the Riesz form in coordinate space. The main idea of the suggested approach is to use a Taylor series in wave-vector space instead of Taylor series in coordinate space that {is} usually used. It allows us to avoid three problems that can appear if we use the fractional Taylor series in coordinate space: (a) problems with an integration of fractional Taylor series in coordinate space; (b) problems with {an} exact form of kernels for fractional nonlocality, as derived by different lattice model, {in contrast to the suggested phenomenological approach which is free from atomisitc details}, allows us to work in the framework of the macroscopic approach; (c) problems {with} derivations {arriving at an undesirable} sign in front of the Laplacian term, {in contrast to the} proposed method, {which is free from sign constraints} in front of the Laplacian. In the three-dimensional theory of nonlocal elasticity \cite{Eringen2002}, the nonlocal stress tensor $\sigma_{ij}$ is defined by \be \label{N1a} \sigma_{ij} ({\bf r},t) = \int_{\mathbb{R}^3} {\cal K}(|{\bf r}-{\bf r}^{\prime}|) \, \sigma_{ij}^0 ({\bf r}^{\prime},t) \, d{\bf r}^{\prime} , \ee where ${\cal K}(|{\bf r}-{\bf r}^{\prime}|)$ is the interaction kernel that characterize nonlocality, and $\sigma_{ij}^0$ is the stress tensor of classical (local) elasticity defined as \be \label{sigma-0} \sigma_{ij}^0 ({\bf r}^{\prime},t) = C_{ijkl} \, \varepsilon_{ij} ({\bf r}^{\prime},t) , \ee where $\varepsilon_{ij} ({\bf r}^{\prime},t)$ is the classical strain, and $C_{ijkl}$ is the fourth-order elastic stiffness tensor. For isotropic materials, we have \be \label{C-ijkl} C_{ijkl} = \lambda \, \delta_{ij} \delta_{kl} + \mu \, (\delta_{ik} \delta_{jl} +\delta_{il} \delta_{jk} ) , \ee where $\lambda$ and $\mu$ are the Lam\'e {constants}. Substitution of (\ref{sigma-0}) into (\ref{N1a}) gives the nonlocal linear constitutive relation in the form \be \label{N1} \sigma_{ij} ({\bf r},t) =\int_{\mathbb{R}^3} {\cal K}(|{\bf r}-{\bf r}^{\prime}|) \, C_{ijkl} \, \varepsilon_{kl} ({\bf r}^{\prime},t) \, d{\bf r}^{\prime} . \ee It is easy to see that equation (\ref{N1}) can be derived from relations (\ref{int-cr}) with \be c_{ijkl} ({\bf r}-{\bf r}^{\prime}) = C_{ijkl} \, \Bigl( {\cal K}(|{\bf r}-{\bf r}^{\prime}|) - \delta^{3} ({\bf r}-{\bf r}^{\prime}) \Bigr) . \ee Mathematically, equation (\ref{N1}) can be considered as a convolution of the interaction kernel ${\cal K}(|{\bf r}|)$ and the strain tensor $\varepsilon_{kl}$ in the form \be \label{N2} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( {\cal K} \, * \, \varepsilon_{kl} \Bigr) ({\bf r},t) . \ee To use the Fourier method, we introduce the Fourier transform ${\cal F}$ -- {designated by a superimposed bar ($\sim$)} -- as \be \label{calF} \tilde{\sigma}_{ij} ({\bf k},t) = \int_{\mathbb{R}^3} \, e^{- i({\bf k},{\bf r})} \,\sigma_{ij} ({\bf r},t) \, d{\bf r} , \ee where ${\bf k}$ is the wave vector. {Similar} formulas also hold for the strain tensor and the interaction kernel : \be \label{calF-2} \tilde{\sigma}_{ij} ({\bf k},t) = \int_{\mathbb{R}^3} \, e^{- i({\bf k},{\bf r})} \,\varepsilon_{ij} ({\bf r},t) \, d{\bf r} , \ee \be \label{calF-3} \tilde{{\cal K}} (|{\bf k}|) = \int_{\mathbb{R}^3} \, e^{- i({\bf k},{\bf r})} \, {\cal K} (|{\bf r}|) \, d{\bf r} . \ee Applying ${\cal F}$ to the convolution equation (\ref{N2}), we obtain \be \label{N3} \tilde{\sigma}_{ij} ({\bf k},t) = C_{ijkl} \, \tilde{{\cal K}} (|{\bf k}|) \, \tilde{\varepsilon}_{kl} ({\bf k},t) . \ee {which can} be considered as a {general} constitutive relation in the wave-vector space for nonlocal {elasticity}. {The particular} dependence of the function $\tilde{{\cal K}} (|{\bf k}|)$ on the wave-vector $k=|{\bf k}|$ defines the type of spatial dispersion and it characterizes the type of material non-locality. For a wide class of nonlocal materials, the wavelength $\lambda$ {satisfies} the relation $k R_0 \sim R_0 / \lambda \ll 1$, where $R_0$ {denotes} the characteristic length of interaction that usually {is of} the order of the interparticle distance. In this case, the spatial dispersion of the elastic material is weak. To describe materials with such property it is {sufficient} to know the dependence of the function $\tilde{{\cal K}}(|{\bf k}|)$ only for small values $k=|{\bf k}|$, and {then} we can replace this function by {its} Taylor's polynomial series {expansion}. For an isotropic continuum, we have \be \label{Tay1} \tilde{{\cal K}}(|{\bf k}|) = \tilde{{\cal K}}(0) + a_1 \, k + a_2 \, k^2 + o(k^2) , \ee where frequency {dependent} dispersion {is negleted} for simplicity, i.e., the {coefficients} $\tilde{{\cal K}}(0)$, $a_1$, $a_2$ do not depend on the frequency $\omega$. The weak spatial dispersion of materials with {fractal} power-law type of non-locality cannot be described by the usual Taylor approximation. The fractional Taylor series is very useful for the approximation of non-integer power-law functions \cite{CNSNS2016-2}. For example, the usual Taylor series for the power-law function \be \label{ve} \tilde{{\cal K}}(k) = a_0 + a_{\alpha} \, k^{\alpha} \ee {contains} infinite many terms for non-integer $\alpha$, while the fractional Taylor series of order $\alpha$ has a finite number of terms. For example, we can consider the fractional Taylor series in the Odibat-Shawagfeh form \cite{OdbSh} that contains the Caputo fractional derivative $_0^CD^{\alpha}_k$, where $\alpha$ is the fractional order of differentiation, $0<\alpha<1$. This fractional Taylor series has the form \be \label{Tay-Cap} \tilde{{\cal K}}(k) = \tilde{{\cal K}}(0) + \frac{(\, _0^CD^{\alpha}_{k} \tilde{{\cal K}})(0)}{\Gamma (\alpha+1)} \, k^{\alpha} + \frac{(\, _0^CD^{\alpha}_{k} \, _0^CD^{\alpha}_{k} \tilde{{\cal K}})(0)}{\Gamma (2\alpha+1)} \, k^{2 \alpha}+ o(k^{2 \alpha}) , \ee where $\, _0^CD^{\alpha}_{k}$ is the Caputo fractional derivative \cite{KST} of order $\alpha$ with respect to $k=|{\bf k}|$ that is defined by \be (\, _0^CD^{\alpha}_{k} \tilde{{\cal K}})(k) = \left( _0I^{n-\alpha}_{k} \left( \frac{d}{dk}\right)^n \tilde{{\cal K}} \right)(k) . \ee Here $_0I^{\alpha}_k$ is the left-sided Riemann-Liouville fractional integral of order $\alpha >0$ with respect to $k$ of the form \be \label{RLI} (_0I^{\alpha}_{k} \tilde{{\cal K}})(k) = \frac{1}{\Gamma(\alpha)} \int^k_0 \frac{ \tilde{{\cal K}}(k^{\prime}) \, dk^{\prime}}{(k-k^{\prime})^{1-\alpha}} , \quad (k>0) . \ee Note that the Caputo fractional derivative of a constant is zero like for the integer order derivative. In general, the third term in (\ref{Tay-Cap}), which contains repeated fractional derivatives of order $\alpha$, is not the same as the fractional derivative of order $2 \alpha$, \[ (\, _0^CD^{\alpha}_k \, _0^CD^{\alpha}_k \tilde{{\cal K}})(k) \ne (\, _0^CD^{2\alpha}_k \tilde{{\cal K}})(k) . \] The coefficients of the fractional Taylor series in the Odibat-Shawagfeh form can be found in the usual way by repeated differentiation. Using the equation \be \label{T2} _0^CD^{\alpha}_k k^{\beta} = \frac{\Gamma(\beta+1)}{\Gamma(\beta-\alpha+1)} \, k^{\beta-\alpha} , \quad (k>0, \ \alpha>0, \ \beta >0) \ee for the case $\beta=\alpha$, in the form \be \, _0^CD^{\alpha}_k k^{\alpha} = \Gamma(\alpha+1), \quad (\, _0^CD^{\alpha}_k )^n k^{\alpha} =0 , \quad (n \ge 2) , \ee we {obtain} \be (\, _0^CD^{\alpha}_k \tilde{{\cal K}})(0) = \Gamma(\alpha+1), \quad ( (\, _0^CD^{\alpha}_k)^n \tilde{{\cal K}})(0) = 0, \quad (n \ge 2) . \ee It is easy to see that the fractional Taylor series approximation of the function {given by equation} (\ref{ve}) is exact. The fractional Taylor series expansion for the function $\tilde{{\cal K}}(|{\bf k}|)$, can be {written} in the form \be \tilde{{\cal K}}(|{\bf k}|)= a_0 + \sum^N_{j=1} a_{\alpha_j} |{\bf k}|^{\alpha_j} + o(|{\bf k}|^{\alpha_N}) , \ee where $0<\alpha_1< \alpha_2 < \ . \ . \ . \ < \alpha_N$; {with} the {small}-o notation $o(|{\bf k}|^s)$ meaning {as usual}, {inclusion of} terms {with} higher powers of $|{\bf k}|$ than $|{\bf k}|^s$. The coefficients $a_{\alpha_j}$ in the Odibat-Shawagfeh form of the fractional Taylor series are defined by \be \label{a-alpha-j} a_0 = \tilde{{\cal K}}(0) , \quad a_{\alpha_j} = \frac{1}{\Gamma (j\alpha+1)} \, ((\, _0^CD^{\alpha}_{k} \, )^j \tilde{{\cal K}})(0) . \ee As a result, {for long wavelengths} we can use the approximation \be \label{approx-1} \tilde{{\cal K}}(|{\bf k}|) \approx a_0 + \sum^N_{j=1} a_{\alpha_j} |{\bf k}|^{\alpha_j} \ee for materials with power-law type of nonlocality. The order of the fractional Taylor series approximation should be correlated with the type of power-law nonlocality in order {that} the fractional Taylor approximation of $\tilde{{\cal K}}(|{\bf k}|)$ {to be valid}. In the general case $0<\alpha_{j+1}- \alpha_j<1$, we can use the fractional Taylor formula in the Dzherbashyan-Nersesian form \cite{Arm1,Arm2}, \be \label{Arm} \tilde{{\cal K}} (k) = \sum^{N}_{j=0} a_{\alpha_j} \, k^{\alpha_j} + {\cal R}_{N+1}(k), \quad (k>0) , \ee where \be \label{a-alpha-j2} a_{\alpha_j} = \frac{(D^{(\alpha_j)} \tilde{{\cal K}})(0)}{ \Gamma(\alpha_j+1)} , \quad {\cal R}_{N+1}(k) = \frac{1}{\Gamma(\alpha_{N+1}+1)} \int^k_0 (k-z)^{\alpha_{N+1}-1} \, (D^{(\alpha_j)} \tilde{{\cal K}})(z) \, dz , \ee and $\alpha_j$ $(j=0,1,...,m)$ is {an} increasing sequence of real numbers such that \be 0 < \alpha_j-\alpha_{j-1} \le 1, \quad \alpha_0=0, \quad j=1,2,...,N+1 . \ee In equation (\ref{a-alpha-j2}) we use the notation \cite{Arm1,Arm2} (see also Section 2.8 in \cite{SKM}) of the form \be D^{(\alpha_j)} = \, _0I^{1-(\alpha_j-\alpha_{j-1} )} \, _0D^{1+ \alpha_{j-1} }_k . \ee In general, {the} fractional derivative $D^{(\alpha_k)}$ differs from the Riemann-Liouville derivative \cite{SKM,KST} by a finite sum of power functions since $ _0I^{\alpha}_k \, _0I^{\beta}_k \ne \, _0I^{\alpha+\beta}_k$ (see Eq. 2.68 in \cite{KST}). For the special cases $\alpha_j= j \, \alpha$, where $\alpha<1$ and/or $\alpha_j=\alpha+j$, we could use the fractional Taylor formulas in the Riemann formal form \cite{Riem,Hardy}, in the Riemann-Liouville form (see Chapter 1. Section 2.6 \cite{SKM}), and the Trujillo-Rivero-Bonilla form \cite{TRB}. {In this connection, it is noted} that the fractional Taylor series with Caputo derivatives is {physically more meaningful} than a series with Riemann-Liouville derivatives, since the Riemann-Liouville derivative of a constant is not equal to zero. If $\alpha_j=j$ for all $j \in \mathbb{N}$, we can use the usual Taylor's formula. \subsection{Derivation of the fractional GRADELA constitutive relation} Let us obtain a constitutive relation for {a special class of fractional gradient elasticity - The fractional GRADELA model} : Substitution of (\ref{approx-1}) into (\ref{N3}) gives \be \label{N3new1} \tilde{\sigma}_{ij} ({\bf k},t) = C_{ijkl} \, \Bigl( a_0 + \sum^N_{j=1} a_{\alpha_j} |{\bf k}|^{\alpha_j} \Bigr) \, \tilde{\varepsilon}_{kl} ({\bf k},t) . \ee where the coefficients $a_{\alpha_j}$ are defined by the fractional derivatives of $\tilde{{\cal K}}(|{\bf k}|)$ with respect to $k$ of order $\alpha_j$ at zero $k=0$. For example, if we use the fractional Taylor series in the Odibat-Shawagfeh form, then we should use (\ref{a-alpha-j}) \be \label{a-alpha-j3} a_{\alpha_j} = \frac{( (\, _0^CD^{\alpha_{j}})^j \, \tilde{{\cal K}})(0)}{\Gamma (j\alpha+1)} . \ee The type of the fractional Taylor series should be correlated with the type of non-locality of {the under consideration} material. In particular the first non-zero coefficient $a_{\alpha_j}$ is the term, $\tilde{{\cal K}}(k) - \tilde{{\cal K}}(0)$ {which is} asymptotically equivalent to $k^{\alpha_j}$ as $k \to 0$. The inverse Fourier transform of (\ref{N3new1}) gives the constitutive relation for fractional gradient elasticity in the form \be \label{N3new3} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( \tilde{{\cal K}}(0) + \sum^N_{j=1} a_{\alpha_j} \, (-\Delta)^{\alpha_j/2} \Bigr) \, \varepsilon_{kl} ({\bf r},t) , \ee where we used the connection between the Riesz fractional Laplacian $(-\Delta)^{\alpha/2}$ and its Fourier transform \cite{SKM,KST}, \be \label{FFL} {\cal F}[ (-\Delta)^{\alpha/2} \varepsilon_{kl}({\bf r},t)]({\bf k})= |{\bf k}|^{\alpha} \, \tilde{\varepsilon}_{kl}({\bf k},t) \ee in the form \be |k|^{\alpha_j} \longleftrightarrow (-\Delta)^{\alpha_j/2} . \ee {In view of the above, we first derive the standard non-fractional} constitutive relation for the {GRADELA model}. We consider the special case $\alpha_j=j$ for integer $j \in \mathbb{N}$, and the function $\tilde{{\cal K}}(k)$ in the form \be \label{a2} \tilde{{\cal K}}(k) \approx a_0 + a_2 \, k^2 , \ee where $a_{2} \ne 0$, {with} all other $a_j=0$. Then, the inverse Fourier transform of (\ref{N3}) with (\ref{a2}) gives the constitutive relation \be \label{N3new2} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( a_0 - a_{2} \Delta \Bigr) \, \varepsilon_{kl} ({\bf r},t) , \ee where \be a_2 = \left( \frac{\partial^2 \tilde{{\cal K}}(k)}{\partial k^2} \right)_{k=0} . \ee {It is also assumed that there is no initial stress, so that} \[ a_0=\tilde{{\cal K}}(0)=1 \] in {consistency with the usual} the Hooke's law \[ \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \varepsilon_{kl} ({\bf r},t) . \] Let us introduce the {internal length} scale parameter $l^2_s$ of gradient elasticity {given by} \be l^2_s= |a_2| = \left| \frac{\partial^2 \tilde{{\cal K}}(k)}{\partial k^2} \right|_{k=0} . \ee Then, the second-gradient term is preceded by a sign that is defined by the sign of $a_2$. As a result, relation (\ref{N3new2}) can be rewritten in the form \be \label{N3new2b-} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( 1 - l^2_s \, \Delta \Bigr) \, \varepsilon_{kl} ({\bf r},t) , \quad (for \quad a_2>0) , \ee \be \label{N3new2b+} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( 1 - \operatorname{sgn}(a_{2}) \, l^2_s \, \Delta \Bigr) \, \varepsilon_{kl} ({\bf r},t) , \quad (for \quad a_2<0). \ee This is the well-known constitutive relation \cite{Aifantis1992}--\cite{AifantisILG} for gradient elasticity. The suggested approach to obtain constitutive relation can be generalized for the case of the higher order gradient elasticity by using {additional} integer non-zero values of $a_j$. {Next, we extend this approach to derive the fractional counterpart of the GRADELA model}. We consider the case $\alpha_j=\alpha$ for some $j=j_0$, and $\alpha_j=0$ for all other values of $j \in \mathbb{N}$. Then the function $\tilde{{\cal K}}(k)$ has the form \be \label{a2b} \tilde{{\cal K}}(k) \approx 1 + a_{\alpha} \, k^{\alpha} . \ee Substitution (\ref{a2b}) into (\ref{N3}), and {subsequent application of} the inverse Fourier transform gives the constitutive relation \be \label{N3new3c} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( 1 + a_{\alpha} \, (-\Delta)^{\alpha/2} \Bigr) \, \varepsilon_{kl} ({\bf r},t) . \ee Using the new scale parameter $l_s(\alpha)$, equation (\ref{N3new3c}) can be written in the form \be \label{N3new3d-} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( 1 + l^2_s (\alpha) \, (-\Delta)^{\alpha/2} \Bigr) \, \varepsilon_{kl} ({\bf r},t) , \quad (for \quad a_{\alpha} >0 ) , \ee \be \label{N3new3d+} \sigma_{ij} ({\bf r},t) = C_{ijkl} \, \Bigl( 1 - l^2_s (\alpha) \, (-\Delta)^{\alpha/2} \Bigr) \, \varepsilon_{kl} ({\bf r},t) , \quad (for \quad a_{\alpha} < 0 ) , \ee where $l^2_s(\alpha)=|a_{\alpha}|$ is the scale parameter. For $\alpha=2$, the relation (\ref{N3new3d-}) gives (\ref{N3new2b-}), and the relation (\ref{N3new3d+}) gives (\ref{N3new2b+}). If we use the fractional Taylor series in the Odibat-Shawagfeh form (\ref{a-alpha-j3}), then the scale parameter is defined by \be \label{l2s-alpha} l^2_s (\alpha) = |a_{\alpha}| = \frac{1}{\Gamma (j\alpha+1)} \, \left| \Bigl( (\, _0^CD^{\alpha/j}_{k} )^j \tilde{{\cal K}}\Bigr)(0) \right| . \ee In general, for the Caputo fractional derivative in equation (\ref{l2s-alpha}) we have the inequality \be (\, _0^CD^{\alpha/j}_{k} )^j \ne \, _0^CD^{\alpha}_{k} . \ee For example, for $j=2$ we have \be \label{VSP} \Bigl((\, _0^CD^{\alpha/2}_k )^2 \tilde{{\cal K}}\Bigr)(0) = (\, _0^CD^{\alpha}_k \tilde{{\cal K}})(0) + \frac{ (D^1_k\tilde{{\cal K}})(0) }{\Gamma(1-\alpha)} \, k^{1-\alpha} . \ee Note that ${\bf r}$, $r$ and $l^2_s(\alpha)$ are dimensionless {quantities} for fractional elasticity. Equation (\ref{N3new3d-}) and (\ref{N3new3d+}) are the constitutive relations for fractional {GRADELA model}. One of the advantages of the suggested phenomenological approach is its independence {on the details of the underlying micro/nanostructures}. As a result, the {above} fractional constitutive relation can correspond to different lattice models. {The governing equations for the components} $u_{i} ({\bf r},t)$ of the displacement vector can be derived form the {linear momentum balance equation for continuous media}, i.e. \be \label{law} \rho \, \ddot{u}_i ({\bf r},t) = \sum_{j} \frac{\partial \sigma_{ij} ({\bf r},t)}{\partial x_j} + f_i ({\bf r},t) , \ee where $f_i$ {denotes body force}. The {linearized} strain tensor is connected {to} the displacement vector {through the usual relation} \be \label{ekl} \varepsilon_{kl} ({\bf r},t) = \frac{1}{2} \left( \frac{\partial u_{k} ({\bf r},t)}{\partial x_l} + \frac{\partial u_{l} ({\bf r},t)}{\partial x_k} \right) . \ee Substitution of (\ref{ekl}) and of the constitutive relation (\ref{N3new3c}) for fractional gradient elasticity into equation (\ref{law}), {results to governing} equation for {the} displacement {of the fractional GRADELA model}, in the form \be \label{C-eq} \rho \, \frac{\partial^2 u_i ({\bf r},t)}{\partial t^2} = \sum_{j,l,m} C_{ijlm} \, \frac{\partial^2 u_m({\bf r},t)}{\partial x_j \partial x_l} + \sum_{j,l,m} C_{ijlm} \; a_{\alpha} \, \frac{\partial}{\partial x_j} \, (-\Delta)^{\alpha/2} \, \frac{\partial u_m({\bf r},t)}{\partial x_l} + f_i({\bf r},t) , \ee Let us {now} consider the one-dimensional case, {with} \be u_x ({\bf r},t) = u (x,t) , \quad u_y ({\bf r},t)=u_z ({\bf r},t)=0 , \ee \be f_x ({\bf r},t) = f (x,t) , \quad f_y ({\bf r},t) = f_z ({\bf r},t)=0 . \ee In this case, $C_{111}=\lambda + 2 \, \mu$, and equation (\ref{C-eq}) has the form \be \label{C-eq-2} \rho \, \frac{\partial^2 u (x,t)}{\partial t^2} = (\lambda + 2 \, \mu) \, \left( \frac{\partial^2 u(x,t)}{\partial x^2} + a_{\alpha} \, \frac{\partial}{\partial x} \frac{\partial^{\alpha}}{\partial |x|^{\alpha}} \frac{\partial u(x,t)}{\partial x} \right) + f(x,t) , \ee where $\partial^{\alpha} / \partial |x|^{\alpha}$ is the Riesz fractional derivative \cite{SKM,KST} with respect to $x \in \mathbb{R}$. Note that $\partial^{\alpha} / \partial |x|^{\alpha}$ for $\alpha=2$ is a derivative of second order with respect $x$ with the minus sign \be \frac{\partial^{\alpha=2}}{\partial |x|^{\alpha=2}} = - \frac{\partial^2}{\partial x^2} . \ee For {the cases of} $\alpha=1$ {and of others with} odd integer values, $\partial^{\alpha} / \partial |x|^{\alpha}$ cannot be considered as a local operator. It is a nonlocal operator; e.g. \be \frac{\partial^{\alpha=1}}{\partial |x|^{\alpha=1}} \ne \frac{\partial}{\partial x} . \ee For the static case ($u(x,t)=u(x)$, $f(x,t)=f(x)$), equation (\ref{C-eq-2}) can be rewritten in the form \be \label{C-eq-3a} \frac{\partial^2 u(x)}{\partial x^2} + a_{\alpha} \, \frac{\partial}{\partial x} \frac{\partial^{\alpha}}{\partial |x|^{\alpha}} \frac{\partial u(x)}{\partial x} = - \frac{1}{\lambda + 2 \, \mu} f(x) . \ee For $\alpha=2$, equation (\ref{C-eq-3a}) describes the static equation for usual (non-fractional) gradient elasticity {in one dimension} \cite{TA2014}. \subsection{Green functions and Fourier method to solve fractional differential equations} Let us consider the fractional partial differential equation in the form \be \label{FPDE-1} \sum^m_{j=1} a_j ((-\Delta)^{\alpha_j/2} \Phi) ({\bf r}) + a_0 \Phi ({\bf r})= f({\bf r}) , \ee where $\alpha_m > ... > \alpha_1>0$, and $a_j \in \mathbb{R}$ ($1 \leq j \leq m$) are constants. {We apply the Fourier method, which is based on the relations} \begin{equation} \label{FFL2} \begin{split} {\cal F}[ \frac{ \partial^{\alpha_j} \Phi ({\bf r}) } { \partial | x_i |^{\alpha_j}} ] ({\bf k}) = | k_i |^{\alpha_j} \, \hat \Phi ({\bf k}).\\ {\cal F}[ (-\Delta)^{\alpha_j/2} \Phi ({\bf r})]({\bf k})= |{\bf k}|^{\alpha_j} \, \hat \Phi ({\bf k}). \end{split} \end{equation} {for Riesz fractional derivatives and the Riesz Laplaican, valid for the Lizorkin space \cite{SKM} and infinitely differential functions $C^{\infty} ({\mathbb R^1}\!)$ on $\mathbb R^1$ with compact support.} Applying the Fourier transform ${\cal F}$ to both sides of (\ref{FPDE-1}) and using (\ref{FFL2}), we have \be ({\cal F} \Phi)({\bf k}) = \left( \sum^m_{j=1} a_j |{\bf k}|^{\alpha_j}+a_0 \right)^{-1} ({\cal F} f)({\bf k}) . \ee The fractional analog of the Green function (see Section 5.5.1. in \cite{KST}) is given by \be \label{FGF} G_{\alpha}({\bf r})= {\cal F}^{-1} \Bigl[ \left( \sum^m_{j=1} a_j |{\bf k}|^{\alpha_j}+ a_0 \right)^{-1} \Bigr] ({\bf r})= \int_{\mathbb{R}^3} \left( \sum^m_{j=1} a_j |{\bf k}|^{\alpha_j}+a_0 \right)^{-1} \ e^{ + i ({\bf k},{\bf r}) } \, d^3 {\bf k} , \ee where $\alpha=(\alpha_1,...,\alpha_m)$. The following relation \be \label{3-1} \int_{\mathbb{R}^n} e^{ i ({\bf k},{\bf r}) } \, G(|{\bf k}|) \, d^n {\bf k}= \frac{(2 \pi)^{n/2}}{ |{\bf r}|^{(n-2)/2}} \int^{\infty}_0 G( \lambda) \, \lambda^{n/2} \, J_{n/2-1}(\lambda |{\bf r}|) \, d \lambda, \ee holds (see Lemma 25.1 of \cite{SKM}) for any suitable function $G$ such that the integral in the right-hand side of (\ref{3-1}) is convergent. Here $J_{\nu}$ is the Bessel function of the first kind. As a result, the Fourier transform of a radial function is also a radial function. On the other hand, using (\ref{3-1}), the Green function (\ref{FGF}) can be represented (see Theorem 5.22 in \cite{KST}) in the form of the one-dimensional integral involving the Bessel function $J_{1/2}$ of the first kind \be \label{G-1} G_{\alpha} ({\bf r}) =\frac{|{\bf r}|^{-1/2}}{(2 \pi)^{3/2}} \int^{\infty}_0 \left( \sum^m_{j=1} a_j |\lambda|^{\alpha_j}+a_0 \right)^{-1} \lambda^{3/2} \, J_{1/2} (\lambda |{\bf r}|) \, d \lambda, \ee where we use $n=3$ and $\alpha=(\alpha_1,...,\alpha_m)$. For {the} one-dimensional case, {we have} \be J_{-1/2} (z) = \sqrt{\frac{2}{\pi z}} \, \cos (z) , \ee {whereas} for three-dimensional case, {we have} \be J_{1/2} (z) = \sqrt{\frac{2}{\pi z}} \, \sin (z) . \ee If $\alpha_m > 1$ and $A_m \ne 0$, $A_0 \ne 0$, then equation (\ref{FPDE-1}) (see, for example, Section 5.5.1. pages 341-344 in \cite{KST}) has a particular solution represented in the form of the convolution of the functions $G({\bf r})$ and $f({\bf r})$ as follows \be \label{phi-G} \Phi({\bf r})= \int_{\mathbb{R}^3} G_{\alpha} ({\bf r} - {\bf r}^{\prime}) \, f ({\bf r}^{\prime}) \, d^3 {\bf r}^{\prime}, \ee where the Green function $G_{\alpha}(z)$ is given by (\ref{G-1}). {Thus, we can now effectively consider} the fractional partial differential equation (\ref{FPDE-1}) with $a_0=0$ and $a_1 \ne 0$, when $m \in \mathbb{N}$, $m \ge 1$, {as well as} the case where $\alpha_1< 3$, $\alpha_m > 1$, $m \ge 1$, $a_1 \ne 0$, $a_m \ne 0$, $\alpha_m > ... > \alpha_1>0$, {i.e. the equation} \be \label{FPDE-3} \sum^m_{j=1} a_j ((-\Delta)^{\alpha_j/2} \Phi) ({\bf r}) = f({\bf r}) . \ee The above equation has the following particular solution (see Theorem 5.23 in \cite{KST}) \be \label{phi-G3} \Phi({\bf r})= \int_{\mathbb{R}^3} G_{\alpha} ({\bf r} - {\bf r}^{\prime}) \, f ({\bf r}^{\prime}) \, d^3 {\bf r}^{\prime} , \ee with \be \label{G-3} G_{\alpha} ({\bf r}) =\frac{|{\bf r}|^{-1/2}}{(2 \pi)^{3/2}} \int^{\infty}_0 \left( \sum^m_{j=1} a_j |\lambda|^{\alpha_j} \right)^{-1} \lambda^{3/2} \, J_{1/2} (\lambda |{\bf r}|) \, d \lambda \, , \ee {which also describes} the electrostatic field in plasma-like media with a spatial dispersion of power-law type. Let us now apply the multi-dimensional Fourier {method} to derive particular solutions for the linear fractional differential equations (\ref{C-eq}) by {employing} the direct and inverse Fourier transforms, and using the The Fourier transform method for solving the relations \be {\cal F} \left\{ \frac{\partial u_i({\bf r},t)}{\partial x_l} \right\} ({\bf k},t) = \, i \, k_l \, {\cal F} \{ u_i({\bf r},t) \} ({\bf k},t) , \ee \be {\cal F} \left\{ (-\Delta)^{\alpha/2} \, u_i({\bf r},t) \right\} ({\bf k},t) = |{\bf k}|^{\alpha} \, {\cal F} \{ u_i({\bf r},t) \} ({\bf k},t) . \ee The Fourier transform of equation (\ref{C-eq}) has the form \be \label{C-eq2} \rho \, \frac{\partial^2 \tilde{u}_i ({\bf k},t) }{\partial t^2} = \sum_{j,l,m} C_{ijlm} \, \Bigl( - k_j \, k_l - a_{\alpha} \, k_j \, k_l \, |{\bf k}|^{\alpha} \Bigl) \, \tilde{u}_m ({\bf k},t) + \tilde{f}_i({\bf k},t) , \ee where $\tilde{f}_i({\bf k},t) = {\cal F} \{ f_i({\bf r},t) \} ({\bf k},t)$. Using the tensor \be \label{hatC} \hat{C}_{im} ({\bf k}) = \sum_{j,l} C_{ijlm} \, k_j \, k_l \, (1 + a_{\alpha} \, |{\bf k}|^{\alpha} ) , \ee we can {calculate its} inverse $\hat{C}^{-1}_{im}({\bf k})$ {through the identity} \be \sum_m \hat{C}^{-1}_{im} ({\bf k}) \, \hat{C}_{ml} ({\bf k}) = \delta_{il} . \ee For {the} static case ($\tilde{u}_i ({\bf k},t)=\tilde{u}_i ({\bf k})$, $\tilde{f}_i ({\bf k},t)=\tilde{f}_i ({\bf k})$), equation (\ref{C-eq2}) has the form \be - \sum_m \hat{C}_{im} ({\bf k}) \,\tilde{u}_m ({\bf k}) + \tilde{f}_i ({\bf k}) = 0 , \ee and {thus} \be \label{Sol-1} \tilde{u}_m ({\bf k}) = \sum_i \hat{C}^{-1}_{mi} ({\bf k}) \, \tilde{f}_i({\bf k}) . \ee Applying the inverse Fourier transform to (\ref{Sol-1}), we obtain a particular solution to equation (\ref{C-eq}) in the form \be \label{Sol-2} u_m ({\bf r}) = \sum_i \, {\cal F}^{-1} \left\{ \hat{C}^{-1}_{mi} ({\bf k}) \, \tilde{f}_i ({\bf k}) \right\} . \ee {On introducing} the fractional analog of the Green function \be G^{mi} ({\bf r}) = {\cal F}^{-1} \left\{ \hat{C}^{-1}_{mi} ({\bf k}) \right\} . \ee and applying the {convolution} property of the Fourier transform, we can {then represent} the solution (\ref{Sol-2}) in the form of the convolution of the Green's function $G^{mi} ({\bf r})$ and the {body} force $f_i({\bf r})$ as \be \label{Sol-3} u_m ({\bf r}) = \int_{\mathbb{R}^3} G^{mi} ( {\bf r} - {\bf r}^{\prime} ) \, f_i ({\bf r}^{\prime} )\, d {\bf r}^{\prime} . \ee Let us now obtain a solution for the one-dimensional equation (\ref{C-eq-3a}) {in Fourier space, i.e.} \be ( k^2+ a_{\alpha} \, k^{\alpha+2} ) \, \tilde{u} (k) = \frac{1}{\lambda + 2 \, \mu} \tilde{f} (k) , \quad (\alpha>0) , \ee where $k=k_x$, {by utilizing the Green's function} (see Theorem 5.24 in \cite{KST}) in the form \be G^1_{\alpha} (x) =\frac{1}{\pi} \int^{\infty}_0 \frac{ \cos (\lambda |x|) }{ \lambda^2 + a_{\alpha} \, \lambda^{\alpha+2}} \, d \lambda . \ee For the deformation at positions $x$, which are {large in comparison} with the size of the region where the force is applied (point load), we can assume that the force is given by \be \label{deltaf} f(x) =f_0 \delta(x) . \ee Then the {displacement}, which is a particular solution of equation (\ref{C-eq-3a}), will be described by the equation \be \label{SOL-1} u(x) = \frac{f_0}{\pi (\lambda + 2 \, \mu) } \int^{\infty}_0 \frac{\cos(\lambda |x|)}{ \lambda^2 + a_{\alpha} \lambda^{\alpha+2}} \, d\lambda . \ee The solution (\ref{SOL-1}) for non-integer $\alpha>0$ describes a solution for the fractional {GRADELA model}. \subsection{Solution based on Fourier transform} The fractional {GADELA displacements for the static case are given by the equation} \be \label{1} \mu \, u_{i,jj} + (\lambda +\mu) \, u_{j,ji} + l^2_{\alpha} \, (-\Delta)^{\alpha/2} \, \Bigl( \mu \, u_{i,jj} + (\lambda +\mu) \, u_{j,ji} \Bigr) + f_i =0 , \ee where $(-\Delta)^{\alpha/2}$ is the fractional Laplacian of order $\alpha>0$ of Riesz type. For $\alpha=1$, equation (\ref{1}) gives {the usual equations of the standard GRADELA model \cite{AA1997}--\cite{AifantisILG}} \be \label{2} \mu \, u_{i,jj} + (\lambda +\mu) \, u_{j,ji} - l^2_2 \, \Delta \Bigl( \mu \, u_{i,jj} + (\lambda +\mu) \, u_{j,ji} \Bigr) + f_i =0 . \ee Using the Fourier transform \be \label{3} \hat{F} ({\bf k}) = \int^{+\infty}_{-\infty} F({\bf x}) \, e^{ -i \, ({\bf k}, {\bf x})} \, d^3{\bf x} , \ee \be \label{4} F ({\bf x}) = \frac{1}{(2 \, \pi)^3} \, \int^{+\infty}_{-\infty} \hat{F}({\bf k}) \, e^{ i \, ({\bf k}, {\bf x})} \, d^3{\bf k} , \ee we obtain \be \label{5} |{\bf k}|^2 \, (1+l^2_{\alpha} \, |{\bf k}|^{\alpha}) \, \Bigl( (\lambda + 2 \, \mu) \, k^0_i \, k^0_j + \mu (\delta_{ij}- k^0_j \, k^0_j ) \Bigr) \, \hat{u}_i({\bf k}) = \hat{f}_i ({\bf k}) , \ee where \be \label{6} |{\bf k}| = (k_i\, k_i)^{1/2} , \quad k^0_i =k_i /| {\bf k}| . \ee Equation (\ref{5}) leads us to the expression \be \hat{u}_i({\bf k}) = \hat{G}_{ij}({\bf k}) \, \hat{f}_j ({\bf k}) , \ee where \be \hat{G}_{ij}({\bf k}) = \frac{1}{|{\bf k}|^2 \, (1+l^2_{\alpha} \, |{\bf k}|^{\alpha}) } \, \left( \frac{1}{\mu}(\delta_{ij}- k^0_j \, k^0_j ) + \frac{1}{\lambda+2\mu} \, k^0_i \, k^0_j \right) . \ee Then displacement $u_i({\bf x})$ is represented in the form \be u_i({\bf x}) = \int^{+\infty}_{-\infty} G_{ij} ({\bf x}-{\bf y}) \, d^3 {\bf y} . \ee where \be G_{ij}({\bf x}) = \frac{1}{(2\, \pi)^3} \int^{+\infty}_{-\infty} \hat{G}_{ij} ({\bf k}) \, e^{ i \, ({\bf k}, {\bf x})} \, d^3 {\bf k} . \ee To explicitly evaluate $G_{ij}({\bf x})$, we use spherical coordinates $(k,\theta, \phi)$ with angle $\theta$ between ${\bf x}$ ($\theta=0$) and ${\bf k}$: \be ({\bf k},{\bf x}) =k_i \, x_i = |{\bf k}| \, |{\bf x}| \, \cos \theta . \ee \be x =|{\bf x}| , \quad k=|{\bf k}|, \quad d^3{\bf k}= k^2 \, dk \, \sin \theta \, d \theta \, d \phi . \ee Then we have \[ G_{ij}({\bf x}) = \frac{1}{(2\, \pi)^3} \int^{2 \pi}_0 \Bigl( \int^{\pi}_{0} \Bigl( \int^{\infty}_0 \Bigl( \frac{1}{|{\bf k}|^2 \, (1+l^2_{\alpha} \, |{\bf k}|^{\alpha}) } \, \Bigl( \frac{1}{\mu} (\delta_{ij}- k^0_i \, k^0_j ) + \] \be + \frac{1}{\lambda+2\mu} \, k^0_i \, k^0_j \Bigr) \, e^{ i \, k\, x\, \cos \theta} \, d k \Bigr) \sin \theta \, d \theta \Bigr) \Bigr) \ d \phi = \ee \[ = \frac{1}{(2\, \pi)^3} \int^{\pi}_0 \Bigl( \int^{2\pi}_{0} \left( \left( \frac{1}{\mu} \, (\delta_{ij}- k^0_i \, k^0_j ) + \frac{1}{\lambda+2\mu} \, k^0_i \, k^0_j \right) \ d \phi \right) \cdot \] \be \label{14} \cdot \int^{\infty}_0 \left( \frac{1}{(1+l^2_{\alpha} \, |{\bf k}|^{\alpha}) } \, e^{ i \, k \, x \, \cos \theta} \, d k \right) \Bigr) \sin \theta \, d \theta . \ee Using that $\hat{G}_{ij}(-{\bf k}) = \hat{G}_{ij}({\bf k})$ and $G_{ij}(-{\bf x}) =G_{ij}({\bf x})$ {along with} the identities \be \int^{2 \pi}_0 \, k^0_i \, k^0_j \, d \phi = \pi \, \Bigl( \delta_{ij} \, \sin^2 \theta - x^0_i \, x^0_j (1-3 \cos^2 \theta) \Bigr) , \ee where $x^0_i =x_i / |{\bf x}|$, the Fourier transform can be represented as a cosine Fourier transform \[ \int^{\infty}_0 \frac{1}{ 1+l^2_{\alpha} \, |{\bf k}|^{\alpha} } \, e^{ i \, k \, x \, \cos \theta} \, d k = \frac{1}{2} \int^{\infty}_{-\infty} \frac{1}{ 1+l^2_{\alpha} \, |{\bf k}|^{\alpha} } \, e^{ i \, k \, x \, \cos \theta} \, d k = \] \be = \int^{\infty}_0 \frac{1}{ 1+l^2_{\alpha} \, |{\bf k}|^{\alpha} } \, \cos ( k \, x \, \cos \theta ) \, d k . \ee For $\alpha=2$, we can use equation (11) of Section 1.2 of \cite{ErdelyiTable} in the form \be \int^{\infty}_0 \frac{1}{k^2+a^2} \cos (k\, x) \, dk = \frac{\pi}{2a} \, e^{-ax} \quad (\alpha>0) . \ee For $\alpha \ne 2$, the corresponding integrals cannot be evaluated explicitly. For this integrals we introduce the notation \be \label{Cn} C_{n,\alpha} (x, l) := \int^{\infty}_0 \frac{\cos ( k \, x )}{ k^n \, (1+ l^2_{\alpha} \, k^{\alpha}) } \, \, d k \quad ( n \in \mathbb{N}). \ee Note that \be C_{0,2} (x, 1) = \frac{\pi \, e^{-x}}{2} , \ee and the integral $C_{n,2} (x, 1)$ does not converge for $n \in \mathbb{N}$. Usually, the integration with respect to $k$ is realized {first}, and then the integration with respect to $\theta$. {Here,} we will use a reverse sequence of integrations. Using the notation (\ref{Cn}), we rewrite equation (\ref{14}) in the form \[ G_{ij}({\bf x}) = \frac{1}{(2\pi)^3} \int^{1}_{-1} \Bigl( \frac{2}{\mu} + \Bigl( \frac{1}{\lambda+ 2 \mu} -\frac{1}{\mu} \Bigr) \, (1-t^2) \Bigr) \delta_{ij} \, C_{0,\alpha} (x \, t , l) \, dt - \] \be \label{20} - \frac{1}{(2\pi)^3} \int^{1}_{-1} \Bigl( \frac{1}{\lambda+ 2 \mu} -\frac{1}{\mu} \Bigr) \, x^0_i \, x^0_j \, (1-3t^2) \, C_{0,\alpha} (x \, t , l) \, dt , \ee where \[ t = \cos \theta . \] To explicitly evaluate this expression (\ref{20}), we should {first calculate} the integrals \be \label{21} \int^{1}_{-1} C_{0,\alpha} (x \, t , l) \, dt = \int^{\infty}_0 \frac{1}{ 1+ l^2_{\alpha} \, k^{\alpha} } \left( \int^{1}_{-1} \cos ( k \, x \, t ) \, dt \right) \, dk . \ee \be \int^{1}_{-1} C_{0,\alpha} (x \, t , l) \, (1-t^2) dt = \int^{\infty}_0 \frac{1}{ 1+ l^2_{\alpha} \, k^{\alpha} } \left( \int^{1}_{-1} \cos ( k \, x \, t ) \, (1-t^2) dt \right) \, dk . \ee \be \label{23} \int^{1}_{-1} C_{0,\alpha} (x \, t , l) \, (1-3 \, t^2) dt = \int^{\infty}_0 \frac{1}{ 1+ l^2_{\alpha} \, k^{\alpha} } \left( \int^{1}_{-1} \cos ( k \, \, x\, t ) \, (1- 3\, t^2) dt \right) \, dk . \ee The integrals, which appear in the brackets of (\ref{21})-(\ref{23}), can be explicitly represented by elementary functions \be \label{24} \int^{1}_{-1} \cos ( k \, \, x\, t ) \, dt = \frac{2 \, \sin(k \, x)}{k \, x} , \ee \be \int^{1}_{-1} \cos ( k \, \, x\, t ) \, (1-t^2) \, dt = \frac{4 \, \sin(k \, x) - 4 \, k \, x\, \cos(k \, x)}{ (x\, k)^3} , \ee \be \label{26} \int^{1}_{-1} \cos ( k \, \, x\, t ) \, (1-3t^2) dt = - \frac{4 \, ((x\,k)^2-3) \, \sin(k \, x) + 12 \, k \, x \, \cos(k \, x)}{(k \, x)^3} . \ee Expressions (\ref{24})-(\ref{26}) can be substituted into (\ref{21})-(\ref{23}). {This results to } new special functions $A_1(\alpha;l;x)$, $A_2(\alpha;l;x)$, and $A_3(\alpha;l;x)$, since the corresponding integrals cannot be represented by {elementary} and well-known special functions These new functions are defined by the equations \be \label{A1} A_1(\alpha;l;x) := \int^{\infty}_0 \, \frac{2 \, \sin(k \, x)}{k \, x \, (1+ l^2_{\alpha} \, k^{\alpha})} \, dk . \ee \be \label{A2} A_2(\alpha;l;x) := \int^{\infty}_0 \, \frac{4 \, \sin(k \, x) - 4 \, k \, x\, \cos(k \, x)}{ (x\, k)^3 \, (1+ l^2_{\alpha} \, k^{\alpha})} \, dk . \ee \be \label{A3} A_3(\alpha;l^2;x):= -\int^{\infty}_0 \, \frac{4 \, ((x\,k)^2-3) \, \sin(k \, x) + 12 \, k \, x \, \cos(k \, x)}{(k \, x)^3 \, (1+ l^2_{\alpha} \, k^{\alpha})} \, dk . \ee Note that for the case $\alpha=2$, the functions (\ref{A1})-(\ref{A3}) can be explicitly represented by elementary and well-known special functions. For example, {for} $l=1$, we have \[ A_1(2; 1; x)= x^{-1}\Bigl( { \pi - \pi \,{\rm cosh}(x^{3/2}) + I \,{\rm Ci}( - I\,x^{3/2})\,{\rm sinh}({\it x \symbol{126}}^{3/2}) - I\,{\rm Ci}(I\,x^{3/2}) \,{\rm sinh}(x^{3/2})} \Bigr) \] \begin{eqnarray*} \lefteqn{ A_2(2; 1; x)= - x^{-13/2}\Bigl(3\,\pi \, \sqrt{x} - 2\,\pi \,\sqrt{x} \,{\rm cosh}(x^{5/2}) + 2\,x ^{3}\,\pi \,{\rm sinh}(x^{5/2})} \\ & & \mbox{} + 2\,I\,\sqrt{x}\,{\rm Ci}( - I\, x^{5/2})\,{\rm sinh}(x^{5/2}) + 2\,I\,x^{3}\,{\rm Ci}(I\,x ^{5/2})\,{\rm cosh}(x^{5/2}) \\ & & \mbox{} - 2\,I\,\sqrt{x}\,{\rm Ci}(I\, x^{5/2})\,{\rm sinh}(x^{5/2}) - 2\,I\,x^{3}\,{\rm Ci}( - I\,{\it x \symbol{126}}^{5/2})\,{\rm cosh}(x^{5/2}) \Bigr) . \end{eqnarray*} \begin{eqnarray*} \lefteqn{ A_3(2; 1; x)= x^{-13/2} \, \Bigl( - 2\,\pi \, x^{11/2} + 2\,\pi \,{\rm cosh}({\it x \symbol{126}}^{5/2})\,x^{11/2} - 9\,\pi \, \sqrt{x} + 6\,\pi \,\sqrt{x} \,{\rm cosh}(x^{5/2})} \\ & & \mbox{} - 6\,x^{3}\,\pi \,{\rm sinh}({\it x\symbol{126}}^{5/2}) - 6\,I\,x^{3}\,{\rm Ci}(I \,x^{5/2})\,{\rm cosh}(x^{5/2 }) - 6\,I\,\sqrt{x}\,{\rm Ci}( - I\,{\it x \symbol{126}}^{5/2})\,{\rm sinh}(x^{5/2}) \\ & & \mbox{} - 2\,I\,{\rm Ci}( - I\,x^{5/2})\, {\rm sinh}(x^{5/2})\,x^{11/2} + 6\,I\,\sqrt{x}\,{\rm Ci}(I\,{\it x \symbol{126}}^{5/2})\,{\rm sinh}(x^{5/2}) \\ & & \mbox{} + 2\,I\,{\rm Ci}(I\,x^{5/2})\, {\rm sinh}(x^{5/2})\,x^{11/2} + 6\,I\,x^{3}\,{\rm Ci}( - I\,{\it x \symbol{126}}^{5/2})\,{\rm cosh}(x^{5/2}) \Bigr) , \end{eqnarray*} where ${\rm Si}(z)$ and ${\rm Ci}(z)$ are sine and cosine {integrals}, respectively. Using (\ref{A1})-(\ref{A3}), equation (\ref{20}) can be represented in the form \[ G_{ij}({\bf x}) = \frac{1}{(2\pi)^3} \, \Bigl( \frac{1}{\mu} \, A_1(\alpha;l;x)\, \delta_{ij} + \Bigl( \frac{1}{\lambda+ 2 \mu} -\frac{1}{\mu} \Bigr) \, A_2(\alpha;l;x) \, \delta_{ij} - \] \be - \Bigl( \frac{1}{\lambda+ 2 \mu} -\frac{1}{\mu} \Bigr) \, x^0_i \, x^0_j \, A_3(\alpha;l;x) \Bigr) . \ee As a result, we obtain the equation \be G_{ij}({\bf x}) = \frac{1}{(2\pi)^3} \, \left( \psi_{\alpha}(x) \, \delta_{ij} - \chi_{\alpha} (x) \, x^0_i \, x^0_j \right) , \ee where \be \psi_{\alpha}(x) := \frac{1}{\mu} \, A_1(\alpha;l;x) + \Bigl( \frac{1}{\lambda+ 2 \mu} -\frac{1}{\mu} \Bigr) \, A_2(\alpha;l;x) , \ee \be \chi_{\alpha} (x) := \Bigl( \frac{1}{\lambda+ 2 \mu} -\frac{1}{\mu} \Bigr) \, A_3(\alpha;l;x) . \ee The functions (\ref{A1})-(\ref{A3}) can be represented in terms of some sine and cosine Fourier transforms in the form \be \label{A1b} A_1(\alpha;l;x):= \frac{2}{x} \, S_{1,\alpha} (x, l) \ee \be \label{A2b} A_2(\alpha;l;x) := \frac{4}{x^3} \, S_{3,\alpha} (x, l) - \frac{4}{x^2} \, C_{2,\alpha} (x, l) \ee \be \label{A3b} A_3(\alpha;l^2;x):= -\frac{4}{x} \, S_{1,\alpha} (x, l) + \frac{12}{x^3} \, S_{3,\alpha} (x, l) - \frac{12}{x^2} \, C_{3,\alpha} (x, l) , \ee where $S_{n,\alpha} (x, l)$ and $C_{n,\alpha} (x, l)$ are the sine and cosine Fourier transforms of corresponding functions in the form \be S_{n,\alpha} (x, l) := \int^{\infty}_0 \, \frac{\sin(k \, x)}{k^n \, (1+ l^2_{\alpha} \, k^{\alpha})} \, dk . \ee \be C_{n,\alpha} (x, l) := \int^{\infty}_0 \, \frac{\cos (k \, x)}{k^n \, (1+ l^2_{\alpha} \, k^{\alpha})} \, dk . \ee Note that the integrals $C_{n,\alpha} (x, l)$ and $S_{n,\alpha} (x, l)$ do not converge for a wide range of parameters. At the same time, the combinations in the form (\ref{A1b})-(\ref{A3b}) converge for some of these cases. {In this connection, we give} some values of the function $A_2$ for $x=1$: \be A_2(2.0;1;1)= 1.48131675 \quad A_2(2.7;1;1) = 1.430697955 \quad A_2(1.2;1;1)= 1.550145537 \ee \be A_2(2.0;0.1;1) = 3.078796 \quad A_2(2.7;0.1;1) = 3.049724200 \quad A_2(1.2;0.1;1) = 3.098659886 \ee \be A_2(2.0;10;1) = 0.20179058 \quad A_2(2.7;10;1) = 0.3025869013 \quad A_2(1.2;10;1) = 0.09279446113. \ee \newpage \section{Fractional Gradient Elasticity with Nonlinear Effects} \subsection{Fractional nonlinear constitutive equations} Nonlinearity in the fractional gradient elasticity models can be incorporated in analogy to conventional nonlinear stress-strain relations used for `non-gradient' material behavior. The theories of nonlinear elasticity and plasticity are classical examples which have been well developed and used in a plethora of applications, by also accounting for thermal, diffusion and electromagnetic effects. Such type of multiphysics models for deforming materials lead to systems of differential equations (with derivatives of integer order) which are not only difficult to address analytically or numerically, but also not always able to interpret the observed behavior. The point of view advanced here is that the multiphysics/multivariable approach may be supplemented by a `fractional derivatives' approach utilizing a smaller number of variables and phenomenological parameters. Thus, when a micro/nano structural variable evolves in a complex manner such that non-fractional micro/nano elasticity or plasticity models cannot capture the observed behavior, one may explore the possibility of ignoring the explicit appearance of that variable in the constitutive equations and use non-integer (instead of integer) derivatives to describe deformation with the newly introduced fractional parameter modeling of `missing' phenomenology. We postpone this general discussion for the future and we focus here on extending the linear fractional gradient elasticity {onside} various of the previous section to include the nonlinear effects. The proposed nonlinear fractional gradient constitutive equation used involves scalar measures of the stress and strain tensors; i.e. their second invariants, as these quantities enter in both theories of nonlinear elasticity and plasticity. In plasticity theory, in particular, we employ the second invariants of the deviatoric stress and plastic strain tensors (\cite{Aifantis1,Aifantis2}). The effective (equivalent) stress $\sigma$ is defined by the equation \be \sigma = \sqrt{(1/2) \sigma^{\prime}_{ij} \sigma^{\prime}_{ij}} , \ee where $\sigma_{ij}$ is the stress tensor, and \[ \sigma^{\prime}_{ij} = \sigma^{\prime}_{ij} -\frac{1}{3}\sigma^{\prime}_{kk} \delta_{ij} . \] The effective (equivalent) plastic strain is defined as \be \varepsilon = \int dt \sqrt{2 \dot{\varepsilon_{ij}} \dot{\varepsilon_{ij}} } \quad , \ee where $\dot{\varepsilon_{i j}}$ is the {plastic strain rate tensor, which is assumed to be traceless in order to satisfy plastic incompressibility}. {Motivated by the above, we propose the following} form of nonlinear fractional differential equation {for the scalar quantities $\sigma$ and $\varepsilon$ which can be used as a basis for a future tensorial formulation of nonlinear elasticity and plasticity theories} \be \label{eq-01} \sigma({\bf x}) = E \, \varepsilon ({\bf x}) + c (\alpha) \, ((-\Delta)^{\alpha/2} \varepsilon ) ({\bf x}) + \eta \, K(\varepsilon ({\bf x})), \quad (\alpha >0), \ee where $K(\varepsilon ({\bf x}))$ is a nonlinear function, which describes the usual (homogenous) {material's response beyond linear elasticity or linear hardening plasticity}; $c (\alpha)$ is an internal parameter, that measures the nonlocal character of {deformation} mechanisms; $E$ is {a shear-like elastic} modulus; $\eta$ is a small parameter of non-linearity; and $(-\Delta)^{\alpha/2}$ is the fractional Laplacian in the Riesz form \cite{KST}. As a simple example of the nonlinear function, we can consider \be \label{eq-01b} K(\varepsilon ) = \varepsilon^{\beta} ({\bf x}) , \quad (\beta >0) . \ee Equation (\ref{eq-01}), where $K(\varepsilon)$ is defined by (\ref{eq-01b}) with $\beta=3$, is the fractional Ginzburg-Landau equation (see, for example, \cite{GL-0}--\cite{GL-2}). {For various choices of the parameters ($E,\eta,\beta$) characterizing the homogeneous material response, different models of elastic and inelastic behavior may result. It is noted, in particular, that (\ref{eq-01}) may be considered as a fractional generalization of the flow stress expression for the conventional theory of plasticity with $E$ denoting the linear hardening modulus and $(\eta,\beta)$ the Ludwik--Hollomon parameters.} Let us derive a particular solution of equation (\ref{eq-01}) with $K(\varepsilon )=0$. To solve the linear fractional differential equation \be \label{FPDE-1b} \sigma({\bf x}) = E \, \varepsilon ({\bf x}) + c (\alpha) \, ((-\Delta)^{\alpha/2} \varepsilon ) ({\bf x}) , \ee which represents the constitutive relation of the fractional gradient elasticity, we apply the Fourier method and the fractional Green function. Using Theorem 5.22 of \cite{KST} for the case $E \ne 0$ and $\alpha > (n-1)/2$, the equation (\ref{eq-03}) is solvable, and its particular solution is given by the {expression} \be \label{Gj-1} \varepsilon ({\bf x}) = G_{n,\alpha} \, * \, \sigma = \int_{\mathbb{R}^n} G_{n,\alpha} ({\bf x} - {\bf x}^{\prime}) \, \sigma ({\bf x}^{\prime}) \, d {\bf x}^{\prime} , \ee where the symbol $*$ denotes the convolution operation, and $G_{n,\alpha} ({\bf x})$ is defined by (\ref{G-1}), \be \label{G-1b} G_{n,\alpha} ({\bf x}) = \frac{|{\bf x}|^{(2-n)/2}}{(2 \pi)^{n/2}} \int^{\infty}_0 \frac{ \lambda^{n/2} \, J_{(n-2)/2} (\lambda |{\bf x}|) }{c (\alpha) \, \lambda^{\alpha} +E} \, d \lambda, \ee where $n=1,2,3$, $\alpha > (n-1)/2$, and $J_{(n-2)/2}$ is the Bessel function of the first kind. Let us consider an unbounded fractional nonlocal continuum, where the stress is applied to an infinitesimally small region in {its interior}. In this case, we can assume that the strain $\varepsilon ({\bf x})$ is {generated} by a point stress $\sigma({\bf x})$ at the origin of coordinates, i.e. \be \label{delta-j} \sigma({\bf x}) = \sigma_0 \delta({\bf x}) . \ee Then, the scalar field $\varepsilon ({\bf x})$ {is proportional to the Green's function}, and has the form \be \label{phi-Gb} \varepsilon ({\bf x}) = \sigma_0 \, G_{n,\alpha} ({\bf x}) , \ee i.e. \be \label{Pot-2} \varepsilon ({\bf x}) = \frac{1}{2 \pi^2} \frac{\sigma_0}{|{\bf x}|} \, \int^{\infty}_0 \frac{ \lambda \, \sin (\lambda |{\bf x}|)}{ E + c (\alpha) \, \lambda^{\alpha} } \, d \lambda . \ee This is the particular solution of the fractional-order differential equation (\ref{G-1b}) with the point stress for materials distributed in the three-dimensional space. \subsection{Perturbation of gradient elasticity by nonlinearity} Suppose that $\varepsilon ({\bf x})= \varepsilon_0 ({\bf x})$ is a solution of equation (\ref{eq-01}) with $\eta=0$, i.e. $\varepsilon_0 ({\bf x})$ is a solution of the linear {fractional} equation \be \label{eq-02} \sigma({\bf x}) = E \, \varepsilon_0 ({\bf x}) + c (\alpha) \, ((-\Delta)^{\alpha/2} \varepsilon_0) ({\bf x}) . \ee The solution of this equation has the form (\ref{Gj-1}). We will seek a solution of nonlinear equation (\ref{eq-01}) with $\eta \ne 0$ in the form \be \label{eq-03} \varepsilon ({\bf x}) = \varepsilon_0 ({\bf x}) + \eta \, \varepsilon_1 ({\bf x}) + . . . \ . \ee This means that we consider perturbations to the strain field $\varepsilon_0 ({\bf x})$ of the fractional gradient elasticity, which are caused by weak {nonlinearity} effects. In this case, equation (\ref{eq-02}) is an approximation of the zero order. The first order approximation with respect to $\eta$ gives the equation \be \label{eq-04} E \, \varepsilon_1 ({\bf x}) + c (\alpha) \, ((-\Delta)^{\alpha/2} \varepsilon_1) ({\bf x}) + K (\varepsilon_0({\bf x})) = 0 . \ee This equation is equivalent to the linear equation \be \label{eq-05} \sigma_{eff}({\bf x}) = E \, \varepsilon_1 ({\bf x}) + c (\alpha) \, ((-\Delta)^{\alpha/2} \varepsilon_1) ({\bf x}) \ee where the effective stress $\sigma_{eff} ({\bf x})$ is defined by the equation \be \label{eq-06} \sigma_{eff} ({\bf x}) = - K (\varepsilon_0({\bf x})) . \ee Equation (\ref{eq-04}) can give a particular solution in the form \be \label{Gj-3} \varepsilon ({\bf x}) = \varepsilon_0 ({\bf x}) + \varepsilon_1 ({\bf x}) = G_{n,\alpha} \, * \, \sigma + \eta \, G_{n,\alpha} \, * \, \sigma_{eff} , \ee where the symbol $*$ denotes the convolution operation defined by equation (\ref{Gj-1}). Substitution of (\ref{eq-06}) into (\ref{Gj-3}), gives \be \label{Gj-4} \varepsilon ({\bf x}) = G_{n,\alpha} \, * \, \sigma - \eta \, G_{n,\alpha} \, * \, K( G_{n,\alpha} \, * \, \sigma ) . \ee For point stress (\ref{phi-Gb}), equation (\ref{Gj-4}) can written in the form \be \label{Gj-4b} \varepsilon ({\bf x}) = \sigma_0 \, G_{n,\alpha}({\bf x}) - \eta \, \Bigl( G_{n,\alpha} \, * \, K( \sigma_0 \, G_{n,\alpha} ) \Bigr)({\bf x}) . \ee For the fractional gradient {model} that is described by the function $K$ defined by (\ref{eq-01b}), we have \be \label{Gj-4c} \varepsilon ({\bf x}) = \sigma_0 \, G_{n,\alpha}({\bf x}) - \eta \, \sigma^{\beta}_0 \, \Bigl( G_{n,\alpha} \, * \, (G_{n,\alpha})^{\beta} \Bigr) ({\bf x}) , \ee where $\beta>0$. \subsection{Perturbation by fractional gradient nonlocatity} Equilibrium value of $\varepsilon_0=const$ (where $(-\Delta)^{\alpha/2} \varepsilon_0=0$) and $\sigma({\bf x})= \sigma=const$ is defined by the condition \be \label{2eq-01} E \, \varepsilon_0 + \eta \, K(\varepsilon_0) = \sigma . \ee For the case, {where} the function $K$ is defined by Eq. (\ref{eq-01b}) with $\beta=3$, we obtain the nonlinear algebraic equation \be \label{2eq-01b} E \, \varepsilon_0 + \eta \, \varepsilon ^3_0 = \sigma . \ee For $\sigma \ne 0$, there is no solution $\varepsilon_0=0$. For $E >0$ and the weak scalar stress field $\sigma\ll \sigma_c$ with respect to the critical value {$\sigma_c = \sqrt{E / \eta}$}, there exists only one solution \be \label{2eq-02} \varepsilon_0 \approx \sigma / E . \ee For {negative stiffness materials ($E <0$)} and $\sigma=0$, we have three solutions \be \label{2eq-03} \varepsilon_0 \approx \pm \sqrt{|E| / \eta } , \quad \varepsilon_0 =0 . \ee For $\sigma < (2 \sqrt{3}/ 9) \sigma_c$, also exist three solutions. For $\sigma \gg \sigma_c$, we can neglect the first term ($E \approx 0$), \be \label{2eq-04} \eta \, \varepsilon ^3_0 \approx \sigma , \ee and {obtain} \be \label{2eq-05} \varepsilon_0 \approx (\sigma / \eta)^{1/3} =\sqrt[3]{\sigma/\eta} . \ee In any case, the equilibrium values $\varepsilon_0$ are solutions of the algebraic equation (\ref{2eq-01}). Let us consider a deviation $\varepsilon_1({\bf x})$ of the field $\varepsilon ({\bf x})$ from the equilibrium value $\varepsilon_0$. For this purpose we will seek a solution in the form \be \label{2eq-06} \varepsilon ({\bf x})= \varepsilon_0 + \varepsilon_1 ({\bf x}) . \ee In general, the stress field is not constant, i.e. $\sigma({\bf x}) \ne \sigma$. For the first {order} approximation, we have the equation \be \label{2eq-07} \sigma({\bf x}) = c (\alpha) \, ((-\Delta)^{\alpha/2} \varepsilon_1) ({\bf x}) + \Bigl( E + \eta \, K^{\prime}_{\varepsilon }(\varepsilon_0) \Bigr) \varepsilon_1 ({\bf x}) , \ee where $K^{\prime}_{\varepsilon } = \partial K(\varepsilon ) / \partial \varepsilon $. Equation (\ref{2eq-07}) is equivalent to the linear fractional differential equation \be \label{2eq-08} \sigma({\bf x}) = E_{eff} \, \varepsilon_1 ({\bf x}) + c (\alpha) \, ((-\Delta)^{\alpha/2} \varepsilon_1) ({\bf x}) \ee with the effective modulus $E_{eff}$ defined by \be E_{eff} = E + \eta \, K^{\prime}_{\varepsilon }(\varepsilon_0) . \ee For the case $K(\varepsilon )=\varepsilon^{\beta}$, we have \[ E_{eff} = E + \beta \, \eta \, \varepsilon ^{\beta-1}_0 . \] A particular solution of Eq. (\ref{2eq-08}) can be written in the form (\ref{Gj-1}), where we use $E_{eff}$ instead of $E$. For the point stress (\ref{delta-j}--\ref{Pot-2}), Eq. (\ref{Gj-4}) gives \be \label{Pot-2b} \varepsilon_1 ({\bf x}) = \frac{1}{2 \pi^2} \frac{\sigma_0}{|{\bf x}|} \, \int^{\infty}_0 \frac{E + E_{eff} + 2 c (\alpha) \, \lambda^{\alpha}}{ ( c (\alpha) \, \lambda^{\alpha}+ E ) \, ( c (\alpha) \, \lambda^{\alpha}+ E_{eff} ) } \, \sin (\lambda |{\bf x}|) \, d \lambda . \ee For the case $\alpha=2$, the field $\varepsilon_1({\bf x})$ is given by the equation \be \varepsilon_1 ({\bf x}) = \frac{\sigma_0}{4 \pi c (\alpha) \, |{\bf x}|} \, e^{ - |{\bf x}|/ r_c } , \ee where $r_c$ is defined by \be r^2_c = \frac{c (\alpha)}{ E + \eta \, K^{\prime}_{ \varepsilon }(\varepsilon_0)} . \ee It should be noted that on analogous situation exists in classical theory of electric fields. In the electrodynamics the field $\varepsilon_1({\bf x})$ describes the Coulomb potential with the Debye's screening. {For the case} $\alpha \ne 2$, we have a power-law type of screening that is described in \cite{AP2013}. The electrostatic potential for media with power-law spatial dispersion differs from the Coulomb's potential by the factor \be C_{\alpha,0} (|{\bf x}|) = \frac{2}{\pi} \, \int^{\infty}_0 \frac{ \lambda \, \sin (\lambda |{\bf x}|)}{ E_{eff} + c (\alpha) \, \lambda^{\alpha} } \, d \lambda. \ee Note that the Debye's potential differs from the Coulomb's potential by the exponential factor $C_D(|{\bf x}|) =\exp (-|{\bf x}|/r_D)$. \subsection{Fractional Laplacian of Caputo type} Fractional gradient models can be based on the Caputo fractional derivatives. Due to reasons concerning the initial and boundary conditions, it is more convenient to use the Caputo fractional derivatives. They allows us to use {simpler} boundary conditions that contain derivatives of integer order. {In fact}, the initial and boundary conditions take the same form as for integer-order differential equations. For fractional derivatives of other type (for example, the Riemann-Liouville derivatives) the boundary conditions are represented by integrals and derivatives of non-integer orders \cite{SKM,KST}. The Caputo fractional derivative is usually denoted as $ ^CD^{\alpha}_{a+}$, and it is defined by the equation \begin{equation} \label{Caputo-Diff} _a^CD^{\alpha}_x \varepsilon (x) = \frac{1}{\Gamma(n-\alpha)} \int^{x}_{a} \frac{dx' \, D^n_{x'} \varepsilon (x')}{(x-x')^{1+\alpha-n}} \end{equation} where $n-1<\alpha <n$, and $\varepsilon (x)$ is a real-valued function defined on a closed interval $[a, b]$ such that $\varepsilon (x) \in AC^1[a,b]$ or $\varepsilon (x)\in C^1[a,b]$. We define the left-sided Caputo fractional differential operator on $[a,b]$ in the form \be \label{operator-Caputo} _a^CD^{\alpha}_x[x'] \Bigl( . . . \Bigr) = \frac{1}{\Gamma(n-\alpha)} \int^x_a \frac{dx'}{(x-x')^{1+\alpha-n}} \frac{\partial^n}{\partial {x'}^n} \Bigl( . . . \Bigr) , \quad (n-1<\alpha<n) . \ee The Caputo operator defined by (\ref{operator-Caputo}) acts on real-valued functions $\varepsilon (x)\in AC^n[a,b]$ as $_a^CD^{\alpha}_x[x'] \varepsilon (x')$. We note that the Caputo operator can be represented as \be \label{NotCap} _a^CD^{\alpha}_x[x']= _aI^{n-\alpha}_x [x'] D^n[x'] , \quad (n-1<\alpha < n) . \ee where we use the left-sided Riemann-Liouville fractional integral operator that is defined as \be \label{operator-RLI} _aI^{\alpha}_x[x'] \Bigl( . . . \Bigr) =\frac{1}{\Gamma(\alpha)} \int^x_a \frac{dx'}{(x-x')^{1-\alpha}} \Bigl( . . . \Bigr) , \quad (\alpha >0) . \ee To designate that the operator given by (\ref{operator-RLI}) acts on a real-valued function $\varepsilon (x)\in L_1[a,b]$, we employ the notation $_aI^{\alpha}_x[x'] \varepsilon (x')$. Let us assume that $\varepsilon (x)$ is real-valued functions with continuous derivatives up to order $(m-1)$ on $W \subset \mathbb{R}^3$, such that their $(m-1)$ derivatives are absolutely continuous, i.e., $\varepsilon (x) \in AC^m[W]$. Then, using the notation introduced in (\ref{NotCap}), we can define the fractional Laplacian of the Caputo type \be \label{Delta-C} ^C\Delta^{\alpha}_W = \sum^3_{l=1}( ^CD^{\alpha}_W [x_l])^2. \ee In the general case, we have the inequality $(\, ^C\Delta^{\alpha}_W)^2 \ne \, ^C\Delta^{2\alpha}_W$, since $(\, ^CD^{\alpha}_x)^2 \ne \, ^CD^{2\alpha}_x$. In order to solve the corresponding governing fractional equations, we can use an explicit form of the relationship between the square of the Caputo derivative $(\, ^CD^{\alpha}_{a+})^2$ and the Caputo derivative $\, ^CD^{2\alpha}_{a+}$ of the form \be \label{Ca2} (\, ^CD^{\alpha}_{a+})^2 \varepsilon (x) = \, ^CD^{2\alpha}_{a+} \varepsilon (x) + \frac{\varepsilon^{\prime}(a)}{\Gamma(1-2\alpha)} (x-a)^{1-2\alpha} , \quad (0<\alpha \le 1) , \ee where $\alpha \ne 1/2$. Using (\ref{Ca2}), we can represent the fractional Laplacian of Caputo type as \be \label{2Lap-Lap2} \, ^C\Delta^{\alpha}_W \varepsilon ({\bf x}) = \sum^3_{k=1} \, ^CD^{2\alpha}_{x_i} \varepsilon ({\bf x}) + \sum^3_{k=1} \frac{(x_k-a_k)^{1-2\alpha} }{\Gamma(1-2\alpha)} \left( \frac{\partial \varepsilon ({\bf x})}{\partial x_k}\right)_{x_k=a_k}. \ee Note that the relation given by Eq. (\ref{Ca2}) cannot be used for $\alpha>1$. To describe {nonlinear effects within the aforementioned fractional gradient framework}, we consider the constitutive relation in the form \be \label{3eq-02} \sigma({\bf x}) = c (\alpha) \, ( \, ^C\Delta^{\alpha}_W \varepsilon ) ({\bf x}) + K[{\bf x},\varepsilon ({\bf x})] \quad (\alpha >0), \ee where we use the fractional Laplacian of the Caputo type (\ref{Delta-C}) instead of the Laplacian of the Riesz type. Let us consider {the situation for} $\sigma({\bf x})=0$ for the one-dimensional case (${\bf x} \in \mathbb{R}^1$). In this case, we have the nonlinear differential equation of order $\alpha >0$ in the form \be \label{351} (\, ^CD^{\alpha}_{a+} \varepsilon )(x) = K[x,\varepsilon (x)] \quad (\alpha > 0, \quad a \le x \le b), \ee involving the Caputo fractional derivative $^CD^{\alpha}_{a+}$ on a finite interval $[a,b]$ of the real axis $\mathbb{R}$, with the initial conditions \be \label{352} \varepsilon^{(k)}(a) = b_k, \quad b_k \in \mathbb{R}, \quad (k=0,1,2, . . ., n-1 ) . \ee In \cite{KST}, the conditions are given for a unique solution $\varepsilon (x)$ to this problem in the space $C^{\alpha,r}_{\gamma}[a, b]$ defined for $0 <\alpha < n$, $r \in \mathbb{N}$ and $0\le \gamma < 1$, by $C^{\alpha,r}_{\gamma}[a,b] = \{ \varepsilon (x) \in C^r[a,b]: \ ^CD^{\alpha}_{a+} \in C_{\gamma}[a,b]\}$. One possible way of to proceed based on reducing the problem considered to the Volterra integral equation \cite{KST}: \be \varepsilon (x) =\sum^{n-1}_{j=0} \frac{b_j}{j!} (x-a)^j + \frac{1}{\Gamma (\alpha)} \int^x_a \frac{ K[z,\varepsilon (z)] dz}{(x-z)^{1-\alpha}} , \quad (a \le x \le b) . \ee In this connection, noted that such equations with fractional Laplacian of the Caputo type can be numerically solved. In \cite{FS2001}, the Cauchy problem of the form \be \label{4423} (\, ^CD^{\alpha}_{0+}\varepsilon ) (x) = K[x, \varepsilon (x)] ,\quad (x > 0); \quad \varepsilon^{(k)}(0) = b_k , \quad (k = 0,1, . . . , n - 1) \ee with the Caputo derivative $\, ^CD^{\alpha}_{0+}$ of order $n - 1 < \alpha < n$ ($n \in \mathbb{N}$), is numerically solved by using the fixed memory principle described in Chapter 8 of \cite{Podlubny}. In \cite{DFF2004}, an algorithm for the numerical solution of (\ref{4423}), which is a generalization of the classical one-step Adams-Bashforth-Moulton scheme for first-order equations, has been suggested. \newpage \section{Towards Fractal Gradient Elasticity} \subsection{Laplacian for non-integer dimensional space} Let us {begin by giving expressions of fractal--type} differential operators for functions ${\bf u}=u_r(r)\, {\bf e}_r$ and $\varphi = \varphi(r)$ in the spherical coordinates in $\mathbb{R}^n$ for arbitrary $n$ (i.e. $n$ with integer or non-integer values $D$). As a result, we have equations of differential operators in $\mathbb{R}^n$ for continuation from integer $n$ to arbitrary non-integer $D$ in the following forms. The scalar Laplacian in non-integer dimensional space for the scalar field $\varphi=\varphi (r)$ is \be \label{S-Delta-D} ^S\Delta^{D}_r \varphi= \operatorname{Div}^{D}_r \operatorname{Grad}^{D}_{r} \varphi = \frac{\partial^2 \varphi}{\partial r^2} + \frac{D-1}{r} \, \frac{\partial \varphi}{\partial r} . \ee The vector Laplacian in non-integer dimensional space for the vector field ${\bf u}=u(r) \, {\bf e}_r$ is \be \label{V-Delta-D} ^V\Delta^{D}_r {\bf u} = \operatorname{Grad}^{D}_r \operatorname{Div}^{D}_{r} {\bf u} = \Bigl( \frac{\partial^2 u_r}{\partial r^2} + \frac{D-1}{r} \, \frac{\partial u_r}{\partial r} - \frac{D-1}{r^2} \, u_r \Bigr) \, {\bf e}_r. \ee Let us consider a case of axial symmetry for fractal materials, where the fields $\varphi(r)$ and ${\bf u}(r)=u_r(r) \, {\bf e}_r$ are also axially symmetric. Let the $z$--axis be directed along the axis of symmetry. Therefore it is convenient to use a cylindrical coordinate system. Equations for differential vector operations for cylindrical symmetry case have the following forms. The scalar Laplacian in non-integer dimensional space for the scalar field $\varphi=\varphi (r)$ is \be \label{S-Delta-DC} ^S\Delta^{D}_r \varphi= \operatorname{Div}^{D}_r \operatorname{Grad}^{D}_{r} \varphi = \frac{\partial^2 \varphi}{\partial r^2} + \frac{D-2}{r} \, \frac{\partial \varphi}{\partial r} . \ee The vector Laplacian in non-integer dimensional space for the vector field ${\bf u}=u(r) \, {\bf e}_r$ is \be \label{V-Delta-DC} ^V\Delta^{D}_r {\bf u} = \operatorname{Grad}^{D}_r \operatorname{Div}^{D}_{r} {\bf u} = \Bigl( \frac{\partial^2 u_r}{\partial r^2} + \frac{D-2}{r} \, \frac{\partial u_r}{\partial r} - \frac{D-2}{r^2} \, u_r \Bigr) \, {\bf e}_r. \ee Using the analytic continuation of Gaussian integrals the scalar Laplace operator for non-integer dimensional space has been already suggested. Specifically for a function $ \varphi = \varphi (r,\theta)$ of radial distance $r$ and related angle $\theta$ measured relative to an axis passing through the origin, the Laplacian in non-integer dimensional space proposed by Stillinger \cite{Stillinger} is \be \label{NI-1} ^{St}\Delta^{D} = \frac{1}{r^{D-1}} \frac{\partial}{\partial r} \left( r^{D-1} \,\frac{\partial}{\partial r} \right) + \frac{1}{r^2 \, \sin^{D-2} \theta} \frac{\partial}{\partial \theta} \left( \sin^{D-2} \theta \frac{\partial}{\partial \theta} \right) , \ee where $D$ is the dimension of space ($0<D <3$), and the variables $r \ge 0$, $0\le \theta \le \pi$. Note that $(\, ^{St}\Delta^{D} )^2 \ne \, ^{St}\Delta^{2D}$. If the function depends on the radial coordinate $r$ only ($\varphi =\varphi (r)$), then \be \label{NI-R} ^{St}\Delta^{D} \varphi (r)= \frac{1}{r^{D-1}} \frac{\partial}{\partial r} \left( r^{D-1} \,\frac{\partial \varphi (r)}{\partial r} \right) = \frac{\partial^2 \varphi (r)}{\partial r^2} + \frac{D-1}{r} \, \frac{\partial \varphi (r)}{\partial r} . \ee It is easy to see that the Stillinger's form of Laplacian $\, ^{St}\Delta^{D}$ for radial scalar functions $\varphi ({\bf r})=\varphi (r)$ coincides with the {above} suggested scalar Laplacian $\, ^S\Delta^{D}_r$ for this function, \be \label{NI-R-2} ^{St}\Delta^{D} \varphi (r) = \, ^S\Delta^{D} \varphi (r) . \ee The Stillinger's Laplacian can be applied only for scalar fields and it cannot be used to describe vector fields ${\bf u}=u_r(r) \, {\bf e}_r$ because Stillinger's Laplacian for $D=3$ is not equal to the usual vector Laplacian for $\mathbb{R}^3$, \be ^{St}\Delta^{3} {\bf u}(r) \ne \, \Delta {\bf u}(r) = \Bigl( \frac{\partial^2 u_r}{\partial r^2} + \frac{2}{r} \, \frac{\partial u_r}{\partial r} - \frac{2}{r^2} \, u_r \Bigr) \, {\bf e}_r . \ee For the vector fields ${\bf u}=u_r(r) \, {\bf e}_r$, we should use the vector Laplace operators (\ref{V-Delta-D}) and (\ref{V-Delta-D}). Note that the gradient, divergence, curl operators and vector Laplacian are not considered in Stillinger's \cite{Stillinger} In \cite{CNSNS2015}, the scalar and vector Laplace operators for the case $d \ne D-1$ and the fields $\varphi=\varphi (r)$ and ${\bf u}=u(r) \, {\bf e}_r$, are defined by the equations \be ^S\Delta^{D,d}_r \varphi= \operatorname{Div}^{D,d}_r \operatorname{Grad}^{D,d}_{r} \varphi , \quad ^V\Delta^{D,d}_r {\bf u} = \operatorname{Grad}^{D,d}_r \operatorname{Div}^{D,d}_{r} {\bf u} . \ee Then, the scalar Laplacian for $d \ne D-1$ for the field $\varphi=\varphi (r)$ is \be \label{S-Delta-Dd} ^S\Delta^{D,d}_r \varphi= \frac{\Gamma ((d+\alpha_r)/2) \, \Gamma (\alpha_r/2)}{ \pi^{\alpha_r-1/2} \, \Gamma ((d+1)/2)} \Bigl( \frac{1}{r^{2 \alpha_r-2}} \, \frac{\partial^2 \varphi}{\partial r^2} + \frac{d+1-\alpha_r}{r^{2\alpha_r-1}} \, \frac{\partial \varphi}{\partial r} \Bigr) , \ee and the vector Laplacian for $d \ne D-1$ for the field ${\bf u}=u(r) \, {\bf e}_r$ is \be \label{V-Delta-Dd} ^V\Delta^{D,d}_r {\bf u} = \frac{\Gamma ((d+\alpha_r)/2) \, \Gamma (\alpha_r/2)}{ \pi^{\alpha_r-1/2} \, \Gamma ((d+1)/2)} \Bigl( \frac{1}{r^{2 \alpha_r-2}} \, \frac{\partial^2 u_r }{\partial r^2} + \frac{d+1-\alpha_r}{r^{2\alpha_r-1}} \, \frac{\partial u_r }{\partial r} - \frac{d - \alpha_r}{r^{2\alpha_r}} \, u_r \Bigr) \, {\bf e}_r . \ee The vector differential operators and the Laplacian operator for non-integer dimensional space \cite{CNSNS2015} allow us to describe complex fractal materials with fractal dimensions $D$ for the interior region and $d$ for its boundary surface ($d \ne D-1$). \subsection{Strain and stress in non-integer dimensional space} Any deformation can be represented as the sum of a pure shear and a hydrostatic {component}. To do this for fractal materials, we can use the identity \be \label{dii-D} \varepsilon_{kl} = \Bigl( \varepsilon_{kl} - \frac{1}{D} \delta_{kl} \, \varepsilon_{ii} \Bigr) + \frac{1}{D} \delta_{kl} \, \varepsilon_{ii} . \ee The first term on the right is a pure shear, since the sum of diagonal terms is zero. Here we use the equation $\delta_{ii}=D$ for non-integer dimensional space (for details see Property 4 in Section 4.3 of \cite{Collins}). The second term is the hydrostatic component. For $D=3$, equation (\ref{dii-D}) has the well-known form \be \varepsilon_{kl} = \Bigl( \varepsilon_{kl} - \frac{1}{3} \delta_{kl} \, \varepsilon_{ii} \Bigr) + \frac{1}{3} \delta_{kl} \, \varepsilon_{ii} , \ee where $\delta_{ii}=3$ is used. The stress tensor can then be represented (Hooke's law of classical elasticity) as \be \label{eq182} \sigma_{kl} = K \, \varepsilon_{ii} \, \delta_{kl} + 2 \mu \, \Bigl( \varepsilon_{kl} - \frac{1}{D} \delta_{kl} \, \varepsilon_{ii} \Bigr) , \ee where the bulk modulus $K$ is related to the Lame coefficients $(\lambda,\mu)$ by \be K= \lambda + \frac{2 \, \mu}{D} . \ee Under the hydrostatic compression, the stress tensor is \be \sigma_{kl} = - p \, \delta_{kl} . \ee Hence we have \be \sigma_{kk} =- p \, D . \ee {which, in view of} (\ref{eq182}), gives \be \sigma_{ii} = (\lambda \, D + 2\, \mu) \, \varepsilon_{ii} . \ee The radial component of the strain tensor is \be \label{21a} \varepsilon_{rr} = \frac{\partial u_r}{\partial r} = ({\bf e}_r,\operatorname{Grad}^{D}_r u_r) . \ee Using $\operatorname{Div}^D_r$ \cite{CNSNS2015}, and the trace of the strain tensor \be \label{21b} e (r) = Tr[\varepsilon_{kl}] = \varepsilon_{kk} = \operatorname{Div}^D_r {\bf u} = \frac{\partial u_r}{\partial r} + \frac{D-1}{r} \, u_r \, , \ee we can consider \be e(r) - \varepsilon_{rr}(r)= \operatorname{Div}^D_r {\bf u} - ({\bf e}_r,\operatorname{Grad}^{D}_r u_r) = \frac{D-1}{r} \, u_r \, , \ee as a sum of the angular diagonal components in spherical coordinates of the strain tensor. For $D=3$, we have the well-known {result} \be \varepsilon_{\theta \theta} + \varepsilon_{\varphi \varphi} = \frac{2}{r} \, u_r .\ee When we consider the fractal medium distributed in three-dimensional space we can define the effective value of the diagonal angular components of the strain tensor, as \be \label{Eeff} \varepsilon^{eff}_{\theta \theta} = \varepsilon^{eff}_{\varphi \varphi} = \frac{D-1}{2 r} \, u_r . \ee Using (\ref{21a}) and (\ref{21b}), the components of the stress tensor $\sigma_{kl}=\sigma_{kl}(r)$ in spherical coordinates {are given below, starting from the radial component} $\sigma_{rr}$ : \be \label{sigma-rr} \sigma_{rr}(r) = 2 \, \mu \, \varepsilon_{rr}(r) + \lambda \, e(r) = (2\, \mu + \lambda) \, \frac{\partial u_r}{\partial r} + \lambda \, \frac{D-1}{r} \, u_r . \ee {To deduce appropriate expressions for the fractal counterpart of} the diagonal angular components, we first note that for $D=3$ in spherical coordinates, they are given by the familiar relations \be \sigma_{\theta \theta} (r) = 2 \, \mu \, \varepsilon_{\theta \theta}(r) + \lambda \, e(r) , \quad \sigma_{\varphi \varphi} (r) = 2 \, \mu \, \varepsilon_{\varphi \varphi}(r) + \lambda \, e(r) . \ee For the fractal medium distributed in three-dimensional space we can define the effective value of the diagonal angular components of the stress tensor \be \sigma^{eff}_{\theta \theta} (r) = 2 \, \mu \, \varepsilon^{eff}_{\theta \theta}(r) + \lambda \, e(r) , \ee \be \sigma^{eff}_{\varphi \varphi} (r) = 2 \, \mu \, \varepsilon^{eff}_{\varphi \varphi}(r) + \lambda \, e(r) . \ee Using the form for the effective components (\ref{Eeff}), we obtain \be \label{sigma-eff} \sigma^{eff}_{\theta \theta} (r) = \sigma^{eff}_{\varphi \varphi} (r) = \lambda \, \frac{\partial u_r}{\partial r} + (\lambda + \mu) \, \frac{D-1}{r} \, u_r . \ee This equation define the diagonal angular components of the stress tensor in spherical coordinates. \subsection{Gradient elasticity model for fractal materials} The standard linear elastic constitutive relation for the isotropic case is the well-known Hooke's law -- given by (\ref{eq182}) with $D=3$ -- written here in the alternative form, as \be \label{H-0b} \sigma_{ij} = \lambda \varepsilon_{kk} \delta_{ij} + 2 \mu \varepsilon_{ij} , \ee where $\lambda$ and $\mu$ are the Lame constants. The corresponding governing equation for the displacement vector field ${\bf u}={\bf u}({\bf r},t)$, reads \be \label{EL-1} \lambda \, \operatorname{grad} \operatorname{div} {\bf u} + 2 \mu \, \Delta \, {\bf u} + {\bf f} = \rho \, D^2_t {\bf u} , \ee where ${\bf f}={\bf f}({\bf r},t)$ is an external body force field, and $\rho$ denotes the density of the material.\\ If the deformation in the material is described by ${\bf u}({\bf r},t) = u(r,t) \, {\bf e}_r$, then equation (\ref{EL-1}) has the form \be \label{EL-2} (\lambda + 2 \mu ) \, \Delta \, {\bf u}(r,t) + {\bf f}(r,t) = \rho \, D^2_t {\bf u} (r,t) . \ee Using the non-integer dimensional vector calculus \cite{CNSNS2015}, {we can now suggest a fractal} generalization of equations (\ref{EL-2}) for elastic materials in non-integer dimensional space, where the displacement vector ${\bf u}={\bf u}(r,t)$, does not depend on the angular coordinate. It reads \be \label{VL-1Dd} (\lambda+2 \mu ) \, \Bigl( 1 \pm l^2_s(D,d) \, ^V\Delta^{D,d}_r \Bigr) \, ^V\Delta^{D,d}_r \,{\bf u} +{\bf f} = \rho \, D^2_t {\bf u} . \ee where $^V\Delta^{D,d}_r {\bf u}$ is the vector Laplacian for $d \ne D-1$ for the {spherically symmetric} field ${\bf u}=u(r) \, {\bf e}_r$ that is defined by the equation \be \label{V-Delta-Dd2} ^V\Delta^{D,d}_r {\bf u} = \frac{\Gamma ((d+\alpha_r)/2) \, \Gamma (\alpha_r/2)}{ \pi^{\alpha_r-1/2} \, \Gamma ((d+1)/2)} \Bigl( \frac{1}{r^{2 \alpha_r-2}} \, \frac{\partial^2 u_r }{\partial r^2} + \frac{d+1-\alpha_r}{r^{2\alpha_r-1}} \, \frac{\partial u_r }{\partial r} - \frac{d \, \alpha_r}{r^{2\alpha_r}} \, u_r \Bigr) \, {\bf e}_r . \ee with $\alpha_r=D-d$. The vector differential operator (\ref{V-Delta-Dd2}) allow us to describe complex fractal materials with boundary dimension $d \ne D-1$. {Similarly}, we can consider the cylindrical symmetry case for $d \ne D-1$. For fractal materials with $d=D-1$ equation (\ref{VL-1Dd}) has the form \be \label{F-1} (\lambda+2 \mu ) \, ^V\Delta^{D}_r \,{\bf u}(r,t) +{\bf f}(r,t) = \rho \, D^2_t {\bf u} (r,t) , \ee where $^V\Delta^{D}_r$ is defined by (\ref{V-Delta-D}). In the next sections we consider the case $d=D-1$ for {simplicity}. \subsection{Fractal gradient elasticity for $d=D-1$ and spherical symmetry} Let us assume that the displacement vector ${\bf u}$ is everywhere radial and it is a function of $r=|{\bf r}|$ alone ($u_k=u_k(|{\bf r}|,t)$). Using a continuum model with non-integer dimensional space, a fractal generalization of gradient elasticity equations for this case, where the displacement vector ${\bf u}={\bf u}(r,t)$, does not depend on the {angular coordinate}, has the form \be \label{VL-1} (\lambda+2 \mu ) \, \Bigl( 1 \pm l^2_s(D) \, ^V\Delta^{D}_r \Bigr) \, ^V\Delta^{D}_r \,{\bf u} +{\bf f} = \rho \, D^2_t {\bf u} . \ee This is the gradient elasticity equation for homogenous and isotropic fractal materials with the spherical symmetry. Let us consider equation (\ref{VL-1}) for static case ($D^2_t {\bf u}=0$) with a minus in front of Laplacian, i.e. the GRADELA model for fractal materials \be \label{VL-2} (\lambda+2 \mu ) \, \Bigl( 1 - l^2_s(D) \, ^V\Delta^{D}_r \Bigr) \, ^V\Delta^{D}_r \,{\bf u} + {\bf f} = 0 . \ee We can rewrite this equation as \be \label{VL-3} (\, ^V\Delta^{D}_r )^2 \,{\bf u} - l^{-2}_s(D) \, ^V\Delta^{D}_r \,{\bf u} - (\lambda+2 \mu)^{-1} \, l^{-2}_s(D) \, {\bf f} = 0 . \ee For spherical symmetry {and} $d=D-1$, the vector Laplacian for non-integer dimensional space has the form \cite{CNSNS2015} \be \label{VL-4} ^V\Delta^{D}_r {\bf u}(r) = \Bigl( \frac{\partial^2 u_r(r)}{\partial r^2} + \frac{D-1}{r} \, \frac{\partial u_r(r)}{\partial r} - \frac{D-1}{r^2} \, u_r(r) \Bigr) \, {\bf e}_r , \ee where we assume that the displacement vector is ${\bf u}({\bf r})=u_r(r) {\bf e}_r$. For non-fractal materials {in the three--dimensional space}, we should use equation (\ref{VL-4}) with $D=3$. Equation (\ref{VL-4}) gives \[ (\, ^V\Delta^{D}_r)^2 {\bf u}(r) = \Bigl( \frac{\partial^4 u_r(r)}{\partial r^4} + \frac{2(D-1)}{r} \, \frac{\partial^3 u_r(r)}{\partial r^3} + \] \be \label{VL-5} + \frac{(D-1)(D-5)}{r^2} \, \frac{\partial^2 u_r(r)}{\partial r^2} - \frac{3(D-1)(D-3)}{r^3} \, \frac{\partial u_r(r)}{\partial r} + \frac{3(D-1)(D-3)}{r^4} \, u_r(r) \Bigr) \, {\bf e}_r . \ee Substitution of expressions (\ref{VL-4})- \ref{VL-5}) and ${\bf f}(r)=f(r) \, {\bf e}_r$ into equation (\ref{VL-3}) gives \[ \frac{\partial^4 u_r(r)}{\partial r^4} + \frac{2(D-1)}{r} \, \frac{\partial^3 u_r(r)}{\partial r^3} + \left(\frac{(D-1)(D-5)}{r^2} - l^{-2}_s(D) \right) \, \frac{\partial^2 u_r(r)}{\partial r^2} - \] \[ - \left( \frac{3(D-1)(D-3)}{r^3} + l^{-2}_s(D) \frac{D-1}{r}\right) \, \frac{\partial u_r(r)}{\partial r} + \] \be \label{EM-9} + \left( \frac{3(D-1)(D-3)}{r^4} + l^{-2}_s(D) \frac{D-1}{r^2}\right) \, u_r(r) - (\lambda+2 \mu)^{-1} \, l^{-2}_s(D) \, f(r) = 0. \ee The general solution for the case $f(r)=0$ is \be u_r(r) = C_1 \, r + C_2 r^{1-D} - C_3 \, I_I(D,r) - C_4 \, I_K(D,r) , \ee where $I_I(D,r)$ and $I_K(D,r)$ are the integrals of Bessel functions, as follows: \be \label{IID} I_I(D,r) = D\, r\, \int dr \, r^{-D-1} \int dr \, r^{D/2+1} I_{D/2}(r/l_s(D)) , \ee \be \label{IKD} I_K(D,r) = D\, r\, \int dr \, r^{-D-1} \int dr \, r^{D/2+1} K_{D/2}(r/l_s(D)) , \ee where $I_{\alpha}(x)$ and $K_{\alpha}(x)$ are Bessel functions of the first and second kinds. \subsection{Fractal gradient elasticity for $d=D-1$ and cylindrical symmetry} For cylindrical symmetry {and} $d=D-1$, the vector Laplacian for non-integer dimensional space has the form \cite{CNSNS2015} \be \label{VL-4c} ^V\Delta^{D}_r {\bf u}(r) = \Bigl( \frac{\partial^2 u_r(r)}{\partial r^2} + \frac{D-2}{r} \, \frac{\partial u_r(r)}{\partial r} - \frac{D-2}{r^2} \, u_r(r) \Bigr) \, {\bf e}_r . \ee Equation (\ref{VL-4c}) gives \[ (\, ^V\Delta^{D}_r)^2 {\bf u}(r) = \Bigl( \frac{\partial^4 u_r(r)}{\partial r^4} + \frac{2(D-2)}{r} \, \frac{\partial^3 u_r(r)}{\partial r^3} + \] \be \label{VL-5c} + \frac{(D-2)(D-6)}{r^2} \, \frac{\partial^2 u_r(r)}{\partial r^2} - \frac{3(D-2)(D-4)}{r^3} \, \frac{\partial u_r(r)}{\partial r} + \frac{3(D-2)(D-4)}{r^4} \, u_r(r) \Bigr) \, {\bf e}_r . \ee Substitution of expressions (\ref{VL-4c})- \ref{VL-5c}) and ${\bf f}(r)=f(r) \, {\bf e}_r$ into equation (\ref{VL-3}) gives \[ \frac{\partial^4 u_r(r)}{\partial r^4} + \frac{2(D-2)}{r} \, \frac{\partial^3 u_r(r)}{\partial r^3} + \left(\frac{(D-2)(D-6)}{r^2} - l^{-2}_s(D) \right) \, \frac{\partial^2 u_r(r)}{\partial r^2} - \] \[ - \left( \frac{3(D-2)(D-4)}{r^3} + l^{-2}_s(D) \frac{D-2}{r}\right) \, \frac{\partial u_r(r)}{\partial r} + \] \be \label{EM-9c} + \left( \frac{3(D-2)(D-4)}{r^4} + l^{-2}_s(D) \frac{D-2}{r^2}\right) \, u_r(r) - (\lambda+2 \mu)^{-1} \, l^{-2}_s(D) \, f(r) = 0. \ee The general solution for the case $f(r)=0$ is \be u_r(r) = C_1 \, r + C_2 r^{2-D} - C_3 \, I_I(D-1,r) - C_4 \, I_K(D-1,r) , \ee where $I_I(D-1,r)$ and $I_K(D-1,r)$ are defined by equations (\ref{IID}) and (\ref{IKD}). \newpage \section{Conclusions} We proposed (Section 2) a fractional-order generalization of three-dimensional continuum gradient elasticity models by assuming weak non-locality of power-law type {that results to} constitutive relations with fractional Laplacian terms. A three-dimensional constitutive {equation} for fractional gradient elasticity is derived from integer-order integral relations for nonlocal {elasticity} using a fractional Taylor series {expansion} in the wave-vector space. The suggested fractional constitutive relations can be connected with {microscopic atomistic--type models} with long--range interactions, {formulated} based on lattice with long-range interactions, that can be formulated by using fractional-order differential and integral operators on physical lattices, as suggested in \cite{JPA2014}--\cite{CMA2017}. {Fractional generalizations of gradient models with nonlinearity, employing fractional order Laplace operators of the Riesz and Caputo types, are also considered (Section 3) for} we consider plasticity of non-local continua with weak nonlocality of power-law type. Using the perturbation method, we obtain corrections to {linearized} constitutive relations {associated with} weak deviations from elasticity, {as well as with} fractional gradient non-locality. We assume that such fractional gradient models can be described by the fractional variational principle suggested in \cite{TA2015,PJMI2015}. {Finally, we propose (Section 4)} models of gradient elasticity for fractal materials by using vector the calculus on non-integer dimensional spaces recently suggested in \cite{CNSNS2015,JMP2014,CRM2015}. {We consider applications for fractal gradient elasticity theory for axially symmetric problems in spherical and cylindrical coordinates. Although the proposed models may not capture all features of underlying material fractality, the suggested vector calculus on non-integer dimensional spaces may enable us to derive concrete results to be checked with experiments commonly employed for characterization of standard (non-fractal) material response. This task is facilitated by the fact that the governing equations to be solved for fractal gradient elastic materials in `non-integer' space, are differential equations with derivatives of `integer' order, as the case of non-fractal media. Solutions to typical problems for both cases $d=D-1$ and $D\ne d-1$ will be given in the future. These will generalize some results already obtained for fractal elasticity \cite{CRM2015}. In \cite{RA1993} an operator split method (the Ru--Aifantis theorem) has been used to obtain solutions to gradient elasticity in terms of solutions of corresponding problems in classical elasticity \cite{AA2011,AifantisILG,AMA2008}. A generalization of the Ru--Aifantis operator split method can be used to solve boundary value problems for fractal gradient elasticity by using the solution for fractal non-gradient elasticity given in \cite{CRM2015}. Such an extension of the Ru--Aifantis operator split method to fractional/fractal elasticity has been illustrated in \cite{TA2015}. Nonlinear elasticity and plasticity effects within a fractal formulation based on non-integer space can also be considered in a similar way}. \section*{Acknowledgement} Support of the Ministry of Education and Science of Russian Federation under grant no. 14.Z50.31.0039 is acknowledged. \newpage
\section{Introduction}\label{sec:intro} Boolean functions are very important building blocks in cryptology, learning theory and coding theory. Different properties of Boolean functions can be well understood by different spectra; specifically, Walsh and autocorrelation spectra are two most important tools for cryptographic purposes. For a Boolean function $f()$, these spectra can be thought as the list of all values of the Walsh transform and autocorrelation transform, respectively, of $f()$. We use Walsh coefficients and autocorrelation coefficients to indicate the individual values in those spectra. Shannon related these spectra to confusion and diffusion of cryptosystems long ago~\cite{Shannon:2001:MTC:584091.584093}. Confusion of a Boolean function used in a cryptosystem can be characterized by a Walsh spectrum with low absolute values -- such functions are known to resist linear cryptanalysis\cite{chabaud1994links}; similarly, functions with less diffusion (high absolute value in the autocorrelation spectrum) may make a cryptosystem vulnerable against differential attacks (see for example ~\cite{DBLP:journals/tit/TangM18} and the references therein). Walsh spectrum (often referred to as Fourier spectra for Boolean functions) has been shown to be useful for learning Boolean functions as well~\cite{Mansour1994}. Analyzing these spectra and designing functions with specific spectral properties are therefore important tasks. This problem becomes challenging for large functions. Such large functions may arise while modelling a complete stream or block cipher as a Boolean function with number of inputs equal to the key size in bits. Modelling such a complicated Boolean function by analysing the spectra is clearly elusive~\cite{DBLP:journals/dcc/SarkarMB17}. In classical domain, for an $n$-input 1-output Boolean function, generation of complete Walsh or autocorrelation spectrum requires $O(2^n)$ space and $O(n2^n)$ time. Needless to mention that for analysing a cipher or learning a Boolean function, it is easier to locate the points if there are high coefficients in a spectrum. Thus it makes sense to design techniques for sampling points with high coefficients and estimate the high coefficients in which a Boolean function can be used only as a black-box. The motivation in cipher design is to obtain a Boolean function for which the maximum absolute value in both the spectra is minimized (for autocorrelation we consider non-zero points only). While there are many such examples and constructions of such functions in literature related to combinatorics, cryptography and coding theory, such Boolean functions are not implemented in a straightforward manner such as simple circuits or truth/look-up tables. This is because it is very hard to implement a complex Boolean function on large number of variables (say 160) in this manner due to exponential circuit size. For example, in stream cipher (one may also consider the specific example of Grain v1~\cite{Grain_h_function}), LFSR/NFSRs (Linear/Nonlinear Feedback Shift Registers) are used. The secret key (say 80 bits) and the public IV (Initialization Vector, say 80 bits again) are loaded in the initial state. Then the initial state is evolved as a Deterministic Finite Automaton for many (say 160 or 200) steps. The output bit is generated by combining some selected bits (say 15) from the LFSR/NFSRs. Then we start generating the output bits which is used as key stream bits for cryptographic purposes. Now if you consider the initial key and IV as the inputs to a Boolean function and the key stream bit at any instance as an output, this is a Boolean function with 160 input bits and one output bit. Modelling such a complicated Boolean function by analysing the spectra is practically not possible. For more details, one may refer to~\cite{DBLP:journals/dcc/SarkarMB17}. However, if the complete circuit can be implemented in quantum paradigm, then one may have much better efficiency in mounting the attacks. The situation is well settled for the Walsh spectrum. Walsh spectrum of a function $f:\{0,1\}^n \to \{0,1\}$ is defined as the following function~\footnote{\label{foot:1}The normalization factor used depends upon the application but has no bearing on properties of interest.} from $\{0,1\}^n$ to $\mathbb{R}[-1, 1]$ in which $x \cdot y$ stands for the $0-1$ valued expression \smallskip $\oplus_{i=1 \ldots n} x_i y_i$:\\ \centerline{$\displaystyle\mbox{for $y \in \{0,1\}^n$,\quad} \hat{f}(y) = \frac{1}{2^n} \sum_{x \in \{0,1\}^n} (-1)^{f(x)} (-1)^{y \cdot x}$} \smallskip \begin{figure} \centering \includegraphics[width=0.4\linewidth]{BVAlgo.png} \caption{Circuit for Deutsch-Jozsa algorithm (without measurement)\label{fig:DJ}} \end{figure} The Deutsch-Jozsa algorithm~\cite{Deutsch1992}, even though usually described as solving a different problem, makes only {\em one} query to $U_f$ (a standard unitary implementation of $f()$) and at the end, puts the second register in the state $\ket{1}$ and the first register in the state $\sum_{z \in \Ftwo{n}} \hat{f}(z) \ket{z}$; the quantum circuit for the same is illustrated in Figure~\ref{fig:DJ}. Measuring the second register in the standard basis generates a state $\ket{z}$ with probability $\hat{f}(z)^2$. Note that Walsh coefficients do satisfy $\sum_z \hat{f}(z)^2 = 1$ (this is due to Parseval's theorem); thus the Deutsch-Jozsa algorithm can be considered as an efficient sampling algorithm for Walsh coefficients~\cite{maitra2005deutsch}. So if one can implement a stream cipher (a Boolean function) as a quantum oracle~\cite{QuantumAES2016}, then it is possible to sample high points in a Walsh spectrum in constant time with linear number of gates and that enables us to answer several questions related to the spectrum~\cite{Xie2018}. In contrast to the Walsh spectrum, the autocorrelation spectrum is less studied. It is defined as the following transformation~\footnotemark[\value{footnote}] from $\{0,1\}^n$ to $\mathbb{R}[-1, 1]$.\\ \centerline{$\displaystyle \mbox{for $a \in \{0,1\}^n$, \quad} f^{\!\alpha}(a) = \frac{1}{2^n} \sum_{x \in \{0,1\}^n} (-1)^{f(x)} (-1)^{f(x \oplus a)}$} \smallskip The entire autocorrelation spectrum can be obtained by first computing the Walsh spectrum (using the well-known ``fast Walsh-Hadamard transform'' algorithm), then squaring each of the coefficients, and finally applying the same transform once more on this squared spectrum. This approach requires $2^n$ many calls to $f()$, $n2^n$ other operations and space complexity of $2^n$. However, a question remains that {\em what} can be found out about the autocorrelation spectrum in $o(2^n)$, preferably polynomial, time. \begin{itemize} \item Especially, can we identify the points with high coefficients? \item Can we estimate a particular coefficient? \end{itemize} Counting and sampling often go hand-in-hand, so one would also like to sample from a distribution proportional to the coefficients. It should be noted that $\sum_a f^{\!\alpha}(a)^2 \in [1,2^n]$ unlike Walsh coefficients, therefore, it appears difficult to get a quantum sampling algorithm like Deutsch-Jozsa as an immediate corollary. The quantum algorithms we propose in this paper address these questions. Naturally, in terms of autocorrelation spectrum, such algorithms will be able to expose the weaknesses of a Boolean function (used in a cryptographic primitive) better than the classical approaches. There are quite a few important research results related to quantum cryptanalysis of symmetric ciphers~\cite{DBLP:conf/crypto/KaplanLLN16,DBLP:journals/tosc/KaplanLLN16,DBLP:conf/asiacrypt/ChaillouxNS17}. A recent work~\cite{DBLP:conf/asiacrypt/Leander017} in this direction considered merging the ideas from Grover's~\cite{Grover1998} and Simon's~\cite{Brassard1997} algorithms. However, there has been no specific attempt to solve concrete problems related to the autocorrelation spectrum. This we present in this paper. One of the ideas used by us is that of amplitude amplification which is the underlying engine behind Grover's algorithms. However, our approach is very different from that of Simon's algorithm even though it is tempting to use this algorithm since $f^{\!\alpha}(a)=1$ iff $f(x) = f(x \oplus a)$ for all $x$ and the latter is one of main promises held by $f$ in the Simon's problem. First, another condition on $f$, i.e., if $f(x) = f(y)$ then $x=y \oplus a$, may not necessarily hold for 1-bit functions and secondly, Simon's algorithm is specifically designed for finding any such $a$ and not sampling according to a distribution proportional to $f^{\!\alpha}(a)$. Another important measure related to autocorrelation spectrum is the sum-of-squares indicator. Naturally it is better if this value is low. \begin{definition}[Sum-of-squares indicator]\label{defn:s_f} The sum-of-squares indicator for the characteristic of $f$ is defined as $$\sigma_f = \sum_{a \in \Ftwo{n}} f^{\!\alpha}(a)^2$$ \end{definition} It is known that $1 \le \sigma_f \le 2^n$. In particular, $\sigma_f=1$ if $f$ is a Bent function and $\sigma_f=2^n$ if $f$ is a linear function. A small $\sigma_f$ indicates that a function satisfies the {\em global avalanche criteria} (GAC). \subsection{Outline} The results in this paper answer the questions of sampling and estimation that were raised above. In Section~\ref{sec:derv-sampling} we present a generalization of the Deutsch-Jozsa problem that we name as ``Higher-order Deutsch-Jozsa''(HoDJ), which is related to the derivatives of a Boolean function. Higher-order derivatives capture the correlation among multiple output values of the same function and is important for constructing cryptographic hash functions that are resistant to linear attack, differential attack, cube attack, etc. We then discuss a quantum algorithm whose output is a random sample from a distribution that is proportional to the Walsh coefficients of any specific higher-order derivative. For $k$-th order derivative, the algorithm uses only $n+1$ {\em additional} qubits, makes $2^k$ calls to the function and uses altogether $O(n2^k)$ gates that is a meagre fraction compared to the usual exponential (in $n$) time and space complexity seen in classical algorithms. The first-order derivative is also known as the autocorrelation spectrum so this sampling algorithm can be used to generate samples according to the distribution of the {\em Walsh coefficients} of the autocorrelation coefficients. By making a subtle observation, we show how to actually sample according to the autocorrelation spectrum itself. We are not aware of any classical sampling algorithm for the autocorrelation spectrum and the only algorithm known for generating the entire spectrum, which involves computing Walsh transformation twice and is no doubt an overkill for the task of sampling, incurs $\Theta(2^n)$ space complexity and $\Theta(n2^n)$ time complexity. In comparison to it, our quantum algorithm has $O\left( n\tfrac{2^{n/2}}{\sqrt{\sigma_f}} \log \tfrac{1}{\delta} \right)$ time complexity (exhibiting a quadratic speedup) and $2n+1$ space complexity; here $\delta$ indicates the probability of failure. If $\sigma_f$ is not too small, say $\tfrac{2^n}{poly(n)}$, then the time complexity shows an exponential speedup over the classical one. We explain this algorithm for autocorrelation sampling and discuss its properties in Section~\ref{sec:sampling}. We next move on to estimating algorithms in Section~\ref{sec:estimation}. First, in Subsection~\ref{subsec:autocor-estimation} we give a quantum algorithm to estimate the autocorrelation coefficient at any given point with high accuracy, denoted $\epsilon$, and low error, denoted $\delta$. Our algorithm makes $\Theta\left( \tfrac{1}{\epsilon} \log \tfrac{1}{\delta} \right)$ calls to the function (rather, a quantum oracle for the same). This is almost square-root of the known classical complexity of $O\left( \tfrac{1}{\epsilon^2} \log \tfrac{1}{\delta} \right)$. We explain why the sampling techniques that we designed {\em cannot} be used to design an efficient estimation algorithm, and instead, design our algorithm using the idea of a ``swap-test''. Our final contribution is a quantum algorithm to estimate the sum-of-squares $\sigma_f$; this we describe in Subsection~\ref{subsec:est_s_f}. We explain that a classical sampling based approach requires $O\left( \tfrac{2^{2n}}{\epsilon^2} \log \tfrac{1}{\delta} \right)$ calls to $f$ ($\epsilon$ would generally be greater than $1$ for estimating $\sigma_f$ since $\sigma_f \in [1,2^n]$) and then describe a quantum approach that displays quadratic speedup and only makes $O\left( \tfrac{2^{n}}{\epsilon} \log \tfrac{1}{\delta} \right)$ calls. \section{Sampling from Higher-order Derivative}\label{sec:derv-sampling} Higher-order derivatives of a Boolean function was explicitly introduced, in the context of cryptanalysis, by Lai~\cite{Lai1994}. \begin{definition}[Derivative] Given a point $a \in \{0,1\}^n$, the (first-order) derivative of an $n$-bit function $f$ {\em at $a$} is defined as $$\Delta f_a(x) = f(x \oplus a) \oplus f(x)$$ For a list of points $\mathcal{A}=(a_1, a_2, \ldots, a_k)$ (where $k \le n$) the $k$-th derivative of $f$ at $(a_1,a_2, \ldots, a_k)$ is recursively defined as $$\Delta f^{(k)}_{\mathcal{A}}(x) = \Delta f_{a_k} (\Delta f_{a_1, a_2, \ldots, a_{k-1}}^{(k-1)}(x)),$$ where $\Delta f_{a_1, a_2, \ldots, a_{k-1}}^{(k-1)}(x)$ is the $(k-1)$-th derivative of $f$ at points $(a_1,a_2, \ldots, a_{k-1})$. The $0$-th derivative of $f$ is defined to be $f$ itself. \end{definition} Higher-order derivatives form the basis of many cryptographic attacks, especially those that generalize the differential attack technique against block ciphers such as Integral attack, AIDA, cube attack, zero-sum distinguisher, etc. These attacks mostly revolve around the algebraic degree of a higher-order derivative. Let $deg(f)$ denote the algebraic degree of some function $f$. It is known that $deg(\Delta f^{(i+1)}) \le deg(\Delta f^{(i)}) - 1$ and if $f$ is an $n$-bit function then $\Delta f^{(n)}$ is a constant function. Thus if a function has the degree of its $i$-th order derivative, at some $(a_1, a_2, \ldots a_i)$, to be a constant, then this fact is essentially a beacon for mounting an attack if $i \ll n$. Therefore, it is central to study the algebraic degree and other properties of higher-order derivatives, and to the best of our knowledge, we provide the first algorithms for these tasks. Specifically, we show how to efficiently sample from the Walsh-Hadamard spectrum of the $i$-th order derivative. This allows us to estimate if a higher-order derivative of $f$ is biased towards any linear function, thereby partly answering the question above since the Walsh-Hadamard transform of a linear function is constant. Despite the complicated expression for computing $\Delta f^{(k)}$, it has an equivalent expression that we shall use for our results. For any multiset $S$ of points (including $S = \emptyset$), define the notations $X_s = \bigoplus_{a \in S} a$ and $f(x \oplus S) = f(x \oplus X_s)$. In the case of $S = \emptyset$, it can be noted that $X_s$ is the empty string and hence $f(x \oplus S) = f(x)$. The $i$-th derivative of $f$ at $\mathcal{A}=(a_1,a_2, \ldots a_i)$ can be shown\footnote{The proof is present in~\cite{Lai1994}} to be $$\Delta f_{\mathcal{A}}^{(i)} (x) = \bigoplus_{S \subseteq A} f(x \oplus S)$$ where $S \subseteq A$ indicates all possible sub-lists of $\mathcal{A}$ (including duplicates, if any, in $\mathcal{A}$). For example, the second-order derivative at a pair of points $(a,b)$ can be written as $$\Delta f^{(2)}_{(a,b)} = {f(x)} \oplus {f(x \oplus a)} \oplus {f(x \oplus b)} \oplus {f(x \oplus a \oplus b)}.$$ For the sake of brevity, we will drop the superscript $(i)$ if it is clear from the list $\mathcal{A}$. Now we describe a quantum circuit that generates the Walsh-Hadamard spectrum of the $k$-derivative of an $n$-bit function $f$ at some set of points $\mathcal{A} = (a_1, a_2, \ldots a_k)$. We refer to the circuit as $HoDJ^k_n$ (``Higher-order Deutsch-Jozsa''). For calling $f$ we use the standard unitary operator $U_f : \ket{x}\ket{b} \mapsto \ket{x} \ket{b \oplus f(x)}$ where $x \in \{0,1\}^n$ and $b \in \{0,1\}$. We use $\ket{+}$ and $\ket{-}$ to denote the states $\frac{1}{\sqrt{2}}(\ket{0}+\ket{1})$ and $\frac{1}{\sqrt{2}}(\ket{0}-\ket{1})$, respectively; observe that $U_f \ket{x} \ket{+} = \ket{x} \ket{+}$ and $U_f \ket{x} \ket{-} = (-1)^{f(x)} \ket{x} \ket{-}$. The circuit for $HoDJ^k_n$ acts on $k+2$ registers, $R_1, \ldots R_k, R_{k+1}, R_{k+2}$ that are initialized as \begin{itemize} \item $R_{1}$ has one qubit that is initialized to $\ket{1}$, \item $R_2$ consists of $n$-qubits that is initialized to $\ket{0^n}$, \item and each of $R_3 \ldots R_{k+2}$ consists of $n$-qubits in which $R_{2+t}$ is initialized to $a_t$ of $\mathcal{A}$. \end{itemize} The circuit itself is a generalization of the quantum circuit for the Deutsch-Jozsa problem~\cite{Deutsch1992} and uses the ability of this circuit to generate a distribution of Walsh-Hadamard coefficients that was explained earlier. \begin{figure}[!ht] \centering\leavevmode \includegraphics[width=0.75\linewidth]{figure-hodj1.pdf} \caption{Circuit for $1^{st}$-order Walsh-Hadamard derivative sampling\label{fig:auto-sampling}} \end{figure} Figure~\ref{fig:auto-sampling} shows the quantum circuit for $HoDJ^1_n$; for this problem, $\mathcal{A}$ is a singleton set, say $\{a\}$. The evolution of the quantum state as the operators are applied is as follows: \begin{align*} \mbox{Initial State} : ~& \ket{1}\ket{0^{ n}} \ket{a}\\ \xrightarrow{H \otimes H^{n}} ~& \frac{1}{\sqrt{2^n}}\sum_x\ket{-}\ket{x}\ket{a}\\ \xrightarrow{U_f} ~& \frac{1}{\sqrt{2^n}}\sum_x{(-1)^{f(x)}\ket{-}\ket{x}}\ket{a} \\ \xrightarrow{CNOT_2^3} ~& \frac{1}{\sqrt{2^n}}\sum_x{(-1)^{f(x)}}\ket{-}\ket{x\oplus a}\ket{a}\\ \xrightarrow{U_f} ~& \frac{1}{\sqrt{2^n}}\sum_x{(-1)^{f(x)\oplus f(x\oplus a)}}\ket{-}\ket{x\oplus a}\ket{a}\\ \xrightarrow{CNOT_2^3} ~& \frac{1}{\sqrt{2^n}}\ket{-}\sum_x{(-1)^{f(x)\oplus f(x\oplus a)}}\ket{x}\ket{a}\\ \xrightarrow{H\otimes H^{n}} ~& \ket{1}\sum_y\Big[\frac{1}{2^n}\sum_x(-1)^{(x\cdot y)}(-1)^{f(x)\oplus f(x\oplus a)}\Big]\ket{y}\ket{a}\\ = ~& \ket{1} \sum_y \widehat{\Delta f_a}(y) \ket{y} \ket{a} \end{align*} Therefore, at the end of the circuit $R_2$ can be found to be in a state $\ket{y}$ with probability $\widehat{\Delta f_a}(y)^2$ thus accomplishing the objective of sampling according to the Walsh-Hadamard distribution of the 1st-order derivative of $f$. Next, an illustration of $HoDJ^2_n$ corresponding to the 2nd-order derivative is presented in Figure~\ref{fig:sampling-derivative} in which we use $\mathcal{A}=(a,b)$. We show the state of this circuit after each layer of operators. \begin{figure}[!ht] \centering\leavevmode \includegraphics[width=0.9\linewidth]{Figure_1-crop.pdf} \caption{Circuit for Walsh-Hadamard sampling of $2^{nd}$-order derivative\label{fig:sampling-derivative}} \end{figure} \begin{align*} \mbox{Initial State} :~& \ket{1}\ket{0^n}\ket{a}\ket{b}\\ \xrightarrow{H \otimes H^n}~ & \sqrtn{n} \sum_{x \in \{0,1\}^n} \ket{-}\ket{x}\ket{a,b}\\ \stackrel{U_f}{\to}~ & \sqrtn{n} \sum_x (-1)^{f(x)} \ket{-}\ket{x,a,b}\\ \xrightarrow{CNOT^3_2}~ & \sqrtn{n} \sum_x (-1)^{f(x)} \ket{-} \ket{x\oplus a}\ket{a,b}\\ \xrightarrow{U_f}~ & \sqrtn{n} \sum_x (-1)^{f(x) \oplus f(x\oplus a)} \ket{-} \ket{x\oplus a}\ket{a,b} \\ \xrightarrow[U_f]{CNOT^4_2,}~ & \sqrtn{n} \sum_x (-1)^{f(x) \oplus f(x \oplus a) \oplus f(x\oplus a \oplus b)} \ket{-} \ket{x \oplus a \oplus b} \ket{a,b}\\ \xrightarrow[U_f]{CNOT^3_2}~ & \sqrtn{n} \sum_x (-1)^{\bigoplus_{S \subseteq \{a,b\}} f(x \oplus S)} \ket{-} \ket{x \oplus b} \ket{a,b} \\ \xrightarrow{CNOT^4_2}~ & \sqrtn{n} \sum_x (-1)^{\bigoplus_{S \subseteq \{a,b\}} {f(x \oplus S)}} \ket{-} \ket{x,a,b} \\ \xrightarrow{H \otimes H^n}~ & \ket{1} \sum_y \Big[ \frac{1}{2^n} \sum_x (-1)^{x\cdot y} (-1)^{\bigoplus_{S \subseteq \{a,b\}} {f(x \oplus S)}} \Big] \ket{y} \ket{a,b} \end{align*} Measuring $R_2$ at the end will collapse it into $\ket{y}$ for some $y \in \{0,1\}^n$ with probability $\Pr[y]=\Big[ \frac{1}{2^{n}} \sum_x (-1)^{x\cdot y} \Delta f_{(a,b)}(x) \Big]^2$ $=\widehat{\Delta f_{(a,b)}}(y)^2$ that is the square of the Walsh coefficient of $\Delta f_{(a,b)}$ (2nd-order derivative function) at the point $y$. The circuit can be generalized to higher values of $k$ in a straight forward manner. The following theorem formalizes this result where we ignore the first register since that contains an ancillary qubit which is reset to its initial state at the end of the computation. For counting the number of gates, please note that each of the CNOT gates shown in Figure~\ref{fig:sampling-derivative} actually consists of $n$ 2-qubit CNOT gates applied in parallel. \begin{theorem}\label{thm:hodj} For any $\mathcal{A} = (a_1, a_2, \ldots a_k)$ such that $a_i \in \{0,1\}^n$ $\forall i$, the $HoDJ^k_n$ circuit uses $n+1$ initialized ancilla qubits, employs $k$ registers corresponding to the points in $\mathcal{A}$, makes $2^k$ calls to $U_f$, $\Theta(n2^k)$ calls to $H$ and $CNOT$ gates, has a depth of $2(2^k+1)$ and operates as follows $$\ket{0^n}\ket{a_1}\ldots\ket{a_k} \xrightarrow{HoDJ^k_n} \sum_y \widehat{\Delta f_{\mathcal{A}}}(y) \ket{y} \ket{a_1}\ldots\ket{a_k}$$ \end{theorem} \begin{proof} The circuit is a generalization of those illustrated in Figures \ref{fig:auto-sampling} and \ref{fig:sampling-derivative}. At the core is a sub-circuit that we denote by $C'$ and which acts as $$\ket{x}\ket{a_1}\ldots\ket{a_k}\ket{b} \xrightarrow{C'} \ket{x}\ket{a_1}\ldots\ket{a_k} \ket{b \oplus \Delta f_{\mathcal{A}}}(x) = \ket{x}\ket{a_1}\ldots\ket{a_k} \ket{b \oplus \bigoplus_{S \subseteq \mathcal{A}} f(x \oplus S)}$$ Construction of $C'$ uses a {\em binary reflected Gray code} (BRGC, or ``Gray code'' in short) for the set of integers $\{0, 1, \ldots, 2^k-1\}$. Such a BRGC will be a sequence of $k$-bit strings (codes) $(g_1, g_2, \ldots, g_{2^k})$ such that each $g_i$ is unique and every adjacent code differ at exactly one position. Integer $0$ is encoded by the code $0^n$ and without loss of generality, let $g_{2^k} = 0^n$. Due to the cyclic property of BRGC, $g_{1}$ must be some $k$-bit string with Hamming weight 1. $C'$ operates in $2^k$ stages. We will use $\ket{\mathcal{A}}$ as a shorthand for $\ket{a_1} \ldots \ket{a_k}$. The initial state of the qubits, before stage 1, is $\ket{x} \ket{\mathcal{A}} \ket{b}$. Observe that $\bigoplus_{S \subseteq \mathcal{A}} f(x \oplus S) = \bigoplus_{i=1}^{2^k} f(x \oplus (g_j \cdot \mathcal{A}))$ in which we used the notation $g_j \cdot \mathcal{A} = (g_j)_1 a_1 \oplus (g_j)_2 a_2 \oplus \ldots (g_j)_k a_k$ to denote a a linear combination of some of the $a_i$'s. The $j$-th stage of $C'$ creates the state $\ket{x \oplus (g_{j} \cdot \mathcal{A})} ~\ket{\mathcal{A}}~ \ket{b \oplus \bigoplus_{i=1}^{j} f(g_{i} \cdot \mathcal{A})}$ by making the following transformations. \begin{align*} & \ket{x \oplus (g_{j-1} \cdot \mathcal{A})} ~\ket{\mathcal{A}}~ \ket{b \oplus \bigoplus_{i=1}^{j-1} f(g_{i} \cdot \mathcal{A})}\\ \xrightarrow{CNOT} & \ket{x \oplus (g_{j} \cdot \mathcal{A})} ~\ket{\mathcal{A}}~ \ket{b \oplus \bigoplus_{i=1}^{j-1} f(g_{i} \cdot \mathcal{A})}\\ \xrightarrow{U_f} & \ket{x \oplus (g_{j} \cdot \mathcal{A})} ~\ket{\mathcal{A}}~ \ket{b \oplus \bigoplus_{i=1}^{j-1} f(g_{i} \cdot \mathcal{A}) \oplus f(g_j \cdot \mathcal{A})} \end{align*} The $CNOT$ operation above is justified since $g_{j-1} \cdot \mathcal{A}$ and $g_j \cdot \mathcal{A}$ are both linear combinations of some of the $a_i$'s differing by exactly one $a_t$. The $CNOT$ uses the corresponding register $\ket{a_t}$ as the control register and the first register qubit as the target register. This also holds true for stage 1 since $g_1$ has Hamming weight 1. Lastly, observe that the final state after the $2^k$-th stage matches the one specified above: $\ket{x} ~\ket{\mathcal{A}} ~\ket{b \oplus \bigoplus_{S \subseteq \mathcal{A}} f(x \oplus S)}$. It is not hard to calculate that $C'$ also makes the following transformation if $\ket{b}$ is replaced by $\ket{-}$. $$\ket{x} \ket{a_1 \ldots a_k} \ket{-} \xrightarrow{C'} (-1)^{\oplus_{S \subseteq \mathcal{A}} f(x \oplus S)} \ket{x} \ket{a_1 \ldots a_k} \ket{-} = (-1)^{\Delta f_{\mathcal{A}}(x)} \ket{x} \ket{a_1 \ldots a_k} \ket{-}$$ The circuit for $HoDJ^k_n$ is constructed as \begin{align*} ~& ~\ket{-} \ket{0^n} \ket{a_1 \ldots a_k} \\ \xrightarrow{H^n} ~& ~\sqrtn{n}\sum_x \ket{-} \ket{x} \ket{a_1 \ldots a_k} \\ \xrightarrow{C'} ~& ~\sqrtn{n}\sum_x \ket{-} (-1)^{\Delta f_{\mathcal{A}}(x)} \ket{x} \ket{a_1 \ldots a_k} = ~\ket{-} \sqrtn{n}\sum_x (-1)^{\Delta f_{\mathcal{A}}(x)} \ket{x} \ket{a_1 \ldots a_k}\\ \xrightarrow{H^n} ~& ~\ket{-} \sum_y \widehat{\Delta f_{\mathcal{A}}}(y) \ket{y} \ket{a_1 \ldots a_k} \end{align*} For computing the resource usage of $HoDJ^k_n$, observe that $C'$ is implemented above using a depth $2\cdot 2^k$ circuit and each of its stages employ one $U_f$ gate and $n$ $CNOT$ gates (that act in parallel on all the $n$ qubits of the first register and is shown as a single $CNOT$ operation above). This completes the proof of the theorem. \qed \end{proof} A quick observation is that $HoDJ^0_n$ essentially generates $\sum_y \hat{f}(y) \ket{y}$ that is exactly the same output as that of the Deutsch-Jozsa circuit and in fact, the circuit for $HoDJ^0_n$ is exactly same as that of the Deutsch-Jozsa circuit for $n$-bit functions. \section{Autocorrelation Sampling}\label{sec:sampling} In section~\ref{sec:derv-sampling} we explained how to sample from the higher order derivatives of a Boolean function. In this section we present an algorithm to sample according to a distribution that is proportional to the autocorrelation coefficients of a function; specifically, we would like to output $\ket{a}$ with probability proportional to $f^{\!\alpha}(a)^2$. We will use the technique presented in Section~\ref{sec:derv-sampling} for doing so and will use a key observation stated in this lemma. \begin{lemma}\label{lemma:auto-sampling} $f^{\!\alpha}(a) = \widehat{\Delta f^{(1)}_{a}}(0^n)$ \end{lemma} \begin{proof} LHS is equal to $\frac{1}{2^n} \sum_x (-1)^{f(x)} (-1)^{f(x\oplus a)} = \frac{1}{2^n} \sum_x \Delta f^{(1)}_{a}(x)$. Now observe that $\widehat{\Delta f^{(1)}_{a}}(0^n) = \frac{1}{2^n} \sum_x \Delta f^{(1)}_{a}(x)$ and this proves the lemma. \qed \end{proof} The circuit used in Algorithm~\ref{algo:autocor-sampling} is illustrated in Figure~\ref{fig:autocorr-sampling}. \begin{algorithm} \caption{Algorithm for autocorrelation sampling\label{algo:autocor-sampling}} \begin{algorithmic}[1] \State Start with three registers initialized as $\ket{1}$, $\ket{0^n}$, and $\ket{0^n}$. \State Apply $H^{n}$ to $R_{3}$ to generate the state $\sqrtn{n}\sum_{b \in \Ftwo{n}} \ket{1} \ket{0^{n}} \ket{b}$. \State Apply $HoDJ^1_n$ on the registers $R_1$, $R_2$ and $R_3$ to generate the state \Statex $\displaystyle\ket{\Phi} = \sqrtn{n} \ket{1} \sum_{b \in \Ftwo{n}} \sum_{y \in \Ftwo{n}} \widehat{\Delta f^{(1)}_{b}}(y) \ket{y} \ket{b}$. \State Apply fixed-point amplitude amplification~\cite{YoderFPSearch} on $\ket{\Phi}$ to amplify the probability of observing $R_2$ in the state $\ket{0}$ to $1-\delta$ for any given constant $\delta$ \State Measure $R_3$ in the standard basis and return the observed outcome \end{algorithmic} \end{algorithm} \begin{figure}[!ht] \centering\leavevmode \includegraphics[width=.8\linewidth]{ac_sampling.pdf} \caption{Circuit for autocorrelation sampling\label{fig:autocorr-sampling}} \end{figure} \begin{theorem}\label{thm:auto-sampling} The observed outcome returned by Algorithm~\ref{algo:autocor-sampling} is a random sample from the distribution $\{ f^{\!\alpha}(a)^2/\sigma_f \}_{a \in \Ftwo{n}}$ with probability at least $1-\delta$. The algorithm makes $O(\frac{2^{n/2}}{\sqrt{\sigma_f}} \log \frac{2}{\delta})$ queries to $U_f$ and uses $O(n\frac{2^{n/2}}{\sqrt{\sigma_f}} \log \frac{2}{\delta})$ gates altogether. \end{theorem} \begin{proof} We can write the final state of the circuit in Figure~\ref{fig:autocorr-sampling} as \begin{align*} \ket{\Phi} = & \sqrtn{n} \ket{1} \sum_{b \in \Ftwo{n}} \sum_{y \in \Ftwo{n}} \widehat{\Delta f^{(1)}_{b}}(y) \ket{y} \ket{b} \\ = & \ket{1} \otimes \ket{0^n} \otimes \left( \sqrtn{n} \sum_b \widehat{\Delta f_b}(0^n) \ket{b}\right) + \sum_y \ket{1} \ket{y} \otimes \left( \sqrtn{n} \sum_b \widehat{\Delta f_b}(y) \ket{b}\right)\\ = & \ket{1} \otimes \ket{0^n} \otimes \left( \sqrtn{n} \sum_b f^{\!\alpha}(b) \ket{b}\right) + \sum_y \ket{1} \ket{y} \otimes \left( \sqrtn{n} \sum_b \widehat{\Delta f_b}(y) \ket{b}\right)\\ \end{align*} Suppose we denote the normalized state $\frac{1}{\sqrt{\sigma_f}} \sum_b f^{\!\alpha}(b) \ket{b}$ by $\ket{\Phi'}$ and the state $\sqrtn{n} \sum_b \widehat{\Delta f_b}(y) \ket{b}$ by $\ket{\Phi''_y}$. Then, using Lemma \ref{lemma:auto-sampling} we can rephrase $\ket{\Phi}$ as $$ \ket{\Phi} = \sqrt{\frac{\sigma_f}{2^n}} \ket{1} \otimes \ket{0^n} \otimes \ket{\Phi'} + \sum_y \ket{1} \ket{y} \ket{\Phi'_y}$$ and the probability of observing $R_2$ in state $\ket{0^n}$ as $\sigma_f/2^n$. Fixed-point amplitude amplification will make $O(\frac{2^{n/2}}{\sqrt{\sigma_f}} \log \frac{2}{\delta})$ calls to the circuit in Figure~\ref{fig:autocorr-sampling} and ensure that the amplitude of the state $\ket{1}\ket{0^n}\ket{\Phi'}$ is at least $\sqrt{1-\delta}$. Therefore, after amplification $R_3$ will be in the state $\ket{\Phi'}$ with probability at least $1-\delta$, and when that happens, the observed state upon measuring $R_3$ would be some $\ket{b}$ with probability $f^{\!\alpha}(b)^2/\sigma_f$ --- that is, a sample from the autocorrelation distribution. The number of queries required for the whole process is the number of times that amplitude amplification calls the circuit ($O(\frac{2^{n/2}}{\sqrt{\sigma_f}} \log \frac{2}{\delta})$) multiplied by the number of calls to $U_f$ made by the circuit (which is only two). The total number of gates involved is also obtained in a similar manner along with the observation that the circuit uses $\Theta(n)$ which is evident from Figure~\ref{fig:autocorr-sampling}. \qed \end{proof} \section{Estimation Algorithms}\label{sec:estimation} The main problem here is to estimate, with high accuracy and small error (if any), important functions of an autocorrelation spectrum. For these algorithms we use the quantum technique of amplitude estimation. We use a particular version that was recently presented for estimating the probability of ``success'' of a quantum circuit (where success corresponds to the output state of the circuit to be in a certain subspace) with additive accuracy. \begin{lemma}[\cite{bera2019error}\label{lemma:ampest}] Let $\mathcal{A}$ be a quantum circuit without any measurement and let $p$ denote the probability of observing its output state in a particular subspace. There is a quantum algorithm that makes a total of $\Theta(\frac{\pi}{\epsilon}\log\frac{1}{\delta})$ calls to (controlled)-$\mathcal{A}$ and returns an estimate $\tilde{p}$ such that, $$\Pr[\tilde{p} - \epsilon \le p \le \tilde{p} + \epsilon] \ge 1-\delta$$ for any accuracy $\epsilon \le \tfrac{1}{4}$ and error $\delta < 1$. \end{lemma} \subsection{Autocorrelation Estimation}\label{subsec:autocor-estimation} The objective of this section is to estimate the value of $|f^{\!\alpha}(a)|$ for any particular $a \in \{0,1\}^n$; this is identical to estimating $|f^{\!\alpha}(a)|^2$. First, observe that $f^{\!\alpha}(a) = \frac{1}{2^n} \sum_x (-1)^{f(x)} (-1)^{f(x \oplus a)} = \mathbb{E}_x[X_x]$ where the $\pm1$-valued random variable $X_x = (-1)^{f(x) \oplus f(x \oplus a)}$ is defined for $x$ chosen uniformly at random from $\{0,1\}^n$. Therefore, the number of samples needed if we were to classically estimate $f^{\!\alpha}(a)$ with accuracy $\epsilon$ and error $\delta$ is $O(\frac{1}{\epsilon^2}\log\frac{1}{\delta})$. The quantum circuit in Figure~\ref{fig:autocorr-sampling} can also be used to estimate $|f^{\!\alpha}(a)|$, rather, $f^{\!\alpha}(a)^2/2^n$. Recall that the probability of observing $R_2$ in the state $\ket{0^n}$ and $R_3$ in the state $\ket{a}$ (without any amplification) is $\frac{f^{\!\alpha}(a)^2}{2^n}$ (refer to the proof of Theorem~\ref{thm:auto-sampling}). Let $F$ denote $\frac{f^{\!\alpha}(a)^2}{2^n}$, $\epsilon$ denote the desired accuracy and $\delta$ denote the desired probability of error. Call the algorithm in Lemma~\ref{lemma:ampest} to obtain an estimate $F'$ of $F$ with an accuracy $\epsilon'$ and error probability $\delta$. We know from the lemma that with high probability $F' - \epsilon' \le F \le F' + \epsilon'$ which implies that $2^n F' - 2^n \epsilon' \le f^{\!\alpha}(a)^2 \le 2^n F' + 2^n \epsilon'$. Therefore, if we use $\epsilon'=\tfrac{\epsilon}{2^n}$ then $2^nF'$ is an $\epsilon$-accurate estimate of $f^{\!\alpha}(a)^2$. However, the number of calls to the circuit will be $\Theta(\tfrac{1}{\epsilon'} \log \tfrac{1}{\delta}) = \Theta(\tfrac{2^n}{\epsilon} \log \tfrac{1}{\delta})$ which is $\Omega(2^n)$; this is clearly undesirable and begging to be bettered. It may be tempting to improve the above method by first amplifying the probability of observing $R_2$ in the state $\ket{0^n}$ and {\em then} estimating the probability of observing $R_3$ in the state $\ket{a}$. However, for amplitude estimation at this stage the probability of $R_2,R_3$ to be in the state $\ket{0^n} \otimes \ket{a}$ should be exactly $cf^{\!\alpha}(a)^2$ for some known constant $c$; since $\sigma_f$ is not known, fixed-point amplitude amplification cannot guarantee a knowledge of the exact probability after amplification. Thus it is unclear if amplitude amplification followed by amplitude estimation can lead to a better estimation algorithm. Now we will describe a quantum algorithm for the aforementioned task aiming for a better query complexity. Our technical objective will be to generate a state with a probability that is related to $|f^{\!\alpha}(a)|^2$ but much higher than that in the earlier approach and our main tool will be the quantum technique of ``swap test''. \begin{figure}[!h] \begin{minipage}{0.5\linewidth} \centering \leavevmode \includegraphics[width=0.6\linewidth]{Figure_2_a-crop.pdf} \end{minipage}% \begin{minipage}{0.5\linewidth} \centering \leavevmode \includegraphics[width=0.5\linewidth]{Figure_2_b-crop.pdf} \end{minipage} \caption{Swap-gate (left) and quantum circuit for swap-test (right)\label{fig:swaptest}} \end{figure} Suppose we have two registers over the same number of qubits that are in states denoted by $\ket{\psi}$ and $\ket{\phi}$. The swap test circuit, denoted by $ST$ and illustrated in Figure~\ref{fig:swaptest}, uses an additional qubit initialized to $\ket{0}$ and applies a conditional swap-gate in a clever manner such that if the first (single-qubit) register is measured, then $\ket{0}$ is observed with probability $\frac{1}{2} [1 + |\braket{\psi}{\phi}|^2]$. It is easy to show that the circuit performs the following transformation. \begin{multline*} \displaystyle \ket{0} \ket{\psi} \ket{\phi} \xrightarrow{ST} \ket{0} \otimes \frac{1}{2} \Big[\ket{\psi}\ket{\phi} + \ket{\phi}\ket{\psi}\Big] + \ket{1} \otimes \frac{1}{2} \Big[\ket{\psi}\ket{\phi} - \ket{\phi}\ket{\psi}\Big] \end{multline*} \begin{algorithm}[!h] \caption{Autocorrelation estimation at point $a$\label{algo:autocor-est}} \begin{algorithmic}[1] \Require Parameters: $\epsilon$ (confidence), $\delta$ (error) \State Start with four registers of which $R_1$ is initialized to $\ket{a}$, $R_2$ to $\ket{0}$, and $R_3,R_4$ to $\ket{0^n}$. \State Apply these transformations. \begin{itemize} \item[] $\ket{a} \ket{0} \ket{0^n} \ket{0^n}$ \item[] $\xrightarrow{H^n \otimes H^n} \ket{a} \ket{0} \Big( \sqrtn{n} \sum_x \ket{x} \Big) \Big( \sqrtn{n} \sum_y \ket{y} \Big)$ \item[] $\xrightarrow{CNOT} \ket{a} \ket{0} \Big( \sqrtn{n} \sum_x \ket{x} \Big) \Big( \sqrtn{n} \sum_y \ket{y \oplus a} \Big)$ \item[] $\xrightarrow{U_f \otimes U_f} \ket{a} \ket{0} \Big( \sqrtn{n} \sum_x (-1)^{f(x)} \ket{x} \Big) \Big( \sqrtn{n} \sum_y (-1)^{f(y \oplus a)} \ket{y \oplus a} \Big)$ \Comment{\small Uses reusable $\ket{-}$} \item[] $\xrightarrow{CNOT} \ket{a} \ket{0} \Big( \sqrtn{n} \sum_x (-1)^{f(x)} \ket{x} \Big) \Big( \sqrtn{n} \sum_y (-1)^{f(y \oplus a)} \ket{y} \Big)$ \item[] $= \ket{a} \ket{0} \ket{\psi} \ket{\phi_a}$ \begin{itemize} \item Normalized state $\sqrtn{n} \sum_x (-1)^{f(x)} \ket{x}$ denoted $\psi$ \item Normalized state $\sqrtn{n} \sum_y (-1)^{f(y \oplus a)} \ket{y}$ denoted $\phi_a$ \end{itemize} \end{itemize} \State Apply $ST$ on $R_2,R_3$ and $R_4$ to obtain $$\ket{a} \Big[ \ket{0} \otimes \frac{1}{2} \big(\ket{\psi}\ket{\phi_a} + \ket{\phi_a}\ket{\psi}\big) + \ket{1} \otimes \frac{1}{2} \big(\ket{\psi}\ket{\phi_a} - \ket{\phi_a}\ket{\psi}\big) \Big]$$ \State $\ell \leftarrow$ estimate the probability of observing $R_2$ in the state $\ket{0}$ with accuracy $\pm\frac{\epsilon}{2}$ and error $\delta$ \State Return $2\ell-1$ as the estimate of $|f^{\!\alpha}(a)|^2$ \end{algorithmic} \end{algorithm} \begin{figure}[!h] \includegraphics[width=0.7\linewidth]{Figure_4-crop.pdf} \centering \leavevmode \caption{Circuit for estimation of autocorrelation coefficient at a point $a$\label{fig:estimation}} \end{figure} Our algorithm for estimation of $|f^{\!\alpha}(a)|^2$ is presented in Algorithm~\ref{algo:autocor-est} and a circuit diagram is given in Figure~\ref{fig:estimation}. We do not show the $\ket{1}$ qubit in the algorithm; it is merely used, in the form $\ket{-}$, to apply the $U_f$ gate in a phase-version. Obviously, an accurate estimation of $\frac{1}{2} [ 1 + |f^{\!\alpha}(a)|^2 ]$ will automatically lead to an accurate estimation of $|f^{\!\alpha}(a)|^2$. Observe that $\frac{1}{2} [ 1 + |f^{\!\alpha}(a)|^2 ] \gg |f^{\!\alpha}(a)|^2/2^n$ and therefore, estimation using Algorithm~\ref{algo:autocor-est} is more efficient compared to that obtained from autocorrelation sampling (describe earlier in this section). \begin{theorem} Algorithm~\ref{algo:autocor-est} makes $\Theta\left(\frac{\pi}{\epsilon}\log \frac{1}{\delta}\right)$ calls to $U_f$ and returns an estimate $\alpha$ such that $$\Pr \left[ \alpha - \epsilon \le f^{\!\alpha}(a)^2 \le \alpha + \epsilon \right] \ge 1-\delta$$ \end{theorem} \begin{proof} Let $\ket{\chi^0_{a}}$ denote the state $\frac{1}{2} \ket{\psi}\ket{\phi_a} + \frac{1}{2}\ket{\phi_a}\ket{\psi}$. Observe that $$\left\| \ket{\chi^0_a} \right\|^2 = \tfrac{1}{4} \left[ 2 \big\| \ket{\psi} \big\| \cdot \big\| \ket{\phi_a} \big\| + 2 \big| \braket{\psi}{\phi_a} \big|^2 \right] = \tfrac{1}{2}\left[ 1 + \big| \braket{\psi}{\phi_a} \big|^2\right] $$ From Step-3 of the algorithm, the probability of observing $R_2$ in the state $\ket{0}$, say denoted $p_0$, can be expressed as $\big\| \ket{\chi_a^0} \big\|^2$. Further observe that $\braket{\psi}{\phi} = \frac{1}{2^n} \sum_x (-1)^{f(x)} (-1)^{f(x\oplus a)} = f^{\!\alpha}(a)$. Therefore, $p_0 = \tfrac{1}{2} + \tfrac{1}{2}f^{\!\alpha}(a)^2$ and $\ell$ is an estimate of $p_0$ such that, \begin{align*} 1 - \delta & \le \Pr\left[\ell - \tfrac{\epsilon}{2} \le p_0 \le \ell + \tfrac{\epsilon}{2}\right]\\ & = \Pr[2\ell - \epsilon \le 2p_0 \le 2\ell + \epsilon]\\ & = \Pr[2\ell - 1 -\epsilon \le 2p_0-1 \le \ell -1 + \epsilon] \\ & = \Pr[\alpha - \epsilon \le f^{\!\alpha}(a)^2 \le \alpha + \epsilon] \tag{$\because$ $\alpha=2\ell-1$} \end{align*} This shows that $2\ell-1$ is an $\epsilon$-accurate estimate of $f^{\!\alpha}(a)^2$. For analysing the number of queries to $U_f$, first observe that the circuit to obtain the state in Step-3 of the algorithm (see Figure~\ref{fig:estimation}) uses only two calls to $U_f$. The amplitude estimation procedure of Lemma~\ref{lemma:ampest} shall make $\Theta\left( \tfrac{\pi}{\epsilon} \log \tfrac{1}{\delta} \right)$ calls to this circuit, giving a total of $\Theta\left( \tfrac{\pi}{\epsilon} \log \tfrac{1}{\delta} \right)$ calls to $U_f$. \qed \end{proof} The above theorem shows how to estimate $f^{\!\alpha}(a)^2$ using a quantum algorithm that shows a quadratic speedup over a classical sampling-based algorithm. However, there remains the question of estimating $f^{\!\alpha}(a)$ when its value is 0. In the above approach, $p_0$ shall be $\tfrac{1}{2}$, and therefore, $\ell \le \tfrac{1}{2} + \epsilon/2$. This implies that the estimate for $f^{\!\alpha}(a)^2$ shall only satisfy $\alpha \le \epsilon$. A minor improvement may be added to Algorithm~\ref{algo:autocor-est} to handle this situation that we now describe. First apply the previously mentioned technique of applying amplitude estimation on the output state of sampling algorithm from Section~\ref{sec:sampling} but using a very high $\epsilon$. Note that amplitude estimation does not err when the probability it is estimating is 0. Then run Algorithm~\ref{algo:autocor-est} as usual and return the minimum of the two estimates. In case $f^{\!\alpha}(a)=0$, the first amplitude estimation will correctly return 0 as the estimate. We skip the details due to lack of space in this paper. \subsection{Estimation of Sum-of-Squares Indicator}\label{subsec:est_s_f} In this section we consider the problem of estimating the sum-of-squares indicator $\sigma_f$. As before the objective will be to obtain an estimate with $\epsilon$ accuracy and $\delta$ probability of error. Since $\sigma_f \ge 1$, typical values of $\epsilon$ will be 1 or more. We first discuss a classical sampling-based approach. Let $a,b,c$ be three random variables chosen uniformly at random from $\Ftwo{n}$ such that $b \not= c$ and let $X_{a,b,c}$ be the $\pm1$-valued random variable $(-1)^{f(a \oplus b)} (-1)^{f(a \oplus c)}$. We first express $\sigma_f$ as the expectation of these random variables. \begin{align*} \sigma_f & = \sum_{a \in \Ftwo{n}} f^{\!\alpha}(a)^2 = \sum_{a \in \Ftwo{n}} \Big[ \frac{1}{2^n} \sum_{b \in \Ftwo{n}} (-1)^{f(b) \oplus f(b \oplus a)} \Big]^2 \\ & = \frac{1}{2^{2n}} \sum_{a \in \Ftwo{n}} \Big[ 2^n + \sum_{{b\not= c \atop b,c \in \Ftwo{n}}} (-1)^{f(a \oplus b) \oplus f(a \oplus c)} \Big]\\ & = 1 + \frac{1}{2^{2n}} \sum_{a \in \Ftwo{n} \atop b\not= c} (-1)^{f(a \oplus b) \oplus f(a \oplus c)}\\ & = 1 + (2^n-1) \mathbb{E}_{a,b,c}[X_{a,b,c}] \end{align*} Note that $\mathbb{E}[X_{a,b,c}] = \frac{\sigma_f - 1}{2^n - 1} \approx \frac{\sigma_f}{2^n}$. One way to estimate $\mathbb{E}[X_{a,b,c}]$ is to use multiple independent samples of $a,b,c$. Since each sample of $X_{a,b,c}$ requires 2 calls to $f()$, therefore $O(\frac{1}{\epsilon'^2} \log \frac{1}{\delta})$ calls to $f()$ would be sufficient to estimate $\mathbb{E}[X_{a,b,c}]$ with $\epsilon'$ accuracy and $\delta$ error. Suppose $\tilde{X}$ is the estimate that we obtain; since it satisfies $$\Pr[\tilde{X} - \epsilon' \le \mathbb{E}[X_{a,b,c}] \le \tilde{X} + \epsilon'] \ge 1 - \delta$$ then an estimate of $\sigma_f=1+(2^n-1)\mathbb{E}[X_{a,b,c}]$ can be obtained by $1+(2^n-1)\tilde{X}$. It follows that $$\Pr\Big[{1+(2^n-1)\tilde{X}} - \epsilon'(2^n-1) \le \sigma_f \le {1+(2^n-1)\tilde{X}} + \epsilon'(2^n-1) \Big] \ge 1-\delta$$ Thus, if we want to estimate $\sigma_f$ with accuracy $\epsilon$, we have to set $\epsilon'=\frac{\epsilon}{2^n-1} \approx \frac{\epsilon}{2^n}$. The number of calls to $f()$ then becomes $O(\frac{2^{2n}}{\epsilon^2} \log \frac{1}{\delta})$ which is only marginally better than the $\Theta(2^{2n})$ classical non-randomized process of computing all autocorrelation values and then summing them up. On the quantum side, the circuit in Figure~\ref{fig:autocorr-sampling} can help us in estimating the sum-of-squares indicator of $f$. Since the probability of observing $R_2$ (in Figure~\ref{fig:autocorr-sampling}) to be in the state $\ket{0^n}$ is $\sigma_f/2^n$, Lemma~\ref{lemma:ampest} can be used to efficiently estimate $\sigma_f/2^n$. The number of calls to $U_f$ shall be $\Theta\left(\frac{2^n}{\epsilon} \log \frac{1}{\delta}\right)$ following the same analysis that was done in Section~\ref{subsec:autocor-estimation}. Thus we get a quadratic improvement over the classical sampling algorithm. We tried to improve upon this method by using the swap-test technique of Section~\ref{subsec:autocor-estimation} and running Algorithm~\ref{algo:autocor-est} with initial state $\sqrtn{n}\sum_x \ket{x}\ket{0}\ket{0^n}\ket{0^n}$. We can estimate the probability of observing the output qubit in the state $\ket{0}$ using a {\em relative accuracy} quantum estimation approach. However, the number of calls to $U_f$ remained the same $\Theta\left(\frac{2^n}{\epsilon} \log \frac{1}{\delta}\right)$. \section{Conclusion} Autocorrelation spectrum is a very important tool for designing Boolean functions with good cryptographic properties and also for mounting differential attacks of cryptosystems. In this paper we design several efficient quantum algorithms that analyse different aspects of Boolean functions that are related to their autocorrelation spectra. We first show that the Deutsch-Jozsa algorithm can be suitably extended to sample the Walsh spectrum of any derivative. Further, we specifically concentrate on the autocorrelation spectrum of a Boolean function. We present an algorithm to sample according to a distribution that is proportional to the autocorrelation coefficients of a Boolean function. Finally we consider the estimation of some values or some functions of autocorrelation coefficients with high accuracy and small error. Our algorithms will have applications to evaluate the cryptographic properties of a Boolean function in a significantly faster manner than in classical paradigm. \section*{Acknowledgements} The second author acknowledges the support from the project ``Cryptography \& Cryptanalysis: How far can we bridge the gap between Classical and Quantum Paradigm'', awarded under DAE-SRC, BRNS, India. \bibliographystyle{plain}
\section{Introduction}\label{s1} Tokamak discharges operating in high-confinement mode (H-mode)\cite{wagner} exhibit intermittent bursts of heat and particle transport, emanating from the outer regions of the plasma, that are known as {\em edge localized modes} (ELMs).\cite{zohm} ELMs are fairly benign in present-day tokamaks. However, it is estimated that the heat load that ELMs will deliver to the plasma-facing components in the divertor of a reactor-scale tokamak will be large enough to unacceptably limit the lifetimes of these components via erosion.\cite{loarte} The most promising method for the control of ELMs is via the application of static {\em resonant magnetic perturbations}\/ (RMPs). Complete RMP-induced ELM suppression was first demonstrated in the DIII-D tokamak via the application of static, non-axisymmetric, magnetic fields with toroidal mode number $n_\varphi=3$.\cite{evans} Subsequently, either mitigation or compete suppression of ELMs has been demonstrated on the JET,\cite{jet} ASDEX-U,\cite{asdex} KSTAR,\cite{kstar} and EAST\,\cite{east} tokamaks. Furthermore, the parameter range over which ELM suppression has been observed in DIII-D has been extended to include low-collisionality ITER-shaped plasmas,\cite{lowc} hybrid scenarios, \cite{hybrid} and plasmas with low, ITER-relevant, neutral beam momentum injection.\cite{lowt} These achievements have led to increased confidence that the RMP ELM control technique can operate effectively in ITER.\cite{iter} At present, the physical mechanism of RMP-induced ELM suppression is not fully understood. ELMs are generally thought to be caused by peeling-ballooning instabilities with intermediate toroidal mode numbers ($3<n_\varphi<20$) that are driven by the strong pressure gradients and current densities characteristic of the edge region of an H-mode discharge, which is known as the {\em pedestal}.\cite{conner} Consequently, early attempts to understand RMP-induced ELM suppression focused on the role of RMPs in reducing the pressure gradient, and, thereby, reducing the bootstrap current density, in the pedestal. In particular, the initial observations of ELM suppression were interpreted as an indication that the magnetic field in the pedestal had been rendered stochastic by the applied RMP, leading to greatly enhanced transport via thermal diffusion along magnetic field-lines.\cite{evans,fenstermacher} This simplistic explanation was quickly abandoned because no reduction in the electron temperature gradient in the pedestal is observed during RMP ELM suppression experiments, whereas a very significant reduction would be expected in the presence of stochastic fields. It is now generally accepted that response currents generated within the plasma play a crucial role in the perturbed equilibrium in the presence of RMPs, and that these currents act to prevent the formation of magnetic islands---a process known as {\em shielding}---and, thereby, significantly reduce the stochasticity of the magnetic field.\cite{berc} Current thinking suggests that density and temperature gradients in the pedestal are fixed by stiff transport due to high-$n_\varphi$ instabilities, and that the pedestal grows in radial extent, characterized by these fixed gradients, until the peeling/ballooning stability threshold is reached, and an ELM is triggered.\cite{synder} According to this scenario, ELM suppression is achieved by limiting the expansion of the pedestal before the peeling/ballooning stability threshold is crossed.\cite{snyder} It is hypothesized that pedestal expansion is halted by a region of enhanced transport at the top of the pedestal that is not suppressed by ${\bf E}\times {\bf B}$ velocity shear, and that this region is associated with the presence of an RMP-driven magnetic island chain located just outside, but close to the top of, the pedestal.\cite{wade} The aim of this paper is to develop a physical understanding of the dynamics of magnetic reconnection driven at a single rational surface that is resonant with one of the dominant helical harmonics of an applied RMP. The rational surface is assumed to be located just outside, but close to the top of, the pedestal of an H-mode tokamak plasma. The rational surface is also assumed to be intrinsically tearing-stable, so that any magnetic reconnection that occurs at the surface is due to the action of the applied RMP. Dealing with a single rational surface is a reasonable approach because the aforementioned lack of magnetic stochasticity in the pedestal indicates that any magnetic island chains driven in this region are sufficiently narrow that they do not overlap with one another, which suggests that they evolve independently, at least to a first approximation. We are also concentrating on a particular rational surface (i.e., one located close to the top of the pedestal, and resonant with a dominant RMP harmonic) because there is ample evidence from experimental $q_{95}$ scans that RMP-induced ELM suppression depends crucially on the existence of this surface.\cite{lowc,asdex,wade} This paper does not explicitly address the mechanism by which driven reconnection at the aforementioned rational surface leads to ELM suppression. However, there are two obvious candidate mechanisms. The first is the degradation of radial confinement due to the fact that heat and particles can flow around the magnetic separatrix from one side of the island chain to the other.\cite{chang} The second is the modification of the local plasma flow induced by the electromagnetic locking torque exerted on the island chain by the RMP. (A change in the flow affects the local ${\bf E}\times {\bf B}$ velocity shear which, in turn, can modify the local transport.) However, it is clear that both of these mechanisms are only operative if a relatively wide island chain is driven at the rational surface. In other words, they only work effectively if strong shielding breaks down at the rational surface. Hence, this paper will investigate the circumstances in which the breakdown of shielding occurs. Over the years, many different theoretical approaches have been taken to investigate driven reconnection at an intrinsically stable rational surface embedded in a tokamak plasma. These include single-fluid linear response models,\cite{rf1,rf2,curv} two-fluid linear response models,\cite{wael1,colef,wael} kinetic linear response models,\cite{heyn} single-fluid nonlinear response models,\cite{rf2} and two-fluid nonlinear response models.\cite{rf3} Generally speaking, the aforementioned response models predict the same phenomenology. (Here it is assumed that the linear models are used to calculate a quasi-linear electromagnetic locking torque that is balanced against a viscous restoring torque.) There exists a {\em shielded state}\/ in which driven magnetic reconnection at the rational surface is strongly suppressed by plasma flow, and a {\em penetrated state}\/ in which the plasma flow is modified in such a manner as to allow significant magnetic reconnection. As the resonant component of the RMP is gradually ramped up, a bifurcation from the shielded to the penetrated state is triggered once the resonant component exceeds a critical {\em penetration threshold}. If the resonant component is then gradually ramped down then a bifurcation from the penetrated to the shielded state is triggered once the resonant component falls below a critical {\em de-penetration threshold}. However, the de-penetration threshold is usually significantly smaller than the penetration threshold. Both bifurcations are accompanied by sudden changes in the plasma flow at the rational surface, which are, in turn, induced by changes in the electromagnetic locking torque exerted in the vicinity of the surface by the resonant component of the RMP. Despite the discussion in the previous paragraph, it is important to appreciate that there exist significant differences between the predictions of the various response models. Single-fluid linear and single-fluid nonlinear models predict that the penetrated state is achieved when the ${\bf E}\times {\bf B}$ velocity is reduced to zero at the rational surface.\cite{rf1,rf2} On the other hand, two-fluid linear theories predict that the penetrated state is achieved when the perpendicular electron fluid velocity is reduced to zero at the rational surface.\cite{colef} Finally, two-fluid nonlinear theories predict that the penetrated state is achieved when a velocity that is offset from the ${\bf E}\times {\bf B}$ velocity in the ion or electron diamagnetic direction, depending on the local values of $\eta_i$ and $Z_{\rm eff}$, is reduced to zero at the rational surface.\cite{rf3} (See Sect.~\ref{snat}.) There are also marked differences in the predicted dependences of the shielding factors, penetration thresholds, and de-penetration thresholds, on plasma parameters between the various models. It is clearly important to choose the correct response model when investigating driven magnetic reconnection in a tokamak plasma. But, what is the appropriate model for the problem under investigation? It is the thesis of this paper that the correct model is a {\em two-fluid nonlinear}\/ model, and that all of the other models mentioned previously are either inadequate or invalid. It is obvious that a single-fluid model is inadequate, given the significant differences that exist between, for example, the ${\bf E}\times {\bf B}$ velocity and the perpendicular electron fluid velocity in a typical H-mode pedestal. By definition, a linear model becomes invalid as soon as the width of the magnetic separatrix exceeds the layer width. Careful comparisons performed in Ref.~\onlinecite{uw} reveal that in typical $n=2$ DIII-D ELM suppression experiments the driven island width at the 8/2 rational surface greatly exceeds the linear layer width in the penetrated state (which is hardly surprising). However, the driven island width also exceeds the linear layer width in the shielded state. This suggests that both the penetrated and shielded states are governed by nonlinear physics. There are other strong indications of nonlinear behavior in RMP ELM suppression experiments. For instance, Fig.~5 in Ref.~\onlinecite{naz1} shows data from an $n=2$ ELM suppression experiment performed on DIII-D in which a bifurcation from a penetrated to a shielded state takes place. This transition is accompanied by the ``spin-up" of the locked magnetic island chain associated with the penetrated state. Such behavior is impossible within the context of linear response theory, but is easily explained within the context of nonlinear theory. (See Sect.~\ref{ex3}.) Furthermore, Fig.~29 in Ref.~\onlinecite{naz2} shows a shielded state in an $n=3$ RMP suppression experiment performed on DIII-D with a fixed RMP amplitude in an otherwise steady-state plasma. It can be seen that the state seems to consist of island chains of pulsating width, driven at different rational surfaces in the pedestal, and rotating in highly uneven manners. Moreover, the electromagnetic torque exerted on the plasma is time-varying, as evidenced by the time-varying ion toroidal velocity. As before, all of these behaviors are impossible within the context of linear response theory, but are easily accounted for within the context of nonlinear theory.\cite{rf3} (See Sect.~\ref{ex2}.) The remainder of this paper is devoted to the exposition of a two-fluid nonlinear theory of driven magnetic reconnection at a single, tearing-stable, rational surface embedded in a tokamak plasma. As explained in the previous discussion, such a theory is relevant to the problem of understanding RMP-induced ELM suppression. \section{Two-Fluid Nonlinear Response Model} \subsection{Introduction} This section describes the particular two-fluid nonlinear response model of driven magnetic reconnection at a single, tearing-stable, rational surface, embedded in a tokamak plasma, that is adopted in this paper. The model in question was derived in Ref.~\onlinecite{rf3}. The core of the model is a single-helicity version of the well-known four-field model of Hazeltine, Kotschenreuther, and Morrison.\cite{hkm} The core model is augmented by phenomenological terms representing anomalous cross-field particle and momentum transport due to small-scale plasma turbulence. Finally, the model includes approximate (i.e., flux-surface averaged) expressions for the divergences of the neoclassical stress tensors. These expressions allow neoclassical ion poloidal and perpendicular flow damping to be incorporated into the analysis. In Ref.~\onlinecite{rf3}, an ordering scheme is adopted that is suitable for a constant-$\psi$\,\cite{fkr}, sonic,\cite{rf3a} magnetic island chain whose radial width is similar to the ion poloidal gyroradius. Momentum transport in the island region is assumed to be dominated by poloidal and perpendicular ion neoclassical flow damping (rather than perpendicular ion viscosity). After a great deal of analysis, the formalism reduces to a nonlinear island width evolution equation and a nonlinear island phase evolution equation. (See Sect.~\ref{model}.) These two equations are coupled together. The formalism also determines the density, temperature, and flow profiles in the island region. (See Sects.~\ref{vely} and \ref{sprof}.) \subsection{Magnetic Island Chain} Consider a large aspect-ratio, low-$\beta$, circular cross-section, tokamak plasma equilibrium of major radius $R_0$, and toroidal magnetic field-strength $B_0$. Let us adopt a right-handed, quasi-cylindrical, toroidal coordinate system ($r$, $\theta$, $\varphi$) whose symmetry axis ($r=0$) coincides with the magnetic axis. The coordinate $r$ also serves as a label for the unperturbed (by the island chain) magnetic flux-surfaces. Let the equilibrium toroidal magnetic field and toroidal plasma current both run in the $+\varphi$ direction. Suppose that a helical magnetic island chain (driven by an RMP), with $m_\theta$ poloidal periods, and $n_\varphi$ toroidal periods, is embedded in the aforementioned plasma. The island chain is assumed to be radially localized in the vicinity of its associated rational surface, minor radius $r_s$, which is defined as the unperturbed magnetic flux-surface at which $q(r_s)=m_\theta/n_\varphi$. Here, $q(r)$ is the equilibrium safety-factor profile. Let the full radial width of the island chain's magnetic separatrix be $4 \,w$. In the following, it is assumed that $r_s/R_0\ll 1$ and $w/r_s\ll 1$. The magnetic flux surfaces in the island region correspond to the contours of\,\cite{rf3} \begin{equation} {\mit\Omega}(X,\zeta) = \frac{1}{2}\,X^{\,2}+\cos\zeta, \end{equation} where $X=(r-r_s)/w$, $\zeta = \chi-\phi_p(t)$, and $\chi= m_\theta\,\theta-n_\varphi\,\varphi$. The O-points of the island chain are located at $X=0$ and $\zeta=\pi$, whereas the X-points are located at $X=0$ and $\zeta=0$. The magnetic separatrix corresponds to ${\mit\Omega}=1$, the region enclosed by the separatrix to $-1\leq {\mit\Omega}<1$, and the region outside the separatrix to ${\mit\Omega}>1$. It is helpful to define the concept of a {\em vacuum island chain}, which is is defined as the static island chain obtained by naively superimposing the vacuum resonant component of the RMP onto the unperturbed plasma equilibrium. Let $4\,w_v$ be the full radial width of the vacuum island chain. Moreover, $\phi_p$ is conveniently defined as the helical phase shift between the true and the vacuum island chains. \subsection{Neoclassical Flow Damping} Let $\nu_{\theta\,i}$ and $\nu_{\perp\,i}$ be the neoclassical ion poloidal and perpendicular flow damping rates, respectively, in the vicinity of the island chain. The relationships between these damping rates and the assumed forms of the neoclassical stress tensors are specified in Ref.~\onlinecite{rfx}. Neoclassical ion poloidal flow damping acts to relax the ion poloidal flow velocity in the vicinity of the rational surface to $-\lambda_{\theta\,i}\,\eta_i\,V_\ast$, whereas neoclassical ion perpendicular flow damping acts to relax the ion perpendicular flow velocity in the vicinity of the rational surface to $-\lambda_{\perp\,i}\,\eta_i\,V_\ast$. Here, $V_\ast= T_{i\,0}/(e\,B_0\,L_n)$ is the equilibrium ion diamagnetic velocity at the rational surface (due to density gradients only), $T_{i\,0}=T_i(r_s)$, $e$ is the magnitude of the electron charge, $L_n=-1/(d\ln n_e/dr)_{r=r_s}$, and $\eta_i =(\ln T_i/d\ln n_e)_{r=r_s}$. Furthermore, $T_i(r)$ is the equilibrium ion temperature profile, and $n_e(r)$ the equilibrium electron number density profile. The values of the dimensionless {\em neoclassical velocity parameters}, $\lambda_{\theta\,i}$ and $\lambda_{\perp\,i}$, are specified in Appendix~\ref{appx}. \subsection{Natural Frequency}\label{snat} The {\em natural frequency}, $\omega_0$, is defined as the propagation frequency (i.e., $d\phi_p/dt$) that a naturally unstable magnetic island chain, resonant at the rational surface in question, would have in the absence of an RMP.\cite{rf1} According to the analysis of Ref.~\onlinecite{rf3}, \begin{equation} \omega_0 = \omega_E - [1+(1-\lambda_{\theta\,i})\,\eta_i]\,k_\theta\,V_\ast, \end{equation} where $\omega_E$ is the equilibrium value of the ${\bf E}\times {\bf B}$ frequency at the rational surface, and $k_\theta = m_\theta/r_s$. Given that $1-\lambda_{\theta\,i}$ varies between $-0.173$, for a pure electron--hydrogen plasma, and $-0.5$, for a very impure electron--hydrogen plasma (see Table~\ref{tab1}), the previous formula implies that $\omega_0-\omega_E < 0$ unless $\eta_i$ exceeds a critical value. This critical value is $5.78$ for a pure plasma, and $2$ for a very impure plasma. (See Table~\ref{tab1}.) If $\eta_i$ does not exceed the critical value then $\omega_0-\omega_E<0$: i.e., the natural frequency is offset from the local ${\bf E}\times {\bf B}$ frequency in the {\em ion}\/ diamagnetic direction. On the other hand, if $\eta_i$ exceeds the critical value then $\omega_0-\omega_E>0$: i.e., the natural frequency is offset from the local equilibrium ${\bf E}\times {\bf B}$ frequency in the {\em electron}\/ diamagnetic direction. Incidentally, the fact that magnetic island chains can propagate in the ion diamagnetic direction relative to the local equilibrium ${\bf E}\times {\bf B}$ frame has been verified experimentally.\cite{lahaye,bur} Note, finally, that the physics that determines the natural frequency of a nonlinear magnetic island chain is completely different to that which determines the rotation frequency of a linear drift-tearing mode.\cite{coppi} The natural frequency plays a crucial role in the theory of driven magnetic reconnection at a tearing-stable rational surface because, in order for strong shielding at the surface to break down, the local plasma flow must be modified in such a manner that the natural frequency becomes zero. (See Sect.~\ref{ex4}.) \subsection{Fundamental Timescales} Let \begin{equation} \tau_H = \frac{2\,\sqrt{I_1\,I_v}}{(2\,m_\theta)^{\,3/2}}\left(\frac{q_s}{\epsilon_s}\right)^2 L_q\left( \frac{\mu_0\,n_0\,m_i}{B_0^{\,2}}\right)^{1/2} \end{equation} be the effective {\em hydromagnetic timescale}\/ at the rational surface. Here, $q_s=m_\theta/n_\varphi$, $\epsilon_s=r_s/R_0$, $L_q=1/(d\ln q/dr)_{r=r_s}$, $n_0=n_e(r_s)$, and $m_i$ is the ion mass. The dimensionless quantities $I_1$ and $I_v$ are defined in Appendix~\ref{appu}. Let \begin{equation} \tau_R = \frac{I_i}{6\,m_\theta}\,\frac{\mu_0\,r_s^{\,2}}{\eta_\parallel} \end{equation} be the effective {\em resistive diffusion timescale}\/ at the rational surface. Here, $\eta_\parallel$ is the equilibrium parallel electrical resistivity at the rational surface. The dimensionless quantities $I_i$ is defined in Appendix~\ref{appu}. Finally, let \begin{equation} \omega_D = \left(\frac{\epsilon_s}{q_s}\right)^{\,2}\,\frac{\nu_{\theta\,i}}{I_1} \end{equation} be the effective {\em poloidal flow damping rate}\/ at the rational surface. Incidentally, according to Ref.~\onlinecite{kim}, \begin{equation} \omega_D = \frac{f_t}{I_1}\,\nu_i, \end{equation} where $f_t$ is the fraction of trapped particles, and $\nu_i$ is the ion collision frequency. (Both quantities are evaluated at the rational surface.) Here, it is assumed that the ions are in the banana collisionality regime. \subsection{Island Evolution Equations}\label{model} The two-fluid nonlinear response model derived in Ref.~\onlinecite{rf3} reduces to an {\em island width evolution equation}, \begin{equation}\label{e47} \lambda_R\,\frac{d\xi}{dT} = -\xi^{\,2/3}+b_v\,\cos\phi_p, \end{equation} and an {\em island phase evolution equation}, \begin{equation}\label{e48} \frac{d^{\,2}\phi_p}{dT^{\,2}}+\frac{d\phi_p}{dT} +b_v\,\xi^{\,1/3}\,\sin\phi_p = \gamma. \end{equation} Here, \begin{align} T &= \omega_D\,t,\\[0.5ex] \lambda_R&= S\,(\omega_D\,\tau_H)^{\,5/3},\label{lamr}\\[0.5ex] S &=\frac{\tau_R}{\tau_H},\\[0.5ex] \xi &= \hat{w}^{\,3},\\[0.5ex] \hat{w} &=\frac{w}{w_0},\\[0.5ex] \frac{w_0}{r_s} &= (\omega_D\,\tau_H)^{\,2/3},\label{ew0}\\[0.5ex] b_v &= \left(\frac{w_v}{w_0}\right)^{\,2},\label{ebv}\\[0.5ex] \gamma&=\frac{\omega_0}{\omega_D}.\label{gam} \end{align} In Eqs.~(\ref{e47}) and (\ref{e48}), $\xi$ characterizes the island width (actually, it is proportional to the cube of the island width), $\phi_p$ is the helical phase of the island chain relative to the vacuum island chain, $b_v$ is the normalized amplitude of the resonant component of the RMP, $\lambda_R$ is the ratio of the typical island width growth timescale to the typical island rotation timescale, and $\gamma$ is the normalized island natural frequency. The first term on the right-hand side of Eq.~(\ref{e47}) represents the intrinsic stability of the island chain. (Here, it is assumed that ${\mit\Delta}'\,r_s=-2\,m_\theta$, where ${\mit\Delta}'$ is the conventional tearing stability index.\cite{fkr}) The second term represents the effect of the resonant component of the RMP on island width evolution. The first term on the left-hand side of Eq.~(\ref{e48}) represents ion inertia. The second term represents ion neoclassical flow damping. The third term represents the electromagnetic locking torque due to the resonant component of the RMP. Finally, the term on the right-hand side represents intrinsic plasma flow at the rational surface. Equations~(\ref{e47}) and (\ref{e48}) are highly nonlinear, and, in general, can only be solved numerically. Numerical integration of these equations is a relatively straightforward task, apart from one caveat. The quantity $\xi$ cannot be negative (because the island width cannot be negative). Hence, when integrating Eqs.~(\ref{e47}) and (\ref{e48}), if $\xi$ passes through zero then the following transformation is applied:\,\cite{rf6} \begin{align} \xi&\rightarrow -\xi,\\[0.5ex] \phi_p &\rightarrow \phi_p + {\rm sgn}(\gamma)\,\pi. \end{align} This transformation causes the island O-points to become X-points, and vice versa, which is a natural consequence of a reversal in sign of the reconnected magnetic flux at the rational surface. Note that our model neglects the influence of the perturbed bootstrap current, the perturbed ion polarization current, and magnetic field-line curvature, on island width evolution, on the assumption that these effects are much less important than the destabilizing effect of the resonant component of the RMP. \subsection{Toroidal Ion Velocity Profile}\label{vely} It is helpful to define the flux-surface label $k=[(1+{\mit\Omega})/2]^{\,1/2}$. Thus, the island O-point corresponds to $k=0$, and the magnetic separatrix to $k=1$. Furthermore, $|X|\simeq 2\,k$ in the limit $k\gg 1$. Let \begin{equation} \hat{V}_{\varphi\,i}(k) =- \frac{V_{\varphi\,i}\,(k)}{(R_0/n_\varphi)\,\omega_D}, \end{equation} where $V_{\varphi\,i}(k)$ is the toroidal ion velocity profile. (Note that the toroidal ion velocity---or, to be more exact, the parallel ion velocity---is a magnetic flux-surface function.\cite{rf3}) According to the analysis of Ref.~\onlinecite{rf3}, \begin{align} \hat{V}_{\varphi\,i}(k<1) &= \frac{d\phi_p}{dT},\\[0.5ex] \hat{V}_{\varphi\,i}(k>1)&= \frac{d\phi_p}{dT}+\frac{1}{(1+\bar{\nu})\,{\cal A}\,{\cal C}\,f}\left[\bar{\nu}\left(\gamma-\frac{d\phi_p}{dT}\right) -\frac{1}{I_1}\left(1-\frac{\bar{\nu}}{f}\right)\frac{d^{\,2}\phi_p}{dT^{\,2}}\right]. \end{align} Here, $\bar{\nu}=\nu_{\perp\,i}/\nu_{\theta\,i}$, the function $f(k)$ is defined in Appendix~\ref{appu}, and the functions ${\cal A}(k)$ and ${\cal C}(k)$ are defined in Appendix~\ref{apa}. \subsection{Density and Temperature Profiles}\label{sprof} The electron number density profile in the vicinity of the island chain is a magnetic flux-surface function that takes the form \begin{align} n_e(k<1) &= n_0,\\[0.5ex] n_e(k>1)&= n_0\left[1-{\rm sgn}(X)\,\frac{w}{L_n}\int_1^k\frac{2\,dk}{\cal C}\right]. \end{align} The ion temperature profile in the vicinity of the island chain is a magnetic flux-surface function that takes the form \begin{align} T_i(k<1) &= T_{i\,0},\\[0.5ex] T_i(k>1)&= T_{i\,0}\left[1-{\rm sgn}(X)\,\frac{\eta_i\,w}{L_n}\int_1^k\frac{2\,dk}{\cal C}\right]. \end{align} Finally, the electron temperature profile in the vicinity of the island chain is a magnetic flux-surface function that takes the form \begin{align} T_e(k<1) &= T_{e\,0},\\[0.5ex] T_e(k>1)&= T_{e\,0}\left[1-{\rm sgn}(X)\,\frac{\eta_e\,w}{L_n}\int_1^k\frac{2\,dk}{\cal C}\right]. \end{align} Here, $T_{e\,0}=T_e(r_s)$ and $\eta_e=(d\ln T_e/d\ln n_e)_{r=r_s}$, where $T_e(r)$ is the equilibrium electron temperature profile. Note that the density, ion temperature, and electron temperature, profiles are all flattened inside the island separatrix. \section{Approximate Analytic Solutions}\label{sx} \subsection{Introduction} Before attempting to solve Eqs.~(\ref{e47}) and (\ref{e48}) numerically, it is helpful to search for approximate analytic solutions of these equations. \subsection{Renormalization} The analytic solution of Eqs.~(\ref{e47}) and (\ref{e48}) is facilitated by defining the following rescaled variables: \begin{align} \hat{T}&= \gamma\,T,\\[0.5ex] \hat{\lambda}_R&= \gamma^{\,4/3}\,\lambda_R,\label{lamr1}\\[0.5ex] \hat{b}_v &= \frac{b_v}{\gamma^{\,2/3}},\\[0.5ex] \hat{\xi} &= \frac{\xi}{\gamma}. \end{align} When re-expressed in terms of these new variables, Eqs.~(\ref{e47}) and (\ref{e48}) take the form \begin{align} \hat{\lambda}_R\,\frac{d\hat{\xi}}{d\hat{T}} &= -\hat{\xi}^{\,2/3}+\hat{b}_v\,\cos\phi_p,\label{e26}\\[0.5ex] \gamma\,\frac{d^{\,2}\phi_p}{d\hat{T}^{\,2}}+\frac{d\phi_p}{d\hat{T}} +\hat{b}_v\,\hat{\xi}^{\,1/3}\,\sin\phi_p &= 1\label{e27}. \end{align} Note that we are assuming, without loss of generality, that $\gamma>0$. \subsection{Locked Regime}\label{locked} Let us search for a locked solution of Eqs.~(\ref{e26}) and (\ref{e27}) in which $\hat{\xi}$ and $\phi_p$ are both constant in time (i.e., $d/d\hat{T}=0$, which implies that the island chain is stationary in the laboratory frame). In this case, it is easily demonstrated that \begin{align} \hat{\xi} &= \hat{b}_v^{\,3/2}\,\cos^{3/2}\phi_p,\\[0.5ex] \hat{b}_v^{\,3/2}\,\cos^{1/2}\phi_p\,\sin\phi_p&= 1. \end{align} The previous two equations reveal that locked solutions exist as long as $\hat{b}_v>\hat{b}_{v\,{\rm unlock}}$, where \begin{equation}\label{unlock} \hat{b}_{v\,{\rm unlock}}=\left(\frac{\sqrt{27}}{2}\right)^{1/3}= 1.374. \end{equation} Moreover, such solutions are characterized by $0\leq \phi_p\leq \phi_{p\,{\rm unlock}}$, where \begin{equation} \phi_{p\,{\rm unlock}}= \sin^{-1}\left(\sqrt{\frac{2}{3}}\right)=54.7^\circ. \end{equation} Finally, \begin{equation} \frac{w}{w_v} = \frac{\hat{\xi}^{\,1/3}}{\hat{b}_v^{\,1/2}} = \cos^{1/2}\phi_p. \end{equation} Given that $\cos\phi_p > 1/\sqrt{3} = 0.5774$ for locked solutions, we deduce that the locked island width, $w$, is similar in magnitude to the vacuum island width, $w_v$. In other words, there is no effective shielding in the so-called {\em locked regime}. \subsection{Pulsating Regime} Let us search for a solution of Eqs.~(\ref{e26}) and (\ref{e27}) in which the island rotates in the laboratory frame (i.e., $d/d\hat{T}\neq 0$). Suppose that the term on the left-hand side of Eq.~(\ref{e26}), and the first term on the left-hand side of Eq.~(\ref{e27}), are both negligible. In this case, Eqs.~(\ref{e26}) and (\ref{e27}) reduce to \begin{align} \hat{\xi}^{\,2/3} &= \hat{b}_v\,\cos\phi_p,\label{e33}\\[0.5ex] \frac{d\phi_p}{d\hat{T}}+\hat{b}_v\,\hat{\xi}^{\,1/3}\,\sin\phi_p&= 1.\label{e34} \end{align} If the second term on the left-hand side of Eq.~(\ref{e34}) is negligible then $d\phi_p/d\hat{T}= 1$, which justifies the neglect of the first term on the left-hand side of Eq.~(\ref{e27}). Equation~(\ref{e33}) yields \begin{equation}\label{e35} \hat{\xi} = \hat{b}_v^{\,3/2}\,\cos^{3/2}\phi_p. \end{equation} Obviously, this solution is only valid when $\cos\phi_p \geq 0$, which implies that $-\pi/2 \leq \phi_p\leq \pi/2$. Moreover, \begin{equation} \frac{w}{w_v} = |\cos\phi_p|^{\,1/2}. \end{equation} It follows that the island width pulsates, periodically falling to zero, at which times the island helical phase---which, otherwise, increases continually in time---jumps from $\pi/2$ to $-\pi/2$.\cite{rf2,rf6,rf3} Furthermore, because the maximum allowed value of $\cos\phi_p$ is $1$, we deduce that there is no effective shielding in the so-called {\em pulsating regime}\/ [i.e., $w/w_v\sim {\cal O}(1)$]. Let us assume that the neglect of the second term on the left-hand side of Eq.~(\ref{e34}) is justified as long as it is not possible to find a locked solution of this equation with $\xi$ given by Eq.~(\ref{e35}). In other words, the neglect is justified as long as \begin{equation} \hat{b}_v^{\,3/2}\,\cos^{1/2}\phi_p\,\sin\phi_p= 1. \end{equation} is insoluble. This is the case provided that $\hat{b}_v < \hat{b}_{v\,{\rm unlock}}$, where $\hat{b}_{v\,{\rm unlock}}$ is specified in Eq.~(\ref{unlock}). Finally, it is easily demonstrated that the neglect of the term on the left-hand side of Eq.~(\ref{e26}) is justified provided \begin{equation} \hat{b}_v< \frac{1}{\hat{\lambda}_R^{\,2}}. \end{equation} \subsection{Suppressed Regime}\label{suppressed} Let us search for another rotating solution of Eqs.~(\ref{e26}) and (\ref{e27}). Suppose that the first term on the right-hand side of Eq.~(\ref{e26}), and the first term on the left-hand side of Eq.~(\ref{e27}), are both negligible. In this case, Eqs.~(\ref{e26}) and (\ref{e27}) reduce to \begin{align} \hat{\lambda}_R\,\frac{d\hat{\xi}}{d\hat{T}}&=\hat{b}_v\,\cos\phi_p,\label{e33a}\\[0.5ex] \frac{d\phi_p}{d\hat{T}}+\hat{b}_v\,\hat{\xi}^{\,1/3}\,\sin\phi_p&= 1.\label{e34a} \end{align} If the second term on the left-hand side of Eq.~(\ref{e34a}) is negligible then $d\phi_p/d\hat{T}= 1$, which justifies the neglect of the first term on the left-hand side of Eq.~(\ref{e27}), and Eq.~(\ref{e33a}) can be integrated to give \begin{equation}\label{e35a} \hat{\xi} = \frac{\hat{b}_v}{\hat{\lambda}_R}\,\sin\phi_p. \end{equation} Obviously, this solution is only valid when $\sin\phi_p \geq 0$ (because $\hat{\xi}$ cannot be negative), which implies that $0 \leq \phi_p\leq \pi$. Moreover, \begin{equation}\label{e42} \frac{w}{w_v} = \frac{|\sin\phi_p|^{1/3}}{\hat{b}_v^{\,1/6}\,\hat{\lambda}_R^{\,1/3}}. \end{equation} It follows that the island width pulsates, periodically falling to zero, at which times the island helical phase---which, otherwise, increases continually in time---jumps from $\pi$ to $0$.\cite{rf2,rf6,rf3} Let us assume that the neglect of the second term on the left-hand side of Eq.~(\ref{e34a}) is justified as long as it is not possible to find a locked solution of this equation with $\xi$ given by Eq.~(\ref{e35a}). In other words, the neglect is justified as long as \begin{equation} \frac{\hat{b}_v^{\,4/3}}{\hat{\lambda}_R^{\,1/3}} \,\sin^{4/3}\phi_p=1. \end{equation} is insoluble. This is the case provided that $\hat{b}_v < \hat{b}_{v\,{\rm penetrate}}$, where \begin{equation} \hat{b}_{v\,{\rm penetrate}}= \hat{\lambda}_R^{\,1/4}. \end{equation} Finally, it is easily demonstrated that the neglect of the first term on the right-hand side of Eq.~(\ref{e26}) is justified provided \begin{equation} \hat{b}_v>\frac{1}{\hat{\lambda}_R^{\,2}}. \end{equation} It follows, by comparison with Eq.~(\ref{e42}), that the so-called {\em suppressed regime}\/ is characterized by strong shielding (i.e., $w/w_v\ll 1$). \subsection{Discussion}\label{dis} The analysis in Sects.~\ref{locked}--\ref{suppressed} lead to the scenario illustrated schematically in Fig.~\ref{fig1}. As shown in the figure, there are three solution regimes in $\hat{\lambda}_R$--$\hat{b}_v$ space. Namely, the locked, pulsating, and the suppressed regimes. Only the suppressed regime is characterized by strong shielding (i.e., $w/w_v\ll 1$). Thus, referring to the discussion in Para.~8 of Sect.~\ref{s1}, the shielded state corresponds to the suppressed regime, whereas the penetrated state corresponds to the union of the locked and pulsating regimes. Note that there is a region of parameter space, labelled S/L in the figure, in which the suppressed and locked solution branches co-exist. There is a bifurcation from the suppressed to the locked solution branch when the upper (in $\hat{b}_v$) boundary of this region is crossed. Likewise, there is a bifurcation from the locked to the suppressed solution branch when the lower boundary of the region is crossed. The former bifurcation is characterized by the sudden loss of strong shielding, whereas the latter is characterized by the sudden onset of strong shielding. Thus, again referring to the discussion in Para.~8 of Sect.~\ref{s1}, the penetration threshold corresponds to $\hat{b}_v>\hat{b}_{v\,{\rm penetrate}}\simeq \hat{\lambda}_R^{\,1/4}$, whereas the de-penetration threshold corresponds to $\hat{b}_v< \hat{b}_{v\,{\rm de-penetrate}}\simeq 1$. It is clear, from Fig.~\ref{fig1}, that in order to get strong shielding at the rational surface (i.e., in order to be in the suppressed regime) it is necessary that $\hat{\lambda}_R > 1$. Making use of Eqs.~(\ref{lamr}), (\ref{gam}), and (\ref{lamr1}), this criterion reduces to $\omega_0>\omega_{0\,{\rm min}}$, where \begin{equation}\label{e47x} \omega_{0\,{\rm min}}\,\tau_H = \frac{1}{S^{\,3/4}\,(\omega_D\,\tau_H)^{\,1/4}}. \end{equation} It follows that there is a minimum level of plasma flow at the rational surface---parameterized by the natural frequency, $\omega_0$---required for strong shielding to be possible. The maximum amount of shielding in the suppressed regime is achieved at the upper boundary of this regime in $\hat{\lambda}_R$--$\hat{b}_v$ space, which corresponds to $\hat{b}_v\simeq \hat{\lambda}_R^{\,1/4}$. It follows from Eqs.~(\ref{lamr}), (\ref{gam}), (\ref{lamr1}), (\ref{e42}), and (\ref{e47x}) that \begin{equation} \left(\frac{w}{w_v}\right)_{\rm min} \simeq \frac{1}{S^{\,3/8}\,(\omega_0\,\tau_H)^{\,1/2}\,(\omega_D\,\tau_H)^{\,1/8}}=\left(\frac{\omega_{0\,{\rm min}}}{\omega_0}\right)^{1/2}. \end{equation} Finally, the penetration threshold corresponds to $w_v > w_{v\,{\rm penetrate}}$, whereas the de-penetration threshold corresponds to $w_v < w_{v\,{\rm de-penetrate}}$, where \begin{align} \frac{w_{v\,{\rm penetrate}}}{r_s}\simeq S^{\,1/8}\, (\omega_0\,\tau_H)^{\,1/2}\,(\omega_D\,\tau_H)^{\,3/8}= \left(\frac{\omega_0}{\omega_{0\,{\rm min}}}\right)^{1/2}\left(\frac{\omega_D\,\tau_H}{S}\right)^{1/4},\\[0.5ex] \frac{w_{v\,{\rm de-penetrate}}}{r_s}\simeq (\omega_0\,\tau_H)^{\,1/3}\,(\omega_D\,\tau_H)^{1/3}= \left(\frac{\omega_0}{\omega_{0\,{\rm min}}}\right)^{1/3}\left(\frac{\omega_D\,\tau_H}{S}\right)^{1/4}. \end{align} Here, use has been made of Eqs.~(\ref{ew0}) and (\ref{ebv}). \section{Numerical Solutions}\label{snum} \subsection{Introduction} Let us now consider some example numerical solutions of Eqs.~(\ref{e47}) and (\ref{e48}). \subsection{First Example} Our first example is characterized by $\lambda_R=0.1$, $\gamma=1.0$, and $\bar{\nu}=0.1$. This is a case in which the island natural frequency is not large enough to enable strong shielding. (See Sect.~\ref{dis}.) The normalized resonant component of the RMP is increased linearly from a small value at $T=0.0$ to $b_v=2.0$ at $T=100.0$, and then decreased linearly to a small value at $T=200.0$. Referring to Fig.~\ref{fig1}, we would expect to start off in the pulsating regime, to make a transition to the locked regime when $b_v$ exceeds a critical value similar to unity, and then to make a back transition to the pulsating regime when $b_v$ falls below the same critical value. It can be seen, from Fig.~\ref{fig2}, that this is essentially what happens. The pulsating regime can be identified because the helical phase of the island is restricted to the range $-\pi/2\leq \phi_p\leq \pi/2$, the island width periodically falls to zero, and there is no shielding [i.e., $w/w_v\sim {\cal O}(1)$]. The locked regime can be identified because $\phi_p$ is relatively static, the island width has a relatively constant nonzero value, $\hat{V}_{\phi\,i}(k=0)=0$ (i.e., the toroidal flow velocity inside the island separatrix is reduced to zero), and there is no shielding. Note that, in the pulsating regime, the electromagnetic torque exerted by the resonant component of the RMP is strongly modulated, which gives rise to a modulation of the local toroidal ion velocity. On the other hand, in the locked regime, the torque is constant, and there is no modulation of the ion velocity. Incidentally, the modulation of the torque in the pulsating regime is an intrinsically nonlinear effect (i.e., a linear response model would give a constant torque). The actual transition from the pulsating to the locked regime takes place when $b_v\simeq 1.6$, whereas the back transition takes place when $b_v\simeq 1.2$. This is not quite what analysis presented in Sect.~\ref{sx} predicts, which is hardly surprising, given the approximate nature of the analysis. Figure~\ref{fig3} shows simulated ``Mirnov" data associated with the first example. The figure actually shows contours of $b_r= w^{\,2}\,\cos(\chi-\phi_p)$ plotted in $T$-$\chi$ space (recall that $\chi=m_\theta\,\theta-n_\varphi\,\varphi$), and is meant to mimic the data that would be obtained from a comprehensive array of magnetic pick-up coils surrounding the plasma, such as was recently installed on the DIII-D tokamak.\cite{king} The pulsating regime appears as an interlocking pattern of small regions of positive and negative $b_r$ that are aligned almost almost parallel to the $\chi$ axis, but do not extend over all values of $\chi$. The locked regime appears as alternating thick bands of positive and negative $b_r$ that are aligned almost parallel to the $T$ axis. \subsection{Second Example}\label{ex2} Our second example is characterized by $\lambda_R=10.0$, $\gamma=1.0$, and $\bar{\nu}=0.1$. This is a case in which the island natural frequency is large enough to enable moderate shielding. (See Sect.~\ref{dis}.) The normalized resonant component of the RMP is increased linearly from a small value at $T=0.0$ to $b_v=2.0$ at $T=100.0$, and then decreased linearly to a small value at $T=200.0$. Referring to Fig.~\ref{fig1}, we would expect to start off in the suppressed regime, to make a transition to the locked regime when $b_v$ exceeds a critical value somewhat larger than unity, and then to make a back transition to the suppressed regime when $b_v$ falls below a second critical value that is similar to unity. It can be seen, from Fig.~\ref{fig4}, that this is essentially what happens. The suppressed regime can be identified because the helical phase of the island is restricted to the range $0\leq \phi_p\leq \pi$, the island width periodically falls to zero, and there is moderate shielding (i.e., $w/w_v\leq 0.6$). As before, the locked regime can be identified because $\phi_p$ is relatively static, the island width has a relatively constant nonzero value, $\hat{V}_{\phi\,i}(k=0)=0$, and there is no shielding. Note that, in the suppressed regime, the electromagnetic torque exerted by the resonant component of the RMP is strongly modulated, which gives rise to a modulation of the local toroidal ion velocity. As before, the modulation of the torque in the suppressed regime is an intrinsically nonlinear effect (i.e., a linear response model would give a constant torque). Note, finally, that the driven island chain makes a full rotation during the back transition from the locked to the suppressed regimes; this is a vestigial version of the spin up described Sect.~\ref{ex3}. Figure~\ref{fig5} shows simulated Mirnov data associated with the second example. The suppressed regime appears as an interlocking pattern of small regions of positive and negative $b_r$ that are aligned almost parallel to the $\chi$ axis, but do not extend over all values of $\chi$. As before, the locked regime appears as alternating thick bands of positive and negative $b_r$ that are aligned almost parallel to the $T$ axis. \subsection{Third Example}\label{ex3} Our third example is characterized by $\lambda_R=100.0$, $\gamma=1.0$, and $\bar{\nu}=0.1$. This is a case in which the island natural frequency is large enough to enable strong shielding. (See Sect.~\ref{dis}.) The normalized resonant component of the RMP is increased linearly from a small value at $T=0.0$ to $b_v=3.0$ at $T=80.0$, decreased linearly to a small value at $T=160.0$, and, thereafter, held steady. Referring to Fig.~\ref{fig1}, we would expect to start off in the suppressed regime, to make a transition to the locked regime when $b_v$ exceeds a critical value that is considerably larger than unity, and then to make a back transition to the suppressed regime when $b_v$ falls below a second critical value that is similar to unity. It can be seen, from Fig.~\ref{fig6}, that this is essentially what happens, with one caveat (involving the spin up). The suppressed regime can be identified because the helical phase of the island is restricted to the range $0\leq \phi_p\leq \pi$, the island width periodically falls to zero, and there is strong shielding (i.e., $w/w_v\leq 0.25$). As before, the locked regime can be identified because $\phi_p$ is relatively static, the island width has a relatively constant nonzero value, $\hat{V}_{\phi\,i}(k=0)=0$, and there is no shielding. Note, however, that at the end of the locked phase, instead of immediately re-entering the suppressed regime, the island chain spins up: i.e., its helical phase increases continually in time. This behavior occurs because the island chain cannot decay away fast enough to prevent it from being entrained by the re-accelerated plasma flow at the rational surface. Of course, the island chain will eventually re-enter the suppressed regime, but only when enough time has elapsed for its width to decay to zero: i.e., after 100, or so, normalized time units. Figure~\ref{fig7} shows simulated Mirnov data associated with the third example. As before, the suppressed regime appears as an interlocking pattern of small regions of positive and negative $b_r$ that are aligned almost parallel to the $\chi$ axis, but do not extend over all values of $\chi$. However, in this particular example, it is much easier to see that the positive and negative regions of the suppressed regime predominately occupy the same ranges of $\chi$ as the positive and negative bands in the locked regime. As before, the locked regime appears as alternating thick bands of positive and negative $b_r$ that are aligned almost parallel to the $T$ axis. Finally, the spin up appears as alternating diagonal bands of positive and negative $b_r$ that extend over all values of $\chi$. \subsection{Fourth Example}\label{ex4} Our fourth example is characterized by $\lambda_R=100.0$, $b_v=0.6$, and $\bar{\nu}=0.1$. This is a case in which the island natural frequency is initially large enough to enable strong shielding. (See Sect.~\ref{dis}.) The normalized island natural frequency is ramped linearly from $\gamma=1.0$ at $T=0.0$ to $\gamma=-1.0$ at $T=200.0$. This particular example is designed to illustrate what happens when the natural frequency at the rational surface passes through zero. As can be seen from Figs.~\ref{fig8} and \ref{fig9}, we start off in the suppressed regime, there is a transition to the locked regime when $\gamma$ becomes sufficiently small, and then when $|\gamma|$ becomes sufficiently large the locked island chain spins up and decays aways. The only major difference between this example and the previous one is that the island spins up to a negative rotation frequency, because $\gamma$ has become negative by the time the locked island chain unlocks. Note, finally, that the locked phase is centered on the time at which the normalized natural frequency, $\gamma$, passes through zero. In other words, the breakdown of strong shielding is clearly associated with island natural frequency passing through zero. \section{Summary and Discussion} The aim of this paper is to develop a physical understanding of the dynamics of magnetic reconnection driven at a single, tearing-stable, rational surface that is resonant with one of the dominant helical harmonics of an applied RMP. The rational surface is assumed to be located just outside, but close to the top of, the pedestal of an H-mode tokamak plasma. Over the years, many different theoretical approaches have been taken to investigate driven reconnection at an intrinsically stable rational surface embedded in a tokamak plasma. These include single-fluid linear response models, two-fluid linear response models, kinetic linear response models, single-fluid nonlinear response models, and two-fluid nonlinear response models. However, it is the thesis of this paper that the correct response model is a two-fluid nonlinear model, and that all of the other models mentioned previously are either inadequate or invalid. (See the discussion in Sect.~\ref{s1}.) The two-fluid nonlinear response model discussed in this paper consists of an island width evolution equation and an island phase evolution equation. (See Sect.~\ref{model}.) These two equations are coupled together. The island width and phase evolution equations are sufficiently nonlinear that they can only be solved accurately by numerical means. However, it is possible to find approximate analytical solutions of these equations. (See Sect.~\ref{sx}.) These analytic solutions reveal that there are three different response regimes---namely, the locked, pulsating, and suppressed regimes. In the locked regime, the magnetic island chain driven at the rational surface has a constant phase relative to the resonant component of the RMP: i.e., the island chain is stationary in the laboratory frame. Moreover, the width of the island chain is similar to the vacuum island width, which implies that there is no effective ``shielding" (i.e., suppression of driven magnetic reconnection) in this regime. In the pulsating and suppressed regimes, the driven island chain is forced to rotate by plasma flow at the rational surface. However, the island width periodically falls to zero in both regimes, at which times the helical phase of the island chain jumps by $\pi$ radians. In both regimes, the electromagnetic torque exerted by the resonant component of the RMP is strongly modulated, which gives rise to a modulation of the local toroidal ion velocity. The main difference between the pulsating and the suppressed regimes is that there is no effective shielding in the former regime (i.e., the driven island width is similar to the vacuum island width), whereas there is strong shielding in the latter regime (i.e., the driven island width is much smaller than the vacuum island width). There exists a region of parameter space in which the suppressed and the locked solution branches co-exist. Bifurcations from one solution branch to the other are triggered when the boundaries of this region are crossed. These bifurcations are characterized by the sudden loss of strong shielding, or the sudden onset of strong shielding. Numerical integration of the island width and island phase evolution equations yields results that are consistent with the aforementioned approximate analytic solutions, with one proviso. (See Sect.~\ref{snum}.) Namely, that the transition from the locked regime to the suppressed regime is characterized by an intermediate regime in which the island chain spins up: i.e., its helical phase increases continually in time. This behavior occurs because the island chain cannot decay away fast enough to prevent it from being entrained by the re-accelerated plasma flow at the rational surface. \section*{Acknowledgements} This research was funded by the U.S.\ Department of Energy under contract DE-FG02-04ER-54742.
\section{Introduction} Type IIn supernovae (SNe) are characterized by prominent and narrow-to-intermediate width Balmer emission lines in their spectra \citep{Schlegel1990, Filippenko1997, Smith2014,Gal-Yam2016}. Rather than a signature of the explosion itself, this spectral specificity is presumably the result of the photoionization of a dense, Hydrogen-rich, circumstellar medium (CSM) which is ejected from the SN progenitor prior to the explosion. The Type IIn class is not a well-defined category of objects, as many SNe show the characteristic narrow Balmer lines in their spectra, sometime during their evolution. These lines are the signature of an external physical phenomenon highly dependent on the surrounding environment, rather than of any intrinsic property of the explosion. Depending on the spatial distribution and physical properties of the CSM, these lines may persist for days (``flash spectroscopy'', \citealt{Gal-Yam2014,Khazov2016,Yaron2017}), weeks (e.g., SN\,1998s, \citealt{Li1998, Fassia2000, Fassia2001}; SN\,2005gl, \citealt{Gal-Yam2007}; SN\,2010mc, \citealt{Ofek2013}), or years (e.g., SN\,1988Z, \citealt{Danziger1991,Stathakis1991,Turatto1993,VanDyk1993,Chugai1994,Fabian1996,Aretxaga1999,Williams2002,Schlegel2006,Smith2017}; 2010\,jl, \citealt{Patat2011, Stoll2011, Gall2014,Ofek2014}). In the last decades, the physical picture governing SN IIn explosions and the wider family of ``interacting'' SNe - SNe whose radiation can be partially or completely accounted for by the ejecta crashing into a dense surrounding medium - has become clearer (see e.g., \citealt{Chevalier1982}, \citealt{Chugai1994}, \citealt{Chugai2004}, \citealt{Ofek2010}, \citealt{Chevalier2011}, \citealt{Ginzburg2014}, \citealt{Moriya2014}). In recent years, there is growing evidence that, in the majority of cases, the high-density CSM originates from explosive phenomena taking place in the months to years prior to the SN explosion. One piece of evidence supporting this conclusion is the direct detection of the so-called precursors (luminous outbursts) in the months to years prior to the SN explosion (e.g., \citealt{Foley2007, Pastorello2007, Fraser2013, Ofek2013, Ofek2014c, Ofek2016, Elias-Rosa2016, Thone2017}). Several theoretical mechanisms have been suggested to explain extreme mass-loss episodes in the final stages of stellar evolution (e.g., \citealt{Woosley2007,Quataert2012,Chevalier2012b,Soker2016}). While in normal core-collapse SNe, the radiation-mediated shock breaks out upon reaching the stellar surface, producing a strong blast in the $UV$ and X-rays \citep{Nakar2010,Rabinak2011}, in the case of SNe IIn the ejecta may crash into the optically thick CSM. The radiation-dominated and radiation-mediated shock runs into the CSM surrounding the star and goes on propagating into it as long as $\tau \gtrapprox c/v_{sh}$, where $\tau$ is the optical depth from the shock to the edge of the wind, $v_{sh}$ is the shock velocity, and $c$ is the speed of light (e.g., \citealt{Ofek2010}). When $\tau \sim c/v_{sh}$, (this condition is verified when the timescale for photons to diffuse from the shocked region to the photosphere becomes comparable to the dynamical timescale of the shock), the shock breaks out: photons diffuse ahead of the shock faster than the ejecta and radiation can escape ahead of the shock \citep{Weaver1976}. After the shock breakout, in the presence of massive CSM above the shock, the radiation-dominated shock transforms into a collisionless shock \citep{Katz2011,Murase2011,Murase2014}. The collisionless shock slows down the ejecta and converts its kinetic energy into hard X-ray photons \citep{Katz2011,Murase2011,Murase2014}. If the optical depth of the CSM above the shock is high enough, the X-rays generated in the collisionless shock are converted into $UV$ and visible radiation (e.g., \citealt{Chevalier2012, Svirski2012}). Without a sufficient optical depth though, the bulk of the X-ray photons will not convert into optical photons. As far as a spectral signature is concerned, the common picture explaining SNe IIn observations is as follows. As long as the CSM is optically thick, the photosphere which emits the continuum is located in the unshocked CSM, masking the observer's view of the shock. The radiation from the shock propagates upstream and photoionizes the slowly moving CSM, resulting in relatively narrow Balmer recombination emission lines in the SN spectrum. As the shock reaches the optically thin medium, broader components can appear in the spectrum - maybe arising from the shocked zone forming at the contact discontinuity between the decelerated ejecta and the shocked CSM \citep{Chugai2004}. Alternatively, if the CSM is optically thin, the lines may be generated in inner regions (e.g., \citealt{Chevalier1994}) Observing SNe IIn at wavelengths where the collisionless shock radiates most - namely $UV$ and X-rays - has the potential to unveil precious information about the explosion mechanism and the CSM properties (e.g., \citealt{Ofek2013a}). In particular, it may provide a much better estimate of the bolometric luminosity of the event. In this paper, we present and analyse the $UV$ and visible-light observations of PTF\,12glz, a SN IIn observed in a joint campaign by \textit{GALEX} and the Palomar Transient Factory (PTF) and detected in the $UV$. PTF\,12glz is one of the six SNe discovered during this campaign \citep{Ganot2016}. The survey was carried out as a proof-of-concept for the $ULTRASAT$ mission \citep{Sagiv2014}. Observations of SNe IIn are usually analyzed within the framework of spherically symmetric models of CSM. However, resolved images of stars undergoing considerable mass loss (e.g., $\eta$ Carinae; \citealt{Davidson1997, Davidson2012}), as well as polarimetry observations \citep{Leonard2000, Hoffman2008, Wang2008, Reilly2017} suggest that asphericity should be taken into account for more realistic modeling. Asphericity of the CSM has recently been invoked to interpret the spectrocopic and spectropolarimetric observations of the Type IIn SN SN2012ab \citep{Bilinski2017}. In this paper, we show that the light curve of PTF\,12glz may be interpreted as evidence for aspherical CSM. We present the aforementioned observations of PTF\,12glz in \S 2. In \S 3, we present the analysis of these observations and the puzzling inconsistency between the spectroscopic and photometric observations. In \S 4, we model the radiative diffusion of photons through an aspherical slab and propose a solution to this puzzle. We then summarize our main results in \S 5. In the Appendix, we make available \texttt{SLAB-Diffusion}, a computer code for modeling radiation through a slab of CSM. \section{Observations and data reduction} In this section, we present the observations of PTF\,12glz by the \textit{GALEX}/PTF $UV$ wide-field transient survey. This campaign, conducted during a nine-week period from 2012 May 24 through 2012 July 28, used the \textit{GALEX} $NUV$ camera to cover a total area of about $600$ deg$^2$ over 20 times with a three-day cadence, while PTF observed the same region with a two-day cadence \citep{Ganot2016}. \subsection{Discovery}\label{sec:discovery} PTF\,12glz was discovered on 2012 July 7 by the PTF \citep{Law2009,Rau2009} automatic pipeline reviewing potential transients in the data from the PTF camera mounted on the $1.2$\,m Samuel Oschin telescope (P48, \citealt{Rahmer2008}). The image processing pipeline is discussed in \cite{Laher2014} and the photometric calibration is described in \cite{Ofek2012}. The SN is associated with an $r=18.51$ mag galaxy, SDSS\footnote{Sloan Digital Sky Survey; \cite{York2000}}J155452.95+033207.5, shown in Figure~\ref{fig:host}. The coordinates of the object, measured in the PTF images are $\alpha=15^h54^m53^s.04$, $\delta=+03^d32'07''.5$ (J2000.0). The redshift $z=0.0799$ and the distance modulus $\mu=37.77$ were obtained from the spectrum and the extinction was deduced from \cite{Schlafly2011} and using the extinction curves of \cite{Cardelli1989}. All these parameters are summarized in Table~\ref{table:param}. Previous PTF observations were obtained in the years prior to the SN explosion and the most recent non-detection was on 2012 June 25. We present a derivation of the explosion epoch in \S~\ref{sec:bolo}. \begin{figure} \begin{center} \includegraphics[scale=.35]{./12glz_new.png} \includegraphics[scale=.35]{./12glz_ref.png} \includegraphics[scale=.35]{./12glz_sub.png} \includegraphics[scale=.40]{./Screenshot_ds9.png} \caption{Top panels: (left to right) the discovery image, reference image, and subtracted P48 image of PTF\,12glz. Lower panel: the SDSS image of J155452.95+033207.5, the host of the supernova PTF\,12glz. The box encircles the host: $\alpha=238.72100^\circ$ and $\delta=3.53542^\circ$. Credit: SDSS.}\label{fig:host} \label{fig:lc} \end{center} \end{figure} \begin{deluxetable}{lr} \tablecolumns{2} \tablewidth{0pt} \tablehead{\colhead{Parameter}&\colhead{Value}} \startdata right ascension $\alpha$ ($J2000$)& $238.721000$\,deg \\%$15^h54^m53^s.04$\\%& - \\ declination $\delta$ ($J2000$)& $3.535421$\,deg\\ redshift $z$&$z = 0.0799$\\%& from H${\rm \alpha}$ \\ distance modulus $\mu$&$37.77$\,mag\\ galactic extinction $E_{B-V}$&$0.13$\,mag\\ \enddata \tablecomments{Summary of PTF\,12glz observational parameters.} \label{table:param} \end{deluxetable} \subsection{Photometry} PTF\,12glz was observed in multiple bands for almost three years after discovery. The SN was monitored during a rising phase ($t<36$ days) and a decay phase ($t>243$ days) but not around peak luminosity. All the light curves are shown in Figure~\ref{fig:lc}. The photometry is reported in electronic Table~\ref{table:photo} and is be available via WISeREP\footnote{https://wiserep.weizmann.ac.il}. \textit{GALEX} observations of the PTF\,12glz field started on 2012 May 26 and 15 observations were obtained with a cadence of $\sim3$ days. The \textit{GALEX NUV} camera was operating in scanning mode and observed strips of sky in a drift-scan mode with an effective average integration time of $80\,\rm{s}$, to a $NUV$ limiting magnitude of 20.6 mag [AB]. The \textit{GALEX} data reduction was done using tools\footnote{MATLAB Astronomy \& Astrophysics Toolbox, https://webhome.weizmann.ac.il/home/eofek/matlab/} by \cite{Ofek_matlab}. The P48 telescope was used with a $12$K$\times 12$K CCD mosaic camera \citep{Rahmer2008} and a Mould $R$-band filter. Data were obtained with a cadence of $\sim2$ days, to a limiting magnitude of $\rm{R}\approx21$ mag [AB]. For the data reduction of the P48 data, we used a pipeline developed by Mark Sullivan \citep{Sullivan2006,Firth2015}. The robotic $1.52$\,m telescope at Palomar (P60; \citealt{Cenko2016}) was used with a $2048\times2048$-pixel CCD camera and $g'$, $r'$, $i'$ SDSS filters. Data reduction of the P60 data was performed using the FPipe pipeline \citep{Fremling2016}. We calibrated the P60 data in the following way. The $r$-band light curve was scaled so that its average value during the time window covered by both telescopes matches the average value of the P48 $R$-band photometric data. The $g$-band and $i$-band data were scaled to match the synthetic photometry of the calibrated spectroscopic data (\S~\ref{sec:obs-spectroscopy}). The synthetic photometry used for the calibration and for other purposes in this paper was computed with the PyPhot\footnote{http://mfouesneau.github.io/docs/pyphot/} pipeline (Fouesneau, in preparation) Although the photometric data available for PTF\,12glz do not cover the peak, the data during the rise and decay allow to place an upper limit on the absolute magnitude at peak: with $M_r\lesssim-20$, PTF\,12glz is at the bright-end of the observed SNe IIn, together with e.g., SN 2006gy \citep{Ofek2007,Smith2007}, SNe 2008fq \citep{Thrasher2008,Taddia2013} or SN\,2003ma \citep{Rest2009,Rest2011}. In particular, it is brighter than all SNe in the sample by \cite{Kiewe2012}, which was designed to be unbiased. \begin{deluxetable}{llll} \tablecolumns{4} \tablewidth{0pt} \tablecaption{} \tablehead{\colhead{Epoch (days)}&\colhead{Counts (arb.)}&\colhead{Mag (magAB)}&\colhead{Instrument}} \startdata $11.24$ &$0.75\pm0.13$&$20.38\pm0.28$ & \textit{GALEX}nUV\\ $9.71$ &$362.30\pm86.30$&$20.60\pm0.26$& P48/R\\ $185.48$ &-&$19.01\pm0.06$ & P60/g'\\ $185.48$ &-&$18.85\pm0.04$ & P60/r'\\ $185.48$ &-&$18.40\pm0.05$ & P60/i' \enddata \tablecomments{{\bf Photometry.} This table is available in its entirety in machine-readable format in the online journal. A portion is shown here for guidance regarding its form and content. Time is shown relative to the estimated epoch at which the extrapolated light curve (based on Equation~\ref{eq:bolometric luminosity}) is crossing zero: $t_{0}=2456097.58$ (2012 June 19), as derived in \S~\ref{sec:bolo}. To compute the apparent magnitudes from the counts, the zero-point for the $nUV$ data is $ZP_{nUV}=20.08$ and the zero-point for the P48 data is $ZP_{P48}=27.00$.} \label{table:photo} \end{deluxetable} \begin{figure*} \begin{center} \includegraphics[scale=.80]{./LC_abs_mag_P48_P60_wRAdecay_log.pdf} \caption{The light curve of PTF\,12glz. Time is shown relative to the estimated epoch at which the extrapolated light curve (Equation~\ref{eq:bolometric luminosity}) is crossing zero: $t_{0}=2456097.58$ (2012 June 19), as derived in \S~\ref{sec:bolo}. Black dashed lines indicate dates at which spectroscopic data exist.} \label{fig:lc} \end{center} \end{figure*} \subsection{Spectroscopy}\label{sec:obs-spectroscopy} Four optical spectra of PTF\,12glz were obtained using the telescopes and spectrographs listed in Table~\ref{table:obs}. The two first spectra were taken during the light curve rise, and the two last ones during the decay, at the dates shown in Table~\ref{table:obs}. The spectra were used to determine the redshift $z = 0.0799$ from the narrow host lines (H${\rm \alpha}$ and [OIII]). All the observations were corrected for a galactic extinction of $E_{B-V}=0.13$\,mag, deduced from \cite{Schlafly2011} and using \cite{Cardelli1989} extinction curves. The spectroscopic observations were calibrated in the following way: the first two and the last spectra, for which we have contemporaneous P48 $R$-band data, were scaled so that their synthetic photometry matches the P48 $R$-band value. The third spectrum was scaled in the same way using the overlapping P60 $r$-band data instead. The first and last spectra are shown in Figure~\ref{fig:spectra} (the first two spectra are very similar, as well as the last two spectra) and all spectra are available from the Weizmann Interactive Supernova data REPository\footnote{https://wiserep.weizmann.ac.il} (WISeREP, \citealt{Yaron2012}). \begin{figure*} \begin{center} \includegraphics[scale=.55]{./fig2_1507_nocorr.pdf} \includegraphics[scale=.55]{./fig2_0905_nocorr.pdf} \caption{The earliest (left) and latest (right) observed spectra of PTF\,12glz. Both spectra were calibrated to the $R$-band photometric measurement. Dashed lines indicate the redshifted emission lines for the Balmer series. Black stars show the combination of the observed ($NUV$ and P48 $R$-band) and synthetic ($g$, $r$ and $i$ sdss bands) photometry. The dashed red line shows the blackbody curves that best fits the photometric data (and the best fit values are shown in the box with dashed contours), while the green continuous line shows the blackbody curve that bests fit to the spectroscopic data (and the best fit values are shown in the box with dashed contours). (A color version of this figure is available in the online journal). \label{fig:spectra} \end{center} \end{figure*} \begin{deluxetable}{lll} \tablecolumns{3} \tablewidth{0pt} \tablehead{\colhead{Date}&\colhead{Facility}&\colhead{Reference}} \startdata 2012 July 15&P200 &\cite{Oke1982}\\ 2012 July 26&P200 &-\\ 2013 February 9&LRIS&\cite{Oke1994}\\ 2013 May 9&LRIS&-\\ \enddata \tablecomments{Spectroscopic observations of PTF\,12glz. The double-beam spectrometer \citep{Oke1982} mounted on the $200$ " Hale telescope at Palomar was used with a 1'' slit, the $5500\rm \AA$ dichroic and the $316/7150$ grating positionned at a grating angle of $24\,\rm deg\,38.2\, \rm min$. The Low-Resolution Imaging Spectrometer (LRIS) \citep{Oke1994} spectrometer mounted on the $10$\,m Keck I telescope was used with a 1'' slit, the $5600\rm \AA$ dichroic and the $400/3400$ grism on the blue side.} \label{table:obs} \end{deluxetable} \section{Analysis} \subsection{Spectroscopy}\label{sec:analysis_spectroscopy} The two early spectra, obtained during the rise of the light curve, are characteristic of interacting SNe: a blue continuum with strong and narrow Balmer lines, as well as weak He I ($5876$\AA, $7065$\AA) narrow lines. At short wavelengths, the spectra show absorption from iron, as seen, for example, in SN\,2010jl\footnote{https://wiserep.weizmann.ac.il}. We fitted a blackbody spectrum to the six-point spectral energy distribution (corrected for redshift and extinction) obtained by combining (1) the observed photometry in the $NUV$ and P48 $R$-band (2) the synthetic photometry of the spectra in the $g$, $i$ and $r$ SDSS bands. The best-fit temperatures and radii are shown in Table~\ref{table:sp-analysis} and Figure~\ref{fig:evo_param_TR} (as stars). In Figure~\ref{fig:spectra}, we show the synthetic and observed photometry derived for the earliest spectrum, on which is superimposed the calibrated spectrum and the best blackbody fit. Both early spectra show strong and narrow Balmer lines, which for SNe IIn are interpreted as coming from the slow, unshocked, photoionized CSM. Their broad Lorentzian wings may be the signature of electron scattering, as the H${\rm \alpha}$ photons diffuse ahead of the shock through the dense CSM (e.g., \citealt{Chugai2001}). After subtracting the best-fit continuum from the spectra, we fitted the narrow H${\rm \alpha}$ lines. We tried several linear combinations of Gaussian and Lorentzian functions: the best fit is a superposition of a narrow Gaussian component with $\rm FWHM\approx100 - 200$\,km\,s$^{-1}$ (i.e., unresolved), which we interpret as tracing the slow unshocked CSM and an intermediate Lorentzian component with $\rm FWHM\approx500 - 700$\,km\,s$^{-1}$ (if some of the line-broadening comes from electron scattering, this is an upper limit of the CSM speed). The derived speeds and offsets are shown in Table~\ref{table:sp-analysis}. Figure~\ref{fig:broad_lines} shows the line and the best fit for the latest spectrum. No signature of expanding material is visible in the spectrum at this stage, which is consistent with a thick CSM obstructing the view of the SN ejecta at early times. We will show in \S~\ref{sec:peculiar_r} how the photometric data are inconsistent with this picture. The fits mentioned above, as well as all those mentioned in the rest of this paper, were performed using the {\tt emcee} algorithm \citep{Foreman2013} to sample from the posterior probability distribution. We then used the ten combinations with the lowest $\chi^2$ from the Monte Carlo Markov chain as initial conditions for an optimization algorithm to compute the best fit value (the maximum {\it a posteriori} value, in the terminology of \citealt{Hogg2010}). When errors are noted, they correspond to the $1\sigma$ limits of the marginalized posterior distributions. \begin{figure} \includegraphics[scale=.55]{./best_fit_components_vaxis.pdf} \caption{The H${\rm \alpha}$ line profile on 2012 July 15 (earliest spectrum). The bold black line shows the observed spectrum. The red dotted line and blue dashed line are the narrow Gaussian (G) and intermediate-width Lorentzian (L) whose linear combination (in grey continuous line) best fits the data. The origin of the x-axis indicates the location of the H${\rm \alpha}$ line at the host galaxy, at redshift $z=0.0799$. The vertical lines indicate the center of each component: the narrow component is blueshifted by $\sim-30$\,km\,s$^{-1}$ and the intermediate-width component is blueshifted by $\sim-50$\,km\,s$^{-1}$.} \label{fig:narrow_lines} \end{figure} The interpretation of the late-time spectra of Type IIn SNe should be made with the complexity caused by CSM interaction in mind. In ``normal'' type II SNe, the ejecta that become optically thin at late times are heated from the inside by two sources of energy: (1) remaining thermal deposition from the original heat of the explosion and (2) radioactivity. The late, or ``nebular'' spectrum shows no clear continuum, and its emission lines reflect the expansion of the ejecta in which they formed. In SNe IIn, the CSM interaction may continue to dominate the spectrum at late times, e.g., because the ejecta is heated by the shock wave propagating backward from the CSM into its outermost layers \citep{Chevalier2003}. The two late-time spectra of PTF\,12glz look similar (the latest spectrum is shown in Figure~\ref{fig:spectra}): they show a weak continuum in the red, a pseudo-continuum presumably formed by the superposition of narrow [Fe II] emission lines in the blue (e.g. \citealt{Kiewe2012}) and several broad emission lines. The temperatures and radii derived by fitting a blackbody curve to the observed spectrum are listed in Table~\ref{table:sp-analysis} and compared to the parameters derived from photometry in Figure~\ref{fig:evo_param_TR}. Both spectra show broad Balmer emission lines. The derived speeds and redshifts are presented in Table~\ref{table:sp-analysis} and Figure~\ref{fig:broad_lines} shows the line and the best fit for the latest spectrum. The H${\rm \alpha}$ lines are best fit by a linear combination of an intermediate-width Gaussian component with $FWHM\approx2000$\,km\,s$^{-1}$ that is offset to the blue by $\approx250$\,km\,s$^{-1}$ relative to the galaxy rest-frame and a broad Gaussian component with $FWHM\approx8000$\,km\,s$^{-1}$ that is offset to the blue by $\approx1000$\,km\,s$^{-1}$ relative to the galaxy rest frame. The intermediate-width component could come from the shocked gas in a cold dense shell forming at the contact discontinuity between the decelerated ejecta and the shocked CSM, which is reheated by X-rays and $UV$ radiation from the shock. The broad component velocities are too high to originate from the CSM: they are rather characteristic ejecta velocity values. We deduce from these velocities that the ejecta has - at least partially - emerged through the optically thick layers of the CSM. At short wavelengths, the spectra show a blue bump that we interpret as a blend of Fe\,II narrow P-cygni profiles, which may come from the initial metalicity abundance of the star \citep{Kiewe2012}. Both late spectra also show emission from the the Ca [II] IR triplet. This is commonly seen in late time-interacting SNe, e.g., in the type IIn SN\,2005ip \citep{Boles2005,Stritzinger2012}, the type Ic SN\,2007dio \citep{Kuncarayakti2018} and the type Ia-csm PTF\,11kx \citep{Dilday2012,Silverman2013,Graham2017}. \begin{figure} \includegraphics[scale=.55]{./best_fit_components_vaxis_broad.pdf} \caption{The H${\rm \alpha}$ line profile on 2013 May 09 (latest spectrum). The bold black line shows the observed spectrum. The red dotted line and blue dashed line are the intermediate-width and broad Gaussian (G) components whose linear combination (in grey) best fits the data. The vertical lines indicate the center of each component: the narrow component is blueshifted by $\approx-230$\,km\,s$^{-1}$ and the intermediate-width component is blueshifted by $\approx-830$\,km\,s$^{-1}$.} \label{fig:broad_lines} \end{figure} \begin{deluxetable*}{lllllllll} \tablecolumns{9} \tablewidth{0pt} \tablecaption{} \tablehead{Date &\multicolumn{2}{c}{Continuum} & \multicolumn{2}{c}{H${\rm \alpha}$ narrow comp.} &\multicolumn{2}{c}{H${\rm \alpha}$ intermediate comp.}&\multicolumn{2}{c}{H${\rm \alpha}$ broad comp.}} \startdata &$T_{BB}$ &$R_{BB}$&$\Delta v$&$FWHM$&$\Delta v$&$FWHM$&$\Delta v$&$FWHM$ \\ &[K]&[$10^{15}$cm]&[km\,s$^{-1}$]&[km\,s$^{-1}$]&[km\,s$^{-1}$]&[km\,s$^{-1}$]&[km\,s$^{-1}$]&[km\,s$^{-1}$]\\ \hline \\ 2012 July 15&$13440^{+830}_{-460}$&$1.31^{+0.14}_{-0.14}$&$-35$&$110$&$-50$&$680$&-&- \\ 2012 July 26&$11310^{+1080}_{-460}$&$1.91_{-0.32}^{+0.22}$&$-80 $&$240$&$-100$&$530$&-&-\\ 2013 February 09&$8200^{+340}_{-350}$&$2.56_{-0.20}^{+0.24}$&-&-&$-270$&$1990$&$-1070$&$8580$ \\ 2013 May 09&$8100^{+420}_{-390}$&$2.15_{-0.22}^{+0.26}$&-&-&$-240$&$2310$&$-830$&$7470$ \\ \enddata \tablecomments{The table shows the best fit values of the continuum and H${\rm \alpha}$ lines in the four spectra of PTF\,12glz. The early spectra are best fit with a linear combination of a narrow Gaussian component (left column) and an intermediate-width Lorentzian component (central column). The late spectra are best fit with a linear combination of an intermediate-width Gaussian component (central column) and a broad Gaussian component (right column). $\Delta z$ is the shift of the centre of each component compared to the galaxy rest frame (the negative values mean that the component is blueshifted).} \label{table:sp-analysis} \end{deluxetable*} \subsection{The peculiar evolution of the blackbody radius}\label{sec:peculiar_r} Taking advantage of the multiple-band photometry coverage, we derived the temperature and radius of the blackbody that best fits the photometric data at each epoch (after interpolating the various data sets to obtain data coverage of coinciding epochs, and deriving the errors at the interpolated points with Monte Carlo Markov chain simulations). The derived best-fit temperatures $T_{BB}$ and radii $r_{BB}$ are shown in Figure ~\ref{fig:evo_param_TR}. In most epochs, this method implies fitting a blackbody spectrum to a two-point spectral energy distribution. Comparison with results derived from more constraining data detailed in \S~\ref{sec:analysis_spectroscopy} - either spectroscopy (shown in red) or a combination of observed and synthetic photometry (shown in green) - suggests that this method leads to a slight overestimation of the radius and underestimation of the temperature The temperature $T_{BB}$ drops from $\approx15000$\,K to $\approx8000$\,K during the rise and is stable at $\approx6000$\,K during the decay phase. The decrease of $T_{BB}$ at early time is well fitted by a power law $t^n$ with index $n=-0.6$ and is consistent with the temperature evolution observed in the sample by \cite{Taddia2013}. However, PTF\,12glz is relatively hot compared to the SNe IIn of this sample, where temperatures span between $11500$\,K and $5500$\,K, and compared to other well studied SNe IIn (e.g., 2006gy, \citealt{Ofek2007, Smith2007}; SN 2005ip, \citealt{Smith2009b}; SN 2010jl, \citealt{Ofek2014}). The derived radius grows by an order of magnitude, from $r_{BB}\approx6\times10^{14}$ cm to $r_{BB}\approx3\times10^{15}$ cm during the rising phase and is $\approx4\times10^{15}$ cm during the light curve decay phase. Such a rise is puzzling within a picture where the optically thick CSM is supposed to mask the shock and the expanding material. To our knowledge, the measured blackbody radius of all SNe IIn observed to date either stalls after a slight increase (e.g., 2005kj, 2006bo, 2008fq, 2006qq, \citealt{Taddia2013}; 2006tf, \citealt{Smith2008}), or stays relatively constant at early times (e.g., SN2010jl \citealt{Ofek2014}), or even supposedly shrinks (e.g., SN2005ip; SN2006jd, \citealt{Taddia2013}). Whereas a constant radius is consistent with the continuum photosphere being located in the unshocked optically thick CSM, the possible presence of clumps in the CSM that may expose underlying layers, has been invoked by \cite{Smith2008} to interpret observations of a stalling or shrinking radius In our case, the velocity at which $r_{BB}$ grows, reaches $\approx8000$\,km\,s$^{-1}$, a value too large to trace the unshocked layers of the CSM or even the reverse shock. One may naively think that if the CSM was optically thin, then the observed radius would grow. However, in this case, it would be hard to convert efficiently the hard X-ray produced by the colisionless shock into optical radiation. In \S~\ref{sec:discussion} we propose one possible geometrical solution to this puzzle. \begin{figure}\label{fig:evo} \begin{center} \includegraphics[scale=.43]{./R_T_evo_from_spectra_and_photo_log_same_xaxis.pdf} \caption{The evolution in time of: (1) the radius (top panel), (2) the temperature (lower panel) of a blackbody with the same radiation as PTF\,12glz. The points were obtained by fitting a blackbody spectrum to the observed photometry, after interpolating the various data sets to obtain data coverage of coinciding epochs. The errors were obtained with Monte Carlo Markov chain simulations. The stars indicate the values derived by fitting a blackbody to the spectroscopic data. The dashed line in the top panel shows the best linear fit to the rising radius phase: a linear function with a slope of $\approx8000$\,km\,s$^{-1}$. At late times, the blackbody model for the spectral energy distribution may not be valid anymore (see e.g. right panel in figure~\ref{fig:spectra}): these points are shown in grey to emphasise that they are less reliable and should be taken cautiously.} \label{fig:evo_param_TR} \end{center} \end{figure} \subsection{Bolometric light curve}\label{sec:bolo} Based on the measurement of $r_{BB}$ and $T_{BB}$, we were able to derive the luminosity $L_{BB}=4\pi R^2\sigma T^4 $ of the blackbody fits, shown in Figure~\ref{fig:evo_param_L}. Since PTF\,12glz was not observed at peak luminosity, we can only derive a lower limit on the peak luminosity $L_{BB,peak}>4\times10^{43}\,\rm erg\,s^{-1}$. This makes PTF\,12glz more luminous than SN\,2008fq - the brightest SN of the \cite{Taddia2013} sample - and brighter than all but one SNe of the sample by \cite{Ofek2014b}. This suggests that PTF\,12glz is at the bright end of the SNe IIn luminosity range. We fitted the light curve during the rise time with a function of the form \begin{equation}\label{eq:bolometric luminosity} L=L_{\rm{max}}\{ 1-\exp{[(t_{0}-t)/t_c]} \}\;, \end{equation} (where $t_{0}$ is the time of zero flux, $L_{\rm{max}}$ is the maximum bolometric luminosity, and $t_{c}$ is the characteristic rise time of the bolometric light curve). This allowed us to estimate the epoch at which the extrapolated light curve is crossing zero, which is used throughout this paper as the reference time $t_{0}\,\rm{(MJD)}=56097.58$. As shown in Figure~\ref{fig:evo_param_L}, $L_{BB}$ decreases about twice as slowly as the 0.98\,mag/100\,d decline rate characteristic of the radioactive decay of ${}^{56}$Ni to ${}^{56}$Co and then to ${}^{56}$Fe. If this decline was produced by the radioactive decay of ${}^{56}$Ni, a Nickel mass of at least $14\,\rm{M}_{\odot}$ would be required to reach the bolometric luminosity of PTF\,12glz (see Figure~\ref{fig:evo_param_L}). The evolution of $L$ should be taken cautiously, since at late time, a blackbody model for the spectral energy distribution may not be valid anymore, and so the temperatures and radii used to calculate $L$ are less reliable Although the late spectra analyzed in \S~\ref{sec:analysis_spectroscopy} suggest that the ejecta may have emerged through the CSM at late times, the slow decline of $L_{BB}$ hints at the fact that interaction may still play an important role in the radiation budget (this may happen through radiation from the reverse shock, or through processed radiation through the edge of the wind, or if the ejecta has only partially emerged through the CSM and is still interacting with it in some places) \begin{figure} \begin{center} \includegraphics[scale=.55]{./L_evo_from_spectra_and_photo_log_wRAdecay.pdf} \caption{The evolution in time of the bolometric luminosity of a blackbody with the same radiation as PTF\,12glz. The stars indicate the fits to the spectroscopic data. The dashed line shows the variation in luminosity caused by $14.3\;\rm{M_{\odot}}$ of ${}^{56}$Ni radioactively decaying to ${}^{56}$Co and then to ${}^{56}$Fe. $L_{BB}$ decays $\approx2$ times slower, which suggests that radioactive decay is not sufficient to explain the decay of the light curve and that interaction or other sources of radiation play a role. \label{fig:evo_param_L} \end{center} \end{figure} \subsection{Mass of the CSM}\label{sec:mass} A very crude estimation of the swept-up CSM mass can be obtained by assuming that the ejecta mass is comparable to the mass of the CSM and that the bolometric luminosity $L$ is accounted for by the conversion of the kinetic energy of the ejecta into radiation \begin{equation}\label{eq:crude} \int_{t}L(t)dt\lesssim\frac{1}{2}M_{\rm{CSM}}v_e^2\;, \end{equation} where $M_{\rm{CSM}}$ is the mass of the CSM and $v_e$ is the velocity of the ejecta. To an order of magnitude, this estimate will not be very different than estimates based on more realistic treatment of the hydrodynamics (e.g., \citealt{Ofek2014}). We use the width $FWHM\approx8000$\,km\,s$^{-1}$ of the broad H${\rm \alpha}$ component at late time (see section~\ref{sec:analysis_spectroscopy}) as an approximation of the ejecta velocity $v_e$. From the measured bolometric luminosity shown in Figure~\ref{fig:evo_param_L}, $\int_{t}L(t)dt\approx10^{51}$ erg. Substituting this value in Equation~\ref{eq:crude} gives $M_{\rm{CSM}}\gtrsim 2M_{\odot}$ In interacting SNe, the optically thick CSM masks the explosion, which may leave an ambiguity about the underlying explosion type. In particular, type Ia SNe and core-collapse SNe exploding inside a thick CSM would result in similar observational signatures. The spectra would look similar at early time (as long as the explosion is masked by the CSM) and at very late times, when Ni has decayed and there is no more energy to illuminate the ejecta and create absorption lines in the spectrum. Here, the high value of the bolometric luminosity excludes the possibility that PTF\,12glz is a masked SN Ia. Another order of magnitude estimate of the mass can be obtained by assuming a wind density profile, $\rho_{\rm{CSM}}(r)=K\,r^{-2}$ and using the photon diffusion timescale (e.g., \citealt{Ofek2010}), \begin{equation} t_{d}\sim\frac{\kappa K}{c}\;, \end{equation} where $\kappa$ is the CSM opacity. We assume $t_d\sim t_c$, where $t_c$ is the characteristic rise time of the bolometric light curve. We estimate $t_c$ by fitting the rising part of the bolometric light curve with the exponential function defined in Equation~\ref{eq:bolometric luminosity} and assuming $\kappa\approx0.34$\,cm$^2$\,g$^{-1}$. We obtain $t_{c}\sim20$ da , and $K\approx1.5\times10^{17}\,\rm{g\,cm}^{-1}$, which corresponds to high values of the density $\rho_{\rm{CSM}}\gtrsim10^{-14}\,\rm{g\,cm}^{-3}$ (or a particle density of $n\sim10^{10}\,\rm{cm}^{-3}$, assuming a mean number of nucleons per particle $\langle\mu_p\rangle=0.6$) at the radii shown in Figure~\ref{fig:evo_param_TR} Measuring $K$ allows us to estimate the mass of the CSM swept up by the ejecta, $M_{\rm{CSM}}(r)\sim4\pi K r$ (assuming that the CSM extends on much higher scales than the stellar radius). Using the highest early-time radius $r_{BB}$, shown in Figure~\ref{fig:evo_param_TR}, as a lower limit of the maximum size of the shell of CSM surrounding the explosion, gives $M_{\rm{CSM}}\gtrsim3\,\rm{M}_{\odot}$, in good agreement with the estimates obtained with Equation~\ref{eq:crude} For a wind density profile, $K=\dot{M}/(4\pi v_{w})$, where $v_w$ is the velocity of the CSM. Therefore, measuring $K$ also gives us an estimation of the mass-loss rate. Using the width of the narrow H${\rm \alpha}$ component during rise time, $FWHM\approx200$\,km\,s$^{-1}$, as a proxi of $v_w$ (see Table~\ref{table:sp-analysis}), we obtain a large mass-loss rate $\dot{M}\sim0.6\; M_{\odot}$ yr$^{-1}$, higher than the mass-loss rates observed in \cite{Taddia2013} and \cite{Kiewe2012} and comparable to the mass-loss rate of e.g., iPTF13z \citep{Nyholm2017}. Combining these estimates suggests that the CSM mass was ejected on a timescale of $1$ to $10$ years prior to the SN explosion. We wish to emphasize that we made several simplifying assumptions in this section. In particular (1) we assumed a spherical symmetry of the CSM, (2) we assumed a wind profile of the CSM and (3) we assumed that the kinetic energy of the ejecta converts efficiently into radiation. Therefore, the numbers above have to be considered as order of magnitude estimates. \subsection{Dust formation?} At late times, the broad component of the H${\rm \alpha}$ Balmer line is blueshifted by $\approx1000$\,km\,s$^{-1}$ relative to the galaxy rest frame. The intermediate component is also blueshifted, but by a velocity of $\approx250$\,km\,s$^{-1}$ which is consistent with a typical stellar velocity within the galaxy (see Table~\ref{table:sp-analysis} and Figure~\ref{fig:broad_lines}). Several explanations have been proposed to explain the blueshift of emission line profiles in interacting SN. One possible explanation is the formation of dust which increasingly blocks the receding parts of the ejecta (e.g., as proposed in the case of the Type IIn SN\,2010\,jl, \citealt{Smith2012,Gall2014}). In our case, the blueshift of the broad component does not grow with time (see Table~\ref{table:sp-analysis}), meaning that if there is dust, it may have formed before the epoch of the first nebular spectrum. In our case, testing the wavelength dependency of the blueshift - a blueshift caused by dust would be stronger at bluer wavelengths - is tricky because the blended iron emission lines mask the structure of the $H\beta$ line profile. We tried to apply several filters on this area, to separate the possible broad Balmer components from Fe II blend structures, but the results remained inconclusive. Other explanations have been proposed for the blueshift of emission lines. \cite{Fransson2014}, for example, attributed the blueshift of emission lines to radiative acceleration of the preshock gas by the SN radiation, whereas \cite{Smith2012} proposed a geometric explanation. \section{Radiative diffusion through a slab}\label{sec:diffusion} The radiation from a SN exploding into a spherically symmetric CSM has been studied analytically, under simplifying assumptions (e.g., \citealt{Chevalier1982, Balberg2011,Ginzburg2014}) and numerically (e.g., \citealt{Falk1977, Moriya2014}). The case of an aspherical CSM has been explored to a lesser extent \citep{VanMarle2010, Mcdowell2018}. Exploring the expected effect of deviation from spherically symmetric CSM on the observables is all the more important since aspherical clouds of CSM around mass-ejecting stars seem to be common, e.g., in stars like $\eta$-Carinae \citep{Davidson1997} that have been proposed as SNe IIn progenitors (e.g., \citealt{Gal-Yam2007,Gal-Yam2009}). In this section, we attempt to determine whether a non-spherical geometry of the CSM around a SN can explain the growing radius and decreasing temperature observed in \S~\ref{sec:peculiar_r}. Solving for the exact shape of the CSM from a few observables in an ill-conditionned problem. Therefore, here our goal is merely to verify that a non-spherical geometry can explain the evolution of the observables. Given this goal, we consider a simple aspherical structure: a three-dimensional slab, infinite in two dimensions and perpendicular to the line of sight. \subsection{Model and assumptions} We have written a three dimensional computer program in python, \texttt{SLAB-Diffusion}, available on-line\footnote{https://github.com/maayane/SLAB-Diffusion}, in order to calculate the propagation of photons through a slab and simulate the main observables. The simple geometry we consider is illustrated in a cartoon in Figure~\ref{fig:cartoon}. Following a similar approach as in \cite{Ginzburg2014}, we replaced the hydrodynamical description of the SN explosion by a stationary model of the shock breakout. This is equivalent to neglecting the expansion of the gas due to the explosion and modelling the interaction between the shock and the CSM as an instantaneous deposition of energy in the slab. \begin{figure} \includegraphics[scale=.30]{./cartoon2} \caption{Sketch of the grid used to simulate radiative diffusion through a slab. The dimensions of the slab along the $e_x$ and $e_y$ coordinates are much larger than $h$, the dimension of the slab parallel to the line of sight. The initial energy of the explosion is deposited at $z=0$, at a distance $h/2$ from the edge of the slab.} \label{fig:cartoon} \end{figure} We assumed that the problem can be treated accurately within the diffusion approximation (i.e. assuming that $\tau\approx1$ occurs close to the surface). Hence, the energy density $u$ within the slab is described by the diffusion equation: \begin{equation}\label{eq:diffusion} \frac{\partial u}{\partial t}=\nabla\cdot(D\vec{\nabla}u)\;, \end{equation} where $D= c/(3{\kappa \rho})$ is the diffusion coefficient. Here we explored three density profiles: a constant density profile, $\rho$, and two functions of the $\vec{e_z}$ coordinate: $\rho\propto |z|^{-1}$ and $\rho\propto z^{-2}$, where the origin of the $z$-axis is at the center of the slab. We leave the treatment of the angular dependency of $D$ to further extensions of this work. At the boundaries, the energy escapes from the slab and the flux $\vec{f}$ is linked to the density of energy through \begin{equation} \lvert \lvert \vec{f}\rvert\rvert =\alpha c u\;, \end{equation} where $\alpha\approx1/4$ (the case $\alpha=1/4$ corresponds to isotropic radiation). We discretized Equation~\ref{eq:diffusion} in a cartesian, three-dimensional grid (illustrated in a cartoon in Figure~\ref{fig:cartoon}), using an explicit forward Euler scheme with $\Delta t D/(\Delta d)^2<0.1$ where $\Delta d$ is defined for each coordinate and is the size of the mesh in each direction $\vec{e_x}$, $\vec{e_y}$ and $\vec{e_z}$. We assumed that $D$ does not depend on the wavelength of the photons (i.e. we made the so called {\it grey} approximation). We solved a dimensionless version of Equation~\ref{eq:diffusion}: \begin{equation} \frac{\partial u}{\partial t'}=\nabla\cdot(D'(z)\vec{\nabla}u)\;, \end{equation} where $t'=tD(h)/h^2$ and $D'(z)=D(z)/D(h)$. In this case the boundary conditions are \begin{equation}\label{boundary} \lvert \lvert \vec{f}\rvert\rvert =\alpha vu\;\;\;\;,\;v=c/v_{d}\;, \end{equation} where $v_{d}=D(h)/h$. A slab with a width $h=10^{16}\,\rm cm$, an opacity $\kappa=0.34$\,cm$^2$\,g$^{-1}$ and a constant mass density $\rho=1\times10^{-16}\,\rm g\,\rm cm^{-3}$ (corresponding e.g., to $3\,M_{\odot}$ of CSM in a slab with $L_x=L_y=8\,h$), corresponds to the unitless velocity $v\approx1$ and a diffusion time $t_d=h^23\kappa\rho/c=94$\,days. In order to minimize the effect of the finite size of the grid along $\vec{e_x}$ and $\vec{e_y}$, we took several precautions. We chose the dimensions of the grid along the $\vec{e_x}$ and $\vec{e_y}$ directions so that $L_x=L_y$ and $L_x\gg h$. We checked that $L_x$ is large enough compared to $h$ so that a change in $L_x$ does not affect the results. Equation~\ref{boundary} only describes the boundary conditions along the $e_{\vec{z}}$ direction. We checked that we can apply reflective boundary conditions (i.e. $\vec{f}=\vec{0}$ at the boundaries) or absorbing boundary conditions (i.e. $u=0$ at the boundary) along the $\vec{e_x}$ and $\vec{e_y}$ directions, without affecting the results. We also checked for convergence of the code with respect to the time steps. \subsection{Results} As photons diffuse in the slab, they reach the $z=h/2$ surface visible to the observer (see Figure~\ref{fig:cartoon}). In Figure~\ref{fig:kernel}, we show the evolution of the total flux of energy escaping from the surface of a slab with $v=1$, in response to an instantaneous deposition of energy at $t=0$. We use the full-width at half maximum (FWHM) of the energy density $u$ at the surface of the slab as a proxy of the radius seen by the observer (below we present another proxy of $r_{BB}$). In Figure~\ref{fig:radius}, we show that the FWHM grows in time for all three checked density profiles $\rho=Const.$, $\rho\propto |z|^{-1}$ and $\rho\propto z^{-2}$. We checked that varying the parameter $v$ does not change this qualitative result We would like to check whether our model can reproduce the decrease of the blackbody temperature $T_{BB}$ observed in Figure~\ref{fig:evo_param_TR}, in addition to producing a growing radius. Here again, given the simplicity of our model geometry, we are interested in the evolution of $T_{BB}$ rather than trying to fit its actual values. By modeling each cell of the $z=h/2$ surface as a blackbody with temperature $T\propto u(x,y)^{1/4}$ and summing up all the cell spectra, we can compute the overall spectrum of the surface. The resultant spectrum is well represented by a blackbody spectrum, which allows us to deduce the blackbody temperature of the surface. This strategy also provides an additional way to recover the growing radius, by using: \begin{equation} L=\int_{S}f\,ds=\sigma T^4_{BB} 4\pi r_{BB}^2\;. \end{equation} In Figure~\ref{fig:temp}, we show the evolution of the temperature $T_{BB}$ and radius $r_{BB}$, assuming $h=1\times10^{15}\,\rm cm$, a constant mass density $\rho=3\times10^{-14}\,\rm g\,\rm cm^{-3}$ and an input energy of $10^{51}$\,erg. Using this energy (calculated in Equation~\ref{eq:crude}) as the energy initially deposited in the slab, is equivalent to assuming that all the energy radiated by the SN explosion is released by the time it starts diffusing out through the CSM. This is only correct within the simplistic assumption that the characteristic timescale for diffusion is much larger than the characteristic timescale for interaction between the ejecta and the CSM. Figure~\ref{fig:temp} shows that the aspherical geometry of the slab allows to recover the increase of the radius $r_{BB}$ and the decrease of the temperature $T_{BB}$ observed in Figure~\ref{fig:evo_param_TR}. \begin{figure} \center \includegraphics[scale=.50]{./kernel_flux_integrated_comparision_loglog.pdf \caption{Luminosity $L=\int_{S}f\,ds$ released at the surface of a slab with $v=1$, normalized so that the initial energy in the slab is 1. The luminosity is shown for a slab with a constant density profile (dashed line), a density profile $\rho\propto |z|^{-1}$ (dotted line) and a wind density profile $\rho\propto z^{-2}$ (continuous line).} \label{fig:kernel} \end{figure} \begin{figure} \center \includegraphics[scale=.50]{./radius_comparision.pdf} \caption{Full width at half-maximum (FWHM) of the density of energy $u$ at the surface of a slab with $v=1$. The FWHM is used as a proxy of the black body radius measured by the observer. The FWHM is shown for a slab with a constant density profile (dashed line), a density profile $\rho\propto |z|^{-1}$ (dotted line) and a wind density profile $\rho\propto z^{-2}$ (continuous line).} \label{fig:radius} \end{figure} \begin{figure} \begin{center} \includegraphics[scale=.40]{./edge_spectrum_BB_R_T_sameaxis.png} \caption{The evolution in time of: (1) the blackbody radius $r_{BB}$ (top panel) and (2) the blackbody temperature (lower panel) at the surface of a slab with constant density. The diffusion equation was solved with an input energy $E_i=10^{51}$\,erg deposited in a slab of width $h=10^{16}\,\rm cm$ and constant mass density $\rho=1\times10^{-16}\,\rm g\,\rm cm^{-3}$, corresponding to $t_d=h^23\kappa\rho/c=94$\,days. The spectrum of the $z=h/2$ surface was deduced by summing the blackbody spectra of all the cells of the surface and $T_{BB}$ was then deduced by fitting a blackbody to the resultant spectrum. The blackbody radius $r_{BB}$ was deduced through the relation $r_{BB}=\sqrt{L/(4\pi\sigma T^4)}$. The aspherical geometry of the slab allows to recover the increase of $r_{BB}$ and the decrease in $T_{BB}$.} \label{fig:temp} \end{center} \end{figure} \section{Conclusions}\label{sec:discussion} We presented the observations of the supernova PTF\,12glz by the \textit{GALEX} space telescope and ground-based PTF. Radioactive decay is not sufficient to explain the decay of the light curve of PTF\,12glz and therefore other physical mechanisms must be involved. One possible - yet difficult to verify - scenario is that an internal engine powers the light curve. Another possible scenario - the standard explanation invoked in the case of Type IIn SNe, is that the light curve is powered by interaction between the ejecta and the CSM surrounding the SN. In the case of PTF\,12glz, the spectroscopic analysis is consistent with the following picture: at early times (two first spectra) both the ejecta and the shock are initially masked by a thick, slowly moving, photoionized CSM. At later times (two last spectra), the ejecta have emerged through - at least some of - the optically thick layers and have reached CSM layers that are optically thin enough to expose the ejecta. CSM interaction may still play a role at late times, e.g., by heating the ejecta from the inside, and contributes to slowing the light curve decay. The evolution of $r_{BB}$ - the radius of the deepest transparent emitting layer - seems to contradict this picture. At early times, i.e., at the very time when the opaque CSM seemingly obstructs our view of any growing structure, $r_{BB}$ grows by an order of magnitude, at a speed of $\sim8000$\,km\,s$^{-1}$. In addition to being inconsistent with the spectroscopic analysis, this is also in contradiction - to our knowledge - with all previous observations of either a constant or stalling blackbody radius in SNe IIn (as detailed in \S~\ref{sec:peculiar_r}). If the bulk of the radiation from PTF\,12glz does come from interaction, the explanation for the growing blackbody radius may be geometrical. The question then is whether any peculiar structure of the CSM around the progenitor can reproduce the observations. In this work, we considered a simple aspherical structure of CSM: a slab. We modeled the radiation from an explosion embedded in a slab of CSM by numerically solving the radiative diffusion equation in a slab with different density profiles: $\rho=Const.$, $\rho\propto |z|^{-1}$ and a wind density profile $\rho\propto z^{-2}$. Although this model is simplistic, it allows recovery of the peculiar growth of the blackbody radius $r_{BB}$ observed in the case of PTF\,12glz, as well as the decrease of its blackbody temperature $T_{BB}$. This configuration is not a unique geometrical solution and additional observations, e.g., of the polarization around PTF\,12glz would have been necessary to make it less speculative. As new wide-field transient surveys such as the Zwicky Transient Facility (e.g., \citealt{Bellm2015,Laher2017}) are deployed, many more interacting SNe will be observed and quickly followed up with multiple-band observations. These may also be the brightest sources for the {\it ULTRASAT} $UV$ satellite mission \citep{Sagiv2014}. Some of these interacting SNe may exhibit the same peculiarities as PTF\,12glz. The methodology proposed in this paper offers a framework to analyze them. It could be elaborated upon, to model more complex aspherical geometries, e.g., $\eta$ Carinae-like shapes of the CSM, and give more quantitative predictions of the observables. \acknowledgments M.T.S. thanks Jonathan Morag, Adam Rubin, Yi Yang, Doron Kushnir, Anders Nyholm and Chalsea Harris for useful discussions. M.T.S. acknowledges support by a grant from IMOS/ISA, the Ilan Ramon fellowship from the Israel Ministry of Science and Technology and the Benoziyo center for Astrophysics at the Weizmann Institute of Science E.O.O is grateful for the support by grants from the Israel Science Foundation, Minerva, Israeli Ministry of Science, the US-Israel Binational Science Foundation, the Weizmann Institute and the I-CORE Program of the Planning and Budgeting Committee and the Israel Science Foundation. A.G.-Y. is supported by the EU via ERC grant No. 725161, the Quantum Universe I-Core program, the ISF, the BSF Transformative program, IMOS via ISA and by a Kimmel award. \bibliographystyle{apj}
\section{Background and Use Cases} \label{s:background} This section introduces current examples of DNI analyses and how they are implemented. These uses cases serve as the motivation for the system described in the rest of the paper. Appendix~\ref{sec:primer} provides a quick primer on Neural Networks (NNs) and explains the terminology. The important concept is that a NN is composed of hidden units, and when a NN is evaluated over an input record (e.g., a sequence of characters that form a sentence, or a matrix of pixels that form an image), each hidden unit performs an action that emits a behavior value (e.g., an activation, or the derivative of an activation) for each element of the record (e.g., character or pixel). We refer the reader to Appendix~\ref{sec:primer} for details. \subsection{Motivating Example} \label{ss:motivation} We use a recurrent model that performs SQL query auto-completion as a motivating example. Given a SQL string, the model can read a window of 100 characters (padded if necessary) and predict the character that follows. Technically, the neural net comprises three layers: one input layer that reads one-hot-encoded characters, one recurrent (LSTM) layer with 500 hidden units, and one fully connected layer for the final output. The analysis focuses on the recurrent layer. The model achieve 80\% prediction accuracy on a held-out test set of 1,152 queries, as compared with random guess accuracy of $\frac{1}{32}$. The statistics indicate that the model can reliably predict the next character, {\it but what did the model really learn?} One hypothesis is that the model ``memorized'' all possible queries. Another is that it learns an $N$-gram model that uses the previous $N-1$ characters to predict the next. Or the model learned portions of the SQL grammar, e.g., it learned that column references tend to follow the \texttt{SELECT} keyword and that table names usually come after \texttt{FROM} but not before \texttt{LIMIT}. Ideally, we would also like to check these hypotheses across models with different architectures or training parameters, or for a specific set of hidden units. \subsection{Approaches for Interpretation} \label{sec:approaches} The machine learning community has developed a variety of approaches for interpretation, which we discuss below. \label{sec:example} \begin{figure}[bt] \includegraphics[width=\columnwidth]{figures/background-activations} \vspace{-.1in} \caption{Activations over time for the SQL auto-completion model. What is the model learning?} \vspace{-.1in} \label{f:activations} \end{figure} \stitle{Manual Visual Inspection:} Manual approaches~\cite{strobelt2018lstmvis,karpathy2015visualizing}, such as LSTMVis~\cite{strobelt2018lstmvis}, visualize each unit's activations and let users manually check that the units behave as expected. For instance, if a unit only spikes for table names, it suggests that the model behaves akin to that grammar rule and possibly has ``learned'' it. Unfortunately, visual inspection can turn out to be challenging, even for simple settings. Figure~\ref{f:activations} plots the activations of 4 units on the prefix of a query. We easily observe that units are inactive when reading the padding character ``\texttt{\~}''. However, interpreting the fluctuations is difficult. $u_{12}$ appears to spike down on whitespaces (highlighted), mirrored by $u_{86}$. $u_{97}$ tends to activate within the words \texttt{FROM} and \texttt{table}. But those observations are simply guesses on a small string; scaling this manual analysis to all units and all queries is impractical. Ideally, we would express these hypotheses and formally test them at scale. \stitle{Saliency Analysis: } This approach seeks to identify the input symbols that have the largest ``effect'' on a single or group of units. For instance, an NLP researcher may want to find words that an LSTM's output is sensitive to~\cite{li2015visualizing}, or the image pixels that most activates a unit~\cite{girshick2014rich}. This analysis may use different behaviors, such as the unit activation or its gradient. Typically, the procedure collects a unit's behaviors, finds the top-k highest value behaviors, and reports the corresponding input symbols. For instance, whitespaces and periods trigger the five highest activations for $u_{86}$ in \Cref{f:activations}. This DNI approach has been used to analyze image object detection~\cite{simonyan2013deep,selvaraju2016grad,zhou2014object}, in NLP models~\cite{li2015visualizing} and sentiment analysis~\cite{radford2017learning}. \stitle{Statistical Analysis: } Many datasets are annotated: text documents are annotated with parse trees or linguistic features, while image pixels are annotated with object information. Such annotations can help analyze groups of units. In our SQL example, we could parse the query and annotate each token with the name of its parent rules (e.g., \texttt{where\_clause} or \texttt{variable\_name}). If we find a strong correlation between the activations of a hidden unit and the occurrence of a particular rule while running the model (e.g., ``hidden unit 99 has a high value for every token inside \texttt{WHERE} predicates''), then we have some evidence that the hidden unit acts as a detector for this rule~\cite{karpathy2015visualizing}. We could take the analysis further and test \emph{groups} of hidden units: if we build a classifier on top of their activations and find that it can predict the occurrence of grammar rules with high accuracy, then we have evidence that those neurons behave \emph{collectively} as a detector~\cite{alain2016understanding,belinkov2017neural}. Statistical analysis of hidden unit activations is a widespread practice in the machine learning literature. For instance, Kim et. al~\cite{kim2017tcav} use logistic regression to predict annotations of high-level concepts from unit activations. NetDissect~\cite{bau2017network} finds the image pixels that cause a unit to highly activate (similar to saliency analysis), and computes the Jaccard distance between those pixels and annotated pixels of e.g., a dog. In general, these techniques compute a statistical measure between unit behaviors and annotations of the input data, and have been used to e.g., find semantic neurons~\cite{morcos2018importance}, compare models~\cite{raghu2017svcca} or more generally evaluate to what extent neural nets learn high-level concepts such as textures or part-of-speech tags~\cite{noroozi2016unsupervised,alain2016understanding,belinkov2017neural, bau2017network}. \stitle{Inspection in Practice:} Although the model interpretation literature is extremely active, the software ecosystem of tools to support Deep Neural Inspection is very limited. Authors have focused on reproducibility in the narrow sense, rather than usability, and it is likely that a ML engineer will have to implement her own version of a given approach\footnote{These remarks don't apply to the NN visualization community, which publishes and maintains several important software packages~\cite{strobelt2018lstmvis, olah2018the}.}. We searched online for software used in publications that perform deep neural inspection~\cite{belinkov2017neural,kadar2017representation,radford2017learning,shi2016emnlp,bau2017network, kim2017tcav,zhou2014object,noroozi2016unsupervised,alain2016understanding,morcos2018importance,zeiler2014visualizing}. Of these, six papers provided code repositories and four of them target computer vision models. In all cases, the scripts (in various languages) are tailored to only reproduce the experiment described the corresponding papers---that is, they are custom implemented for one type of model, one type of analysis, and for one type of dataset. All scripts have different APIs, and several rely on outdated/unsupported versions of deep learning frameworks (LuaTorch, PyTorch, Caffe, or Tensorflow). Popular approaches such as~\cite{zeiler2014visualizing} also have ``unofficial'' implementations that exhibit similar issues. \begin{figure} \vspace{-.1in} \includegraphics[width=.7\columnwidth]{figures/stats_dnipapers} \caption{Lines of code (approx) from available code for papers that perform DNI.} \vspace{-.1in} \label{f:stats_dnipapers} \end{figure} Figure~\ref{f:stats_dnipapers} summarizes the lines of code in each repository after manually removing non-essential code (e.g., non-analysis visualization or imported libraries). Every analysis is at least several hundred lines of code, and in some cases thousands of lines. Although this is an imperfect measure, it provides a sense of the complexity of current DNI methods. \subsection{Desiderata of a DNI System } DNI analysis using the existing approaches is powerful and spans many domains of application. Unfortunately, each analysis currently requires custom, ad-hoc implementations despite following a common analysis goal: \textbf{the user wants to measure the extent that groups of hidden units in one or more trained models behave in a manner that is similar to, or indicative of, a human-understandable function, when evaluated over the same test dataset}. For instance, we may want to measure to what extent the activations of each hidden unit in our SQL auto-completion model correlates with the output of a function that detects the presence SQL keywords by emitting $1$ for keyword characters and $0$ otherwise. \sys is a system that provides a declarative abstraction to efficiently express and execute these analyses. \sys takes as input a test set, a trained model, a set of Python functions that encode hypotheses of what the model may be learning (we call them \emph{hypothesis functions}), and a scoring function, e.g., a measure of statistical dependency. From those inputs, \sys{} produces a set of scores that quantify the affinity between the hypotheses and the model's hidden units. Such a system should support: \stitle{Arbitrary Hypothesis Logic:} Different applications and domains care about different hypotheses. In auto-completion, does the model learn to count characters? In machine translation, do units learn sentiment or language nuances such as relational dependencies? In visual object recognition, pixels correspond to different types of objects---do units detect pixels containing dogs or cats? A system should be flexible about the types of logic that can be used as queries. \stitle{Many Models and Units:} Modern neural network models can contain tens of thousands of hidden units, and researchers may want to compare across different model architectures, training epochs, parameters, datasets, or groups of units. A DNI system should allow users to easily specify which combination of hidden units and models to inspect. \stitle{Different Affinity Measures:} Different use cases and users may define affinity differently. They may correlate activations of individual units~\cite{karpathy2015visualizing}, compute mutual information between a unit's behavior and annotations~\cite{morcos2018importance}, use a linear model to predict high-level logic from unit activations~\cite{alain2016understanding,kim2017tcav}, or use another measure. A DNI system should be fast for common measures, and support user-defined measures. \stitle{Mix and Match: } Users should be able to easily specify the combination of hypothesis functions, models, hidden units, and datasets that they want to inspect. \stitle{Analyze Quickly: } Developers use inspection functionality to interactively debug and understand the characteristics of their models. Thus, any system should both scale to a large number of models, test data, and queries, while maintaining acceptable query performance. \section{\sys API and Overview} \label{sec:overview} This section describes our Python API, how to create hypothesis functions, \sys's native affinity measures, and a verification procedure to assess the quality of highly scored units. The next section describes the system design and optimization. \subsection{Python API} \label{sec:api} \sys is implemented in Python and exposes a Python API. We will use the API to perform two analyses using the SQL-autocompletion example: 1) compute the correlation between every unit's activations and binary hypotheses that indicate the occurrence of grammar rules (as described in Section~\ref{sec:approaches}), and 2) report the F1 accuracy of a logistic regression classifier that predicts the binary hypothesis behaviors from all hidden unit activations~\cite{alain2016understanding, belinkov2017neural}: {\small\begin{verbatim} import deepbase model = load_model('sql_char_model.h5') dataset = load_data('sql_queries.tok') scores = [CorrelationScore('pearson'), LogRegressionScore(regul='L1',score='F1')] hypotheses = gram_hyp_functions('sql_query.grammar') deepbase.inspect([model], dataset, scores, hypotheses) \end{verbatim}} \smallskip This code loads the \texttt{deepbase} module, NN model, and test dataset. It specifies that we wish to compute per-unit correlation scores as well as logistic regression F1 accuracy with L1 regularization. \texttt{hypotheses} is a list of binary hypothesis functions that each returns the presence of a specific grammar rule. Finally, we call \texttt{deepbase.inspect()}, which returns a Pandas data frame (i.e., table) that contains an affinity value for each model, score, hypothesis, and hidden unit: {\small\begin{verbatim} model_id, score_id, hyp_id, h_unit_id, val \end{verbatim}} \noindent The variable \texttt{scores} points to a list of \texttt{DBScores} objects. Currently, \sys's standard library includes 8 scores (see \ref{sec:measures}) and 2 naive baselines (random class, majority class). The list \texttt{hypotheses} contains arbitrary Python functions, which output formats are checked during execution (we defined the specifications in \ref{s:probdef}). In practice, the users will often post-process the table returned by \texttt{inspect}. For instance, they may wish to return only the top scores (e.g., to find the ``sentiment neuron'' in \cite{radford2017learning}), combine the results with other statistics (e.g., to reproduce Figure 2 in \cite{belinkov2017neural}), or group the scores by layer and count the number of hidden units with a high score (Figure 5 in \cite{bau2017network}). This observation, combined with the fact that the intermediate and final outputs can be very large (multiple GBs for even simple cases) calls for tight integration with a DBMS. A full treatment is outside the scope of this paper, however Appendix~\ref{ss:inspect} describes how SQL can be extended to support DNI using a new \texttt{INSPECT} clause. In addition, Section~\ref{sec:naive} describes a baseline built upon a database engine rather than the Python and Tensorflow scripts used in existing papers. \input{contents/hypotheses} \subsection{Natively Supported Measures} \label{sec:measures} \sys supports two types of statistical measures. \stitle{Independent Measures:} measure the affinity between a single unit and a hypothesis function and are commonly used in the RNN interpretation literature. Examples in prior work include Pearson's correlation, mutual information~\cite{morcos2018importance}, difference of means, Jaccard coefficient~\cite{zhou2017interpreting}, all available in \sys by default. In general, \sys supports any UDF that takes two behavior vectors as input. Independent measures are amenable to parallelization across units, which \sys enables by default. \stitle{Joint Measures:} compute the affinity between a group of units $U$ and a hypothesis $h$, and scores for each unit $u\in U$. For instance, when using logistic regression, we jointly compute one score for the whole group of units (e.g., prediction accuracy), and we assign individual scores based on model's coefficients. The current implementation supports convex prediction models that implement incremental \texttt{train} and \texttt{predict} methods. By default, we the use the logistic regression with L1 regularization trained with SGD (we use the optimizer Adam and Keras' default hyper-parameters), and we report the F1 on 5-fold cross-validation. \sys also supports arbitrary Keras and ScikitLearn models, as well as a multivariate implementation of mutual information. \subsection{Verification}\label{ss:verification} We note that DNI is fundamentally a data mining procedure that computes a large number of pairwise statistical measures between many groups of units and hypotheses. When looking for high-scoring units, the decision is susceptible to multiple hypothesis testing issues and can lead to false positives. Most current DNI analysis either do not perform verification (e.g., are best effort), or use one of a variety of methods. One method is to ablate the model~\cite{morcos2018importance,karpathy2015visualizing} (``remove'' the high scoring units) and measure its effects on the model's output. Although a complete treatment to address this problem is beyond the scope of this paper, \sys implements a perturbation-based verification procedure to ensure that the set of high scoring units indeed have higher affinity to the hypothesis function. To do so, the procedure is akin to randomized control trials, where, for a given input record, we perturb it in a way to swap a single symbol's hypothesis behavior, and measure the difference in activations. Formally, let $h()$ be a hypothesis function that has high affinity to a set of units $U$. It generates a sequence of behaviors when evaluated over a sequence of symbols: {\small$$h([s_1,\dots,s_{k-1},s_k]) = [b_1,\dots,b_{k-1},b_k]$$} \noindent After fixing the prefix $s_1,\dots,s_{k-1}$, we want to change the $k^{th}$ symbol in two ways. We swap it with a {\it baseline} symbol $s^b_k$ so that $b^b_k$ remains the same, and with a {\it treatment} symbol $s^t_k$ so that $b^t_k$ changes. {\small\begin{align*} h([s_1,\dots,s^b_k]) &= [b_1,\dots,b^b_k]\ s.t. \ b^b_k = b_k, s^b_k \ne s_k\\ h([s_1,\dots,s^t_k]) &= [b_1,\dots,b^t_k]\ s.t. \ b^t_k \ne b_k, s^t_k \ne s_k \end{align*}} Let $act(s)$ be $U$'s activation for symbol $s$, $\Delta^b_k = act(s^b_k)-act(s_k)$ be the change activation for a baseline perturbation, and $\Delta^t_k$ be the change for a treatment perturbation. Then the null hypothesis is that $\Delta^t_k$ and $\Delta^b_k$, across different prefixes and perturbations, are drawn from the same distribution. For example, consider the input sentence ``He watched Rick and Morty.'', where the hypothesis function detects coordinating conjunctions (words such as ``and'', ''or'', ``but''). We then perturb the input words in two ways. The first is consistent with the hypothesis behavior for the symbol ``\texttt{and}'', by replacing ``\texttt{and}'' with another conjunction such as ``\texttt{or}''. The second is inconsistent with the hypothesis behavior, such as replacing ``\texttt{and}'' with ``\texttt{chicken}''. We expect that the change in activation of the high scoring units for the replaced symbol (e.g., ``\texttt{and}'') is higher when making inconsistent than when making consistent changes. To quantify this, we label the activations by the consistency of the perturbation and then measure the Silhouette Score~\cite{rousseeuw1987silhouettes}, which scores the difference between the within- and between-cluster distances. Our verification technique is based on analyzing the effects of input perturbations on unit activations, however there are a number of other possible verification techniques. For instance, by perturbing the model using ablation~\cite{morcos2018importance,karpathy2015visualizing} (removing the high scoring units and retraining the model) and measuring its effects on the model's output. We leave an exploration of these extensions to future work. \section{Conclusion and Discussion} Programming frameworks for deep learning have enabled machine learning to impact a large set of applications. Yet efforts to understand and inspect the behaviors of hidden units in NN models are largely manual and one-of, and require considerable expertise and engineering effort. Better NN analysis tools will contribute to a better understanding of how and why neural networks work. Towards this goal, this paper defined {\it Deep Neural Inspection} to characterize existing inspection analyses, and presented \sys, a system to quickly inspect neural network behavior through a declarative API. With a few lines of code, \sys can express a large fraction of existing deep neural inspection analyses, but improves the analysis run-times by up to $72\times$ as compared to existing baseline designs. Further, we reproduced results consistent with prior NLP research~\cite{belinkov2017neural} on real-world translation models~\cite{opennmt}. We intend to extend \sys with more statistical measures and deeper integration with GPUs, support distributed environments, and apply \sys to a broader range of applications (e.g., bias detection, reinforcement learning). Looking further, we envision Deep Neural Inspection as a core primitive of a larger neural network verification and inspection framework~\cite{sellamlike}. \sys allows users, or automated processes to query neural network models using high level hypotheses. We imagine curating {\it libraries of hypotheses} based on decades of existing models, features, and annotations across application domains. In addition, these tools may be used to decompose NNs into smaller components, enforce activation behavior for unit groups, and ultimately open up NN black boxes. \section{Acknowledgments} We acknowledge: NVIDIA Corporation for donating a nVidia Titan XP GPU, the Google Faculty Research Award, the Amazon Research Award, and NSF grants 1527765 and 1564049. Thanks to Yonathan Belinkov for his code, guidance, and advice~\cite{belinkov2017neural}, and Yiliang Shi for advice. \subsection{Accuracy Benchmark} \sys is designed to quickly compute affinity scores in order to identify hidden units that are likely to learn and mimic user-understandable hypotheses. The goal in this subsection is to understand the conditions when high affinity scores are indicative that a group of units have learned a given hypothesis. To establish ground truth, we specially train a 16-unit RNN model by ``specializing'' a subset of units $S\subseteq M$ to learn a specific hypothesis $h$. To do so, we introduce an auxiliary loss function $g_h$ that forces the output of the neurons in $S$ to to be close to the output of $h$. If $g_h$ is the auxiliary loss function and $g_T$ is the loss function for $M$ based on the next character prediction task, the model's loss function is a weighed average of $g_M = w\times g_h + (1-w)\times g_T$. This setup allows us to vary the number of specialized units $|S|$, and the specialization weight $w$ for how much the specialized units focus on learning the hypothesis. Their defaults are $|S|=4$, $w=0.5$. The challenge in this benchmark is that not all units in $S$ may be needed to learn a given hypothesis. For instance, if the hypothesis is to detect the current input, then one unit may be sufficient. In contrast, all units may be needed to learn a higher level hypothesis. We run \sys using logistic regression with L1 regularization, return units with unit\_score above $15$, and use the perturbation-based verification method in Section~\ref{ss:verification} to assess the quality of the high scoring units. Figure~\ref{f:exp-acc-spec-tsne} shows an example clustering of the change in activations between the baseline and treatment perturbations (colors). The hypothesis function used to inspect the model recognizes parentheses symbols, thus the baseline perturbations swap `$($' for `$)$' or vice versa. The treatment swaps `$($' for a number. Units selected by \sys show clear clusters that distinguish baseline and treatment perturbations, while the change in activation for a set random units (the same number of units) overlap considerably (blue and red are indistinguishable). Figure~\ref{f:exp-acc-spec-sil-group4} summarizes the cluster separation using the Silhouette score~\cite{rousseeuw1987silhouettes} and shows higher separation than random units across all weights. Similar results are shown when varying the number of specialized units in Figure~\ref{f:exp-acc-spec-sil-weight05}. We also ran the above for two other hypothesis functions: predicting the current nesting level, and predicting that the current nesting level is 4. The former hypothesis is nearly identical to the model task, and we indeed find that none of the units selected by \sys distinguish themselves from random during verification. The latter hypothesis is ambiguous: the specialized units may simply recognize the input character $4$, or learn the nesting level. After running verification by swapping $4$ with other numbers (baseline) or open parentheses (treatment), we find that the change in activations were indistinguishable. Thus suggests that the specialized units learned to recognize the input $4$ rather than the logical nesting level. \input{contents/takeaway_acc} \if{0} \subsection{Boolean Expressions} Something about booleans \begin{figure}[h] \centering \includegraphics[width = .7\columnwidth]{./experiments/exp_boolean.png} \caption{} \label{f:exp-boolean} \end{figure} \fi \subsection{Verification}\label{ss:verification} This paper proposes a declarative system to express existing deep neural inspection analyses. DNI is a data mining procedure that computes a large number of pairwise statistical measures between many groups of units and hypotheses. When using the scores to identify high-scoring units, the decision is susceptible to multiple hypothesis testing issues and can generate false positives. Although a complete treatment to address this problem is beyond the scope of this paper, \sys implements a perturbation-based verification procedure to ensure that the set of high scoring units indeed have higher affinity to the hypothesis function. To do so, the procedure is akin to randomized control trials, where, for a given input record, we perturb it in a way to swap a single symbol's hypothesis behavior, and measure the difference in activations. Formally, let $h()$ be a hypothesis function that has high affinity to a set of units $U$. It generates a sequence of behaviors when evaluated over a sequence of symbols: {\small$$h([s_1,\dots,s_{k-1},s_k]) = [b_1,\dots,b_{k-1},b_k]$$} \noindent After fixing the prefix $s_1,\dots,s_{k-1}$, we want to change the $k^{th}$ symbol in two ways. We swap it with a {\it baseline} symbol $s^b_k$ so that $b^b_k$ remains the same, and with a {\it treatment} symbol $s^t_k$ so that $b^t_k$ changes. {\small\begin{align*} h([s_1,\dots,s^b_k]) &= [b_1,\dots,b^b_k]\ s.t. \ b^b_k = b_k, s^b_k \ne s_k\\ h([s_1,\dots,s^t_k]) &= [b_1,\dots,b^t_k]\ s.t. \ b^t_k \ne b_k, s^t_k \ne s_k \end{align*}} Let $act(s)$ be $U$'s activation for symbol $s$, $\Delta^b_k = act(s^b_k)-act(s_k)$ be the change activation for a baseline perturbation, and $\Delta^t_k$ be the change for a treatment perturbation. Then the null hypothesis is that $\Delta^t_k$ and $\Delta^b_k$, across different prefixes and perturbations, are drawn from the same distribution. For example, consider the input sentence ``He watched Rick and Morty.'', where the hypothesis function detects coordinating conjunctions (words such as ``and'', ''or'', ``but''). We then perturb the input words in two ways. The first is consistent with the hypothesis behavior for the symbol ``\texttt{and}'', by replacing ``\texttt{and}'' with another conjunction such as ``\texttt{or}''. The second is inconsistent with the hypothesis behavior, such as replacing ``\texttt{and}'' with ``\texttt{chicken}''. We expect that the change in activation of the high scoring units for the replaced symbol (e.g., ``\texttt{and}'') is higher when making inconsistent than when making consistent changes. To quantify this, we label the activations by the consistency of the perturbation and then measure the Silhouette Score~\cite{rousseeuw1987silhouettes}, which scores the difference between the within- and between-cluster distances. Our verification technique is based on analyzing the effects of input perturbations on unit activations, however there are a number of other possible verification techniques. For instance, by perturbing the model using ablation~\cite{morcos2018importance,karpathy2015visualizing} (removing the high scoring units and retraining the model) and measuring its effects on the model's output. We leave an exploration of these extensions to future work. \section{Introduction} \label{s:intro} Neural networks (NNs) are revolutionizing a wide range of machine intelligence tasks with impressive performance, such as language understanding~\cite{graves2014towards}, image recognition~\cite{girshick2014rich}, and program synthesis~\cite{devlin2017robustfill}. This progress is partly driven by the proliferation of deep learning libraries and programming frameworks that drastically reduce the effort to construct, experiment with, and deploy new models~\cite{baylor2017tfx,crankshaw2014missing,kumar2017data}. However, it is still unclear how and why neural networks are so effective~\cite{doshi2017towards,nytcats}. Does a model learn to decompose its task into understandable sub-tasks? Does it memorize training examples~\cite{zhang2016understanding}, and can it generalize to new situations? Grasping the internal representation of neural networks is currently a major challenge for the machine learning community. While the field is still in its infancy, many hope that increasing our understanding of trained models will enable more rapid experimentation and development of NN models, help identify harmful biases, and explain predictions~\cite{doshi2017towards}---all critical in real-world deployments. A prevailing paradigm is to study how individual or groups of hidden units (neurons) behave when the model is evaluated over test data. One approach is to identify if the behavior of a hidden unit mimics a high level functionality---if a unit only activates for positive product reviews, then it potentially recognizes positive sentiment. Numerous papers have applied these ideas by manually inspecting visualizations of behaviors~\cite{karpathy2015visualizing,radford2017learning,girshick2014rich} or writing analysis-specific scripts~\cite{shi2016emnlp,bau2017network}, and in domains such as detecting syntax and sentiment in language~\cite{karpathy2015visualizing,radford2017learning}, parts and whole objects from images~\cite{girshick2014rich,le2013building}, image textures~\cite{bau2017network}, and chimes and tunes in audio~\cite{aytar2016soundnet}. This class of analysis is ubiquitous in the deep learning literature~\cite{noroozi2016unsupervised,alain2016understanding,belinkov2017neural,kim2017tcav,kadar2017representation,bau2017network,morcos2018importance}, it is particularly well represented in neural net interpretability workshops~\cite{blackbox}, yet each analysis is implemented in an ad-hoc, one-off basis. In contrast, we find that they belong in a common class of analysis that we term \textbf{\textit{Deep Neural Inspection (DNI)}}. Given user-provided hypothesis logic (e.g., ``detects nouns'', ``detects keywords''), DNI seeks to quantify the extent that the behavior of hidden units (e.g., the magnitude or the derivative of their output) is similar to the hypothesis logic when running the model over a test set. These DNI analyses share a common set of operations, yet each analysis currently requires considerable engineering (hundreds or thousands of lines of code) to implement, and often runs inefficiently. \emph{We believe there is tremendous opportunity to provide a declarative abstraction to easily express, execute, and optimize DNI analysis.} Our main insight is that DNI analyses primarily use statistical measures to quantify the affinity between hidden unit behaviors and hypotheses, and simply differ in the specific NN models, hypotheses, or types of hidden unit behaviors that are studied. \Cref{ss:motivation} illustrates how existing DNI analyses fit this pattern~\cite{alain2016understanding,karpathy2015visualizing,zhou2017interpreting}. To this end, we designed \sys, a system to perform large-scale Deep Neural Inspection through a declarative interface. Given groups of hidden units, hypotheses, and statistical affinity measures, \sys quickly computes the affinity score between each {\it(hidden units group, hypothesis)} pair. The aim is for \sys to accelerate the development and usage of this class of neural network analysis in the ML community. Designing a fast DNI system is challenging because the cost is cubic with respect to the size of the dataset, the number of hidden units, and the number of hypotheses. Even trivial examples are computationally expensive. Consider analyzing a character-level recurrent neural net (RNNs) with 128 hidden units over a corpus of 6.2M characters~\cite{karpathy2015visualizing}. Assuming each activation is stored as a 4-byte float, each RNN model requires 3.1GB to store its activations. While this fits in memory, the process of extracting these activations, storing them, and matching them with hundreds of hypotheses can be incredibly slow. To address this challenge, \sys uses pragmatic optimizations. First, users provide hypothesis logic as functions evaluated over input data, which may be computationally expensive. \sys can cache the output of hypothesis functions and reuse their results when re-running the same DNI analysis on new models. Second, users can specify convergence thresholds so that \sys can terminate quickly while returning accurate but approximate scores. \sys natively provides popular measures such as correlation and linear prediction models. Third, \sys reads the dataset, extracts unit behaviors, and evaluates the user-defined hypothesis logic in an online fashion, and can terminate the moment the affinity scores have converged. Finally, \sys leverages GPUs---commonplace in deep learning---to offload and parallelize the costs of extracting unit behaviors and computing affinity metrics based on e.g., logistic regression. \textbf{Our primary contribution is to formalize Deep Neural Inspection and develop a declarative interface to specify DNI analyses}. We also contribute: \begin{itemize}[leftmargin=*, topsep=0mm, itemsep=0mm] \item The design and implementation of an end-to-end DNI system called \sys, along with simple pragmatic optimizations, including caching, early stopping via convergence criteria, streaming execution, and GPU execution. \item A walk-through of how to generate hypothesis functions from existing ML libraries. \item Extensive performance experiments based on a SQL auto-completion RNN model. We show that with all optimizations including caching, \sys outperforms a standard Python baseline by up to 72X, and an in-RDBMS implementation using MADLib~\cite{hellerstein2012madlib} by $100-419\times$, depending on the specific affinity measure. \item Experimental results using \sys to analyze a state-of-the-art Neural Machine Translation model architecture~\cite{opennmt} (English to German). We compare \sys to existing scripts~\cite{belinkov2017neural} and validate the results of recent NLP research~\cite{shi2016emnlp, adebayo2018local}. \end{itemize} \noindent This paper focuses the discussion and application of \sys on Recurrent Neural Networks (RNNs), a widely used class of NNs used for language modeling, program synthesis, image recognition, and more. We do this to simplify the exposition while focusing on an important class of NNs, however \sys also Convolutional Neural Networks (CNNs). See \Cref{a:dni-cnn} for a results comparison with a recent system called NetDissect~\cite{zhou2017interpreting}, and our prior work for more CNN and Reinforcement Learning examples~\cite{dninips18}. \section{System Design} \label{s:opts} \sys is implemented in Python and Keras, however it is also possible to embed DNI analysis into an ML-in-DB system such as MADLib~\cite{hellerstein2012madlib} through judicious use of UDFs and driver code. This section describes two baseline designs---MADLib-based design and the naive \sys design---and their drawbacks. It then introduces pragmatic optimizations to accelerate \sys. \subsection{Baseline Designs} \subsubsection{DB-oriented Design} \label{sec:naive} Using a database can help manage the massive unit and hypothesis behavior matrices that can easily exceed the main memory~\cite{vartak2016m}. Also, as discussed in Section~\ref{sec:api}, it can be easier for users to post-process DNI results with relational operators (filtering, grouping, joining). We now describe our DB-oriented implementation that uses the MADLib~\cite{hellerstein2012madlib} PostgreSQL extensions to perform DNI. ML-in-database systems~\cite{hellerstein2012madlib,kumar2013hazy,feng2012towards} such as MADLib express and execute convex optimization problems (e.g., model training) as user-defined aggregates. The following query trains a SVM model over records in \texttt{data(X, Y)} and inserts the resulting model parameters in the \texttt{modelname} table. {\small\begin{center} \texttt{SELECT SVMTrain(`modelname', `data', `X', `Y'); } \end{center}} \noindent Note that the relation names are parameters, and the UDA internally scans and manipulates the relations. An external process still needs to extract unit and hypothesis behaviors from the test dataset and materialize them as the relations \texttt{unitsb} and \texttt{hyposb}, respectively. Their schemas \texttt{(id, unitid/hypoid, symbolid, behavior)} contain the behavior value for each unit (or hypothesis) and input symbol. This can be quite expensive. After loading, a Python driver then submits one or more large SQL aggregation queries to compute the affinity scores. For example, the correlation between each unit and hypothesis can be expressed as: {\small\begin{verbatim} SELECT U.uid, H.h, corr(U.val, H.val) FROM unitsb U, hyposb H GROUP BY U.uid, H.h \end{verbatim}} The first challenge is behavior representation. Deep learning frameworks~\cite{chollet2015keras,abadi2016tensorflow,paszke2017pytorch} return behaviors in a dense format. Reshaping the matrices into a sparse format is expensive, and this representation is inefficient because it needs to store a hypothesis or unit identifier for each symbol. To avoid this cost, we can store the matrices in a dense representation where each unit (\texttt{U.uid\_i}) or hypothesis (\texttt{H.h\_j}) is an attribute. We compute the metrics as follows: {\small\begin{verbatim} SELECT corr(U.uid1, H.h_1),...corr(U.uidn, H.h_m) FROM unitsb_dense U JOIN hyposb_dense H ON U.symbolid = H.symbolid \end{verbatim} } \noindent Unfortunately, there can easily be $>100k$ pairs of units/hypotheses to evaluate, while existing databases typically limit the number of expressions in a clause to e.g., 1,600 in PostgreSQL by default. We could batch the scores (i.e., the sub-expressions \texttt{corr(U.uid, H.h\_m)}) into smaller groups and run one \texttt{SELECT} statement for each batch, but this would force PosgesSQL to perform hundreds of passes over the behavior relations (one full scan for each query). The problem is even more acute with MADLib's complex user-defined functions, such as \texttt{SVMTrain}, which incurs a full scan of the behavior tables and a full execution of the UDF for every hypothesis (see \Cref{s:exp_scale}). This leads to our second challenge: how to efficiently evaluate hundreds, potentially thousands of units/hypotheses pairs without incurring duplicate work? The third challenge is that extracting the behavior matrices can be expensive~\cite{vartak2018m}. Unit behaviors require running and logging model behaviors for each record, while hypothesis behaviors require running potentially expensive UDFs. For instance, our experiments use NLTK~\cite{nltk} for text parsing, which is slow and ultimately accounts for a substantial portion of execution costs. Furthermore, users often only want to identify high affinity scores, thus the majority of costs may compute low scores that will eventually be filtered out. Thus, it is important to reduce: the number of records that must be read, the number of unit behaviors to extract and materialize, the number of hypotheses that must be evaluated, and affinity score computation that are filtered out. Our experiments find that this baseline is far slower than all versions of \sys, and point to the bottlenecks to address in order to support deep neural inspection within a database system. \subsubsection{Naive \sys Design} \begin{figure}[tb] \centering \includegraphics[width=\columnwidth]{figures/arch} \caption{\sys Architecture.} \label{f:arch} \vspace*{-.2in} \end{figure} \Cref{f:arch} presents the naive \sys architecture. Its major drawback is the need to excessively materialize intermediate matrices. The design will be optimized in the next subsection. \sys first materializes all behaviors from the dataset $D$. The {\it Unit Behavior Extractor} takes one or more unit groups as input, and generates behaviors for each unit in each group---the assumption is that each group is a subset of units from a single model. Similarly, the {\it Hypothesis Behavior Extractor} takes a set of hypothesis functions as input and runs them to generate hypothesis behaviors. We concatenate the sequences together, so the extractors emit matrices of dimensionality $ |D|\cdot n_s \times |\mathbb{U}| $ (for Units) and $ |D|\cdot n_s \times |H|$ (for Hypotheses). Since the number and length of records ($|D|\cdot n_s$) can dwarf the number of units and hypotheses, these matrices are ``skinny and tall''. The \texttt{Inspector} takes as input these two matrices and desired statistical measures, and computes affinity scores for each unit, hypothesis, and measure triplet. \sys natively supports activation extraction for Keras models, but can be extended with custom Unit Extractors for other frameworks such as PyTorch, or to simply read behaviors from pre-extracted files. For instance, our experiments in Section~\ref{sec:nmt} use on a custom PyTorch extractor for the OpenNMT model. Any object that inherits our class \texttt{Extractor} and that exposes the following method may be used in \sys: \begin{center} \texttt{extract(model, records, hid\_units) $\rightarrow$ behaviors} \end{center} \noindent The input \texttt{records} is a list of records, and \texttt{hid\_units} is a list of integers that uniquely identify hidden units. The output \texttt{behaviors} is a NumPy array with one row per symbol and one column per hidden unit. The user may pass additional arguments (e.g., batch size) in the constructor of the class. Note that this is the minimal API, a few additional methods must be written to support the optimizations presented in following sections. \sys{} extracts unit activations using a GPU, which accelerates activation extraction as compared to a single CPU core. Hypotheses are executed using a single CPU core. \sys trains logistic regression models, and more generally all affinity measures based on linear models, as a Keras neural network model on a GPU. Finally, \sys can cache the hypothesis behavior matrix in cases where the model repeatedly changes. Our implementation uses simple LRU to pin the matrix in memory, and integrating caching systems such as Mistique~\cite{vartak2018m} for unit and hypothesis behaviors is a direction for future work. \subsection{Optimizations} \label{optimizations} Below we outline the main optimizations. \subsubsection{Shared Computation via Model Merging} Although affinity score measures are typically implemented as Python User Defined Aggregates, \sys also supports Keras computation graphs. For instance, the default Logistic Regression measure is implemented as a Keras model. This enables a shared computation optimization we call model merging. The naive approach trains a separate model for every hypothesis, which can be extremely expensive. Instead, \sys \emph{merges} the computation graphs of all $|H|$ hypotheses into a single large composite model. The composite model has one output for each hypothesis rather than $|H|$ models with one output each. This lets \sys make better use of Keras' GPU parallel execution. It also amortizes the per-tuple overheads across the hypotheses---such as shuffling and scanning the behavior relations, and data transfer to the GPU. This optimization is exact, it does not impact the final scores. \sys produces one composite model for each affinity measure. For a given measure's Keras model, it duplicates the intermediate and final layers for each hypothesis and enforces them to share the same input layers. Thus they share the input layer, but maintain separate outputs. If the model doesn't have a hidden layer (as in logistic regression), \sys can further merge all output layers into a single layer with one or more units (if the categorical output is hot-one encoded) per hypothesis; \sys then generates a global loss function that averages the losses for each hypothesis. This optimization does not degrade the results: since there is no dependency between the models and their parameters, minimizing the sum of the losses is equivalent to minimizing each loss separately. We do however lose the ability to early-stop the training for the individual hypotheses, as we cannot freeze individual hidden units in Keras. Model merging is applicable when the \emph{scoring function} provided by the user is based on Keras (e.g., the logistic regression score in our experiments). This is orthogonal to the framework of the model to inspect---the optimization could very well support custom extractors for other frameworks, e.g., PyTorch. \subsubsection{Early Stopping} \label{sec:early-stop} Much of machine learning theory assumes that datasets used to train machine learning models are samples from the ``true distribution'' that the model is attempting to approximate~\cite{efron2016computer}. \sys assumes that the dataset $D$ is a further sub-sample. Thus, the affinity scores are actually empirical estimates based on sample $D$. A natural optimization is to allow the user to directly specify stopping criteria to describe when the scores have sufficiently converged. To do so, a statistical measure $l()$ can expose an incremental computation API: \begin{center} \texttt{l.process\_block(U, h, recs)$\rightarrow$(scores, err)} \end{center} \noindent The API takes an iterator over records \texttt{recs} as input and returns both the group and unit scores in \texttt{scores}, as well as an error of the group score \texttt{err}. Users can thus specify a maximum threshold for \texttt{err}. If this API is supported, then \sys can terminate computation for the pair of units and hypothesis function early. Otherwise, \sys ignores the threshold and computes the measure over all of $D$. We expose an API rather than make formal error guarantees because such guarantees may not available for all statistical measures. For example, tight error bounds are not well understood for training non-convex models (e.g., neural nets), and so in practice machine learning practitioners check if the performance of their model converges with empirical methods (i.e., comparing the last score to the overage over a training window~\cite{prechelt1998early}). There exists however formal error bounds for statistical measures such as correlation~\cite{efron2016computer}. By default \sys implements this API for pairwise correlation and logistic regression models. To estimate error of the correlation score, we use Normal-based confidence intervals from the statistical literature (i.e., Fisher transformation~\cite{efron2016computer}). For logistic regression, we follow established model training procedures and report the difference between the model's current validation score and the average scores over the last $N$ batches, with $N$ set up by default to cover 2,048 tuples. Early stopping is implemented by iteratively loading and processing blocks of pre-materialized unit and hypothesis behavior matrices in blocks of $n_b$ records. Records on disk are assume to have been shuffled record-wise. It loads for all units in each group $U$, and for as many hypotheses as will fit into memory, and checks the error for every statistical measure after each block. We shuffle the blocks symbol-wise in-memory before running inspection. The SGD based approaches shuffle the behaviors further during training. Note that the moment the score for a given hypothesis and unit group has converged, then there is no need to continue reading additional blocks for that hypothesis. Thus, there is a natural trade-off between processing very small blocks of rows, which incurs a the overhead of checking convergence more frequently, and large blocks of rows, which may process more behaviors than are needed to converge to $\epsilon$. Empirically, we find that setting $n_b = 512$ works well because most measures converge within a few thousand records. This optimization ensures that the query latency is bound by the complexity of the statistical measure, rather than the size of the test dataset. \subsubsection{Streaming Behavior Extraction} A consequence of employing approximation is that \sys does not need to read all of the materialized matrices. Our third optimization is to materialize the behavior and hypothesis matrices in an online fashion, so that the amount of test data that is read is bound by how quickly the confidence of the statistical measures converge. To do so, we read input records in blocks of $n_b$ and extract unit and hypothesis behaviors from them in parallel. An additional benefit of this approach is that affinity scores can be computed and updated progressively, similar to online aggregation queries, so that the user can stop \sys after any block. Figure~\ref{f:arch} illustrates streaming execution using the orange blocks. The input $D$ contains $5$ blocks of records, and only two blocks of unit and hypothesis behaviors have been extracted so far. When all affinity scores have converged, then \sys can stop. Although it is possible to further optimize by terminating hypothesis extraction for hypotheses that have converged, we find that the gains are negligible. This is because 1) training the composite model from model merging costs the same for one hypothesis as it does for all, and 2) some hypothesis extractors, such as creating a parse tree for NLP, incurs a single cost amortized across all parsing-based hypotheses derived from the parse tree. \section{Problem Definition}\label{s:probdef} We now define the deep neural inspection problem, using the SQL auto-completion model in \Cref{ss:motivation} as the example. \stitle{Problem Setup: } Let a dataset $D$ be a $n_d\times n_s$ matrix of symbols where $d_i$ is the $i^{th}$ row (or record) of size $1\times n_s$ (Table~\ref{tbl:notation} presents our notations). In our SQL auto-completion example, each record is a $100$-symbol vector where each symbol is a one-hot encoded character\footnote{Each character is represented by a sparse binary vector, where a 1 at position $\emph{i}$ indicates that the character is set to the $\emph{i}$th value from the alphabet.}. For other data types, a symbol may be an image pixel, a word, or a vector depending on the model. Records are null-padded to ensure that all records are the same size. A model $M$ is a vector of $n_M$ hidden units, where $u^M_i$ is the $i^{th}$ unit. Logically, $M(d)$ is evaluated on a record $d$ by reading each input symbol one at a time; each symbol $s_i$ triggers a single behavior $b_i\in \mathbb{R}$ from each hidden unit $u$\footnote{In the context of windowing over streaming data, the RNN model internally encodes a dynamically size sliding window over the symbols seen so far.}. Thus the {\it Unit Behavior} $u(d)\in\mathbb{R}^{n_s}$ is the vector of behaviors for unit $u$ when the models evaluated over all symbols in $d$. Let $U(d)\in\mathbb{R}^{|U|\times n_s}$ be the {\it Group Behavior} for a subset of units $U$ in a model. An example of $U$ may be the units in the first layer, or simply all units in a model. Each line graph in \Cref{f:activations} plots behavior as a unit's activation when reading each character in the input query. This paper reports results based on unit activations, however \sys is agnostic to the specific definition of behavior extracted from the model. This flexibility is important because some papers use the gradient of the activations instead of their magnitude~\cite{zhou2014object}. We model high level logic in the form of a {\it Hypothesis Function}, $h(d)\in \mathbb{R}^{n_s}$, that outputs a {\it Hypothesis Behavior} when evaluated over $d$. In practice, those functions are either written by the user or provided in a library. There is no restriction on the complexity of a hypothesis function and \Cref{ss:hypotheses} describes example functions; the only constraint is that the hypothesis behavior is size $n_s$ so that it matches the size of a unit behavior. To illustrate, a hypothesis that the model has learned to detect the keyword ``\texttt{SELECT}'' could be a Python function that emits $1$ for those characters and $0$ otherwise. Thus for the query \texttt{SELECT 1 FROM a}, the hypothesis would be \texttt{111111000000000}. The hypothesis behavior need not be binary, and can encode integers or floating point values as well. For instance, a hypothesis that the model counts the number of characters in an input string may return a number between 0 an 100. Further examples are given in \Cref{ss:hypotheses}. \begin{table}[t!] \centering {\small \begin{tabular}{rl} \textbf{Notation} & \textbf{Description}\\ \midrule $D$ & A $n_d\times n_s$ matrix of symbols. \\ $d_i$ & The $i^{th}$ row in D. Called a record. \\ $M$ & A model $M$ is a vector of hidden units. \\ $u^M_i$ & $i^{th}$ hidden unit in $M$. \\ $U$ & A group of units in a model. \\ $u(d)\in\mathbb{R}^{n_s}$ & Unit $u$ returns vector of behaviors.\\ $h(d)\in\mathbb{R}^{n_s}$ & Hypothesis function $h$ returns vector of behaviors.\\ $n_d, n_s, n_M$ & Number of records, symbols/record, units in $M$\\ \end{tabular} } \caption{Summary of notations used in the paper. } \label{tbl:notation} \end{table} We quantify the affinity between a group of units $U$ and a hypothesis $h$ with a user-defined statistical affinity measure $l(U, h, D) = (\mathbb{R}^{|U|}, \mathbb{R})$. The first element contains a scalar affinity score for each unit in the group, and the second element is a score for the group as a whole. Either element may be empty. For instance, we may replicate~\cite{karpathy2015visualizing} by computing the correlation each unit's activation and a grammar rule such as ``\texttt{SELECT}'' keyword detection. Alternatively, we may follow~\cite{belinkov2017neural} and use a linear classifier to predict the occurrence of the keyword from the behavior of all units in the first layer; the model's F1 score is the group affinity, and each unit's score is its model coefficient. Although $l(U, h, D)$ is user-defined, \sys provide 8 common measures (see \ref{sec:measures}) and leverage their approximation properties to optimize the analysis runtime (Section~\ref{s:opts}). \stitle{Basic Problem Definition: } Given the above definitions, we are ready to define the basic version of DNI: \begin{defi}[DNI-Basic]\label{p:basic} Given dataset $D$, a subset of units $U\subseteq M$ of an RNN model $M$, hypothesis $h$, statistical measure $l$, return the set of tuples $(u, s_u, s_U)$ where the score $s_u$ is defined as $l(U, h, D) = ([s_u | u \in U], s_U)$. \end{defi} Note that we specify as input a set of units $U$ rather than the full model $M$. This is because the statistical measure $l()$ may assign different affinity scores depending on the group units that it analyzes. For instance, if the user inspects units in a single layer using logistic regression, then only the behaviors of those units will be used to fit the linear model and their coefficients will be different than when inspecting all in the model. This highlights the value of embedding \sys within a SQL-like language. \stitle{General Problem Definition: } Although the above definition is sufficient to express the existing approaches in \Cref{ss:motivation}, it is inefficient. In practice, developers often train and compare many groups of units, e.g., to understand what hypotheses the model learns across training epochs. We present a more general definition that is amenable to optimizations across models, hypotheses, and measures. Let $\mathbb{U}$ be a set of unit groups defined by the user. The user may also provide a large corpus of hypotheses $H$, to understand which hypotheses are learned by the model. The user may also want to evaluate multiple statistical measures $L$ to have different perspectives. With those notations, we define our problem as follows: \begin{defi}[DNI-General]\label{p:general} Given dataset $D$, set of unit groups $\mathbb{U}$, hypotheses $H$, and measures $L$, return the set of tuples $(u, h, l, s_{u,h,l}, s_{U,h,l})$ where \begin{itemize}[topsep=0mm, itemsep=0mm] \item $l(U, h, D) = ([s_{u,h,l} | u \in U ], s_{U,h,l})$ \item $l \in L$, $U \in \mathbb{U}$, $h \in H$ \end{itemize} \end{defi} \subsection{Hypotheses}\label{ss:hypotheses} Hypotheses are the cornerstone of DNI analyses, as they encode the logic that we search for. Although numerous language-based models, grammars, parsers, annotations, and other information already exist, many do not fit the hypothesis function abstraction. For example, parse trees (Figure~\ref{f:parsing}) are a common representation of an input sequence that characterizes the roles of different subsequences of the input. What is an appropriate way to transform them into hypothesis functions? This section provides examples for generating hypothesis functions from common machine learning libraries that we used in our experiments. We note that the purpose of \sys is to simplify the use and inspection of hypothesis functions---developing appropriate hypothesis functions to answer NN analysis questions continues to be an open area of research. \begin{figure} \centering \vspace{-.1in} \includegraphics[width=0.7\columnwidth]{figures/ex_parsing} \vspace{-.1in} \caption{Example parse tree (left) and hypothesis functions. Each $h_i$ is the behavior over each input character symbol. } \label{f:parsing} \end{figure} \stitle{Parse Trees: } A common use of RNNs is language analysis and modeling. For these applications, there are decades of research on language parsing, ranging from context free grammars for programming languages to dependency and constituency parsers for natural language. Figure~\ref{f:parsing} illustrates an example parse tree for a simple algebraic expression within nested parentheses \texttt{((1+2))}. The corresponding parse tree contains leaf nodes that represent characters matching terminals, and intermediate nodes that represent non-terminals. Given a parse tree, we map each node and node type to a hypothesis function. To illustrate, the \red{red} root in Figure~\ref{f:parsing}'s parse tree corresponds to the outer \red{\texttt{()}} characters. It can be encoded as a time-domain representation that activates throughout the characters within the parentheses ($h_3$), or a signal representation that activates at the beginning and end of the parentheses ($h_5$). Similarly, $h_2$ and $h_4$ are time and signal representations generated by hypothesis functions for the inner \blue{blue} parentheses. Finally, $h_1$ is a composite of $h_2$ and $h_3$ that accounts of the nesting depth for the parentheses rule. Note that a given parse tree generates a large number of hypothesis functions, thus the cost of parsing is amortized across many hypothesis functions. This form of encoding can be used for other parse structures such as entity-relationship extraction. \stitle{Annotations: } Existing machine models are trained from massive corpus of manually annotated data. This ranges from bounding boxes of objects in images to multi-word annotations for information extraction models. Each annotation type is akin to a node type in a parse tree and can be transformed into a hypothesis function that emits $1$ when the annotation is present and $0$ otherwise. Similarly, image datasets (e.g., Coco~\cite{lin2014microsoft}, ImageNet~\cite{deng2009imagenet}) contain annotations in the form of bounding boxes or individual pixel labels. Both can be modeled as hypotheses functions that map a sequence of image pixels to a Boolean sequence of whether the pixel is labeled with a specific annotation. \stitle{Finite State Machines: } Regular expressions, simple rules, and pattern detectors are easily expressed as finite state machines that explicitly encode state logic. Since each input symbol triggers a state transition, an FSM can be wrapped into a hypothesis function that emits the current state label after reading the symbol. Similarly, the state labels can be hot-one encoded, so that each state corresponds to a separate hypothesis function that emits $1$ when the FSM is in the particular state, and $0$ otherwise. \stitle{General Iterators:} More generally, programs that can be modeled as iterative procedures over the input symbols can be featurized to understand if units are learning characteristics of the procedure. As an example, a shift-reduce parser is a loop that, based on the next input character, decides whether to apply a production rule or read the next character: {\small \begin{verbatim} initialize stack until done if can_reduce using A->B // reduce pop |B| items from stack push A else // shift push next char \end{verbatim}} \noindent Any of the expressions executed, or the state of any variables, between each \texttt{push next char} statement that reads the next character, can be used to generate a label for the corresponding character. For instance, a feature may label each character with the maximum size of the stack, or represent whether a particular rule was reduced after reading a character. \section{Experiments} \label{s:experiments} Our experiments study the scalability of \sys, as well as its ability to generate DNI scores that are comparable to prior DNI analyses. To this end, we first present scalability experiments using a SQL auto-completion RNN model to show how the baselines, \sys, and its optimizations scale as we vary the number of hidden units, hypotheses, and records. We then use \sys to analyze a real world English-to-German translation model from OpenNMT~\cite{opennmt}, and report results from reproducing DNI analysis from Belinkov et al~\cite{belinkov2017neural}. We provide additional experiments in the Appendix. In \Cref{s:accuracy}, we present a set of experiments to evaluate the accuracy of \sys's scores. In \Cref{a:exp}, we complete our SQL auto-completion scalability benchmark by commenting the results provided by the system. In \Cref{a:dni-cnn}, we extend our analysis to convolutional neural nets and compare \sys to NetDissect, an existing system to analyze computer vision models. \subsection{Setup Overview} We ran \sys on two types of RNN models: the first predicts the next symbol (character) for SQL query strings generated from a subset of the SQL grammar, while the second is a sequence-to-sequence English to German translation model called OpenNMT. \stitle{Datasets:} We used two language datasets: a collection of SQL queries for the scalability benchmark, and a publicly available English-to-German translation dataset for the real-world experiment\footnote{http://statmt.org/wmt15}. To generate synthetic SQL queries, we sample from a Probabilistic Context Free Grammar (PCFG) of SQL. We choose subsets of the grammar (between 95 to 171 production rules) to vary the language complexity, as well as the number of hypothesis functions. The task is to take a window of $30$ characters and predict the character that follows. \stitle{Models:} The SQL use-case is based on custom models: a one-hot encoded input layer, a LSTM layer, and a fully connected layer with soft-max loss for final predictions (details below). The OpenNMT model~\cite{opennmt} is publicly available, it uses an encoder-decoder architecture, where both the encoder and decoder contain two LSTM layers of 500 units, with an additional attention module for the decoder. \stitle{Hypotheses: } For the SQL experiment, we follow the procedure in Section~\ref{ss:hypotheses} to transform parse trees into a set of hypothesis functions. By default, we use the time-domain representations for each node type (e.g., production rule, verb, punctuation). In our experiments, we do not run the parser until one of the hypothesis functions is evaluated; at that point the other hypothesis functions based on the parser do not need to re-parse the input text. To increase the number of hypotheses, we also generate hypothesis functions using the signal representation. We use NLTK's chart parser~\cite{nltk} to sample and parse the SQL grammar. For the translation experiments, we use Part-of-Speech tagger of CoreNLP\cite{manning2014corenlp}, which we can directly use as a hypothesis. \subsection{Scalability Benchmarks}\label{s:exp_scale} We now report scalability results on the SQL grammar benchmark. To do so, we vary the number of records in the inspection dataset, hidden units in the model and rules in the grammar used to generate the data and the features. The default setup contains 29,696 records\footnote{Recall that each record in \sys is a window of symbols of length $n_s$ as defined by a sliding window of size $n_s$ and stride 5.}, 512 hidden units and 142 grammar rules. Each record has $n_s=30$ symbols, so there are 890,880 behaviors for each unit and hypothesis. We build two hypotheses per non-terminal in the grammar. The first one returns ``1'' for each symbol for which the rule is active (the symbol is consumed by the rule or a descendant rule). The second only returns ``1'' for the first and last symbol and returns ``0'' otherwise. This yields 190 hypotheses. \stitle{Systems: } We start with the Python baseline implementation \pybase, then cumulatively add the optimizations described in Section~\ref{s:opts}: model merging (\naive), early stopping (\appr), and online extraction (\sys). In addition, we measure the benefits of the GPU by comparing the model-merging baseline with a GPU (\gpu) and without (\cpu). We compare against the \madlib implementation, which fully materializes the behavior matrices, and then computes affinity scores using PostgreSQL native (for correlation) and MADLib (for logistic regression) functions. We run each configuration 3 times report and the average. For each experiment, we run the smallest-scale baseline to completion, and then enforce a 30-minute timeout for larger-scale settings. \stitle{Setup:} All our experiments are based on 6 Google Cloud virtual machines with 32GB RAM running Ubuntu 16.04, and 8 virtual CPUs each, where each virtual CPU is a hyper-thread on a 2.3 GHz Intel Xeon E5 CPU. Each VM includes a nVidia Tesla K80 GPUs with 12 GB GDDR5 memory. All models are based on Keras with Tensorflow 1.8. MADLib uses PostgreSQL 9.6.9, with the shared buffer size, effective cache size, and number of workers tuned following to the manual's guidelines. Hypothesis extraction is performed by creating a parse tree using NLTK~\cite{nltk} and transforming the tree into many hypotheses. We extract behaviors in blocks of 512 records, and set the Keras batch size to 512 records. All the models are trained for up to 50 epochs with Keras early stopping. Their average classification accuracy is $49.7\%$, and 53-69\% of randomly generated queries can be parsed (based on the grammar complexity). The approximation defaults use $\epsilon=0.025$ and 95\% confidence for correlation, and error threshold of $0.01$ for logistic regression (cf. Section~\ref{sec:early-stop}). \begin{figure}[h] \centering \includegraphics[width = \columnwidth]{experiments/exp_baselines} \caption{Runtime of MADLib and Python baselines as compared to \sys with all optimizations for logistic regression measure.} \label{f:exp-baselines} \end{figure} \stitle{Comparing Baselines:} Figure~\ref{f:exp-baselines} compares the MADLib and Python baseline systems for both affinity measures (rows) as we vary the number of hypotheses, records, and hidden units in the model (columns). We also include \sys with all optimizations for reference. Correlation (top row) is generally expensive because it must be computed for every unit-hypothesis pair (up to 194,560 pairs in the experiments). \madlib incurs a large number of passes over the behavior relations (up to 121). Both \madlib and \pybase incur considerable full table scan and aggregation costs. Logistic regression (bottom row) is dominated by the cost to fit logistic regression models for each pair of hypothesis and unit group. Overall, we find that \pybase performs faster than \madlib on the smallest experimental settings. We believe this is largely because of the overheads of using PostgreSQL extensions and the fact that the in-memory Python implementation of logistic regression is quite fast. \sys's optimizations avoids unnecessary extraction costs once all the scores have converged. \sys improves upon \pybase by $72\times$ on average, and by up to $96\times$; it outperforms \madlib by $200\times$ on average, and by up to $419\times$. \begin{figure}[h] \centering \includegraphics[width = \columnwidth]{experiments/exp_scale_opt_corr} \vspace*{-.4in} \caption{Runtime of \sys with different optimizations enabled for correlation measure.} \label{f:exp-scale-opt-corr} \end{figure} \stitle{Optimization Benefits for Correlation Measure:} Figure~\ref{f:exp-scale-opt-corr} reports runtimes for three variants of \sys for correlation. Correlation is a cheap measure to compute and is executed on the CPU. Since we use a CPU, model merging (which is an GPU-oriented optimization) is disabled. Thus we compare \pybase, with early stopping, and with lazy extraction. We find that the primary performance gains are due to the early stopping optimization, while lazily extracting behaviors provides considerable, but smaller benefit. We see that lazy extraction provides a benefit as the number of records increases (middle plot), and similarly, the benefit of lazy extraction reduces as the number of hidden units increases (right plot) because the bottleneck becomes the large number of pair-wise correlation computations. \begin{figure}[h] \centering \includegraphics[width = \columnwidth]{experiments/exp_scale_opt_log} \vspace*{-.4in} \caption{Runtime of \sys with different optimizations enabled for logistic regression measure.} \label{f:exp-scale-opt-log} \end{figure} \stitle{Optimization Benefits for Logistic Regression Measure:} Figure~\ref{f:exp-scale-opt-log} reports the results when adding optimizations based on early stopping, lazy extraction as well as GPU-based optimizations. We see that model merging (\naive) provides a considerable benefit by reducing the number of logistic regression models that need to be trained for each hypothesis. The benefits of using a GPU appear for models with many hidden units. We find that early stopping (\appr) does not provide any speedup because materializing the behavior matrices is a large bottleneck; adding lazy extraction (\sys) reduces the runtime by $6\times$ on average and by up to $11\times$ as compared to \appr. \begin{figure}[h!] \centering \includegraphics[width =.8 \columnwidth]{experiments/exp_scale_break_ntuples} \vspace*{-.2in} \caption{Runtime breakdown of extraction and inspector costs for correlation and logistic regression.} \label{f:exp-scale-breakdown} \end{figure} \stitle{Runtime Breakdown: } Figure~\ref{f:exp-scale-breakdown} shows the cost breakdown by system component: the hypothesis and unit extractors, and the inspector. The \appr column shows that inspector cost is much higher for correlation, while extraction behave nearly identically. The \sys column shows that runtime savings are primarily due to lower extraction costs thanks to online extraction. \begin{figure}[h!] \centering \includegraphics[width = .9\columnwidth]{experiments/exp_scale_runtime_noparse} \vspace*{-.2in} \caption{Runtime comparing the effects of cached hypothesis behavior.} \label{f:exp-scale-runtime-noparse} \end{figure} \stitle{Cached Hypothesis Extraction: } We found that hypothesis extraction due to a slow parsing library can dominate the runtime. However, during model development or retraining, the developer typically has a fixed library of interesting hypothesis functions and wants to continuously inspect how the model behavior is changing. \Cref{f:exp-scale-runtime-noparse} examines this case: the left column incurs all runtime costs, while the right column shows when hypothesis behavior has been cached. We see that it improves correlation somewhat, but its cost is dominated by inspection; whereas for logistic regression, \sys converges to $\approx20s$. Caching improves correlation by $1.9\times$ on average, and logistic regression by $12.4\times$ on average and up to $19.5\times$. Overall, \sys outperforms \madlib by up to $413\times$. \begin{figure}[h!] \centering \includegraphics[width = .9\columnwidth]{experiments/exp_error} \vspace*{-.2in} \caption{Runtime when varying error threshold for early stopping. Note different Y-axis scales.} \label{f:exp-scale-error} \end{figure} \stitle{Sensitivity to Error Threshold: } Figure~\ref{f:exp-scale-error} examines the sensitivity to varying the error threshold (x-axis) for correlation and logistic regression, using the default experiment parameters. The top row shows correlation: \appr only reduces the inspector costs as the threshold is relaxed, while \sys reduces the extraction costs considerably because it only extracts behaviors when necessary. The bottom row shows logistic regression, which exhibits similar trends, though it is far less sensitive to the error threshold because the optimization converges slowly. \input{contents/takeaway_scale} \subsection{Neural Machine Translation} \label{sec:nmt} We reproduce the analysis of existing studies by applying \sys on an public English-German translation model. We first replicate the methodology of Belinkov et al.~\cite{belinkov2017neural} and verify that our results are consistent with those returned by their scripts\footnote{\url{github.com/boknilev/nmt-repr-analysis}}. We then broaden the analysis and show that we can make observations that are similar in spirit to those presented in related work~\cite{shi2016emnlp, adebayo2018local} with only a few queries. In addition to those results, we present a comparison of \sys with NetDissect~\cite{bau2017network}, a recent interpretation method for convolutional Neural Nets in Appendix~\ref{a:dni-cnn}. \subsubsection{Comparison with Belinkov et al.} Belinkov et al. have shown that sequence-to-sequence neural translation models learn part-of-speech tags as a byproduct of translation. They train a classifier from the encoder's hidden layer activations and observe that they can predict the tags of the input words with high accuracy. This section replicates this analysis. We ran \sys and the baseline scripts on the same datasets, using the same 46 POS tags and the same score function. We used an English-to-German translation corpus available online\footnote{\url{drive.google.com/file/d/0B6N7tANPyVeBWE9WazRYaUd2QTg/view}}, annotated with the Stanford CoreNLP tagger\footnote{\url{stanfordnlp.github.io/}}. We use 4,823 sentences for training, 636 for validation and 544 for testing (each sentence contains 24.2 words in average). Our score is the precision of a multi-class logistic regression model trained on the encoder's hidden unit outputs, as described in the the original paper. We limit to 35 training epochs, with a patience (i.e., number of epochs without improvement before early-stopping) of 5, the scripts' default. \stitle{Experimental Setup Differences:} An important difference between the two approaches is that they run in different environments. Belinkov et al. supports \texttt{seq2seq-attn} models, a legacy library that runs on top of Torch for Lua. Unfortunately, we found no way to import \texttt{seq2seq-attn} models into Python. After consulting the library's authors, we chose to support \texttt{seq2seq-attn}'s successor, \texttt{OpenNMT}, which runs in PyTorch for Python. We extended \sys extraction library to support this model. Because of this incompatibility, we run each system on a different model. For \sys, we use a public model from OpenNMT, a sequence-to-sequence model with 2 LSTM layers of 500 hidden units each, available online\footnote{\url{opennmt.net/}}. For Belinkov et al., we use a custom model trained with \texttt{seq2seq-attn} and strived to replicate OpenNMT's setup as closely as possible: we used the same NN architecture and training data, and similar training parameters. We expect the results of the analysis to be strongly correlated, but not identical, because the training and experiments environment is not identical, and the two models are implemented differently. \begin{figure}[t!] \centering \includegraphics[width=0.4\columnwidth]{experiments/DBvsBelinkov/DBvsBelinkov} \caption{Precision for every tag, computed by Belinkov et al. and by \sys. We filtered out the tags that cover less than 1.5\% of the data. The sample Pearson correlation is r=0.84.} \label{f:bel-vs-dni} \end{figure} \stitle{Results:} Figure~\ref{f:bel-vs-dni} presents the affinity scores for every POS tag computed by the two approaches. The strong correlation (0.84) between the approaches suggest analysis consistency. Belinkov et al.'s scripts ran in 1 hour and 10 minutes, while \sys ran in 55.1 minutes. Aside from the differences in frameworks, we explain the difference as follows. Belinkov et al. modify the NMT model in-place by freezing the weights of the translation model and inserting the POS tag classifier directly in the encoder. Since the dataset is relatively small, they must make many passes over the data before the classifier converges (at least 35), running the full translation model each time. By contrast, \sys extracts the activations once (this takes 38.3 minutes) and makes the subsequent passes on the cached version (7.4 minutes), which amortizes the activation extraction time. Note that none of \sys's optimizations apply to this use case: model merging is irrelevant because there is only one hypothesis (the function is not binary, it returns one the 42 distinct POS speeches at each step), and early stopping/lazy materialization does not help because the dataset is small. {\it \stitle{Takeaways: } \sys can easily express the analysis presented \cite{belinkov2017neural}, its scores are consistent with the scripts provided by the authors and its runtime is competitive.} \subsubsection{Additional Results} \begin{figure}[th!] \centering \begin{subfigure}[t]{.4\textwidth} \centering \includegraphics[width = \columnwidth]{figures/nmt-corr} \caption{\small Histogram of correlations for all encoder units in OpenNMT. High correlations are only found in the trained model.} \label{f:exp-nmt-corr} \end{subfigure} \begin{subfigure}[t]{.4\textwidth} \centering \includegraphics[width = \columnwidth]{figures/nmt-logreg} \caption{\small L2 Logistic Regression F1 measure for different hypotheses. Both models learn low-level hypotheses (period); only the trained model learns higher level concepts.} \label{f:exp-nmt-logreg} \end{subfigure} \vspace*{-.1in} \caption{\small Deep neural inspection on OpenNMT translation model. Results compared against an untrained OpenNMT model. } \label{f:exp-nmt} \end{figure} We now broaden our analysis, and show that we can replicate and verify the conclusion of recent work~\cite{karpathy2015visualizing, adebayo2018local, shi2016emnlp} with only a few additional queries. For the remainder of those experiments, we add $7$ hypotheses for phrase-level structures (NP, VP, PP, etc.) to the POS presented previously. \stitle{Individual Units: } We first use correlation to study individual units. Prior work found individual interpretable units in character-level language models~\cite{karpathy2015visualizing}, and we find similar units at the word-level. They learn low-level features (e.g., periods, commas, etc) along with one unit that tracks the sentence length. Going beyond past studies, we find that high affinity units are only present in the trained model and not in an untrained model of the same architecture (Figure~\ref{f:exp-nmt-corr}). \stitle{Encoder Level: } We then use logistic regression with L2 regularization to study all $1000$ units in a trained and untrained model (Figure~\ref{f:exp-nmt-logreg}). We first confirm recent work showing that model architecture can act as a strong prior~\cite{adebayo2018local}. Similarly, the untrained model has high affinity with some low level language features (e.g, periods), but low affinity for almost all high-level features. On the other hand, the trained model has far higher affinity to various POS tags (e.g., CD, RB, VBD, etc.) and phrase structure (e.g., VP, NP) than the untrained model. \stitle{Unit groups: } We now inspect each layer separately, and use Logistic Regression with L1 to identify unit groups with non-zero coefficients. Previous work~\cite{belinkov2017neural,shi2016emnlp} showed that both encoder layers learn POS features, but layer $0$ is slightly more predictive and more distributed (spread over more units). Similarly, we find that layer $0$ yields higher F1 scores and selects more units for most hypotheses. Going beyond prior work, we find that the unit group size varies widely depending on the language feature. In layer $1$ for example, $372$ units are found to detect verbs, $62$ units to detect coordinating conjunctions (e.g. `and', `or', `but'), while only $9$ units to detect punctuation such as ``.''. {\it \stitle{Takeaways: }\sys expresses and computes results that are consistent with analyses in recent NLP studies that seek to understand neural activations in machine translation~\cite{belinkov2017neural,shi2016emnlp,shi2016emnlp}, with orders of magnitude less engineering effort. Our library of natural language hypothesis functions automates model inspection for syntactic features that NLP researchers are commonly interested in, and is easy to extend. Our declarative API lets users easily inspect and perform different analyses by comparing different models at the granularity of individual, groups of, and layers of hidden units.} \section{Related Work} \label{sec:related} \stitle{Interpreting Neural Networks:} Many approaches were proposed for model interpretation. Section~\ref{s:background} reported three methods: visualization of the hidden unit activations~\cite{hermans2013training, karpathy2015visualizing, strobelt2018lstmvis}, saliency analysis~\cite{qiqi17icml, girshick2014rich, li2015visualizing, simonyan2013deep, selvaraju2016grad, zhou2014object} and statistical neural inspection~\cite{noroozi2016unsupervised, alain2016understanding, kim2017tcav, kadar2017representation, bau2017network, morcos2018importance}. These methods are common in the neural net understanding literature, and motivate the design of \sys. Other approaches generate synthetic inputs by inverting the transformation induced by the hidden layers of a neural net (the most compelling example reveal e.g., textures, body parts or objects)~\cite{nguyen2016synthesizing,nguyen2016plug}. However, most of the literature focuses on computer vision, and the process relies heavily on human inspection. Another form of analysis is occlusion analysis, by which machine learning engineers selectively replace patches of an image by a black area and observe which hidden units are affected as a result~\cite{zeiler2014visualizing}. Currently, most studies that fall under this category are ad-hoc and target image analysis. Our verification method~\ref{ss:verification} is an attempt to generalize and automate this process by defining input perturbations (of which occlusion is one type of input perturbation) with respect to the desired hypothesis function. Because the field is still in its infancy~\cite{doshi2017towards, hohman2018visual}, the majority of existing implementations are specialized research prototypes and there is a need for general software systems in the same way TensorFlow and Keras simplify model construction and training. A notable example is Lucid~\cite{olah2018the}, which bundles feature inversion, saliency analysis, with visualization into a larger grammar. Lucid has similar goals as \sys, however it focuses on images and still relies on manual analysis. \stitle{Visual Neural Network Tools: } Numerous visualization tools have been developed to inspect the architecture of deep models~\cite{kahng2018cti, smilkov2017direct}, do step debugging to check the validity of the computations~\cite{cai2016tensorflow}, visualize the convergence of gradient descent during training~\cite{kahng2016visual} and drill into test sets to understand where models make errors~\cite{kahng2016visual}. \stitle{Machine Learning Interpretation: } A related field of research seeks to augment machine learning predictions with explanations, to help debugging or augment software produces based on classifier. A common, classifier-oblivious approach is surrogate models, which approximates a complex model by a simpler one (e.g., classification tree or logistic regression). They train a simple, often linear, model over examples in the neighborhood of a test data point so that users can interpret the rationale for a specific model decision~\cite{ribeiro2016should, alvarez2017causal}. Other approaches modify the machine learning model so that predictions are inherently interpretable, such as PALM~\cite{krishnan2017palm}. In contrast, \sys seeks to identify general behaviors with respect to a test dataset by inspecting individual and groups of unit behaviors. \stitle{Databases and Models: } A number of database projects have proposed integrating machine learning models, training, and prediction into the database~\cite{boehm2014hybrid,kumar2017data,feng2012towards,deshpande2006mauvedb,hellerstein2012madlib}. Recent projects such as ModelDB~\cite{vartak2016m} and Modelhub~\cite{miao2016modelhub} propose to manage historically trained models and can be used by \sys to select models and hidden units to inspect. Similarly, systems such as Mistique~\cite{vartak2018m} can be used in conjunction with \sys to manage the process of extracting and caching unit activations. \section{Neural Network Primer}\label{sec:primer} We provide a brief review of neural networks. For an extensive overview, we refer readers to Goodfellow et al.\ \cite{Goodfellow-et-al-2016}. Neural networks are mappings that transform an input vector $s$ to an output vector $y$. The mapping is parameterized by a vector of weights $w$, which is learned from data. To capture nonlinear relationships between $s$ and $y$, we can stack linear transformations followed by nonlinear functions: \begin{align} y &= w_{n+1}^T h_n \\ h_n &= \sigma\left(w_n^T h_{n-1}\right) \\ h_0 &= s \end{align} where $h_n$ is a vector of \emph{hidden units} in the $n$th layer that represent intermediate states in the neural network, which are also frequently called activations or ``neurons''. The function $\sigma$ must be nonlinear for the model to learn nonlinear mappings, and today most neural networks use the rectified linear unit $\sigma(x) = \textrm{max}(0, x)$. When interpreting neural networks, we are often interested in understanding what the hidden units $h_n$ are learning to detect, which is the focus of this paper. Recurrent neural networks (RNNs) are popular models for operating on sequences, for example processing text as a sequence of words. Given an input sequence where $s_t$ is the $t$-th element in the sequence, a recurrent network follows the recurrence relation: \begin{align} y_t &= w_2^T h_t \\ h_t &= \sigma\left( w_1^T \left[s_t, h_{i-1}\right]\right) \\ h_0 &= 0 \end{align} where the intermediate hidden units $h_t$ are a function of the $t$th element in the sequence and the previous hidden units from the previous element in the sequence. Importantly, the parameters $w$ are independent of the position in the sequence, allowing the model to process arbitrary length sequences. Modern recurrent networks use a more sophisticated update mechanism to stabilize optimization, for example with LSTMs \cite{hochreiter1997long}, which we use in our experiments. However, the high-level question of interpretation remains the same: we are interested in analyzing and understanding the intermediate activations $h_i$ in the network. Recall that $h_t$ is a vector with multiple dimensions. For clarity, we refer to a specific dimension in $h_t$ as $u_{i}$, which represents a single hidden unit. We call any value that can be computed for $u_i$ at each time step a {\it behavior}. For example, we can compute measures such as $u_i$'s gradient with regards to the input (the derivative $\frac{\delta u_i}{\delta s_t}$). \section{SQL Extensions via \texttt{INSPECT}}\label{ss:inspect} This section describes how DNI can be integrated into a SQL-like language as a new \texttt{INSPECT} clause. We introduce a separate clause because DNI is neither a scalar UDF nor an user defined aggregation (UDA). Instead, it outputs a set of records for each input group (UDAs return a single record per group), and the \texttt{INSPECT} operator needs to flatten the groups into a single relation before sending to other relational operators. \stitle{NNs as Relations:} \sys models hidden units, hypotheses, and model inputs as relations (or views) in a database. Let \texttt{units} be a relation representing hidden units (\texttt{uid}) and their models (\texttt{mid}), and \texttt{hypotheses} represent hypothesis functions (\texttt{h}). These relations may contain additional meta-data attributes---e.g., unit layer, training epoch, or the source of the hypothesis function---for filtering and grouping the hidden units. \stitle{\texttt{INSPECT}:} The syntax specifies unit ids and hypothesis functions to compare, optional affinity measures (e.g., logistic regression), and the dataset of input sequences used to extract unit and hypothesis behaviors. By default, \sys measures correlation between individual units and hypotheses: {\small\begin{verbatim} INSPECT <unit>, <hypothesis> [USING metric, ...] OVER <sequences> \end{verbatim}} \noindent The clause is evaluated prior to the \texttt{SELECT} clause and outputs a temporary relation with schema \texttt{(uid, hid, mid, group\_score, unit\_score)} containing unit, hypothesis, and model ids, and two affinity scores. \texttt{group\_score} is the affinity between a group of units $U$ and the hypothesis $h$, whereas \texttt{unit\_score} specifies the affinity of each unit $u\in U$; groups are defined using \texttt{GROUP BY}. These scores are interpreted depending on the type of statistical measure. For instance, correlation is computed for individual units (each group is a single unit), so the two scores are the same. In contrast, when using logistic regression, the model F1 score represents the affinity of the group, while the coefficients are the individual unit scores. This relation can be renamed but only referenced in later clauses (e.g., \texttt{SELECT}, \texttt{HAVING}). \stitle{SQL Integration: } Users often inspect models as part of debugging. We now show the full query syntax to express the DNI analysis from the motivating example in \Cref{ss:motivation}. The query groups hidden units by the sql parser model's training epochs, computes the correlation between each unit in layer $0$ with a hypothesis that recognizes SQL keywords (e.g., ``SELECT'', ``FROM``), and returns the epoch and id of high scoring units: {\small\begin{verbatim} SELECT M.epoch, S.uid INSPECT U.uid AND H.h USING corr OVER D.seq AS S FROM models M, units U, hypotheses H, inputs D WHERE M.mid = U.mid AND M.mid = 'sqlparser' AND U.layer = 0 AND H.name = 'keywords' GROUP BY M.epoch HAVING S.unit_score > 0.8 \end{verbatim}} \noindent The user can easily change the layer or types of models to inspect with slight modifications of the query, or further join the output with other analysis queries: \begin{figure*}[t!] \centering \begin{subfigure}[t]{.40\textwidth} \includegraphics[width = \columnwidth]{./experiments/exp_acc_spec_tsne_w05_group6} \vspace*{-.1in} \caption{T-SNE clustering of change in activation during verification. Each point is one unit's activation. \\ (Weight=0.5, Num Specialized=4)} \label{f:exp-acc-spec-tsne} \end{subfigure} \begin{subfigure}[t]{.29\textwidth} \centering \includegraphics[width = \columnwidth]{./experiments/exp_acc_spec_silhouette_group4} \vspace*{-.1in} \caption{Silhouette scores varying the number of specialized units. (Weight=0.5)} \label{f:exp-acc-spec-sil-group4} \end{subfigure} \begin{subfigure}[t]{.29\textwidth} \centering \includegraphics[width = \columnwidth]{./experiments/exp_acc_spec_silhouette_weight05} \vspace*{-.1in} \caption{Silhouette scores varying weight. (Num Specialized=4)} \label{f:exp-acc-spec-sil-weight05} \end{subfigure} \vspace*{.1in} \caption{\small Verification results for parentheses detection hypothesis function. } \label{f:exp-acc-spec} \end{figure*} \section{Accuracy Benchmark}\label{s:accuracy} This set of experiments attempts to assess whether the hidden units that \sys scores highly are indeed correct. To this end, we first present an accuracy benchmark to study DNI under conditions when we ``force'' parts of a model to learn a hypothesis function. \stitle{Dataset:} We generated a dataset by sampling from a Probabilistic Context Free Grammar (PCFG). The dataset (used in~\cite{strobelt2016visual}) consists of strings such as \texttt{0(1(2((44))))} where a digit representing the current nesting level may precede each balanced parenthesis (up to 4 levels). Its grammar consists of the same production rule $r_i \rightarrow i \; r_i \, | \, \texttt{(} r_{i+1} \texttt{)} \ $ for $i<4$ nesting levels, along with a terminating rule $r_4 \rightarrow \epsilon \, | \, \texttt{4} \; r_4$ for the $4^{th}$ level. \stitle{Setup:} To establish ground truth, we specially train a 16-unit RNN model by ``specializing'' a subset of units $S\subseteq M$ to learn a specific hypothesis $h$. To do so, we introduce an auxiliary loss function $g_h$ that forces the output of the neurons in $S$ to to be close to the output of $h$. If $g_h$ is the auxiliary loss function and $g_T$ is the loss function for $M$ based on the next character prediction task, the model's loss function is a weighed average of $g_M = w\times g_h + (1-w)\times g_T$. This setup allows us to vary the number of specialized units $|S|$, and the specialization weight $w$ for how much the specialized units focus on learning the hypothesis. Their defaults are $|S|=4$, $w=0.5$. The challenge in this benchmark is that not all units in $S$ may be needed to learn a given hypothesis. For instance, if the hypothesis is to detect the current input, then one unit may be sufficient. In contrast, all units may be needed to learn a higher level hypothesis. We run \sys using logistic regression with L1 regularization, return units with unit\_score above $15$, and use the perturbation-based verification method in Section~\ref{ss:verification} to assess the quality of the high scoring units. \stitle{Results:} Figure~\ref{f:exp-acc-spec-tsne} shows an example clustering of the change in activations between the baseline and treatment perturbations (colors). The hypothesis function used to inspect the model recognizes parentheses symbols, thus the baseline perturbations swap `$($' for `$)$' or vice versa. The treatment swaps `$($' for a number. Units selected by \sys show clear clusters that distinguish baseline and treatment perturbations, while the change in activation for a set random units (the same number of units) overlap considerably (blue and red are indistinguishable). Figure~\ref{f:exp-acc-spec-sil-group4} summarizes the cluster separation using the Silhouette score~\cite{rousseeuw1987silhouettes} and shows higher separation than random units across all weights. Similar results are shown when varying the number of specialized units in Figure~\ref{f:exp-acc-spec-sil-weight05}. We also ran the above for two other hypothesis functions: predicting the current nesting level, and predicting that the current nesting level is 4. The former hypothesis is nearly identical to the model task, and we indeed find that none of the units selected by \sys distinguish themselves from random during verification. The latter hypothesis is ambiguous: the specialized units may simply recognize the input character $4$, or learn the nesting level. After running verification by swapping $4$ with other numbers (baseline) or open parentheses (treatment), we find that the change in activations were indistinguishable. Thus suggests that the specialized units learned to recognize the input $4$ rather than the logical nesting level. \input{contents/takeaway_acc} \section{SQL Auto-complete Inspection}\label{a:exp} This section extends the scalability experiments in \Cref{s:exp_scale} with an analysis of the inspection results. We can use \sys to study what the model learns through its training process by executing a query akin to the example in Section~\ref{ss:inspect}. We train the SQL auto-completion model by performing several passes of gradient descent over the training data, called epochs. We repeat the process until the model's performance converges or starts to decrease (after 13 epochs in our case). We capture a snapshot of the model after random initialization (then the accuracy is 1.1\%), 1st epoch (41\% acc), and 4th epoch (45\% acc), and perform neural inspection to understand what the model learned. Figure~\ref{f:sql_top} shows a few of the highest affinity hypotheses. These hypotheses correspond to fundamental SQL clauses that should be learned in order to generate valid SQL, and the model appears to learn them (rather than arbitrary N-grams) even in the first training epoch. Further, the F1 is higher for detecting the string ``ORDER'', which we expect is needed to learn the ordering expression \texttt{ordering\_term}. \begin{figure}[t] \centering \includegraphics[width = \columnwidth]{experiments/exp_scale_sql_dni} \caption{\small F1 scores for highest affinity hypotheses during training.} \label{f:sql_top} \end{figure} \section{\sys for CNNs}\label{a:dni-cnn} \begin{figure}[b] \centering \includegraphics[width = \columnwidth]{figures/exp_netdissect_scores} \caption{\small Comparison of NetDissect and \sys inspection scores.} \label{f:exp_netdissect_scores} \end{figure} NetDissect is a recent DNI tool developed specifically for CNN models~\cite{bau2017network}. It detects groups of hidden units which act as object and texture detectors (e.g., "the hidden units or layer 2 channel 12 activate specifically for chairs"). To do so, it runs the CNN models on images with pixel-level annotations, and checks which hidden units have activations that correlate with the occurrence of the labels. The affinity measure of the Intersection over Union (i.e., Jaccard similarity), after discretizing the hidden unit activations with quantile-binning. We replicated this experiment with \sys on over 10K images from a corpus of annotated images provided by NetDissect's authors and designed specifically for this purpose, the Broden dataset\footnote{\url{http://netdissect.csail.mit.edu/data/broden1_227.zip}}. We compare our results with those returned by a public version of NetDissect\footnote{\url{http://netdissect.csail.mit.edu}}. We used a pretrained VGG 16 model, trained on ImageNet data\footnote{\url{http://netdissect.csail.mit.edu/dissect/vgg16_imagenet/}}. Figure~\ref{f:exp_netdissect_scores} presents the result of the analysis. We find that \sys's scores are strongly correlated with NetDissect's, which shows that \sys's declarative interface can express the analysis and the system can produce consistent results. We explain the difference in scores by the fact that several components of the pipeline are non deterministic (among others, the online quantile approximation algorithm and the image up-sampling algorithm used to align the masks with the activations) and environment differences.
\section{Introduction} \vspace{-8pt} For pre-surgical planning of complex surgeries and interventions, it remains difficult to build a comprehensive pathophysiology-based model incorporating the dynamic interactions between the human body and the medical device. Developing machine learning models from historical surgical data to help predict and optimize the surgical outcome has become a promising alternative. In literature, machine learning methods (e.g., random forests \cite{statnikov2008comprehensive}, logistic regression \cite{kim2000permutation}) have been used for various prediction purposes based on pre-selected features, while recently, deep learning methods (e.g., convolutional neural networks \cite{shin2016deep}) have emerged for feature selection and outcome prediction directly based on the input images. However, the key challenge to most surgery-related machine learning problems is that, while existing machine learning methods typically require large amounts of data, the dataset available consists of data from only a limited number of patients, which is usually too small for training considering the high dimensional input data (usually a fusion of medical images and clinical records). Furthermore, the highly unbalanced prediction input (e.g., age, blood pressure) and output (e.g., surgical outcome) add another layer of difficulty. In short, machine learning methods based on existing surgical records have limitations, and an enhancement of data size is imperative. One immediate method to enlarge the data size is data augmentation \cite{greenland2001data}, including image translation, rotation, changing in brightness and tune, etc. Nevertheless, most image augmentation methods used in natural images may impose alterations with pathophysiologic significance to medical images. For example, in CT scans, image intensity corresponds to specific substances of human tissue, alterations of which may change the tissue type and lead to a different surgical outcome. This difference limits the effectiveness of image augmentation in medical images. Meanwhile, a bypass method that is also widely adopted is transfer learning technique \cite{goodfellow2016deep}. Researchers try to adapt the pre-trained model from natural images and modify a small amount of the model parameters for medical applications with less training data \cite{shin2016deep}. Yet a strong assumption of transfer learning is that the image features learnt from natural images would work similarly in medical images. For the prediction of surgical outcomes, the rationality of that is not clear, because a surgery involves a complex and dynamic interaction between the human anatomy and the surgical device, and the visual cues extracted from the medical images may not be sufficient for such a prediction. In one of our recent work, the predictive performance for transcatheter aortic valve replacement (TAVR) outcome using transfer learning is inferior to a CNN learnt from scratch \cite{joy}. This urges us to explore other possibilities. Another way of data size enhancement is to generate \textit{virtual patients}. Different from some literature, here it refers to the digital models that mimic the patient organ but are not exactly the same as any real patients \cite{qian2017quantitative}. The virtual patients can be 3D printed for a bench-top surgical simulation to assess surgical outcomes just like in the real patients as an enhancement to the dataset \cite{wang2015designable}. While medical image simulation based on a 4D extended cardiac-torso (XCAT) phantom is widely investigated \cite{segars20104d}, a complete \textit{generative} model from scratch is lacking in medical literature. Some models from the machine learning community have the potential for virtual patient generation, including restrict Boltzmann machine (RBM) and variational auto-encoder (VAE) \cite{goodfellow2016deep}. Yet these methods usually lead to sever blurriness in generated images. Recently, a deep learning framework, generative adversarial networks (GAN) was proposed to generate high-quality images, based on the distribution of the training images (see Section 2.2), which can be authentic enough to fool human eyes \cite{arjovsky2017wasserstein}. A straightforward idea is to adapt GAN for virtual patient generation. However, all of the generative methods above result in generating virtual patients that \textit{visually} look like real patients, but with unclear pathophysiologic meanings. In this work, we proposed a novel, deep learning framework - generative invertible networks (GIN) to extract the features from the real patients and generate virtual patients, which were both visually and pathophysiologically plausible, using the features (see Section 2). Specifically, GIN tries to find the feature mapping from the high-dimensional human issue/organ space (represented by CT images) to a low-dimensional feature space and, more importantly, its reverse (see Figure \ref{fig:GIN}). In contrast, GAN only finds the one-direction mapping from the feature space to the image space (i.e. generating), which makes it difficult to build the connection between the input images and the physical meaning of the feature space. In Section 3, we performed a case study using GIN to find the bidirectional feature mapping for the patients who underwent TAVR with the pre-surgical CT images as the input. Using the reverse mapping CNN, important clinical markers for the prediction of TAVR outcomes, such as the annular calcification, have been captured by the low-dimensional feature space (see Figure \ref{fig:result1}). Moreover, a test of predicting the surgical outcome directly using the selected features results in a high accuracy (see Figure \ref{fig:Pred}). This shows GIN preserves the pathophysiologically meaningful features while conducting the dimension reduction and can generate virtual patients with different possible surgical outcomes. \vspace{-10pt} \section{Methodology} \vspace{-5pt} \subsection{Preparing TAVR dataset with augmentation} \vspace{-5pt} \begin{figure}[!t] \vspace{-35pt} \centering \includegraphics[width=0.75\textwidth]{rgan.png} \vspace{-10pt} \caption{\label{fig:GIN} The overall architecture of GIN. It contains a GAN and a CNN.} \vspace{-18pt} \end{figure} Aortic stenosis (AS) is one of the most common yet severe valvular heart diseases. Transcatheter aortic valve replacement (TAVR) is a less-invasive treatment option for AS patients who have a high risk of open-heart surgery \cite{conti2010biomechanical}. The deployment of the TAVR prosthesis involves a complex interaction between the prosthesis, the native aortic root, and the blood flow, which are not fully understood and may affect the procedural outcome, such as the degree of paravalvular leakage (PVL) and the risk of thrombosis/stroke \cite{conti2010biomechanical}. We studied the pre-procedural CT images of 168 AS patient (with an average age of 78) who received TAVR using a self-expandable prosthetic valve (CoreValve, Medtronic) from 2013 to 2016. All of the patients had pre-TAVR contrast-enhanced CT scans, which were performed on a 320-detector row CT scanner (Aquilion ONE, Toshiba). CT images were reconstructed with 10\% increments throughout the cardiac cycle, and the cardiac phase of the peak aortic valve opening was used. Each CT dataset contained a 3D volume of the cardiothoracic region. For computational purpose, we chose only one slide at the aortic annulus (selected by a clinician) for this study. The method itself can be easily generalized to the 3D image volume. Post-TAVR PVL was set to be the major endpoint and was dichotomized to two groups: group 1 included none or low (trace to mild) PVL, while group 2 included high (moderate to severe) PVL. We preformed routine data augmentation by slightly rotating the annular plane to add more samples. The regions of interest were rotated in 3D by four rotation angles in the annulus plane and one rotation angle in the longitudinal X-Z plane, from the original orientation. This led to an augmentation of 10 times the training set size. The augmented dataset was used to train the GIN. \vspace{-10pt} \subsection{Starting from GAN} \vspace{-5pt} The architecture of the GAN is shown in the blue dash box of Figure \ref{fig:GIN} \cite{goodfellow2016deep}. The key idea of the image generation by GAN is regarding the training set images as realizations of a distribution $\mathcal{F}$, which has extremely high-dimensional support (i.e. number of pixels of images). The distribution $\mathcal{F}$ can be physically interpreted as the group of images we are interested in (e.g., the aortic annulus). GAN can actually find a transformation from an easy-to-generate distribution $\mathcal{U}$ (usually, multi-uniform) to a distribution $\mathcal{G}$, which eventually is close enough to the target $\mathcal{F}$. In particular, GAN contains 2 neural networks (NN, see blue dash box of Figure \ref{fig:GIN}). In each training step of stochastic gradient descent (SGD), the realizations $u_i$ of $\mathcal{U}$ is fed into the \textit{generator} to generate $g_i$ following $\mathcal{G}^{(i)}$. Generated image $g_i$ is fed into the \textit{discriminator} to be compared with the training set data $f_i$ and find the discrepancy $d_i$, which is served as the loss function for the generator. The two NN's are trained by alternative optimization, until we think the generated distribution $\mathcal{G}$ is close enough to the true distribution $\mathcal{F}$. GIN contains a GAN part for generation (blue dash box of Figure \ref{fig:GIN}). Moreover, in our framework, the support of distribution $\mathcal{U}$ is regarded as the feature space (it does not yet have any physical meaning) and realizations of the distribution $\mathcal{U}$ are the hidden features of the corresponding valves. This means given a feature vector (a realization of distribution $\mathcal{U}$), the GAN part in GIN can generate a virtual valve based on that feature vector. \vspace{-10pt} \subsection{Adding a CNN for reverse mapping} \vspace{-5pt} As mentioned, the generation using only GAN lacks pathophysiologic interpretation. The reason is that it only gives one-direction mapping from the feature space $\mathcal{U}$ to the real valve distribution $\mathcal{F}$ (assuming the final $\mathcal{G}$ is close enough to the true distribution $\mathcal{F}$, see Section 2.2). Thus, the feature space itself is difficult to interpret, and we are generating virtual patients without meaningful guidance. One way to introduce the pathophysiologic meaning to the feature space is to find corresponding locations of the real patients in that space, since the real patients have surgical records, such as the post-TAVR PVL level, which can be used to label the space and conduct classification. In other words, we need to find the backward mapping from the real valve distribution $\mathcal{F}$ to the feature space $\mathcal{U}$. Therefore, besides GAN, we add a CNN to the framework regarding the generated images $g_i$ from $\mathcal{G}$ as input and the feature $u_i \sim\mathcal{U}$ as the output (see red box of Figure \ref{fig:GIN}). After the CNN is trained, we may feed the model with real patients data $f_i \sim \mathcal{F}$ and find its corresponding feature in the feature space. In most literature, CNN is used for classification \cite{shin2016deep}, which means the supervised value for each data set is discrete. Here, we use the CNN for regression, which means the label $u_i \sim \mathcal{U}$ (features) is a continuous vector with a non-zero measure. This is much more difficult for training when the dimension of $\mathcal{U}$ is high. But the advantage is that we are using the realization of distribution $\mathcal{G}$ (instead of $\mathcal{F}$) as the training set, in which, theoretically speaking, the available data size is infinitely large. In reality, we restrict the dimension of $\mathcal{U}$ to be less than 20 (10 in the case study) to gain a stable training result from CNN. \vspace{-10pt} \subsection{GIN framework} \vspace{-5pt} Putting everything together, GIN contains three NN's, two of them first form a GAN (one generator and one discriminator) to find the transformation from the feature space to the CT images space, then the other NN finds the reverse mapping from the CT images space to the feature space (see Figure \ref{fig:GIN}). Finally, we have the bidirectional mapping between features and CT images. Furthermore, the feature space selected by GIN captures the pathophysiologic information hidden in CT images, which can be used to predict surgical complications (PVL). This allows us to conduct arithmetic operations in the feature space and make sure any generated virtual patients have physical and pathophysiologic meanings (e.g., we can generate a virtual patient knowing it may lead to high PVL or not). It is important to note that our method is essentially different from adversarially learned inference (ALI) or bidirectional GAN (BiGAN) \cite{donahue2016adversarial} in the literature. In order to invest the feature space with pathophysiologic meanings, we need a \textit{hard} inverse, i.e. CNN=Generator$^{-1}$ for every input sample. Thus, GIN has a sequential order of GAN and CNN to make sure the sample-to-sample inverse is explicitly trained and thus has better expressibility (see reconstruction test in Section 3.1). In contrast, BiGAN or ALI uses one discriminator to supervise both generator and encoder, the generator and encoder would be inverse to each other, as claimed, yet only in distribution level, which is not rigorous enough for medical image applications. Moreover, it uses coupling training of 3 NNs. This complicated architecture requires more fine tuning and therefore less suitable for our sparse dataset (see Section 2.1). \begin{figure}[!t] \vspace{-20pt} \centering \includegraphics[width=0.75\textwidth]{result1.png} \vspace{-10pt} \caption{\label{fig:result1} The training results of GIN. (a) the characteristic valve CT images in the feature space, (b) The real patients valve CT image, (c) reconstruction test of the real valves in (b).} \vspace{-20pt} \end{figure} \vspace{-15pt} \section{Results} \vspace{-5pt} In this test, the dimension of the feature space $\mathcal{U}$ is chosen to be 10, the results can be sharper if the feature dimension is increased to 20. But the training cost will also increase dramatically. The two NN's of the GAN part adapt 2-layer vanilla neural networks with 512 hidden nodes in each hidden layer and ReLu activations. CNN has approximately the same complexity with leaky ReLu activation and batch normalization in each layer (see \cite{arjovsky2017wasserstein} for more details). \vspace{-10pt} \subsection{Pathophysiology-interpretable feature mapping} \vspace{-5pt} After training the GIN, a 2D cross-section in the feature space of the valves are shown in Figure \ref{fig:result1} (a). The small figures at different locations mean the corresponding characteristic valve CT images in the specific locations of the feature space. We may find some physical meaning for the two features. In every column, from top to bottom, the valve rotates clockwise and the shape of the valve wall is gradually changed. In every row, from left to right, the amount of calcification (which is the brightest region in the CT images) decreases. According to clinical observations, high amounts of annular calcification could be an important risk factor of post-TAVR PVL. Thus, we may speculate that the left region in the feature space, which has visually more calcium, may be associated with higher rates of surgical complications. Since the bidirectional mapping between the feature space and the valve space (see Section 2.4) is found by GIN, We may conduct the following reconstruction test to visualize the information loss by the framework. The features of the real patients' CT images were first extracted by the CNN part, and then the extracted features were used to generate virtual CT images by the GAN part. Ideally, if there is no information loss in both feature extraction (CNN) and generation (GAN), the reconstructed images should be identical to the real ones. The test results of some representative real CT images (Figure \ref{fig:result1} (b)) are shown in Figure \ref{fig:result1} (c). In the test, the reconstructed images look similar to their real counterparts, especially the overall shape and orientation of the valve. Meanwhile, some of the important details like calcification are also captured. This shows that the GIN captures pathophysiologically meaningful features. Yet some of the details are missing and also the reconstructed images are not as sharp as the real ones. This may be because the training set data is too small even with the augmentation to generate high fidelity images and the feature space is set to be too low to capture higher order features. Comparing our reconstruction test and the ones in the BiGAN paper \cite{donahue2016adversarial}, we would conclude that GIN is better in extracting the features and finding a sample-to-sample hard inverse. \begin{wrapfigure}{r}{0.35\textwidth} \vspace{-50pt} \begin{center} \includegraphics[width=0.35\textwidth]{ISO.png} \vspace{-20pt} \caption{The feature mapping of the real patients in the feature space with different PVL levels. } \label{fig:ISO} \end{center} \vspace{-30pt} \vspace{1pt} \end{wrapfigure} \vspace{-10pt} \subsection{Post-TAVR PVL prediction} \vspace{-5pt} In order to assess the pathophysiologic meaning of the feature space, we look for the relationship between the selected features and PVL. The first 2 Isomap \cite{tenenbaum2000global} features are shown in Figure \ref{fig:ISO}, where the red squares represent the patients with high PVL and the blue crosses represent the patients with low PVL. The two groups of different PVL levels follow different, visually distinguishable distribution, even projecting to a 2D feature plane. \begin{wrapfigure}{r}{0.36\textwidth} \vspace{-18pt} \begin{center} \includegraphics[width=0.36\textwidth]{ROC.png} \vspace{-20pt} \caption{The accuracy measurements (upper) and ROC curves (bottom) of the random forest model in predicting PVL.} \label{fig:Pred} \end{center} \vspace{-35pt} \end{wrapfigure} A more rigorous approach is to quantify the pathophysiologic significance by predicting the post-TAVR PVL level using the features selected. A simple random forest classifier (total 500 decision trees) was used to classify the two groups, namely high PVL and low PVL. A 4-fold cross validation (75\% of data as a training set and 25\% as a validation set) was adopted to check the prediction performance as shown in Figure \ref{fig:Pred}. The average of the test accuracy, sensitivity, and specificity were 81.55\%, 70.76\%, and 82.42\% respectively. The receiver-operating characteristic (ROC) curves are shown in Figure \ref{fig:Pred} of each validation and the AUC values are 0.77, 0.84, 0.82, and 0.88 respectively. All of these turned out to be statistically significant ($p<0.001$). This promising result shows that the features selected by GIN is pathophysiologically interpretable and the information related to PVL outcomes in CT image is well-preserved. \vspace{-10pt} \subsection{CT image generation} \vspace{-5pt} \begin{wrapfigure}{r}{0.3\textwidth} \vspace{-50pt} \begin{center} \includegraphics[width=0.3\textwidth]{gener.png} \vspace{-20pt} \caption{Virtual patient generation with possibly different PVL levels.} \label{fig:gener} \end{center} \vspace{-30pt} \vspace{1pt} \end{wrapfigure} More importantly, the pathophysiologically interpretable features captured by GIN can be used for virtual patient generation. Recall that the GAN can only generate the virtual patients that look like real patients. However, GIN can generate virtual patients with specific pathophysiologic appearances. The random forests classifier (see Section 3.2) actually segments the feature space to two parts according to its predicted PVL level. Thus, we may generate a virtual patient with a high probability of resulting in a high PVL by selecting a feature vector in the high PVL part of the space. As shown in Figure \ref{fig:gener} (a), the generated CT image visually contains a large calcified nodule, which may lead to a high level post-TAVR PVL. We can also generate a virtual patient that is most likely with a low or none PVL as shown in Figure \ref{fig:gener} (b). Also, we may generate a virtual patient with the features near the decision boundary as shown in Figure \ref{fig:gener} (c). Despite the high prediction accuracy shown in Figure \ref{fig:Pred}, the sensitivity is relatively low. Thus, we may generate more virtual patients with a high PVL (Figure \ref{fig:gener} (a)) to reduce the imbalance outcome of the dataset. Also, generating virtual patients with the features near decision boundary (Figure \ref{fig:gener} (c)) can be extremely helpful to improve the prediction ability of the future predictive model. The generated virtual patients can then be 3D printed and go through virtual surgeries to obtain the PVL label in vitro (see \cite{qian2017quantitative} for more experimental details) as future work. \vspace{-12pt} \section{Conclusion} \vspace{-5pt} We proposed a new generative framework \texttt{-} GIN \texttt{-} to generate visually authentic virtual patients by finding the bidirectional feature mapping between the features and the real CT images (see Figure \ref{fig:result1}). Moreover, a test of predicting the surgical outcome directly using the selected features resulted in a high accuracy, which suggests that features contain pathophysiologic meaning (see Figure \ref{fig:Pred}). This means GIN can generate virtual patients with different surgical outcomes for later 3D printing and in-vitro experiments (see Figure \ref{fig:gener}). These virtual patients can be crucial in enhancing the model prediction power as an additional data source and more importantly, understanding the nature of the disease and performing optimal pre-surgical planning. In general, applying GIN to generate physically interpretable virtual samples has great potential for image related machine learning methods with limited and unbalanced datasets. \input{Ref.bbl} \vspace{-12pt} \end{document}
\section{Syntax and semantics of \VPTA}\label{APP:DefinitionVPTA} A (standard) clock valuation over a finite set $C_{st}$ of (standard) clocks is a mapping $\sval: C_{st} \mapsto \RealP$. For $t\in\RealP$ and a reset set $\Res\subseteq C_{st}$, $\sval+ t$ and $\sval[\Res]$ denote the valuations over $C_{st}$ defined as follows for all $z\in C_{st}$: $(\sval +t)(z) = \sval(z)+t$, and $\sval[\Res](z)=0$ if $z\in \Res$ and $\sval[\Res](z)=\sval(z)$ otherwise. \begin{definition}[\VPTA]\emph{A \VPTA\ over a pushdown alphabet $\Sigma= \Scall\cup \Sint \cup \Sret$ is a tuple $\Au=\tpl{\Sigma, Q,Q_{0},C_{st},\Gamma\cup\{\bot\},\Delta,F}$, where $Q$, $Q_0$, $\Gamma$, and $F$ are defined as for \ECNA\ and $\Delta=\Delta_c\cup \Delta_r\cup \Delta_i$ is a transition relation, where: \begin{compactitem} \item $\Delta_c\subseteq Q\times \Scall \times \Phi(C_{st}) \times 2^{C_{st}} \times Q \times \Gamma$ is the set of \emph{push transitions}, \item $\Delta_r\subseteq Q\times \Sret \times \Phi(C_{st}) \times 2^{C_{st}} \times (\Gamma\cup \{\bot\}) \times Q $ is the set of \emph{pop transitions}, \item $\Delta_i\subseteq Q\times \Sint\times \Phi(C_{st}) \times 2^{C_{st}} \times Q $ is the set of \emph{internal transitions}. \end{compactitem}} \end{definition} A configuration of $\Au$ is a triple $(q,\beta,\sval)$, where $q\in Q$, $\beta\in\Gamma^*\cdot\{\bot\}$ is a stack content, and $\sval$ is a valuation over $C_{st}$. A run $\pi$ of $\Au$ over a timed word $w=(\sigma,\tau)$ is a sequence of configurations $\pi=(q_0,\beta_0,\sval_0),(q_1,\beta_1,\sval_1),\ldots $ of length $|w|+1$ such that $q_0\in Q_{0}$, $\beta_0=\bot$, $\sval_0(z)=0$ for all $z\in C_{st}$ (initialization requirement), and the following holds for all $0\leq i< |w|$, where $t_i=\tau_i-\tau_{i-1}$ ($\tau_{-1}=0$): \begin{itemize} \item \textbf{Push:} If $\sigma_i \in \Scall$, then for some $(q_i,\sigma_i,\theta,\Res,q_{i+1},\gamma)\in\Delta_c$, $\beta_{i+1}=\gamma\cdot \beta_i$, $\sval_{i+1}= (\sval_i +t_i)[\Res]$, and $(\sval_i +t_i)\models \theta$. \item \textbf{Pop:} If $\sigma_i \in \Sret$, then for some $(q_i,\sigma_i,\theta,\Res,\gamma,q_{i+1})\in\Delta_r$, $\sval_{i+1}= (\sval_i +t_i)[\Res]$, $(\sval_i +t_i)\models \theta$, and \emph{either} $\gamma\neq\bot$ and $\beta_{i}=\gamma\cdot \beta_{i+1}$, \emph{or} $\gamma=\beta_{i}= \beta_{i+1}=\bot$. \item \textbf{Internal:} If $\sigma_i \in \Sint$, then for some $(q_i,\sigma_i,\theta,\Res,q_{i+1})\in\Delta_i$, $\beta_{i+1}=\beta_i$, $\sval_{i+1}= (\sval_i +t_i)[\Res]$, and $(\sval_i +t_i)\models \theta$. \end{itemize} The notion of acceptance is defined as for \ECNA. \section{Proof of Theorem~\ref{theo:expressofNovelModalities}}\label{APP:expressofNovelModalities} We focus on the case of finite timed words (the case of infinite timed words is similar). Let $\Fragm$ be the fragment of \ECNTL\ obtained by disallowing the timed non-regular modalities $\PrevClock^{\abs}_I$, $\PrevClock^{\caller}_I$, and $\NextClock^{\abs}_I$. Theorem~\ref{theo:expressofNovelModalities} (for finite timed words) directly follows from the following result. \begin{proposition}\label{prop:expressivOfNovelMod} Let $\Prop =\{\call,\ret\}$ and $\TLang$ be the timed language consisting of the finite timed words of the form $(\sigma,\tau)$ such that $\sigma$ is a well-matched word of the form $ \{\call\}^{n} \cdot \{\ret\}^{n}$ for some $n>0$, and there is a call position $i_c$ of $\sigma$ such that $\tau_{i_r}-\tau_{i_c} = 1$, where $i_r$ is the matching-return of $i_c$ in $\sigma$. Then, $\TLang$ can be expressed in \ECNTL\ but not in $\Fragm$. \end{proposition} \begin{proof} The language $\TLang$ is definable by the following $\ECNTL $ formula \[ \call \wedge \Next^{\abs}(\neg \Next^{\Global}\top) \wedge \Always^{\Global}\neg\intA \wedge \neg \Eventually^{\Global}(\ret \wedge \Eventually^{\Global}\call) \wedge \Eventually^{\Global} (\call \wedge \NextClock^{\abs}_{[1,1]}\, \top) \] Next, we show that no formula in $\Fragm$ can capture the language $\TLang$. For a formula $\varphi$ of $\Fragm$, let $d(\varphi)$ be the nesting depth of the \emph{unary} temporal modalities in $\varphi$. For all $H\geq 1$, let $w^{H}_\good$ and $w^{H}_\bad$ be the well-matched timed words over $\Sigma_\Prop$ of length $4H+2$ and $4H$, respectively, defined as follows. \begin{itemize} \item $w^{H}_\good = (\{\call\},\frac{1}{2H+1}) \ldots (\{\call\},\frac{2H+1}{2H+1})\cdot (\{\ret\},1+\frac{1}{2H+1}) \ldots (\{\ret\},1+\frac{2H+1}{2H+1})$ \item $w^{H}_\bad$ is obtained from $w^{H}_\good$ by removing the call-position $H$ and its matching-return position $3H+1$. \end{itemize} By construction, position $H$ of $w^{H}_\good$ is the unique call-position $i_c$ of $w^{H}_\good$ such that the time distance between the matching-return of $i_c$ and $i_c$ is exactly $1$. Hence, for all $H\geq 1$, $w^{H}_\good\in \TLang$ and $w^{H}_\bad\notin \TLang$. We prove that for all $H\geq 1$ and formula $\varphi$ in $\Fragm$ such that $d(\varphi)<H$, $w^{H}_\good$ is a model of $\varphi$ iff $w^{H}_\bad$ is a model of $\varphi$. Hence, $\TLang$ is not expressible in $\Fragm$ and the result follows. For this, we first prove the following claim.\vspace{0.2cm} \noindent \textbf{Claim 1:} Let $H\geq 1$, $0\leq k\leq H$, and $\varphi\in \Fragm$ with $d(\varphi)\leq H-k$. Then, the following holds: \begin{compactenum} \item for all $i,j\in [H-k,H+k]$, $(w_\good^{H},i)\models\varphi$ iff $(w_\good^{H},j)\models\varphi$; \item for all $i,j\in [3H+1-k,3H+1+k]$, $(w_\good^{H},i)\models\varphi$ iff $(w_\good^{H},j)\models\varphi$. \end{compactenum}\vspace{0.2cm} \noindent \textbf{Proof of Claim 1:} Let $H\geq 1$, $0\leq k\leq H$, and $\varphi\in \Fragm$ with $d(\varphi)\leq H-k$. We prove the implication $(w_\good^{H},i)\models\varphi$ $\rightarrow$ $(w_\good^{H},j)\models\varphi$ in Properties~1 and~2 (the converse implication being similar). The proof is by induction on the structure of the formula and the nesting depth $d(\varphi)$. By construction, for all $\ell\in [H-k,H+k]$ (resp., $\ell\in [3H+1-k,3H+1+k]$), $\ell$ is a call position (resp., return position) of $w_\good^{H}$. Hence, the base case holds, while the cases where the root modality of $\varphi$ is a Boolean connective directly follow from the induction hypothesis. For the other cases, we focus on Property~1 (Property~2 being similar). Thus, let $i,j\in [H-k,H+k]$. For a call-position $\ell \in [0,2H]$ in $w_\good^{H}$, let $\ret(\ell)$ be the matching-return position. Note that $\ret(\ell)= 4H+1-\ell$. Since $\varphi\in\Fragm$, we have to consider the following cases: \begin{itemize} \item $\varphi = \varphi_1 \Until^{\Global} \,\varphi_2$. Assume that $(w_\good^{H},i)\models\varphi$. Hence, there is $\ell\in [i,4H+1]$ such that $(w_\good^{H},\ell)\models\varphi_2$ and $(w_\good^{H},\ell')\models\varphi_1$ for all $\ell'\in [i,\ell-1]$. We distinguish two cases: \begin{compactitem} \item $\ell>j$. By the induction hypothesis, either $\ell= i$ and $(w_\good^{H},j)\models\varphi_2$, or $\ell>i$ and for all positions $p$ between $i$ and $j$, $(w_\good^{H},p)\models\varphi_1$. It follows that $(w_\good^{H},j)\models\varphi$. \item $\ell\leq j$. Hence, $\ell\in [i,j]$. By the induction hypothesis, $(w_\good^{H},j)\models\varphi_2$, and the result follows. \end{compactitem} \item $\varphi = \varphi_1 \Since^{\Global}\, \varphi_2$: this case is similar tho the previous one. \item $\varphi = \varphi_1 \Until^{\abs}\, \varphi_2$. Assume that $(w_\good^{H},i)\models\varphi$. Since position $i$ is a call, by construction, either $(w_\good^{H},i)\models\varphi_2$, or $(w_\good^{H},i)\models\varphi_1$ and $(w_\good^{H},\ret(i))\models\varphi_2$. Since $\ret(i),\ret(j)\in [3H+1-k,3H+1+k]$, by the induction hypothesis on Properties~1 and~2, either $(w_\good^{H},j)\models\varphi_2$, or $(w_\good^{H},j)\models\varphi_1$ and $(w_\good^{H},\ret(j))\models\varphi_2$. Hence, $(w_\good^{H},j)\models\varphi$. \item $\varphi = \varphi_1 \Since^{\abs}\, \varphi_2$: this case is similar tho the previous one. \item $\varphi = \varphi_1 \Since^{\caller} \,\varphi_2$: since $i\in [H-k,H+k]$, by construction, $(w_\good^{H},i)\models\varphi_1 \Since^{\caller} \,\varphi_2$ iff $(w_\good^{H},i)\models\varphi_1 \Since^{\Global}\, \varphi_2$, and the result follows from the case for modality $\Since^{\Global}$. \item $\varphi = \Next^{\Global} \,\varphi_1$. Let $(w_\good^{H},i)\models\varphi$. Hence, $(w_\good^{H},i+1)\models\varphi_1$. Since $d(\varphi)\geq 1$ and $d(\varphi)\leq H-k$, we have that $k+1 \leq H$, $ d(\varphi_1)\leq H-(k+1)$, and $i+1,j+1\in [H-(k+1),H+(k+1)]$. Thus, by the induction hypothesis on $d(\varphi_1)$, we obtain that $(w_\good^{H},j)\models\varphi$. \item $\varphi = \Prev^{\Global} \,\varphi_1$: this case is similar to the previous one. \item $\varphi = \Next^{\abs} \,\varphi_1$: let $(w_\good^{H},i)\models\varphi$. Since position $i$ is a call, by construction, $(w_\good^{H},\ret(i))\models\varphi_1$. Since $\ret(i),\ret(j)\in [3H+1-k,3H+1+k]$, by the induction hypothesis on Property~2, it follows that $(w_\good^{H},\ret(j))\models\varphi_1$. Hence, $(w_\good^{H},j)\models\varphi$. \item $\varphi = \Prev^{\abs} \,\varphi_1$: this case is similar to the previous one. \item $\varphi = \Prev^{\caller} \,\varphi_1$: since $i\in [H-k,H+k]$, by construction, $(w_\good^{H},i)\models\Prev^{\caller} \,\varphi_1$ iff $(w_\good^{H},i)\models\Prev^{\Global} \,\varphi_1$, and the result follows from the case for modality $\Prev^{\Global}$. \item $\varphi = \NextClock^{\Global}_I \,\varphi_1$: for all positions $\ell\in [0,4H+1]$, let $\tau_\ell$ be the timestamp of $w_\good^{H}$ at position $\ell$. Moreover, if $\ell\in [0,2H]$, let $m(\ell):= 2H+1+\ell$. By construction, $\tau_{m(\ell)}-\tau_\ell=1$. Assume that $(w_\good^{H},i)\models\varphi$. Hence, there is $\ell\in [i+1,4H+1]$ such that $(w_\good^{H},\ell)\models\varphi_1$, $\tau_\ell-\tau_i\in I$ and $(w_\good^{H},\ell')\not\models\varphi_1$ for all $\ell'\in [i+1,\ell-1]$. By construction, one of the following cases occurs: \begin{compactitem} \item $\tau_\ell-\tau_i=1$: by construction, $\ell = m(i)$. Hence, $\ell\in [3H+1-k,3H+1+k]$. We show that this case cannot occur. Since $d(\varphi)\geq 1$ and $d(\varphi)\leq H-k$, we have that $k+1 \leq H$, $ d(\varphi_1)\leq H-(k+1)$, and $\ell,\ell-1\in [3H+1-(k+1),3H+1+(k+1)]$. Thus, by the induction hypothesis on $d(\varphi_1)$, $(w_\good^{H},\ell)\models\varphi_1$ iff $(w_\good^{H},\ell-1)\models\varphi_1$. On the other hand, by hypothesis, $(w_\good^{H},\ell)\models\varphi_1$ and $(w_\good^{H},\ell-1)\not\models\varphi_1$, a contradiction. \item $1<\tau_\ell-\tau_i<2$: hence, $\ell>m(i)>i$ and $(w_\good^{H},m(i))\not\models\varphi_1$. Since, $m(i) \in [3H+1-k,3H+1+k]$, by the induction hypothesis, it follows that $\ell>3H+1+k\geq m(j)$ which entails that $1<\tau_\ell-\tau_j<2$. It follows that $\tau_\ell-\tau_j\in I$, and by the induction hypothesis on $d(\varphi_1)$, we easily obtain that for all the positions $p$ between $i$ and $j$, $(w_\good^{H},p)\not\models \varphi_1$. It follows that $(w_\good^{H},j)\models\NextClock^{\Global}_I \,\varphi_1$. \item $0<\tau_\ell-\tau_i<1$ and $\ell$ is a return-position: hence, $i<\ell<m(i)$. By the induction hypothesis on $d(\varphi_1)$, we deduce that $\ell \notin [3H+1-k,3H+1+k]$ (otherwise, $(w_\good^{H},\ell-1)\models \varphi_1$). It follows that $j<\ell<m(j)$ which entails that $0<\tau_\ell-\tau_j<1$. Hence, $\tau_\ell-\tau_j\in I$, and by the induction hypothesis on $d(\varphi_1)$, we easily obtain that $(w_\good^{H},j)\models\NextClock^{\Global}_I \,\varphi_1$. \item $0<\tau_\ell-\tau_i<1$ and $\ell$ is a call-position: if $\ell\in [H-(k+1),H+(k+1)]$, then by the induction hypothesis on $d(\varphi_1)$, we have that $(w_\good^{H},j+1)\models \varphi_1$, and since $0<\tau_{j+1}-\tau_j<1$, we obtain that $(w_\good^{H},j)\models\NextClock^{\Global}_I \,\varphi_1$. On the other hand, if $\ell>H+(k+1)$, by the induction hypothesis, we deduce that for all positions $p$ between $i$ and $j$, $(w_\good^{H},p)\not\models \varphi_1$. Thus, since by construction $0<\tau_\ell -\tau_j<1$, we conclude that $(w_\good^{H},j)\models\NextClock^{\Global}_I \,\varphi_1$. \end{compactitem} \item $\varphi = \PrevClock^{\Global}_I \,\varphi_1$: this case is similar to the previous one. \end{itemize} This concludes the proof of Claim 1.\qed \vspace{0.2cm} Let $H\geq 1$. For each position $i$ of $w_\bad^{H}$ (note that $i\in [0,4H-1]$), we denote by $H(i)$ the associated position in $w_\good^{H}$, i.e. the unique position $j$ of $w_\good^{H}$ such that $w_\bad^{H}(i)=w_\good^{H}(j)$. By exploiting Claim~1, we deduce the following Claim~2. Since $H(0)=0$, Claim~2 entails the desired result, i.e. for all $H\geq 1$ and formulas $\varphi$ in $\Fragm$ such that $d(\varphi)<H$, $(w^{H}_\good,0)\models \varphi$ iff $(w^{H}_\bad,0)\models \varphi$.\vspace{0.2cm} \noindent \textbf{Claim 2:} Let $H\geq 1$ and $\varphi\in \Fragm$ with $d(\varphi)< H$. Then, for all $i\in [0,4H-1]$, \[ (w_\bad^{H},i)\models\varphi \text{ iff } (w_\good^{H},H(i))\models\varphi \] \noindent \textbf{Proof of Claim 2:} Let $H\geq 1$ and $\varphi\in \Fragm$ with $d(\varphi)<H$. We prove by structural induction on $\varphi$ that for all $i\in [0,4H-1]$, $(w_\bad^{H},i)\models\varphi$ iff $(w_\good^{H},H(i))\models\varphi$. By construction, for all $i\in [0,4H-1]$, $w_\bad^{H}(i)=w_\good^{H}(H(i))$. Hence, the base case holds, while the cases where the root modality of $\varphi$ is a Boolean connective directly follow from the induction hypothesis. Since $\varphi\in\Fragm$, it remains to consider the following cases: \begin{itemize} \item $\varphi = \varphi_1 \Until^{\Global} \,\varphi_2$. Assume that $(w_\good^{H},H(i))\models\varphi$. Hence, there is $\ell\in [H(i),4H+1]$ such that $(w_\good^{H},\ell)\models\varphi_2$ and $(w_\good^{H},\ell')\models\varphi_1$ for all $\ell'\in [H(i),\ell-1]$. Assume that $\ell \neq H(p)$ for all positions $p$ of $w_\bad^{H}$ (the other case being simpler). Hence, $\ell\in \{H,3H+1\}$. Let $\wp \in [0,4H-1]$ such that $H(\wp)=\ell-1$. Since $d(\varphi)<H$, by Claim~1, $(w_\good^{H},\ell-1)\models\varphi_2$. Thus, since $i\leq \wp$ and $H(p)\in [H(i),H(\wp)-1]$ for all $p\in [i,\wp-1]$, by the induction hypothesis, it follows that $(w_\bad^{H},i)\models\varphi$. The converse implication $(w_\bad^{H},i)\models\varphi$ $\Rightarrow$ $(w_\good^{H},H(i))\models\varphi$ is similar. \item $\varphi = \varphi_1 \Since^{\Global}\, \varphi_2$: this case is similar tho the previous one. \item $\varphi = \varphi_1 \Until^{\abs}\, \varphi_2$ or $\varphi = \varphi_1 \Since^{\abs}\, \varphi_2$. By construction, for all $i\in [0,4H-1]$, the \MAP\ of $w_\bad^{H}$ visiting position $i$ consists of the positions $i$ and $mt(i)$, where $mt(i)$ is the matching-return of $i$ if $i$ is a call, and the matching-call of $i$ otherwise. Moreover, the \MAP\ of $w_\good^{H}$ visiting position $H(i)$ consists of the positions $H(i)$ and $H(mt(i))$. Hence, the result for the abstract until and since modalities, directly follows from the induction hypothesis. \item $\varphi = \varphi_1 \Since^{\caller} \,\varphi_2$: let $i\in [0,4H-1]$. By construction, $(w_\bad^{H},i)\models\varphi_1 \Since^{\caller} \,\varphi_2$ iff either (i) $i$ is a call and $(w_\bad^{H},i)\models\varphi_1 \Since^{\Global} \,\varphi_2$, or (ii) $i$ is a return, and either $(w_\bad^{H},i)\models \varphi_2$, or $(w_\bad^{H},i_c)\models\varphi_1 \Since^{\Global} \,\varphi_2$, where $i_c$ is the caller of $i$. Hence, the case for modality $\Since^{\caller}$ easily reduces to the case of modality $\Since^{\Global}$. \item $\varphi = \Next^{\Global} \,\varphi_1$. Assume that $(w_\good^{H},H(i))\models\varphi$. Hence, $H(i)< 4H+1$ and $(w_\good^{H},H(i)+1)\models\varphi_1$. By construction, \emph{either} $H(i)+1 = H(i+1)$, \emph{or} $H(i)+1\in \{H,3H+1\}$ and $H(i+1)= (H(i)+1)+1$. In the first case, by the induction hypothesis, we obtain that $(w_\good^{H},i+1)\models\varphi_1$. In the second case, by applying Claim~1, we deduce that $(w_\good^{H},H(i)+2)\models\varphi_1$, hence, by the induction hypothesis, $(w_\good^{H},i+1)\models\varphi_1$ holds as well. The converse implication $(w_\bad^{H},i)\models\varphi$ $\Rightarrow$ $(w_\good^{H},H(i))\models\varphi$ is similar. \item $\varphi = \Prev^{\Global} \,\varphi_1$: this case is similar to the previous one. \item $\varphi = \Next^{\abs} \,\varphi_1$ or $\varphi = \Prev^{\abs} \,\varphi_1$: this case is similar to the case of the abstract until and since modalities. \item $\varphi = \Prev^{\caller} \,\varphi_1$: let $i\in [0,4H-1]$. By construction, $(w_\bad^{H},i)\models\Prev^{\caller} \,\varphi_1$ iff either (i) $i$ is a call and $(w_\bad^{H},i)\models\Prev^{\Global} \,\varphi_1$, or (ii) $i$ is a return and $(w_\bad^{H},i_c)\models\Prev^{\Global} \,\varphi_1$, where $i_c$ is the matched-call of $i$. Hence, the case for modality $\Prev^{\caller}$ reduces to the case of modality $\Prev^{\Global}$. \item $\varphi = \NextClock^{\Global}_I \,\varphi_1$: for all positions $\ell$ of $w_\good^{H}$ (resp., $w_\bad^{H}$), let $\tau_\ell^{\good}$ (resp., $\tau_\ell^{\bad}$) be the timestamp of $w_\good^{H}$ (resp., $w_\bad^{H}$) at position $\ell$. Let $i\in [0,4H-1]$. We prove the implication $(w_\good^{H},H(i))\models\varphi \Rightarrow (w_\bad^{H},i)\models\varphi$ (the converse implication being similar). Let $(w_\good^{H},H(i))\models\varphi$. Hence, there is $\ell\in [H(i)+1,4H+1]$ such that $(w_\good^{H},\ell)\models\varphi_1$, $\tau^{\good}_\ell-\tau^{\good}_{H(i)}\in I$ and $(w_\good^{H},\ell')\not\models\varphi_1$ for all $\ell'\in [H(i)+1,\ell-1]$. We distinguish two cases: \begin{compactitem} \item $\ell > H(i)+1$: by hypothesis, $(w_\good^{H},\ell-1)\not\models\varphi_1$ and $(w_\good^{H},\ell)\models\varphi_1$. We first show that $\ell= H(j)$ for some $j\in [0,4H-1]$. We assume the contrary and derive a contradiction. Hence, $\ell \in \{H,3H+1\}$. Since $d(\varphi)<H$, by Claim~1, we deduce that $(w_\good^{H},\ell-1)\models\varphi_1$, a contradiction. Hence, $\ell = H(j)$ for some $j\in [0,4H-1]$. By construction, $\tau^{\good}_{H(j)} -\tau^{\good}_{H(i)} = \tau^{\bad}_j-\tau^{\bad}_i$. Thus, by the induction hypothesis, we obtain that $(w_\bad^{H},i)\models\varphi$, and the result follows. \item $\ell= H(i) +1$. Hence, by construction, $0<\tau^{\good}_\ell-\tau^{\good}_{H(i)}<1$. If $H(i)+1 = H(i+1)$, then being $0<\tau^{\bad}_{i+1}-\tau^{\bad}_i<1$, the result directly follows from the induction hypothesis. Otherwise, $\ell\in \{H,3H+1\}$ and $H(i+1)= \ell+1$. By applying Claim~1 and the induction hypothesis, we obtain that $(w_\bad^{H},i+1) \models\varphi_1$. Moreover, by construction, $0<\tau^{\bad}_{i+1}-\tau^{\bad}_i<1$. Hence, the result follows. \end{compactitem} \item $\varphi = \PrevClock^{\Global}_I \,\varphi_1$: this case is similar to the previous one. \qed \end{itemize} \noindent This concludes the proof of Proposition~\ref{prop:expressivOfNovelMod}. \end{proof} \section{Proof of Proposition~\ref{prop:TimedHintikkaSequence}}\label{APP:TimedHintikkaSequence} Proposition~\ref{prop:TimedHintikkaSequence} directly follows from the following two lemmata. \begin{lemma}\label{lemma:FirstHintikkaSequence} Let $\pi=(A_0,t_0)(A_1,t_1)\ldots$ be a fair Hintikka sequence of an $\ECNTL$ formula $\varphi$ and $\sigma = A_0 A_1\ldots$. Then, for all $i\geq 0$, the following holds: \begin{compactenum} \item $p_{\infty}\notin A_i$ \emph{iff} $i$ has a caller whose matching return exists; \item for all $\psi\in \Cl(\varphi)\setminus \{p_{\infty},\neg p_{\infty}\}$, $\psi\in A_i$ \emph{iff} $(\Proj_\varphi(\pi),i)\models \psi$. \end{compactenum} \end{lemma} \begin{proof} Let $\pi=(A_0,t_0)(A_1,t_1)\ldots$ be a fair Hintikka sequence of $\varphi$, $\sigma = A_0 A_1\ldots$, and $P_f$ be the set of positions $i\geq 0$ such that $i$ has a caller in $\sigma$ whose matching return exists.\vspace{0.2cm} \noindent \emph{Proof of Property 1:} let $i\geq 0$ and $\nu$ be the $\MAP$ of $\sigma$ visiting position $i$. We need to show that $p_{\infty}\notin A_i$ iff $i\in P_f$. By Property~3 in Definition~\ref{Def:HintikkaSequence}, \emph{either} for all positions $j$ visited by $\nu$, $p_{\infty}\in A_j$, \emph{or} for all positions $j$ visited by $\nu$, $p_{\infty}\notin A_j$. We distinguish the following cases: \begin{itemize} \item $\nu$ is finite and leads to an unmatched call: hence, for all positions $j$ visited by $\nu$, $j\notin P_f$. Since $\pi$ is an Hintikka sequence, by Property~3 in Definition~\ref{Def:HintikkaSequence}, $\nu$ visits only positions $j$ where $p_{\infty}\in A_j$, and the result follows. \item $\nu$ is finite and leads to a non-call position $k$ such that $k+1$ is a return position. If $k+1$ has no matched call, then for all positions $j$ visited by $\nu$, $j\notin P_f$. Moreover, by Property~3 in Definition~\ref{Def:HintikkaSequence}, $p_{\infty}\in A_k\cap A_{k+1}$. Hence, $\nu$ visits only positions $j$ where $p_{\infty}\in A_j$, and the result follows. Now, assume that $k+1$ has a matched call $i_c$. This means that $\nu$ starts at $i_c+1$ and for all positions $j$ visited by $\nu$, $j\in P_f$. By Property~3 in Definition~\ref{Def:HintikkaSequence}, $p_{\infty}\notin A_{i_c+1}$. Hence, $\nu$ visits only positions $j$ where $p_{\infty}\notin A_j$, and the result follows in this case as well. \item $\nu$ is infinite: hence, for all positions $j$ visited by $\nu$, $j\notin P_f$. By definition of abstract path, $\nu$ is the unique infinite \MAP\ of $\sigma$, and there is $k\geq 0$ such that for all $m\geq k$, either $m$ is visited by $\nu$ (hence, $m\notin P_f$), or $m\in P_f$. By the previous case, if $m \in P_f$, then $p_{\infty}\notin A_m$. Since $\pi$ is fair, for infinitely many $h\geq 0$, $p_{\infty}\in A_h$. Thus, we deduce that for all positions $j$ visited by $\nu$, $p_{\infty}\in A_j$, and the result follows. \end{itemize} \noindent \emph{Proof of Property 2:} let $i\geq 0$ and $\psi\in \Cl(\varphi)\setminus \{p_{\infty},\neg p_{\infty}\}$. We prove by induction on the structure of $\psi$ that $\psi\in A_i$ \emph{iff} $(\Proj_\varphi(\pi),i)\models \psi$. Here, we focus on the cases where the root modality of $\psi$ is either $\Until^{\abs}$ or $\NextClock^{\abs}_I$. The other cases are similar or simpler. \begin{itemize} \item $\psi = \psi_1\Until^{\abs}\psi_2$: first, assume that $(\Proj_\varphi(\pi),i)\models \psi$. Hence, there exists an infix of the $\MAP$ of $\sigma$ visiting $i$ of the form $j_0<j_1\ldots <j_n$ such that $j_0=i$, $(\Proj_\varphi(\pi),j_n)\models \psi_2$ and $(\Proj_\varphi(\pi),j_k)\models \psi_1$ for all $0\leq k<n$. By the induction hypothesis, $\psi_2\in A_{j_n}$ and $\psi_1\in A_{j_k}$ for all $0\leq k<n$. Thus, since $\pi$ is an Hintikka sequence, by definition of atom and Property~3 in Definition~\ref{Def:HintikkaSequence}, it follows that $\psi_1\Until^{\abs}\psi_2\in A_{j_h}$ for all $0\leq h\leq n$. Hence, being $i=j_0$, we obtain that $\psi\in A_i$ and the result follows. Now assume that $\psi\in A_i$. We need to show that $(\Proj_\varphi(\pi),i)\models \psi$. Let $\nu$ be the $\MAP$ of $\sigma$ visiting position $i$. Assume that $\nu$ is infinite (the other case being simpler). Let $\nu^{i} = j_0<j_1 \ldots$ be the suffix of $\nu$ starting from position $i$, where $j_0=i$. Since $\pi$ is an Hintikka sequence, by definition of atom and Property~3 in Definition~\ref{Def:HintikkaSequence}, one of the following holds: \begin{compactitem} \item there is $n\geq 0$ such that $\psi_2\in A_{j_n}$ and $\psi_1\in A_{j_k}$ for all $0\leq k<n$. Since $i=j_0$, from the induction hypothesis, we obtain that $(\Proj_\varphi(\pi),i)\models \psi$, hence, in this case, the result holds. \item for all $n\geq 0 $, $\psi \in A_{j_n}$ and $\psi_2 \notin A_{j_n}$: we show that this case cannot hold. Hence, the result follows. Since the $\MAP$ $\nu$ is infinite, there is $k\geq 0$ such that for all positions $m\geq k$, $m\notin P_f$ iff position $m$ is visited by $\nu^i$. By Property~1, it follows that there is $k\geq 0$ such that for all positions $m\geq k$, $p_{\infty}\in A_m$ iff position $m$ is visited by $\nu^i$. Since $\pi$ is fair, it holds that for infinitely many $m\geq 0$, $p_{\infty}\in A_m$ and $\{\psi_2,\neg(\psi_1\Until \psi_2)\}\cap A_m\neq \emptyset$. Hence, for infinitely many $n\geq 0$, either $\psi \notin A_{j_n}$ or $\psi_2 \in A_{j_n}$, which is a contradiction. \end{compactitem} \item $\psi=\NextClock^{\abs}_I\theta$: we have that $(\Proj_\varphi(\pi),i)\models \psi$ \emph{if and only if} there exists $j>i$ such that $j\in\Pos(\abs,\sigma,i)$, $(\Proj_\varphi(\pi),j)\models \theta$, $t_j-t_i\in I$, and for all $k\in \Pos(\abs,\sigma,i)$ such that $i<k<j$, $(\Proj_\varphi(\pi),k)\not\models \theta$ \emph{if and only if} (from the induction hypothesis) there exists $j>i$ such that $j\in\Pos(\abs,\sigma,i)$, $\theta\in A_j$, $t_j-t_i\in I$, and for all $k\in \Pos(\abs,\sigma,i)$ such that $i<k<j$, $\theta\notin A_k$ \emph{if and only if} $\val_i^{\pi}(y^{\abs}_{\theta})\in I$ \emph{if and only if} (from Property~4 in Definition~\ref{Def:HintikkaSequence}) $\NextClock^{\abs}_I\theta\in A_i$. \end{itemize} \end{proof} \begin{lemma}\label{lemma:SecondHintikkaSequence} For all $\ECNTL$ formulas $\varphi$, the mapping $\Proj_\varphi$ is a bijection between the set of fair Hintikka sequences of $\varphi$ and the set of infinite timed words over $\Sigma_\Prop$. \end{lemma} \begin{proof} First, we show that $\Proj_\varphi$ is injective. Let $\pi$ and $\pi'$ two fair Hintikka sequences such that $\Proj_\varphi(\pi)=\Proj_\varphi(\pi')=(\sigma,\tau)$. Hence, $\pi = (A_0,\tau_0)(A_1,\tau_1)\ldots$ and $\pi'=(A'_0,\tau_0)(A'_1,\tau_1)\ldots$. By Lemma~\ref{lemma:FirstHintikkaSequence}, for all $i\geq 0$, $A_i=A'_i$. Hence, $\pi=\pi'$, and the result follows. It remains to show that $\Proj_\varphi$ is surjective. Let $w=(\sigma,\tau)$ be an infinite timed word over $\Sigma_\Prop$. For each $i\geq 0$, let $A_i$ be the subset of $\Cl(\varphi)$ defined as follows: \begin{compactitem} \item for all $\psi\in \Cl(\varphi)\setminus \{p_{\infty},\neg p_{\infty}\}$, $\psi\in A_i$ if $(w,i)\models \psi$, and $\neg\psi\in A_i$ otherwise. \item $p_{\infty} \notin A_i$ iff $i$ has a caller whose matching return exists. \end{compactitem} Let $\pi =(A_0,\tau_0)(A_1,\tau_1)\ldots$. By construction, for all $i\geq 0$, $A_i\cap \Prop =\sigma_i$. Thus, it suffices to show that $\pi$ is a fair Hintikka sequence of $\varphi$. By the semantics of $\ECNTL$, it easily follows that for all $i\geq 0$, $A_i$ is an atom of $\varphi$, and $\pi$ satisfies Properties~1--3 in the definition of Hintikka sequence of $\varphi$ (Definition~\ref{Def:HintikkaSequence}). Now, let us consider Property~4 in Definition~\ref{Def:HintikkaSequence} concerning the real-time formulas in $\Cl(\varphi)$. Let us focus on real-time formulas of the form $\NextClock^{\abs}_{I}\psi\in \Cl(\varphi)$ (the other cases being similar). We have that $\NextClock^{\abs}_{I}\psi\in A_i$ \emph{if and only if} (by construction) $(w,i)\models \NextClock^{\abs}_{I}\psi$ \emph{if and only if} (by the semantics of $\ECNTL$) there exists $j>i$ such that $j\in\Pos(\abs,\sigma,i)$, $(w,j)\models \psi$, $t_j-t_i\in I$, and for all $k\in \Pos(\abs,\sigma,i)$ such that $i<k<j$, $(w,k)\not\models \psi$ \emph{if and only if} (by construction) there exists $j>i$ such that $j\in\Pos(\abs,\sigma,i)$, $\psi\in A_j$, $t_j-t_i\in I$, and for all $k\in \Pos(\abs,\sigma,i)$ such that $i<k<j$, $\psi\notin A_k$ \emph{if and only if} (by definition of $\val_i^{\pi}$) $\val_i^{\pi}(y^{\abs}_{\psi})\in I$. Hence, Property~4 of Definition~\ref{Def:HintikkaSequence} holds, and $\pi$ is an Hintikka sequence of $\varphi$. It remains to show that $\pi$ is fair. By construction and the semantics of $\ECNTL$, the fulfillment of the fairness constraint about the global until modalities easily follows from standard arguments. Now, let consider the non-local constraint on the proposition $p_{\infty}$. We need to show that for infinitely many $i\geq 0$, $p_{\infty} \in A_i$. Since for an infinite word over a pushdown alphabet, either there is an infinite \MAP, or there are an infinite number of unmatched call positions, or there are an infinite number of unmatched return positions, by construction, the result trivially follows. It remains to consider the fairness requirements on the abstract until modalities. Let $\psi_1\Until^{\abs} \psi_2\in\Cl(\varphi)$. We need to show that there are infinitely many $i\geq 0$ such that $p_{\infty}\in A_i$ and $\{\psi_2,\neg(\psi_1\Until \psi_2)\}\cap A_i\neq \emptyset$. By the above observation, one of the following holds: % \begin{compactitem} \item either the set $H$ of unmatched call positions in $\sigma$ is infinite, or the set $K$ of unmatched return positions in $\sigma$ is infinite: let us consider the second case (the first one being similar). By construction, for all $i\in K$, $p_{\infty}\in A_i$. Moreover, if $(w,i)\models\psi_1\Until^{\abs} \psi_2$, then $(w,j)\models\psi_2$ for some position $j\geq i$ along the $\MAP$ associated with position $i$. Since $p_{\infty}\in A_i$, $p_{\infty}\in A_j$ as well. Hence, by construction, the result follows. \item $\sigma$ has an infinite $\MAP$ $\nu$. By construction, for all positions $i$ visited by $\nu$, $p_{\infty}\in A_i$. Thus, by the semantics of the abstract until modalities, it follows that there are infinitely many positions $j$ along $\nu$ such that $\{\psi_2,\neg(\psi_1\Until \psi_2)\}\cap A_j\neq \emptyset$, and the result follows. \end{compactitem} \end{proof} \section{Construction of the generalized B\"{u}chi \ECNA\ $\Au_\varphi$ in the proof of Theorem~\ref{theo:FromECNTLtoECNA}}\label{app:FromECNTLtoECNA} Fix an \ECNTL\ formula $\varphi$. For each atom $A$ of $\varphi$, we denote by $\Phi_A$ the set of clock constraints $\theta$ such that the set of atomic constraints of $\theta$ has the form \[ \displaystyle{\bigcup_{\PrevClock_I^{\dir}\psi\in A}\{x_{\psi}^{\dir}\in I\}\cup\bigcup_{\neg\PrevClock_I^{\dir}\psi\in A}\{x_{\psi}^{\dir}\in \widehat{I}\}\cup \bigcup_{\NextClock_I^{\dir}\psi\in A}\{y_{\psi}^{\dir}\in I\}\cup\bigcup_{\neg\NextClock_I^{\dir}\psi\in A}\{y_{\psi}^{\dir}\in \widehat{I}\}} \] where $\widehat{I}$ is either $\{\NULL\}$ or a \emph{maximal} interval over $\RealP$ disjunct from $I$. The generalized B\"{u}chi \ECNA\ $\Au_\varphi$ over $\Sigma_{\Cl(\varphi)}$ accepting the set of initialized fair Hintikka sequences of $\varphi$ is defined as: $\Au_\varphi=\tpl{\Sigma_{\Cl(\varphi)}, Q,Q_{0},C_\varphi,Q\cup\{\bot\},\Delta,\mathcal{F}}$, where \begin{itemize} \item $Q$ is the set of atoms of $\varphi$, and $A_0\in Q_0$ iff $\varphi\in A_0$ and for all $\Prev^{\dir}\psi\in\Cl(\varphi)$, $\neg \Prev^{\dir}\psi\in A_0$. \item $C_\varphi$ is the set of event clocks associated with $\Cl(\varphi)$. \item $\mathcal{F}=\{F_{\infty}\} \cup \{F_{\psi_1 \Until \psi_2}\mid \psi_1 \Until \psi_2\in\Cl(\varphi)\}\cup \{F_{\psi_1 \Until^{\abs} \psi_2}\mid \psi_1 \Until^{\abs} \psi_2\in\Cl(\varphi)\}$, where \begin{itemize} \item $F_{\infty}$ consists of the atoms $A$ such that $p_{\infty}\in A$; \item for all $\psi_1\Until \psi_2\in\Cl(\varphi)$, $F_{\psi_1 \Until\psi_2}$ consists of the atoms $A$ s.t. $\{\psi_2,\neg(\psi_1\Until \psi_2)\}\cap A\neq \emptyset$; \item for all $\psi_1\Until^{\abs} \psi_2\in\Cl(\varphi)$, $F_{\psi_1 \Until^{\abs}\psi_2}$ consists of the atoms $A$ such that $p_{\infty}\in A$ and $\{\psi_2,\neg(\psi_1\Until^{\abs} \psi_2)\}\cap A\neq \emptyset$. \end{itemize} \end{itemize} Finally, the transition function $\Delta=\Delta_c\cup \Delta_r\cup \Delta_i$ is given by: \begin{compactitem} \item \textbf{Call transitions}: $\Delta_c$ consists of the transitions $(A_c,A_c,\theta,A',A_c)$ such that $\theta\in\Phi_{A_c}$, $\call \in A_c$, $\NextPrev(A_c,A')$, and ($p_{\infty} \in A_c$ if $\Next^{\abs}\true\notin A_c$). Moreover, if $\ret\notin A'$, then $\Caller(A')=\{\Prev^{\caller}\psi\in\Cl(\varphi)\mid\psi\in A_c\}$ and ($\Next^{\abs}\true\in A_c$ iff $p_{\infty}\notin A'$). \item \textbf{Pop transitions}: $\Delta_r$ consists of the transitions $(A_r,A_r,\theta,A_c^{\bot},A')$ such that $\theta\in\Phi_{A_r}$, $\ret \in A_r$, and $\NextPrev(A_r,A')$. Moreover: \begin{compactitem} \item if $ret \notin A'$, then $\AbsNextPrev(A_r,A')$ and $(p_{\infty}\in A_r$ iff $p_{\infty}\in A')$; \item if $ret \in A'$, then $\Next^{\abs}\true\notin A_r$. Moreover, if $\Prev^{\abs}\true\notin A'$, then $p_{\infty}\in A_r\cap A'$, and $\Caller(A')=\emptyset$; \item if $A_c^{\bot}=\bot$, then $\Prev^{\abs}\true\notin A_{r}$; otherwise, $\AbsNextPrev(A_c^{\bot},A_{r})$ and $(p_{\infty}\in A_c^{\bot}$ iff $p_{\infty}\in A_{r})$ (note that in this case, since $\true\in A_c^{\bot}$, $\Prev^{\abs}\true\in A_{r}$). \end{compactitem} \item \textbf{Internal transitions}: $\Delta_i$ consists of the transitions $(A_{i},A_i,\theta,A')$ s.t. $\theta\in\Phi_{A_i}$, $\intA \in A_i$, and $\NextPrev(A_i,A')$. Moreover: \begin{compactitem} \item if $ret \notin A'$, then $\AbsNextPrev(A_i,A')$ and $(p_{\infty}\in A_i$ iff $p_{\infty}\in A')$; \item if $ret \in A'$, then $\Next^{\abs}\true\notin A_i$. Moreover, if $\Prev^{\abs}\true\notin A'$, then $p_{\infty}\in A_i\cap A'$, and $\Caller(A')=\emptyset$. \end{compactitem} \end{compactitem}\vspace{0.2cm} The conditions on the set of initial states reflect the initialization requirement and Property~1 in Definition~\ref{Def:HintikkaSequence}, while the transition function reflects the requirements associated with Properties~2--4 of Definition~\ref{Def:HintikkaSequence}. Finally, the generalized B\"{u}chi condition corresponds to the fairness requirement. The unique non-obvious feature is the requirement in Property~3 of Definition~\ref{Def:HintikkaSequence} that along an Hintikka sequence $(A_0,t_0)(A_1,t_1)\ldots$, for all call positions $i\geq 0$, $\Next^{\abs}\true\in A_i$ iff the matching return of $i$ along $\pi$ is defined. We claim that this requirement is fulfilled by the timed words accepted by $\Au_\varphi$. We assume the contrary and derive a contradiction. Then, there is an accepting run of $\Au_\varphi$ over an infinite timed word $\pi=(A_0,t_0)(A_1,t_1)\ldots$ such that $A_i$ is an atom for all $i\geq 0$ and for some call position $i_c$, one of the following holds: \begin{enumerate} \item either the matching return of $i_c$ is defined and $\Next^{\abs}\true\notin A_{i_c}$, \item or $i_c$ is an unmatched call and $\Next^{\abs}\true\in A_{i_c}$. \end{enumerate} Let us first examine the first case. Let $i_r$ be the matching return of $i_c$ along $\pi$. The transition function of $\Au_\varphi$ ensures that $\AbsNextPrev(A_{i_c},A_{i_r})$. Hence, since $\true\in A_{i_r}$, it holds that $\Next^{\abs}\true\in A_{i_c}$, which is a contradiction. Thus, the first case cannot hold. Now, let us consider the second case. Since $\Next^{\abs}\true\in A_{i_c}$ and $i_c$ is an unmatched call, the transition function ensures that $\neg p_{\infty}\in A_j$ for all $j > i_c$. On the other hand, the first component $F_{\infty}$ of the generalized B\"{u}chi acceptance condition guarantees that for infinitely many $i$, $p_{\infty}\in A_i$. Thus, we have a contradiction and the result follows. Hence, $A_\varphi$ accepts the set of initialized fair Hintikka sequences of $\varphi$. Note that $A_\varphi$ has $2^{O(|\varphi|)}$ states and stack symbols, a set of constants $\Const_\varphi$, and $O(|\varphi|)$ event clocks. \section{Proof of Lemma~\ref{lemma:globalEquivNMTL-ECNTL}}\label{APP:globalEquivNMTL-ECNTL} \setcounter{aux}{\value{lemma}} \setcounter{lemma}{\value{lemma-globalEquivNMTL-ECNTL}} Recall that $\INTS$ is the set of \emph{nonsingular} intervals $J$ in $\RealP$ with endpoints in $\Nat\cup\{\infty\}$ such that either $J$ is unbounded, or $J$ is left-closed with left endpoint $0$. For a generic interval $I$ with left endpoint $c_L\in \Nat$ and right endpoint $c_R\in \Nat\cup \{\infty\}$, we denote by $L(I)$ the unbounded interval having $c_L$ as left endpoint and such that $c_L\in L(I)$ iff $c_L\in I$, and by $R(I)$ the left-closed interval having as endpoints $0$ and $c_R$ and such that $c_R\in R(I)$ iff $c_R\in I$. Note that $L(I),R(I)\in\INTS$. \begin{lemma} There exist effective linear-time translations from \ECNTL\ into \NMITLS, and vice versa. \end{lemma} \setcounter{lemma}{\value{aux}} \begin{proof} Given two formulas $\varphi_1$ and $\varphi_2$ in \NMTL\ + \ECNTL\ (i.e., the extension of \NMTL\ with the temporal modalities of \ECNTL), $\varphi_1$ and $\varphi_2$ are \emph{globally equivalent}, denoted $\varphi_1\equiv \varphi_2$, if for each timed word $w$ over $\Sigma_\Prop$ and $0\leq i< |w|$, $(w,i)\models\varphi_1$ iff $(w,i)\models\varphi_2$. We first show that \ECNTL\ is subsumed by \NMITLS. For this, we consider the following global equivalences, which easily follow from the semantics of \ECNTL\ and \NMITLS, and allow to express the temporal modalities of \ECNTL\ in terms of the temporal modalities of \NMITLS.\vspace{0.2cm} \noindent\textbf{Claim 1:} for all formulas $\varphi_1$ and $\varphi_2$ in \NMTL\ + \ECNTL, the following holds, where $\dir\in \{\Global,\abs\}$, $\dir'\in \{\Global,\abs,\caller\}$, and $\sim\in\{<,\leq,>,\geq\}$: \begin{compactitem} \item $\Next^{\dir}\varphi_1\equiv \bot\, \StrictUntil^{\dir}_{\geq 0}\,\varphi_1$ and $\Prev^{\dir'}\varphi_1\equiv \bot \,\StrictSince^{\dir'}_{\geq 0}\,\varphi_1$ \item $\varphi_1 \Until^{\dir}\varphi_2 \equiv \varphi_2\vee (\varphi_1\wedge (\varphi_1 \StrictUntil^{\dir}_{\geq 0}\varphi_2))$ and $\varphi_1 \Since^{\dir'}\varphi_2 \equiv \varphi_2\vee (\varphi_1\wedge (\varphi_1 \StrictSince^{\dir'}_{\geq 0}\varphi_2))$ \item $\NextClock^{\dir}_{\sim c}\varphi_1 \equiv \neg\varphi_1 \StrictUntil^{\dir}_{\sim c}\,\varphi_1$ and $\PrevClock^{\dir'}_{\sim c}\varphi_1 \equiv \neg\varphi_1 \StrictSince^{\dir'}_{\sim c}\,\varphi_1$\vspace{0.1cm} \item $\NextClock^{\dir}_{I}\varphi_1 \equiv \NextClock^{\dir}_{L(I)}\varphi_1 \wedge \NextClock^{\dir}_{R(I)}\varphi_1$ and $\PrevClock^{\dir'}_{I}\varphi_1 \equiv \PrevClock^{\dir'}_{L(I)}\varphi_1 \wedge \PrevClock^{\dir'}_{R(I)}\varphi_1$ \end{compactitem} \vspace{0.2cm} Vice versa, for the expressibility of \NMITLS\ into \ECNTL, we consider the following global equivalences which allow to express the temporal modalities of \NMITLS\ in terms of the temporal modalities of \ECNTL.\vspace{0.2cm} \noindent\textbf{Claim 2:} for all formulas $\varphi_1$ and $\varphi_2$ in \NMTL\ + \ECNTL, the following holds, where $c\in\Nat$, $\dir\in \{\Global,\abs\}$, $\dir'\in \{\Global,\abs,\caller\}$, $\prec\in\{<,\leq\}$, $\succ\in\{>,\geq\}$, $\geq^{-1}$ is $ < $, and $>^{-1}$ is $\leq $: \begin{compactenum} \item $\varphi_1 \StrictUntil^{\dir}_{\prec c}\varphi_2\equiv \Next^{\dir}(\varphi_1 \Until^{\dir}\varphi_2)\wedge \NextClock^{\dir}_{\prec c} \varphi_2$ \item $\varphi_1 \StrictSince^{\dir'}_{\prec c}\varphi_2\equiv \Prev^{\dir'}(\varphi_1 \Since^{\dir'}\varphi_2) \wedge \PrevClock^{\dir'}_{\prec c} \varphi_2$ \item $\varphi_1 \StrictUntil^{\dir}_{\succ c}\varphi_2\equiv \StrictAlways^{\dir}_{ \succ^{-1} c} (\varphi_1 \wedge\Next^{\dir}(\varphi_1 \Until^{\dir}\varphi_2)) \wedge \Next^{\dir}(\varphi_1 \Until^{\dir}\varphi_2) $ \item $\varphi_1 \StrictSince^{\dir'}_{\succ c}\varphi_2\equiv \StrictPastAlways^{\dir'}_{ \succ^{-1} c} (\varphi_1 \wedge\Prev^{\dir'}(\varphi_1 \Since^{\dir'}\varphi_2)) \wedge \Prev^{\dir'}(\varphi_1 \Since^{\dir'}\varphi_2) $ \end{compactenum}\vspace{0.2cm} \noindent {\textbf{Proof of Claim 2:}} the global equivalences in items 1 and 2 easily follow from the semantics of \NMITLS\ and \ECNTL. Now, let us consider items 3 and 4. We focus on the abstract until modalities and assume that $\succ$ is $>$ (the other cases being similar). Let $w=(\sigma,\tau)$ be a timed word over $\Sigma_\Prop$ and $0\leq i<|w|$. We need to show that $(w,i)\models \varphi_1 \StrictUntil^{\abs}_{> c}\varphi_2$ $\Leftrightarrow$ $(w,i)\models \theta$, where $\theta=\StrictAlways^{\abs}_{ \leq c} (\varphi_1 \wedge\Next^{\abs}(\varphi_1 \Until^{\abs}\varphi_2)) \wedge \Next^{\abs}(\varphi_1 \Until^{\abs}\varphi_2) $. We consider the left implication $ \Leftarrow$ (the right implication $\Rightarrow$ being simpler). Assume that $(w,i)\models \theta$. Let $P_{\leq c}$ be the set of positions $j\in \Pos(\sigma,\abs,i)$ such that $j>i$ and $\tau_j -\tau_i\leq c$. There are two cases: \begin{compactitem} \item $P_{\leq c}$ is empty: since $(w,i)\models \Next^{\abs}(\varphi_1 \Until^{\abs}\varphi_2)$, there is $j\in \Pos(\sigma,\abs,i)$ such that $j>i$, $(w,j)\models \varphi_2$ and $(w,h)\models \varphi_1$ for all $h\in \Pos(\sigma,\abs,i)\cap [i+1,j-1]$. Since $P_{\leq c}=\emptyset$, we have that $\tau_j-\tau_i>c$. Hence, $(w,i)\models \varphi_1 \StrictUntil^{\abs}_{> c}\varphi_2$. \item $P_{\leq c}$ is \emph{not} empty: let $j$ be the greatest position of $P_{\leq c}$ (note that such a position exists). Since $(w,i)\models \StrictAlways^{\abs}_{ \leq c} (\varphi_1 \wedge\Next^{\abs}(\varphi_1 \Until^{\abs}\varphi_2))$, we have that $(w,h)\models \varphi_1$ for all $h\in \Pos(\sigma,\abs,i)\cap [i+1,j]$ and there exists $\ell > j$ such that $\ell\in \Pos(\sigma,\abs,i)$, $(w,\ell)\models \varphi_2$ and $(w,k)\models \varphi_1$ for all $h\in \Pos(\sigma,\abs,i)\cap [j+1,\ell-1]$. Since $\ell\notin P_{\leq c}$, we have that $\tau_\ell -\tau_i>c$. It follows that $(w,i)\models \varphi_1 \StrictUntil^{\abs}_{> c}\varphi_2$, proving the assertion.\qed \end{compactitem}\vspace{0.2cm} Claims~1 and~2 provide linear-time translations (homomorphic with respect to Boolean connectives and atomic propositions) from \ECNTL\ into \NMITLS, and vice versa, which preserve global equivalence. Hence, the result follows. \end{proof} \section{Conclusions} We have introduced two timed linear-time temporal logics for specifying real-time context-free requirements in a pointwise semantics setting: Event-Clock Nested Temporal Logic (\ECNTL) and Nested Metric Temporal Logic (\NMTL). We have shown that while \ECNTL\ is decidable and tractable, \NMTL\ is undecidable even for its future fragment interpreted over finite timed words. Moreover, we have established that the \MITLS-like fragment \NMITLS\ of \NMTL\ is decidable and tractable. As future research, we aim to investigate the decidability status for the more general fragment of \NMTL\ obtained by disallowing singular intervals. Such a fragment represents the \NMTL\ counterpart of Metric Interval Temporal Logic (\MITL), a well-known decidable (and \EXPSPACE-complete) fragment of \MTL\ \cite{AlurFH96} which is strictly more expressive than \MITLS\ in the pointwise semantics setting~\cite{RaskinS99}. \section{Decision procedures for B\"{u}chi \ECNA}\label{sec:DecisionProcedures} In this section, we investigate the following decision problems: \begin{itemize} \item Emptiness, universality, and language inclusion for B\"{u}chi \ECNA. \item \emph{Visibly model-checking problem:} given a \emph{visibly pushdown timed system $\mathcal{S}$} over $\Sigma_\Prop$ (that is a B\"{u}chi \VPTA\ where all the states are accepting) and a B\"{u}chi \ECNA\ $\Au$ over $\Sigma_\Prop$, does $\TLang(\mathcal{S})\subseteq \TLang(\Au)$ hold? \end{itemize} We establish that the above problems are decidable and \EXPTIME-complete. The key intermediate result is an exponential-time translation of B\"{u}chi \ECNA\ $\Au$ into language-equivalent generalized B\"{u}chi \VPTA. More precisely, we show that event-clocks in nested \VPTA\ can be removed with a single exponential blow-up. \begin{theorem}[Removal of event-clocks from nested \VPTA]\label{theorem:FromECNAtoVPTA} Given a generalized B\"{u}chi \emph{nested} \VPTA\ $\Au$, one can construct in singly exponential time a generalized B\"{u}chi \VPTA\ $\Au'$ which do not use event-clocks such that $\TLang(\Au')=\TLang(\Au)$ and $K_{\Au'}=K_{\Au}$. Moreover, $\Au'$ has $n_s\cdot 2^{O(n_e)}$ states and $n_c + O(n_e)$ clocks, where $n_s$ is the number of $\Au$-states, $n_c$ is the number of $\Au$-clocks, and $n_e$ is the number of \emph{event-clock} atomic constraints used by $\Au$. \end{theorem} In the following, we illustrate the proof of Theorem~\ref{theorem:FromECNAtoVPTA}. The translation in Theorem~\ref{theorem:FromECNAtoVPTA} consists of a sequence of steps preserving language equivalence, where at each step, we remove one event-clock and replace it with a set of fresh normal clocks. The removal of global predictor and recorder event-clocks is done as illustrated in \cite{}. Here, we describe how to remove an \emph{abstract predictor} event-clock $y^{\abs}_p$ where $p\in \Prop$ (the treatment of abstract recorder event-clocks is similar, and is described in Appendix~\ref{APP:RemovalAbstractRecorder}). Fix a generalized B\"{u}chi nested \VPTA\ $\Au=\tpl{\Sigma_\Prop, Q,Q_{0},C'=C\cup C_n,\Gamma\cup\{\top\},\Delta,\mathcal{F}}$ such that $y^{\abs}_p \in C$. By exploiting nondeterminism, we can assume that for each transition $\delta$ of $\Au$, there is exactly one atomic constraint $y^{\abs}_p\in I$ involving $y^{\abs}_p$ occurring as conjunct in the clock constraint of $\delta$. If $I\neq \{\NULL\}$, then $y^{\abs}_p\in I$ is equivalent to a constraint of the form $y_p^{\abs}\succ \ell \wedge y_p^{\abs} \prec u$, where $\succ \in \{>,\geq\}$, $\prec\in \{<,\leq\}$, $\ell \in \Nat$, and $u\in \Nat\cup\{\infty\}$. We call $y_p^{\abs}\succ \ell$ a lower-bound constraint and $y_p^{\abs} \prec u$ an upper bound constraint. Note that if $u=\infty$ , the constraint $y_p^{\abs} \prec u$ is always fulfilled, but we include it for allowing a uniform notation. We construct a generalized B\"{u}chi nested \VPTA\ $\Au_{y^{\abs}_p }$ equivalent to $\Au$ whose set of event-clocks is $C\setminus \{y^{\abs}_p\}$, and whose set of normal clocks is $C\cup C_\new$, where $C_\new$ consists of the fresh normal clocks $z_{\succ \ell}$ (resp., $z_{\prec u}$), for each lower bound constraint $y_p^{\abs}\succ \ell$ (resp., upper bound constraint $y_p^{\abs} \prec u$) of $\Au$ involving $y_p^{\abs}$. We first explain the basic ideas of the translation. Let us consider a lower-bound constraint $y_p^{\abs} \succ \ell$. Assume that a prediction $y_p^{\abs} \succ \ell$ is done by the automaton $\Au$ at position $i$ of the input word for the first time. Then, the simulating automaton $\Au_{y^{\abs}_p}$ exploits the normal clock $z_{\succ \ell}$ for checking that the prediction holds by resetting it at position $i$. Moreover, if $i$ is not a call (resp., $i$ is a call), $\Au_{y^{\abs}_p}$ carries the obligation $\succ$$\ell$ in its control state (resp., pushes the obligation $\succ$$\ell$ onto the stack) in order to check that along the maximal abstract path (\MAP, for short) $\nu$ visiting position $i$, when the next $p$ occurs at a position $j_{\textit{check}}$, the constraint $z_{\succ \ell}\succ \ell$ holds. The crucial observation is that: \begin{compactitem} \item if a new prediction $y_p^{\abs} \succ \ell$ is done by the automaton $\Au$ along a position $j>i$ of $\nu$ strictly preceding $j_{\textit{check}}$, $\Au_{y^{\abs}_p}$ replaces the old obligation with the new one by resetting the clock $z_{\succ \ell}$ at the current position $j$. This is safe since the fulfillment of the lower-bound prediction $y_p^{\abs} \succ \ell$ at position $j$ implies the fulfillment of the prediction $y_p^{\abs} \succ \ell$ at the previous position $i$ along $\nu$. \item If a call position $i_c\geq i$ occurs along $\nu$ before $j_{\textit{check}}$, we know that the next position of $i_c$ along $\nu$ is the matching return $i_r$ of $i_c$, and all the \MAP\ visiting positions $h\in [i_c+1,i_r-1]$ are finite and terminate at positions $k<i_r$. Thus, the fulfillment of a prediction $y_p^{\abs} \succ \ell$ done along such \MAP\ always implies the fulfillment of the prediction done at position $i$. Therefore, for such predictions, the clock $z_{\succ \ell}$ can be safely reset. \end{compactitem}\vspace{0.2cm} \noindent Thus, previous obligations on a lower-bound constraint $y_p^{\abs} \succ \ell$ are always discarded in favour of new ones. At each non-return position $i$, $\Au_{y^{\abs}_p}$ keeps tracks in its control state of the lower-bound obligations for the current \MAP\ $\nu$ (i.e., the \MAP\ visiting the current position $i$). Whenever a call $i_c$ occurs, the lower-bound obligations are pushed on the stack in order to be recovered at the matching return $i_r$ of $i_c$. Moreover, if $i_c+1$ is not a return (i.e., $i_r\neq i_c+1$), then $\Au_{y^{\abs}_p}$ moves to a control state where the set of lower-bound obligations is empty (consistently with the fact that $i_c+1$ is the initial position of the \MAP\ visiting $i_c+1$). The situation for a upper-bound constraint $y_p^{\abs} \prec u$ is dual. Whenever a prediction $y_p^{\abs} \prec u$ is done by $\Au$ at a position $i$, and the simulating automaton $\Au_{y^{\abs}_p}$ has no obligation concerning the constraint $y_p^{\abs} \prec u$, $\Au_{y^{\abs}_p}$ resets the normal clock $z_{\prec u}$ and carries the fresh obligation ($\first$,$\prec$$u$) in its control state (resp., pushes the obligation ($\first$,$\prec$$u$) onto the stack) if $i$ is not a call (resp., $i$ is a call). When, along the \MAP\ $\nu$ visiting position $i$, the next $p$ occurs at a position $j_{\textit{check}}$, the constraint $z_{\prec u}\prec u$ is checked, and the obligation ($\first$,$\prec$$u$) is removed or confirmed (in the last case, resetting the clock $z_{\prec u}$), depending on whether the prediction $y_p^{\abs} \prec u$ is asserted at position $j_{\textit{check}}$ or not. The crucial observation is: \begin{compactitem} \item if a new prediction $y_p^{\abs} \prec u$ is done by the automaton $\Au$ along a position $j>i$ of $\nu$ strictly preceding $j_{\textit{check}}$, $\Au_{y^{\abs}_p}$ simply ignores the new prediction (the clock $z_{\prec u}$ is not reset at position $j$) since it is subsumed by the current one. Indeed, the fulfillment of the upper-bound prediction $y_p^{\abs} \prec u$ at the previous position $i$ implies the fulfillment of the prediction $y_p^{\abs} \prec u$ at the current position $j>i$ along $\nu$. \item If a call position $i_c\geq i$ occurs along $\nu$ before $j_{\textit{check}}$, then all the predictions $y_p^{\abs} \prec u$ done along the \MAP\ associated to the positions $h\in [i_c+1,i_r-1]$, where $i_r\leq j_{\textit{check}}$ is the matching-return of $i_c$, can be safely ignored (i.e., the clock $z_{\prec u}$ is not reset along these positions) since they are subsumed by the prediction done at position $i$. \end{compactitem}\vspace{0.2cm} \noindent Thus, new obligations on an upper-bound constraint $y_p^{\abs} \prec u$ are always ignored (i.e, the clock $z_{\prec u}$ is not reset). Whenever a call $i_c$ occurs, the updated set $O$ of upper-bound and lower-bounds obligations are pushed onto the stack in order to be recovered at the matching return $i_r$ of $i_c$. Moreover, if $i_c+1$ is not a return (i.e., $i_r\neq i_c+1$), then $\Au_{y^{\abs}_p}$ moves to a control state where, while the set of lower-bound obligations is empty, the set $U$ of upper-bound obligations is obtained from $O$ by replacing each upper-bound obligation ($f$,$\prec$$u$), where $f\in \{\live,\first\}$ with the live obligation ($\live$,$\prec$$u$). A live obligation ($\live$,$\prec$$u$) asserted at the initial position $i_c+1$ of the \MAP\ $\nu$ visiting $i_c+1$ (note that $\nu$ terminates at position $i_r-1$) is used by $\Au_{y^{\abs}_p}$ to remember that the clock $z_{\prec u}$ cannot be reset along $\nu$. Intuitively, live upper-bound obligations are propagated from the caller \MAP\ to the called \MAP. Note that fresh upper-bound obligations $(\first,\prec$$ u)$ always refer to predictions done along the current \MAP\, and differently form the live upper-bound obligations, can be removed, when along the current \MAP, the next $p$ occurs. There are other technical issues to be handled. At each position $i$, the automaton $\Au_{y^{\abs}_p}$ guesses whether $i$ is the last position of the current \MAP\ (i.e., the \MAP\ visiting $i$) or not. For this, it keep tracks in its control state of the guessed type (call, return, or internal symbol) of the next input symbol. In particular, when $i$ is a call, $\Au_{y^{\abs}_p}$ guesses whether the call $i$ has a matched-return or not. In the second case, $\Au_{y^{\abs}_p}$ pushes onto the stack a special symbol, say $\bad$, and the guess is correct iff the symbol is never popped from the stack. For the first case, the automaton exploits a special proposition $p_{\infty}$ whose Boolean value is carried in the control state: $p_{\infty}$ \emph{does not hold} at a position $i$ of the input iff the \MAP\ visiting $i$ starts at a position $j>0$ such that $j-1$ is a matched call (i.e., position $i$ has a caller whose matching return exists). A B\"{u}chi component of $\Au_{y^{\abs}_p}$ consists of the states where the Boolean value of $p_{\infty}$ is $\true$. Finally, we have to ensure that the lower-bound obligations and fresh upper-bound obligations at the current position $i$ are eventually checked, i.e., the current \MAP\ eventually visits a position where $p$ holds. For this, the automaton exploits the \CARET\ \cite{} formula $\Eventually^{\abs}p$ whose Boolean value is carried in the control state: $\Eventually^{\abs}p$ holds at a position $i$ if the \MAP\ visiting $i$ also visits a position $j\geq i$, where $p$ holds. A B\"{u}chi component of $\Au_{y^{\abs}_p}$ ensures the fulfillment of the liveness requirement $p$ of $\Eventually^{\abs}p$ whenever $\Eventually^{\abs}p$ is asserted at a position of an infinite \MAP. We now provide the formal definition of $\Au_{y^{\abs}_p}$. For this, we need additional notation. An \emph{obligation set} $O$ (for the fixed predictor event-clock $y^{\abs}_p$) is a set consisting of lower-bound obligations $\succ $$\ell$ and upper-bound obligations ($f$,$\prec$$u$), where $f\in \{\live,\first\}$, such that $y_p^{\abs} \succ \ell$ and $y_p^{\abs} \prec u$ are constraints of $\Au$, and $(f,\prec$$u), (f',\prec$$u)\in O$ implies $f=f'$. For an obligation set $O$, $\live(O)$ is the obligation set obtained by $O$ by removing all the obligations which are \emph{not} of the form $(\live, \prec$$u)$ (i.e., $\live(O)$ consists of the live upper-bound obligations of $O$). A \emph{check set} $K$ is a subset of $\{\call,\ret,\intA,\Eventually^{\abs} p,p_{\infty}\}$ such that $K\cap \{\call,\ret,\intA\}$ is a singleton. For an input symbol $a\in \Sigma_\Prop$ and an obligation set $O$, we denote by $\con(O,a)$ the constraint over the new set $C_\new$ of normal clocks defined as: $\con(O,a)=\true$ if either $O=\emptyset$ or $p\notin a$; otherwise, $\con(O,a)$ is obtained from $O$ by adding for each obligation $\succ \ell$ (resp., $(f,\prec$$ u)$), the conjunct $z_{\succ \ell}\succ \ell$ (resp., $z_{\prec u}\prec u$). The nested \VPTA\ $\Au_{y^{\abs}_p}$ is given by \[ \Au_{y^{\abs}_p}= \tpl{\Sigma_\Prop, Q',Q'_{0},C\setminus\{y^{\abs_p}\}\cup C_n \cup C_{\new},Q'\cup\{\bad,\top\},\Delta',\mathcal{F}'} \] where the set $Q'$ of states consists of triples of the form $(q,O,K)$ such that $q$ is a state of $\Au$, $O$ is an obligation set, and $K$ is a check set. The set $Q'_0$ of initial states consists of states of the form $(q_0,\emptyset,K)$ such that $q_0\in Q_0$ (initially there are no obligations). We now define the transition function $\Delta'$. For this, we first define a predicate $\Abs$ over tuples $\tpl{(O,K),a, y_p^{\abs}\in I,\Res,(O',K')}$ where $(O,K),(O',K)$ are pairs of obligation sets and check sets, $a\in\Sigma_\Prop$, $y_p^{\abs}\in I$ is a constraint of $\Au$, and $\Res\subseteq C_\new$. Intuitively, $O$ (resp., $K$) represents the obligation set (resp., check set) at the current position $i$ of the input, $a$ is the input symbol associated with position $i$, $y_p^{\abs}\in I$ is the prediction about $y_p^{\abs}$ done by $\Au$ at position $i$, $\Res$ is the set of new normal clocks reset by $\Au_{y^{\abs}_p}$ on reading $a$, and $O'$ (resp., $K'$) represents the obligation set (resp., check set) at the position $j$ following $i$ along the \MAP\ visiting $i$ (if $i$ is a call, then $j$ is the matching-return of $i$). Formally, $\Abs((O,K),a, y_p^{\abs}\in I,\Res,(O',K'))$ iff the following holds: \begin{enumerate} \item ($p_{\infty}\in K$ iff $p_{\infty}\in K'$), $K\cap \{\call,\ret,\intA\}\subseteq a$. \item $\Eventually^{\abs} p\in K$ iff ($p\in a$ or $\Eventually^{\abs} p\in K'$), and ($\Eventually^{\abs} p \in K'$ iff $I\neq\{\NULL\}$). \item If $I=\{\NULL\}$, then $O'=\live(O)$, $\Res =\emptyset$, and $p\notin a$ implies $O=\live(O)$. Otherwise, let $y_p^{\abs}\in I \equiv y_p^{\abs}\succ \ell \wedge y_p^{\abs} \prec u$. Let $O''$ be $O$ if $p\notin a$, and $O''=\live(O)$ otherwise. Then, $O' = O'' \cup \{ \succ$$ \ell\} \cup \{ (f, \prec$$ u)\}$, where $f= \live$ if $(\live, \prec$$ u)\in O''$, and $f=\first$ otherwise. Moreover, $\Res\subseteq \{z_{\succ \ell},z_{\prec u}\}$, $z_{\succ \ell}\in\Res$, and $z_{\prec u}\in \Res$ iff either $\prec$$ u$ does not appear in $O$, or $p\in a$ and $(\first,\prec$$ u)\in O$. \end{enumerate} Condition~1 requires that the Boolean value of proposition $p_{\infty}$ is invariant along the positions of a \MAP, and the current check set is consistent with the type (call, return, or internal symbol) of the current input symbol. Condition~2 provides the abstract-local propagation rules of formula $\Eventually^{\abs} p$. Finally, Condition~3 provides the rules for how the obligations are updated on moving to the abstract next position along the current \MAP\ and what new clocks have to be reset on reading the current input symbol $a$. Note that if $I=\{\NULL\}$ and $p\notin a$, then the current obligation set must contain only live upper-bound obligations. If instead $y_p^{\abs}\in I$ is equivalent to $y_p^{\abs}\succ \ell \wedge y_p^{\abs} \prec u$, then the clock $z_{\succ \ell}$ is reset, while the clock $z_{\prec u}$ is reset iff either there is no obligation $(f,\prec$$u)$ in $O$, or $p\in a$ and the obligation $(f,\prec$$u)$ is fresh, i.e., $f=\first$. The transition function $\Delta'$ of $\Au_{y^{\abs}_p}$ is then defined as follows. Recall that we can assume that each clock constraint of $\Au$ is of the form $\theta \wedge y_p^{\abs}\in I$, where $\theta$ does not contain occurrences of $y_p^{\abs}$. \paragraph{Push transitions:} for each push transition $q\, \der{a,\theta \wedge y_p^{\abs}\in I, \Res,\push(\gamma)}\,q'$ of $\Au$, we have the push transitions $(q,O,K) \, \der{a,\theta\wedge \con(O,a), \Res\cup\Res',\push(\gamma')}\,(q',O',K')$ such that \begin{enumerate} \item Case $\gamma'\neq \bad $. Then, $\gamma'=(\gamma,O_{\ret},K_{\ret})$ and \begin{compactitem} \item $\Abs((O,K),a,y_p^{\abs}\in I,\Res',(O_{\ret},K_{\ret}))$. Moreover, if $\ret\in K'$ then $K_{\ret} =K'$ and $O'=\emptyset$; otherwise, $p_{\infty}\notin K'$ and $O'$ consists of the live obligations $(\live,\prec $$u)$ such that $(f,\prec $$u)\in O_{\ret}$ for some $f\in \{\live,\first\}$. \end{compactitem} \item Case $\gamma'= \bad$: $\call\in K$, $I=\{\NULL\}$, ($\Eventually^{\abs} p\in K$ iff $p\in a$), $p_{\infty}\in K$, $p_{\infty}\in K'$, $\ret\notin K'$, $O'=\emptyset$, $\Res'=\emptyset$, and $p\notin a$ implies $O=\emptyset$. \end{enumerate} Note that if $p\in a$, the obligations in the current state are checked by the constraint on $C_\new$ given by $\con(O,a)$ (recall that if $p\notin a$, then $\con(O,a)=\true$). The push transitions of point~1 consider the case where $\Au_{y^{\abs}_p}$ guesses that the current call position $i_c$ has a matching return $i_r$. In this case, the set of obligations and the check state for the next abstract position $i_r$ along the current \MAP\ are pushed on the stack in order to be recovered at the matching-return $i_r$. Moreover, if $\Au_{y^{\abs}_p}$ guesses that the next position $i_c+1$ is not $i_r$ (i.e., $\ret\notin K'$), then all the upper-bound obligations in $O_{\ret}$ are propagated as live obligations at the next position $i_c+1$ (note that the \MAP\ visiting $i_c+1$ starts at $i_c+1$, terminates at $i_r-1$, and does not satisfy proposition $p_{\infty}$). The push transitions of point~2 consider instead the case where $\Au_{y^{\abs}_p}$ guesses that the current call position $i_c$ has no matching return $i_r$, i.e., $i_c$ is the last position of the current \MAP. In this case, $\Au_{y^{\abs}_p}$ pushes the symbol $\bad$ on the stack and the transition relation is consistently updated. \paragraph{Internal transitions:} for each internal transition $q\, \der{a,\theta \wedge y_p^{\abs}\in I, \Res}\,q'$ of $\Au$, we add the internal transitions $(q,O,K) \, \der{a,\theta\wedge \con(O,a), \Res\cup\Res'}\,(q',O',K')$, where \begin{enumerate} \item Case $\ret\in K'$: $\intA\in K$, $I=\{\NULL\}$, $\Res' = \emptyset$, $O'=\emptyset$, ($\Eventually^{\abs}p\in K $ iff $p\in a$), and $p\notin a$ implies $O=\live(O)$. \item Case $\ret\notin K'$: $\Abs((O,K),a, y_p^{\abs}\in I,\Res',(O',K'))$. \end{enumerate} In the first case, $\Au_{y^{\abs}_p}$ guesses that the current internal position $i$ is the last one of the current \MAP ($\ret\in K'$), while in the second case the current \MAP\ visits the next non-return position $i+1$. Note that if $p\in a$, the obligations in the current state are checked by the constraint $\con(O,a)$. \paragraph{Pop transitions:} for each pop transition $q\, \der{a,\theta \wedge y_p^{\abs}\in I, \Res,\pop(\gamma)}\,q'\in \Delta_r$, we have the pop transitions $(q,\emptyset,K) \, \der{a,\theta\wedge \theta', \Res\cup\Res',\pop(\gamma')}\,(q',O',K')$, where \begin{enumerate} \item Case $\gamma\neq \top$: $\ret\in K$, $\gamma'=(\gamma,(O_{\ret},K))$, and $\theta'= \con(O_{\ret},a)$. If $\ret\notin K'$, then $\Abs((O_{\ret},K),a, y_p^{\abs}\in I,\Res',(O',K'))$; otherwise, $I = \{\NULL\}$, $\Res'=\emptyset$, $O'=\emptyset$, ($\Eventually^{\abs} p\in K$ iff $p\in a$), and $p\notin a$ implies $O_{\ret}= \live(O_{\ret})$. \item Case $\gamma = \top$: $\ret\in K$, $\gamma'=\top$, $\theta'=\true$, $p_{\infty}\in K$, and $p_{\infty}\in K'$. If $\ret\notin K'$, then $\Abs((\emptyset,K),a, y_p^{\abs}\in I,\Res',(O',K'))$; otherwise, $I = \{\NULL\}$, $\Res'=\emptyset$, $O'=\emptyset$, and ($\Eventually^{\abs}p\in K$ iff $p\in a$). \end{enumerate} If $\gamma\neq \top$, then the current return position has a matched-call. Thus, $\Au_{y^{\abs}_p}$ pops from the stack the obligations $O_{\ret}$ at the current position and if $p\in a$, check that they are satisfied by the constraint $\con(O_{\ret},a)$. If $\gamma = \top$, then the current position is also the initial position of the associated \MAP. Finally, the generalized B\"{u}chi condition $\mathcal{F}'$ of $\Au_{y^{\abs}_p}$ is defined as follows. For each B\"{u}chi component $F$ of $\Au$, $\Au_{y^{\abs}_p}$ has the B\"{u}chi component consisting of the states $(q,O,K)$ such that $q\in F$. Moreover, $\Au_{y^{\abs}_p}$ has an additional component consisting of the states $(q,O,K)$ such that $p_{\infty}\in K$, and either $\Eventually^{\abs}p\notin K$ or $p\in K$. Such a component ensures that the guesses about the matched calls are correct ($p_{\infty}$ occurs infinitely often), and that the liveness requirement $p$ of $\Eventually^{\abs}p$ is fulfilled whenever $\Eventually^{\abs}p$ is asserted at a position of an infinite \MAP. Note that in an infinite word over $\Sigma_\Prop$, there are at most one infinite \MAP\ $\nu$ and $\nu$ visits only positions where $p_{\infty}$ holds; moreover, each position $i$ greatest than the initial position $i_0$ of $\nu$ is either a $\nu$-position, or a position where $p_{\infty}$ does not hold. \section{The Event-Clock Nested Temporal Logic} A known decidable timed temporal logical framework related to the class of Event-Clock automata (\ECA) is the so called \emph{Event-Clock Temporal Logic} (\ECTL)~\cite{RaskinS99}, an extension of standard \LTL\ with past obtained by means of two indexed modal operators $\PrevClock$ and $\NextClock$ which express real-time constraints. On the other hand, for the class of \VPA, a related logical framework is the temporal logic \CARET\ \cite{AlurEM04}, a well-known context-free extension of \LTL\ with past by means of non-regular versions of the \LTL\ temporal operators. In this section, we introduce an extension of both \ECTL\ and \CARET, called \emph{Event-Clock Nested Temporal Logic} (\ECNTL) which allows to specify non-regular context-free real-time properties. For the given set $\Prop$ of atomic propositions containing the special propositions $\call$, $\ret$, and $\intA$, the syntax of \ECNTL\ formulas $\varphi$ is as follows: \[ \varphi:= \true \DefORmini p \DefORmini \varphi \vee \varphi \DefORmini \neg\,\varphi \DefORmini \Next^{\dir} \varphi \DefORmini \Prev^{\dir'} \varphi \DefORmini \varphi\,\Until^{\dir}\varphi \DefORmini \varphi\,\Since^{\dir'}\varphi \DefORmini \NextClock^{\dir}_I \varphi \DefORmini \PrevClock^{\dir'}_I \varphi \] where $p\in \Prop$, $I$ is an interval in $\RealP$ with bounds in $\Nat\cup\{\infty\}$, $\dir\in\{\Global,\abs\}$, and $\dir'\in \{\Global,\abs,\caller\}$. The operators $\Next^{\Global}$, $\Prev^{\Global}$, $\Until^{\Global}$, and $\Since^{\Global}$ are the standard `next', `previous', `until', and `since' \LTL\ modalities, respectively, $\Next^{\abs}$, $\Prev^{\abs}$, $\Until^{\abs}$, and $\Since^{\abs}$ are their non-regular abstract versions, and $\Prev^{\caller}$ and $\Since^{\caller}$ are the non-regular caller versions of the `previous' and `since' \LTL\ modalities. Intuitively, the abstract and caller modalities allow to specify \LTL\ requirements on the abstract and caller paths of the given timed word over $\Sigma_\Prop$. Real-time constraints are specified by the indexed operators $\NextClock_I^{\Global} $, $\PrevClock_I^{\Global} $, $\NextClock^{\abs}_I $, $\PrevClock^{\abs}_I $, and $\PrevClock^{\caller}_I $. The formula $\NextClock_I^{\Global} \varphi$ requires that the delay $t$ before the next position where $\varphi$ holds satisfies $t\in I$; symmetrically, $\PrevClock_I^{\Global} \varphi$ constraints the previous position where $\varphi$ holds. The abstract versions $\NextClock^{\abs}_I \varphi$ and $\PrevClock^{\abs}_I \varphi$ are similar, but the notions of next and previous position where $\varphi$ holds refer to the \MAP\ visiting the current position. Analogously, for the caller version $\PrevClock^{\caller}_I \varphi$ of $\PrevClock_I^{\Global} \varphi$, the notion of previous position where $\varphi$ holds refers to the caller path visiting the current position. Full \CARET\ \cite{AlurEM04} corresponds to the fragment of \ECNTL\ obtained by disallowing the real-time operators, while the logic \ECTL\ \cite{RaskinS99} is obtained from \ECNTL\ by disallowing the abstract and caller modalities. As pointed out in~\cite{RaskinS99}, the real-time operators $\PrevClock$ and $\NextClock$ generalize the semantics of event clock variables since they allows recursion, i.e., they can constraint arbitrary formulas and not only atomic propositions. Accordingly, the \emph{non-recursive fragment} of \ECNTL\ is obtained by replacing the clauses $\NextClock^{\dir}_I \varphi$ and $\PrevClock^{\dir'}_I \varphi$ in the syntax with the clauses $\NextClock^{\dir}_I p$ and $\PrevClock^{\dir'}_I p$, where $p\in \Prop$. We use standard shortcuts in \ECNTL: the formula $\Eventually^{\Global} \psi$ stands for $\true\,\Until^{\Global}\, \psi$ (the \LTL\ eventually operator), and $\Always^{\Global} \psi$ stands for $\neg \Eventually^{\Global} \neg\psi$ (the \LTL\ always operator). For an \ECNTL\ formula $\varphi$, $|\varphi|$ denotes the number of distinct subformulas of $\varphi$ and $\Const_\varphi$ the set of constants used as finite endpoints in the intervals associates with the real-time modalities. The size of $\varphi$ is $|\varphi| + k$, where $k$ is the size of the binary encoding of the largest constant in $\Const_\varphi$. Given an \ECNTL\ formula $\varphi$, a timed word $w=(\sigma,\tau)$ over $\Sigma_\Prop$ and a position $0\leq i< |w|$, the satisfaction relation $(w,i)\models\varphi$ is inductively defined as follows (we omit the clauses for the atomic propositions and Boolean connectives which are standard): \[ \begin{array}{ll} (w,i)\models \Next^{\dir}\varphi & \Leftrightarrow\, \text{ there is } j>i \text{ such that } j= \SUCC(\dir,\sigma,i) \text{ and } (w,j)\models \varphi \\ (w,i)\models \Prev^{\dir'}\varphi & \Leftrightarrow\, \text{ there is } j<i \text{ such that } (w,j)\models \varphi \text{ and \emph{either} } (dir'\neq \caller \text{ and } \\ & \phantom{\Leftrightarrow}\,\, i= \SUCC(\dir',\sigma,j)), \text{ or } (dir'= \caller \text{ and } j= \SUCC(\caller,\sigma,i)) \\ (w,i)\models \varphi_1 \Until^{\dir}\varphi_2 & \Leftrightarrow\, \textrm{there is } j\geq i \text{ such that }j\in \Pos(\dir,\sigma,i),\, (w,j)\models \varphi_2 \text{ and } \\ & \phantom{\Leftrightarrow}\,\, (w,k)\models \varphi_1 \text{ for all } k\in [i,j-1]\cap \Pos(\dir,\sigma,i) \\ (w,i)\models \varphi_1 \Since^{\dir'}\varphi_2 & \Leftrightarrow\, \textrm{there is } j\leq i \text{ such that }j\in \Pos(\dir',\sigma,i),\, (w,j)\models \varphi_2 \text{ and } \\ & \phantom{\Leftrightarrow}\,\, (w,k)\models \varphi_1 \text{ for all } k\in [j+1,i]\cap \Pos(\dir',\sigma,i) \\ \end{array} \] \[ \begin{array}{ll} (w,i)\models \NextClock_I^{\dir}\varphi & \Leftrightarrow\, \textrm{there is } j> i \text{ s.t. }j\in \Pos(\dir,\sigma,i),\, (w,j)\models \varphi,\,\tau_j-\tau_i\in I, \\ & \phantom{\Leftrightarrow}\,\, \text{ and } (w,k)\not\models \varphi \text{ for all } k\in [i+1,j-1]\cap \Pos(\dir,\sigma,i) \\ (w,i)\models \PrevClock_I^{\dir'}\varphi & \Leftrightarrow\, \textrm{there is } j< i \text{ s.t. }j\in \Pos(\dir',\sigma,i),\, (w,j)\models \varphi,\,\tau_i-\tau_j\in I, \\ & \phantom{\Leftrightarrow}\,\, \text{ and } (w,k)\not\models \varphi \text{ for all } k\in [j+1,i-1]\cap \Pos(\dir',\sigma,i) \end{array} \] A timed word $w$ satisfies a formula $\varphi$ (we also say that $w$ is a model of $\varphi$) if $(w,0)\models \varphi$. The timed language $\TLang(\varphi)$ (resp. $\omega$-timed language $\TLangInf(\varphi)$) of $\varphi$ is the set of finite (resp., infinite) timed words over $\Sigma_\Prop$ satisfying $\varphi$. We consider the following decision problems: \begin{compactitem} \item \emph{Satisfiability:} has a given \ECNTL\ formula a finite (resp., infinite) model? \item \emph{Visibly model-checking:} given a \VPTA\ $\Au$ over $\Sigma_\Prop$ and an \ECNTL\ formula $\varphi$ over $\Prop$, does $\TLang(\Au)\subseteq \TLang(\varphi)$ (resp., $\TLangInf(\Au)\subseteq \TLangInf(\varphi)$) hold? \end{compactitem}\vspace{0.1cm} The logic \ECNTL\ allows to express in a natural way real-time \LTL-like properties over the non-regular patterns capturing the local computations of procedures or the stack contents at given positions. Here, we consider three relevant examples. \begin{compactitem} \item \emph{Real-time total correctness:} a bounded-time total correctness requirement for a procedure $A$ specifies that if the pre-condition $p$ holds when the procedure $A$ is invoked, then the procedure must return within $k$ time units and $q$ must hold upon return. Such a requirement can be expressed by the following non-recursive formula, where proposition $p_A$ characterizes calls to procedure $A$: $ \Always^{\Global}\bigl((\call\wedge p\wedge p_A) \rightarrow (\Next^{\abs}q \wedge \NextClock_{[0,k]}^{\abs} \ret)\bigr)$ \item \emph{Local bounded-time response properties:} the requirement that in the local computation (abstract path) of a procedure $A$, every request $p$ is followed by a response $q$ within $k$ time units can be expressed by the following non-recursive formula, where $c_A$ denotes that the control is inside procedure $A$: $\Always^{\Global}\bigl(( p\wedge c_A) \rightarrow \NextClock_{[0,k]}^{\abs} q \bigr)$ \item \emph{Real-time properties over the stack content:} the real-time security requirement that a procedure $A$ is invoked only if procedure $B$ belongs to the call stack and within $k$ time units since the activation of $B$ can be expressed as follows (the calls to procedure $A$ and $B$ are marked by proposition $p_A$ and $p_B$, respectively): $ \Always^{\Global}\bigl(( \call \wedge p_A) \rightarrow \PrevClock_{[0,k]}^{\caller} \,p_B \bigr)$ % \end{compactitem}\vspace{0.2cm} \noindent{\textbf{Expressiveness results.}} We now compare the expressive power of the formalisms \ECNTL, \ECNA, and \VPTA\ with respect to the associated classes of ($\omega$-)timed languages. It is known that \ECA\ and the logic \ECTL\ are expressively incomparable~\cite{RaskinS99}. This result trivially generalizes to \ECNA\ and \ECNTL\ (note that over timed words consisting only of internal actions, \ECNA\ correspond to \ECA, and the logic \ECNTL\ corresponds to \ECTL). In~\cite{BMP18}, it is shown that \ECNA\ are strictly less expressive than \VPTA. In Section~\ref{sec:DecisionProceduresECNTL}, we show that \ECNTL\ is subsumed by \VPTA\ (in particular, every \ECNTL\ formula can be translated into an equivalent \VPTA). The inclusion is strict since the logic \ECNTL\ is closed under complementation, while \VPTA\ are not~\cite{EmmiM06}. Hence, we obtain the following result. \begin{theorem} Over finite (resp., infinite) timed words, \ECNTL\ and \ECNA\ are expressively incomparable, and \ECNTL\ is strictly less expressive than \VPTA. \end{theorem} We additionally investigate the expressiveness of the novel timed temporal modalities $\PrevClock^{\abs}_I$, $\NextClock^{\abs}_I$, and $\PrevClock^{\caller}_I$. It turns out that these modalities add expressive power. \begin{theorem}\label{theo:expressofNovelModalities} Let $\Fragm$ be the fragment of \ECNTL\ obtained by disallowing the modalities $\PrevClock^{\abs}_I$, $\PrevClock^{\caller}_I$, and $\NextClock^{\abs}_I$. Then, $\Fragm$ is strictly less expressive than \ECNTL. \end{theorem} \begin{proof} We focus on the case of finite timed words (the case of infinite timed words is similar). Let $\Prop =\{\call,\ret\}$ and $\TLang$ be the timed language consisting of the finite timed words of the form $(\sigma,\tau)$ such that $\sigma$ is a well-matched word of the form $ \{\call\}^{n} \cdot \{\ret\}^{n}$ for some $n>0$, and there is a call position $i_c$ of $\sigma$ such that $\tau_{i_r}-\tau_{i_c} = 1$, where $i_r$ is the matching-return of $i_c$ in $\sigma$. $\TLang$ can be easily expressed in \ECNTL. On the other hand, one can show that $\TLang$ is not definable in $\Fragm$ (a proof is in Appendix~\ref{APP:expressofNovelModalities}) . \end{proof} \subsection{Decision procedures for the logic \ECNTL}\label{sec:DecisionProceduresECNTL} In this section, we provide an automata-theoretic approach for solving satisfiability and visibly model-checking for the logic \ECNTL\ which generalizes both the automatic-theoretic approach of \CARET\ \cite{AlurEM04} and the one for \ECTL\ \cite{RaskinS99}. We focus on infinite timed words (the approach for finite timed words is similar). Given an \ECNTL\ formula $\varphi$ over $\Prop$, we construct in exponential time a generalized B\"{u}chi $\ECNA$ $\Au_\varphi$ over an extension of the pushdown alphabet $\Sigma_\Prop$ accepting suitable encodings of the infinite models of $\varphi$. Fix an \ECNTL\ formula $\varphi$ over $\Prop$. For each infinite timed word $w=(\sigma,\tau)$ over $\Sigma_\Prop$ we associate to $w$ an infinite timed word $\pi= (\sigma_e,\tau)$ over an extension of $\Sigma_\Prop$, called \emph{fair Hintikka sequence}, where $\sigma_e = A_0 A_1\ldots$, and for all $i\geq 0$, $A_i$ is an \emph{atom} which, intuitively, describes a maximal set of subformulas of $\varphi$ which hold at position $i$ along $w$. The notion of \emph{atom} syntactically captures the semantics of the Boolean connectives and the local fixpoint characterization of the variants of until (resp., since) modalities in terms of the corresponding variants of the next (resp., previous) modalities. Additional requirements on the timed word $\pi$, which can be easily checked by the transition function of an $\ECNA$, capture the semantics of the various next and previous modalities, and the semantics of the real-time operators. Finally, the global \emph{fairness} requirement, which can be easily checked by a standard generalized B\"{u}chi acceptance condition, captures the liveness requirements $\psi_2$ in until subformulas of the form $\psi_1\Until^{\Global} \psi_2$ (resp., $\psi_1\Until^{\abs} \psi_2$) of $\varphi$. In particular, when an abstract until formula $\psi_1\Until^{\abs} \psi_2$ is asserted at a position $i$ along an infinite timed word $w$ over $\Sigma_\Prop$ and the $\MAP$ $\nu$ visiting position $i$ is infinite, we have to ensure that the liveness requirement $\psi_2$ holds at some position $j\geq i$ of the $\MAP$ $\nu$. To this end, we use a special proposition $p_{\infty}$ which \emph{does not} hold at a position $i$ of $w$ iff position $i$ has a caller whose matching return is defined. We now proceed with the technical details. The closure $\Cl(\varphi)$ of $\varphi$ is the smallest set containing: \begin{compactitem} \item $\true\in \Cl(\varphi)$, each proposition $p\in \Prop\cup \{p_{\infty}\}$, and formulas $\Next^{\abs}\true$ and $\Prev^{\abs}\true$; \item all the subformulas of $\varphi$; \item the formulas $\Next^{\dir}(\psi_1\Until^{\dir}\psi_2)$ (resp., $\Prev^{\dir}(\psi_1\Since^{\dir}\psi_2)$) for all the subformulas $\psi_1\Until^{\dir}\psi_2$ (resp., $\psi_1\Since^{\dir}\psi_2$) of $\varphi$, where $\dir\in \{\Global,\abs\}$ (resp., $\dir\in \{\Global,\abs,\caller\}$). \item all the negations of the above formulas (we identify $\neg\neg\psi$ with $\psi$). \end{compactitem}\vspace{0.1cm} Note that $\varphi\in\Cl(\varphi)$ and $|\Cl(\varphi)|=O(|\varphi|)$. In the following, elements of $\Cl(\varphi)$ are seen as atomic propositions, and we consider the pushdown alphabet $\Sigma_{\Cl(\varphi)}$ induced by $\Cl(\varphi)$. In particular, for a timed word $\pi$ over $\Sigma_{\Cl(\varphi)}$, we consider the clock valuation $\val^{\pi}_i$ specifying the values of the event clocks $x_\psi$, $y_\psi$, $x^{\abs}_\psi$, $y^{\abs}_\psi$, and $x^{\caller}_\psi$ at position $i$ along $\pi$, where $\psi\in \Cl(\varphi)$. \noindent An \emph{atom $A$} of $\varphi$ is a subset of $\Cl(\varphi)$ satisfying the following: \begin{compactitem} \item $A$ is a maximal subset of $\Cl(\varphi)$ which is propositionally consistent, i.e.: \begin{compactitem} \item $\true\in A$ and for each $\psi\in \Cl(\varphi)$, $\psi\in A$ iff $\neg\psi\notin A$; \item for each $\psi_1\vee\psi_2\in \Cl(\varphi)$, $\psi_1\vee\psi_2\in A$ iff $\{\psi_1,\psi_2\}\cap A \neq \emptyset$; \item $A$ contains exactly one atomic proposition in $\{\call,\ret,\intA\}$. \end{compactitem} \item for all $\dir\in \{\Global,\abs\}$ and $\psi_1\Until^{\dir}\psi_2\in \Cl(\varphi)$, either $\psi_2\in A$ or $\{\psi_1,\Next^{\dir}(\psi_1\Until^{\dir}\psi_2)\}\subseteq A$. \item for all $\dir\in \{\Global,\abs,\caller\}$ and $\psi_1\Since^{\dir}\psi_2\in \Cl(\varphi)$, either $\psi_2\in A$ or $\{\psi_1,\Prev^{\dir}(\psi_1\Since^{\dir}\psi_2)\}\subseteq A$. \item if $\Next^{\abs}\true\notin A$, then for all $\Next^{\abs}\psi\in \Cl(\varphi)$, $\Next^{\abs}\psi\notin A$. \item if $\Prev^{\abs}\true\notin A$, then for all $\Prev^{\abs}\psi\in \Cl(\varphi)$, $\Prev^{\abs}\psi\notin A$. \end{compactitem}\vspace{0.1cm} We now introduce the notion of Hintikka sequence $\pi$ which corresponds to an infinite timed word over $\Sigma_{\Cl(\varphi)}$ satisfying additional constraints. These constraints capture the semantics of the variants of next, previous, and real-time modalities, and (partially) the intended meaning of proposition $p_{\infty}$ along the associated timed word over $\Sigma_\Prop$ (the projection of $\pi$ over $\Sigma_\Prop\times \RealP$). For an atom $A$, let $\Caller(A)$ be the set of caller formulas $\Prev^{\caller}\psi$ in $A$. For atoms $A$ and $A'$, we define a predicate $\NextPrev(A,A')$ which holds if the global next (resp., global previous) requirements in $A$ (resp., $A'$) are the ones that hold in $A'$ (resp., $A$), i.e.: (i) for all $\Next^{\Global}\psi\in \Cl(\varphi)$, $\Next^{\Global}\psi\in A$ iff $\psi\in A'$, and (ii) for all $\Prev^{\Global}\psi\in \Cl(\varphi)$, $\Prev^{\Global}\psi\in A'$ iff $\psi\in A$. Similarly, the predicate $\AbsNextPrev(A,A')$ holds if: (i) for all $\Next^{\abs}\psi\in \Cl(\varphi)$, $\Next^{\abs}\psi\in A$ iff $\psi\in A'$, and (ii) for all $\Prev^{\abs}\psi\in \Cl(\varphi)$, $\Prev^{\abs}\psi\in A'$ iff $\psi\in A$, and additionally (iii) $\Caller(A)=\Caller(A')$. Note that for $\AbsNextPrev(A,A')$ to hold we also require that the caller requirements in $A$ and $A'$ coincide consistently with the fact that the positions of a \MAP\ have the same caller (if any). \begin{definition} \label{Def:HintikkaSequence} An infinite timed word $\pi= (\sigma,\tau)$ over $\Sigma_{\Cl(\varphi)}$, where $\sigma =A_0 A_1\ldots$, is an \emph{Hintikka sequence of $\varphi$}, if for all $i\geq 0$, $A_i$ is a $\varphi$-atom and the following holds: \begin{compactenum} \item \emph{Initial consistency:} for all $\dir\in\{\Global,\abs,\caller\}$ and $\Prev^{\dir}\psi\in\Cl(\varphi)$, $\neg \Prev^{\dir}\psi\in A_0$. \item \emph{Global next and previous requirements:} $\NextPrev(A_i,A_{i+1})$. \item \emph{Abstract and caller requirements:} we distinguish three cases. \begin{compactitem} \item $\call\notin A_i$ and $\ret\notin A_{i+1}$: $\AbsNextPrev(A_i,A_{i+1})$, $(p_{\infty}\in A_i$ iff $p_{\infty}\in A_{i+1})$; \item $\call\notin A_i$ and $\ret\in A_{i+1}$: $\Next^{\abs}\true\notin A_i$, and ($\Prev^{\abs}\true\in A_{i+1}$ iff the matching call of the return position $i+1$ is defined). Moreover, if $\Prev^{\abs}\true\notin A_{i+1}$, then $p_{\infty}\in A_i\cap A_{i+1}$ and $\Caller(A_{i+1})=\emptyset$. \item $\call\in A_i$: if $\SUCC(\abs,\sigma,i)=\NULL$ then $\Next^{\abs}\true\notin A_i$ and $p_{\infty}\in A_i$; otherwise $\AbsNextPrev(A_i,A_{j})$ and $(p_{\infty}\in A_i$ iff $p_{\infty}\in A_{j})$, where $j=\SUCC(\abs,\sigma,i)$. Moreover, if $\ret\notin A_{i+1}$, then $\Caller(A_{i+1})=\{\Prev^{\caller}\psi\in\Cl(\varphi)\mid\psi\in A_i\}$ and ($\Next^{\abs}\true\in A_i$ iff $p_{\infty}\notin A_{i+1}$). \end{compactitem} \item \emph{Real-time requirements:} \begin{compactitem} \item for all $\dir\in\{\Global,\abs,\caller\}$ and $\PrevClock^{\dir}_I \psi \in\Cl(\varphi)$, $\PrevClock^{\dir}_I \psi \in A_i$ iff $\val_i^{\pi}(x^{\dir}_{\psi})\in I$; \item for all $\dir\in\{\Global,\abs\}$ and $\NextClock^{\dir}_I \psi \in\Cl(\varphi)$, $\NextClock^{\dir}_I \psi \in A_i$ iff $\val_i^{\pi}(y^{\dir}_{\psi})\in I$. \end{compactitem} \end{compactenum} \end{definition} \noindent In order to capture the liveness requirements of the global and abstract until subformulas of $\varphi$, and fully capture the intended meaning of proposition $p_{\infty}$, we consider the following additional global fairness constraint. An Hintikka sequence $\pi=(A_0,t_0)(A_1,t_1)$ of $\varphi$ is \emph{fair} if \begin{inparaenum}[(i)] \item for infinitely many $i\geq 0$, $p_{\infty}\in A_i$; \item for all $\psi_1\Until^{\Global} \psi_2\in\Cl(\varphi)$, there are infinitely many $i\geq 0$ s.t. $\{\psi_2,\neg(\psi_1\Until^{\Global} \psi_2)\}\cap A_i\neq \emptyset$; and \item for all $\psi_1\Until^{\abs} \psi_2\in\Cl(\varphi)$, there are infinitely many $i\geq 0$ such that $p_{\infty}\in A_i$ and $\{\psi_2,\neg(\psi_1\Until^{\abs} \psi_2)\}\cap A_i\neq \emptyset$. \end{inparaenum} The Hintikka sequence $\pi$ is \emph{initialized} if $\varphi\in A_0$. Note that according to the intended meaning of proposition $p_{\infty}$, for each infinite timed word $w=(\sigma,\tau)$ over $\Sigma_\Prop$, $p_{\infty}$ holds at infinitely many positions. Moreover, there is at a most one \emph{infinite} \MAP\ $\nu$ of $\sigma$, and for such a \MAP\ $\nu$ and each position $i$ greater than the starting position of $\nu$, either $i$ belongs to $\nu$ and $p_{\infty}$ holds, or $p_{\infty}$ does not hold. Hence, the fairness requirement for an abstract until subformula $\psi_1\Until^{\abs} \psi_2$ of $\varphi$ ensures that whenever $\psi_1\Until^{\abs} \psi_2$ is asserted at some position $i$ of $\nu$, then $\psi_2$ eventually holds at some position $j\geq i$ along $\nu$. Thus, we obtain the following characterization of the infinite models of $\varphi$, where $\Proj_\varphi$ is the mapping associating to each \emph{fair} Hintikka sequence $\pi=(A_0,t_0)(A_1,t_1)\ldots$ of $\varphi$, the infinite timed word over $\Sigma_\Prop$ given by $\Proj(\pi)=(A_0\cap\Prop,t_0)(A_1\cap\Prop,t_1)\ldots$. \begin{proposition}\label{prop:TimedHintikkaSequence} \emph{Let $\pi=(A_0,t_0)(A_1,t_1)\ldots$ be a fair Hintikka sequence of $\varphi$. Then, for all $i\geq 0$ and $\psi\in \Cl(\varphi)\setminus \{p_{\infty},\neg p_{\infty}\}$, $\psi\in A_i$ \emph{iff} $(\Proj_\varphi(\pi),i)\models \psi$. Moreover, the mapping $\Proj_\varphi$ is a bijection between the set of fair Hintikka sequences of $\varphi$ and the set of infinite timed words over $\Sigma_\Prop$. In particular, an infinite timed word over $\Sigma_\Prop$ is a model of $\varphi$ iff the associated fair Hintikka sequence is initialized.} \end{proposition} A proof of Proposition~\ref{prop:TimedHintikkaSequence} is given in Appendix~\ref{APP:TimedHintikkaSequence}. The notion of initialized fair Hintikka sequence can be easily captured by a generalized B\"{u}chi \ECNA. \begin{theorem}\label{theo:FromECNTLtoECNA} Given an \ECNTL\ formula $\varphi$, one can construct in singly exponential time a generalized B\"{u}chi \ECNA\ $\Au_\varphi$ having $ 2^{O(|\varphi|)}$ states, $2^{O(|\varphi|)}$ stack symbols, a set of constants $\Const_\varphi$, and $O(|\varphi|)$ clocks. If $\varphi$ is non-recursive, then $\Au_\varphi$ accepts the infinite models of $\varphi$; otherwise, $\Au_\varphi$ accepts the set of initialized fair Hintikka sequences of $\varphi$. \end{theorem} \begin{proof} We first build a generalized B\"{u}chi \ECNA\ $\Au_\varphi$ over $\Sigma_{\Cl(\varphi)}$ accepting the set of initialized fair Hintikka sequences of $\varphi$. The set of $\Au_\varphi$ states is the set of atoms of $\varphi$, and a state $A_0$ is initial if $\varphi\in A_0$ and $A_0$ satisfies Property~1 (initial consistency) in Definition~\ref{Def:HintikkaSequence}. In the transition function, we require that the input symbol coincides with the source state in such a way that in a run, the sequence of control states corresponds to the untimed part of the input. By the transition function, the automaton checks that the input word is an Hintikka sequence. In particular, for the abstract next and abstract previous requirements (Property~3 in Definition~\ref{Def:HintikkaSequence}), whenever the input symbol $A$ is a call, the automaton pushes on the stack the atom $A$. In such a way, on reading the matching return $A_r$ (if any) of the call $A$, the automaton pops $A$ from the stack and can locally check that $\AbsNextPrev(A,A_r)$ holds. In order to ensure the real-time requirements (Property~4 in Definition~\ref{Def:HintikkaSequence}), $\Au_\varphi$ simply uses the recorder clocks and predictor clocks: a transition having as source state an atom $A$ has a clock constraint whose set of atomic constraints has the form \vspace{-0.1cm} \[ \displaystyle{\bigcup_{\PrevClock_I^{\dir}\psi\in A}\{x_{\psi}^{\dir}\in I\}\cup\bigcup_{\neg\PrevClock_I^{\dir}\psi\in A}\{x_{\psi}^{\dir}\in \widehat{I}\}\cup \bigcup_{\NextClock_I^{\dir}\psi\in A}\{y_{\psi}^{\dir}\in I\}\cup\bigcup_{\neg\NextClock_I^{\dir}\psi\in A}\{y_{\psi}^{\dir}\in \widehat{I}\}}\vspace{-0.2cm} \] where $\widehat{I}$ is either $\{\NULL\}$ or a \emph{maximal} interval over $\RealP$ disjunct from $I$. Finally, the generalized B\"{u}chi acceptance condition is exploited for checking that the input initialized Hintikka sequence is fair. Details of the construction of $\Au_\varphi$ can be found in Appendix~\ref{app:FromECNTLtoECNA}. Note that $\Au_\varphi$ has $2^{O(|\varphi|)}$ states and stack symbols, a set of constants $\Const_\varphi$, and $O(|\varphi|)$ event clocks. If $\varphi$ is non-recursive, then the effective clocks are only associated with propositions in $\Prop$. Thus, by projecting the input symbols of the transition function of $\Au_\varphi$ over $\Prop$, by Proposition~\ref{prop:TimedHintikkaSequence}, we obtain a generalized B\"{u}chi \ECNA\ accepting the infinite models of $\varphi$. \end{proof} We now deduce the main result of this section. \begin{theorem}\label{theorem:complexityResultsECNTL} Given an \ECNTL\ formula $\varphi$ over $\Sigma_\Prop$, one can construct in singly exponential time a \VPTA, with $2^{O(|\varphi|^{3})}$ states and stack symbols, $O(|\varphi|)$ clocks, and a set of constants $\Const_\varphi$, which accepts $\TLang(\varphi)$ (resp., $\TLangInf(\varphi)$). Moreover, satisfiability and visibly model-checking for \ECNTL\ over finite (resp., infinite) timed words are \EXPTIME-complete. \end{theorem} \begin{proof} We focus on the case of infinite timed words. Fix an \ECNTL\ formula $\varphi$ over $\Sigma_\Prop$. By Theorem~\ref{theo:FromECNTLtoECNA}, one can construct a generalized B\"{u}chi \ECNA\ $\Au_\varphi$ over $\Sigma_{\Cl(\varphi)}$ having $ 2^{O(|\varphi|)}$ states and stack symbols, a set of constants $\Const_\varphi$, and accepting the set of initialized fair Hintikka sequences of $\varphi$. By~\cite{BMP18}, one can construct a generalized B\"{u}chi \VPTA\ $\Au'_\varphi$ over $\Sigma_{\Cl(\varphi)}$ accepting $\TLangInf(\Au_\varphi)$, having $2^{O(|\varphi|^{2}\cdot k)}$ states and stack symbols, $O(k)$ clocks, and a set of constants $\Const_\varphi$, where $k$ is the number of atomic constraints used by $\Au_\varphi$. Note that $k=O(|\varphi|)$. Thus, by projecting the input symbols of the transition function of $\Au'_\varphi$ over $\Prop$, we obtain a (generalized B\"{u}chi) \VPTA\ satisfying the first part of Theorem~\ref{theorem:complexityResultsECNTL}. For the upper bounds of the second part of Theorem~\ref{theorem:complexityResultsECNTL}, observe that by~\cite{BouajjaniER94,AbdullaAS12} emptiness of generalized B\"{u}chi \VPTA\ is solvable in time $O(n^{4} \cdot 2^{O(m\cdot \log K m)})$, where $n$ is the number of states, $m$ is the number of clocks, and $K$ is the largest constant used in the clock constraints of the automaton (hence, the time complexity is polynomial in the number of states). Now, given a B\"{u}chi \VPTA\ $\Au$ over $\Sigma_\Prop$ and an \ECNTL\ formula $\varphi$ over $\Sigma_\Prop$, model-checking $\Au$ against $\varphi$ reduces to check emptiness of $\TLangInf(\Au)\cap \TLangInf(\Au'_{\neg\varphi})$, where $\Au'_{\neg\varphi}$ is the generalized B\"{u}chi \VPTA\ associated with $\neg\varphi$. Thus, since B\"{u}chi \VPTA\ are polynomial-time closed under intersection, membership in \EXPTIME\ for satisfiability and visibly model-checking of \ECNTL\ follow. The matching lower bounds follow from \EXPTIME-completeness of satisfiability and visibly model-checking for the logic \CARET\ \cite{AlurEM04} which is subsumed by \ECNTL. \end{proof} \section{Introduction} \emph{Model checking} is a well-established formal-method technique to automatically check for global correctness of reactive systems~\cite{Baier}. In this setting, temporal logics provide a fundamental framework for the description of the dynamic behavior of reactive systems. In the last two decades, model checking of pushdown automata (\PDA) has received a lot of attention~\cite{Wal96,CMM+03,AlurMadhu04,BMP10}. \PDA\ represent an infinite-state formalism suitable to model the control flow of typical sequential programs with nested and recursive procedure calls. Although the general problem of checking context-free properties of \PDA\ is undecidable, algorithmic solutions have been proposed for interesting subclasses of context-free requirements~\cite{AlurEM04,AlurMadhu04,CMM+03}. A relevant example is that of the linear temporal logic \CARET\ \cite{AlurEM04}, a context-free extension of standard \LTL. \CARET\ formulas are interpreted on words over a \emph{pushdown alphabet} which is partitioned into three disjoint sets of calls, returns, and internal symbols. A call denotes invocation of a procedure (i.e. a push stack-operation) and the \emph{matching} return (if any) along a given word denotes the exit from this procedure (corresponding to a pop stack-operation). \CARET\ allows to specify \LTL\ requirements over two kinds of \emph{non-regular} patterns on input words: \emph{abstract paths} and \emph{caller paths}. An abstract path captures the local computation within a procedure with the removal of subcomputations corresponding to nested procedure calls, while a caller path represents the call-stack content at a given position of the input. An automata theoretic generalization of \CARET\ is the class of (nondeterministic) \emph{Visibly Pushdown Automata} (\VPA)~\cite{AlurMadhu04}, a subclass of \PDA\ where the input symbols over a pushdown alphabet control the admissible operations on the stack. \VPA\ push onto the stack only when a call is read, pops the stack only at returns, and do not use the stack on reading internal symbols. This restriction makes the class of resulting languages (\emph{visibly pushdown languages} or \VPL) very similar in tractability and robustness to the less expressive class of regular languages~\cite{AlurMadhu04}. In fact, \VPL\ are closed under Boolean operations, and language inclusion, which is undecidable for context-free languages, is \EXPTIME-complete for \VPL.\vspace{0.1cm} \noindent \textbf{Real-time pushdown model-checking.} Recently, many works~\cite{AbdullaAS12,BenerecettiMP10,BenerecettiP16,BouajjaniER94,ClementeL15,EmmiM06,TrivediW10} have investigated real-time extensions of \PDA\ by combining \PDA\ with \emph{Timed Automata} (\TA)~\cite{AlurD94}, a model widely used to represent real-time systems. \TA\ are finite automata augmented with a finite set of real-valued clocks, which operate over words where each symbol is paired with a real-valued timestamp (\emph{timed words}). All the clocks progress at the same speed and can be reset by transitions (thus, each clock keeps track of the elapsed time since the last reset). The emptiness problem for \TA\ is decidable and \PSPACE-complete~\cite{AlurD94}. However, since in \TA, clocks can be reset nondeterministically and independently of each other, the resulting class of timed languages is not closed under complement and, moreover, language inclusion is undecidable~\cite{AlurD94}. As a consequence, the general verification problem (i.e., language inclusion) of formalisms combining unrestricted \TA\ with robust subclasses of \PDA\ such as \VPA , i.e. \emph{Visibly Pushdown Timed Automata} (\VPTA), is undecidable as well. In fact, checking language inclusion for \VPTA\ is undecidable even in the restricted case of specifications using at most one clock~\cite{EmmiM06}. More robust approaches \cite{TangO09,BhaveDKPT16,BMP18}, although less expressive, are based on formalisms combining \VPA\ and \emph{Event-clock automata} (\ECA)~\cite{AlurFH99} such as the recently introduced class of \emph{Event-Clock Nested Automata} (\ECNA)~\cite{BMP18}. \ECA\ \cite{AlurFH99} are a well-known determinizable subclass of \TA\ where the explicit reset of clocks is disallowed. In \ECA, clocks have a predefined association with the input alphabet symbols and their values refer to the time distances from previous and next occurrences of input symbols. \ECNA\ \cite{BMP18} combine \ECA\ and \VPA\ by providing an explicit mechanism to relate the use of a stack with that of event clocks. In particular, \ECNA\ retain the closure and decidability properties of \ECA\ and \VPA\ being closed under Boolean operations and having a decidable (specifically, \EXPTIME-complete) language-inclusion problem, and are strictly more expressive than other formalisms combining \ECA\ and \VPA\ \cite{TangO09,BhaveDKPT16} such as the class of \emph{Event-Clock Visibly Pushdown Automata} (\ECVPA)~\cite{TangO09}. In~\cite{BhaveDKPT16} a logical characterization of the class of \ECVPA\ is provided by means of a non-elementarily decidable extension of standard \MSO\ over words.\vspace{0.1cm} \noindent \textbf{Our contribution.} In this paper, we introduce two real-time linear temporal logics, called \emph{Event-Clock Nested Temporal Logic} (\ECNTL) and \emph{Nested Metric Temporal Logic} (\NMTL) for specifying quantitative timing context-free requirements in a pointwise semantics setting (models of formulas are timed words). The logic \ECNTL\ is an extension of \emph{Event-Clock Temporal Logic} (\ECTL)~\cite{RaskinS99}, the latter being a known decidable and tractable real-time logical framework related to the class of Event-clock automata. \ECTL\ extends \LTL\ + past with timed temporal modalities which specify time constraints on the distances from the previous or next timestamp where a given subformula holds. The novel logic \ECNTL\ is an extension of both \ECTL\ and \CARET\ by means of non-regular versions of the timed modalities of \ECTL\ which allow to refer to abstract and caller paths. We address expressiveness and complexity issues for the logic \ECNTL. In particular, we establish that satisfiability of \ECNTL\ and visibly model-checking of \VPTA\ against \ECNTL\ are decidable and \EXPTIME-complete. The key step in the proposed decision procedures is a translation of \ECNTL\ into \ECNA\ accepting suitable encodings of the models of the given formula. The second logic we introduce, namely \NMTL, is a context-free extension of standard Metric Temporal Logic (\MTL). This extension is obtained by adding to \MTL\ timed versions of the caller and abstract temporal modalities of \CARET. In the considered pointwise-semantics settings, it is well known that satisfiability of future \MTL\ is undecidable when interpreted over infinite timed words~\cite{OuaknineW06}, and decidable~\cite{OuaknineW07} over finite timed words. We show that over finite timed words, the adding of the future abstract timed modalities to future \MTL\ makes the satisfiability problem undecidable. On the other hand, we show that the fragment \NMITLS\ of \NMTL\ (the \NMTL\ counterpart of the well-known tractable fragment \MITLS\ \cite{AlurFH96} of \MTL) has the same expressiveness as the logic \ECNTL\ and the related satisfiability and visibly model-checking problems are \EXPTIME-complete. The oerall picture of decidabilty results is given in table~\ref{results}. \begin{table}[tb] \centering \caption{Decidability results.}\label{results} \resizebox{\linewidth}{0.8\height}{ \begin{tabular}{cclc} \hline \rule[-1ex]{0pt}{3.5ex} Logic & Satisfiability & Visibly model checking\\ \hline {\color{red} \ECNTL\ } & {\color{red} \EXPTIME-complete} & {\color{red} \EXPTIME-complete} \\ {\color{red} \NMITLS}\ & {\color{red} \EXPTIME-complete} & {\color{red} \EXPTIME-complete} \\ future \MTL\ fin. & Decidable & \\ future \MTL\ infin. & Undecidable & \\ {\color{red} future \NMTL\ fin.} & {\color{red} Undecidable} &\\ \hline \end{tabular}} \end{table} Some proofs are omitted in the sections and can be found in the Appendix. \section{Nested Metric Temporal Logic (\NMTL)} Metric temporal logic (\MTL) \cite{Koymans90} is a well-known timed linear-time temporal logic which extends \LTL\ with time constraints on until modalities. In this section, we introduce an extension of \MTL\ with past, we call \emph{nested} \MTL\ (\NMTL, for short), by means of timed versions of the \CARET\ modalities. For the given set $\Prop$ of atomic propositions containing the special propositions $\call$, $\ret$, and $\intA$, the syntax of nested \NMTL\ formulas $\varphi$ is as follows:\vspace{-0.1cm} \[ \varphi:= \top \DefORmini p \DefORmini \varphi \vee \varphi \DefORmini \neg\,\varphi \DefORmini \varphi\,\StrictUntil^{\dir}_I\varphi \DefORmini \varphi\,\StrictSince^{\dir'}_I\varphi \vspace{-0.05cm} \] where $p\in \Prop$, $I$ is an interval in $\RealP$ with endpoints in $\Nat\cup\{\infty\}$, $\dir\in \{\Global,\abs\}$ and $\dir'\in\{\Global,\abs,\caller\}$. The operators $\StrictUntil^{\Global}_I$ and $\StrictSince^{\Global}_I$ are the standard \emph{timed until and timed since} \MTL\ modalities, respectively, $\StrictUntil^{\abs}_I$ and $\StrictSince^{\abs}_I$ are their non-regular abstract versions, and $\StrictSince_I^{\caller}$ is the non-regular caller version of $\StrictSince^{\Global}_I$. \MTL\ with past is the fragment of \NMTL\ obtained by disallowing the timed abstract and caller modalities, while standard \MTL\ or future \MTL\ is the fragment of \MTL\ with past where the global timed since modalities are disallowed. For an \NMTL\ formula $\varphi$, a timed word $w=(\sigma,\tau)$ over $\Sigma_\Prop$ and $0\leq i< |w|$, the satisfaction relation $(w,i)\models\varphi$ is defined as follows (we omit the clauses for propositions and Boolean connectives): \vspace{-0.1cm} \[ \begin{array}{ll} (w,i)\models \varphi_1 \StrictUntil_I^{\dir}\varphi_2 & \Leftrightarrow\, \textrm{there is } j> i \text{ s.t. }j\in \Pos(\dir,\sigma,i),\, (w,j)\models \varphi_2,\,\tau_j-\tau_i\in I, \\ & \phantom{\Leftrightarrow}\,\, \text{ and } (w,k)\models \varphi_1 \text{ for all } k\in [i+1,j-1]\cap \Pos(\dir,\sigma,i) \\ (w,i)\models \varphi_1 \StrictSince_I^{\dir'}\varphi_2 & \Leftrightarrow\, \textrm{there is } j< i \text{ s.t. }j\in \Pos(\dir',\sigma,i),\, (w,j)\models \varphi_2,\,\tau_i-\tau_j\in I, \\ & \phantom{\Leftrightarrow}\,\, \text{ and } (w,k)\models \varphi_1 \text{ for all } k\in [j+1,i-1]\cap \Pos(\dir',\sigma,i) \end{array}\vspace{-0.1cm} \] \noindent In the following, we use some derived operators in \NMTL: \begin{compactitem} \item For $\dir\in \{\Global,\abs\}$, $\StrictEventually^{\dir}_I \varphi := \top \, \StrictUntil^{\dir}_I\varphi $ and $\StrictAlways^{\dir}_I \varphi:= \neg\StrictEventually^{\dir}_I\neg \varphi \item for $\dir\in\{\Global,\abs,\caller\}$, $\StrictPastEventually^{\dir}_I \varphi:= \top\, \StrictSince^{\dir}_I\varphi $ and $\StrictPastAlways^{\dir}_I \varphi:= \neg\StrictPastEventually^{\dir}_I\neg \varphi $. \end{compactitem}\vspace{0.1cm} Let $\INTS$ be the set of \emph{nonsingular} intervals $J$ in $\RealP$ with endpoints in $\Nat\cup\{\infty\}$ such that either $J$ is unbounded, or $J$ is left-closed with left endpoint $0$. Such intervals $J$ can be replaced by expressions of the form $\sim c$ for some $c\in\Nat$ and $\sim\in\{<,\leq,>,\geq\}$. We focus on the following two fragments of \NMTL: \begin{compactitem} \item \NMITLS: obtained by allowing only intervals in $\INTS$. \item \emph{Future} \NMTL: obtained by disallowing the variants of timed since modalities. \end{compactitem}\vspace{0.1cm} It is known that for the considered pointwise semantics, \MITLS\ \cite{AlurFH96} (the fragment of \MTL\ allowing only intervals in $\INTS$) and \ECTL\ are equally expressive~\cite{RaskinS99}. Here, we easily generalize such a result to the nested extensions of \MITLS\ and \ECTL. \newcounter{lemma-globalEquivNMTL-ECNTL} \setcounter{lemma-globalEquivNMTL-ECNTL}{\value{lemma}} \begin{lemma}\label{lemma:globalEquivNMTL-ECNTL} There exist effective linear-time translations from \ECNTL\ into \NMITLS, and vice versa. \end{lemma} A proof of Lemma~\ref{lemma:globalEquivNMTL-ECNTL} is in Appendix~\ref{APP:globalEquivNMTL-ECNTL}. By Lemma~\ref{lemma:globalEquivNMTL-ECNTL} and Theorem~\ref{theorem:complexityResultsECNTL}, we obtain the following result. \begin{theorem} \ECNTL\ and \NMITLS\ are expressively equivalent. Moreover, satisfiability and visibly model-checking for \NMITLS\ over finite (resp., infinite) timed words are \EXPTIME-complete. \end{theorem} In the considered pointwise semantics setting, it is well-known that satisfiability of \MTL\ with past is undecidable~\cite{AlurH93,OuaknineW06}. Undecidability already holds for future \MTL\ interpreted over infinite timed words~\cite{OuaknineW06}. However, over finite timed words, satisfiability of future \MTL\ is instead decidable~\cite{OuaknineW07}. Here, we show that over finite timed words, the addition of the future abstract timed modalities to future \MTL\ makes the satisfiability problem undecidable. \begin{theorem}\label{theorem:undecidability} Satisfiability of future \NMTL\ interpreted over finite timed words is undecidable. \end{theorem} We prove Theorem~\ref{theorem:undecidability} by a reduction from the halting problem for Minsky $2$-counter machines~\cite{Minsky67}. Fix such a machine $M$ which is a tuple $M = \tpl{\Lab,\Inst,\ell_\init,\ell_\halt}$, where $\Lab$ is a finite set of labels (or program counters), $\ell_\init,\ell_\halt\in \Lab$, and $\Inst$ is a mapping assigning to each label $\ell\in\Lab\setminus\{\ell_\halt\} $ an instruction for either % \begin{inparaenum}[(i)] \item \emph{increment}: $c_h:= c_h+1$; \texttt{goto} $\ell_r$, or \item \emph{decrement}: \texttt{if} $c_h>0$ \texttt{then} $c_h:= c_h-1$; \texttt{goto} $\ell_s$ \texttt{else goto} $\ell_t$, \end{inparaenum where $h \in \{1, 2\}$, $\ell_s\neq \ell_t$, and $\ell_r,\ell_s,\ell_t\in\Lab$. The machine $M$ induces a transition relation $\longrightarrow$ over configurations of the form $(\ell, n_1, n_2)$, where $\ell$ is a label of an instruction to be executed and $n_1,n_2\in\Nat$ represent current values of counters $c_1$ and $c_2$, respectively. A computation of $M$ is a finite sequence $C_1\ldots C_k$ of configurations such that $C_i \longrightarrow C_{i+1}$ for all $i\in [1,k-1]$. The machine $M$ \emph{halts} if there is a computation starting at $(\ell_\init, 0, 0)$ and leading to configuration $(\ell_{\halt}, n_1, n_2)$ for some $n_1,n_2\in\Nat$. The halting problem is to decide whether a given machine $M$ halts. The problem is undecidable~\cite{Minsky67}. We adopt the following notation, where $\ell\in\Lab\setminus\{\ell_\halt\} $: \begin{compactitem} \item (i) if $\Inst(\ell)$ is an increment instruction of the form $c_h:= c_h+1$; \texttt{goto} $\ell_r$, define $c(\ell):= c_h$ and $\Succ(\ell):= \ell_r$; (ii) if $\Inst(\ell)$ is a decrement instruction of the form \texttt{if} $c_h>0$ \texttt{then} $c_h:= c_h-1$; \texttt{goto} $\ell_r$ \texttt{else goto} $\ell_s$, define $c(\ell):= c_h$, $\dec(\ell):= \ell_r$, and $\zero(\ell):= \ell_s$. \end{compactitem} \vspace{0.2cm} We encode the computations of $M$ by using finite words over the pushdown alphabet $\Sigma_\Prop$, where $\Prop = \Lab\cup \{c_1,c_2\}\cup\{\call,\ret,\intA\}$. For a finite word $\sigma=a_1 \ldots a_n$ over $\Lab\cup\{c_1,c_2\}$, we denote by $\sigma^{R}$ the reverse of $\sigma$, and by $(\call,\sigma)$ (resp., $(\ret,\sigma)$) the finite word over $\Sigma_\Prop$ given by $\{a_1,\call\}\ldots \{a_n,\call\}$ (resp., $\{a_1,\ret\}\ldots \{a_n,\ret\}$). We associate to each $M$-configuration $(\ell,n_1,n_2)$ two distinct encodings: the \emph{call-code} which is the finite word over $\Sigma_\Prop$ given by $(\call,\ell c_1^{n_1} c_2^{n_2})$, and the \emph{ret-code} which is given by $(\ret,(\ell c_1^{n_1} c_2^{n_2})^{R})$ intuitively corresponding to the matched-return version of the call-code. A computation $\pi$ of $M$ is then represented by the well-matched word $(\call,\sigma_\pi)\cdot (\ret,(\sigma_\pi)^{R})$, where $\sigma_\pi$ is obtained by concatenating the call-codes of the individual configurations along $\pi$. Formally, let $\Lang_\halt$ be the set of finite words over $\Sigma_\Prop$ of the form $(\call,\sigma)\cdot (\ret, \sigma^{R})$ (\emph{well-matching requirement}) such that the call part $(\call,\sigma)$ satisfies: \begin{compactitem} \item \emph{Consecution:} $(\call,\sigma)$ is a sequence of call-codes, and for each pair $C\cdot C'$ of adjacent call-codes, the associated $M$-configurations, say $(\ell,n_1,n_2)$ and $(\ell',n'_1,n'_2)$, satisfy: $\ell\neq \ell_\halt$ and % \begin{inparaenum}[(i)] \item if $\Inst(\ell)$ is an increment instruction and $c(\ell)= c_h$, then $\ell'=\Succ(\ell)$ and $n'_h>0$; \item if $\Inst(\ell)$ is a decrement instruction and $c(\ell)= c_h$, then \emph{either} $\ell'=\zero(\ell)$ and $n_h=n'_h=0$, \emph{or} $\ell'=\dec(\ell)$ and $n_h>0$. \end{inparaenum \item \emph{Initialization:} $\sigma$ has a prefix of the form $\ell_\init \cdot \ell$ for some $\ell\in \Lab$. \item \emph{Halting:} $\ell_\halt$ occurs along $\sigma$. \item For each pair $C\cdot C'$ of adjacent call-codes in $(\call,\sigma)$ with $C'$ non-halting, the relative $M$-configura\-tions $(\ell,n_1,n_2)$ and $(\ell',n'_1,n'_2)$ satisfy:\footnote{For technical convenience, we do not require that the counters in a configuration having as successor an halting configuration are correctly updated.} % \begin{inparaenum}[(i)] \item \emph{Increment requirement:} if $\Inst(\ell)$ is an increment instruction and $c(\ell)= c_h$, then $n'_h=n_h+1$ and $n'_{3-h}=n_{3-h}$; \item \emph{Decrement requirement:} if $\Inst(\ell)$ is a decrement instruction and $c(\ell)= c_h$, then $n'_{3-h}=n_{3-h}$, and, if $\ell'=\dec(\ell)$, then $n'_h=n_h-1$. \end{inparaenum \end{compactitem}\vspace{0.1cm} Evidently, $M$ halts iff $\Lang_\halt\neq \emptyset$. We construct in polynomial time a future \NMTL\ formula $\varphi_M$ over $\Prop$ such that the set of untimed components $\sigma$ in the finite timed words $(\sigma,\tau)$ satisfying $\varphi_M$ is exactly $\Lang_\halt$. Hence, Theorem~\ref{theorem:undecidability} directly follows. In the construction of $\varphi_M$, we exploit the future \LTL\ modalities and the abstract next modality $\Next^{\abs}$ which can be expressed in future \NMTL. Formally, formula $\varphi_M$ is given by $ \varphi_M:= \varphi_{\textit{WM}} \vee \varphi_\LTL \vee \varphi_{\textit{Time}} $ where $\varphi_{\textit{WM}}$ is a future \CARET\ formula ensuring the well-matching requirement; $ \varphi_{\textit{WM}}:= \call \wedge \Next^{\abs}(\neg\Next^{\Global}\true) \wedge \Always^{\Global}\neg\intA \wedge \neg \Eventually^{\Global}(\ret \wedge \Eventually^{\Global} \call). $ The conjunct $\varphi_\LTL$ is a standard future \LTL\ formula ensuring the consecution, initialization, and halting requirements. The definition of $\varphi_\LTL$ is straightforward and we omit the details of the construction. Finally, we illustrate the construction of the conjunct $\varphi_{\textit{Time}}$ which is a future \MTL\ formula enforcing the increment and decrement requirements by means of time constraints. Let $w$ be a finite timed word over $\Sigma_\Prop$. By the formulas $\varphi_{\textit{WM}}$ and $\varphi_\LTL$, we can assume that the untime part of $w$ is of the form $(\call,\sigma)\cdot (\ret, \sigma^{R})$ such that the call part $(\call,\sigma)$ satisfies the consecution, initialization, and halting requirements. Then, formula $\varphi_{\textit{Time}}$ ensures the following additional requirements: \begin{compactitem} \item \emph{Strict time monotonicity: } the time distance between distinct positions is always greater than zero. This can be expressed by the formula $\Always^{\Global}(\neg \StrictEventually^{\Global}_{[0,0]}\top)$. \item \emph{1-Time distance between adjacent labels: } the time distance between the $\Lab$-positions of two adjacent $\call$-codes (resp., $\ret$-codes) is $1$. This can be expressed as follows:\vspace{0.1cm} \hspace{2.0cm}$ \displaystyle{\bigwedge_{t\in\{\call,\ret\}} \Always^{\Global}\Bigl([t\wedge \bigvee_{\ell\in\Lab}\ell \wedge \StrictEventually^{\Global}(t\wedge \bigvee_{\ell\in\Lab}\ell)] \rightarrow \StrictEventually^{\Global}_{[1,1]}(t\wedge \bigvee_{\ell\in\Lab}\ell) \Bigr)} $\vspace{0.1cm} % \item \emph{Increment and decrement requirements:} fix a $\call$-code $C$ along the call part immediately followed by some non-halting call-code $C'$. Let $(\ell,n_1,n_2)$ (resp., $(\ell',n'_1,n'_2)$) be the configuration encoded by $C$ (resp., $C'$), and $c(\ell)=c_h$ (for some $h=1,2$). Note that $\ell\neq \ell_\halt$. First, assume that $\Inst(\ell)$ is an increment instruction. We need to enforce that $n'_h=n_h+1$ and $n'_{3-h}=n_{3-h}$. For this, we first require that: (*) for every $\call$-code $C$ with label $\ell$, every $c_{3-h}$-position has a future call $c_{3-h}$-position at (time) distance $1$, and every $c_{h}$-position has a future call $c_{h}$-position $j$ at distance $1$ such that $j+1$ is still a call $c_{h}$-position. By the strict time monotonicity and the 1-Time distance between adjacent labels, the above requirement~(*) ensures that $n'_h\geq n_h+1$ and $n'_{3-h}\geq n_{3-h}$. In order to enforce that $n'_h\leq n_h+1$ and $n'_{3-h}\leq n_{3-h}$, we crucially exploit the return part $(\ret, \sigma^{R})$ corresponding to the reverse of the call part $(\call,\sigma)$. In particular, along the return part, the reverse of $C'$ is immediately followed by the reverse of $C$. Thus, we additionally require that: (**) for every \emph{non-first} $\ret$-code $R$ which is immediately followed by a $\ret$-code with label $\ell$, each $c_{3-h}$-position has a future $c_{3-h}$-position at distance $1$, and each non-first $c_{h}$-position of $R$ has a future $c_{h}$-position at distance $1$. Requirements~(*) and~(**) can be expressed by the following two formulas.\vspace{0.1cm} \hspace{1.5cm} $ \Always^{\Global}\Bigl((\call\wedge \ell) \rightarrow \StrictAlways^{\Global}_{[0,1]}[(c_{3-h} \rightarrow \StrictEventually^{\Global}_{[1,1]}c_{3-h})\wedge (c_{h} \rightarrow \StrictEventually^{\Global}_{[1,1]}(c_{h}\wedge \Next^{\Global} c_h))]\Bigr) $\vspace{0.1cm} \hspace{0.4cm}$ \displaystyle{\bigwedge_{\ell'\in \Lab}} \Always^{\Global}\Bigl((\ret\wedge \ell'\wedge \StrictEventually^{\Global}_{[2,2]}\ell) \longrightarrow \StrictAlways^{\Global}_{[0,1]}\bigl( [ c_{3-h} \rightarrow \StrictEventually^{\Global}_{[1,1]}c_{3-h}]\wedge [(c_{h}\wedge \Next^{\Global} c_h) \rightarrow \Next^{\Global}\StrictEventually^{\Global}_{[1,1]}c_{h}]\bigr)\Bigr) $\vspace{0.1cm} Now, assume that $\Inst(\ell)$ is a decrement instruction. We need to enforce that $n'_{3-h}=n_{3-h}$, and whenever $\ell'=\dec(\ell)$, then $n'_h=n_h-1$. This can be ensured by requirements similar to Requirements~(*) and~(**), and we omit the details. \end{compactitem}\vspace{0.1cm} \noindent Note that the unique abstract modality used in the reduction is $\Next^{\abs}$. This concludes the proof of Theorem~\ref{theorem:undecidability}. \section{Preliminaries}\label{sec:backgr} In the following, $\Nat$ denotes the set of natural numbers and $\RealP$ the set of non-negative real numbers. Let $w$ be a finite or infinite word over some alphabet. By $|w|$ we denote the length of $w$ (we write $|w|=\infty$ if $w$ is infinite). For all $i,j\in\Nat $, with $i\leq j <|w|$, $w_i$ is $i$-th letter of $w$, while $w[i,j]$ is the finite subword $w_i\cdots w_j$. A \emph{timed word} $w$ over a finite alphabet $\Sigma$ is a word $w=(a_0,\tau_0) (a_1,\tau_1),\ldots$ over $\Sigma\times \RealP$ ($\tau_i$ is the time at which $a_i$ occurs) such that the sequence $\tau= \tau_0,\tau_1,\ldots$ of timestamps satisfies: (1) $\tau_{i-1}\leq \tau_{i}$ for all $0<i<|w|$ (monotonicity), and (2) if $w$ is infinite, then for all $t\in\RealP$, $\tau_i\geq t$ for some $i\geq 0$ (divergence). The timed word $w$ is also denoted by the pair $(\sigma,\tau)$, where $\sigma$ is the untimed word $a_0 a_1\ldots$. A \emph{timed language} (resp., \emph{$\omega$-timed language}) over $\Sigma$ is a set of finite (resp., infinite) timed words over $\Sigma$.\vspace{0.2cm} \noindent \textbf{Pushdown alphabets, abstract paths, and caller paths.} A \emph{pushdown alphabet} is a finite alphabet $\Sigma=\Scall\cup\Sret\cup\Sint$ which is partitioned into a set $\Scall$ of \emph{calls}, a set $\Sret$ of \emph{returns}, and a set $\Sint$ of \emph{internal actions}. The pushdown alphabet $\Sigma$ induces a nested hierarchical structure in a given word over $\Sigma$ obtained by associating to each call the corresponding matching return (if any) in a well-nested manner. Formally, the set of \emph{well-matched words} is the set of finite words $\sigma_w$ over $\Sigma$ inductively defined as follows \[ \sigma_w:= \varepsilon \DefORmini a\cdot \sigma_w \DefORmini c\cdot \sigma_w \cdot r \cdot \sigma_w \] where $\varepsilon$ is the empty word, $a\in\Sint$, $c\in \Scall$, and $r\in\Sret$. Fix a word $\sigma$ over $\Sigma$. For a call position $i$ of $\sigma$, if there is $j>i$ such that $j$ is a return position of $\sigma$ and $\sigma[i+1,j-1]$ is a well-matched word (note that $j$ is uniquely determined if it exists), we say that $j$ is the \emph{matching return} of $i$ along $\sigma$. For a position $i$ of $\sigma$, the \emph{abstract successor of $i$ along $\sigma$}, denoted $\SUCC(\abs,\sigma,i)$, is defined as follows: % \begin{compactitem} \item If $i$ is a call, then $\SUCC(\abs,\sigma,i)$ is the matching return of $i$ if such a matching return exists; otherwise $\SUCC(\abs,\sigma,i)=\NULL$ ($\NULL$ denotes the \emph{undefined} value). \item If $i$ is not a call, then $\SUCC(\abs,\sigma,i)=i+1$ if $i+1<|\sigma|$ and $i+1$ is not a return position, and $\SUCC(\abs,\sigma,i)=\NULL$, otherwise. \end{compactitem} The \emph{caller of $i$ along $\sigma$}, denoted $\SUCC(\caller,\sigma,i)$, is instead defined as follows: \begin{compactitem} \item if there exists the greatest call position $j_c<i$ such that either $\SUCC(\abs,\sigma,j_c)=\NULL$ or $\SUCC(\abs,\sigma,j_c)>i$, then $\SUCC(\caller,\sigma,i)=j_c$; otherwise, $\SUCC(\caller,\sigma,i)=\NULL$. \end{compactitem} We also consider the \emph{global successor} $\SUCC(\Global,\sigma,i)$ of $i$ along $\sigma$ given by $i+1$ if $i+1<|\sigma|$, and undefined otherwise. A \emph{maximal abstract path} (\MAP) of $\sigma$ is a \emph{maximal} (finite or infinite) increasing sequence of natural numbers $\nu= i_0<i_1<\ldots$ such that $i_j=\SUCC(\abs,\sigma,i_{j-1})$ for all $1\leq j<|\nu|$. Note that for every position $i$ of $\sigma$, there is exactly one \MAP\ of $\sigma$ visiting position $i$. For each $i\geq 0$, the \emph{caller path of $\sigma$ from position $i$} is the maximal (finite) decreasing sequence of natural numbers $j_0>j_1\ldots >j_n$ such that $j_0= i$ and $j_{h+1}=\SUCC(\caller,\sigma,j_{h})$ for all $0\leq h <n$. Note that all the positions of a \MAP\ have the same caller (if any). Intuitively, in the analysis of recursive programs, a maximal abstract path captures the local computation within a procedure removing computation fragments corresponding to nested calls, while the caller path represents the call-stack content at a given position of the input. For instance, consider the finite untimed word $\sigma$ of length $10$ depicted in Figure~\ref{fig-word} where $\Scall =\{c\}$, $\Sret =\{r\}$, and $\Sint =\{\imath\}$. Note that $0$ is the unique unmatched call position of $\sigma$: hence, the \MAP\ visiting $0$ consists of just position $0$ and has no caller. The \MAP\ visiting position $1$ is the sequence $1,6,7,9,10$ and the associated caller is position $0$. The \MAP\ visiting position $2$ is the sequence $2,3,5$ and the associated caller is position $1$, and the \MAP\ visiting position $4$ consists of just position $4$ whose caller path is $4,3,1,0$. \input{Figure1} \section{Event-clock nested automata} In this section, we recall the class of \emph{Event-Clock Nested Automata} (\ECNA)~\cite{BMP18}, a formalism that combines Event Clock Automata (\ECA)~\cite{AlurFH99} and Visibly Pushdown Automata (\VPA)~\cite{AlurMadhu04} by allowing a combined used of event clocks and visible operations on the stack. Here, we adopt a propositional-based approach, where the pushdown alphabet is implicitly given. This is because in formal verification, one usually considers a finite set of atomic propositions which represent predicates over the states of the given system. Moreover, for verifying recursive programs, one fixes three additional propositions, here denoted by $\call$, $\ret$, and $\intA$: $\call$ denotes the invocation of a procedure, $\ret$ denotes the return from a procedure, and $\intA$ denotes internal actions of the current procedure. Thus, we fix a finite set $\Prop$ of atomic propositions containing the special propositions $\call$, $\ret$, and $\intA$. The set $\Prop$ induces a pushdown alphabet $\Sigma_\Prop=\Scall\cup\Sret\cup\Sint$, where $\Scall =\{P\subseteq \Prop\mid P\cap \{\call,\ret,\intA\} = \{\call\} \}$, $\Sret =\{P\subseteq \Prop\mid P\cap \{\call,\ret,\intA\} = \{\ret\} \}$, and $\Sint =\{P\subseteq \Prop\mid P\cap \{\call,\ret,\intA\} = \{\intA\} \}$. The set $C_{\Prop}$ of event clocks associated with $\Prop$ is given by $C_{\Prop}:= \bigcup_{p\in\Prop} \{x^{\Global}_p,y_p^{\Global},x_p^{\abs},y_p^{\abs},x_p^{\caller}\}$. Thus, we associate with each proposition $p\in \Prop$, five event clocks: the \emph{global recorder clock $x^{\Global}_p$} (resp., the \emph{global predictor clock $y^{\Global}_p$}) recording the time elapsed since the last occurrence of $p$ if any (resp., the time required to the next occurrence of $p$ if any); the \emph{abstract recorder clock $x_p^{\abs}$} (resp., the \emph{abstract predictor clock $y_p^{\abs}$}) recording the time elapsed since the last occurrence of $p$ if any (resp., the time required to the next occurrence of $p$) along the \MAP\ visiting the current position; and the \emph{caller (recorder) clock} $x_p^{\caller}$ recording the time elapsed since the last occurrence of $p$ if any along the caller path from the current position. Let $w=(\sigma,\tau)$ be a timed word over $\Sigma_\Prop$ and $0\leq i< |w|$. We denote by $\Pos(\abs,\sigma,i)$ the set of positions visited by the \MAP\ of $\sigma$ associated with position $i$, and by $\Pos(\caller,\sigma,i)$ the set of positions visited by the caller path of $\sigma$ from position $i$. For having a uniform notation, let $\Pos(\Global,\sigma,i)$ be the full set of $w$-positions. The values of the clocks at a position $i$ of the word $w$ can be deterministically determined as follows. \begin{definition}[Determinisitic clock valuations] A \emph{clock valuation} over $C_{\Prop}$ is a mapping $\val: C_{\Prop} \mapsto \RealP\cup \{\NULL\}$, assigning to each event clock a value in $\RealP\cup \{\NULL\}$ ($\NULL$ is the \emph{undefined} value). For a timed word $w=(\sigma,\tau)$ over $\Sigma$ and $0\leq i <|w|$, the \emph{clock valuation $\val^{w}_i$ over $C_{\Prop}$}, specifying the values of the event clocks at position $i$ along $w$, is defined as follows for each $p\in\Prop$, where $\dir\in \{\Global,\abs\}$ and $\dir' \in \{\Global,\abs, \caller\}$: \[ \begin{array}{l} \val^{w}_i(x_p^{\dir'}) = \left\{ \begin{array}{ll} \tau_i - \tau_j & \text{ if there exists the unique } j<i:\, p\in \sigma_j,\, j\in\Pos(\dir',\sigma,i), \text{ and}\, \\ & \,\,\,\,\,\,\forall k: (j < k < i \text{ and }\, k\in\Pos(\dir',\sigma,i)) \Rightarrow p\notin \sigma_k\\ \NULL & \text{ otherwise } \end{array} \right. \vspace{0.2cm}\\ \val^{w}_i(y_p^{\dir}) = \left\{ \begin{array}{ll} \tau_j - \tau_i & \text{ if there exists the unique } j>i:\, p\in \sigma_j,\, j\in\Pos(\dir,\sigma,i), \text{ and}\, \\ & \,\,\,\,\,\,\forall k: (i < k < j \text{ and }\, k\in\Pos(\dir,\sigma,i)) \Rightarrow p\notin \sigma_k\\ \NULL & \text{ otherwise } \end{array} \right. \end{array} \] \end{definition} It is worth noting that while the values of the global clocks are obtained by considering the full set of positions in $w$, the values of the abstract clocks (resp., caller clocks) are defined with respect to the \MAP\ visiting the current position (resp., with respect to the caller path from the current position). A \emph{clock constraint} over $C_{\Prop}$ is a conjunction of atomic formulas of the form $z \in I$, where $z\in C_{\Prop}$, and $I$ is either an interval in $\RealP$ with bounds in $\Nat\cup\{\infty\}$, or the singleton $\{\NULL\}$. For a clock valuation $\val$ and a clock constraint $\theta$, $\val$ satisfies $\theta$, written $\val\models \theta$, if for each conjunct $z\in I$ of $\theta$, $\val(z)\in I$. We denote by $\Phi(C_{\Prop})$ the set of clock constraints over $C_{\Prop}$. \begin{definition} An \ECNA\ over $\Sigma_\Prop= \Scall\cup \Sint \cup \Sret$ is a tuple $\Au=\tpl{\Sigma_\Prop, Q,Q_{0}, C_{\Prop},\Gamma\cup\{\bot\},\Delta,F}$, where $Q$ is a finite set of (control) states, $Q_{0}\subseteq Q$ is a set of initial states, $\Gamma\cup\{\bot\}$ is a finite stack alphabet, $\bot\notin\Gamma$ is the special \emph{stack bottom symbol}, $F\subseteq Q$ is a set of accepting states, and $\Delta=\Delta_c\cup \Delta_r\cup \Delta_i$ is a transition relation, where: \begin{compactitem} \item $\Delta_c\subseteq Q\times \Scall \times \Phi(C_{\Prop}) \times Q \times \Gamma$ is the set of \emph{push transitions}, \item $\Delta_r\subseteq Q\times \Sret \times \Phi(C_{\Prop}) \times (\Gamma\cup \{\bot\}) \times Q $ is the set of \emph{pop transitions}, \item $\Delta_i\subseteq Q\times \Sint\times \Phi(C_{\Prop}) \times Q $ is the set of \emph{internal transitions}. \end{compactitem} \end{definition} We now describe how an \ECNA\ $\Au$ behaves over a timed word $w$. Assume that on reading the $i$-th position of $w$, the current state of $\Au$ is $q$, and $\val^{w}_i$ is the event-clock valuation associated with $w$ and position $i$. If $\Au$ reads a call $c\in \Scall$, it chooses a push transition of the form $(q,c,\theta, q',\gamma)\in\Delta_c$ and pushes the symbol $\gamma\neq \bot$ onto the stack. If $\Au$ reads a return $r\in\Sret$, it chooses a pop transition of the form $(q,r,\theta, \gamma,q')\in\Delta_r$ such that $\gamma$ is the symbol on the top of the stack, and pops $\gamma$ from the stack (if $\gamma=\bot$, then $\gamma$ is read but not removed). Finally, on reading an internal action $a\in\Sint$, $\Au$ chooses an internal transition of the form $(q,a,\theta, q')\in\Delta_i$, and, in this case, there is no operation on the stack. Moreover, in all the cases, the constraint $\theta$ of the chosen transition must be fulfilled by the valuation $ \val^{w}_i$ and the control changes from $q$ to $q'$. Formally, a configuration of $\Au$ is a pair $(q,\beta)$, where $q\in Q$ and $\beta\in\Gamma^*\cdot\{\bot\}$ is a stack content. A run $\pi$ of $\Au$ over a timed word $w=(\sigma,\tau)$ is a sequence of configurations $\pi=(q_0,\beta_0),(q_1,\beta_1),\ldots $ of length $|w|+1$ ($\infty+1$ stands for $\infty$) such that $q_0\in Q_{0}$, $\beta_0=\bot$ (initialization), and the following holds for all $0\leq i< |w|$: \begin{description} \item [Push] If $\sigma_i \in \Scall$, then for some $(q_i,\sigma_i,\theta,q_{i+1},\gamma)\in\Delta_c$, $\beta_{i+1}=\gamma\cdot \beta_i$ and $ \val^{w}_i \models \theta$. \item [Pop] If $\sigma_i \in \Sret$, then for some $(q_i,\sigma_i,\theta, \gamma,q_{i+1})\in\Delta_r$, $ \val^{w}_i \models \theta$, and \emph{either} $\gamma\neq\bot$ and $\beta_{i}=\gamma\cdot \beta_{i+1}$, \emph{or} $\gamma=\beta_{i}= \beta_{i+1}=\bot$. \item [Internal] If $\sigma_i \in \Sint$, then for some $(q_i,\sigma_i,\theta,q_{i+1})\in\Delta_i$, $\beta_{i+1}=\beta_i$ and $ \val^{w}_i\models \theta$. \end{description} The run $\pi$ is \emph{accepting} if \emph{either} $\pi$ is finite and $q_{|w|}\in F$, \emph{or} $\pi$ is infinite and there are infinitely many positions $i\geq 0$ such that $q_i\in F$. The \emph{timed language} $\TLang(\Au)$ (resp., \emph{$\omega$-timed language} $\TLangInf(\Au)$) of $\Au$ is the set of finite (resp., infinite) timed words $w$ over $\Sigma_\Prop$ such that there is an accepting run of $\Au$ on $w$. When considered as an acceptor of infinite timed words, an \ECNA\ is called B\"{u}chi \ECNA. In this case, for technical convenience, we also consider \ECNA\ equipped with a \emph{generalized B\"{u}chi acceptance condition} $\mathcal{F}$ consisting of a family of sets of accepting states. In such a setting, an infinite run $\pi$ is accepting if for each B\"{u}chi component $F\in \mathcal{F}$, the run $\pi$ visits infinitely often states in $F$. In the following, we also consider the class of \emph{Visibly Pushdown Timed Automata} (\VPTA)~\cite{BouajjaniER94,EmmiM06}, a combination of \VPA\ and standard Timed Automata~\cite{AlurD94}. The clocks in a \VPTA\ can be reset when a transition is taken; hence, their values at a position of an input word depend in general on the behaviour of the automaton and not only, as for event clocks, on the word. The syntax and semantics of \VPTA\ is shortly recalled in Appendix~\ref{APP:DefinitionVPTA}.
\section{Introduction} The aim of this paper is to study monotonicity properties of the $D$-rank and $M_2$-rank on overpartitions and therefore prove a conjecture of Chan and Mao \cite{Chan-Mao-2014}. Recall that a partition of a nonnegative integer $n$ is a finite weakly decreasing sequence of positive integers $\lambda = (\lambda_1, \lambda_2, \ldots, \lambda_\ell)$ with $\sum_{1\leq i\leq \ell}\lambda_i=n$. Here $\lambda_1, \lambda_2, \ldots, \lambda_\ell$ are called parts of the partition $\lambda$ (see \cite{Andrews-1976}). The rank of a partition was defined by Dyson \cite{Dyson-1944} as the largest part of the partition minus the number of parts. Dyson first conjectured and then proved by Atkin and Swinnerton-Dyer \cite{Atkin-Swinnerton-Dyer-1954} that the rank can provide combinatorial interpretations to the following Ramanujan's famous congruence for the partition function modulo $5$ and $7$, respectively: \begin{eqnarray} p(5n+4)&\equiv& 0 \pmod 5, \label{con-5}\\[3pt] p(7n+5) &\equiv& 0 \pmod 7, \label{con-7} \end{eqnarray} where $p(n)$ denotes the number of partitions of $n$. Since then, various results on the rank of partitions have been obtained by many mathematicians (For example, see \cite{Andrews-Garvan-1988,Andrews-Chan-Kim-2013,Andrews-Lewis-2000,Atkin-Garvan-2003,Bringmann-2009,Bringmann-Kane-2010,Bringmann-Mahlburg-2009,Bringmann-Mahlburg-2014,Bringmann-Mahlburg-2011,Bringmann-Lovejoy-2007,Chan-Mao-2014,Chen-Ji-Zang-2015,Chen-Ji-Zang-2016,Garvan-1990,Garvan-Stanton-1990,Kane-2004,Lewis-1991-1,Lewis-1991-2,Lewis-1992-1,Lewis-1992-2,Lewis-1997,Lewis-2009,Lewis-1994,Santa-1992}). Let $N(m,n)$ denote the number of partitions of $n$ with rank $m$. Chan and Mao \cite{Chan-Mao-2014} established the following monotonicity properties for $N(m,n)$. \begin{thm}[Chan and Mao \cite{Chan-Mao-2014}]\label{thm-cm-1} For $n\geq 12$, $m\geq 0$ and $n\neq m+2$, \begin{equation}\label{thm-cm-1-eq} N(m,n)\geq N(m,n-1). \end{equation} \end{thm} \begin{thm}[Chan and Mao \cite{Chan-Mao-2014}]\label{thm-cm-2} For $n\geq 0$ and $m\geq 0$, \begin{equation}\label{thm-cm-2-eq} N(m,n)\geq N(m+2,n). \end{equation} \end{thm} At the end of their paper, Chan and Mao \cite{Chan-Mao-2014} proposed a conjecture on monotonicity properties of the $D$-rank and $M_2$-rank of an overpartition. Recall that an overpartition was defined by Corteel and Lovejoy \cite{Corteel-Lovejoy-2004} as a partition of $n$ in which the first occurrence of a part may be overlined. For example, there are $14$ overpartitions of $4$: \[\begin{array}{lllllllllllll} (4),&(\bar{4}),&(3,1),&(\bar{3},1),&(3,\bar{1}),&(\bar{3},\bar{1}),&(2,2),\\[5pt] (\bar{2},2)&(2,1,1),&(\bar{2},1,1),&(2,\bar{1},1),&(\bar{2},\bar{1},1),& (1,1,1,1),&(\bar{1},1,1,1). \end{array} \] Lovejoy \cite{Lovejoy-2005} defined the $D$-rank of an overpartition as the largest part minus the number of parts, which is an analogue of the rank on ordinary partitions. Let $\overline{N}(m,n)$ denote the number of overpartitions of $n$ with $D$-rank $m$. Lovejoy \cite[Proposition 1.1]{Lovejoy-2005} gave the following generating function of $\overline{N}(m,n)$: \begin{equation}\label{equ-gf-over-rank} \sum_{n= 0}^\infty\sum_{m=-\infty}^\infty \overline{N}(m,n) z^mq^n=\sum_{k=0}^\infty\frac{(-1;q)_k \, q^{k(k+1)/2}}{(zq;q)_k(q/z;q)_k}. \end{equation} Here and throughout the rest of this paper, we adopt the common $q$-series notation \cite{Andrews-1976}: \begin{align*} (a;q)_\infty=\prod_{n=0}^\infty(1-aq^n) \quad \text{and} \quad (a;q)_n&=\frac{(a;q)_\infty}{(aq^n;q)_\infty}. \end{align*} The $M_2$-rank on overpartitions was also introduced by Lovejoy \cite{Lovejoy-2008}. For an overpartition $\lambda$, let $\lambda_1$ denote the largest part of $\lambda$, $\ell(\lambda)$ denote the number of parts of $\lambda$, and $\lambda_o$ denote the partition consisting of the non-overlined odd parts of $\lambda$. Then define \begin{equation} M_2\text{-rank}(\lambda)=\left\lfloor\frac{\lambda_1}{2}\right\rfloor-\ell(\lambda) +\ell(\lambda_o)-\chi(\lambda), \end{equation} where $\chi(\lambda)=1$ if the largest part of $\lambda$ is odd and non-overlined, and otherwise $\chi(\lambda)=0$. For instance, let $\lambda=(\overline{7},5,\overline{4},4,\overline{2},2,1,1)$. Then $\lambda_1=7$, $\ell(\lambda)=8$, $\lambda_o=(5,1,1)$, $\ell(\lambda_o)=3$ and $\chi(\lambda)=0$. Therefore, $$ M_2\text{-rank}(\lambda)=3-8 +3=-2. $$ Let $\overline{N2}(m,n)$ denote the number of overpartitions of $n$ with $M_2$-rank $m$. Lovejoy \cite{Lovejoy-2008} found the generating function of $\overline{N2}(m,n)$ as follows: \begin{equation}\label{equ-gf-over-m2-rank} \sum_{n=0}^\infty\sum_{m=-\infty}^\infty \overline{N2}(m,n) z^mq^n= \sum_{k=0}^\infty\frac{(-1;q)_{2k}q^{k}}{(zq^2;q^2)_k(q^2/z;q^2)_k}. \end{equation} Various results on the $D$-rank and $M_2$-rank of overpartitions can be found in \cite{Andrews-Chan-Kim-Osburn-2016,Andrews-Dixit-Schultz-Yee-2016,Bringmann-Lovejoy-Osburn-2009,Garvan-Jennings-2014,Jennings-2015-1,Jennings-2015-2,Jennings-2016,Lovejoy-2005,Lovejoy-2008,Lovejoy-Osburn-2008,Lovejoy-Osburn-2010}. In 2014, Chan and Mao \cite{Chan-Mao-2014} proposed the following monotonicity conjecture on $\overline{N}(m,n)$ and $\overline{N2}(m,n)$: \begin{conj}[Chan and Mao \cite{Chan-Mao-2014}]\label{main-conj} For $(m,n)\neq (0,4)$ with $n\neq |m|+2$, we have \begin{equation}\label{ine-nmn-ge-nmn-1} \overline{N}(m,n)\geq \overline{N}(m,n-1). \end{equation} For $m \in \mathbb{Z}$ and $n\geq 0$, \begin{equation}\label{ine-n2mn-ge-n2mn-1} \overline{N2}(m,n)\geq \overline{N2}(m,n-1). \end{equation} \end{conj} The main purpose of this paper is to give analogues of Theorems \ref{thm-cm-1} and \ref{thm-cm-2}. To be specific, we obtain the following results: \begin{thm}\label{main-thm-1} For $m,n\geq 0$ with $n\neq m+2$ and $(m,n)\neq (0,4)$, \begin{equation}\label{ine-nmn-ge-nmn-1-1-1} \overline{N}(m,n)\geq \overline{N}(m,n-1). \end{equation} For $m,n\geq 0$, we have \begin{equation}\label{ine-nmn-ge-nmn-1-1-2} \overline{N2}(m,n)\geq \overline{N2}(m,n-1). \end{equation} \end{thm} \begin{thm}\label{main-thm-2} For $m,n\geq 0$, we have \begin{equation}\label{ine-nmn-ge-nmn-1-1-2-1} \overline{N}(m,n)\geq \overline{N}(m+2,n), \end{equation} and \begin{equation}\label{ine-nmn-ge-nmn-1-1-2-2} \overline{N2}(m,n)\geq \overline{N2}(m+2,n), \end{equation} \end{thm} By the generating functions \eqref{equ-gf-over-rank} and \eqref{equ-gf-over-m2-rank}, it is easy to see that $\overline{N}(-m,n)=\overline{N}(m,n)$ and $\overline{N2}(-m,n)=\overline{N2}(m,n)$. Therefore Theorem \ref{main-thm-1} verifies Conjecture \ref{main-conj}. This paper is organized as follows. Some preliminary results are given in Section \ref{sec:2}. Then in Section \ref{sec:3}, we establish a nonnegativity result Lemma \ref{lem-1} and use it to give a proof of Theorem \ref{main-thm-1}. Section \ref{sec:4} is devoted to prove Theorem \ref{main-thm-2}. \section{Preliminary}\label{sec:2} In order to prove Theorems \ref{main-thm-1} and Theorem \ref{main-thm-2}, we need to recall the definition of a function $f_{m,k}(q)$, which was first given by Chan and Mao \cite{Chan-Mao-2014}. \begin{defi} Define $f_{m,k}(q)$ as coefficients in the following formal power series: \begin{equation}\label{equ-gf-f-mk} \sum_{m=-\infty}^\infty z^m f_{m,k}(q):=\frac{1-q}{(zq;q)_k(q/z;q)_k}. \end{equation} \end{defi} When $k=0$, by definition we see that $f_{0,0}(q)=1-q$ and $f_{m,0}(q)=0$ for all $m\neq 0$. Chan and Mao \cite[Lemma 9]{Chan-Mao-2014} gave the following expressions for $f_{m,1}(q)$ and $f_{m,2}(q)$. \begin{thm}[Chan and Mao \cite{Chan-Mao-2014}]\label{lem-chan-mao-two-lem-1} For all integer $m$, \begin{equation}\label{equ-f-1-k-gf} f_{m,1}(q)=\sum_{n=\mid m\mid}^\infty (-1)^{m+n} q^n=\frac{q^{\mid m\mid}}{1+q}. \end{equation} For $m=0$, \begin{eqnarray}\label{equ-f-2-k-gf} f_{0,2}(q) =-q+\frac{1}{1-q^3}+\frac{q^2}{1-q^4}+\frac{q^8}{(1-q^3)(1-q^4)}, \end{eqnarray} and for $m\neq 0$, \begin{eqnarray}\label{equ-f-2-k-gf-m-neq-0} f_{m,2}(q)= q^{\mid m\mid}\left(\frac{1-q^{\mid m\mid+1}}{(1-q^2)(1-q^3)}+\frac{q^{\mid m\mid+3}}{(1-q^3)(1-q^4)}\right). \end{eqnarray} \end{thm} Chan and Mao \cite[Lemma 11]{Chan-Mao-2014} also found the following nonnegative property for $f_{m,k}(q)$ when $k\geq 2$. For the remainder part of this paper, let $\{b_n\}_{n=0}^\infty$ be any sequence of nonnegative integers but not necessarily the same in different equations. \begin{thm}[Chan and Mao \cite{Chan-Mao-2014}]\label{lem-chan-mao-two-lem-2} When $k\geq 2$, \begin{eqnarray} f_{0,k}(q)&=&-q+q^2+\sum_{n=0}^\infty b_nq^n;\label{equ-f0k-bn}\\[3pt] f_{1,k}(q)&=& q^{k+2}+\sum_{n=0}^\infty b_nq^n;\label{equ-f1k-bn}\\[3pt] f_{m,k}(q)&=& \sum_{n=0}^\infty b_nq^n,\quad\text{for }m\geq 2.\label{equ-fmk-bn} \end{eqnarray} \end{thm} By definition, it is easy to check that the constant term of $f_{0,k}(q)$ is equal to $1$. Hence \eqref{equ-f0k-bn} yields the following corollary: \begin{core}\label{coro-1} When $k\geq 2$, \begin{equation} f_{0,k}(q)=1-q+q^2+\sum_{n=0}^\infty b_nq^n. \end{equation} \end{core} We also need the following two lemmas in \cite{Chan-Mao-2014}. \begin{lem}[See Lemma 8 of \cite{Chan-Mao-2014}]\label{lem-8} When $k\geq 0$, we have $$ f_{m,k+1}(q)=\sum_{n=-\infty}^\infty f_{n,k}(q)\,\frac{q^{{(k+1)}\mid m-n\mid}}{1-q^{2k+2}}. $$ \end{lem} \begin{lem}[See Lemma 10 of \cite{Chan-Mao-2014}]\label{lem-10} For any positive integer $m$, $$ \frac{1-q^{m+1}}{(1-q^2)(1-q^3)} $$ has nonnegative power series coefficients. \end{lem} \section{The proof of Theorem \ref{main-thm-1}} \label{sec:3} In this section, we give a proof of Theorem \ref{main-thm-1}. To this end, we need the following lemma. \begin{lem}\label{lem-1} For any nonnegative integer $a,b$ and $c$, the coefficient of $q^n$ in \[\frac{q^a}{1+q^c}+\frac{q^b}{(1-q^3)(1-q^4)}\] is nonnegative for $n\geq b+6$. \end{lem} \noindent{\it Proof.} It is clear that \[\frac{q^b}{(1-q^3)(1-q^4)}=\sum_{i=0}^\infty\sum_{j=0}^\infty \, q^{b+3i+4j}.\] Note that for any $n\geq 6$, there exists $i,j\geq 0$ such that $3i+4j=n$. To be specific, \begin{equation} (i,j)= \begin{cases} (k,0) & \text{if }n=3k;\\[3pt] (k-1,1)& \text{if }n=3k+1;\\[3pt] (k-2,2) & \text{if }n=3k+2. \end{cases} \end{equation} Hence we see that, the coefficient of $q^n$ in \begin{equation} \frac{q^b}{(1-q^3)(1-q^4)} \end{equation} is at least $1$. On the other hand, \begin{align} \frac{q^a}{1+q^c}&=\sum_{m=0}^\infty (-1)^{m}q^{cm+a}. \end{align} Evidently, for any nonnegative integer $n$, the coefficient of $q^n$ in $\sum_{m=0}^\infty (-1)^{m}q^{cm+a}$ is either $-1$, $0$ or $1$. Thus when $n\geq b+6$, the coefficient of $q^n$ in \[\frac{q^a}{1+q^c}+\frac{q^b}{(1-q^3)(1-q^4)}\] is nonnegative. This yields the desired result.\nopagebreak\hfill{\rule{4pt}{7pt} We are now in a position to prove Theorem \ref{main-thm-1}. {\noindent \it Proof of Theorem \ref{main-thm-1}.} We first prove \eqref{ine-nmn-ge-nmn-1-1-1} with the aid of Lemma \ref{lem-1}, and then show \eqref{ine-nmn-ge-nmn-1-1-2}. From \eqref{equ-gf-over-rank}, it is clear to see that \begin{equation}\label{equ-dif-over-rank} 1+\sum_{n=1}^\infty\sum_{m=-\infty}^\infty \left(\,\overline{N}(m,n)-\overline{N}(m,n-1)\,\right) z^mq^n=\sum_{k=0}^\infty\frac{(-1;q)_k \, q^{k(k+1)/2}(1-q)}{(zq;q)_k(q/z;q)_k}. \end{equation} By the definition of $f_{m,k}(q)$ (see \eqref{equ-gf-f-mk}), we derive that \begin{equation}\label{equ-over-rank-nmn-fmk} 1+\sum_{n=1}^\infty\sum_{m=-\infty}^\infty \left(\overline{N}(m,n)-\overline{N}(m,n-1)\right) z^mq^n= \sum_{m=-\infty}^\infty z^m\sum_{k=0}^\infty (-1;q)_k \, q^{k(k+1)/2}f_{m,k}(q). \end{equation} Hence for fixed integer $m\neq 0$, \begin{equation}\label{equ-over-rank-nmn-nmn1-1} \sum_{n=1}^\infty \left(\,\overline{N}(m,n)-\overline{N}(m,n-1)\,\right) q^n=\sum_{k=0}^\infty (-1;q)_k \, q^{k(k+1)/2}f_{m,k}(q). \end{equation} When $m=0$, by \eqref{equ-over-rank-nmn-fmk}, \eqref{equ-over-rank-nmn-nmn1-1} and Theorem \ref{lem-chan-mao-two-lem-1} we find that \begin{align}\label{equ-over-rank-n0n-n0n1-0} &\sum_{n=1}^\infty \left(\,\overline{N}(0,n)-\overline{N}(0,n-1)\,\right) q^n\nonumber\\[3pt] =&\ -q+\frac{2q}{1+q}+2(1+q)q^3\left(-q+\frac{1}{1-q^3}+\frac{q^2}{1-q^4} +\frac{q^8}{(1-q^3)(1-q^4)}\right)\nonumber\\[3pt] &+\sum_{k=3}^\infty (-1;q)_k \, q^{k(k+1)/2}f_{0,k}(q). \end{align} By Corollary \ref{coro-1}, we derive that \begin{align}\label{equ-over-rank-n0n-n0n1-1} &\sum_{n=1}^\infty \left(\,\overline{N}(0,n)-\overline{N}(0,n-1)\,\right) q^n\nonumber\\[3pt] =&-q-2q^4-2q^5+\frac{2(1+q)q^3}{1-q^3}+\frac{2(1+q)q^5}{1-q^4} +\frac{2q^{12}}{(1-q^3)(1-q^4)} \nonumber\\[3pt] &+\frac{2q}{1+q} +\frac{2q^{11}}{(1-q^3)(1-q^4)}\nonumber\\[3pt] &+\sum_{k=3}^\infty (-1;q)_k \, q^{k(k+1)/2}\left(1-q+q^2+\sum_{n=0}^\infty b_nq^n\right). \end{align} The last term in \eqref{equ-over-rank-n0n-n0n1-1} can be transformed as follows: \begin{align}\label{equ-over-rank-n0n-n0n1-1-term3} &\sum_{k=3}^\infty (-1;q)_k \, q^{k(k+1)/2}\left(1-q+q^2+\sum_{n=0}^\infty b_nq^n\right)\nonumber\\[3pt] =& \sum_{k=3}^\infty 2(1+q)(-q^2;q)_{k-2}\, q^{k(k+1)/2}(1-q+q^2)+\sum_{k=3}^\infty(-1;q)_k \, q^{k(k+1)/2}\sum_{n=0}^\infty b_nq^n\nonumber\\[3pt] =&\sum_{k=3}^\infty 2(1+q^3)(-q^2;q)_{k-2} q^{k(k+1)/2}+ \sum_{k=3}^\infty (-1;q)_k \, q^{k(k+1)/2}\sum_{n=0}^\infty b_nq^n, \end{align} which clearly has nonnegative coefficients. Moreover, by Lemma \ref{lem-1}, the coefficient of $q^n$ in \[\frac{2q}{1+q} +\frac{2q^{11}}{(1-q^3)(1-q^4)}\] is nonnegative for $n\geq 17$. From the above analysis, we see that \[\overline{N}(0,n)\geq \overline{N}(0,n-1)\] for $n\geq 17$. It is trivial to check that for $1\leq n\leq 16$, \[\overline{N}(0,n)\geq \overline{N}(0,n-1)\] except for $n=2$ or $n=4$. Therefore Theorem \ref{main-thm-1} holds for $m=0$. We now assume that $m\geq 1$. Substituting \eqref{equ-f-1-k-gf} and \eqref{equ-f-2-k-gf-m-neq-0} into \eqref{equ-over-rank-nmn-nmn1-1}, we have \begin{align} &\sum_{n=1}^\infty \left(\,\overline{N}(m,n)-\overline{N}(m,n-1)\,\right) q^n\nonumber\\[3pt] =&\,\frac{2q^{m+1}}{1+q}+\sum_{k=3}^\infty (-1;q)_k \, q^{k(k+1)/2}f_{m,k}(q)\nonumber\\[3pt] &+2(1+q)q^{m+3}\left(\frac{1-q^{m+1}}{(1-q^2)(1-q^3)} +\frac{q^{m+3}}{(1-q^3)(1-q^4)}\right). \end{align} From Theorem \ref{lem-chan-mao-two-lem-2}, we see that for $k\geq 3$, $f_{m,k}(q)$ has nonnegative coefficients. We proceed to show the coefficients of $q^n$ in \begin{equation}\label{equ-rank-over-neq-1-3-1} \frac{2q^{m+1}}{1+q}+2(1+q)q^{m+3}\left(\frac{1-q^{m+1}}{(1-q^2)(1-q^3)}+\frac{q^{m+3}}{(1-q^3)(1-q^4)}\right) \end{equation} is nonnegative for all $n\geq m+3$. We first assume that $m\neq 1,3$. In this case, we transform \eqref{equ-rank-over-neq-1-3-1} as follows: \begin{align}\label{equ-rank-over-neq-1-3-1-1-1} &\frac{2\,q^{m+1}}{1+q}+2(1+q)q^{m+3} \left(\frac{1-q^{m+1}}{(1-q^2)(1-q^3)}+\frac{q^{m+3}}{(1-q^3)(1-q^4)}\right)\nonumber\\[3pt] =&\,\frac{2\,q^{m+1}}{1+q}+2q^{m+4}\frac{1-q^{m+1}}{(1-q^2)(1-q^3)}\nonumber\\[3pt] &+2q^{m+3}\frac{1-q^{m+1}}{(1-q^2)(1-q^3)}+2(1+q)\frac{q^{2m+6}}{(1-q^3)(1-q^4)}. \end{align} By Lemma \ref{lem-10}, we find that \[2q^{m+3}\frac{1-q^{m+1}}{(1-q^2)(1-q^3)}\] has nonnegative coefficients in $q^n$ for all $n\geq 1$. Moreover, \begin{eqnarray*} \frac{2q^{m+1}}{1+q}+2q^{m+4}\frac{1-q^{m+1}}{(1-q^2)(1-q^3)}&=&\frac{2q^{m+1}}{1+q}+ 2q^{m+4}\frac{1-q^3+q^3-q^{m+1}}{(1-q^2)(1-q^3)}\nonumber\\[3pt] &=&\frac{2q^{m+1}}{1+q}+\frac{2q^{m+4}}{1-q^2}+2q^{m+7}\frac{1-q^{m-2}}{(1-q^2)(1-q^3)} \nonumber\\[3pt] &=&2q^{m+1}\frac{1-q+q^3}{1-q^2}+2q^{m+7}\frac{1-q^{m-2}}{(1-q^2)(1-q^3)}\nonumber\\[3pt] &=&\frac{2q^{m+1}}{1-q^2}-2q^{m+2}+2q^{m+7}\frac{1-q^{m-2}}{(1-q^2)(1-q^3)}. \end{eqnarray*} Notice that when $m\neq 1,3$, by Lemma \ref{lem-10} we obtain \[2q^{m+7}\frac{1-q^{m-2}}{(1-q^2)(1-q^3)}=\sum_{n=0}^\infty b_nq^n.\] This yields that \eqref{equ-rank-over-neq-1-3-1-1-1} has nonnegative coefficients in $q^n$ for $n\geq m+3$, as desired. It remains to consider the case $m=1$ or $3$. For $m=1$, it is trivial to calculate that \eqref{equ-rank-over-neq-1-3-1} is equal to \begin{equation}\label{equ-rank-over-neq-1-3-2} \frac{2q^2}{1+q}+\frac{2q^4+2q^5}{(1-q^3)(1-q^4)}. \end{equation} From Lemma \ref{lem-1}, we see that for $n\geq 10$, the coefficient of $q^n$ in \[\frac{2q^2}{1+q}+\frac{2q^4}{(1-q^3)(1-q^4)}\] is nonnegative. Hence we derive that $\overline{N}(1,n)\geq N(1,n-1)$ for $n\geq 10$. It is trivial to check that for $4\leq n\leq 9$, $\overline{N}(1,n)\geq N(1,n-1)$ also holds. This yields the case for $m=1$. Finally, for $m=3$, \eqref{equ-rank-over-neq-1-3-1} is equal to: \begin{equation}\label{equ-rank-over-neq-3-3-1} \frac{2q^4}{1+q}+\frac{2q^{12}}{(1-q^3)(1-q^4)}+\frac{2q^{13}}{(1-q^3)(1-q^4)}+ \frac{2(1+q)(1+q^2)q^6}{1-q^3}. \end{equation} Using Lemma \ref{lem-1}, we find that for $n\geq 18$, the coefficient of $q^n$ in \begin{equation}\label{equ-rank-over-neq-3-3-2} \frac{2q^4}{1+q}+\frac{2q^{12}}{(1-q^3)(1-q^4)} \end{equation} is nonnegative. This yields that $\overline{N}(3,n)\geq \overline{N}(3,n-1)$ for $n\geq 18$. After checking $\overline{N}(3,n)\geq \overline{N}(3,n-1)$ for $6\leq n\leq 17$, we find that \eqref{ine-nmn-ge-nmn-1-1-1} is valid for $m=3$. We next prove \eqref{ine-nmn-ge-nmn-1-1-2}. From \eqref{equ-gf-over-m2-rank}, we see that \begin{align} &\qquad 1+\sum_{n=1}^\infty\sum_{m=-\infty}^\infty \left(\,\overline{N2}(m,n)-\overline{N2}(m,n-1)\,\right) z^mq^n\nonumber\\[3pt] &=(1-q) \sum_{k=0}^\infty\frac{(-1;q)_{2k}q^{k}}{(zq^2;q^2)_k(q^2/z;q^2)_k}\nonumber\\[3pt] &=1-q+2\sum_{k=1}^\infty\frac{(1-q^2)(-q^2;q)_{2k-2}q^k}{(zq^2;q^2)_k(q^2/z;q^2)_k}\nonumber\\[3pt] &=1-q+2\sum_{k=1}^\infty(-q^2;q)_{2k-2}q^k\sum_{m=-\infty}^\infty z^m f_{m,k}(q^2). \end{align} Hence \begin{equation} 1+\sum_{n=1}^\infty \left(\,\overline{N2}(0,n)-\overline{N2}(0,n-1)\,\right) q^n=1-q+2\sum_{k=1}^\infty(-q^2;q)_{2k-2}q^k f_{0,k}(q^2), \end{equation} and for $m\geq 1$, \begin{equation}\label{equ-fg-n2-0-1} \sum_{n=1}^\infty \left(\,\overline{N2}(m,n)-\overline{N2}(m,n-1)\,\right) q^n=2\sum_{k=1}^\infty(-q^2;q)_{2k-2}\,q^k f_{m,k}(q^2). \end{equation} Similar to the proof of \eqref{ine-nmn-ge-nmn-1-1-1}, we first assume that $m=0$. From Theorem \ref{lem-chan-mao-two-lem-1} and Corollary \ref{coro-1}, we deduce that \begin{align}\label{equ-gf-n2mn-0-1} &\qquad 1+\sum_{n=1}^\infty \left(\,\overline{N2}(0,n)-\overline{N2}(0,n-1)\,\right) q^n\nonumber\\[3pt] &=1-q+ \frac{2q}{1+q^2}+2(1+q^2)(1+q^3)q^2 \left(-q^2+\frac{1}{1-q^6}+\frac{q^4}{1-q^8}+\frac{q^{16}}{(1-q^6)(1-q^8)}\right)\nonumber\\[3pt] &\quad+2\sum_{k=3}^\infty (-q^2;q)_{2k-2}\,q^k \left(1-q^2+q^4+\sum_{n=0}^\infty b_nq^{2n}\right)\nonumber\\[3pt] &=1-q-2q^4-2q^6-2q^7-2q^9+\frac{2q}{1+q^2}+\frac{2q^{18}+2q^{20}+2q^{21}+2q^{23}} {(1-q^6)(1-q^8)}\nonumber\\[3pt] &\quad +2(1+q^2)(1+q^3)q^2 \left(\frac{1}{1-q^6}+\frac{q^4}{1-q^8}\right)\nonumber\\[3pt] &\quad +2\sum_{k=3}^\infty (-q^2;q)_{2k-2}q^k \sum_{n=0}^\infty b_nq^{2n}+2\sum_{k=3}^\infty (-q^3;q)_{2k-3}\,q^k (1+q^6). \end{align} Setting $a=0$, $b=10$ and replace $q$ with $q^2$ in Lemma \ref{lem-1}, we find that for $n\geq 33$, the coefficient of $q^n$ in \[\frac{2q}{1+q^2}+\frac{2q^{21}}{(1-q^6)(1-q^8)}\] is nonnegative. Thus the coefficient of $q^n$ in \eqref{equ-gf-n2mn-0-1} is nonnegative for $n\geq 33$, which implies that $\overline{N2}(0,n)\geq \overline{N2}(0,n-1)$ for $n\geq 33$. It is trivial to check that for $1\leq n\leq 32$, $\overline{N2}(0,n)\geq \overline{N2}(0,n-1)$ also holds. This yields \eqref{ine-nmn-ge-nmn-1-1-2} for $m=0$. We proceed to show that \eqref{ine-nmn-ge-nmn-1-1-2} holds for $m\geq 1$. From Theorem \ref{lem-chan-mao-two-lem-1} and \eqref{equ-fg-n2-0-1}, we have \begin{align}\label{equ-fg-n2-1-3-2-ge} &\sum_{n=1}^\infty \left(\,\overline{N2}(m,n)-\overline{N2}(m,n-1)\,\right) q^n\nonumber\\[3pt] =&2q f_{m,1}(q^2)+2(-q^2;q)_4 q^3f_{m,3}(q^2)+2\sum_{k=2\atop k\neq 3}^\infty(-q^2;q)_{2k-2}\,q^k f_{m,k}(q^2)\nonumber\\[3pt] =&\frac{2q^{2m+1}}{1+q^2}+2(-q^2;q)_4 q^3f_{m,3}(q^2)+2\sum_{k=2\atop k\neq 3}^\infty(-q^2;q)_{2k-2}q^k f_{m,k}(q^2). \end{align} From Lemma \ref{lem-8}, we see that \begin{equation} f_{m,3}(q)=\sum_{n=-\infty}^\infty f_{n,2}(q)\,\frac{q^{3\mid m-n\mid}}{1-q^6} =f_{m,2}(q)+f_{m,2}(q)\,\frac{q^6}{1-q^6}+\sum_{n=-\infty\atop n\neq m}^\infty f_{n,2}(q)\,\frac{q^{3\mid m-n\mid}}{1-q^6}. \end{equation} By Theorem \ref{lem-chan-mao-two-lem-2}, the coefficient of $q^n$ in $f_{m,2}(q)$ is nonnegative for all integer $m$ and $n\geq 0$. This allows us to transform $f_{m,3}(q)$ as follows: \begin{align} f_{m,3}(q)&= f_{m,2}(q)+\sum_{n=0}^\infty b_nq^n\nonumber\\[3pt] &=q^{m}\left(\frac{1-q^{ m+1}}{(1-q^2)(1-q^3)}+\frac{q^{ m+3}}{(1-q^3)(1-q^4)}\right)+\sum_{n=0}^\infty b_nq^n. \end{align} Hence \begin{align}\label{equ-exp-fm3-0} &2(-q^2;q)_4\,q^3f_{m,3}(q^2)\nonumber\\[3pt] =&2(-q^2;q)_4\,q^{2m+3}\left(\frac{1-q^{2m+2}}{(1-q^4)(1-q^6)} +\frac{q^{ 2m+6}}{(1-q^6)(1-q^8)}\right)+\sum_{n=0}^\infty b_nq^{n} \nonumber\\[3pt] =&2(-q^4;q)_2\,q^{2m+3}\frac{1-q^{2m+2}}{(1-q^2)(1-q^3)} +2(1+q^2)(1+q^5)\frac{q^{4m+9}}{(1-q^3)(1-q^4)}+ \sum_{n=0}^\infty b_nq^{n}\nonumber\\[3pt] =&2q^{2m+3}\frac{1-q^{2m+2}}{(1-q^2)(1-q^3)}+2\frac{q^{4m+9}}{(1-q^3)(1-q^4)}+2(q^4+q^5+q^9)\left(q^{2m+3}\frac{1-q^{2m+2}}{(1-q^2)(1-q^3)}\right)\nonumber\\[3pt] &+2(q^2+q^5+q^7)\left(\frac{q^{4m+9}}{(1-q^3)(1-q^4)} \right)+\sum_{n=0}^\infty b_nq^{n}. \end{align} From Lemma \ref{lem-10}, we see that \[\frac{1-q^{2m+2}}{(1-q^2)(1-q^3)}\] has nonnegative coefficients. Together with \eqref{equ-exp-fm3-0}, we deduce that \begin{equation}\label{equ-exp-fm3} 2(-q^2;q)_4\,q^3f_{m,3}(q^2)=2q^{2m+3}\frac{1-q^{2m+2}}{(1-q^2)(1-q^3)} +\frac{2q^{4m+9}}{(1-q^3)(1-q^4)}+ \sum_{n=0}^\infty b_n q^n. \end{equation} Moreover, from Theorem \ref{lem-chan-mao-two-lem-2}, we see that \begin{equation}\label{equ-sum-k-ge-2-ne-3} \sum_{k=2\atop k\neq 3}^\infty(-q^2;q)_{2k-2}q^k f_{m,k}(q^2)=\sum_{n=0}^\infty b_nq^n. \end{equation} Next we show that $\overline{N2}(m,n)\geq \overline{N2}(m,n-1)$ for $m\geq 2$. Substituting \eqref{equ-exp-fm3} and \eqref{equ-sum-k-ge-2-ne-3} into \eqref{equ-fg-n2-1-3-2-ge}, we derive that \begin{align}\label{equ-fg-n2-1-3-ex-f-1} &\sum_{n=1}^\infty \left(\,\overline{N2}(m,n)-\overline{N2}(m,n-1)\,\right) q^n\nonumber\\[3pt] =&\,\frac{2q^{2m+1}}{1+q^2}+2q^{2m+3}\frac{1-q^{2m+2}}{(1-q^2)(1-q^3)} +\frac{2q^{4m+9}}{(1-q^3)(1-q^4)} +\sum_{n=0}^\infty b_n q^n\nonumber\\[3pt] =&\,\frac{2q^{2m+1}}{1+q^2}+2q^{2m+3}\frac{1-q^3+q^3-q^{2m+2}}{(1-q^2)(1-q^3)} +\frac{2q^{4m+9}}{(1-q^3)(1-q^4)} +\sum_{n=0}^\infty b_n q^n\nonumber\\[3pt] =&\,\frac{2q^{2m+1}}{1+q^2}+\frac{2q^{2m+3}}{1-q^2} +2q^{2m+6}\frac{1-q^{2m-1}}{(1-q^2)(1-q^3)}+\frac{2q^{4m+9}}{(1-q^3)(1-q^4)} +\sum_{n=0}^\infty b_n q^n\nonumber\\[3pt] =&\,\frac{2q^{2m+1}+2q^{2m+5}}{1-q^4}+2q^{2m+6}\frac{1-q^{2m-1}}{(1-q^2)(1-q^3)} +\frac{2q^{4m+9}}{(1-q^3)(1-q^4)} +\sum_{n=0}^\infty b_n q^n. \end{align} By Lemma \ref{lem-10}, we see that when $m\geq 2$, \[q^{2m+6}\frac{1-q^{2m-1}}{(1-q^2)(1-q^3)}=\sum_{n=0}^\infty b_nq^n.\] This gives $\overline{N2}(m,n)\geq \overline{N2}(m,n-1)$, as desired. Finally, we consider the case $m=1$. In this case, by \eqref{equ-exp-fm3}, \begin{equation}\label{equ-exp-f13} 2(-q^2;q)_4\,q^3f_{1,3}(q^2)=2q^{5}\frac{1+q^{2}}{1-q^3} +\frac{2q^{13}}{(1-q^3)(1-q^4)}+ \sum_{n=0}^\infty b_n q^n. \end{equation} Substituting \eqref{equ-sum-k-ge-2-ne-3} and \eqref{equ-exp-f13} into \eqref{equ-fg-n2-1-3-2-ge}, we see that \begin{equation} \sum_{n=1}^\infty \left(\,\overline{N2}(1,n)-\overline{N2}(1,n-1)\,\right) q^n =\frac{2q^{3}}{1+q^2}+2q^{5}\frac{1+q^{2}}{1-q^3} +\frac{2q^{13}}{(1-q^3)(1-q^4)}+ \sum_{n=0}^\infty b_n q^n. \end{equation} From Lemma \ref{lem-1}, we find that for $n\geq 19$, the coefficient of $q^n$ in \[\frac{2q^{3}}{1+q^2}+\frac{2q^{13}}{(1-q^3)(1-q^4)}\] is nonnegative. This gives $\overline{N2}(1,n)\geq \overline{N2}(1,n-1)$ for $n\geq 19$. It can be checked that for $1\leq n\leq 18$, $\overline{N2}(1,n)\geq \overline{N2}(1,n-1)$ still holds. This completes the entire proof.\nopagebreak\hfill{\rule{4pt}{7pt} \section{The proof of Theorem \ref{main-thm-2}} \label{sec:4} In this section, we give a proof of Theorem \ref{main-thm-2}. To this end, we need the following lemma. \begin{lem}\label{lem-2} For integer $k\geq 0$, let \[\frac{1}{(qz;q)_k\,(q/z;q)_k}=\sum_{n=0}^\infty \sum_{m=-\infty}^\infty a_{k,m}(n)z^mq^n.\] Then for $m\geq 0$, we have $a_{k,m}(n)\geq a_{k,m+2}(n)$. Equivalently, for $m\geq 0$, the coefficient of $z^m q^n$ in \[\frac{1-z^{-2}}{(qz;q)_k(q/z;q)_k}\] is nonnegative. \end{lem} \noindent{\it Proof.} By definition, we see that \begin{equation}\label{sym-akmn} a_{k,m}(n)=a_{k,-m}(n). \end{equation} Moreover, it is clear that \begin{align} \sum_{n=0}^\infty \sum_{m=-\infty}^\infty a_{k+1,m}(n)z^mq^n&=\frac{1}{(qz;q)_{k+1}(q/z;q)_{k+1}}\nonumber\\[3pt] &=\frac{1}{(1-zq^{k+1})(1-q^{k+1}/z)}\sum_{n=0}^\infty \sum_{m=-\infty}^\infty a_{k,m}(n)z^mq^n\nonumber\\[3pt] &=\sum_{r=0}^\infty \sum_{i=0}^r z^{r-2i}q^{r(k+1)}\sum_{n=0}^\infty \sum_{m=-\infty}^\infty a_{k,m}(n)z^mq^n. \end{align} Thus we have \begin{equation}\label{equ-ref-akmn} a_{k+1,m}(n)=\sum_{r=0}^{\lfloor \frac{n}{k+1} \rfloor}\sum_{i=0}^r a_{k,m-r+2i}\left(n-r(k+1)\right). \end{equation} We prove this lemma by induction on $k$. For $k=1$, it is trivial to check that \[a_{1,m}(n)=\begin{cases} 1& \text{if } m\equiv n\pmod{2}\text{ and } n\geq |m|;\\ 0& \text{otherwise.} \end{cases}\] This gives our desired result. Set $b_{k,m}(n)=a_{k,m}(n)-a_{k,m+2}(n)$ and assume that $b_{k,m}(n)\geq 0$ for $m\geq 0$. From \eqref{equ-ref-akmn}, we derive that \begin{equation}\label{equ-ref-bkmn} b_{k+1,m}(n)=\sum_{r=0}^{\lfloor \frac{n}{k+1} \rfloor} \sum_{i=0}^r b_{k,m-r+2i}\left(n-r(k+1)\right). \end{equation} Moreover, by \eqref{sym-akmn}, we see that \begin{equation}\label{equ-sym-bkmn-1} b_{k,m}(n)=-b_{k,-m-2}(n) \end{equation} and therefore \begin{equation}\label{equ-sym-bkmn} \sum_{r=m+1}^{\lfloor \frac{n}{k+1} \rfloor} \sum_{i=0}^{r-m-1} b_{k,m-r+2i}\left(n-r(k+1)\right)=0. \end{equation} Thus by \eqref{equ-ref-bkmn} and \eqref{equ-sym-bkmn}, we derive that for $m\geq 0$, \begin{align}\label{equ-lem-bk+1mn} b_{k+1,m}(n)&=\sum_{r=0}^m \sum_{i=0}^r b_{k,m-r+2i}(n-r(k+1))+\sum_{r=m+1}^{\lfloor \frac{n}{k+1} \rfloor} \sum_{i=0}^r b_{k,m-r+2i}(n-r(k+1))\nonumber\\[3pt] &=\sum_{r=0}^m \sum_{i=0}^r b_{k,m-r+2i}(n-r(k+1))+\sum_{r=m+1}^{\lfloor \frac{n}{k+1} \rfloor} \sum_{i=r-m}^r b_{k,m-r+2i}(n-r(k+1)). \end{align} From induction hypothesis, we find that each term in the above summation is nonnegative. Thus $b_{k+1,m}(n)\geq 0$. This completes the proof.\nopagebreak\hfill{\rule{4pt}{7pt} We now give a proof of Theorem \ref{main-thm-2}. \noindent{\it Proof of Theorem \ref{main-thm-2}.} By \eqref{equ-gf-over-rank}, for $m\geq 0$, $\overline{N}(m,n)\geq \overline{N}(m+2,n)$ is equivalent to that the coefficient of $z^m$ in \begin{equation}\label{equ-gf-over-rank-1} \sum_{k=0}^\infty\frac{(-1;q)_k \, q^{k(k+1)/2}(1-z^{-2})}{(zq;q)_k(q/z;q)_k} \end{equation} is nonnegative. But by Lemma \ref{lem-2}, \begin{equation} [z^m]\,\sum_{k=0}^\infty\frac{(-1;q)_k \, q^{k(k+1)/2}(1-z^{-2})}{(zq;q)_k(q/z;q)_k} =\sum_{k=0}^\infty(-1;q)_k \, q^{k(k+1)/2}[z^m]\,\frac{1-z^{-2}}{(zq;q)_k(q/z;q)_k}, \end{equation} which is clearly has nonnegative coefficients, where $[z^m]\,f(z)$ denotes the coefficient of $z^m$ in $f(z)$. This yields \eqref{ine-nmn-ge-nmn-1-1-2-1}. Similarly, by \eqref{equ-gf-over-m2-rank}, for $m\geq 0$, $\overline{N2}(m,n)\geq \overline{N2}(m+2,n)$ is equivalent to that the coefficient of $z^m$ in \begin{equation*} \sum_{k=0}^\infty\frac{(-1;q)_{2k}\,q^{k}(1-z^{-2})}{(zq^2;q^2)_k\,(q^2/z;q^2)_k} \end{equation*} is nonnegative. Again using Lemma \ref{lem-2}, we see that \begin{equation*} [z^m]\,\sum_{k=0}^\infty\frac{(-1;q)_{2k}\,q^{k}(1-z^{-2})}{(zq^2;q^2)_k\,(q^2/z;q^2)_k} =\sum_{k=0}^\infty(-1;q)_{2k}\,q^{k}[z^m]\,\frac{(1-z^{-2})}{(zq^2;q^2)_k\,(q^2/z;q^2)_k}, \end{equation*} which has nonnegative coefficients. This completes the proof.\nopagebreak\hfill{\rule{4pt}{7pt} \section{Conclusions} The rank of partitions gives combinatorial interpretations of several Ramanujan's famous congruence formulas. In this paper, we derive several monotonicity inequalities of the $D$-rank and $M_2$-rank for overpartitions and use them to prove a conjecture of Chan and Mao \cite{Chan-Mao-2014}. Our proofs are based on the study of generating functions for such ranks of overpartitions, which are analytic. It would be interesting to find bijective proofs for our results. We will work on this in the future. \section*{Acknowledgments} The first author acknowledges support from the Swiss National Science Foundation (Grant number P2ZHP2\_171879). This work was done during the first author's visit to the Harbin Institute of Technology (HIT). The first author would like to thank Prof. Quanhua Xu and the second author for the hospitality.
\section{Introduction} A random walk is a fundamental concept to model the motion of a particle in a noisy environment. In one dimension and in discrete time, the position of a random walk is recursively given by $ X_t = X_ {t-1} + \sigma_t $ with $ \sigma_t = \pm 1 $. A value of $ \sigma_t $, which corresponds to a jump at time $t$, is stochastically given. For example, we assign $ \sigma_t = +1 $ at probability $p$ and $ \sigma_t = -1 $ at probability $ q = 1- p $. The mean position satisfies the relation \begin{align} \langle X_t \rangle = \langle X_ {t-1} \rangle + \langle \sigma_t \rangle = \langle X_ {t-1} \rangle + 2 p -1 , \end{align} which has the solution \begin{align} \langle X_t \rangle = X_0 + ( 2 p - 1 ) t . \end{align} For $ p \neq 1/2 $, the walker exhibits a \textit{ballistic} behavior with velocity $ 2 p - 1 $. For $ p = 1/2 $, we consider the mean-square displacement $ M_t = \langle ( X_t - X_0 )^2 \rangle $, and we can show a \textit{diffusive} behavior $ M_t = t $. The authors of \cite{bib:ST} introduced rightward and leftward hopping probabilities which depend on the history of the walker. The initial direction $ \sigma_1 $ is given randomly. The value of $ \sigma_t $ for $ t\ge 2 $ is determined as follows. We pick up one element $ \sigma_s $ from $ ( \sigma_1,\dots,\sigma_{t-1} ) $. If $ \sigma_s=+1 $, the walker jumps rightward i.e. $ \sigma_t = +1 $ (resp. leftward i.e. $ \sigma_t = - 1 $) with probability $r $ (resp. $ 1-r $). If $ \sigma_s=-1 $, the walker jumps rightward (resp. leftward) with probability $ 1-r $ (resp. $ r $). This model is called the elephant random walk. (See also a continuous-time version \cite{bib:PE}.) The authors of \cite{bib:ST} derived a recursion relation for the mean position of the elephant \begin{align} \langle X_t \rangle = X_0 + \bigg( 1 + \frac{ 2r-1 }{ t-1 } \bigg) \Big( \langle X_{t-1} \rangle - X_0 \Big) . \end{align} Solving this relation, one finds the asymptotic behavior as \begin{align} \langle X_t \rangle = X_0 + \frac{ \sigma_1 \Gamma(t+2r-1)}{ \Gamma( 2r ) \Gamma(t) } \simeq X_0 + \frac{ \sigma_1 }{ \Gamma( 2r ) } t^{ 2r-1 } \quad (t\to\infty) . \end{align} For $ r < 1/2 $, the mean displacement vanishes for large $t$ algebraically, in other words, the elephant tends to stay where it started. In contrast, for $ r > 1/2 $, the elephant escapes from the starting point, and the direction is determined by the first random decision. In \cite{bib:ST}, the asymptotic behavior of the mean squared displacement for the elephant is also shown: \begin{align} M_t \simeq \frac{ t }{ 3-4r } \ ( r<3/4 ), \quad t\ln t \ ( r=3/4 ), \quad \frac{ t^{4r-2} }{ (4r-3) \Gamma (4r-2) } \ ( r>3/4 ) . \end{align} Beyond the one-particle problem, it is important to consider many-particle systems with interactions in non-equilibrium statistical physics. The exclusion process on a one dimensional lattice is a basic example of stochastic interacting particle systems \cite{bib:MGP,bib:Spitzer}. Particles try to hop rightward and leftward with rates, say, $ p $ and $ q $, respectively. However, each site of the lattice can be occupied by at most one particle. Therefore an attempt of hopping is rejected, if another particle already occupies the target site. The exclusion process exhibits many interesting phenomena, such as shock and rarefaction waves, boundary-induced phase transitions (see e.g. \cite{bib:KRB-N}). It is used to model traffic flow, motion of molecular motors, surface growth, and many other systems \cite{bib:CMZ}. One of significant features of the exclusion process is its solvability (see e.g. \cite{bib:Schuetz}). It is known that the stationary state of the simple exclusion process is given by a product measure in the periodic boundary condition. In other words, the particles are uniformly distributed for a given density $ \rho $. Due to this fact, when the system size is large enough, the current and velocity are given by $ ( p - q ) \rho(1-\rho) $ and $ ( p - q ) ( 1-\rho ) $, respectively. In this paper we introduce a system of interacting elephant random walks, satisfying the exclusion principle: each particle has history-dependent transition rates which are similar to the original elephant random walk, but a jump is rejected when a target site is occupied. The system has three parameters $ p_\pm $, $ p_0 $ characterizing the directions of elephants' movements, and includes the symmetric and asymmetric simple exclusion processes, as we consider special sets of the parameters. When the number of particles is one (and $ p_+=1-p_- $), our model is equivalent to the original elephant random walk. We also remark that interacting elephants can choose \textit{staying} when one of the nearest-neighbor sites is already occupied by another particle, and they must stay when both two nearest-neighbor sites are already occupied. However, our model is of different nature from the single elephant random walk with stops introduced in e.g. \cite{bib:CSV, bib:KHL}. Since we impose the periodic boundary condition, the density $ \rho $ is conserved and considered as an additional parameter. By using Monte Carlo simulations, we explore global behaviors of the system. We shall find that there are two different regimes depending on the four parameters: a uniform phase and a condensed phase. For the former case, a mean-field analysis predicts the current of particles very well. On the other hand, for the latter case, a cluster is formed, and the standard mean-field theory fails. Instead of the full determination of the phase diagram in the four-dimensional space, we shall impose some restrictions on the four parameters and show plots of the current and other quantities vs one variable. We conjecture that the transition between the uniform and condensed phases is of the first order, i.e. the plots indicate discontinuity at some point. We shall also find that the transition point depends on the initial configuration of elephants. This article is organized as follows. In Section \ref{sec:model} we precisely define the model. In Section \ref{sec:mean-field} we perform a mean-field analysis to predict the particle current and other quantities. In Sections \ref{sec:11} and \ref{sec:01}, we show simulation results and check the validity of the mean-field formulas. We also discuss about the order of phase transitions and ergodicity breaking. In Section \ref{sec:discussions}, we give conclusions of this article and comments about existing studies on related models. \section{Description of the model}\label{sec:model} \begin{figure} \begin{center} \includegraphics[width=60mm]{illust.pdf} \end{center} \caption{\label{fig:illust} Illustration of trajectories of particles in our model. Each site cannot be occupied by more than one particle, so each $ \circ$ corresponds an attempt to hop, which occurs at time $ t_n^{ (k) } $ so that $ \{ t_n^{ (k) } - t_{n-1}^{ (k) } \} $ obeys the exponential distribution with rate 1. The stochastic rule for the direction $ \sigma_n ^{ (k) } $ depends on the history, see the main text.} \end{figure} We consider an interacting particle system on a chain of $ L $ sites, where there are $N$ particles and periodic boundary conditions (i.e. the lattice is a ring). Each particle hops to a nearest-neighbor site, but each site is occupied by at most one particle, so a jump is allowed only when the target site is empty. These are basic rules in the exclusion process \cite{bib:MGP,bib:Spitzer}, see Fig.~\ref{fig:illust}. In general, when one considers discrete-time dynamics in interacting particle systems, more than one particles can simultaneously attempt to move to the same site. In order to avoid this conflict, we rather use continuous-time dynamics. For each particle $k$, we generate a series of times $ \{ t_1^{ (k) }, t_2^{ (k) }, t_3^{ (k) }, \dots \} $, so that the difference sequence $ \{ t^{ (k) }_1-t^{ (k) }_0 , t^{ (k) }_2 - t^{ (k) }_1, t^{ (k) }_3 - t^{ (k) }_2, \dots \}$ $(t^{(k)}_0\equiv 0 )$ obeys the exponential distribution with rate 1, i.e. the probability density function of $ t^{ (k) }_{n +1} - t^{ (k) }_n $ is given as $f ( t^{ (k) }_{n +1} - t^{ (k) }_n = \tau ) = e^{ -\tau } $. The time point $ t^{ (k) }_n $ ($n\ge 1 $) corresponds to the $ n $-th trial of hopping. The direction $ \sigma_n ^{ (k) } $ of the jump (rightward $+1$, leftward $-1$, or to `stay' $ 0 $) is stochastically determined, according to the following rule. For the initial jump $n=1$, we choose one allowed direction $ \sigma^{ (k) }_1 $ from $ \{\pm 1 , 0\} $ randomly. The direction of the second jump $ \sigma^{ (k) }_2 $ depends on $ \sigma^{ (k) }_1 $, the third one $ \sigma^{ (k) }_3 $ depends on $ ( \sigma^{ (k) }_1 , \sigma^{ (k) }_2 ) $, $\dots$, and for general $n$, $ \sigma_n^{(k)}$ depends on the history $ ( \sigma_1^{ (k) }, \sigma_2^{ (k) }, \dots ,\sigma_{n -1}^{(k)} ) $. We pick up $ m $ from $ \{1,2,\dots,n-1\} $ at the equal probability $ 1/(n-1) $, and we shortly write $ \sigma = \sigma_m^{(k)} $. When both neighbor sites of the particle $ k $ are empty, we choose $ \sigma_n^{(k)} = + 1 $ (resp. $ \sigma_n^{(k)} = - 1 $) with probability $ 0\le p_{ \sigma } \le 1$ (resp. $ q_{ \sigma } = 1- p_{ \sigma } $). If the left site is already occupied, the leftward jump is not allowed because of the exclusion principle, so $ \sigma_n^{(k)} = 0 $ with probability $ q_{ \sigma } $. Similarly, if the right site is already occupied, $ \sigma_n^{(k)} = 0 $ with probability $ p_{ \sigma } $. The particle has to stay $ ( \sigma_n^{(k)} = 0 ) $ with probability one when both neighbor sites are occupied. These hopping probabilities after choosing $ \sigma_m^{(k)} $are summarized as \newcommand{{\square\hspace{-2.25mm}\bullet\,}}{{\square\hspace{-2.25mm}\bullet\,}} \newcommand{{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}}{{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}} \begin{align} \label{eq:sigmakn-table} \begin{array}{ccccc} \hline \sigma_n ^{ (k) } & \square{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}\square & {\square\hspace{-2.25mm}\bullet\,}{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}\square & \square{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}{\square\hspace{-2.25mm}\bullet\,} & {\square\hspace{-2.25mm}\bullet\,}{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}{\square\hspace{-2.25mm}\bullet\,} \\ \hline\hline + 1 & p_\sigma & p_\sigma & 0 & 0 \\ \hline -1 & q_\sigma & 0 & q_\sigma & 0 \\ \hline 0 & 0 & q_\sigma & p_\sigma & 1 \\ \hline \end{array} \end{align} In the top row, the particle $k$ is in the middle site and colored in blue. It attempts to hop to one of the neighbor sites, but a hopping is allowed only when the target site is empty. We have a convenient expression for $ p_\sigma $, in the case where $ \sigma$ only takes three values $ \{\pm 1, 0\} $: \begin{align} p_\sigma = p_{+1} \frac{ \sigma ( \sigma + 1 ) }{2} + p_{-1} \frac{ \sigma ( \sigma - 1 ) }{2} + p_0 \big( 1 - \sigma^2 \big) = p_0 + \frac{ p_{+1} - p_{-1} }{2 } \sigma + \frac{ p_{+1} + p_{-1} - 2p_{0} }{2} \sigma^2 . \end{align} Thanks to this formula, the probabilities of choosing $ \sigma_n^{(k)} = \pm 1, 0 $ are eventually given by \begin{align} \begin{array}{ccccc} \hline \sigma_n ^{ (k) } & \square{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}\square & {\square\hspace{-2.25mm}\bullet\,}{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}\square & \square{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}{\square\hspace{-2.25mm}\bullet\,} & {\square\hspace{-2.25mm}\bullet\,}{\square\hspace{-2.25mm}{\color{blue} \bullet}\,}{\square\hspace{-2.25mm}\bullet\,} \\ \hline\hline + 1 &P & P & 0 & 0 \\ \hline -1 & Q & 0 & Q & 0 \\ \hline 0 & 0 & Q & P & 1 \\ \hline \end{array} \end{align} where \begin{align} \label{eq:P} & P ( \sigma^{(k)}_1,\dots,\sigma^{(k)}_{n-1} ) = p_{0} + \frac{ p_{+1} - p_{-1} }{2(n-1)} \sum_{ m=1 }^{ n-1 } \sigma_m^{(k)} + \frac{ p_{+1} + p_{-1} - 2p_{0} }{2(n-1)} \sum_{ m=1 }^{ n-1 } \big[ \sigma_m^{(k)} \big]^2 , \\ & Q ( \sigma^{(k)}_1,\dots,\sigma^{(k)}_{n-1} ) = 1- P ( \sigma^{(k)}_1,\dots,\sigma^{(k)}_{n-1} ) = P ( \sigma^{(k)}_1,\dots,\sigma^{(k)}_{n-1} ) |_{p_\sigma \to q_\sigma (\sigma = \pm1,0)}. \end{align} For example, when both neighbor sites of the particle $ k $ are empty, $ \sigma_n^{(k)} = +1 $ is realized with probability $ P( \sigma^{(k)}_1,\dots,\sigma^{(k)}_{n-1} ) $, and $ \sigma_n^{(k)} = -1 $ with probability $ Q ( \sigma^{(k)}_1,\dots,\sigma^{(k)}_{n-1} ) $. The dynamics of elephants are essentially determined by the two quantities \begin{align} S^{ (k) }_n = \sum_{ m=1 }^{ n } \sigma_m^{(k)} , \quad C^{ (k) }_n = \sum_{ m=1 }^{ n } \big[ \sigma_m^{(k)} \big]^2, \end{align} as well as the configuration of the system. The full history is actually not needed. One of the most important quantities is the stationary current $ J $ in the study of interacting particle systems. Here we mention that the flip of the lattice orientation is a symmetry of our model: \begin{align}\label{eq:flip} J ( p_+, p_- , p_0 , \rho ) =& - J ( 1 - p_-, 1- p_+ , 1 - p_0 , \rho ) \\ P ( \sigma^{(k)}_1,\dots,\sigma^{(k)}_{n-1} ) =& 1- P ( -\sigma^{(k)}_1,\dots,-\sigma^{(k)}_{n-1} )\Big|_{\overset{\scriptstyle p_{\pm}\to 1-p_{\mp}}{ p_0\to 1-p_0}} \end{align} Note that the particle-hole duality is not a symmetry of the model in general: $ J ( p_+, p_- , p_0 , \rho ) \neq -J ( 1-p_+, 1-p_- , 1-p_0 , 1- \rho ) $. This is due to the fact that the jump probability of each particle is history-dependent but holes do not have a memory. Let us look at kymographs, Fig~\ref{fig:kymo}, to get some insight on the model. Interestingly there are two completely different regimes. For the cases (a) and (c) we observe that the particles are distributed entirely over the chain (\textit{uniform phase}). On the other hand, for (b) and (d), a cluster is spontaneously formed (\textit{condensed phase}). In the next section we shall theoretically derive formulas for the current and other quantities by using mean-field assumption. We shall compare the theoretical predictions with simulation results, and discuss phase transitions between the two phases. \begin{figure} \begin{center} \begin{align*} \begin{matrix} \textbf{(a)} & \textbf{(b)} \\ \includegraphics[width=75mm]{fig-kg-1107505.pdf} & \includegraphics[width=75mm]{fig-kg-1102505.pdf} \\ \textbf{(c)} & \textbf{(d)} \\ \includegraphics[width=75mm]{fig-kg-010209.pdf} & \includegraphics[width=75mm]{fig-kg-010203.pdf} \end{matrix} \end{align*} \caption{\label{fig:kymo} Kymographs for $ (p_+,p_-,p_0,\rho) = ( 1,1,0.75,0.5 ) $ (a), and $ ( 1,1,0.25,0.5 ) $ (b), $ (p_+,p_-,p_0,\rho) = ( 0,1,0.2,0.9 ) $ (c), and $ ( 0,1,0.2 ,0.3) $ (d). The system size is $ L=1000 $.} \end{center} \end{figure} \section{Mean field analysis}\label{sec:mean-field} \subsection{Global mean-field formulas} Our model includes the usual simple exclusion process as a special case $ p_+ = p_- = p_0 $. For this case, the stationary state can be written as a product (Bernoulli) measure in the limit $ L\to \infty $. Let us assume the same distribution for the generic case of our model, in order to predict the stationary current $ J $. For example the nearest-neighbor correlation takes a simple form \begin{align}\label{eq:tt-mf} \langle \tau_{i}\tau_{i+1} \rangle = \rho^2 . \end{align} The quantity $ \frac{1}{n} S^{ (k) }_n $ is the effective probability of rightward hopping minus that of leftward hopping. Thus, within the mean-field assumption, we have \begin{align} \frac{1}{n} S^{ (k) }_n = P (1-\rho) - Q (1-\rho) = (2P-1) (1-\rho) . \end{align} The quantity $ \frac{1}{n} S^{ (k) }_n$ is indeed regarded as the velocity of the elephant $ k $. On the other hand, the quantity $ \frac{1}{n} C^{ (k) }_n $ represents the probability that a jump is allowed. Therefore we have \begin{align} \label{eq:C-mf} \frac{1}{n} C^{ (k) }_n = (1-\rho)^2 + P \rho(1-\rho) + Q \rho(1-\rho) = 1 - \rho . \end{align} Substituting them into Eq.~\eqref{eq:P}, we find \begin{align} P = p_0 + \frac{ p_+ - p_- }{2} (2P-1) (1-\rho) + \frac{ p_+ + p_- - 2p_0 }{2}(1 - \rho ). \end{align} Solving this self-consistency equation we get \begin{align} \label{eq:P-mf} P = \frac{ p_- (1-\rho) + p_0 \rho }{ 1 - (p_+ - p_-) ( 1 - \rho ) } \end{align} and \begin{align} \label{eq:S-mf} \frac{1}{n} S^{ (k) }_n = \frac{ ( p_+ + p_- ) ( 1 - \rho ) + 2 p_0 \rho - 1 }{ 1 - ( p_+ - p_-) (1-\rho) } (1-\rho ). \end{align} The current is then predicted as \begin{align} J= ( P - Q ) \rho (1-\rho ) = (2P-1) \rho (1-\rho ) = \frac{ ( p_+ + p_- ) ( 1 - \rho ) + 2 p_0 \rho - 1 }{ 1 - ( p_+ - p_-) (1-\rho) } \rho (1-\rho ). \label{eq:J-mf} \end{align} Note that $ J $ is measured at an arbitrary \textit{bond} between sites $i$ and $i+1$, but it does not depend on $ i $ in a stationary state. We also remark that indeed we have a relation $ J= \rho \frac{1}{n} S^{ (k) }_n $. The calculations above are of course not rigorous, so we have to check the validity of these formulas by comparing with simulations. \subsection{Local mean-field formulas} \begin{figure} \begin{center} \includegraphics[width=100mm]{cluster.pdf} \end{center} \caption{ Illustration for the local mean-field theory in the condensed phase. There is a cluster of length $ \ell $. We denote the particle concentration by $ \rho' $ inside the cluster. \label{fig:cluster}} \end{figure} We also introduce a mean-field theory for the condensed phase. We assume that, inside the cluster, the particles are uniformly distributed. Let us denote the length and the density of the cluster by $\ell $ and $\rho'=N/\ell$, respectively, see Fig.~\ref{fig:cluster}. Under this \textit{local} mean-field theory we simply replace $ \rho $ by $ \rho' $ in the \textit{global} mean-field formulas \eqref{eq:C-mf} and \eqref{eq:S-mf} for $ \frac{C^{ (k) }_n}{n} $ and $ \frac{ S^{ (k) }_n}{n}$ because these are quantities for an individual particle: \begin{align} \frac{C^{ (k) }_n}{n} &= 1 - \rho' , \label{eq:C-lf}\\ \frac{ S^{ (k) }_n}{n} &= \frac{ ( p_+ + p_- ) ( 1 - \rho' ) + 2 p_0 \rho' - 1 }{ 1 - ( p_+ - p_-) (1-\rho') } (1-\rho' ) , \label{eq:S-lf} \end{align} On the other hand, for the current $ J$ and the correlation function $ \langle \tau_{i}\tau_{i+1} \rangle $ we need to consider the two situations, i.e. the cluster covers the sites $ i $ and $ i+1 $ or not. Then we find \begin{align} \nonumber J &= \frac{ \ell }{ L } \frac{ ( p_+ + p_- ) ( 1 - \rho' ) + 2 p_0 \rho' - 1 }{ 1 - ( p_+ - p_-) (1-\rho') } \rho' (1-\rho' ) + \frac{ L-\ell }{ L } 0 \\ & = \frac{ ( p_+ + p_- ) ( 1 - \rho' ) + 2 p_0 \rho' - 1 }{ 1 - ( p_+ - p_-) (1-\rho') } \rho (1-\rho' ) , \label{eq:J-lf}\\ \langle \tau_{i}\tau_{i+1} \rangle &= \frac{ \ell }{ L } ( \rho' )^2 + \frac{ L-\ell }{ L } 0 = \rho \rho' . \label{eq:tt-lf} \end{align} These formulas contain the density $ \rho' $, but the determination of $ \rho' $ is nontrivial. It may depend on the parameters $ p_\pm, p_0 $ and $ \rho $ in general. \clearpage \section{Case $ p_+=p_-= 1 $. }\label{sec:11} Now we show more quantitative simulation results. Our model contains four parameters; $ p_\pm $, $p_0 $ and $\rho $. It is pedagogic to impose restrictions on parameters, so that we can plot quantities such as $ J $ versus one variable. Let us begin with the case where $ p_\pm = 1 $. The probability \eqref{eq:P} is simplified as \begin{align} \label{eq:P:11p0} P = p_{0} + \frac{ 1- p_{0} }{ n-1 } C^{ (k) }_{n-1} . \end{align} The quantity $ S^{ (k) }_{n-1} $ does not contribute to the hopping probabilities. When we further set $ p_0 = 1 $, our process is equivalent to the standard totally asymmetric simple exclusion process. For $ p_0 \neq 1 $, stationary states are non-trivial, and the uniqueness is no longer guarantied. Let us see whether the global mean-field theory gives a reasonable result. \subsection{Uniform and condensed phases} When $p_0$ is large, we observe the distribution of particles is spatially uniform in the kymograph, see Fig.~\ref{fig:kymo} (a). Let us check the validity of the global mean-field formulas \eqref{eq:tt-mf}, \eqref{eq:C-mf}, \eqref{eq:S-mf} and \eqref{eq:J-mf}. Note that, when $ p_\pm = 1 $, \eqref{eq:S-mf} and \eqref{eq:J-mf} are simplified as \begin{align} \label{eq:11-S-mf} \frac{ S_n ^{ (k) } }{ n} & = \big[ 1 - 2 ( 1 - p_0 ) \rho \big] (1-\rho ) , \\ \label{eq:11-J-mf} J & = \big[ 1 - 2 ( 1 - p_0 ) \rho \big] \rho (1-\rho ) . \end{align} In Fig.~\ref{fig:11}, we compare them with simulation results. We find that, for large values of $ p_0 $, the global mean-field formulas actually agree with simulations. \begin{figure}[h] \begin{center} \begin{align*} \begin{matrix} \textbf{(a)} & \textbf{(b)} & \textbf{(c)} & \textbf{(d)} \\ \includegraphics[width=40mm]{fig-pp1-pm1-cnn.pdf} & \includegraphics[width=40mm]{fig-pp1-pm1-snn.pdf} & \includegraphics[width=40mm]{fig-pp1-pm1-flw.pdf} & \includegraphics[width=40mm]{fig-pp1-pm1-tautau.pdf} \end{matrix} \end{align*} \caption{\label{fig:11} Simulation results of the quantity $ \frac{C_n}{n} $ (a), $ \frac{S_n}{n} $ (b), the current (c), and the correlation $ \langle \tau_i \tau_{i+1} \rangle $ (d) for $ p_\pm =1 $ and $ \rho=0.5 $. We used a chain with $L=4000$ sites, and imposed the step and random initial conditions, corresponding to different markers $ \times $ and $ \circ $. The dashed lines are the predictions \eqref{eq:C-mf}, \eqref{eq:S-mf}, \eqref{eq:J-mf} and \eqref{eq:tt-mf} of the global mean-field theory, and the solid lines correspond to the local mean-field formulas \eqref{eq:C-lf}, \eqref{eq:11-S-lf}, \eqref{eq:11-J-lf} and \eqref{eq:tt-lf}. } \end{center} \end{figure} On the other regime ($ p_0 $ is small), the global mean-field theory fails. In contrast to the uniform phase, there is a cluster of particles, see the kymograph, Fig.~\ref{fig:kymo} (b). Qualitatively, one can interpret the figures as follows. Since $p_+=p_-=1$, it implies that jumps forward are highly favored, except when $q_0=1-p_0$ is big. Then, for small values of $p_0$, for any group of particles, most of the particles will first stop (because of the exclusion principle) and then jump backward (since $q_0$ is high). As a consequence, the group will be slowed or even move backward, favoring the emergence of a cluster. Isolated particles will always jump forward (or stay). It explains the small negative values of $J$ for small values of $p_0$. Since in the cluster the particles do not move most of the time, it explains also the small value of $C_n/n$. Now, if $p_0$ becomes bigger than $q_0$ (i.e. $0.5\lesssim p_0$) the jumps forward are always favored, hence $J>0$, and linear in $ p_0 $, as we see in Eq.~\eqref{eq:11-J-mf}. A group of particles moves roughly in the same way as isolated particles, so that there is no clustering. So far we have no rigorous argument to precisely predict the current in this condensed phase, but we can use the local mean-field formulas \eqref{eq:C-lf}--\eqref{eq:tt-lf}. When $ p_\pm=1 $, we have simplifications for $ \frac{ S^{ (k) }_n}{n} $ and $ J $ as \begin{align} \label{eq:11-S-lf} \frac{ S^{ (k) }_n}{n} & = [ 1 - (1- 2 p_0 ) \rho' ] (1-\rho' ), \\ J & = [ 1 - (1- 2 p_0 ) \rho' ] (1-\rho' ) \rho. \label{eq:11-J-lf} \end{align} Recall that these formulas contain the cluster density $ \rho' $ as a free parameter. We start with looking for a good function $ \rho' ( p_0 ,\rho) $ which reproduce the curve of $C_n/n = 1-\rho'$, as shown in Fig.~\ref{fig:11}~(a). For example \begin{align}\label{eq:fitting-11} & \rho' = \frac{a+b p_0-\sqrt{\alpha+\beta p_0+\gamma p_0^2+\delta p_0^3}}{1-p_0}, \\ & a\approx 0.88\,, \quad b\approx - 0.83\,, \quad \alpha\approx 0.00037\,, \quad \beta\approx 0.012\,, \quad \gamma\approx 0.016\,, \quad \delta\approx 0.080\,. \end{align} We remark that this form does not depend on the density $ \rho $. Then, we substitute the form \eqref{eq:fitting-11} into \eqref{eq:11-S-lf}, \eqref{eq:11-J-lf} and \eqref{eq:tt-lf}. Now we have obtained predictions for $ S_n /n $, $ J$ and $\langle \tau_i\tau_{i+1} \rangle $, which fit the simulation results very well, see Fig.~\ref{fig:11} (b)--(d). \subsection{Phase transition} One notices that the global mean-field predictions and the local mean-field predictions cannot have the same values in general. For example, for $ \rho=0.5 $, apparently the dashed and solid lines have no intersection, see Fig.\ref{fig:11}. Supported by this observation, we conjecture that our model exhibits first order phase transitions. Another interesting observation is initial-condition dependence. For the simulations, we used the following two different initial conditions: i) a step initial condition $11\cdots100\cdots0$, i.e. we put particles at sites $ 1 \le i \le N $ and ii) a randomly chosen configuration, which is equivalent to the Bernoulli measure with density $ \rho=N/L $ as $ L\to \infty $. In Fig.~\ref{fig:11}, different plot markers are used in order to distinguish between these two initial conditions. We notice that that the phase transition point depends on the initial conditions, as it can be seen when looking closely at the plots. In other words, the ergodicity is broken in our model: for $ 0.4 \lesssim p_0 \lesssim 0.5 $, the system can take both uniform and condensed configurations in the long time limit, depending on the initial conditions. \section{Case $ p_+= 0 , \ p_-= 1 $}\label{sec:01} \subsection{Uniform and condensed phases} In the case of $ ( p_+ , p_- ) = ( 0,1 ) $, Eq. \eqref{eq:P} becomes \begin{align} P = p_{0} - \frac{ 1 }{2(n-1)} S_{n-1}^{(k)} + \frac{ 1 - 2p_{0} }{2(n-1)} C_{n-1}^{(k)} . \end{align} We remark that the symmetry \eqref{eq:flip} reads $ J ( p_0,\rho ) = - J ( 1-p_0,\rho ) $ in this case. The global mean-field formulas are simplified as \begin{align} \label{eq:01-snn-mf} \frac{1}{n}S_n &= (2 p_0 - 1) \frac{ \rho(1-\rho) }{ 2-\rho } , \\ J &= (2p_0-1) \frac{ \rho^2 (1-\rho) }{ 2-\rho } . \label{eq:01-J-mf} \end{align} In Fig.~\ref{fig:01}, we show simulation results for $ C_n /n $, $ S_n /n $, the current and the correlation, as functions of the density $ \rho $. As we found in the previous case, there are two different regimes, but for the present case the phase depends on $\rho$ rather than $p_0$. \begin{figure}[h] \begin{center} \begin{align*} \begin{matrix} \textbf{(a)} & \textbf{(b)} & \textbf{(c)} & \textbf{(d)} \\ \includegraphics[width=40mm]{fig-pp0-pm1-cnn.pdf} & \includegraphics[width=40mm]{fig-pp0-pm1-snn.pdf} & \includegraphics[width=40mm]{fig-pp0-pm1-flw.pdf} & \includegraphics[width=40mm]{fig-pp0-pm1-tautau.pdf} \end{matrix} \end{align*} \caption{\label{fig:01} Simulation results of (a) the quantity $ \frac{C_n}{n} $, (b) the quantity $ \frac{S_n}{n} $, (c) the current, and (d) the correlation $ \langle \tau_i \tau_{i+1} \rangle $ for $ p_+ = 0$, $p_- = 1 $ and $ p_0 = 0.2 $. We used a chain with $L=4000$ sites, and imposed the step and random initial conditions, corresponding to different markers $ \times $ and $ \circ $. The global mean-field predictions (dashed lines) for the four panels are $ \frac{C_n}{n} = 1-\rho $, Eq.~\eqref{eq:01-snn-mf}, Eq.~\eqref{eq:01-J-mf}, and $ \langle \tau_i \tau_{i+1} \rangle = \rho^2 $. In addition, the solid lines correspond to the local mean-field predictions \eqref{eq:c-01-lf}--\eqref{eq:tt-01-lf}. In each panel, an inset is given in order to closely look at the data near the phase transition. } \end{center} \end{figure} We observe good agreements between the global mean-field formulas and simulations when $ \rho $ is large (say, $\rho> \rho^* $), see Fig.~\ref{fig:01}. In the kymograph, Fig.~\ref{fig:kymo}~(c), we find that the particles are uniformly distributed. On the other hand, for $ \rho < \rho^* $, the global mean-field prediction fails, and a cluster is spontaneously formed, see the kymograph, Fig.~\ref{fig:kymo}~(d). Apparently the particle distribution is not uniform over the chain. The critical value $\rho^*$ can be qualitatively interpreted in the following way. When $\rho$ is high, most of the particles are gathered and cannot move. Then, the jumps are governed by $p_0$ and $\rho$ (since the particles need some `space' to jump), as given by the global mean field approximation. On the contrary, for small concentrations, the values $p_-=1$ and $p_+=0$ imply that in average each jump backward is followed by a jump forward (and vice-versa), so that in average $S_n/n$ is small (its non-zero value ruled by $p_0$ and independent from $\rho$). Now, we use the local mean-field theory in the condensed phase. In Fig.~\ref{fig:01}~(a) we observe that $ \frac{C_n}{n} $ is constant. Equivalently we conjecture that $ \rho' $ is constant, and numerically we have \begin{align} \frac{C_n}{n} = 1- \rho' \approx 0.25 , \quad \rho' \approx 0.75 . \label{eq:c-01-lf} \end{align} Our simulations for different values of $ p_0 $ (see Appendix) indicate that the cluster density $ \rho' $ is also constant for $ p_0 $. Then the other quantities should be \begin{align} \frac{S_n}{n} & = (2 p_0 - 1) \frac{ \rho' (1-\rho') }{ 2-\rho' } \approx 0.15 (2p_0-1) , \\ J & = \rho (2p_0-1) \frac{ \rho' (1-\rho') }{ 2-\rho' } \approx 0.15 (2p_0-1) \rho , \\ \langle \tau_i \tau_{i+1} \rangle & = \rho \rho' \approx 0.75 \rho . \label{eq:tt-01-lf} \end{align} These expressions fit very well the simulation results in the condensed phase, see Fig. \ref{fig:01}. \subsection{Phase transition} In the case of $ p_+= 0 , \ p_-= 1 $, the cluster density $ \rho' $ is observed to be constant \eqref{eq:c-01-lf}. Apparently the global density $ \rho $ cannot exceed $ \rho' $, and one may expect that $ \rho' $ gives the transition point. In other words one could guess that a second order phase transition occurs just at the intersection of the dashed line and the solid line in each panel of Fig.~\ref{fig:01}. However, this naive consideration is wrong, as we closely see the insets. The actual transition point is lower than $ \rho' $ and it depends on the initial conditions. Furthermore, we find that the phase transitions are of first order. \section{Discussions}\label{sec:discussions} In this work, we introduced a system of interacting elephant random walks on a ring. We imposed the exclusion principle, i.e. each site can be occupied by at most one particle. Therefore our model contains the exclusion process as a special case. We performed Monte Carlo simulations, and found that interacting elephants exhibit two different behaviors. One is the uniform phase, where particles are uniformly distributed over the chain, and the other is the condensed phase, where a cluster is formed. For the former case, the current is easily predicted by neglecting correlations, to which we refer as the global mean-field theory. For the latter case, we introduced a local mean-field theory, assuming that the particles are uniformly distributed inside the cluster. The condensation phenomenon of our system is induced by a different mechanism from another non-Markovian exclusion process \cite{bib:CB}. The authors of \cite{bib:CB} imposed a time series of particle jumps obeying a power-law tail $ \tau^{-\gamma} $ for each particle, which induces a condensation. When the waiting time between an attempt of jump of a particle and the next attempt is very long, a long queue is formed before this particle, i.e. a \textit{static} cluster appears. Therefore condensed and uniform states in their model are distinguished by tuning the exponent $\gamma$ (see also \cite{bib:KHG}). Contrarily, in our system the time series of particle jumps is given by exponential distribution as in the case of the standard exclusion process, but the direction depends on the history. The behavior of our model is determined by the directionality parameters $ p_\pm ,p_0$ and the density $ \rho $. We also mention a zero-range process with memory effect in one dimension \cite{bib:HMS}, where each site is allowed to be occupied by more than one particle. This model exhibits another type of condensation, i.e. two sites are occupied by particles but the rest of the sites are empty, and the group of particles moves like a ``slinky''. Our simulations indicate that the phase transition is of first order. It is also remarkable that the initial configuration affects the phase in the long time limit. Our local mean-field theory contains an extra parameter $ \rho' $ which is the particle concentration in the cluster. So far we have obtained the value of $ \rho' $ only numerically and by performing fitting. We also found that the phase transition point is not given by $ \rho=\rho' $. Clearly, a more theoretical study of the condensed phase and of the phase transition is deserved to be done. \section*{Acknowledgements} This work was supported by the grant AAP MASHE from the Savoie Mont Blanc University. \section*{Appendix} \begin{figure} [h] \begin{center} \begin{align*} \begin{matrix} \textbf{(a)} & \textbf{(b)} & \textbf{(c)} & \textbf{(d)} \\ \includegraphics[width=40mm]{fig-pp0-pm1-cnn-appendix.pdf} & \includegraphics[width=40mm]{fig-pp0-pm1-snn-appendix.pdf} & \includegraphics[width=40mm]{fig-pp0-pm1-flw-appendix.pdf} & \includegraphics[width=40mm]{fig-pp0-pm1-tautau-appendix.pdf} \end{matrix} \end{align*} \caption{\label{fig:01-app} Simulation results of (a) the quantity $ \frac{C_n}{n} $, (b) the quantity $ \frac{S_n}{n} $, (c) the current, and (d) the correlation $ \langle \tau_i \tau_{i+1} \rangle $ vs $ p_0 $ for $ p_+ = 0$, $p_- = 1 $. We used a chain with $L=4000$ sites, and imposed the step initial condition. According to the global density $ \rho $, different plot markers are used. The global mean-field predictions (dashed lines) in the four panels are $ \frac{C_n}{n} = 1-\rho $, Eq.~\eqref{eq:01-snn-mf}, Eq.~\eqref{eq:01-J-mf}, and $ \langle \tau_i \tau_{i+1} \rangle = \rho^2 $ for $ \rho > \rho^* \approx 0.73 $. The local mean-field predictions \eqref{eq:c-01-lf}--\eqref{eq:tt-01-lf} for $ \rho < \rho^* $ are shown by the solid lines. } \end{center} \end{figure} \noindent We plot simulation results for $ p_+ = 0$, $p_- = 1 $ as functions of $ p_0 $ in Fig.~\ref{fig:01-app}. Since we have the symmetries \begin{align} C_n/n \big|_{ p_0 \to 1-p_0 } = C_n/n, \quad S_n/n \big|_{ p_0 \to 1-p_0 } = -S_n/n, \quad J \big|_{ p_0 \to 1-p_0 } = -J, \quad \langle \tau_i\tau_{i+1}\rangle \big|_{ p_0 \to 1-p_0 } = \langle \tau_i\tau_{i+1}\rangle , \end{align} we only show the data in the range $ 0 \le p_0\le 0.5 $. Figure~\ref{fig:01-app}~(a) indicates that the cluster density $ \rho' $ is always $ 1-C_n/n\approx 0.75 $ in the condensed phase ($ \rho < \rho^* \approx 0.73 $), except when $ p_0 $ is near $0.5$. The correlation function (d) is also almost constant, but the quantities $ S_n/n $ (b) and $ J $ (c) are linear in $ p_0 $. The point $ p_0=0.5 $ is special: independently from the global density $ \rho $, the model converges to the uniform phase. \clearpage
\section{Introduction} The term Weyl fermions refers to a pair of relativistic fermions with different chiralities or handness. Although these conceptual fermions were predicted in a framework of high energy physics, Weyl fermions are believed to be realized in the solid state, i.e., Weyl semimetals type-I and type-II.\cite{Hasan2017,Chang2017,Yan2017} In these two types, broken symmetry of either parity or time-reversal reduces Dirac fermions to Weyl fermions. There are some cases where both symmetries are simultaneously broken.\cite{Liu2014a,Neupane2014} Although application of magnetic field breaks time-reversal symmetry in an inversion-symmetry broken Weyl semimetal, in the case of CeAlGe and PrAlGe, both symmetries break due to noncentrosymmetric crystal structure and intrinsic magnetic order of the \textit{f} magnetic moment.\cite{Chang2018} Thus, CeAlGe and PrAlGe provide a new route to generating type-II Weyl fermions. CeAlGe was theoretically predicted to order ferromagnetically with the easy axis along the crystallographic \textit{a}- axis.\cite{Chang2018} To the best of our knowledge only limited measurements on polycrystalline samples of CeAlGe are reported. CeAlGe was found to order antiferromagnetically (AFM) below 5~K and form in a tetragonal structure of I4$_1$md (noncentrosymmetric)\cite{Zhao1990,Dhar1992,Dhar1996} space group and, more recently, to be a soft ferromagnet with Curie temperature of 5.6~K with the tetragonal unit cell of I4$_1$/amd (centrosymmetric) space group\cite{Flandorfer1998} [here CeAlGe is a variant of binary substitution Ce(Al$_{0.5}$Ge$_{0.5}$)$_2$]. While the former structure provides a potential route for the realization of nontrivial topology in this system, the latter structure does not. Thus, it is important to address the issue of the space group in this system especially since the easily accessible and widely used powder x-ray diffraction measurements are not able to distinguish between the two. In order to address the nature of the magnetic order, determine the intrinsic crystal structure, and study anisotropic properties of CeAlGe, single crystals were grown. Single crystal x-ray measurements were performed, showing that CeAlGe forms in the tetragonal crystal structure of I4$_1$md, noncentrosymmetric, space group, confirming the possibility of type-II Weyl fermions in this system. According to our measurements, CeAlGe orders antiferromagnetically below 5~K, and the \textit{a}-axis is the easy axis indicating that the moment lies in the tetragonal \textit{ab}-plane below 7~K and 50~kOe. We observe a spin-flop transition for \textbf{H}$\|$\textbf{a} in the $M(H)$ data with the saturation moment reaching about 0.8~$\mu_B$ at 140~kOe and 1.8~K (for comparison, saturated moment for \textbf{H}$\|$\textbf{c} is about 1.2~$\mu_B$). We report detailed temperature- and field-dependent magnetization, resistivity, Hall effect, and heat capacity measurements which allowed us to construct tentative \textit{T-H} phase diagrams for \textbf{H}$\|$\textbf{a} and \textbf{H}$\|$\textbf{c}. \section{Experimental details} \begin{figure*}[th] \centering \includegraphics[width=1\linewidth]{CeAlGeCX.eps} \caption{\footnotesize (color online) (a) Schematic presentation of nonsentrosymmetric, I4$_1$md, LaAlSi type, and centrosymmetric I4$_1$/amd, $\alpha$-ThSi$_2$ type, space groups of CeAlGe. Ordered structure in I4$_1$md with Ge (blue) Al (yellow) is shown on the left. Disordered structure in I4$_1$/amd with Al and Ge mixed 50:50 in each position (green balls) is and shown on the right. Respective unit cells are shown with dashed lines. The center of symmetry (inversion center, shown by black stars), if placed in the middle of Ge-Al bond of I4$_1$/md space group, will transform blue Ge into yellow Al giving green mixture Ge/Al and centrosymmetric I4$_1$/amd space group. (b) Powder x-ray diffraction pattern of ground CeAlGe single crystals. The few low-intensity peaks marked with lines are due to the Al flux.} \label{XRD} \end{figure*} Single crystals were grown by the high temperature Al self-flux method.\cite{Canfield1992,Canfield2010,Canfield2001} Chunks of Ce/La (99.8$\%$, AlfaAesar), shots of Ge (99.999$\%$ metals basis, AlfaAesar), and pieces of Al (99.999$\%$ metal basis, AlfaAesar) in the ratio of 10:10:80 were placed in the Canfield alumina crucible set with a decanting frit (LSP ceramics), sealed in the quartz ampule under partial Ar pressure, heated to 1150~$^o$C, held at that temperature for 2~h, cooled down at 5~deg/h to 750~$^o$C with subsequent decanting of the excess Al with the help of a centrifuge. Note that samples grown using quartz wool as a strainer (rather than a ceramic frit) show different magnetic properties, suspected to be a result of small Si substitution. Therefore, all measurements presented in this work are for single crystals grown using quartz wool-free Canfield crucible sets with the frits. LaAlGe single crystals were grown as a non-\textit{f} local moment bearing analog. Single crystals grow as large plates with a mirror-like surface and the \textit{c}-axis perpendicular to the plates and naturally formed edges of the plates being tetragonal \textit{a} and \textit{b} axes. All measurements presented for LaAlGe and CeAlGe were done on the samples from the same batch, respectively. A Rigaku MiniFlex diffractometer (Cu radiation) with DeTEX detector was used to collect powder x-ray diffraction patterns to confirm single phase, apart from the Al flux, present. Single crystal x-ray intensity data were measured at 250~K on a Bruker APEX-II CCD system equipped with a graphite monochromator and a MoK$\alpha$ sealed tube (wavelength $\lambda$ = 0.71070~$\mathrm{\AA}$). The structure was solved and refined using the Bruker SHELXTL software package. Temperature- and field-dependent resistivity, Hall effect, magnetization, and specific heat measurements were performed in the 300 to 1.8~K temperature range and magnetic field up to 140~kOe in a commercial cryostat. Resistivity measurements were made in a standard four-probe geometry ($I$ = 1~mA). For resistivity and Hall effect measurements, the samples were polished and shaped with care to not have any Al inclusions. Crystals are rather brittle and extreme caution is needed when polishing. Electrical contact to the samples was made with Au wires attached to the samples using EPOTEK silver epoxy and subsequent cure at 100~$^0$C. Electrical current was directed along a [010] direction of the tetragonal \textit{ab}-plane, naturally formed edge of the plates. We used the cross-sectional area of the samples and the distance between the midpoint of two voltage contacts to calculate the resistivity of the samples. The magnetization was measured using a vibrating sample magnetometer (VSM). The samples were mounted using GE varnish. The contribution of the GE varnish to the $M(T)/H$ and $M(H)$ data was assumed to be negligible. The dynamic susceptibility was measured using AC option of Quantum Design Magnetic Properties Measurement System (MPMS$\textsuperscript{\textregistered}$3). \begin{table*} \caption{\label{tabl1} CeAlGe and LaAlGe crystallographic data determined through single-crystal x-ray diffraction. All data were collected at 250~K on Bruker APEX-II CCD system equipped with a graphite monochromator and a MoK$\alpha$ sealed tube (wavelength $\lambda$~=~0.71070~$\mathrm{\AA}$). The refinement results are given for CeAlGe in two different reported structures for comparison.} \footnotesize\rm \begin{ruledtabular} \begin{tabular}{llll} Chemical formula&CeAlGe&CeAl$_{1.05}$Ge$_{0.95}$&LaAlGe\\ Space group&I4$_1$md (No. 109)&I4$_1$/amd (No. 141)&I4$_1$md (No. 109)\\ Structure type&LaPtSi&$\alpha$-ThSi$_2$&LaPtSi\\ \hline $a$($\mathrm{\AA}$)&4.2920(2)&4.2920(2)&4.3337(2)\\ $b$($\mathrm{\AA}$)&4.2920(2)&4.2920(2)&4.3337(2)\\ $c$($\mathrm{\AA}$)&14.7496(4)&14.7496(4)&14.8097(6) \\ $V^3$($\mathrm{\AA}^3)$&271.71(3)&271.71(3)&278.14(3) \\ Z&4&4&4\\ Reflections collected&3197 [R$_{int}$=0.0202]&3349 [R$_{int}$=0.0344]&3415 [R$_{int}$=0.0320]\\ Data/restraints/parameters&380/1/12&207/0/9&404/1/15\\ Goodness-of-fit on F$^2$&1.260&1.326&1.000 \\ Final R indexes [I$>$=2$\sigma$(I)]&R$_1$=0.0175, wR$_2$=0.0457 &R$_1$=0.0245, wR$_2$=0.0648& R$_1$=0.0178, wR$_2$=0.0419 \\ Final R indexes [all data]& R$_1$=0.0207, wR$_2$=0.0486 &R$_1$=0.0258, wR$_2$=0.0668&R$_1$=0.0209, wR$_2$=0.0437 \\ Largest diff. peak/hole / e${\mathrm{\AA}^{-3}}$ &1.06/-2.04& 2.822/-3.452&1.51/-1.35 \\ \textit{Flack parameter}&0.02(4)&&0.01(4)\\\ \end{tabular} \end{ruledtabular} \end{table*} \begin{table} \caption{\label{tabl2} Fractional Atomic Coordinates and Equivalent Isotropic Displacement Parameters ($\AA^2$) for CeAlGe and LaAlGe. U$_{eq}$ is defined as 1/3 of of the trace of the orthogonalised U$_{IJ}$ tensor.} \footnotesize\rm \begin{ruledtabular} \begin{tabular}{llllll} \multicolumn{6}{c}{Space group I4$_1$md}\\ \multicolumn{6}{c}{Chemical formula CeAlGe}\\ Atom&\textit{x}&\textit{y}&\textit{z}&{U(eq)}&Occ.\\ Ce&0.5&0.5&0.49969(11)&0.00598(17)&1.0\\ Al&0&0&0.5829(4)&0.00879(18)&1.0\\ Ge&0&0&0.41697(2)&0.00879(18)&1.0\\ \hline \multicolumn{6}{c}{Space group I4$_1$/amd}\\ \multicolumn{6}{c}{Chemical formula CeAl$_{1.05}$Ge$_{0.95}$}\\ Atom&\textit{x}&\textit{y}&\textit{z}&{U(eq)}&Occ.\\ Ce&0.5&0.75&0.375&0.0070(3)&1.0\\ Al&0.5&0.25&0.20773(7)&0.0093(5)&0.522(9)\\ Ge&0.5&0.25&0.20773(7)&0.0093(5)&0.478(9)\\ \hline\hline \multicolumn{6}{c}{Space group I4$_1$md}\\ \multicolumn{6}{c}{Chemical formula LaAlGe}\\ Atom&\textit{x}&\textit{y}&\textit{z}&{U(eq)}&Occ.\\ La&0.5&0.5&0.49999(12)&0.00738(15)&1.0\\ Al&0&0&0.4168(4)&0.0128(16)&1.0\\ Ge&0&0&0.58304(2)&0.0103(6)&1.0\\\ \end{tabular} \end{ruledtabular} \end{table} \section{Results} \begin{figure}[th] \centering \includegraphics[width=1\linewidth]{pMc.eps} \caption{\footnotesize (color online) (a) Temperature-dependent inverse magnetization of CeAlGe for \textbf{H}$\|$\textbf{a} and \textbf{H}$\|$\textbf{c}, together with the data for the polycrystalline average. The inset shows low-temperature part of the $M(T)/H$ data. (b) and (c) Zero-field cooled (ZFC) and field-cooled (FC) data for \textbf{H}$\|$\textbf{a} and \textbf{H}$\|$\textbf{c}, respectively.} \label{MH} \end{figure} \begin{figure*}[th] \centering \includegraphics[width=1\linewidth]{pMcc.eps} \caption{\footnotesize (color online) (a) and (b) temperature-dependent magnetization of CeAlGe at constant magnetic fields for \textbf{H}$\|$\textbf{a} and \textbf{H}$\|$\textbf{c}, respectively. (c) and (d) Field-dependent magnetization of CeAlGe single crystal for \textbf{H}$\|\textbf{a}$ and \textbf{H}$\|$\textbf{c}, respectively.} \label{MH1} \end{figure*} \subsection{Crystal structure} A schematic comparison of noncentrosymmetric, I4$_1$md, LaAlSi type, and centrosymmetric I4$_1$/amd, $\alpha$-ThSi$_2$ type, space groups is shown in Fig.~\ref{XRD}(a) with respective unit cells shown in dashed lines. For the ordered structure, I4$_1$md, Ge and Al atoms are shown in blue and yellow, respectively, and for the disordered structure, I4$_1$/amd, Al and Ge are mixed 50:50 in each position and are shown in green. Apart from the color of the Ge and Al atoms, if one looks at the extended crystal structure, they are the same. The center of symmetry (inversion center), which if placed in the middle of Ge-Al bond (as shown by black stars) will transform blue Ge into yellow Al giving green mixture Ge/Al and centrosymmetric group. As a consequence, the powder x-ray pattern for both crystal structures is identical save for the slight difference in intensities for some of the reflections and one cannot determine which crystal structure it is based on the powder x-ray pattern alone. Thus, in Fig.~\ref{XRD}(b), we show the powder diffraction pattern for CeAlGe for the purpose of confirming that there are no other secondary phases, contribution of Al flux excluded. In order to be able to resolve between the two space groups, we performed single crystal x-ray diffraction. The results of the CeAlGe and non-\textit{f} moment bearing LaAlGe single crystal x-ray refinement are given in Table~\ref{tabl1} and the atomic position for all atoms are given in Table~\ref{tabl2}. First, we would like to address the crystal structure. Final R indexes and goodness of fit on $R^2$ are small numbers which indicate that both crystal structures are likely. However, to distinguish between the two and confirm noncentrosymmetric structure, we looked at the Flack parameter\cite{Flack1983} that allows for an estimation of the absolute configuration of a structural model and is only defined for noncentrosymmetric unit cell. If the value of the Flack parameter is near 0 with small uncertainty, which is the case here, the absolute structure determined by single crystal structure refinement is likely correct, indicating that CeAlGe forms in noncentrosymmetric crystal structure, I4$_1$md. The lattice parameters determined for LaAlGe are consistent with the ones reported in the literature.\cite{Guloy1991} The lattice parameters of CeAlGe determined here are larger than the ones found in the literature\cite{Flandorfer1998,Dhar1996} for polycrystalline samples. We believe that Si doping from quartz wool used for the growth may be a culprit that led to the smaller reported lattice parameters of the polycrystalline samples (the lattice parameters of CeAlSi are smaller\cite{Bobev2005} than those of CeAlGe). \subsection{Magnetization} Figure~\ref{MH}(a) shows the temperature-dependent $H/M(T)$ data for \textbf{H}$\|$\textbf{a}, \textbf{H}$\|$\textbf{c} and a polycrystalline average calculated as (2$\chi_a$+$\chi_c$)/3. The N\'{e}el temperature, $T_N$, is seen as a maximum in the $M(T)/H$ data shown in the inset to Fig.~\ref{MH}(a). The temperature-dependent moment is highly anisotropic, with the $M(T)/H$ (\textbf{H}$\|$\textbf{a}) being about 10 time larger than that of $M(T)/H$ (\textbf{H}$\|$\textbf{c}) at the magnetic ordering temperature. The effective moment estimated from the Curie-Weiss fit of the $M(T)/H$ data of the polycrystalline average above 150~K results in $\mu_{eff}$ = 2.56~$\mu_B$, indicating Ce$^{3+}$, and paramagnetic Weiss temperature of $-$3.6~K, indicating dominant antiferromagnetic interactions. Figures~\ref{MH}(b) and (c) show zero-field cooled (ZFC) and field-cooled (FC) $M(T)/H$ data at 100~Oe for \textbf{H}$\|$\textbf{a} and \textbf{H}$\|$\textbf{c}, respectively. For the $M(T)/H$ (\textbf{H}$\|$\textbf{a}) data, there is a very small hysteresis below $\sim$~2.5~K. As for the $M(T)/H$ (\textbf{H}$\|$\textbf{c}) data, ZFC and FC data show different behavior in the ordered state, which may be due to the domain reorientation. \begin{figure}[tb] \centering \includegraphics[width=1\linewidth]{pC.eps} \caption{\footnotesize (color online) (a) Temperature-dependent heat capacity data of CeAlGe and LaAlGe single crystals. The inset shows $C_m(T)T^2$ vs $T^{-1}$ data for CeAlGe on a semi-log scale. A line drawn through the low-temperature data points shows the low-temperature fit for the estimate of the phenomenological gap $\Delta$ in the magnon excitation spectrum. The fit is based on the phenomenological form of $C_m(T)\approx (1/T^2)e^{-\Delta/T}$. $\Delta$ was found to be 9.11~$\pm$~0.09~K. (b) Temperature-dependent heat capacity of CeAlGe single crystal at constant magnetic fields for \textbf{H}$\|$\textbf{c}. } \label{C} \end{figure} \begin{figure*}[th] \centering \includegraphics[width=1\linewidth]{pR.eps} \caption{\footnotesize (color online) (a) Temperature-dependent resistivity of CeAlGe and LaAlGe single crystals. The inset shows the feature associated with the magnetic order below 5~K in the resistivity data. (b) Field-dependent Hall resistivity of CeAlGe single crystal at constant temperatures for \textbf{H}$\|$\textbf{c}. Inset shows the Hall resistivity at 2 and 3~K, with the features just below 20~kOe, which are associated with the suppression of the magnetic order. (c) Transverse magnetoresistivity of LaAlGe single crystal at constant temperatures, \textbf{H}$\|$\textbf{c}. (d) Transverse magnetoresistivity of CeAlGe single crystal at constant temperatures for \textbf{H}$\|$\textbf{a} and \textbf{H}$\|$\textbf{c} (only the data collected at 2~K).} \label{R} \end{figure*} The features associated with the magnetic order are suppressed by 3~kOe and 40~kOe for magnetic field applied along the \textit{a} and \textit{c}-axes, Figs.~\ref{MH1}(a) and (b), respectively. The effect of the field is more drastic for \textbf{H}$\|$\textbf{a}, where, as the magnetic field is increased beyond 3 kOe, the $M(T)/H$ data saturate at low temperature and the magnitude is substantially reduced. At the highest field of 140~kOe, the $M(T)/H$ data for both directions are nearly isotropic. Field-dependent magnetization $M(H)$ data at constant temperatures for the field along the \textit{a} and \textit{c} axes are shown in Figs.~\ref{MH1}(c) and (d), respectively. At the lowest temperature of 1.8~K, for \textbf{H}$\|$\textbf{a}, a clear sharp spin-flop transition to a less than 1~$\mu_B$ saturation moment is observed below 2.5~kOe. After this transition, the moment remains almost constant up to 140~kOe, indicating that higher magnitude field is necessary to observe one or more metamagnetic transitions to reach a value of about 2.14~$\mu_B$ expected for the free-ion Ce$^{3+}$ full saturated moment. As the temperature is increased, the region of the canted phase of the spin-flop transition becomes smaller and is almost indistinguishable at 5~K. The inset to Fig.~\ref{MH1}(c) shows a hysteresis curve, indicating that below 2.5~kOe, the transition is of the first order. This also explains the different behavior in the ZFC and FC data below 2.5~K in Fig.~\ref{MH}(b). The metamagnetic-like transition, associated with the suppression of the magnetic order is also observed in the $M(H)$ data for \textbf{H}$\|$\textbf{c}, Fig.~\ref{MH1}(d). As in the case of \textit{M(H)} data for \textbf{H}$\|$\textbf{a}, the magnetic moment in the \textit{M(H)} data for \textbf{H}$\|$\textbf{c} reaches a little over 1~$\mu_B$ by 140~kOe. There appear to be a very small hysteresis in the \textit{M(H)} curve, \textbf{H}$\|$\textbf{c}, shown in the inset to Fig.~\ref{MH1}(d), which accounts for ZFC and FC data shown in Fig.~\ref{MH}(c). \subsection{Heat capacity} The temperature-dependent heat capacity data for CeAlGe and non-local moment bearing LaAlGe single crystals are shown in Fig.~\ref{C}(a). The linear fit of \textit{C(T)/T} vs. $T^2$ below 10~K of the heat capacity data of LaAlGe (not shown) results in a very small electronic specific heat coefficient $\gamma$~=~0.93~mJ/(mol~K$^2$) and Debye temperature $\Theta_d$~=~436~K. The electronic specific heat coefficient of CeAlGe is much harder to obtain from the linear fit of the heat capacity data due to the magnetic order feature. As the best estimate of the electronic specific heat coefficient, we take the lowest value of the $C_p(T)/T$ above the magnetic order, which is 50~mJ/(mol~K$^2$). Low $\gamma$ values may be indicative of low carrier concentration, as is confirmed by the Hall measurement discussed below. The estimated magnetic entropy associated with the magnetic transition is about 0.75$R$ln2 indicating a doublet ground state. For the conventional collinear AFM with single-ion anisotropy, the low-temperature electronic part of the $C_p(T)$ data can be presented as $C_m(T)\approx (1/T^2)e^{-\Delta/T}$, where $\Delta$ is the phenomenological gap. The fit of the low-temperature of $C_m(T)T^2$ vs $T^{-1}$ data is shown in the inset to Fig.~\ref{C}(a). The gap was estimated to be 9.11~$\pm$~0.09~K. Temperature-dependent heat capacity data for CeAlGe single crystal for the magnetic field applied along the \textit{c}-axis is shown in Fig.~\ref{C}(b). Once the magnetic field is increased the magnetic order is suppressed and, starting from 20~kOe, a broad maximum, a Schottky-type anomaly, is observed. This maximum shifts to higher temperature as the field is increased. Such behavior of the heat capacity data was also observed in CeGe$_{1.76}$\cite{Budko2014} and CeAl$_2$\cite{Bredl1978} and was associated with Zeeman splitting of a ground state doublet. \subsection{Transport} Temperature-dependent resistivity data at $H$~=~0 for CeAlGe and LaAlGe are shown in Fig.~\ref{R}(a). The inset shows the enlarged low-temperature part of the data with the maximum representing the magnetic transition. The residual-resistivity-ratio of CeAlGe and LaAlGe single crystals is $\sim$~2, which can indicate either a disordered system or a system with low carrier concentration. We believe that the latter is the case here since the carrier concentration estimated from the Hall resistivity, shown in Fig.~\ref{R}(b), is 1.44~$\times$~10$^{20}$~cm$^{-3}$ (independent of temperature) which is 2 orders of magnitude smaller than that for copper, and comparable to that of graphite, arsenic and YbPtBi\cite{Hundley1997}, indicating that CeAlGe is a semimetal. The concentration of carriers, in this case holes because Hall effect is positive for CeAlGe, was estimated using one-band model with effective carrier concentration, $R_H=1/(e\,p_\textmd{\tiny eff})$. The Hall coefficient of CeAlGe is almost temperature independent up to 300~K. The inset to Fig.~\ref{R}(b) shows the features in the field-dependent Hall resistivity at 2 and 3~K associated with the magnetic order. \begin{figure}[t] \centering \includegraphics[width=1\linewidth]{AC7.eps} \caption{\footnotesize (color online) Temperature-dependent $\chi'$ (closed symbols) and $\chi''$ (open symbols) for CeAlGe single crystal. (a) \textbf{H$_{ac}$}$\|$\textbf{a} and (b) \textbf{H$_{ac}$}$\|$\textbf{c} measured with varied $H_{ac}$.} \label{AC} \end{figure} \begin{figure}[t] \centering \includegraphics[width=1\linewidth]{PD.eps} \caption{\footnotesize (color online) \textit{T}-\textit{H} phase diagrams for CeAlGe single crystals (a) \textbf{H}$\|\textbf{a}$ and (b) \textbf{H}$\|\textbf{c}$. Different phases are marked with roman numerals. Horizontal dashed lines indicate the temperature limit of our measurements. a) Phase III represents canted moment phase of the spin-flop transition. Phase IV represents a spin-flop to a partially saturated moment ($<$~1~$\mu_B$) phase.} \label{PD} \end{figure} As is shown in Fig.~\ref{R}(c), the magnetoresistance of LaAlGe is positive reflecting that of a normal metal. There is no magnetic field effect on the resistivity of LaAlGe up to 5 K and 140~kOe. On the other hand, application of the magnetic field to CeAlGe has a profound effect, Fig.~\ref{R}(d). The magnetoresistance of CeAlGe is negative on the whole field range measured up to 12~K. The absolute value of the magnetoresistance decreases as the temperature is increased and it is almost zero at 20~K. The spin-flop and metamagnetic transitions in the $\rho(H)$ data collected at $T$~=~1.8~K (\textbf{H}$\|\textbf{a}$) and 2~K (\textbf{H}$\|\textbf{c}$) are consistent with the features associated with the spin-flop and metamagnetic transitions observed at the similar critical fields in the $M(H)$ data presented in Fig.~\ref{MH1}(c) and (d), respectively. \section{Discussion} CeAlGe was previously reported to form in the tetragonal crystal structure with two different space groups: noncentrosymmetric I4$_1$md \cite{Zhao1990,Dhar1992,Dhar1996} and centrosymmetric I4$_1$/amd\cite{Flandorfer1998}. While the former structure will provide a potential route for the realization of nontrivial topology in this system, the latter structure will not. Thus, it is important to address the issue of the space group in this system especially since the easily accessible and widely used powder x-ray diffraction measurements are not able to distinguish between the two. With the help of single crystal x-ray diffraction, we were able to determine that CeAlGe single crystals most likely form in the noncentrosymmetric I$4_1$md space group. We also mentioned above contradictory reports of both AFM and FM magnetic ground states in CeAlGe. For example, Ref.~\onlinecite{Flandorfer1998} suggests that CeAlGe forms in $\alpha$-ThSi$_2$-type structure (I4$_1$/amd space group) and the compound is suggested to be a soft ferromagnet with ordering temperature $T_C$~=~5.6~K, which is higher than the ordering temperature reported here, and the lattice parameters are smaller than what we observe in our work. This suggests Si sunstitution, since $T_C$ of CeAlSi is 9.6~K and the lattice parameters are smaller\cite{Bobev2005} than those of CeAlGe. The theoretical work also predicted CeAlGe to adopt a FM ground state.\cite{Chang2018} Our ZFC and FC magnetization data do not support FM order, but rather AFM order at $\sim$5~K. We did not observe hysteresis characteristic of a soft or hard FM in the \textit{M(H)} curves for both field orientations. The hysteresis in the \textit{M(H)} curve at 1.8~K for \textbf{H}$\|$\textbf{a}, Fig.~\ref{MH1}(c) is perhaps due to the reorientation of the domains as the system goes through the first-order spin-flop transition. We also did not observe anomalous Hall effect that is a signature of ferromagnets. The Arrot plot, $M^2$ versus \textit{H/M}, that provides an easy way of determining the presence of ferromagnetic order, does not hold. To further confirm the type of the magnetic order, we measured AC susceptibility, shown in Fig.~\ref{AC}. Just like DC temperature-dependent magnetization shown in Fig.~\ref{MH}, $\chi'$ (the real part of the AC susceptibility) and $\chi''$ (the imaginary part of the AC susceptibility) show large anisotropy, with $\chi'$ and $\chi''$ for magnetic field along the \textit{a}-axis being larger than those for the field along the \textit{c}-axis. $\chi'$ [\textbf{H}$\|$\textbf{a}, Fig.~\ref{AC}(a)] is slightly dependent on the AC drive field, while $\chi{''}$ shows much stronger AC-drive field dependent maximum. (Note that the absolute value of $\chi{''}$ is rather small.) These observations are consistent with the \textit{ferri}magnetic nature of the spin-flop transition.\cite{Balanda2013} On the contrary, the $\chi{'}$ for \textbf{H$_{ac}$}$\|$\textit{c} does not depend on $H_{ac}$ and $\chi{''}$ is almost zero, confirming AFM order. The \textit{T-H} phase diagrams for \textbf{H}$\|$\textbf{a} and \textbf{H}$\|$\textbf{c} are shown in Figs.~\ref{PD} (a) and (b), respectively, and indicate that relatively small magnetic field on the order of 3 (\textbf{H}$\|$\textbf{a}) and 30~kOe (\textbf{H}$\|$\textbf{c}) is necessary to suppress the magnetic order. While the \textit{T-H} phase diagram for \textbf{H}$\|$\textbf{c} is relatively simple, the \textit{T-H} phase diagram for \textbf{H}$\|$\textbf{a} shows multiple phases due to the spin-flop transition (measurements below 1.8~K are necessary to confirm and delineate the phase II in more detail). If one naively assumes that the moment configuration in phase I is $\uparrow\downarrow\uparrow\downarrow$, then phase III represents canted moments $\uparrow\downarrow\nearrow\swarrow$ of the spin-flop transition and phase IV is then $\uparrow\downarrow\uparrow\uparrow$ according to our \textit{M(H)} data Fig. ~\ref{MH1}(c). Angular-dependent magnetization can shed more light on how the moment is directed/distributed in the tetragonal \textit{ab} plane of the noncentrosymmetric CeAlGe. Of course neutron measurements would be very helpful in assessing the magnetic structure and moment configuration of CeAlGe in zero and applied magnetic fields. It would also be interesting to further study quantum criticality for (\textbf{H}$\|$\textbf{c}), either with application of magnetic field or pressure. \section{Conclusion} In conclusion, we synthesized the first single crystals of CeAlGe and confirmed the noncentrosymmetric crystal structure required for type-II Weyl semimetal prediction. We determined that the compound assumes an AFM ground state below $\sim$~5~K. The magnetization is highly anisotropic, with \textit{a}-axis being an easy axis indicating that the magnetic moment lies in the tetragonal \textit{ab} plane. We determined, from the fit of the temperature-dependent heat capacity, the small gap in the magnon density of states to be 9.11~$\pm$~0.09~K. The small carrier density of 1.44~$\times$~10$^{20}$~cm$^{-3}$ indicates that CeAlGe is a semimetal. \section{Acknowledgment} This work was supported by the Gordon and Betty Moore Foundation's EPiQS Initiative through grant no. GBMF4419.
\chapter{Analysing Multiple Epidemic Data Sources} \section{Introduction}\label{intro} \begin{displayquote} ``A catalogue of the number of deaths induced by the major epidemics of historical time is staggering, and dwarfs the total deaths on all battlefields.'' \cite{Anderson1991} \end{displayquote} This quote sets the problem of infectious diseases in perspective. Although major historical threats have been defeated \cite{Heesterbeek2015}, new emerging ones continue to challenge humans. It is not surprising that increasing effort has been made by policy makers to assess and anticipate the consequence of epidemics. Evidence-based knowledge of disease burden, including prevalence, incidence, severity, and transmission, in different population strata, in different locations and, if feasible, in real time, is becoming progressively key to the planning and evaluation of public health policies \cite{Heesterbeek2015}. Direct observation of a disease process is hardly ever possible. However, retrospective and prospective estimation of the key aspects of burden listed above is feasible through the use of indirect information collected in administrative registries. The previous chapters in this handbook (and the rich literature that exists, e.g. \cite{Heesterbeek2015,Birrell2017} and references therein) provide plenty of examples of how surveillance information, together with statistical models, can be used to reconstruct the disease process underlying the pattern of the observed data, infer the unobserved (latent) characteristics of the epidemic and forecast its evolution. Here we focus, in particular, on statistical inference that makes simultaneous use of multiple data sources, including different streams of surveillance data, ad hoc studies and expert opinion. This `evidence synthesis' approach is not new in medical statistics. Meta-analysis and network meta-analysis are well established approaches to combine data from studies of similar design, typically clinical trials \cite{Borenstein2009}. The idea has been generalised in the areas of medical decision-making \cite{Eddy1992}, technology assessment \cite{Spiegelhalter2004,Welton2012} and epidemiology (e.g. \cite{AdesSutton2006}) to assimilate data from sources of different types and/or studies of different designs and is becoming popular in other scientific fields, as modern technologies enable the collection and storage of ever increasing amounts of information (e.g. \cite{Wheldon2015,Clark2017}). For infectious disease, in the last ten years there has been a proliferation of papers employing multiple sources of information to reconstruct characteristics of epidemics of blood borne and respiratory diseases, including estimation of prevalence (e.g. HIV \cite{DeAngelis2014a}, HCV \cite{Harris2012,McDonald2014}, campylobacteriosis \cite{Albert2011}), severity (e.g. \cite{Presanis2014,Shubin2014}), incidence (e.g. toxoplasmosis \cite{WeltonAdes2005}, influenza \cite{McDonald2014a} and pertussis \cite{McDonald2015}) and transmission (e.g. influenza \cite{Birrell2011,Dorigatti2013}). The use of multiple data sources poses a number of statistical and computational challenges: the combination of various sources, most likely affected by selection and informative observation biases and heterogeneous in type, relevance and granularity, leads to probabilistic models with complex structures, difficult to build and fit and challenging to criticize \cite{DeAngelis2014}. In this chapter, we will use motivating case studies of influenza to introduce the evidence synthesis setting in infectious diseases, illustrate the building and fitting of relevant models, and highlight the opportunities offered and the challenges posed by the multiplicity of sources. The models we will concentrate on are typically Bayesian, as this framework offers a natural setup for the synthesis of information. The chapter is organised as follows: in Section \ref{sec:egs}, we describe our motivating examples; in Section \ref{sec:evsynIntro}, the generic framework for evidence synthesis for infectious diseases is introduced; the models developed for the chosen examples are presented in Sections \ref{sec:flusev} and \ref{sec:flutrans}; Section \ref{sec:challenges} is devoted to the challenges encountered in the building, fitting and criticism of models that incorporate multiple sources; we conclude with a final discussion in Section \ref{sec:discuss}. \section{Motivating example: influenza\label{sec:egs}} Public health responses aimed at mitigating the impact of an outbreak need reliable (and prompt) assessment of the likely severity and spread of the infection. This understanding is particularly key when a new pathogen emerges, potentially causing a pandemic, for example a new influenza strain as in 2009 \cite{Lipsitch2009} or more recently, the zika \cite{Kucharski2016} and ebola \cite{Camacho2015} outbreaks. We will use examples of influenza severity and transmission estimation, in particular referring to the 2009 A/H1N1 pandemic in the United Kingdom, to illustrate how, in the absence of ideal information, estimation of severity and transmission can be carried out by using data from a multiplicity of sources. \subsection{Severity \label{sec:sevIntro}} \begin{figure} \centering \includegraphics[width = 0.8\textwidth]{./sevPyramidBW.pdf} \caption{Severity of influenza as a ``pyramid'': infected individuals progress from asymptomatic infection (`I') to symptomatic infection (`S'), hospitalisation (`H'), ICU-admission (`ICU') and/or death (`D'). Case-severity risks, i.e. the case-hospitalisation (CHR), case-ICU-admission (CIR) and case-fatality (CFR) risks, are defined as probabilities of a severe event given infection.} \label{fig:pyramid} \end{figure} The severity of an infectious disease, such as influenza, can be thought as a ``pyramid'' (Figure \ref{fig:pyramid}), where with increasing severity, there are fewer and fewer infections. A proportion of infected individuals progress to symptoms, then to hospitalisation, and the most severe end-points of either intensive care (ICU) admission or death. Severity is usually expressed as ``case-severity risks'' (CSRs), {\it i.e.} probabilities that an infection leads to a severe event such as being hospitalised, admitted to ICU, or dying. Quantification of such risks is necessary both prospectively, in the midst of an outbreak, to understand the severity and likely burden on health-care of an ongoing epidemic; and retrospectively, to assess the severe burden of the particular strain responsible for the epidemic and the adequacy of any public health response during the outbreak, and to inform responses in future outbreaks. However, such CSRs are challenging to directly observe, requiring therefore estimation. Prospectively, estimation would require a cohort of cases, {\it i.e.} individuals with laboratory-confirmed influenza, to be followed up over time. However, a representative sample of those who are infected is almost impossible to recruit, particularly as infections that are asymptomatic are less likely to be observed in health-care data than symptomatic infections. Even if it were possible, prospective estimation would have to account appropriately for censoring, as the end points of interest might take time to occur. For retrospective estimation, censoring may not be an issue, however, differential probabilities of observing cases at different levels of severity (ascertainment/detection probabilities) may lead to biases \cite{Lipsitch2009}. `Multiplier' methods \cite{Reed2009,Shrestha2011,Reed2015} therefore have been proposed when individual-level survival-type data are not available, combining aggregate case numbers at different levels of severity ({\it e.g.} surveillance data on sero-prevalence {\it i.e.} the proportion of blood samples testing positive for influenza; general practice (GP) consultations for influenza-like-illness (ILI); hospital/ICU admissions; mortality) to obtain estimates of the CSRs. These methods account for the ascertainment/detection biases suffered by aggregate surveillance data, through multiplication by inverse proportions detected, with informal uncertainty quantification using Monte Carlo forward simulation (e.g. \cite{Reed2009,Shrestha2011}). Hybrid methods, that combine hierarchical models with multiplier methods in different stages, have appeared recently \cite{Reed2015}. However, multiplier methods to estimate severity were first formalised using Bayesian evidence synthesis, to simultaneously account for uncertainty, prior information on some ascertainment/detection biases, and censoring \cite{Presanis2009,Presanis2011,Presanis2014}. The uncertainty inherent in each data source, together with prior uncertainty, is propagated formally through to posterior estimates of the CSRs. The estimated CSRs are derived as products of probabilities of being at one severity level conditional on being at lower severity level (Figure \ref{fig:pyramid}). Such an evidence synthesis is presented in \cite{Presanis2014}, for the A/H1N1 pandemic in England during each of three waves experienced in summer 2009, the 2009/2010 and 2010/2011 seasons. The available data sources include: (i) cross-sectional sero-prevalence data from laboratory-tested residual sera from patients after diagnostic testing for various (non-respiratory) conditions. These data, over time, inform changes in the proportion of the population exposed to influenza strains, i.e. the population level of immunity, and hence indirectly inform incidence; (ii) estimates of numbers symptomatic based on potentially under-ascertained GP consultations for ``influenza-like-illness'' (ILI) and corresponding data on the proportion of nasopharyngeal swabs from individuals with ILI that test virologically positive for the A/H1N1pdm strain; (iii) under-ascertained retrospective and prospective daily hospital admissions from 129 hospital trusts in the first two waves, and a sentinel set of 23 trusts in the third wave (Figure \ref{fig:obsSevereCounts}(A)); (iv) under-ascertained numbers of deaths occurring in individuals with confirmed A/H1N1 infection (Figure \ref{fig:obsSevereCounts}(B)). Each source poses a number of challenges, in addition to the above-mentioned ascertainment/detection biases. The sero-prevalence data, although available for all three waves, in the second and third waves, does not allow separation of individuals with antibodies in response to vaccination from infected individuals. Point estimates of the number symptomatic from the Health Protection Agency (HPA) are only available in the first two waves, with an informal ``uncertainty range'' from sensitivity analyses. For the third wave, such estimates are instead obtained from a joint regression model of the GP ILI and virological positivity data, based on a much smaller sentinel set of general practices than the more comprehensive sentinel system used in the first two waves. Both the GP and positivity datasets are required, to disentangle ILI consultations due to ``background'' consultations for other respiratory illness from actual influenza consultations. The switch from a comprehensive to a sentinel hospital system between the second and third waves results in sparser data and changes in the age groups recorded (Figure \ref{fig:obsSeverePropn}), particularly affecting the number of severe outcomes (ICU admissions and deaths) reported in the hospitalisation data: no deaths are observed in the third wave. This sparsity requires the use of an additional ICU data source, which poses its own challenge. The system measures prevalent cases present in ICU, rather than incident or cumulative incident ICU admissions, and hence requires a model of the process of admissions and discharges to obtain estimates of cumulative admissions. None of the data sources on their own can provide an estimate of all CSRs of interest. However, by combining them all in a Bayesian evidence synthesis, the challenges described above can be resolved to derive the necessary severity estimates, as presented in Section \ref{sec:flusev}. \begin{figure} \includegraphics[width = \textwidth]{./hospDeathByWk3wBW.pdf} \caption{Frequency of observed severe events relative to the total number of events over the period April 2009-March 2011 of the three waves of infection, among individuals with confirmed A/H1N1 pandemic influenza: (A) weekly hospitalisations; (B) daily deaths.} \label{fig:obsSevereCounts} \end{figure} \begin{figure} \centering \includegraphics[width = \textwidth]{./IChoDEhoBW.pdf} \caption{Proportion of observed individuals hospitalised with confirmed A/H1N1 pandemic influenza who experienced severe events during the three waves of infection: (A) ICU admissions per confirmed A/H1N1 hospitalisation, by age and wave; (B) deaths per confirmed A/H1N1 hospitalisation, by age and wave.} \label{fig:obsSeverePropn} \end{figure} \subsection{Transmission} \label{sec:transIntro} Understanding the dynamics of an infectious disease amounts to estimation of the rate at which it spreads and the factors that are contributing to its spread. To acquire such knowledge, mechanistic transmission models are used \cite{Anderson1991}, expressed by differential equations describing the disease dynamics resulting from the interaction between individuals at different disease stages. For instance, in the susceptible-infectious-recovered (SIR) model new infections are generated through the contact between susceptible and infectious individuals, {\it i.e.} in state S and I, respectively. For influenza, and other respiratory infections, the relevant contact is between different age groups, since school-age children and their interactions with both other children and adults are known to be key drivers of transmission \cite{Cauchemez2008}. Historically, studies of influenza transmission have been carried out either by simulation \cite{Heesterbeek2015} or by estimating the parameters of transmission models using direct information from a single time series of disease endpoints, such as confirmed cases (e.g. \cite{Cauchemez2008}). However, in recent years the need and potential of combining data from multiple sources to infer latent characteristics of epidemics has been increasingly recognised. For influenza, in particular, since the 2009 A/H1N1 influenza pandemic, this recognition resulted in the development of a number of transmission models using data from either multiple surveillance time series ({\it e.g.} \cite{Birrell2011,Dorigatti2013,Baguelin2013,teBeest2014,Shubin2016,Birrell2016}) or a combination of surveillance and phylogenetic data ({\it e.g.} \cite{Ypma2012,Ratmann2012,Jombart2014}). The integration of different sources of evidence can ensure identification of interpretable parameters in transmission models and a more comprehensive description of the evolution of an outbreak \cite{DeAngelis2014}. An example is given in \cite{Birrell2011} where, in the absence of a complete time series of confirmed influenza cases, various data sources are used to estimate retrospectively transmission during the first two waves of pandemic A/H1N1 influenza infection. Figure \ref{fig:obsFluTrans} shows the data for the London region: (A) GP consultations for ILI from May to December 2009; (B) a series of cross-sectional samples from sero-prevalence surveys (see Section \ref{sec:sevIntro}); (C) virological data on nasopharyngeal positivity for A/H1N1 (again as in Section \ref{sec:sevIntro}); and (D) a limited time series of confirmed cases in the first few weeks of the outbreak, up till June 2009, when contact tracing ceased. As in Section \ref{sec:sevIntro}, GP consultation data are contaminated by individuals experiencing non-A/H1N1-related ILI, whose health-care seeking behaviour is highly influenced by governmental advice and media reporting. To reconstruct the underlying pattern of A/H1N1 infections, GP data had to be combined with information on A/H1N1 virological positivity, on population immunity from the serological surveys, knowledge on the natural history of A/H1N1, including the probability of developing symptoms, and data on the propensity of patients with symptomatic infections to consult a GP \cite{Brooks-Pollock2011}. \begin{figure} \includegraphics[width = \textwidth]{./fluTransDataBWdens.pdf} \caption{Four data streams used in the transmission model of \cite{Birrell2011}: (A) GP ILI consultations; (B) serological positivity; (C) virological positivity; (D) confirmed cases. Each plot shows the frequency of events (consultations per 100,000 population, positive \& negative sera samples, positive \& negative swabs, confirmed cases respectively) relative to the total number of respective events over the period April 2009-December 2009 of the first two waves of infection.} \label{fig:obsFluTrans} \end{figure} \section{Bayesian evidence synthesis \label{sec:evsynIntro}} The notion of evidence synthesis is intrinsic to the Bayesian philosophy of assimilating information, Bayes' theorem being the basis for the combination of prior and new evidence. Generalising the concepts of meta-analysis and network meta-analysis, the evidence synthesis described and used here combines information from different study designs, through complex hierarchical models \cite{AdesSutton2006,DeAngelis2014,DeAngelis2014a}. \paragraph*{A useful graphical representation \label{sec:evsyn}} Bayesian hierarchical models have a long history of being expressed as directed acyclic graphs (DAGs), encoding the dependency structure between variables in the model \cite{Lauritzen1996}. \begin{figure}[h] \centering \includegraphics[width = 0.5\textwidth]{./dagES.pdf} \caption{Directed acyclic graph of a generic evidence synthesis model.} \label{fig:dagES} \end{figure} A generic evidence synthesis model can be represented graphically as in Figure \ref{fig:dagES}. Square nodes represent observable quantities such as $\bs{y}_i$, whereas circles are latent quantities, such as $\psi_i$. Double circles such as $\theta_j$ are \emph{founder} nodes, i.e. parameters to which a prior distribution is assigned. Dashed rectangles, or ``plates'', represent repetition over indices, such as $i \in 1, \ldots, n$. Dependencies between variables are indicated by direct arrows, with solid and dashed arrows representing distributional (stochastic) and functional (deterministic) dependencies, respectively. The joint distribution of all quantities in the DAG is the product of the conditional distributions of each node given its direct parents. The aim of an evidence synthesis model such as Figure \ref{fig:dagES} is to estimate a set of $k$ \emph{basic} parameters $\bs{\theta} = \{\theta_1, \ldots, \theta_k\}$, based on a set of $n$ independent datasets $\bs{y} = \{\bs{y}_1, \ldots, \bs{y}_n\}$, where $n$ is not necessarily equal to $k$. Each dataset $\bs{y}_i, i \in 1, \ldots, n$ is assumed to inform a quantity (a \emph{functional} parameter) $\psi_i = \psi_i(\bs{\theta})$ that can be expressed as a deterministic function of the basic parameters. If $\psi_i \equiv \theta_j$ for some $j \in 1, \ldots, k$, $\bs{y}_i$ is said to \emph{directly} inform $\theta_j$. Otherwise, for $\psi_i = \psi_i(\bs{\theta})$, $\bs{y}_i$ \emph{indirectly} informs multiple parameters in the basic parameter set, in conjunction with all the other datasets. Further functional quantities $\psi_i = \psi_i(\bs{\theta}), i > n$ may be of interest to derive from the basic parameters, even if no data directly inform such functions. Assuming the independence of each dataset $\bs{y}_i, i \in 1, \ldots, n$ conditional on their common parents, the posterior distribution of the basic parameters $\bs{\theta}$ given the data $\bs{y}$ is $$ p(\bs{\theta} \mid \bs{y}) \propto p(\bs{\theta}) \prod_{i=1}^n p(\bs{y}_i \mid \psi_i(\bs{\theta})) = p(\bs{\theta}) \prod_{i=1}^n p(\bs{y}_i \mid \bs{\theta}). $$ Such an evidence synthesis model and DAG can clearly be extended both horizontally (more datasets) and vertically (hierarchical modelling). \begin{figure}[h] \centering \includegraphics[width = \textwidth]{./dagMSMtrans.pdf} \caption{Directed acyclic graph of a multi-state model representing a transmission model embedded in an evidence synthesis.} \label{fig:dagMSM} \end{figure} Many evidence synthesis models used in the epidemic literature can be usefully represented graphically by DAGs \cite{AndersenKeiding2002,Birrell2016,Jackson2015}. Figure \ref{fig:dagMSM} is a generic DAG representation of a population-level multi-state disease transmission model where the vector-valued $\boldsymbol{X}(t)=(X_1(t),\ldots, X_K(t))$ corresponds to either the number or proportion of the population in each disease state ${1,\ldots, K}$ at time $t$. Movement between states is governed by transition rates $\boldsymbol{\lambda}(t)$, which are parameterised in terms of a collection of unknown basic parameters $\bs{\theta}(t)$, and the current state of the system $\bs{X}(t)$. If transmission is not explicitly modelled, the dependence of $\bs{\lambda}(t)$ on the states $\bs{X}(t)$, represented by the dashed arrow from $\bs{X}(t)$ to $\bs{\lambda}(t)$, is removed, and the model simplifies to a standard linear multi-state model. Typically, the $\boldsymbol{X}(t)$ and $\boldsymbol{\lambda}(t)$ are not directly observed. Instead, as in the simpler case of Figure \ref{fig:dagES}, observations ${\boldsymbol{y}_{t,i}, i=1, \ldots ,n_t}$ are available at time $t$, with each ${\boldsymbol{y}_{t,i}}$ informing a functional parameter $\boldsymbol{\psi}_{t,i} =\boldsymbol{\psi}_{t,i}(\boldsymbol{X}(t), \boldsymbol{\lambda}(t)$. These relationships may be stochastic dependencies, or more usually, deterministic functions. Again assuming that the ${\boldsymbol{y}_{t,i}}$ for $i=1, \ldots,n_t$ are independent conditional on their common parents, the likelihood of the data $\boldsymbol{y_t} = (\boldsymbol{y}_{t,i}, i = 1, \ldots, n_t)$ at time $t$ is expressed as the product $$ L(\boldsymbol{y_t} \mid \boldsymbol{X}(t),\boldsymbol{\lambda}(t)) = \prod_{i=1}^{n_t} L(\boldsymbol{y}_{t,i} \mid \boldsymbol{\psi}_{t,i}(\boldsymbol{X}(t), \boldsymbol{\lambda}(t))) . $$ When the data are also conditionally independent over time, the likelihood of all the data $\boldsymbol{y} = (\boldsymbol{y}_{0,1}, \ldots, \boldsymbol{y}_{t,n_t})$ given the basic parameters $\bs{\theta} = (\bs{\theta}_0, \ldots, \bs{\theta}_t, \ldots)$ is $$ L(\boldsymbol{y} \mid \boldsymbol{\theta}) = \prod_t \prod_{i=1}^{n_t} L(\boldsymbol{y}_{t,i} \mid \boldsymbol{\psi}_{t,i}(\boldsymbol{X}(t), \boldsymbol{\lambda}(t))) = \prod_t \prod_{i=1}^{n_t} L(\boldsymbol{y}_{t,i} \mid \bs{\theta}_t). $$ The posterior distribution of $\bs{\theta}$ given the data is then $p(\bs{\theta} \mid \bs{y}) \propto L(\bs{y} \mid \bs{\theta}) p(\bs{\theta})$. Note that given the posterior distribution of the basic parameters and/or the states and transition rates, any function $\psi(\bs{\theta},\bs{\lambda},\bs{X})$, even if not directly observed, can be derived. \section{Cross-sectional estimation: severity \label{sec:flusev}} Static, cross-sectional models to estimate prevalence or cumulative incidence of (perhaps severe) disease are particular cases of the model in Figure \ref{fig:dagMSM}. The influenza severity estimation of \cite{Presanis2014} can be seen as three cross-sectional analyses, one for each wave of infection, where severity is expressed in terms of ratios of cumulative incidence of infection at different levels of severity (Figure \ref{fig:pyramid}). The model is also stratified by age group $a \in \{<1, 1-4, 5-14, 15-24, 25-44, 45-64, 65+\}$. The three timepoints $t \in \{0,1,2\}$ are not completely independent, as they share some parameters. \subsection{Model specification} \subsubsection{First and second waves} Figure \ref{fig:dagWaves12} displays the DAG corresponding to the first wave of infection, in summer 2009 ($t = 0$ in the notation of Figure \ref{fig:dagMSM}). The disease states $\boldsymbol{X}(0)$ correspond to the numbers $N_l$ of infections at each severity level $l = \{\textrm{I,S,H,ICU,D}\}$ (Figure \ref{fig:pyramid}). Note that age and wave/time indices have been omitted in the DAG and what follows, for brevity. \paragraph*{\bf Functional parameters} Ideally, we would assume a nested binomial structure for the states $N_l \sim \textrm{Binomial}(N_m, p_{l \mid m})$ for a severity level $m$ lower than $l$ and for conditional probability $p_{l \mid m}$ of being a case at level $l$ given infection at level $m$. However, for computational reasons, we instead assume a mean parameterisation such that generically, the states $N_l$ are deterministic functions $$ N_l = \left\lfloor p_{l \mid m} N_{m} \right\rfloor $$ of the number $N_{m}$ of infections at a lower level $m$ of severity and the conditional probability $p_{l \mid m}$ of being a case at level $l$ given infection at level $m$. The total population $N_{\textrm{Pop}}$ is considered fixed. The case-severity risks of interest, \emph{i.e.} the case-hospitalisation (CHR), case-ICU admission (CIR) and case-fatality (CFR) risks (Figure \ref{fig:pyramid}), are products of component conditional probabilities: \begin{align*} \textrm{CHR} & = p_{\textrm{H} \mid \textrm{I}} = p_{\textrm{H}\mid \textrm{S}} \times p_{\textrm{S}\mid \textrm{I}} \\ \textrm{CIR} & = p_{\textrm{ICU}\mid \textrm{I}} = p_{\textrm{ICU}\mid \textrm{H}} \times \textrm{CHR} \\ \textrm{CFR} & = p_{\textrm{D}\mid \textrm{I}} = p_{\textrm{D}\mid \textrm{H}} \times \textrm{CHR}. \end{align*} The functional parameters $\boldsymbol{\psi}$ of Figure \ref{fig:dagMSM} are defined as the set $\boldsymbol{\psi} = \{N_l, l \in \{\textrm{I,S,H,ICU,D}\}\} \cup \{\textrm{CHR, CIR, CFR}\}$ of states and the corresponding case-severity risks. \paragraph*{\bf Observational model} The observations, $y_i, i = 1, \ldots, n$, where $n = 7$ per age group, are either reported numbers of infections at different levels of severity ($\hat{y}_{\textrm S}, y_{\textrm H}, y_{\textrm D}$ in Figure \ref{fig:dagWaves12}), reported numbers of hospitalisations that lead to severe events ($y_{\textrm{ICU}\mid \textrm{H}}, y_{\textrm{D}\mid \textrm{H}}$), or the cross-sectional sero-prevalence data before and after the first wave. Each observation is a realisation of a binomial distribution, with probability parameters representing either: a detection probability $d_l$ with size parameter the counts of the numbers of infections $N_l$ at levels $l \in \{\textrm{S,H,D}\}$; a conditional probability $p_{\textrm{ICU} \mid \textrm{H}}$ or $p_{\textrm{D} \mid \textrm{H}}$ with size parameter the subset of observed hospitalisations $y_{\textrm{H}}$ where the final outcome $y_{\textrm{ICU}\mid \textrm{H}}$ or $y_{\textrm{D} \mid \textrm{H}}$ or discharge was observed; or a sero-prevalence, either before the first wave ($\pi_{\textrm{baseline}}$) or after the first wave ($\pi$), with size parameter the number of sera samples tested. The latter sero-prevalence data inform, indirectly, the infection attack rate $p_{\textrm{I} \mid \textrm{Pop}}$, via their difference. \paragraph*{\bf Basic parameters} The basic parameters $\boldsymbol{\theta}$ of Figure \ref{fig:dagMSM} are the set $\boldsymbol{\theta} = \{p_{l \mid m}, l,m \in \{\textrm{I,S,H,ICU,D}\}\} \cup \{d_l, l \in \{\textrm{S,H,D}\}\}$ of conditional and detection probabilities in Figure \ref{fig:dagWaves12}. Each probability is given an independent flat prior, apart from the symptomatic case-hospitalisation risk $p_{\textrm{H}\mid\textrm{S}}$ which is assigned an informative prior based on external data. \begin{figure}[h] \centering \includegraphics[width = \textwidth, trim = 0 550 450 0, clip]{./sevDAGwave1BWalt2.pdf} \caption{DAG adapted from \cite{Presanis2014} representing the first wave of A/H1N1 pandemic influenza infection.} \label{fig:dagWaves12} \end{figure} The second wave model is similar to that of the first wave, excluding only the sero-prevalence data, due to the challenges of disentangling vaccinated cases from true infections in the sero-samples in the absence of good data on vaccination in the dataset. \subsubsection{Third wave \label{sec:sevWave3}} The third wave model differs more substantially (Figure \ref{fig:dagWave3}). Estimates of the number of symptomatic infections were derived from a joint Bayesian model of the GP consultation and virological positivity data from the smaller sentinel system, regressed on age group and time. This sub-model was fitted at a first stage, accounting for the probability of consulting a GP given symptoms, and giving posterior mean (sd) estimates $\hat{y}_{\textrm{S}}$ ($\hat{\sigma}_{\textrm{S}}$) on a log scale. In contrast to the first two waves, these estimates are not considered under-ascertained. They are therefore incorporated in the third wave model, at a second stage, via a likelihood term, assuming $\hat{y}_{\textrm{S}} \sim \textrm{Normal}(\log(N_{\textrm{S}}), \hat{\sigma}_{\textrm{S}})$. \begin{figure}[h] \centering \includegraphics[width = \textwidth, trim = 0 550 750 0, clip]{./sevDAGwave3BWalt2.pdf} \caption{DAG adapted from \cite{Presanis2014} representing the third wave of A/H1N1 pandemic influenza infection.} \label{fig:dagWave3} \end{figure} Finally, since the hospitalisation data in the third wave (Figures \ref{fig:obsSevereCounts} and \ref{fig:obsSeverePropn}) are sparse, they lead to uncertain and under-ascertained estimates of the numbers hospitalised and the proportion of hospitalisations leading to ICU admission. Extra prevalence-type data on the number $N_{t,\textrm{ILIC}}$ of suspected ILI cases present in all ICUs in England are therefore incorporated, through a sub-model for these data that assumes entrances at rate $\lambda_t$ and exits at rate $\mu$ to/from ICU form an immigration-death stochastic process \cite{Presanis2014} (Figure \ref{fig:ICUprocess}). Note that this ICU sub-model is another example of a multi-state model as in Figure \ref{fig:dagMSM}, where the state is $N_{t,\textrm{ILIC}}$. \begin{figure}[h] \centering \includegraphics[width = 0.5\textwidth]{./ICUprocess.pdf} \caption{Immigration-death process model for ILI cases in ICU. $\lambda_t$ is the daily rate of admissions to ICU, $N_{t,\textrm{ILIC}}$ the number of ILI cases present in ICU on day $t$, and $\mu$ the rate of exit (discharges or deaths), so that the expected length of stay in ICU is $1 / \mu$.} \label{fig:ICUprocess} \end{figure} Since the observations are of influenza-like-illness rather than confirmed influenza, estimates of the ILI admission rate $\lambda_t$ are combined with virological positivity data from secondary care to obtain estimates of the cumulative number $y_{\textrm{ICU}}$ of new ICU admissions for A/H1N1 influenza. The posterior mean (sd) estimates $\hat{y}_{\textrm{ICU}}$ ($\hat{\sigma}_{\textrm{ICU}}$) from this sub-model, on a log scale, are then incorporated in the third wave model via a contribution to the likelihood: \begin{equation} \hat{y}_{\textrm{ICU}} \sim \textrm{Normal}(\log(N_{\textrm{ICU}}^*), \hat{\sigma}_{\textrm{ICU}}) \label{eq:ICUlogNorm} \end{equation} where $N_{\textrm{ICU}}^*$ is considered a lower bound for the total number of A/H1N1 ICU admissions, $N_{\textrm{ICU}}$, since the prevalent ICU case data cover only a portion of the time period of the third wave. This lower bound is implemented through a binomial assumption $$ N_{\textrm{ICU}}^* \sim \textrm{Binomial}(N_{\textrm{ICU}}, d_{\textrm{ICU}}) $$ with probability parameter representing a detection probability $d_{\textrm{ICU}}$. In contrast to the first two waves, priors for the conditional probabilities $p_{t=3,l\mid m}$ were expressed hierarchically by centering these probabilities, on a logit scale, on their respective second wave versions, $p_{t=2,l\mid m}$. \subsection{Results} Figure \ref{fig:CFRsByWaveAge} and the left-hand side of Figure \ref{fig:NsymByWaveAge} give posterior summaries of the symptomatic CFR (sCFR = $p_{\textrm{D}\mid \textrm{S}}$), CFR and number of symptomatic infections $N_{\textrm{S}}$, by age and wave. Note that for the first two waves of infection, the model giving these results assumes that the HPA-provided estimates of $N_{\textrm{S}}$ are under-estimates, with detection probability $d_{\textrm{S}}$. In \cite{Presanis2014}, discussion of the assumptions about the potential under-estimation in HPA estimates of the number symptomatic led to a number of sensitivity analyses. An initial unpublished sensitivity analysis assumed the HPA estimates were unbiased, \emph{i.e.} $d_{\textrm{S}} = 1$, giving the posterior estimates of $N_{\textrm{S}}$ on the right-hand side of Figure \ref{fig:NsymByWaveAge} for waves 1 and 2 only. \begin{figure}[h] \centering \includegraphics[width = \textwidth]{./l10CFRsBWbyWave.pdf} \caption{Posterior median and 95\% credible intervals of symptomatic CFR and CFR, by wave and age group, log-scale.} \label{fig:CFRsByWaveAge} \end{figure} \begin{figure}[h] \centering \includegraphics[width = \textwidth]{./l10NsymBWbyWaveModel2vs1a.pdf} \caption{Left: Posterior median and 95\% credible intervals of number of symptomatic infections, by wave and age group, log-scale. Right: Same posterior summaries, but for a sensitivity analysis assuming $d_{\textrm{S}} = 1$.} \label{fig:NsymByWaveAge} \end{figure} Notable patterns include: the `u'-shaped age distribution of the case-fatality risks and corresponding `n'-shaped age distribution of symptomatic cases; and an age shift towards older ages over the three waves of infection. The sensitivity analysis assuming $d_{\textrm{S}} = 1$ gives lower estimates of $N_{\textrm{S}}$ (and hence higher CSRs, not shown), but with a similar age pattern. Further sensitivity analyses, as reported in \cite{Presanis2014}, suggested the key age patterns were more robust to prior choices than to the choice of bias/detection model for the HPA estimates. \section{Temporal estimation: transmission \label{sec:flutrans}} Compartmental mechanistic models, typically used to describe the process of disease transmission (see Section \ref{sec:egs} and Chapter ?), can also be represented as in Figure \ref{fig:dagMSM}. The disease states $\bs{X}(t)$ are of the classic Susceptible (S), Infected (I), Recovered (R) type and the transition rates $\bs{\lambda}(t)$ are functional parameters defined in terms of the current disease states. In particular, for the subset of $\bs{\lambda}(t)$ representing incidence rates, we define $\bs{\lambda}_{\textrm{Inc}}(t) = f(\bs{X}_{\textrm{I}}(t))$ where $\bs{X}_{\textrm{I}}(t)$ is the current size of the infected and/or infectious states. In \cite{Birrell2011}, the transmission of a novel pandemic A/H1N1 influenza strain among a fixed population stratified into $A$ age groups is estimated through the combination of a deterministic age-structured transmission model with disease and reporting models, describing disease transmission, progression and health-care seeking behaviour of infected individuals, respectively. \subsection{Model specification} \paragraph*{\bf Transmission model} The transmission dynamics are governed by a system of differential equations of the type: \begin{equation}\label{eqn:determ.dynam} \begin{split} \frac{dS(t,a)}{dt} &= -\lambda(t,a)S(t,a)\\ \frac{dE(t,a)}{dt} &= \lambda(t,a)S(t,a) - \frac{1}{d_L}E(t,a)\\ \frac{dI(t,a)}{dt} &= \frac{1}{d_L}E(t, a) - \frac{1}{d_I}I(t, a)\\ \end{split} \end{equation} where $S(t,a)$, $E(t,a)$, $I(t,a)$ represent the number (or proportion) of the population of age group $a, (a=1,\ldots, A)$ in the $S$ (Susceptible), $E$ (Exposed) and $I$ (Infectious) states at time $t$ and $d_L$ and $d_I$ are the mean latent and infectious periods. Transmission is driven by the time- and age-varying rate $\lambda(t, a)$ at which susceptible individuals become infected. The system in \eqref{eqn:determ.dynam} is evaluated using an Euler approximation at times $t_k = k\delta t, k = 0, \ldots, K$, where the choice of $\delta t = 0.5$ days is sufficiently small that the probability of more than one change of state per period is negligible. Under this discretisation, at time $t_k$ the vector $(S_{t_k, a}, {E}_{t_k, a}, {I}_{t_k, a})$ gives the number of individuals in each state with the number of new infections in $[t_{k-1},t_k)$ being $\Delta_{t_{k},a} = \lambda_{t_{k - 1}, a}S_{t_{k - 1}, a}$, where \begin{equation} \lambda_{t_k, a} = 1 - \prod_{b = 1}^A \left\{ \left(1 - M_{t_k}^{(a, b)}R_{0}(\phi)/ d_I\right)^{{I}_{t_k, b}} \right\} \delta t. \label{eqn:foi} \end{equation} Here $R_{0}$ is the basic reproduction number, the expected number of secondary infections caused by a single primary infection in a fully susceptible population, often parameterised in terms of the epidemic growth rate $\phi$ \cite{Wearing2005}; and the time-varying mixing matrices $\boldsymbol{M}_{t_k}$, express the pattern of transmission between age groups, with the generic entry $M_{t_k}^{(a, b)}$ being the relative rate of effective contacts between individuals of each pair of age groups $(a, b)$ at time $t_k$. The quantity $1 - M_{t_k}^{(a, b)}R_{0}(\phi) / d_I$ gives the probability of an individual in age group $a$ not being infected by an infectious individual in age group $b$ in the interval ${k+1}$. When raised to the power of all the infectious individuals in group $b$, the probability of not being infected by any individual in group $b$ is obtained. Taking the product over all age groups gives the probability of not being infected at all. This expression for $\lambda_{t_k,a}$ is known as the Reed-Frost formulation \cite{Ball1983}. The initial conditions of the system are determined by: parameter $I_0$, the total number of infectious individuals across all age groups at time $t_0$; an assumed equilibrium distribution of infections over the age groups; and an assumption of initial exponential growth that determines the relationship between the numbers in the four disease states. The mean latent period $d_L$ is taken as known, whereas the mean infectious period $d_I$ is a parameter to be estimated. Therefore, the dynamics of the transmission model \eqref{eqn:determ.dynam} depend on the \emph{basic} parameter vector $\bs{\theta}_T = (\phi, I_0, d_I, \boldsymbol{m})$, where $\boldsymbol{m}$ parameterise the mixing matrices $\boldsymbol{M}_{t_k}$. The transmission model is represented schematically in DAG format in Figure \ref{fig:fluTransDAG}. The dependency on age has been omitted in the DAG and in what follows, for brevity. \begin{figure}[!ht] \centering \includegraphics[width = \textwidth, trim = 200 0 300 0, clip]{./fluSEIRmodelBWver6.pdf} \caption{DAG representing the transmission model of \cite{Birrell2011}.}\label{fig:fluTransDAG} \end{figure} \paragraph*{\bf Disease progression and health-care seeking} The newly infected individuals $\Delta_{t_k}$, following an incubation time, develop ILI symptoms with probability $p_{\textrm{Sym}}$ (Figure \ref{fig:fluTransDAG}). With probability ${p}_{\textrm{C}}$, the symptomatic cases are virologically confirmed through contact tracing or hospitalisation in the early phase of the epidemic; and with time-varying probability ${p}_{t,\textrm{G}}$, symptomatic patients choose to contact a primary care practitioner (GP). These processes result in the (latent) number of symptomatic cases $N_{t_s,\textrm{Sym}}$, confirmed cases $N_{t_u,\textrm{C}}$ and GP consultations $N_{t_v,\textrm{G}}$, which can each be expressed as a convolution of the new infections $\Delta_{t_k}$ with the distribution of the time delay between infection and the relevant health-care event. For instance, the number $N_{t_v,\textrm{GP}}$ of GP consultations in the interval $[t_{v-1},t_v)$ is \begin{equation}\label{eqn:convolution} N_{t_v,\textrm{GP}}= p_{Sym} p_{t_v,\textrm{G}} \sum_{k = 0}^v \Delta_{t_{k}} f(v-k) \end{equation} where the (discretised) delay probability mass function $f(\cdot)$ accounts for both the time from infection to symptoms and the time from symptoms to GP consultation. The disease progression component of the model is specified by \emph{basic} parameters $\bs{\theta}_D = (p_{\textrm{Sym}},p_{\textrm{C}},p_{t_v,\textrm{G}})$ (Figure \ref{fig:fluTransDAG}) and, from equation (\ref{eqn:convolution}), the quantities $N_{t_u,\textrm{C}}$ and $N_{t_v,\textrm{G}}$ are complex functions of both $\bs{\theta}_T$ and $\bs{\theta}_D$. \paragraph*{\bf Observational model} The goal here is to estimate the rate of infections $\lambda_{t_{k-1}}$ over time and predict the resulting burden on health-care facilities, through the estimation of the basic parameters $\bs{\theta} = \bs{\theta}_T \cup \bs{\theta}_D$ from observed data. As anticipated in Section \ref{sec:transIntro}, direct data on the number of new infections are not available. Therefore, a combination of a number of indirect evidence sources informing different aspects of the infection and disease processes needs to be used to estimate $\bs{\theta}$. The observed data $\boldsymbol{y}_t=(y_{t_u,\textrm{C}},y_{t_v,\textrm{G}}, y_{t_v,\textrm{P}},y_{t_k,\textrm{S}})$ include: $y_{t_u,\textrm{C}}$, the counts of confirmed cases during the initial weeks of the outbreak (Figure \ref{fig:obsFluTrans}(D)); $y_{t_v,\textrm{G}}$, the number of primary care consultations for ILI, including the individuals attending for non-pandemic ILI (Figure \ref{fig:obsFluTrans}(A)); $y_{t_v,\textrm{P}}$, the complementary virological data on nasopharyngeal positivity for A/H1N1 (Figure \ref{fig:obsFluTrans}(C) and Section \ref{sec:sevIntro}); and $y_{t_k,\textrm{S}}$, the cross-sectional sero-prevalence data (Figure \ref{fig:obsFluTrans}(B)). Typically there is some reporting delay between the disease diagnoses and their appearance in health-care surveillance, but for simplicity, here no such delay is assumed, so that $y_{t_i,i}$ is observed at the same time $t_i$ as the disease endpoint $N_{t_i,i}$ for each $i$. Each item of data informs ${\bs{\theta}}$ through a probabilistic link. More specifically, $y_{t_k,\textrm{S}}$ is a realisation of a Binomial distribution, $$ y_{t_k,\textrm{S}} \sim \textrm{Binomial}\left(n_{t_k,\textrm{S}}, \psi_{t_k,\textrm{S}} \right), $$ with sample size $n_{t_k,\textrm{S}}$ and probability $\psi_{t_k,\textrm{S}}=1 - {\frac{S_{t_k}}{N}}$. The sero-prevalence data $y_{t_k,\textrm{S}}$ therefore directly inform the number of susceptibles $S_{t_k}$ and parameters $\bs\theta_T$ as $S_{t_k} = S_{t_k}({\bs\theta_T})$. The counts of confirmed cases $y_{t_u,\textrm{C}}$ and ILI consultations $y_{t_v,\textrm{G}}$ are taken as realisations of negative binomial distributions, with means given by functional parameters $\psi_{t_u,\textrm{C}}$ and $\psi_{t_v,\textrm{G}}$ respectively, and time-varying over-dispersion parameter $\eta_t$, i.e. $$ y_{t_v,G} \sim \textrm{Negative Binomial}\left(\psi_{t_v,G}, \eta_{t_v}\right) $$ where \begin{align*} \psi_{t_u,\textrm{C}} & = N_{t_u,\textrm{C}} \\ \psi_{t_v,\textrm{G}} & = N_{t_v,\textrm{B}} + N_{t_v,\textrm{G}} \end{align*} and are, therefore, functions defined by convolution equations of the type in (\ref{eqn:convolution}). To disentangle the GP ILI consultations due to the pandemic strain, $N_{t_v,\textrm{G}}$, from all other ILI consultations, $N_{t_v,\textrm{B}}$, information is needed on the proportion of all GP ILI consultations that result from the pandemic strain. This information is provided by virological positivity data, where observed positive samples $y_{t_v,\textrm{P}}$ are considered realisations of a Binomial distribution, $$ y_{t_v,\textrm{P}} \sim \textrm{Binomial}\left(n_{t_v,\textrm{P}}, \psi_{t_v,\textrm{P}} \right), $$ with sample size (number of tests) $n_{t_v,\textrm{P}}$ and probability parameter $\psi_{t_v,\textrm{P}} = 1 - \frac{N_{t_v,\textrm{B}}}{N_{t_v,\textrm{B}} + N_{t_v,\textrm{G}}} $. The proportion positive, $\psi_{t_v,\textrm{P}}$, is expressed as a function of the disentangled counts $N_{t_v,\textrm{B}}$ and $N_{t_v,\textrm{G}}$. As in Section \ref{sec:sevWave3}, the proportion positive $\psi_{t_v,\textrm{P}}$ and number of ILI consultations $\psi_{t_v,\textrm{G}}$ are jointly regressed on age and time, on logit and log scales respectively. The background counts $N_{t_v,\textrm{B}}$ are therefore a function of the regression parameters $\bs{\beta}_B$ (Figure \ref{fig:fluTransDAG}). In each generic calendar time interval $[t_{j-1},t_j]$, as indicated in Section \ref{sec:evsyn}, the likelihood of the data is the product \begin{equation}\label{eqn:trans_likelihood} L(\bs{y}_{t_j} \mid \bs{\theta}) = \prod_{i \in \{\textrm{C,G,P,S}\}} L(y_{t_j,i} \mid \bs{\theta}) \end{equation} of the contributions $L(y_{t_j,i} \mid \bs{\theta})$ of the four data streams, as these are considered to be independent conditional on their common parents. The posterior distribution is then obtained by combining the likelihood with the prior distribution $p(\bs{\theta})$. \subsection{Results} Figure \ref{fig:fluSEIRpostr} shows the posterior distribution for the number of new A/H1N1 infections by age group in London, revealing the two waves of infection in summer and autumn/winter 2009. The first wave of infection has a higher peak, whereas the second wave, particularly by age group, is spread over a longer period of time, resulting in a higher attack rate in the second wave. $R_0$ is estimated to be 1.65 ($95\%$ credible interval 1.56-1.75). \begin{figure} \centering \includegraphics[width = 0.9\textwidth]{./fluSEIRpostrBW.pdf} \caption{Posterior median (solid lines) and 95\% credible interval (dashed) lines number of new infections per week in London, overall and by age group.} \label{fig:fluSEIRpostr} \end{figure} Figure \ref{fig:fluSEIRpredict} shows predictions forward in time based on the data up to days 83 and 192 of the epidemic respectively. Note how the uncertainty in the predictions is progressively reduced as data accumulate. \begin{figure} \centering \includegraphics[width = \textwidth]{./Graded_plots1vs3BW.pdf} \caption{Predictions of the weekly number of new infections in London, at days 83 and 192 of the epidemic (vertical dashed lines): posterior median (black line) and 95\% predictive intervals (shaded areas). For the day 192 prediction, paler shaded areas represent the predictive intervals at two previous timepoints (days 83 and 143 respectively, shown by the grey vertical lines). \label{fig:fluSEIRpredict}} \end{figure} \section{Model building, inference and criticism \label{sec:challenges}} The two influenza case studies above, although relatively simple, have demonstrated how the combination of multiple sources can easily lead to complex probability models. This complexity can challenge standard inferential tools, motivating the development of novel approaches. In what follows, we continue to use the two influenza examples to illustrate such new approaches to model building, efficient inference and model criticism. \subsection{Strategies for model building} There are two strategies to build a complex evidence synthesis model: (i) all the data are combined simultaneously, as in joint models (e.g. \cite{Rizopoulos2012}); or (ii) the model is assembled in stages, using subsets of the evidence initially, before combining the results in a second stage, as in standard meta-analysis \cite{Borenstein2009}. When a model is complex, the latter strategy is sensible, to understand what might be inferred from each dataset in isolation. A staged approach is used in both the influenza examples of Sections \ref{sec:flusev} and \ref{sec:flutrans}. For example, in the severity model, a sub-model of a stochastic process describing entries to/exits from ICU is first fitted to the ICU prevalent case data in the third wave, before combining the results in the full evidence synthesis model. In the transmission model, a joint regression model of GP consultation and virological positivity data was fitted initially, before the results were incorporated in the transmission model to disentangle ``background'' non-influenza noise from the signal of influenza consultations. To illustrate a two-stage process, we use the severity example. Figure \ref{fig:ICU2stage} shows a simplified schematic DAG of the stages: in both the stage 1 and stage 2 models, the cumulative number of ICU admissions measured over the time period of the ICU prevalence data, $N_{\textrm{I}}^*$, has a prior model. The stage 1 prior is in terms of the parameters of the ICU entry/exit process, $\lambda_t$ and $\mu$; whereas the stage 2 prior is in terms of the parameters of the period-prevalence-type severity model, i.e. the conditional and detection probabilities described in Section \ref{sec:flusev}. \begin{figure}[h] \centering \includegraphics[width = 0.6\textwidth, trim = 500 600 550 100, clip]{./ICUmelding2stageBW.pdf} \caption{Two-stage modelling strategy for joining ICU sub-model with rest of severity model.} \label{fig:ICU2stage} \end{figure} The existence of two prior models poses the question of how to combine the two sources of information. In \cite{Presanis2014}, the problem was solved using an approximate method, transferring the posterior mean (sd) estimate of $N_I^*$ from the stage 1 ICU sub-model to the stage 2 severity model via a likelihood term (equation (\ref{eq:ICUlogNorm}) and Figure \ref{fig:dagWave3}), such that the posterior of $\log(N_I^*)$ from the ICU sub-model is approximated by a Normal distribution. This approximate approach is acceptable when the approximation is good, i.e. when the sample size in the stage 1 model is large enough to guarantee a Gaussian posterior distribution. If not, in \cite{Goudie2016}, an alternative, more general, exact method for joining (and splitting) models, ``Markov melding'', is proposed. In general terms, suppose we have $M$ probability submodels $p_m(\phi,\psi_m,Y_m)$, $m=1,\ldots,M$, with parameters $\phi$ and $\psi_m$ and observable random variables $Y_m$. Suppose further that $\phi$ is common to all modules, acting as a `link' between the submodels, and that the aim is to combine all modules into a single model $p_{\mathrm{comb}}(\phi,\psi_1,\ldots,\psi_M,Y_1,\ldots,Y_M)$, so that the posterior distribution for the link parameter $(\phi)$ and the submodel-specific parameters $\psi_{m}$ reflects all information and uncertainty. In some cases, such model joining is readily achievable using standard hierarchical modelling constructs. However, there are some contexts where this joining is not straightforward, in particular where: (i) some sub-models may not be expressible conditional on the link parameter $\phi$, particularly if $\phi$ is a non-invertible deterministic function of other parameters in a sub-model; (ii) the prior marginal distributions $p_m(\phi)$ for $\phi$ differ in different submodels. Both of these situations arise in the severity estimation of Section \ref{sec:flusev} and Figure \ref{fig:ICU2stage}, where the link parameter $\phi$ is the cumulative number of ICU admissions $N_I^*$. Markov melding \cite{Goudie2016} addresses model joining in these contexts by building on Markov combination \cite{DawidLauritzen1993,MassaLauritzen2010,MassaRiccomagno2017} and Bayesian melding \cite{PooleRaftery2000} ideas. Markov combination allows joining of sub-models under the restrictive constraint that the prior marginals $p_m(\phi)$ are identical for each $m$, {\it i.e.} the submodels $p_m(\phi,\psi_m,Y_m)$, $m=1,\ldots,M$ are {\it consistent} in the link parameter $\phi$: $p_m(\phi)= p(\phi)$ for all $m$. In practice, however, the marginal distributions $p_m(\phi)$ are usually \emph{not} exactly identical, as in Figure \ref{fig:ICU2stage}. Markov melding therefore exploits the Bayesian melding approach \cite{PooleRaftery2000} to replace each marginal with a pooled marginal distribution $$p_{pool}(\phi)=g(p_1(\phi),\ldots,p_M(\phi))$$, where $g$ is a pooling function chosen such that $\int g(\phi)\,d\phi = 1$ and $p_{pool}(\phi)$ is an appropriate summary of the individual marginals. Since each replaced model is now consistent in $\phi$, the Markov melded model can be obtained via a Markov combination of the replaced models: \begin{equation*} \begin{split} p_{\textrm{MM}}(\phi,\psi_1,\ldots,\psi_M,Y_1,\ldots,Y_M) &= p_{pool}(\phi)\prod_{m=1}^M\frac{ p_m(\phi,\psi_m,Y_m)}{p_m(\phi)}. \end{split} \end{equation*} Different possible pooling functions $g$ for the melded marginal $p_{pool}(\phi)$ are discussed in \cite{Goudie2016}. Once the new model $p_{\textrm{MM}}$ has been formed, posterior inference given all the data $y_1,\ldots,y_M$ can be performed. Markov melding incorporates more data than any single submodel, and so will provide more precise inferences if the various components of evidence (priors and data) in each submodel do not substantially conflict. Otherwise, Markov melding may be misleading, so, before proceeding, the underlying reasons for the conflict should be investigated and resolved (see section \ref{sec:conflict}). Note that the Markov melding method can, of course, be generalised to the case of multivariate link and submodel-specific parameters, $\bs{\phi}$ and $\bs{\psi}_m$ \cite{Goudie2016}. \paragraph*{Markov melding in the influenza severity example} For the severity example, the use of Markov melding on the ICU and severity sub-model implied priors (Figure \ref{fig:sevPoolPrior}) results in greater posterior precision under different pooling functions, in comparison to both the sub-model posteriors alone and the normal approximation employed in \cite{Presanis2014} (Figure \ref{fig:sevMeldPostr}). \begin{figure} \centering \makebox{ \includegraphics[width = \textwidth]{./sevPoolPriorBW.pdf} } \caption{Pooled prior marginal distributions under different pooling functions for the ICU and severity sub-models. \label{fig:sevPoolPrior}} \end{figure} \begin{figure} \centering \makebox{ \includegraphics[width =0.7\textwidth]{./sevMeldPostrBW.pdf} } \caption{Posterior distributions (medians and $95\%$ credible intervals) for the ICU and severity model parameters under the Markov melded model with different pooling functions, in comparison to the separate sub-model posterior distributions. \label{fig:sevMeldPostr}} \end{figure} \subsection{Computationally efficient inference} Markov chain Monte Carlo (MCMC) methods \cite{GamermanLopes2006} have become standard tools in Bayesian inference to sample from posterior distributions. This sampling, in cross-sectional estimation problems of the type in Section \ref{sec:flusev} (e.g. \cite{McDonald2014}), can feasibly be carried out using available software implementing MCMC (e.g. \cite{Lunn2009}). On the other hand, inference for more complex models, such as transmission models similar to that of Section \ref{sec:flutrans} ({\it e.g.} \cite{Dorigatti2013}), requires bespoke code and a tailored MCMC algorithm. However, classical MCMC is often not a computationally viable option in stochastic transmission models when the data structure is complex ({\it e.g.} \cite{Shubin2016}) and can become computationally inefficient even in inference for deterministic models, when inferences are required within a restricted time frame. Alternative approaches to Bayesian inference are becoming popular, often combined with MCMC, to tackle such computational challenges. Examples include Approximate Bayesian Computation (ABC) ({\it e.g.} \cite{Ratmann2012}), used to estimate the likelihood; Sequential Monte Carlo (SMC) ({\it e.g.} \cite{Sheinson2014}), where inference is sequentially updated using only the most recent data; and emulation \cite{Farah2014} and history matching \cite{Andrianakis2017}, where a complex transmission model is replaced by a simpler approximate model. As a concrete illustration, we re-visit the deterministic transmission model of Section \ref{sec:flutrans}, where the goal is to reconstruct retrospectively the evolution of the influenza A/H1N1 epidemic. In \cite{Birrell2011}, an adaptive Metropolis Hasting algorithm is used to derive the posterior distribution of $\bs\theta$ using 245 days of GP consultation data, combined with the various additional sources of information. To reconstruct the epidemic in London, each run of the MCMC algorithm requires around $7 \times 10^5$ iterations to reach convergence, taking more than four hours for a single MCMC chain The bottleneck is the evaluation of the likelihood in equation (\ref{eqn:trans_likelihood}), which involves calculation of the computationally expensive convolutions in equation (\ref{eqn:convolution}). This is an acceptable computational burden in the case of retrospective inference. However, in the midst of an epidemic, prospective estimation and prediction will be needed as new data arrive, for instance, daily. Then the MCMC algorithm would have to be rerun each day to re-analyse the complete dataset, which would not be optimal, particularly if alternative models need to be explored. More efficiently, the posterior distribution at each new time point could be derived from the one at the previous time point. In \cite{Birrell2016}, a hybrid SMC algorithm is developed to enable this more efficient use of the information and carry out inference and predictions in real time. The idea underlying SMC is to derive sequential posterior distributions $\pi_{k}(\bs\theta)=p(\bs\theta \mid {\bs y}_{{t_1}:{t_k}}) \propto p(\bs\theta)L({\bs y}_{{t_1}:{t_k}} \mid \bs\theta)$ for $k=1,\ldots, K$ as data accumulate. At each time point $t_k$ the distribution $\pi_{k}(\bs\theta)$ is approximated by $n_k$ particles $\{\bs\theta_k^{(1)},\ldots,\bs\theta_k^{(n_k)}\}$ with corresponding weights $\{\omega_{k}^{(1)},\ldots,\omega_{k}^{(n_k)}\}$. As data ${\bs y}_{t_{k+1}}$ arrive at $t_{k+1}$, $\pi_{k}(\bs\theta)$ serves as an importance distribution and the updated $\pi_{k+1}(\bs\theta)$ is obtained by re-weighting the sample $\{\bs\theta_k^{(1)},\ldots,\bs\theta_k^{(n_k)}\}$ by the importance ratios $\frac{\pi_{k + 1}\left(\bs\theta_k^{(j)}\right)}{\pi_k\left(\bs\theta_k^{(j)}\right)}$ for each $j \in 1, \ldots, n_k$. In the model of \cite{Birrell2016} this ratio reduces to the likelihood of the new data, so that the $j^{th}$ particle has weight \begin{equation*} \omega_{k + 1}^{j} \propto \omega_{k}^{j} \frac{\pi_{k + 1}\left(\bs\theta_k^{(j)}\right)}{\pi_k\left(\bs\theta_k^{(j)}\right)} = \omega_{k}^{j}L(\bs y_{k+1} \mid {\bs \theta_{k}^{(j)}}). \end{equation*} This simple SMC scheme works well when the data follow a stable pattern, as demonstrated in settings where only one data stream is available (e.g. \cite{Ong2010}). However, in the specific application of \cite{Birrell2016}, the challenge is not particularly posed by the multiplicity of data, rather by the sudden change in the pattern of health seeking behaviour produced by a public health intervention (see Figure \ref{fig:obsFluTrans}(A)). Such a change introduces a shock to the system and complicates dramatically the tracking of the sequential distributions $\pi_k(\cdot)$ over time. On arrival of a particularly informative new batch of data ${\bs y}_{t_{k+1}}$, the sample $\{\bs\theta_k^{(1)},\ldots,\bs\theta_k^{(n_k)}\}$ degenerates to the few particles consistent with the new information, which, carrying large weights, give a misleading estimate of $\pi_{k+1}(\cdot)$. The naive SMC algorithm is then adapted to handle these highly informative observations by: introducing resampling and MCMC jittering steps \cite{GilksBerzuini2001} to rejuvenate the sample; and by sequentially including only fractions of the new data to minimise the divergence between posterior distributions at consecutive times \cite{DelMoral2006,Neal1996}. The result is a hybrid semi-automatic SMC algorithm that is more computationally efficient than the original MCMC, is highly parallelisable, and can deal with sudden shocks in the observational patterns. \subsection{Model criticism: conflict and influence \label{sec:conflict}} Model criticism is crucial to any analysis. However, specific to the context of multiple source evidence synthesis are: the potential for conflicting evidence, with such conflicts needing to be detected, quantified and resolved; and the critical assessment of what the role and influence of different sources is. In the influenza severity example of section \ref{sec:flusev}, the initial sensitivity analysis shown in the right-hand side of Figure \ref{fig:NsymByWaveAge} did not include a detection probability $d_{\textrm{S}}$ for the HPA estimates $\hat{y}_{\textrm{S}}$ of the number symptomatic (i.e. with $d_{\textrm{S}} = 1$). However, this ``naive'' model led to high posterior mean deviances, as shown in Table \ref{tab:devsNaiveSev} for `data' $\hat{y}_{\textrm{S}}$ on a log scale for the first wave. \begin{table} \centering \caption{Deviance summaries for `data' on number symptomatic in first wave, log-scale, by age group, for the ``naive'' model: HPA estimate ($\hat{y}_{\textrm{S}}$) and corresponding standard deviation ($\hat{\sigma}_{\textrm{S}}$); posterior mean estimate ($N_{\textrm{S}}$) and corresponding $95\%$ credible interval (CrI); posterior mean deviance contributions ($\overline{D}$); plug-in deviance at posterior mean of parameters ($D(\overline{\theta})$); effective number of parameters ($p_D$); deviance information criterion (DIC). \label{tab:devsNaiveSev}} \begin{tabular}{rrrrrrrrrr} \hline Age & $\hat{y}_{\textrm{S}}$ & $\hat{\sigma}_{\textrm{S}}$ &$N_{\textrm{S}}$ & \multicolumn{2}{c}{$95\%$ CrI} & $\overline{D}$ & $D(\overline{\theta})$ & $p_D$ & DIC\\ \hline $<1$ & 8.11 & 0.30 & 8.27 & 7.70 & 8.85 & 1.32 & 0.32 & 1.01 & 2.33 \\ 1-4 & 7.81 & 0.26 & 9.89 & 9.42 & 10.38 & 66.72 & 65.80 & 0.92 & 67.65 \\ 5-14 & 9.78 & 0.28 & 11.75 & 11.32 & 12.16 & 49.16 & 48.58 & 0.58 & 49.74 \\ 15-24 & 10.23 & 0.26 & 11.17 & 10.74 & 11.62 & 14.05 & 13.30 & 0.76 & 14.81 \\ 25-44 & 11.46 & 0.29 & 11.30 & 10.83 & 11.80 & 1.03 & 0.30 & 0.73 & 1.75 \\ 45-64 & 12.03 & 0.26 & 10.06 & 9.61 & 10.52 & 59.17 & 58.36 & 0.81 & 59.98 \\ 65+ & 11.25 & 0.27 & 7.62 & 7.12 & 8.15 & 175.41 & 174.49 & 0.92 & 176.33 \\ \hline \end{tabular} \end{table} By comparison, the model assuming the HPA estimates are under-estimates has much lower posterior mean deviances and DIC contributions (Table \ref{tab:devsSev}). The lack of fit in the ``naive'' model motivated a closer look at the consistency of the different sources of evidence about the denominators, or infections at lower levels of severity (asymptomatic and symptomatic), resulting in both the sensitivity analyses of \cite{Presanis2014} and more formal conflict assessment in \cite{Presanis2013}. \begin{table} \centering \caption{Deviance summaries for `data' on number symptomatic in first wave, log-scale, by age group, for the model assuming HPA estimates are under-estimates. \label{tab:devsSev}} \begin{tabular}{rrrrrrrrrr} \hline Age & $\hat{y}_{\textrm{S}}$ & $\hat{\sigma}_{\textrm{S}}$ &$N_{\textrm{S}}$ & \multicolumn{2}{c}{$95\%$ CrI} & $\overline{D}$ & $D(\overline{\theta})$ & $p_D$ & DIC\\ \hline $<1$ & 8.11 & 0.30 & 8.11 & 7.56 & 8.66 & 0.89 & 0.00 & 0.89 & 1.78 \\ 1-4 & 7.81 & 0.26 & 9.71 & 9.20 & 10.23 & 0.92 & 0.06 & 0.85 & 1.77 \\ 5-14 & 9.78 & 0.28 & 11.45 & 10.93 & 11.95 & 0.82 & 0.00 & 0.82 & 1.64 \\ 15-24 & 10.23 & 0.26 & 11.11 & 10.64 & 11.58 & 1.00 & 0.23 & 0.77 & 1.76 \\ 25-44 & 11.46 & 0.29 & 11.22 & 10.71 & 11.72 & 0.90 & 0.00 & 0.90 & 1.80 \\ 45-64 & 12.03 & 0.26 & 9.91 & 9.41 & 10.41 & 0.86 & 0.00 & 0.86 & 1.73 \\ 65+ & 11.25 & 0.27 & 7.56 & 7.03 & 8.10 & 0.92 & 0.00 & 0.92 & 1.84 \\ \hline \end{tabular} \end{table} \paragraph*{Conflict assessment methods} Bayesian predictive diagnostics (e.g. \cite{Box1980,Rubin1984,Gelman1996,BayarriCastellanos2007}) have long been used in model assessment, comparing observations to predictions from the model. Posterior predictive tests \cite{GelmanBook2003} are known to be conservative, due to using the data both to fit the model and to compare to model predictions, so a variety of (computationally intensive) post-processing, approximate, or cross-validatory methods have been proposed instead (e.g. \cite{BayarriBerger2000,BayarriCastellanos2007,Hjort2006,SteinbakkStorvik2009,Gelman1996,MarshallSpiegelhalter2007}). Typically, each of these methods have been employed to assess models of a single dataset, rather than for an evidence synthesis. ``Conflict p-values'' \cite{MarshallSpiegelhalter2007,GasemyrNatvig2009,Presanis2013,Gasemyr2016} have been proposed as a generalisation of Bayesian cross-validatory predictive p-values that compare not only subsets of data to predictions resulting from the rest of the data, but also whole sub-models, comprising data, model structure and prior information, with predictions from the rest of the model. The key idea, known as ``node-splitting'', is to split a DAG $\mathcal{G}(\phi, \bs{\theta}_{\setminus \phi}, \bs{y})$, comprising data $\bs{y}$ and latent quantites $\bs{\theta} = (\phi, \bs{\theta}_{\setminus \phi})$, into two independent partitions at any ``separator'' node $\phi$, $\mathcal{G}(\phi_a, \bs{\theta}_{a\setminus \phi}, \bs{y}_a)$ and $\mathcal{G}(\phi_b, \bs{\theta}_{b\setminus \phi}, \bs{y}_b)$. Two copies of the separator $\phi$ are created, $\phi_a$ and $\phi_b$, that are each identifiable in partitions $\mathcal{G}(\phi_a, \bs{\theta}_{a\setminus \phi}, \bs{y}_a)$ and $\mathcal{G}(\phi_b, \bs{\theta}_{b\setminus \phi}, \bs{y}_b)$ respectively. The aim is to compare the posterior distributions from each partition, $p(\phi_a \mid \bs{y}_a)$ and $p(\phi_b \mid \bs{y}_b)$. This comparison is achieved by defining a difference function $\delta = h(\phi_a) - h(\phi_b)$, on an appropriate scale $h(\cdot)$, and considering where $0$ lies in the posterior distribution of the difference, $p_{\delta}(\delta \mid \bs{y}_a, \bs{y}_b)$. A two-sided conflict p-value corresponding to the hypothesis test $H_0: \delta = 0$ is defined as $c = 2 \times \min\left[ \textrm{Pr} \left\{ p_{\delta}(\delta \mid \bs{y}_a, \bs{y}_b) < p_{\delta}(0 \mid \bs{y}_a, \bs{y}_b) \right\}, 1 - \textrm{Pr} \left\{ p_{\delta}(\delta \mid \bs{y}_a, \bs{y}_b) < p_{\delta}(0 \mid \bs{y}_a, \bs{y}_b) \right\} \right]$, with different methods for evaluating $c$ and one-sided variations given in \cite{GasemyrNatvig2009,Presanis2013}. The conflict p-value has been demonstrated to be uniform under the null model in a range of models by \cite{Gasemyr2016}. This setup can be generalised to multiple partitions and multiple node-splits \cite{Presanis2017}. \paragraph*{Conflict in the influenza severity example} To assess whether the lack of fit to the HPA estimates of the number symptomatic in the ``naive'' model (Table \ref{tab:devsNaiveSev}) could be due to conflicting evidence, the model for the first wave only is split into two partitions at $N_{\textrm{S}}$, as in Figure \ref{fig:fluDAGsplitNs}. The ``parent'' partition comprises the data and priors informing the parent nodes of $N_{\textrm{S}}$, i.e. the sero-prevalence data and an informative prior for the proportion of infections that are symptomatic, $p_{\textrm{S} \mid \textrm{Inf}}$. The rest of the evidence (the severe case data and priors) comprises the ``child'' model. \begin{figure}[h] \centering \includegraphics[width = \textwidth, trim = 30 600 300 100, clip]{./sevDAGwave1BWalt2nodesplit.pdf} \caption{DAG showing node split at $N_{\textrm{S}}$. On the right is the ``parent'' model and on the left the ``child'' model. The double-headed arrow represents the comparison between the two.} \label{fig:fluDAGsplitNs} \end{figure} The test for conflict between the parent and child models demonstrated low posterior probabilities of no conflict, particularly for the youngest and oldest age groups \cite{Presanis2013}. The posterior difference function $\delta = \log_{10}(N_{\textrm{S}}^{\textrm{parent}}) - \log_{10}(N_{\textrm{S}}^{\textrm{child}})$ is plotted for the age group $65+$ in Figure \ref{fig:fluDelta65}, together with the conflict p-value $c = 0.058$ and the corresponding posterior distributions for the two partitions and the full model. Note that the sero-prevalence data in the parent model imply a much higher, though also much more uncertain, number symptomatic than the severe case data in the child model. The lack of certainty in the sero-prevalence data means the severe case data and priors have more influence in the full model, so the full model posterior is much closer to the child model posterior than the parent one. \begin{figure}[h] \centering \includegraphics[width = 0.9\textwidth]{./ln10DeltaNs65.pdf} \caption{Conflict (posterior difference) at $N_{\textrm{S}}$ between the parent and child models in age group 65+ in the first wave: difference function $\delta = \log_{10}(N_{\textrm{S}}^{\textrm{parent}}) - \log_{10}(N_{\textrm{S}}^{\textrm{child}})$ (dark grey); $\log_{10}(N_{\textrm{S}})$ from full model (medium grey); $\log_{10}(N_{\textrm{S}}^{\textrm{parent}})$ from parent model (light grey); $\log_{10}(N_{\textrm{S}}^{\textrm{child}})$ from child model (ivory).} \label{fig:fluDelta65} \end{figure} A similar investigation of conflict at a different node in the ``naive'' model, the number of hospitalisations $N_{\textrm{H}}$, leads to splitting the DAG into three partitions (not shown), based on: the sero-prevalence data; the hospital data; and the mortality data, respectively. The influence of the evidence in the three partitions on the full model is shown in Figure \ref{fig:fluInfluenceNh}. \begin{figure}[h] \centering \includegraphics[width = 0.9\textwidth]{./postLog10NHvsFullBW.pdf} \caption{Influence and conflict at $N_{\textrm{H}}$ between the three partitions in age group 45-64 in the first wave.} \label{fig:fluInfluenceNh} \end{figure} As in the previous example, the sero-prevalence (denominator) data in partition 1 are the most uncertain, with the hospital data partition (2) having less uncertainty, and the mortality data partition (3) even less uncertainty. The posterior distributions for all three partitions overlap substantially however, so that conflict is not detectable. Instead, when the three partitions are combined in the full model, we obtain a much more precise estimate of the number hospitalised, which is a compromise between the three partitions, as would be expected. \section{Discussion \label{sec:discuss}} This chapter has illustrated both the advantages and complexities of synthesising multiple data sources to estimate various hidden characteristics of infectious disease, through the two examples of severity and transmission estimation for influenza. Section \ref{sec:challenges} introduced three sets of tools to approach the challenges of complex model building, computationally efficient inference and model criticism respectively. However, these tools are a first step in resolving these challenges, with a number of questions remaining open. Markov melding generalises existing ideas that facilitate realistic evidence synthesis, via a modular approach to model building. Some outstanding challenges include: the choice of pooling function; and the degree of heterogeneity between prior models that is acceptable for Markov melding to be appropriate -- when does heterogeneity become conflict? Nevertheless, Markov melding is an important step in this era of big data, generalising divide-and-conquer approaches \cite{Bardenet2017}. Efficient inference for transmission models has been introduced using a sequential approach. Currently, the sequential approach is highly tailored to accommodate shocks to the system, so a question of interest is how to adapt a transmission model structure in real-time, to be able to generalise the SMC approach to any plausible epidemic scenario. The influenza model illustrated is deterministic in its dynamics, and the generic multi-state model description in Section \ref{sec:evsyn} and Figure \ref{fig:dagMSM}, while in theory accommodating stochastic dynamic transmission, is more focussed on deterministic dynamics. An important area of research is to consider efficient, real-time, inference from multiple sources for stochastic epidemics, particularly in the early stages of an outbreak \cite{Birrell2017}. The influenza transmission model of \cite{Shubin2016} includes several levels of stochasticity and data, but is highly computationally intensive, and therefore not feasible in real-time. How much stochasticity is therefore necessary to realistically model an emerging outbreak? The illustration of conflict assessment in Section \ref{sec:conflict} is targeted, in that conflict was assessed at particular nodes in the DAG of the influenza severity model, following suspected biases in particular data sources. However, in some contexts, it may not be so clear where to look for potential conflict, in which case a systematic search throughout a DAG for conflict may be warranted. However, such systematic assessment entails multiple tests, either through a multivariate difference function (as in the example of Figure \ref{fig:fluInfluenceNh}) or through fitting multiple node-split models. A framework for systematic assessment, accounting for the multiple tests and their correlation, has therefore been proposed \cite{Presanis2017}. Further open questions in this area include how to improve power to detect conflict, and how to make such methods more accessible by improving the computational feasibility of systematic conflict assessment. As with any cross-validatory framework, multiple node-splitting can be computationally burdensome, so for hierarchical models, \cite{Ferkingstad2017} have proposed an INLA approach to fast conflict diagnostics. A final area of open research related to understanding the influence of different, potentially conflicting, evidence sources on inference is the adaptation of value of information methods to evidence synthesis \cite{Jackson2017}. \section*{Acknowledgements} The authors would like to thank Robert Goudie and Paul Birrell for their input, and Johannes Bracher and Leonhard Held for constructive feedback. Daniela De Angelis and Anne Presanis are supported by the Medical Research Council (Unit programme number MC\_UU\_00002/11).
\section{Introduction} \label{s:introduction} Deformable registration is a key technology in medical imaging. It is about computing a map $\vect{y}$ that establishes a \emph{meaningful} spatial correspondence between two (or more) images $m_R$ (the \emph{reference} (fixed) \emph{image}) and $m_T$ (the \emph{template} (deformable or moving) \emph{image}; image to be registered) of the same scene~\cite{Modersitzki:2004a,Fischer:2008a}. Numerous approaches for formulating and solving image registration problems have appeared in the past; we refer to~\cite{Modersitzki:2004a,Modersitzki:2009a,Fischer:2008a,Hajnal:2001a,Sotiras:2013a} for lucid overviews. Image registration is typically formulated as a variational optimization problem that consists of a data fidelity term and a Tikhonov regularization functional to over-come ill-posedness~\cite{Fischer:2008a,Engl:1996a}. In many applications, a key concern is that $\vect{y}$ is a \emph{diffeomorphism}, i.e., the map $\vect{y}$ is differentiable, a bijection, and has a differentiable inverse. A prominent strategy to ensure regularity of $\vect{y}$ is to introduce a pseudo-time variable $t \geq 0$ and invert for a smooth, time-dependent velocity field $\vect{v}$ that parameterizes the map $\vect{y}$~\cite{Beg:2005a,Dupuis:1998a,Miller:2001a,Vercauteren:2009a}; existence of a diffeomorphism $\vect{y}$ can be guaranteed if $\vect{v}$ is adequately smooth~\cite{Beg:2005a,Chen:2011a,Dupuis:1998a,Trouve:1998a}. There exists a large body of literature of diffeomorphic registration parameterized by velocity fields $\vect{v}$ that, in many cases, focuses on theoretical considerations~\cite{Dupuis:1998a,Miller:2001a,Younes:2009a,Younes:2007a,Younes:2010a}. There is much less work on the design of efficient solvers; examples are~\cite{Azencott:2010a,Avants:2011a,Ashburner:2007a,Ashburner:2011a,Beg:2005a,Crum:2005a,Zhang:2015a,Hernandez:2009a,Vercauteren:2009a,Polzin:2016a}. Most existing solvers use first order methods for numerical optimization and/or are based on heuristics that do not guarantee convergence. Due to computational costs, early termination results in compromised registration quality. Our intention in this work is to deploy an efficient solver for diffeomorphic image registration problems that \begin{inparaenum}[(\itshape i\upshape)]\item uses state-of-the art algorithms, \item is scalable to thousands of cores, \item requires minimal parameter tuning, \item and produces high-fidelity results with guaranteed regularity on a discrete level.\end{inparaenum} We showcase exemplary results for CLAIRE for a neuroimaging dataset in \figref{f:claire-exres}. We compare \claire{} to different variants of the \demons{} algorithm. \begin{table} \caption{Notation and symbols.\label{t:notation-and-symbols}} \centering\scriptsize \begin{tabular}[t]{lllll}\toprule Symbol & Description &\quad & Acronym & Description \\\midrule $\Omega$ & spatial domain; $\Omega\ensuremath{\mathrel{\mathop:}=}(0,2\pi)^3\subset\ns{R}^3$ & & \claire & {\bf c}onstrained {\bf la}rge deformation diffeomorphic {\bf i}mage {\bf re}gistration \cite{claire-web} \\ $\vect{x}$ & spatial coordinate; $\vect{x}\ensuremath{\mathrel{\mathop:}=}(x_1,x_2,x_3)^\ensuremath{\mathsf{T}}\in\ns{R}^3$ & & CFL & Courant--Friedrichs--Lewy (condition) \\ $t$ & pseudo-time variable; $t \in [0,1]$ & & CHEB($k$) & Chebyshev (iteration) with fixed iteration number $k\in\ns{N}$ \cite{Golub:1961a,Gutknecht:2002a} \\ $m_R(\vect{x})$ & reference image & & FFT & fast Fourier transform \\ $m_T(\vect{x})$ & template image (image to be registered) & & GPL & GNU General Public License \\ $\vect{v}(\vect{x})$ & stationary velocity field & & HPC & high performance computing \\ $\vect{y}(\vect{x})$ & deformation map & & KKT & Karush--Kuhn--Tucker \\ $m(\vect{x},t)$ & state variable (transported intensities) & & LDDMM & large deformation diffeomorphic metric mapping~\cite{Beg:2005a} \\ $m_1(\vect{x})$ & final state; $m_1(\vect{x}) \ensuremath{\mathrel{\mathop:}=} m(\vect{x},t=1)$ & & matvec & matrix vector product \\ $\lambda(\vect{x},t)$ & adjoint variable & & MPI & Message Passing Interface \\ $\tilde{m}(\vect{x},t)$ & incremental state variable & & \petsc & Portable Extensible Toolkit for Scientific Computation~\cite{Balay:2016a,petsc-web} \\ $\tilde{\lambda}(\vect{x},t)$ & incremental adjoint variable & & PCG & preconditioned conjugate gradient (method)~\cite{Hestenes:1952a} \\ $\fun{L}$ & Lagrangian functional & & PCG($\epsilon$) & PCG method with relative tolerance $\epsilon\in(0,1)$ \\ $\vect{g}$ & (reduced) gradient & & RK2 & 2nd order Runge--Kutta method \\ $\dop{H}$ & (reduced) Hessian operator & & (S)DDEM & (symmetric) diffeomorphic demons~\cite{Vercauteren:2007a,Vercauteren:2009a} \\ $\p_i$ & partial derivative with respect $x_i$ & & (S)LDDEM & (symmetric) log-domain diffeomorphic demons~\cite{Vercauteren:2008a} \\ $\igrad$ & gradient operator; $\igrad\ensuremath{\mathrel{\mathop:}=}(\p_1,\p_2,\p_3)^\ensuremath{\mathsf{T}}$ & & \tao & Toolkit for Advanced Optimization~\cite{Munson:2017a} \\ $\idiv$ & divergence operator & & \\ $\ilap$ & Laplacian operator (vectorial and scalar) & & \\ $\vect{n}_x$ & number of grid points; $\vect{n}_x = (n_1,n_2,n_3)^\ensuremath{\mathsf{T}}$ & & \\ $n_t$ & number of cells in temporal grid & & \\ $n$ & number of unknowns; $n = 3\cdot \prod_{i=1}^3n_i$ & & \\ \bottomrule \end{tabular} \end{table} \subsection{Outline of the Method} \label{s:method-outline} We summarize our notation and commonly used acronyms in \tabref{t:notation-and-symbols}. We use an optimal control formulation. The task is to find a smooth velocity field $\vect{v}$ (the ``control variable'') such that the distance between two images (or densities) is minimized, subject to a regularization norm for $\vect{v}$ and a deformation model given by a hyperbolic PDE constraint. More precisely, given two functions $m_R(\vect{x})$ (\emph{reference image}) and $m_T(\vect{x})$ (\emph{template image}) compactly supported on an open set $\Omega\subset\ns{R}^3$ with boundary $\p\Omega$, we solve for a \emph{stationary} velocity field $\vect{v}(\vect{x})$ as follows: \begin{subequations}\label{e:ip} \begin{align}\label{e:ip:objective} \minopt_{\vect{v}, m} & \quad \half{1}\int_{\Omega}(m_1(\vect{x}) - m_R(\vect{x}))^2\d \vect{x} + \fun{S}(\vect{v})\\ \begin{aligned} \label{e:ip:transport} \text{subject to}\\\\ \end{aligned} &\quad \begin{aligned} \p_t m + \vect{v} \cdot \igrad m & = 0 && \text{in}\;\Omega\times(0,1] \\ m & = m_T && \text{in}\;\Omega\times\{0\} \end{aligned} \end{align} \end{subequations} \noindent with periodic boundary conditions on $\p\Omega$. Here, $m(\vect{x},t)$ (the `'state variable`') corresponds to the transported intensities of $m_T(\vect{x})$ subject to the velocity field $\vect{v}(\vect{x})$; in our formulation, $m_1(\vect{x}) \ensuremath{\mathrel{\mathop:}=} m(\vect{x},t=1)$---i.e., the solution of~\eqref{e:ip:transport} at $t=1$---is equivalent to $m_T(\vect{y}(\vect{x}))$ for all $\vect{x}$ in $\Omega$. The first part of the functional in~\eqref{e:ip:objective} measures the discrepancy between $m_1$ and $m_R$. The regularization functional $\fun{S}$ is a Sobolev norm that, if chosen appropriately, ensures that $\vect{v}$ gives rise to a diffeomorphism $\vect{y}$~\cite{Beg:2005a,Dupuis:1998a,Hart:2009a,Trouve:1998a}. We augment the formulation in~\eqref{e:ip} by constraints on the divergence of $\vect{v}$ to control volume change. A more explicit version of our formulation can be found in~\secref{s:formulation}. Problem~\eqref{e:ip} is ill-posed and involves ill-conditioned operators. We use the method of Lagrange multipliers to solve the constrained optimization problem~\eqref{e:ip}. Our solver is based on an \emph{optimize-then-discretize} approach; we first derive the optimality conditions and then discretize in space using a pseudospectral discretization with a Fourier basis. We use a globalized, inexact, preconditioned Gauss--Newton--Krylov method to solve for the first order optimality conditions. The hyperbolic transport equations that appear in our formulation are integrated in time using a semi-Lagrangian method. Our solver uses MPI for distributed-memory parallelism and can be scaled up to thousands of cores. \subsection{Contributions} \label{s:contributions} We follow up on our former work on constrained diffeomorphic image registration~\cite{Mang:2015a,Mang:2016a,Mang:2017b,Mang:2016c}. We focus on registration performance, implementation aspects and the deployment of our solver, and introduce additional algorithmic improvements. Our contributions are the following: \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item We present several algorithmic improvements compared to our past work. Most notably, we implement an improved preconditioner for the reduced space Hessian (originally described in~\cite{Mang:2017b} for the two-dimensional case). We empirically evaluate several variants of this preconditioner. \item We evaluate registration quality and compare our new, improved solver to different variants of the diffeomorphic \demons{} algorithm~\cite{Vercauteren:2008a,Vercauteren:2009a}. \item We study strong scaling performance of our improved solver. \item We make our software termed \claire{}~\cite{claire-web} (which stands for {\bf c}onstrained {\bf la}rge deformation diffeomorphic {\bf i}mage {\bf re}gistration) available under GPL license. The code can be downloaded here: \begin{center} \url{https://github.com/andreasmang/claire}. \end{center} \noindent The URL for the deployment page is \url{https://andreasmang.github.io/claire}. \end{itemize} \subsection{Limitations and Unresolved Issues} \label{s:limitations} Several limitations and unresolved issues remain: $\bullet$ We assume similar intensity statistics for the reference image $m_R$ and the template image $m_T$. This is a common assumption in many deformable image registration algorithms~\cite{Beg:2005a,Hart:2009a,Lee:2010a,Museyko:2009a,Vialard:2012a}. To enable the registration of images with a more complicated intensity relationship, more involved distance measures need to be considered~\cite{Modersitzki:2004a,Sotiras:2013a}. $\bullet$ Our formulation is not symmetric, i.e., not invariant to a permutation of the reference and template image. The extension of our scheme to the symmetric case is mathematically straightforward~\cite{Avants:2008a,Lorenzi:2013b,Vercauteren:2008a} but its efficient implementation is nontrivial. This will be the subject of future work. $\bullet$ We invert for a stationary velocity field $\vect{v}(\vect{x})$ (i.e., the velocity does not change in time). Stationary paths on the manifold of diffeomorphisms are the group exponentials (i.e., one-parameter subgroups that do not depend on any metric); they do not cover the entire space of diffeomorphisms. The definition of a metric may be desirable in certain applications~\cite{Beg:2005a,Miller:2004a,Zhang:2015a} and, in general, requires nonstationary velocities. Developing an effective, parallel solver for nonstationary $\vect{v}$ requires more work. \subsection{Related Work} \label{s:related-work} With this work we follow up on our prior work on constrained diffeomorphic image registration~\cite{Mang:2015a,Mang:2016a,Mang:2016c,Mang:2017a,Mang:2017c}. We release \claire, a software package for velocity-based diffeomorphic image registration. For excellent reviews on image registration see~\cite{Modersitzki:2004a,Hajnal:2001a,Sotiras:2013a}. In diffeomorphic registration, we formally require that $\det\igrad\vect{y}$ does not vanish or change sign. An intuitive approach to safeguard against nondiffeomorphic $\vect{y}$ is to add hard and/or soft constraints on $\det\igrad\vect{y}$ to the variational problem~\cite{Burger:2013a,Haber:2007a,Rohlfing:2003a,Sdika:2008a}. An alternative strategy is to introduce a pseudo-time variable $t$ and invert for a smooth velocity field $\vect{v}$ that parameterizes $\vect{y}$~\cite{Beg:2005a,Dupuis:1998a,Miller:2001a,Vercauteren:2009a}; existence of a diffeomorphism $\vect{y}$ can be guaranteed if $\vect{v}$ is adequately smooth~\cite{Beg:2005a,Chen:2011a,Dupuis:1998a,Trouve:1998a}. Our approach falls into this category. We use a PDE-constrained optimal control formulation; we refer to~\cite{Biegler:2003a,Borzi:2012a,Gunzburger:2003a,Hinze:2009a,Lions:1971a} for insight into theory and algorithmic developments in optimal control. In general, the solver has to be tailored to the structure of the control problem, which is dominated by the PDE constraints; examples for elliptic, parabolic, and hyperbolic PDEs can be found in~\cite{Adavani:2008b,Biros:2008a}, \cite{Adavani:2008a,Gholami:2016a,Mang:2012b,Stoll:2015a}, and~\cite{Benzi:2011a,Borzi:2002a,Lee:2010a,Herzog:2018a,Wilcox:2015a}, respectively. In our formulation, the PDE constraint is---in its simplest form---a hyperbolic transport equation (see \eqref{e:ip}). Our formulation has been introduced in~\cite{Mang:2015a,Mang:2016a,Hart:2009a}. A prototype implementation of our solver has been described in~\cite{Mang:2015a} and has been improved in~\cite{Mang:2017b}. We have extend our original solver~\cite{Mang:2015a} to the 3D setting in~\cite{Mang:2016c,Gholami:2017a}. The focus in~\cite{Mang:2016c,Gholami:2017a} is the scalability of our solver on HPC platforms. In~\cite{Scheufele:2019a} we presented an integrated formulation for registration and biophysical tumor growth simulations that has been successfully applied to segmentation of neuroimaging data~\cite{Mang:2017c,Gholami:2019a}. Optimal control formulations that are related to ours have been described in~\cite{Borzi:2002a,Chen:2011a,Hart:2009a,Lee:2010a,Lee:2011a,Vialard:2012a,Herzog:2018a}. Related formulations for optimal mass transport are described in~\cite{Benzi:2011a,Haber:2015a,Rehman:2009a,Mang:2017a}. Our work differs from optimal mass transport in that intensities are constant along the characteristics (i.e., mass is not preserved). Our formulation shares numerous characteristics with traditional optical flow formulations~\cite{Horn:1981a,Kalmoun:2011a,Ruhnau:2007a}. The key difference is that we treat the transport equation for the image intensities as a hard constraint. PDE-constrained formulations for optical flow, which are equivalent to our formulation, are described in~\cite{Andreev:2015a,Barbu:2016a,Borzi:2002a,Chen:2011a}. Our work is closely related to the LDDMM approach~\cite{Avants:2008a,Avants:2011a,Beg:2005a,Dupuis:1998a,Trouve:1998a,Younes:2007a}, which builds upon the pioneering work in~\cite{Christensen:1996a}. LDDMM uses a nonstationary velocity but there exist variants that use stationary $\vect{v}$~\cite{Arsigny:2006a,Ashburner:2007a,Hernandez:2009a,Lorenzi:2013a,Lorenzi:2013b,Vercauteren:2009a}; they are more efficient. If we are only interested in registering two images, stationary $\vect{v}$ produce good results. Another strategy to reduce the size of the search space is geodesic shooting~\cite{Ashburner:2011a,Miller:2006a,Vialard:2012a,Younes:2007a,Zhang:2015b}; the control variable of the associated optimal control problem is an initial momentum/velocity at $t=0$. Among the most popular, publicly available packages for diffeomorphic registration are \demons~\cite{Vercauteren:2008a,Vercauteren:2009a}, \ants~\cite{Avants:2011a}, \pyca~\cite{pyca-git}, \defmet~\cite{Bone:2018b,Fishbaugh:2017a,deformetrica-git} and \dartel~\cite{Ashburner:2007a}. Other popular packages for deformable registration are \irtk~\cite{Rueckert:1999a}, \elastix~\cite{Klein:2010a}, \niftyreg~\cite{Modat:2010a}, and \fair~\cite{Modersitzki:2009a}. The latter are, with the exception of \fair, based on (low-dimensional) parametric deformation models. Unlike existing approaches, \claire{} features explicit control on the determinant of the deformation gradient; we introduce hard constraints on the divergence of $\vect{v}$. Our formulation was originally proposed in~\cite{Mang:2016a}; a similar approach is described in~\cite{Borzi:2002a}. Other works that consider divergence-free $\vect{v}$ have been described in~\cite{Chen:2011a,Hinkle:2009a,Mansi:2011a,Ruhnau:2007a,Saddi:2008a}. There exist few works on effective numerical methods. Despite the fact that first order methods for optimization have poor convergence rates for nonlinear, ill-posed problems, most works, with the exception of ours~\cite{Mang:2015a,Mang:2016a,Mang:2018a,Mang:2016c,Mang:2017a,Mang:2017b} and~\cite{Ashburner:2011a,Benzi:2011a,Hernandez:2014a,Simoncini:2012a,Vercauteren:2009a,Herzog:2018a}, use first order gradient descent-type approaches. We use a globalized Newton--Krylov method, instead. For these methods to be efficient, it is critical to design an effective preconditioner. (We refer the reader to~\cite{Benzi:2005a} for an overview on preconditioning of saddle point problems.) Preconditioners for problems similar to ours can be found in~\cite{Benzi:2011a,Simoncini:2012a,Herzog:2018a}. Another critical component is the PDE solver. In our case, the expensive PDE operators are hyperbolic transport equations. Several strategies to efficiently solve these equations have been considered in the past~\cite{Borzi:2002a,Mang:2015a,Mang:2017a,Mang:2016a,Polzin:2016a,Hart:2009a,Benzi:2011a,Simoncini:2012a,Beg:2005a,Chen:2011a,Mang:2017c,Mang:2016c}. We use a semi-Lagrangian scheme~\cite{Beg:2005a,Chen:2011a,Mang:2017c,Mang:2016c}. Another key feature of \claire{} is that it can be executed in parallel~\cite{Mang:2016c,Gholami:2017a}. Examples for parallel solvers for PDE-constrained optimization problems can be found in~\cite{Akcelik:2002a,Akcelik:2006a,Biros:1999a,Biros:2005a,Biros:2005b,Biegler:2003a,Biegler:2007a,Schenk:2009a}. We refer the reader to~\cite{Eklund:2013a,Fluck:2011a,Shackleford:2013a,Shams:2010a} for surveys on parallel algorithms for image registration. Implementations, such as \demons~\cite{Vercauteren:2008a,Vercauteren:2009a}, \ants~\cite{Avants:2011a}, or \elastix~\cite{Klein:2010a}, which are largely based on kernels implemented in the \itk\ package~\cite{Johnson:2015a}, exploit multithreading for parallelism. GPU implementations of different variants of map-based, low-dimensional parametric approaches are described in~\cite{Shackleford:2010a,Modat:2010a,Shamonin:2014a}. A GPU implementation of a map-based nonparametric approach is described in~\cite{Koenig:2018a}. GPU implementations with formulations that are similar to ours are described in~\cite{Ha:2009a,Ha:2011a,Sommer:2011a,Rehman:2009a,ValeroLara:2014a,Bone:2018b}. The work that is most closely related to ours, is~\cite{Ha:2009a,Ha:2011a,ValeroLara:2014a}. In~\cite{Ha:2009a,Ha:2011a} a (multi-)GPU implementation of the approach described in~\cite{Joshi:2005a} is presented. The work in~\cite{ValeroLara:2014a} discusses a GPU implementation of \dartel~\cite{Ashburner:2007a}. What sets our work apart are the numerics and our distributed-memory implementation: We use high-order numerical methods (second order time integration, cubic interpolation, and spectral differentiation). The linear solvers and the Gauss--Newton optimizer are built on top of \petsc~\cite{Balay:2016a} and \tao~\cite{Munson:2017a}. Our solver uses MPI for parallelism and has been deployed to HPC systems~\cite{Mang:2016a,Gholami:2017a}. This allows us to target applications of unprecedented scale (such as CLARITY imaging~\cite{Tomer:2014a}) without posing the need to downsample the data~\cite{Kutten:2017a}. We will see that we can solve problems with $\num{3221225472}$ unknowns in \SI{2}{\minute} on 22 compute nodes (256 MPI tasks) and in less than \SI{5}{\second} if we use 342 compute nodes (4096 MPI tasks). Exploiting parallelism also allows us to deliver runtimes that approach real-time capabilities. \begin{figure} \centering \includegraphics[width=0.99\textwidth] {figure01} \caption{We compare results for \claire{} and the diffeomorphic \demons{} algorithm. We consider the first two volumes of the \nirep{} dataset. We report results for the symmetric diffeomorphic \demons{} algorithm (SDDEM) with regularization parameters ($\sigma_d,\sigma_u$) determined by an exhaustive search. We report results for \claire{} for different choices for the regularization parameter for the velocity ($\beta_v=\num{3.7e-3}$ and $\beta_v=\num{5.5e-4}$; determined by a binary search). We show the original mismatch on the left. For each variant of the considered algorithms we show the mismatch after registration and a map for the determinant of the deformation gradient. We report values of the Dice score of the union of all available gray matter labels below the mismatch. We also report the extremal values for the determinant of the deformation gradient. We execute the \demons{} algorithm on one node of the RCDC's Opuntia server (Intel ten-core Xeon E5-2680v2 at \SI{2.8}{\giga\hertz} with \SI{64}{\giga\byte} memory; 2 sockets for a total of 20 cores; \cite{cacds-web}) using 20 threads. We use a grid continuation scheme with 15, 10, and 5 iterations per level, respectively. If we execute \claire{} on the same system, the runtime is \SI{103}{\second} and \SI{202}{\second}, respectively. If we increase the number of iterations of SDDEM to 150, 100, 50 per level, we obtain a dice score of $0.75$ and $0.86$ with a runtime of \SI{322}{\second} and \SI{297}{\second}, respectively. The results for \claire{} are for 16 nodes with 12 MPI tasks per node on TACC's Lonestar 5 system (2-socket Xeon E5-2690 v3 (Haswell) with 12 cores/socket, \SI{64}{\giga\byte} memory per node; \cite{tacc-web}). We execute \claire{} at full resolution using a parameter continuation scheme in $\beta_v$. Detailed results for these runs can be found in the supplementary materials, in particular \tabref{t:nirep-regquality-h1sdiv-3d3e-3}, \tabref{t:nirep-regquality-h1sdiv-5d5e-4}, and \tabref{t:demons-all-nirep-data}.\label{f:claire-exres}} \end{figure} \subsection{Outline} \label{s:outline} We present our approach for large deformation diffeomorphic image registration in~\secref{s:methods}, which comprises the formulation of the problem (see \secref{s:formulation}), a formal presentation of the optimality conditions (see \secref{s:optsys-and-newtonstep}), and a discussion of the numerical implementation (see \secref{s:numerics}). We present details about our software package in \secref{s:software}. Numerical experiments are reported in~\secref{s:experiments}. We conclude with~\secref{s:conclusions}. This publication is accompanied by supplementary materials. There, we report more detailed results and provide some background material. \section{Methods} \label{s:methods} In what follows, we describe the main building blocks of our formulation, our solver, and its implementation, and introduce new features that distinguish this work from our former work~\cite{Mang:2015a,Mang:2016a,Mang:2016c,Gholami:2017a,Mang:2017a,Mang:2017b,Mang:2018a}. \subsection{Formulation} \label{s:formulation} Given two images---the \emph{reference image} $m_R(\vect{x})$ and the \emph{template image} $m_T(\vect{x})$---com\-pact\-ly supported on $\Omega = (0,2\pi)^3\subset\ns{R}^3$, with boundary $\p\Omega$ and closure $\bar{\Omega}$, our aim is to compute a \emph{plausible} deformation map $\vect{y}(\vect{x})$ such that for all $\vect{x}\in\Omega$, $m_R(\vect{x}) \approx m_T(\vect{y}(\vect{x}))$~\cite{Modersitzki:2004a,Modersitzki:2009a,Fischer:2008a}. We consider a map $\vect{y}$ to be plausible if it is a diffeomorphism, i.e., an invertible map, which is continuously differentiable (a $C^1$-function) and maps $\Omega$ onto itself. In our formulation, we do not directly invert for $\vect{y}$; we introduce a pseudo-time variable $t\in[0,1]$ and invert for a \emph{stationary} velocity $\vect{v}(\vect{x})$, instead. In particular, we solve for $\vect{v}(\vect{x})$ and a mass source map $w(\vect{x})$ as follows~\cite{Mang:2016a}: \begin{subequations} \label{e:varopt} \begin{align} \label{e:varopt:objective} \minopt_{m,\,\vect{v},\,w}&\quad \half{1} \iom{(m_1 - m_R)^2} + \half{\beta_v} \langle\dop{B}[\vect{v}],\dop{B}[\vect{v}]\rangle_{L^2(\Omega)^s} + \half{\beta_w} \iom{\igrad w\cdot \igrad w + w^2}\\ \begin{aligned} \label{e:varopt:constraint} \text{subject to}\\\\\\ \end{aligned} & \quad \begin{aligned} \p_t m + \igrad m \cdot \vect{v} & = 0 && {\rm in}\;\Omega\times(0,1]\\ m & = m_T && {\rm in}\;\Omega\times\{0\}\\ \idiv \vect{v} & = w && {\rm in}\;\Omega \end{aligned} \end{align} \end{subequations} \noindent with periodic boundary conditions on $\p\Omega$, and $s>0$, $\beta_v > 0$, $\beta_w > 0$. The state variable $m(\vect{x},t)$ in~\eqref{e:varopt:constraint} represents the transported intensities of $m_T$ subjected to the velocity field $\vect{v}$; the solution of the first equation in~\eqref{e:varopt:constraint}, i.e., $m_1(\vect{x}) \ensuremath{\mathrel{\mathop:}=} m(\vect{x}, t=1)$, is equivalent to $m_T(\vect{y}(\vect{x}))$, where $\vect{y}$ is the Eulerian (or pullback) map. We use a squared $L^2$-distance to measure the proximity between $m_1$ and $m_R$. The parameters $\beta_v>0$ and $\beta_w>0$ control the contribution of the regularization norms for $\vect{v}$ and $w$. The constraint on the divergence of $\vect{v}$ in~\eqref{e:varopt:constraint} allows us to control the compressibility of $\vect{y}$. If we set $w$ in~\eqref{e:varopt:constraint} to zero $\vect{y}$ is incompressible, i.e., for all $\vect{x}\in\Omega$, $\det\igrad\vect{y}(\vect{x})=1$, up to numerical accuracy~\cite{Gurtin:1981a}. By introducing a nonzero mass-source map $w$, we can relax this model to near-incompressible diffeomorphisms $\vect{y}$; the regularization on $w$ in~\eqref{e:varopt:objective} acts like a penalty on the divergence of $\vect{v}$; we use an $H^1$-norm. Our solver supports different Sobolev \mbox{(semi-)}norms to regularize $\vect{v}$. The choice of the differential operator $\dop{B}$ not only depends on application requirements but is also critical from a theoretical point of view; an adequate choice guarantees existence and uniqueness of an optimal solution of the control problem~\cite{Barbu:2016a,Beg:2005a,Borzi:2002a,Chen:2011a,Lee:2010a} (subject to the smoothness properties of the images). We use an $H^1$-seminorm, i.e., $\dop{B} = \igrad$, if we consider the incompressibility constraint. If we neglect the incompressibility constraint, we use $\dop{B} = -\ilap$. We note that \claire{} also features $H^3$ regularization operators, and Helmholtz-type operators (i.e., regularization operators of the form $\dop{B} = -\ilap + \gamma\mat{I}$, $\mat{I} \ensuremath{\mathrel{\mathop:}=} \diag{1,1,1}\in\ns{R}^{3,3}$, $\gamma > 0$, as used, e.g., in \cite{Beg:2005a}). \subsection{Optimality Condition and Newton Step} \label{s:optsys-and-newtonstep} We use the method of Lagrange multipliers~\cite{Lions:1971a} to turn the constrained problem~\eqref{e:varopt} into an unconstrained one; neglecting boundary conditions, the Lagrangian functional is given by \begin{align} \label{e:lagrangian} \fun{L}[m,\lambda,p,w,\vect{v}] \ensuremath{\mathrel{\mathop:}=} & \half{1} \iom{(m_1 - m_R)^2} + \half{\beta_v} \big\langle\dop{B}[\vect{v}],\dop{B}[\vect{v}]\big\rangle_{L^2(\Omega)^s} + \half{\beta_w} \iom{\igrad w\cdot \igrad w + w^2} \\\nonumber + &\int_0^1\! \langle \p_t m + \igrad m \cdot \vect{v},\lambda \rangle_{L^2(\Omega)}\d{t} + \langle m(t=0) - m_T,\lambda(t=0)\rangle_{L^2(\Omega) - \langle \idiv \vect{v} - w,p\rangle_{L^2(\Omega) \end{align} \noindent with Lagrange multipliers $\lambda:\bar{\Omega}\times[0,1]\rightarrow\ns{R}$ for the transport equation~\eqref{e:varopt:constraint}, and $p:\bar{\Omega}\rightarrow\ns{R}$ for the incompressibility constraint~\eqref{e:varopt:constraint}. Formally, we have to compute variations of $\fs{L}$ with respect to the state, adjoint, and control variables. We will only consider a reduced form (after eliminating the incompressibility constraint) of the optimality system---a system of nonlinear PDEs for $m$, $\lambda$, and $\vect{v}$. Details on how we formally arrive at this reduced from can be found in~\cite{Mang:2015a,Mang:2016a} (see also \secref{s:optimality-cond-dev} in the supplementary materials). We eliminate the state and adjoint variables, and iterate in the control space. The evaluation of the reduced gradient $\vect{g}$ (the first variation of the Lagrangian $\fun{L}$ in~\eqref{e:lagrangian} with respect to $\vect{v}$) for a candidate $\vect{v}$ requires several steps. We first solve the transport equation~\eqref{e:varopt:constraint} with initial condition $m(\vect{x},t=0) = m_T(\vect{x})$ forward in time to obtain the state variable $m(\vect{x},t)$ for all $t$. Given $m$, we then compute the adjoint variable $\lambda(\vect{x},t)$ for all $t$ by solving the adjoint equation \begin{subequations} \label{e:adj} \begin{align} -\p_t\lambda - \idiv \lambda\vect{v} & = 0 &&\text{in}\;\;\Omega\times[0,1) \label{e:adj-transport} \\ \lambda &= m_R - m &&{\rm in} \;\; \Omega \times\{1\} \label{e:adj-fc} \end{align} \end{subequations} \noindent with periodic boundary conditions on $\p\Omega$ backward in time. Once we have the adjoint and state fields, we can evaluate the expression for the reduced gradient \begin{equation} \label{e:reduced-gradient} \vect{g}(\vect{v}) \ensuremath{\mathrel{\mathop:}=} \beta_v\dop{A}[\vect{v}] + \dop{K}\big[\iut{\lambda\igrad m}\;\big]. \end{equation} The differential operator $\dop{A} = \dop{B}^\ast\dop{B}$ in~\eqref{e:reduced-gradient} corresponds to the first variation of the regularization norm for $\vect{v}$ in~\eqref{e:lagrangian}, e.g., resulting in an elliptic ($\dop{A} = -\ilap$), biharmonic ($\dop{A} = \ilap^2$) , or triharmonic ($\dop{A} = \ilap^3$) control equation for $\vect{v}$, respectively. The operator $\dop{K}$ projects $\vect{v}$ onto the space of incompressible or near-incompressible velocity fields; we have $\dop{K}\ensuremath{\mathrel{\mathop:}=}\mat{I}-\igrad(\beta_v(\beta_w(-\ilap+\ensuremath{\operatorname{id}}))^{-1}+\ensuremath{\operatorname{id}})^{-1}\ilap^{-1}\idiv$ and $\dop{K}\ensuremath{\mathrel{\mathop:}=}\ensuremath{\operatorname{id}}-\igrad\ilap^{-1}\idiv$ for the incompressible case (see \cite{Mang:2015a,Mang:2016a}). If we neglect the incompressibility constraint~\eqref{e:varopt:constraint}, $\dop{K}$ in~\eqref{e:reduced-gradient} is an identity operator. The dependence of $m$ and $\lambda$ on $\vect{v}$ is ``hidden'' in the transport and continuity equations~\eqref{e:varopt:constraint} and~\eqref{e:adj-transport}, respectively. The first order optimality condition (control or decision equation) requires that $\vect{g}(\vect{v}^\star)=\vect{0}$ for an admissible solution $\vect{v}^\star$ to~\eqref{e:varopt}. Most available registration packages use gradient descent-type optimization schemes to find an optimal point~\cite{Beg:2005a,Hart:2009a,Vialard:2012a}. Newton-type methods are expected to yield better convergence rates~\cite{Nocedal:2006a,Boyd:2004a}. However, if they are implemented naively, they can become computationally prohibitive. The expressions associated with the Newton step of our control problem are formally obtained by computing second variations of the Lagrangian in~\eqref{e:lagrangian}. In \emph{full space methods} we find the Newton updates (i.e., the search direction) for the state, adjoint, and control variables of our control problem simultaneously. That is, we iterate on all variables at once. In \emph{reduced space methods} we only iterate on the control variable $\vect{v}$. Reduced space methods can be obtained from the full space KKT system by block elimination~\cite{Prudencio:2006a,Biros:1999a,Biros:2005a,Biros:2005b}. The associated reduced space Newton system for the incremental control variable $\vect{\tilde{v}}$ (search direction) is given by \begin{equation} \label{e:kkt-system} \dop{H}\vect{\tilde{v}} = - \vect{g}, \end{equation} \noindent where $\vect{g}$ is the reduced gradient in~\eqref{e:reduced-gradient}. The expression for the (reduced space) Hessian matvec (action of $\dop{H}$ on a vector $\vect{\tilde{v}}$) in~\eqref{e:kkt-system} is given by \begin{equation} \label{e:hessian-matvec} \dop{H}[\vect{\tilde{v}}](\vect{v}) \ensuremath{\mathrel{\mathop:}=} \underbrace{ \vphantom{\int_0^1} \beta_v\dop{A}[\vect{\tilde{v}}] }_{\ensuremath{=\mathrel{\mathop:}}\dop{H}_{\text{reg}}[\tilde{v}]} + \underbrace{ \dop{K}\big[ \iut{\tilde{\lambda} \igrad m + \lambda \igrad \tilde{m}} \;\big]}_{\ensuremath{=\mathrel{\mathop:}}\dop{H}_{\text{data}}[\tilde{v}](\vect{v})} =\dop{H}_{\text{reg}}[\tilde{v}] + \dop{H}_{\text{data}}[\tilde{v}](\vect{v}). \end{equation} \noindent We use the notation $\dop{H}[\vect{\tilde{v}}](\vect{v})$ to indicate that the Hessian matvec in~\eqref{e:hessian-matvec} is a function of $\vect{v}$ through a set of PDEs for $m(\vect{x},t)$, $\tilde{m}(\vect{x},t)$, $\lambda(\vect{x},t)$, and $\tilde{\lambda}(\vect{x},t)$. The space-time fields $m$ and $\lambda$ are found during the evaluation of~\eqref{e:varopt:objective} and~\eqref{e:reduced-gradient} for a candidate $\vect{v}$ as described above. What is missing to be able to evaluate~\eqref{e:hessian-matvec} are the fields $\tilde{m}(\vect{x},t)$ and $\tilde{\lambda}(\vect{x},t)$. Given $m(\vect{x},t)$, $\vect{v}(\vect{x})$, and $\vect{\tilde{v}}(\vect{x})$, we find $\tilde{m}(\vect{x},t)$ by solving \begin{subequations} \label{e:inc-state} \begin{align} \p_t \tilde{m} + \igrad \tilde{m} \cdot \vect{v} + \igrad m \cdot \vect{\tilde{v}} & = 0 &&\text{in}\;\; \Omega \times (0,1], \label{e:inc-state-transport}\\ \tilde{m} &= 0 &&\text{in}\;\;\Omega\times\{0\}, \end{align} \end{subequations} \noindent forward in time. Now, given $\tilde{m}(\vect{x},t=1)$, $\lambda(\vect{x},t)$, $\vect{v}(\vect{x})$, and $\vect{\tilde{v}}(\vect{x})$ we solve \begin{subequations} \label{e:inc-adj} \begin{align} -\p_t \tilde{\lambda} - \idiv(\tilde{\lambda}\vect{v} + \lambda\vect{\tilde{v}}) & = 0 &&\text{in}\;\; \Omega \times [0,1), \label{e:inc-adj-transport} \\ \tilde{\lambda} &= -\tilde{m} &&\text{in}\;\;\Omega\times\{1\}, \end{align} \end{subequations} \noindent for $\tilde{\lambda}(\vect{x},t)$ backward in time. \subsection{Numerics} \label{s:numerics} In the following, we describe our distributed-memory solver for 3D diffeomorphic image registration problems. \subsubsection{Discretization} \label{s:discretization} We discretize in space on a regular grid $\Omega^h\in\ns{R}^{3,n_1,n_2,n_3}$ with grid points $\di{x}_{\vect{k}} \ensuremath{\mathrel{\mathop:}=} 2\pi\vect{k}\oslash\vect{n}_x$, $\vect{k}=(k_1,k_2,k_3)^\ensuremath{\mathsf{T}}\in\ns{N}^3$, $-n_i/2 + 1 \leq k_i \leq n_i/2$, $i=1,2,3$, $\vect{n}_x\ensuremath{\mathrel{\mathop:}=} (n_1,n_2,n_3)^\ensuremath{\mathsf{T}} \in\ns{N}^3$ and periodic boundary conditions; $\oslash$ denotes the Hadamard division. In the continuum, we model images as compactly supported (periodic), smooth functions. We apply Gaussian smoothing (in the spectral domain) with a bandwidth of $\vect{h}_x = (h_1,h_2,h_3)^\ensuremath{\mathsf{T}}\in\ns{R}^3$ and mollify the discrete data to meet these requirements. We rescale the images to an intensity range of $[0,1]\subset\ns{R}$ prior to registration. We use a trapezoidal rule for numerical quadrature and a spectral projection scheme for all spatial operations. The mapping between spectral and spatial domain is done using forward and inverse FFTs~\cite{Gholami:2016b}. All spatial derivatives are computed in the spectral domain; we first take the FFT, then apply the appropriate weights to the spectral coefficients, and then take the inverse FFT. This scheme allows us to efficiently and accurately apply differential operators and their inverses. Consequently, the main cost of our scheme is the solution of the transport equations~\eqref{e:varopt:constraint}, \eqref{e:adj-transport}, \eqref{e:inc-state-transport}, and~\eqref{e:inc-adj-transport}, and not the inversion of differential (e.g., elliptic or biharmonic) operators. We use a nodal discretization in time, which results in $n_t+1$ space-time fields for which we need to solve. We use a fully explicit, unconditionally stable semi-Lagrangian scheme~\cite{Staniforth:1991a,Falcone:1998a} to solve the transport equations that appear in our formulation (\eqref{e:varopt:constraint},~\eqref{e:adj-transport},~\eqref{e:inc-state-transport}, and~\eqref{e:inc-adj-transport}). This allows us to keep $n_t$ small (we found empirically that $n_t=4$ yields a good compromise between runtime and numerical accuracy). The time integration steps in our semi-Lagrangian scheme are implemented using a fully explicit 2nd order Runge--Kutta scheme. Interpolations are carried out using third-degree polynomials. Details for our semi-Lagrangian scheme can be found in~\cite{Mang:2016c,Mang:2017b,Gholami:2017a}. \subsubsection{Newton--Krylov Solver} \label{e:newton-krylov-solver} A prototype implementation of our Newton--Krylov solver is described in~\cite{Mang:2015a,Mang:2017b}. We have already mentioned in~\secref{s:optsys-and-newtonstep} that we use a reduced space method. That is, we only iterate on the reduced space for the control variable $\di{v}\in\ns{R}^n$, $n=3n_1n_2n_3$. We globalize our method using an Armijo linesearch, resulting in the iterative scheme \begin{equation} \label{e:newton-step} \di{v}_{k+1} = \di{v}_k + \alpha_k \di{\tilde{v}}_k, \qquad \di{H}_k \di{\tilde{v}}_k = - \di{g}_k, \end{equation} \noindent with iteration index $k$, step length $\alpha_k \geq 0$, iterate $\di{v}_k\in\ns{R}^n$, search direction $\di{\tilde{v}}_k\in\ns{R}^n$, reduced gradient $\di{g}_k\in\ns{R}^n$ (see \eqref{e:reduced-gradient} for the continuous equivalent), and reduced space Hessian $\di{H}_k \in\ns{R}^{n,n}$, where \[\di{H}_k = \di{H}_{\text{reg}} + \di{H}_{\text{data},k}.\] (See \eqref{e:hessian-matvec} for an expression for the Hessian matvec in the continuous setting.) We refer to the steps for updating $\di{v}_k$ as outer iterations and the steps for computing the search direction $\di{\tilde{v}}_k$ as inner iterations. \begin{algorithm} \caption{Inexact Newton--Krylov method (outer iterations). We use the relative norm of the reduced gradient (with tolerance $\epsilon_{\text{opt}} > 0$ as stopping criterion.} \label{a:outer-iteration} \centering\small\renewcommand\arraystretch{1.2} \begin{algorithmic}[1] \STATE{initial guess $\di{v}_0 \leftarrow \dig{0}$, $k\leftarrow0$} \STATE{$\di{m}_0 \leftarrow$ solve state equation in~\eqref{e:varopt:constraint} forward in time given $\di{v}_0$} \STATE{$j_0 \leftarrow$ evaluate objective functional~\eqref{e:varopt:objective} given $\di{m}_0$ and $\di{v}_0$} \STATE{$\dig{\lambda}_0 \leftarrow$ solve adjoint equation~\eqref{e:adj-transport} backward in time given $\di{v}_0$ and $\di{m}_0$} \STATE{$\di{g}_0 \leftarrow$ evaluate reduced gradient~\eqref{e:reduced-gradient} given $\di{m}_0$, $\dig{\lambda}_0$ and $\di{v}_0$} \WHILE{$\|\di{g}_k\|^2_2 > \|\di{g}_0\|_2^2\epsilon_{\text{opt}}$\label{alg:stop-newton}} \STATE{$\di{\tilde{v}}_k\leftarrow$ solve $\di{H}_k \di{\tilde{v}}_k = -\di{g}_k$ given $\di{m}_k$, $\dig{\lambda}_k$, $\di{v}_k$, and $\di{g}_k$ (see \algref{a:inner-iteration})} \STATE{$\alpha_k \leftarrow$ perform line search on $\di{\tilde{v}}_k$ subject to Armijo condition} \STATE{$\di{v}_{k+1} \leftarrow \di{v}_k + \alpha_k\di{\tilde{v}}_k$} \STATE{$\di{m}_{k+1} \leftarrow$ solve state equation~\eqref{e:varopt:constraint} forward in time given $\di{v}_{k+1}$} \STATE{$j_{k+1} \leftarrow$ evaluate~\eqref{e:varopt:objective} given $\di{m}_{k+1}$ and $\di{v}_{k+1}$} \STATE{$\dig{\lambda}_{k+1} \leftarrow$ solve adjoint equation~\eqref{e:adj-transport} backward in time given $\di{v}_{k+1}$ and $\di{m}_{k+1}$} \STATE{$\di{g}_{k+1} \leftarrow$ evaluate~\eqref{e:reduced-gradient} given $\di{m}_{k+1}$, $\dig{\lambda}_{k+1}$ and $\di{v}_{k+1}$} \STATE{$k \leftarrow k + 1$} \ENDWHILE \end{algorithmic} \end{algorithm} \begin{algorithm} \caption{Newton step (inner iterations). We illustrate the solution of the reduced KKT system~\eqref{e:kkt-system} using a PCG method at a given outer iteration $k\in\ns{N}$. We use a superlinear forcing sequence to compute the tolerance $\eta_k$ for the PCG method (inexact solve).} \label{a:inner-iteration} \centering\small\renewcommand\arraystretch{1.2} \begin{algorithmic}[1] \STATE{input: $\di{m}_k$, $\dig{\lambda}_k$, $\di{v}_k$, $\di{g}_k$, $\di{g}_0$} \STATE{set $\epsilon_H \leftarrow\min(0.5,(\|\di{g}_k\|_2/\|\di{g}_0\|_2)^{1/2})$, $\di{\tilde{v}}_0 \leftarrow \dig{0}$, $\di{r}_0 \leftarrow - \di{g}_k$ \label{alg:init}} \STATE{$\di{z}_0 \leftarrow$ apply preconditioner $\di{M}^{-1}$ to $\di{r}_0$} \STATE{$\di{s}_0 \leftarrow \di{z}_0$, $\iota\leftarrow 0$} \WHILE{$\iota < n$} \STATE{$\di{\tilde{m}}_\iota \leftarrow$ solve incremental state equation~\eqref{e:inc-state} forward in time given $\di{m}_k$, $\di{v}_k$ and $\di{\tilde{v}}_\iota$\label{alg:inc-state}} \STATE{$\dig{\tilde{\lambda}}_\iota \leftarrow$ solve incremental adjoint equation~\eqref{e:inc-adj} backward in time given $\dig{\lambda}_k$, $\di{v}_k$, $\di{\tilde{m}}_\iota$ and $\di{\tilde{v}}_\iota$\label{alg:inc-adjoint}} \STATE{$\di{\tilde{s}}_\iota \leftarrow$ apply $\di{H}_\iota$ to $\vect{s}_\iota$ given $\dig{\lambda}_k$, $\di{m}_k$, $\di{\tilde{m}}_\iota$ and $\dig{\tilde{\lambda}}_\iota$ (Hessian matvec; see \eqref{e:hessian-matvec})} \STATE{$\kappa_\iota \leftarrow\langle\di{r}_\iota,\di{z}_\iota\rangle/\langle\di{s}_\iota,\di{\tilde{s}}_\iota\rangle$, \quad $\di{\tilde{v}}_{\iota+1} \leftarrow \di{\tilde{v}}_\iota + \kappa_\iota\di{s}_\iota$, \quad $\di{r}_{\iota+1}\leftarrow\di{r}_\iota-\kappa_\iota\di{\tilde{s}}_\iota$} \STATE{\textbf{if} $\|\di{r}_{\iota+1}\|_2 < \epsilon_H$ \textbf{break}\label{alg:forcing}} \STATE{$\di{z}_{\iota+1} \leftarrow$ apply preconditioner $\di{M}^{-1}$ to $\di{r}_{\iota+1}$} \STATE{$\mu_\iota \leftarrow \langle\di{z}_{\iota+1},\di{r}_{\iota+1}\rangle/\langle\di{z}_\iota,\di{r}_\iota\rangle$, \quad $\di{s}_{\iota+1} \leftarrow \di{z}_{\iota+1} + \mu_\iota\di{s}_\iota$, \quad $\iota \leftarrow \iota + 1$} \ENDWHILE \STATE{output: $\di{\tilde{v}}_k \leftarrow\di{\tilde{v}}_{\iota+1}$} \end{algorithmic} \end{algorithm} In what follows, we drop the dependence on the (outer) iteration index $k$ for notational convenience. The data term $\di{H}_{\text{data}}$ of the reduced space Hessian $\di{H}$ in~\eqref{e:newton-step} involves inverses of the state and adjoint operators (a consequence of the block elimination in reduced space methods; see~\secref{s:optsys-and-newtonstep}). This makes $\di{H}$ a nonlocal, dense operator that is too large to be computed and stored. (We have seen in~\secref{s:optsys-and-newtonstep} that each matvec given by~\eqref{e:hessian-matvec} requires the solution of~\eqref{e:inc-state} forward in time and~\eqref{e:inc-adj} backward in time; see also lines~\ref{alg:inc-state} and \ref{alg:inc-adjoint} in \algref{a:inner-iteration}. So, to form $\di{H}$ we require a total of $2n$ PDE solves per outer iteration $k$.) Consequently, direct methods to solve the linear system in~\eqref{e:newton-step} are not applicable. We use iterative, matrix-free Krylov subspace methods instead. They only require an expression for the action of $\di{H}$ on a vector, which is precisely what we are given in~\eqref{e:hessian-matvec}. We use a PCG method~\cite{Hestenes:1952a} under the assumption that $\di{H}$ is a symmetric, positive (semi-)definite operator. To reduce computational costs, we do not solve the linear system in~\eqref{e:newton-step} exactly. Instead, we use a tolerance $\epsilon_H>0$ that is proportional to the norm of $\di{g}$ (see lines~\ref{alg:init} and~\ref{alg:forcing} in \algref{a:inner-iteration}; details can be found in~\cite{Dembo:1982a,Eisenstat:1996a} and~\cite[p.~166ff]{Nocedal:2006a}). We summarize the steps for the outer and inner iterations of our Newton--Krylov solver in~\algref{a:outer-iteration} and~\algref{a:inner-iteration}, respectively. Since we are solving a non-convex problem it is not guaranteed that the Hessian $\di{H}$ is positive definite. As a remedy, we use a Gauss--Newton approximation $\di{\tilde{H}}$ to $\di{H}$; doing so guarantees that $\di{\tilde{H}} \succeq 0$ far away from the (local) optimum. This corresponds to dropping all terms in~\eqref{e:hessian-matvec} and~\eqref{e:inc-adj} that involve the adjoint variable $\lambda$. We expect the rate of convergence of our solver to drop from quadratic to superlinear. As $\lambda$ tends to zero (i.e., the mismatch goes to zero), we recover quadratic convergence. We terminate the inversion if the $\ell^2$-norm of the gradient in~\eqref{e:reduced-gradient} is reduced by a factor of $\epsilon_g>0$, i.e., if $\|\di{g}_k\|_2^2 < \epsilon_{\text{opt}}\|\di{g}_0\|_2^2$, where $\di{g}_k\in\ns{R}^n$ is the gradient at (outer) iteration $k\in\ns{N}_0$ and $\di{g}_0$ is the gradient for the initial guess $\di{v}_0 = \vect{0}$ (see line~\ref{alg:stop-newton} in \algref{a:outer-iteration}). In most of our experiments, we use $\epsilon_g=\num{5E-2}$. We also provide an option to set a lower bound for the absolute $\ell^2$-norm of the gradient (the default value is $\num{1E-6}$). \claire{} also features other stopping criteria discussed in~\cite{Modersitzki:2009a,Gill:1981a,Mang:2015a} (not considered in this work). \subsubsection{Preconditioners for Reduced Space Hessian} We have seen that we need to solve two PDEs every time $\di{H}$ is applied to a vector. These PDE solves are the most expensive part of our solver. Consequently, we have to keep the number of Hessian matvecs small for our solver to be efficient. This necessitates the design of an effective preconditioner $\di{M}$. The speed of convergence of the linear solver used to compute the search direction $\di{\tilde{v}}$ in~\eqref{e:newton-step} depends on the distance of $\di{M}^{-1}\di{H}$ from identity; ideally, the spectrum of $\di{M}^{-1}\di{H}$ is clustered around one. We cannot form and store $\di{H}$ (too expensive). Moreover, we know that large eigenvalues of $\di{H}$ are associated with smooth eigenvectors~\cite{Mang:2015a}. Consequently, standard preconditioners for linear systems are not applicable. In our former work, we have considered two matrix-free preconditioners. Our first preconditioner is based on the (exact) inverse of the regularization operator $\di{H}_{\text{reg}}$; the regularization preconditioned Hessian is given by $\mat{I} + \di{H}_{\text{reg}}^{-1} \di{H}_{\text{data}}$. This is a common choice in PDE-constrained optimization problems~\cite{Alexanderian:2016a,BuiThanh:2013a}. We used this preconditioner in~\cite{Mang:2015a,Mang:2016a,Mang:2016c,Mang:2017a,Mang:2018a}. \begin{remark} $\di{H}_{\text{reg}}$ is a discrete representation of the regularization operator. The computational costs for inverting and applying this operator are negligible (two FFTs and a diagonal scaling). Notice that the operator $\di{H}_{\text{reg}}$ is singular if we consider a seminorm as regularization model in~\eqref{e:varopt}. We bypass this problem by setting the zero singular values of the regularization operator to one before computing the inverse. \end{remark} The second preconditioner uses an inexact inverse of a coarse grid approximation to the Hessian $\di{H}$. This preconditioner was proposed and tested in~\cite{Mang:2017b} for the 2D case. A similar preconditioner has been developed in~\cite{Adavani:2008a,Biros:2008a}. It is based on the conceptual idea that we can decompose the reduced Hessian $\di{H}$ into two operators $\di{H}_L$ and $\di{H}_H$ that act on the high and low frequency parts of a given vector $\di{\tilde{v}}$, respectively~\cite{Adavani:2008a,Biros:2008a,Giraud:2006a,Kaltenbacher:2003a,Kaltenbacher:2001a,King:1990a}. We denote the operators that project on the low and high frequency subspaces by $\di{F}_L : \ns{R}^n \to \ns{R}^n$ and $\di{F}_H : \ns{R}^n \to \ns{R}^n$, respectively. With $\di{F}_H + \di{F}_L = \di{I}$, we have \[ \di{H}\di{e}_k = (\di{F}_H + \di{F}_L)\di{H}(\di{F}_H + \di{F}_L)\di{e}_k = \di{F}_H\di{H}\di{F}_H\di{e}_k + \di{F}_L\di{H}\di{F}_L\di{e}_k, \] \noindent under the assumption that the unit vector $\di{e}_k\in \ns{R}^n$, $(\di{e}_k)_i = 1$ if $k=i$ and $(\di{e}_k)_i = 0$ for $i\not=k$, $i,k=1,\ldots,n$, is an eigenvector of $\di{H}$ so that $(\di{F}_L\di{H}\di{F}_H)\di{e}_k = (\di{F}_H\di{H}\di{F}_L)\di{e}_k = \di{0}$. We note that this assumption will not hold in general. However, since we are only interested in developing a preconditioner, an approximate decomposition of the solution of the reduced space system is acceptable. Using this approximation we can represent the solution of $\di{H} \di{\tilde{v}} = -\di{g}$ as $\di{\tilde{v}} = \di{\tilde{v}}_L + \di{\tilde{v}}_H$, where $\di{\tilde{v}}_L$ and $\di{\tilde{v}}_H$ are found by solving \[\di{H}_L\di{\tilde{v}}_L = (\di{F}_L\di{H}\di{F}_L)\di{\tilde{v}}_L = -\di{F}_L\di{g} \quad\text{and}\quad \di{H}_H\di{\tilde{v}}_H = (\di{F}_H\di{H}\di{F}_H)\di{\tilde{v}}_H = -\di{F}_H\di{g},\] respectively. We discuss how we use this decomposition to design a preconditioner, next. Let $\di{s}\in\ns{R}^n$ denote the vector we apply our preconditioner to. Since we use an approximation of the inverse of $\di{H}$, we have to design a scheme for approximately solving $\di{H} \di{u} = \di{s}$. We find the smooth part of $\di{u}$ by (iteratively) solving \begin{equation} \label{e:coarse-grid-hessian} \di{\bar{H}}\di{\bar{u}}_L = \di{Q}_R\di{F}_L\di{s}, \end{equation} \noindent where $\bar{\di{H}}\in\ns{R}^{c,c}$ and $\di{\bar{u}}_L\in\ns{R}^c$ represent coarse grid approximations of $\di{H}_L$ and $\di{u}_L$, respectively, and $\di{Q}_R : \ns{R}^n \to \ns{R}^{c}$ is a restriction operator. We do not iterate on the oscillatory components of $\di{s}$ (i.e., we replace $\di{H}_H$ by $\di{I}$). The solution $\di{u}$ of $\di{H} \di{u} = \di{s}$ is given by $\di{u} = \di{u}_L + \di{u}_H \approx \di{Q}_P\di{F}_L\di{\bar{u}}_L + \di{F}_H\di{s}$, where $\di{\bar{u}}_L \approx \di{\bar{H}}^{-1}\di{Q}_R\di{F}_L\di{s}$ and $\di{Q}_P : \ns{R}^{c} \to \ns{R}^n$ is a prolongation operator. We use spectral restriction and prolongation operators. The projection operators $\di{F}_L$ and $\di{F}_H$ are implemented as cut-off filters in the frequency domain. An important aspect of our approach is that we do not apply our two-level preconditioner to the original Hessian $\di{H}$. Since we can invert $\di{H}_{\text{reg}}\succeq 0$ explicitly, we consider the (symmetric) regularization split-preconditioned system $ (\di{I} + \di{H}_{\text{reg}}^{\nicefrac{-1}{2}} \di{H}_{\text{data}}\di{H}_{\text{reg}}^{\nicefrac{-1}{2}}) \di{w} = - \di{H}_{\text{reg}}^{\nicefrac{-1}{2}} \di{g} $ instead, where $\di{w} \ensuremath{\mathrel{\mathop:}=} \di{H}_{\text{reg}}^{\nicefrac{1}{2}} \di{\tilde{v}}$. Notice that the inverse of $\di{H}_{\text{reg}}$ acts as a smoother. This allows us to get away with not treating high-frequency errors in our scheme. Our approach can be interpreted as an approximate two-level multigrid V-cycle with an explicit (algebraic) smoother given by $\di{H}_{\text{reg}}^{\nicefrac{-1}{2}}$. The final questions are how to discretize and solve~\eqref{e:coarse-grid-hessian}. We can use a Galerkin or a direct (non-Galerkin) discretization to implement the coarse grid operator $\di{\bar{H}}$. Using the fact that $\di{Q}_R$ and $\di{Q}_P$ are adjoint operators, the Galerkin discretization is formally given by $\di{\bar{H}} = \di{Q}_R\di{H}\di{Q}_P$~\cite[p.~75]{Briggs:2000a}. The drawback of using a Galerkin operator is that every matvec requires the solution of the incremental forward and adjoint equations on the fine grid. This is different if we directly discretize the matvec on the coarse grid. To save computational costs, we opt for this approach. For the iterative solver to approximately invert $\di{\bar{H}}$ we have tested several variants, all of which are available in \claire. We can use a nested PCG. This requires a tolerance $\epsilon_M > 0$ for the nested solver for the preconditioner that is only a fraction of the tolerance used to solve for the Newton step $\di{\tilde{v}}$ on the fine grid, i.e., $\epsilon_M = \kappa\epsilon_H$ with $\kappa\in(0,1)$. This is due to the fact that Krylov subspace methods are nonlinear operators. We refer to this solver as PCG($\kappa$). Another possibility is to use a semi-iterative Chebyshev method~\cite{Gutknecht:2002a} with a predefined number of iterations $k > 0$; this results in a fixed linear operator for a particular choice of eigenvalue bounds~\cite{Golub:1961a}. The eigenvalue bounds can be estimated using a Lanczos method. We refer to this strategy as CHEB($k$). If we would like to use PCG with a fixed number of iterations as a nested solver, we can also replace the solver for the Newton step with a flexible Krylov subspace method~\cite{Axelsson:1991a,Notay:2000a}. We observed that the performance of this approach deteriorates significantly as we reduce the regularization parameter. We disregard this approach. \section{Implementation and Software Aspects} \label{s:software} We make \claire{} available under GPL license. \claire{} is written in C/C\texttt{++} and implements data parallelism via MPI. The source code can be downloaded from the \sw{github} repository~\cite{claire-web} at \begin{center} \url{https://github.com/andreasmang/claire}. \end{center} The URL for the deployment page of \claire{} is \url{https://andreasmang.github.io/claire}. Here, one can find a detailed documentation as well as use cases for \claire{}. In what follows, we \begin{inparaenum}[(\itshape i\upshape)]\item describe implementation aspects, \item list features implemented in \claire{}, and \item provide information relevant to potential users of \claire{}\end{inparaenum}. It is important to note that we will not be able to cover all implementation aspects, and we are continuously making improvements to our software. We refer the reader to the deployment page for updates and detailed information on how to compile, execute, and run \claire{} on various systems. As we have mentioned above, \claire{} is written in C\texttt{++}. The main functionalities of \claire{} are implemented in \texttt{CLAIRE.cpp}. Different formulations are implemented using derived classes. The distance measures and regularization operators supported by \claire{} are, like most of the building blocks of \claire{}, implemented through classes (again, using inheritance). We provide interfaces to the main \petsc{} functionalities through functions. \subsection{Executables} \claire{} has two main executables, \texttt{claire} and \texttt{clairetools}. The registration solver can be executed with the \texttt{claire} executable. The \texttt{clairetools} executable serves as a postprocessing tool that allows users to, e.g., compute deformation measures (examples include the deformation map $\vect{y}$, the determinant of the deformation gradient, or a RAVENS map), or transport images or label maps for the evaluation of registration performance. We will keep adding features to these executables in future releases. Both executables provide a help message that briefly explains to users how to control the behavior, how to set parameters, and what features are provided. To access this help message, the user can simply execute the binaries without any parameters or add a \texttt{-help} flag to the executable (i.e., for instance execute \texttt{claire -help} from the command line window). The main output of \texttt{claire} is the computed velocity field. These fields can subsequently be used within \texttt{clairetools} to compute additional outputs. We explain the most common options for both executables in greater detail on the deployment page / in the \texttt{README} files for the repository. \subsection{External Dependencies and IO} \claire{} depends on four main software packages. We use the \petsc{} library~\cite{Balay:2016a,petsc-web} for linear algebra, and \petsc{}'s \tao{} package~\cite{Munson:2017a,petsc-web} for numerical optimization (\tao{} is included in \petsc). We use the \accfft{} package~\cite{accfft-web,Gholami:2016b}---a parallel, open-source FFT library for CPU/GPU architectures developed in our group---to apply spectral operators. \accfft{} requires \fftw~\cite{Frigo:2005a,fftw-web}. We use \sw{niftilib}~\cite{niftilib-web} for IO. As such, \claire{} currently supports IO of (uncompressed and compressed in \texttt{gzip} format) files in \texttt{nifti-1} (\texttt{*.nii} or \texttt{*.nii.gz}) and Analyze 7.5 (\texttt{*.hdr} and \texttt{*.img}/\texttt{*.img.gz}) format. The default output format of \claire{} is in \texttt{*.nii.gz}. We optionally support the \sw{PnetCDF} format (\texttt{*.nc})~\cite{Li:2003a,pnetcdf-web} for IO in parallel. The revision and version numbers for these libraries used in our experiments can be found in the references. \subsection{Compilation and Installation} Our solver supports single and double precision. (The precision is handed down from the \petsc{} library.) Our current software uses \texttt{make} for compilation. We provide scripts in the repository to download and compile the external libraries mentioned above using default settings that have worked most consistently on the systems on which we have executed \claire{}. Switches for controlling the precision are provided in the \texttt{makefile}. The user needs to compile \petsc{} and \fftw{} in single precision to be able to run \claire{} in single precision. We have compiled, tested, and executed \claire{} on HPC systems at TACC~\cite{tacc-web} (Stampede, Stampede 2, Lonestar 5, and Maverick), at HLRS (Hazelhen/CRAY XC40)~\cite{hlrs-web} and at RCDC~\cite{cacds-web} (Opuntia and Sabine). Specifications of some of these systems can be found in \secref{s:compute-systems}. While we recommend the execution of \claire{} on multicore systems (to reduce the runtime), it is not a prerequisite to have access to HPC systems. \claire{} has been successfully executed on personal computers and local compute servers with no internode communication. Large-scale systems are only required to significantly reduce the runtime or when considering large-scale applications (image sizes of $512^3$ and beyond). We provide additional help for compilation and installation of \claire{} in the repository. \subsection{Parallel Algorithms and Computational Kernels} The main computational kernels of \claire{} are FFTs (spectral methods) and scattered data interpolation operations (semi-Lagrangian solver; see~\cite{Mang:2016c,Mang:2017b,Gholami:2017a} for details). We use the \accfft{} package~\cite{accfft-web,Gholami:2016b} to perform spectral operations (a software package developed by our group). This package dictates the data layout on multicore systems: We partition the data based on a pencil decomposition for 3D FFTs~\cite{Grama:2003a,Czechowski:2012a}. Let $n_p=p_1p_2$ denote the number of MPI tasks. Then each MPI task gets $(\nicefrac{n_1}{p_1})\times(\nicefrac{n_2}{p_2})\times n_3$ grid points. That is, we partition the domain $\dig{\Omega}$ of size $3\times n_1\times n_2 \times n_3$ along the $x_1$- and $x_2$-axes into subdomains $\dig{\Omega}_i$, $i=1,\ldots,n_p$, of size $3\times (\nicefrac{n_1}{p_1})\times (\nicefrac{n_2}{p_2})\times n_3$. There is no partitioning in time. The scalability of the 3D FFT is well explored~\cite{Grama:2003a,Czechowski:2012a,Gholami:2016b}. We refer the reader to~\cite{Gholami:2016b,Mang:2016a} for scalability results for \accfft. If we assume that the number of grid points $n_i$, $i=1,2,3$, is equal along each spatial direction, i.e., $\tilde{n} = n_1 = n_2 = n_3$, each 3D FFT requires $\dop{O}(\nicefrac{3\tilde{n}\log(\tilde{n})}{2n_p})$ computations and $\dop{O}(2\sqrt{\vphantom{b}n_p}t_s+(\nicefrac{2\tilde{n}^3}{n_p})t_w)$ communications, where $t_s> 0$ is the startup time for the data transfer and $t_w>0$ represents the per-word transfer time~\cite{Grama:2003a}. The parallel implementation of our interpolation kernel is introduced in~\cite{Mang:2016c} and improved in~\cite{Gholami:2017a}. We use a tricubic interpolation model to evaluate off-grid points in our semi-Lagrangian scheme (see \cite{Mang:2016c,Mang:2017b} for a detailed description of our solver). The polynomial is implemented in Lagrange form. The evaluation of the interpolation kernel requires the computation of 12 basis polynomials. The local support of the cubic basis is $4^3$ grid points. Overall, this results in a complexity of $\dop{O}(256\nicefrac{\tilde{n}^3}{n_p})$ computations. We have implemented an SIMD vectorization based on advanced vector extensions (AVX2) for Haswell architectures for the evaluation of the interpolation kernel (available for single precision only). Compared to our initial work in~\cite{Mang:2016c} our method is now bound by communication time instead of time spent in the interpolation. The communication costs are more difficult to estimate; they not only depend on the data layout but also on the characteristics obtained for a given velocity field. If a departure point is owned by the current processor, we require no communication. If the values for a departure point are owned by another processor/MPI task (the \emph{worker}), we communicate the coordinates from the \emph{owner} to the worker. We then evaluate the interpolation model on the worker and communicate the result back to the owner. This results in a communication cost of $4t_w$ per off-grid point not owned by a processor. To evaluate the interpolation model at off-grid points not owned by any MPI task (i.e., located in between the subdomains $\dig{\Omega}_i$), we add a layer of four ghost points (scalar values to be interpolated; see~\figref{f:sl-scheme}, right). This results in an additional communication cost of $n_s(2n_3(\nicefrac{n_1}{p_1} + \nicefrac{n_2}{p_2})t_w) + 4t_s$ for each MPI task for the four face neighbors, where $n_s$ is the size of layer for the ghost points (in our case four). The communication with the four corner neighbors can be combined with the messages of the edge neighbors, by appropriate ordering of the messages. Notice that the communication of the departure points (for the forward and backward characteristics) needs to be performed only once per Newton iteration, since our velocity field is stationary. We perform this communication when we evaluate the forward and the adjoint operators, i.e., during the evaluation of the objective functional and the reduced gradient. \begin{figure} \centering \includegraphics[totalheight=3cm] {figure02} \caption{2D illustration of the data layout and the communication steps for the evaluation of the interpolation kernel. The original grid at timepoint $t^{k+1}$ is distributed across $n_p=4$ processors P$i$, $i=1,2,3,4$. To solve the transport problem using a semi-Lagrangian scheme, we have to trace a characteristic for each grid point $\di{x}_{\vect{l}}$ backward in time (see~\cite{Mang:2016c,Mang:2017b,Gholami:2017a} for details). This requires a scattered data interpolation step. The deformed configuration of the grid (i.e., the departure points) originally owned by P4 (red points) are displayed in overlay. We illustrate three scenarios: The departure point is located (i) on P4 (left; $\di{x}_{\vect{i}}\to \di{\tilde{y}}_{\vect{i}}$), (ii) on a different processor P1 (left; $\di{x}_{\vect{j}}\to\di{\tilde{y}}_{\vect{j}}$), and (iii) between processors P3 and P4 (right). For the first case, no communication is required. The second case requires the communication of $\di{\tilde{y}}_{\vect{j}}$ to P1, and the communication of the interpolation result back to P4. For the third case, we add a ghost layer with a size equal to the support of the interpolation kernel (4 grid points in our case) to each processor; the evaluation of the interpolation happens on the same processor (like in the first case). Notice that the communication of the departure points (for the forward and backward characteristics) needs to be performed only once per Newton iteration, since the velocity field is stationary.\label{f:sl-scheme}} \end{figure} \subsection{Memory Requirements} In our most recent implementation, we have reduced the memory footprint for the Gauss--Newton approximation; we only store the time history of the state and incremental state variables. This is accomplished by evaluating the time integrals that appear in the reduced gradient in~\eqref{e:reduced-gradient} and the Hessian matvec in~\eqref{e:hessian-matvec} simultaneously with the time integration of the adjoint and incremental adjoint equations~\eqref{e:adj} and~\eqref{e:inc-adj}, respectively. With this we can reduce the memory pressure from $\dop{O}((2n_t +8)n_1n_2n_3)$ (full Newton) to $\dop{O}((n_t + 7)n_1n_2n_3)$ (Gauss--Newton) for the gradient (see \eqref{e:reduced-gradient}) and from $\dop{O}((4n_t + 13)n_1n_2n_3)$ (full Newton) to $\dop{O}((n_t + 10)n_1n_2n_3)$ (Gauss--Newton) for the Hessian matvec (see \eqref{e:hessian-matvec}), respectively. Notice that we require $0.5\times$ the memory of the Hessian matvec, if we consider the two-level preconditioner. The spectral preconditioner does not add to the memory pressure. \subsection{Additional Software Features} We provide schemes for automatically selecting an adequate regularization parameter. This a topic of research by itself~\cite{Hansen:1998a,Haber:2000b}. Disregarding theoretical requirements~\cite{Beg:2005a,Dupuis:1998a,Trouve:1998a}, one in practice typically selects an adequate regularization norm based on application requirements. From a practical point of view we are interested in computing velocities for which the determinant of the deformation map does not change sign/is strictly positive for every point inside the domain. This guarantees that the transformation is locally diffeomorphic (subject to numerical accuracy). Consequently, we determine the regularization parameter $\beta_v$ for the Sobolev norm for the velocity based on a binary search (this strategy was originally proposed in~\cite{Mang:2015a}; a similar strategy is described in~\cite{Haber:2000b}). We control the search based on a bound for the determinant of the deformation gradient. That is, we choose $\beta_v$ so that the determinant of the deformation gradient is bounded below by $\epsilon_J$ and bounded above by $1/\epsilon_J$, where $\epsilon_J \in (0,1)$ is a user defined parameter. This search is expensive, since it requires a repeated solution of the inverse problem. (For each trial $\beta_v$ we iterate until we meet the convergence criteria for our Newton solver and then use the obtained velocity as an initial guess for the next $\beta_v$.) We assume that, once we have found an adequate $\beta_v$, we can use this parameter for similar registration problems. Such cohort studies are quite typical in medical imaging. \claire{} features several well established schemes to accelerate the rate of convergence and reduce the likelihood to get trapped in local minima. The user can choose between \begin{inparaenum}[(\itshape i\upshape)]\item parameter continuation in $\beta_v$ (starting with a default value of $\beta_v=1$ we reduce $\beta_v$ until we reach a user defined parameter $\beta_v^\star$; we found this scheme to perform best), \item grid continuation, i.e., a coarse-to-fine multi-resolution scheme with a smoothing of $\sigma = 1$ voxels (consequently, the standard deviation increases for coarser grids), and \item scale continuation using a scale-space representation of the image data (again, coarse-to-fine).\end{inparaenum} We summarize the critical parameters of \claire{} in~\tabref{t:claire-parameters}. \begin{table} \centering\scriptsize \caption{Parameters available in \claire{} (there are more, but these are the critical ones).\label{t:claire-parameters}} \begin{tabular}{llll}\toprule variable & meaning & suggested value & determined automatically \\ \midrule $\beta_v$ & regularization parameter for $\vect{v}$ & --- & yes \\ $\beta_w$ & regularization parameter for $w$ & \num{1e-4} & no \\ $\epsilon_g$ & relative tolerance for gradient & \num{5e-2} & no \\ $n_t$ & number of time steps & 4 & no \\ $\epsilon_j$ & bound for $\det\igrad\vect{y}^{-1}$ & 0.25 ($H^1$-div) or 0.1 ($H^2$) & no \\ \bottomrule \end{tabular} \end{table} \section{Experiments} \label{s:experiments} We evaluate the registration accuracy for 16 segmented MRI brain volumes~\cite{Christensen:2006a}. Details on the considered datasets can be found in~\secref{s:data}. We showcase two exemplary datasets in~\figref{f:nirep-data}. Notice that these datasets have been rigidly preregistered. We directly apply our method to this data (without an additional affine preregistration step). The runs were executed on the RCDC's Opuntia server or on TACC's Lonestar 5 system. The specs of these systems can be found below. Notice that we accompany this document with \emph{supplementary materials} that provide more detailed results for some of the experiments conducted in this study. For \claire{} we consider two models: \begin{inparaenum}[(\itshape i\upshape)] \item \textbf{\textit{$H^1$-div regularization}}: $H^1$-seminorm for the regularization model for the velocity field (controlled by $\beta_v$; $\dop{B} = \igrad$) in combination with a penalty for the divergence of $\vect{v}$ (controlled by $\beta_w$, which is fixed to $\beta_w = \num{1e-4}$). \item \textbf{\textit{$H^2$ regularization}}: $H^2$-seminorm for the regularization model for the velocity field (controlled by $\beta_v$; $\dop{B} = -\ilap$). No penalty for the divergence of $\vect{v}$ is added\end{inparaenum}. \begin{figure*} \centering \includegraphics[width=0.8\textwidth] {figure03} \caption{Illustration of exemplary images from the \nirep{} data~\cite{Christensen:2006a}. Left: Volume rendering of an exemplary reference image $m_R(\vect{x})$ (dataset {\tt na01}) and an exemplary template image $m_T(\vect{x})$ (dataset {\tt na03}), respectively. Right: Axial slice for these datasets together with label maps associated with these data. Each color corresponds to one of the 32 individual anatomical gray matter regions that serve as a ground truth to evaluate the registration performance.} \label{f:nirep-data} \end{figure*} \subsection{Setup, Implementation, and Hardware} \label{s:compute-systems} We execute the runs on RCDC's Opuntia system (Intel ten-core Xeon E5-2680v2 at \SI{2.8}{\giga\hertz} with \SI{64}{\giga\byte} memory; 2 sockets for a total of 20 cores~\cite{cacds-web}) and TACC's Lonestar 5 system (2-socket Xeon E5-2690 v3 (Haswell) with 12 cores/socket, 64 GB memory per node~\cite{tacc-web}). Our code is written in C++ and uses MPI for parallelism. It is compiled with the default Intel compilers available on these systems at the time (Lonestar 5: Intel 16.0.1 and Cray MPICH 7.3.0; Opuntia: Intel PSXE 2016, Intel ICS 2016, and Intel MPI 5.1.1). We use \claire{} commit \texttt{v0.07-131-gbb7619e} to perform the experiments. For the software packages/libraries used in combination with \claire{}, we refer the reader to \secref{s:software}. The versions of the libraries used for our runs can be found in the references. \subsection{Real and Synthetic Data} \label{s:data} We report results for the \nirep{} (\iquote{Non-Rigid Image Registration Evaluation Project}) data~\cite{Christensen:2006a}. This repository contains 16 rigidly aligned T1-weighted MRI brain datasets ({\tt na01}--{\tt na16}; image size: $256\times300\times256$ voxels) of different individuals. Each dataset comes with 32 labels of anatomical gray matter regions. (Additional information on the datasets, the imaging protocol, and the preprocessing can be found in~\cite{Christensen:2006a}.) We illustrate an exemplary dataset in \figref{f:nirep-data}. The initial Dice score (before registration) for the combined label map (i.e., the union of the 32 individual labels) is on average \num{5.181288528e-01} (mean) with a maximum of \num{5.622982959E-01} (dataset \texttt{na08}) and a minimum of \num{4.379558331E-01} (dataset \texttt{na14}). We generate the data for grids not corresponding to the original resolution based on a cubic interpolation scheme. The scalability runs reported in \secref{s:scalability} are based on synthetic test data. We use a template image $m_T(\vect{x}) = ((\sin x_1)(\sin x_1) + (\sin x_2)(\sin x_2) + (\sin x_3)(\sin x_3))/3$. The reference image $m_R(\vect{x})$ is computed by solving the forward problem for a predefined velocity field $\vect{v}^\star(\vect{x}) = (v_1^\star(\vect{x}), v_2^\star(\vect{x}),v_3^\star(\vect{x}))^\ensuremath{\mathsf{T}}$, where $v_1^\star(\vect{x}) = \sin x_3 \cos x_2 \sin x_2$, $v_2^\star(\vect{x}) = \sin x_1 \cos x_3 \sin x_3$, and $v_3^\star(\vect{x}) = \sin x_2 \cos x_1 \sin x_1$. \subsection{Convergence: Preconditioner} \label{s:precond-performance} We study the performance of different variants of our preconditioner for the reduced space Hessian. \ipoint{Setup} We solve the KKT system in~\eqref{e:hessian-matvec} at a true solution $\vect{v}^\star$. This velocity $\vect{v}^\star$ is found by registering two neuroimaging datasets from \nirep{} (\texttt{na01} and \texttt{na02}). The images are downsampled to a resolution of $128\times150\times128$ (half the original resolution). We consider an $H^1$-div regularization model with $\beta_v = \num{1E-2}$ and $\beta_w = \num{1E-4}$ and an $H^2$ regularization model with $\beta_v = \num{1E-4}$ with a tolerance $\epsilon_g = \num{1E-2}$ to compute $\vect{v}^\star$. Once we have found $\vect{v}^\star$, we generate a synthetic reference image $m_R$ by transporting the reference image using $\vect{v}^\star$. We use the velocity $\vect{v}^\star$ as an initial guess for our solver, and iteratively solve for the search direction $\vect{\tilde{v}}$ using different variants of our preconditioner. The number of time steps for the PDE solves is set to $n_t=4$. We fix the tolerance for the (outer) PCG method to $\epsilon_H = \num{1E-3}$. We consider an inexact Chebyshev semi-iterative method with a fixed number of $k\in\{5,10,20\}$ iterations (denoted by CHEB($k$)) and a nested PCG method with a tolerance of $\epsilon_P = 0.1\epsilon_H$ (denoted by PCG(\num{1E-1})) for the iterative inversion of the preconditioner. Details can be found in \secref{s:methods}. We compare these strategies to a spectral preconditioner (inverse of the regularization operator $\dop{A}$; used in~\cite{Mang:2016c,Gholami:2017a,Mang:2018a}). We study the rate of convergence of the PCG solver for a vanishing regularization parameter $\beta_v$. We consider mesh sizes of $128\times150\times128$ and $256\times300\times256$. We execute \claire{} on a single node of Opuntia with 20 MPI tasks. \ipoint{Results} We display the trend of the residual with respect to the (outer) PCG iterations in \figref{f:convergence-nirep-krylov-h2s} ($H^2$-seminorm for $\vect{v}$, i.e., $\dop{B} = -\ilap$, with $\beta_v\in\{\num{1E-2},\num{5E-3},\num{1E-3},\num{5E-4},\num{1E-4}\}$) and in \figref{f:convergence-nirep-krylov-h1s-div} ($H^1$-div regularization model with an $H^1$-seminorm for $\vect{v}$, i.e., $\dop{B} = \igrad$ with penalty for $\idiv \vect{v}$, with $\beta_v\in\{\num{1E-1},\num{5E-2},\num{1E-2},\num{5E-3}\}$ and $\beta_w = \num{1e-4}$), respectively. Detailed results for these runs can be found in \tabref{t:convergence-nirep-krylov-h2s} and \tabref{t:convergence-nirep-krylov-h1s-div} in the supplementary materials. \begin{figure} \centering \includegraphics[width=0.99\textwidth] {figure04} \caption{Convergence of Krylov solver for different variants of the preconditioner for the reduced space Hessian. We consider an $H^2$-seminorm as regularization model for the velocity (neglecting the incompressibility constraint). We report results for different regularization parameters $\beta_v\in\{\num{1E-2},\num{5E-3},\num{1E-3},\num{5E-4},\num{1E-4}\}$. We report the trend of the relative residual for the outer Krylov method (PCG) versus the iteration count. We report results for the spectral preconditioner and the two-level preconditioner. We use different iterative algorithms to compute the action of the inverse of the preconditioner: CHEB($k$) with $k\in\{5,10,20\}$ refers to a CHEB method with a fixed number of $k$ iterations; PCG(\num{1E-1}) refers to a PCG method with a tolerance that is $0.1\times$ smaller than the tolerance used for the outer PCG method.\label{f:convergence-nirep-krylov-h2s}} \end{figure} \begin{figure} \centering \includegraphics[width=0.78\textwidth] {figure05} \caption{Convergence of Krylov solver for different variants of the preconditioner for the reduced space Hessian. We consider an $H^1$-div regularization model with an $H^1$-seminorm for the velocity. We report results for different regularization parameters $\beta_v\in\{\num{1E-1},\num{5E-2},\num{1E-2},\num{5E-3}\}$. We set $\beta_w = \num{1e-4}$. We report the trend of the relative residual for the outer Krylov method (PCG) versus the iteration count. We report results for the spectral preconditioner and the two-level preconditioner. We use different algorithms to compute the action of the inverse of the preconditioner: CHEB($k$) with $k\in\{5,10,20\}$ refers to a CHEB method with a fixed number of $k$ iterations; PCG(\num{1E-1}) refers to a PCG method with a tolerance that is $0.1\times$ smaller than the tolerance used for the outer PCG method.\label{f:convergence-nirep-krylov-h1s-div}} \end{figure} \ipoint{Observations} The most important observations are: \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item The PCG method converges significantly faster for the two-level preconditioner. \item The performance of all preconditioners considered in this study is \emph{not} independent of the regularization parameter $\beta_v$. The workload increases significantly for vanishing regularity of the velocity $\vect{v}$ for all preconditioners. The plots in \figref{f:convergence-nirep-krylov-h2s} and \figref{f:convergence-nirep-krylov-h1s-div} imply that the convergence of the PCG method for the two-level preconditioner is less sensitive to (or even independent of) $\beta_v$. The work goes to the inversion of the reduced space Hessian on the coarse grid (cf. \tabref{t:convergence-nirep-krylov-h2s} and \tabref{t:convergence-nirep-krylov-h1s-div} in the supplementary materials for details). If we further reduce the regularization parameter (below \num{1e-5} for the $H^2$-regularization model and below \num{1e-4} for the $H^1$-div regularization model) the performance of our preconditioners deteriorates further; the runtime becomes impractical for all preconditioners. \item The rate of convergence of the PCG method is (almost) independent of the mesh size for all preconditioners. We note that we apply a smoothing of $\sigma = 2$ along each spatial dimension so that the input image data is resolved on the coarse grid of size $128\times150\times128$. The same frequency content is presented to the solver on the fine grid of size $256\times300\times256$. \item The PCG method converges significantly faster if we consider an $H^1$-regularization model for $\vect{v}$. This is a direct consequence of fact that the condition number of the Hessian increases with the order of the regularization operator $\dop{A}$. \item The differences of the performance of the preconditioners are less pronounced for an $H^1$-div regularization model for $\vect{v}$ than for an $H^2$-regularization model. For an $H^2$ regularization model with $\beta_v=\num{1e-4}$ we require more than 200 iterations for the spectral preconditioner. \item Considering runtime (not reported here), we obtain a speedup of up to 2.9 for the $H^2$-regularization model (see \runref{20} in \tabref{t:convergence-nirep-krylov-h2s} in the supplementary materials) and a speedup of up to 2.6 for the $H^1$-div regularization model (see \runref{40} in \tabref{t:convergence-nirep-krylov-h1s-div} in the supplementary materials). The coarser the grid, the less effective is the two-level preconditioner, especially for vanishing regularization parameters $\beta_v$. This is expected, since we cannot resolve high-frequency components of the fine level on the coarse level. Secondly, we do not use a proper (algorithmic) smoother in our scheme to reduce the high-frequency errors. \item The performance of the CHEB and the nested PCG method for iteratively inverting the reduced space Hessian are similar. There are differences in terms of the mesh size. For a coarser grid ($128\times150\times128$) the CHEB seems to perform slightly better. For a grid size of $256\times300\times256$ the nested PCG method is slightly better. \end{itemize} \ipoint{Conclusions} \begin{inparaenum}[(\itshape i\upshape)]\item The two-level preconditioner is more effective than the spectral preconditioner. \item The nested PCG method is more effective than the CHEB method on a finer grid (and does not require a repeated estimation of the spectrum of the Hessian operator). \item The PCG method converges faster if we consider an $H^1$-div regularization model for $\vect{v}$. \item Designing a preconditioner that delivers a good performance for vanishing regularization parameters requires more work\end{inparaenum}. \subsection{Convergence: Newton--Krylov Solver} \label{s:convergence-nks} We study the rate of convergence of our Newton--Krylov solver for the entire inversion. We consider the neuroimaging data described in \secref{s:data}. We report additional results for a synthetic test problem (ideal case) in the supplementary materials. \ipoint{Setup} We register the datasets \texttt{na02} through \texttt{na16} (template images) with \texttt{na01} (reference image). We execute the registration in full resolution ($256\times300\times256$; \num{58982400} unknowns). We consider an $H^1$-div regularization model ($H^1$-seminorm for $\vect{v}$ with $\beta_v=\num{1E-2}$ and $\beta_w = \num{1E-4}$; the parameters are chosen empirically). The number of Newton iterations is limited to 50 (not reached). The number of Krylov iterations is limited to 100 (not reached). We use a tolerance of $\num{5e-2}$ and $\num{1e-6}$ (the latter is not reached) for the relative reduction and the absolute $\ell^2$-norm of the reduced gradient as a stopping criterion, respectively. We use $n_t=4$ time steps for numerical time integration. We compare results obtained for the two-level preconditioner to results obtained using a spectral preconditioner (inverse of the regularization operator). We use a nested PCG method with a tolerance of $\epsilon_P = 0.1\epsilon_H$ for computing the action of the inverse of the two-level preconditioner. We do not perform any parameter, scale, or grid continuation. (We note that we observed that these continuation schemes are critical when performing runs for smaller regularization parameters.) We compare results obtained for single (\SI{32}{\bit}) and double (\SI{64}{\bit}) precision. We execute these runs on TACC's Lonestar 5 system (see \secref{s:compute-systems} for specs). \ipoint{Results} We show convergence plots for all datasets in \figref{f:convergence-nirep-fullsolve}. We plot the relative reduction of the mismatch (left column), the relative reduction of the gradient (middle column), and the relative reduction of the objective functional (right column) with respect to the Gauss--Newton iterations. The top row shows results for the spectral preconditioner; the other two rows show results for the two-level preconditioner (middle row: double precision; bottom row: single precision). The runtime for the inversion is reported in the plot at the top right of \figref{f:convergence-nirep-fullsolve}. An exemplary trend for the residual of the PCG method per Gauss--Newton iteration is displayed at the bottom right of \figref{f:convergence-nirep-fullsolve}. These plots summarize results reported in the supplementary materials; results for the spectral preconditioner are reported in \tabref{t:nirep-convergence-h1sdiv-spectral-ls5}; results for the two-level preconditioner are reported in \tabref{t:nirep-convergence-h1sdiv-2level-pcg0d1-dbl-ls5} (double precision) and \tabref{t:nirep-convergence-h1sdiv-2level-pcg0d1-sgl-ls5} (double precision). We also report a comparison of the performance of our solver for single (\SI{32}{\bit}) and double (\SI{64}{\bit}) precision in \tabref{t:dbl-vs-sgl} for two exemplary images of the \nirep{} dataset. \begin{figure} \centering \includegraphics[width=0.99\textwidth] {figure06} \caption{Convergence of \claire{}\,'s Newton--Krylov solver for neuroimaging data for different realizations of the preconditioner. Top row: inverse regularization operator. Middle and bottom row: two-level preconditioner using PCG(\num{1E-1}) for double (\SI{64}{\bit}; middle row) and single (\SI{32}{\bit}; bottom row) precision, respectively. We report results for 15 multi-subject brain registration problems ({\tt na02} through {\tt na16} of the \nirep{} repository registered to {\tt na01}). Each of these 15 registrations is plotted in a different shade of gray. We plot (from left to right) the relative reduction of ($i$) the mismatch (squared $L^2$-distance between the images to be registered), ($ii$) the reduced gradient, and ($iii$) the objective functional, with respect to the Gauss--Newton iterations. We use a relative change of the gradient of \num{5e-2} as a stopping criterion (dashed red line in second column). We also report the runtime in seconds for each registration problem (right plot at top) and an exemplary plot of the reduction of the residual of the (outer) PCG solver per Newton iteration (right plot at bottom; the Newton iterations are separated by vertical dashed lines). The runs are performed on one node of TACC's Lonestar 5 system. The results reported here correspond to those in \tabref{t:nirep-convergence-h1sdiv-spectral-ls5}, \tabref{t:nirep-convergence-h1sdiv-2level-pcg0d1-dbl-ls5}, and \tabref{t:nirep-convergence-h1sdiv-2level-pcg0d1-sgl-ls5} in the supplementary materials.\label{f:convergence-nirep-fullsolve}} \end{figure} \ipoint{Observations} The most important observations are the following: \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item Switching from double to single precision does not affect the convergence of our solver (see \figref{f:convergence-nirep-fullsolve}; detailed results are reported in \tabref{t:dbl-vs-sgl} in the supplementary materials). \item The two-level preconditioner executed with single precision yields a speedup of up to 6$\times$ (with an average speedup of $4.4\pm 0.8$) compared to our baseline method (spectral preconditioner executed in double precision)~\cite{Mang:2016c,Gholami:2017a} (see \figref{f:convergence-nirep-fullsolve} top right). Switching from single to double precision yields a speedup of more than 2$\times$ (detailed results are reported in \tabref{t:dbl-vs-sgl} in the supplementary materials). \item The average runtime of our improved solver is $\SI{85}{\second} \pm \SI{22}{\second}$ with a maximum of \SI{140}{\second} (see \runref{13} in \tabref{t:nirep-convergence-h1sdiv-2level-pcg0d1-sgl-ls5} in the supplementary materials for details) and a minimum of \SI{56}{\second} (see \runref{7} in \tabref{t:nirep-convergence-h1sdiv-2level-pcg0d1-sgl-ls5} in the supplementary materials for details). \item We obtain a very similar convergence behavior for the outer Gauss--Newton iterations for different variants of our solver (see \figref{f:convergence-nirep-fullsolve}). We can reduce the $\ell^2$-norm of the gradient by $\num{5e-2}$ in 6 to 14 Gauss--Newton iterations (depending on the considered pair of images). \item The mismatch between the deformed template image and the reference image stagnates once we have reduced the gradient by more than one order of magnitude (for the considered regularization parameter). \item We oversolve the reduced space KKT system if we consider a superlinear forcing sequence in combination with a nested PCG method (see \figref{f:convergence-nirep-fullsolve} bottom right). This is different for synthetic data (we report exemplary results in the supplementary materials). \end{itemize} \ipoint{Conclusions} \begin{inparaenum}[(\itshape i\upshape)] \item Our improved implementation of \claire{} yields an overall speedup of $4\times$ for real data if executed on a single resolution level. \item Executing \claire{} in single precision does not deteriorate the performance of our solver (if we consider an $H^1$-regularization model for the velocity)\end{inparaenum}. \begin{figure} \begin{minipage}[]{0.60\textwidth} \null\vspace{0.3cm} \centering \includegraphics[width=0.99\textwidth] {figure07} \end{minipage} \begin{minipage}[]{0.38\textwidth} \caption{Convergence results for the parameter continuation scheme implemented in \claire{}. We report results for the registration of {\tt na11} to {\tt na01}. We report the reduction of the mismatch (left) the reduced gradient (right) per level (different regularization parameters) versus the cumulative number of Gauss--Newton iterations. (We require 5, 4, 2, and 2 Gauss--Newton iterations per level, respectively.) The individual levels are separated by vertical, dashed lines. The horizontal dashed lines in the right plot show the tolerance for the relative reduction of the gradient for the inversion.\label{f:convergence-nirep-parametercont}} \end{minipage} \end{figure} \subsection{Time-to-Solution} \label{s:time-to-solution} We study the performance of \claire{}. We note that the \demons{} algorithm requires between approximately \SI{30}{\second} (3 levels with 15, 10, and 5 iterations) and \SI{3600}{\second} (3 levels with 1500, 1000 and 500 iterations) until `'convergence`' on the same system (depending on the parameter choices; see \secref{s:reg-quality} for details). \begin{remark} Since we perform a fixed number of iterations for the \demons{} algorithm, the runtime only depends on the execution time of the operators. The regularization parameters control the support of the Gaussian smoothing operator; the larger the parameters, the longer the execution time. This is different for \claire{}; large regularization parameters result in fast convergence and, hence, yield a short execution time. A simple strategy to obtain competitive results in terms of runtime would be to also execute \claire{} for a fixed number of iterations. We prefer to use a tolerance for the relative reduction of the gradient, instead, since it yields consistent results across different datasets. \end{remark} \ipoint{Setup} We use the dataset \texttt{na03}, \texttt{na10} and \texttt{na11} as template images, and register them to \texttt{na01} (reference image). We consider and $H^1$-div regularization model ($H^1$-seminorm for $\vect{v}$ with $\beta_v\in\{\num{1e-2},\num{1e-3}\}$ and $\beta_w = \num{1E-4}$; these parameters are chosen empirically). The number of Newton iterations is limited to 50 (not reached). The number of Krylov iterations is limited to 100 (not reached). We use a tolerance of $\num{5e-2}$ for the relative reduction of the $\ell^2$-norm of the gradient and a tolerance of $\num{1e-6}$ (not reached) for its $\ell^2$-norm as a stopping criterion. We use $n_t=4$ time steps for numerical time integration. We compare results obtained for the two-level preconditioner (runs executed in single precision) to results obtained using a spectral preconditioner (inverse of the regularization operator; runs executed in double precision; the baseline method is described in~\cite{Mang:2016c}). We use a nested PCG method with a tolerance of $\epsilon_P = 0.1\epsilon_H$ for computing the action of the inverse of the two-level preconditioner. We execute \claire{} using a parameter continuation scheme. That is, we run the inversion until convergence for a sequence of decreasing regularization parameters (one order of magnitude, starting with $\beta_v=\num{1e0}$) until we reach the target regularization parameter. We execute these runs on one node of the Opuntia system using 20 MPI tasks (see \secref{s:compute-systems} for specs). \ipoint{Results} We report the results in \tabref{t:results-nirep-runtime}. We report the number of Gauss--Newton iterations, the number of Hessian matrix vector products (per level), the number of PDE solves (per level), the relative reduction of the mismatch, the $\ell^2$-norm of the reduced gradient, the relative reduction of the $\ell^2$-norm of the gradient, the runtime, and the associated speedup compared to a full solve disregarding any acceleration schemes. We showcase the trend of the mismatch and the $\ell^2$-norm of the gradient for different levels of the parameter continuation scheme in \figref{f:convergence-nirep-parametercont}. We report exemplary convergence results for the parameter continuation scheme in \figref{f:convergence-nirep-parametercont}. We show exemplary registration results for the parameter continuation in \figref{f:nirep-parameter-cont-na01-na10-h1sdiv} (for the registration of \texttt{na10} to \texttt{na01}). \begin{table} \caption{We compare different schemes implemented in \claire{} for stabilizing and accelerating the computations. We consider two datasets as a template image ({\tt na03} and {\tt na10}). We use an $H^1$-div regularization model with $\beta_w=\num{1E-4}$. We consider regularization parameters $\beta_v=\num{1e-2}$ and $\beta_v = \num{1e-3}$. We execute the inversion with a spectral preconditioner (double precision) to establish a baseline (\runref{1}, \runref{4}, \runref{7}, and \runref{10}; corresponds to the method presented in~\cite{Mang:2016c}). The remaining results are obtained with a two-level preconditioner using a nested PCG method with a tolerance of $0.1\epsilon_H$ to compute the action of the inverse of the preconditioner. For each dataset and each choice of $\beta_v$ we report results for a two-level preconditioner without any accelerations and a parameter continuation (PC) scheme. We report (from left to right) the number of Gauss--Newton iterations per level (\#iter; the total number for the entire inversion is the sum), the number of Hessian matvecs per level (\#matvecs; the total number for the entire inversion is the sum), the number of PDE solves (on the fine grid; \#PDE), the relative reduction of the mismatch, the absolute $\ell^2$-norm of the reduced gradient ($\|\di{g}^\star\|_2$), and the relative $\ell^2$-norm of the reduced gradient after convergence ($\|\di{g}^\star\|_{\text{rel}}$). We also report the runtime (in seconds) as well as the speedup compared to our baseline method presented in \cite{Mang:2016c}.\label{t:results-nirep-runtime}} \setcounter{runidnum}{0}\centering\scriptsize \begin{tabular}{llllrrrllllr}\toprule & & $\beta_v$ & & \#iter & \#matvecs & \#PDE & mismatch & $\|\di{g}^\star\|_2$ & $\|\di{g}^\star\|_{\text{rel}}$ & runtime & speedup \\\midrule {\color{gray}\stepcounter{runidnum}\#\therunidnum} & \texttt{na03} & \num{1E-2} & --- & 9 & 83 & 187 & \num{8.465094487461E-02} & \num{4.630653548871E-04} & \num{4.710900411598E-02} & \num{6.049768e+02} & \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & --- & 9 & 9 & 39 & \num{8.597876018175E-02} & \num{4.653556640269E-04} & \num{4.734200401881E-02} & \num{1.220632e+02} & 5.0 \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & PC & 4,3,2 & 4,3,2 & 46 & \num{9.839029297325E-02} & \num{8.662219911489E-04} & \num{4.772381156960E-02} & \num{9.325386e+01} & 6.5 \\ \midrule {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & \num{1E-3} & --- & 7 & 128 & 273 & \num{2.880830095328E-02} & \num{3.968630078429E-04} & \num{4.937184876106E-02} & \num{8.974052e+02} & \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & --- & 12 & 12 & 73 & \num{2.561926085770E-02} & \num{3.718886300290E-04} & \num{4.626490460159E-02} & \num{7.169832e+02} & 1.3 \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & PC & 4,3,2,2 & 4,3,2,2 & 56 & \num{3.368572976549E-02} & \num{8.252661203242E-04} & \num{4.546738044469E-02} & \num{1.607081e+02} & 5.6 \\ \midrule\midrule {\color{gray}\stepcounter{runidnum}\#\therunidnum} & \texttt{na10} & \num{1E-2} & --- & 7 & 52 & 121 & \num{9.670308556120E-02} & \num{4.977777085935E-04} & \num{4.907589446181E-02} & \num{3.843565e+02} & \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & --- & 7 & 7 & 31 & \num{9.619403630495E-02} & \num{4.987742868252E-04} & \num{4.918244481087E-02} & \num{9.347386e+01} & 4.1 \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & PC & 3,3,2 & 3,3,2 & 42 & \num{1.095430627465E-01} & \num{9.546505170874E-04} & \num{4.975514858961E-02} & \num{9.044438e+01} & 4.2 \\ \midrule {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & \num{1E-3} & --- & 7 & 134 & 285 & \num{3.168779332810E-02} & \num{3.458229436107E-04} & \num{4.240992672708E-02} & \num{1.041283e+03} & \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & --- & 8 & 16 & 51 & \num{3.110102564096E-02} & \num{3.853500820696E-04} & \num{4.727265238762E-02} & \num{4.776165e+02} & 2.2 \\ {\color{gray}\stepcounter{runidnum}\#\therunidnum} & & & PC & 3,3,2,2 & 3,3,2,3 & 54 & \num{3.775701671839E-02} & \num{7.409917889163E-04} & \num{3.861953318119E-02} & \num{1.873683e+02} & 5.6 \\ \bottomrule \end{tabular} \end{table} \begin{figure} \centering \includegraphics[width=0.99\textwidth] {figure08} \caption{Exemplary results for the parameter continuation scheme implemented in \claire{}. We consider the datasets {\tt na10} (template image) to {\tt na01} (reference image). We show (from top to bottom) coronal, axial and sagittal slices. The three columns on the left show the original data (left: reference image $m_R$; middle: template image $m_T$; right: mismatch between $m_R$ and $m_T$ before registration). The four columns on the right show results for the parameter continuation scheme (\runref{9} in \tabref{t:results-nirep-runtime}; from left to right: mismatch between $m_R$ and $m_1$ (after registration); a map of the orientation of $\vect{v}$; a map of the determinant of the deformation gradient (the color bar is shown at the top); and a deformed grid illustrating the in plane components of $\vect{y}$).\label{f:nirep-parameter-cont-na01-na10-h1sdiv}} \end{figure} \ipoint{Observations} The most important observations are the following: \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item The parameter continuation scheme in $\beta_v$ yields a speedup between $4\times$ and $6\times$ (\runref{3}, \runref{6}, \runref{9}, and \runref{12} in~\tabref{t:results-nirep-runtime}) even if we reduce the target regularization parameter from $\num{1e-2}$ to $\num{1e-3}$. The runtime for this accelerated scheme ranges from \SI{9.044438e+01}{\second} (\runref{9}) and \SI{1.873683e+02}{\second} (\runref{12}) depending on problem and parameter selection. \item The results obtained for the different schemes are qualitatively and quantitatively very similar. We obtain similar values for the relative mismatch, e.g., between \num{1.095430627465E-01} and \num{9.619403630495E-02} for $\beta_v=\num{1e-2}$ and between \num{3.775701671839E-02} and \num{3.110102564096E-02} for $\beta_v = \num{1e-3}$ for the registration of \texttt{na10} to \texttt{na01}. \end{itemize} \ipoint{Conclusions} \begin{inparaenum}[(\itshape i\upshape)] \item Introducing the parameter continuation stabilizes the computations (similar results can be observed for grid and scale continuation schemes; not reported here). While the speedup for the preconditioner deteriorates as we reduce $\beta_v$ (see, e.g., \runref{2} and \runref{5} in~\tabref{t:results-nirep-runtime}), we can observe a speedup of about 5$\times$ for the parameter continuation scheme irrespective of $\beta_v$. We note that for small regularization parameters it is critical to execute \claire{} using a parameter continuation scheme. That is, for certain problems we observed a stagnation in the reduction of the gradient if \claire{} is executed without a parameter continuation scheme for small regularization parameters. We attribute this behavior to the accumulation of numerical errors in our scheme. This observation requires further exploration. \item Depending on the desired mismatch and regularity requirements, we achieve a runtime that is almost competitive with the \demons{} algorithm using the same system (i.e., the same number of cores). The peak performance in terms of speedup for \claire{} was achieved when using a grid continuation scheme (results not reported here), with a speedup of up to 17$\times$. However, as the regularity of the solution reduces, this speedup drops significantly; the parameter continuation is more stable. We expect to obtain a similar speedup with improved stability if we combine grid and parameter continuation. Designing an effective algorithm that combines these two approaches requires more work\end{inparaenum}. \subsection{Registration Quality} \label{s:reg-quality} We study registration accuracy for multi-subject image registration problems based on the \nirep{} dataset (see \secref{s:data}). We compare results for our method to different variants of the diffeomorphic \demons{} algorithm. \ipoint{Setup} We consider the entire \nirep{} data repository. We register the dataset \texttt{na02} through \texttt{na16} (template images) to \texttt{na01} (reference image). The data has been rigidly preregistered~\cite{Christensen:2006a}. We do not perform an additional affine preregistration step. Each dataset comes with a label map that contains 32 labels (ground truth segmentations) identifying distinct gray matter regions (see \figref{f:nirep-data} for an example). We quantify registration accuracy based on the Dice coefficient (the optimal value is one) for these labels after registration. For ease of presentation we limit the evaluation to the union of the 32 labels (we report results for the individual 32 labels for \claire{} in \figref{f:claire-quality-individual-labels} of the supplementary materials). We assess the regularity of the computed deformation map based on the extremal values for the determinant of the deformation gradient. The analysis is limited to the foreground of the reference image (i.e., the area occupied by brain, identified by thresholding using a threshold of 0.05). We compare the performance of our method against different variants of the diffeomorphic \demons{} algorithm. We execute all runs on one node of the Opuntia system using 20 MPI tasks (see \secref{s:compute-systems} for specs). \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item \textit{\textbf{\demons{}}:} We consider (\emph{non}-)\emph{symmetric diffeomorphic} ((\textbf{S})\textbf{DDEM}; \emph{diffeomorphic update rule})~\cite{Vercauteren:2007a,Vercauteren:2009a}, and the (\emph{non}-)\emph{symmetric log-domain diffeomorphic} \demons{} algorithm ((\textbf{S})\textbf{LDDDEM}; (\emph{symmetric}) \emph{log-domain update rule})~\cite{Vercauteren:2008a}. We have tested different settings for these methods (see below). We limit our study to the default parameters suggested in the literature, online resources, and the manual of the software. We use the code available at \cite{demons-web}. We compile in release mode, with the {\tt -O3} option. The code has been linked against \itk\ version 4.9.1~\cite{Johnson:2015a,itk-web}. Notice that the implementation uses multithreading based on {\tt pthreads} to speed up the computations. We use the default setting, which corresponds to the number of threads being equal to the number of cores of the system. We use the \emph{symmetrized force} for the symmetric strategies. We consider the \emph{gradient of the deformed template} as a force for the non-symmetric strategies. We use a nearest-neighbor interpolation model to transform the label maps. We perform various runs to identify adequate parameters. For the first set of runs we use a three-level grid continuation scheme with 15, 10, and 5 iterations per level (the default), respectively. We estimate an optimal combination of regularization parameters $\sigma_u \geq 0$, $\sigma_d \geq 0$, and $\sigma_v \geq 0$ based on an exhaustive search. This search is limited to the datasets \texttt{na01} (reference image) and \texttt{na02} (template image). We define the optimal regularization parameter to be the one that yields the highest Dice score subject to the map $\vect{y}$ being diffeomorphic. We note that accurately computing $\det\igrad\vect{y}$ is challenging. The values reported in this study have to be considered with the numerical accuracy in mind. For \demons{} we report the values generated by the software. We refine this parameter search by increasing the number of iterations per level by a factor of 2, 5, 10, and 100 to make sure that we have `'converged`' to an `'optimal`' solution. We apply the best variants identified by this exhaustive search to the entire \nirep{} data. \item \textit{\textbf{\claire{}}:} We consider an $H^1$-div regularization model ($H^1$-seminorm for $\vect{v}$, i.e., $\dop{A} = -\ilap$, with an additional penalty for $\idiv \vect{v}$). We set the regularization parameter for the penalty for the divergence of $\vect{v}$ to $\beta_w = \num{1E-4}$. To select an adequate regularization parameter $\beta_v$, we use a binary search. We set the bounds for the determinant of the deformation gradient to 0.25 and 0.30, respectively. We set the number of time steps of the SL scheme to $n_t=4$. The number of maximal iterations is set to 50 (not reached). The number of Krylov iterations is limited to 100 (not reached). We use a tolerance of $\num{5e-2}$ and $\num{1e-6}$ for the relative and absolute reduction of the reduced gradient as a stopping criterion. We use $n_t=4$ time steps for numerical integration. We run the registration on full resolution and (based on the experiments in \secref{s:time-to-solution}) use a parameter continuation scheme in $\beta_v$ to solve the registration problem. Probing for an optimal regularization parameter is expensive. We limit this estimation to the datasets {\tt na01} (reference image) and {\tt na02} (template image), assuming that we can estimate an adequate parameter for a particular application based on a subset of images. We execute \claire{} on the remaining images using the identified parameters. We compute $\det\igrad\vect{y}$ directly from $\vect{v}$ by solving a transport equation (see~\cite{Mang:2015a,Mang:2018a} for details). We transport the label maps to generate results that are consistent with the values reported for the determinant of the deformation map. This requires an additional smoothing (standard deviation: one voxel) and thresholding (threshold: 0.5) step. \end{itemize} \ipoint{Results} We illustrate the search for an optimal regularization parameter for \claire{} in \figref{f:claire-estimate-regularization-parameter-na01-na02-h1sdiv}. We showcase an exemplary result for the rate of convergence of SDDEM and \claire{} in \figref{f:convergence-nirep-claire-vs-demons} (the software is executed at full image resolution). We summarize exemplary registration results for all datasets in \figref{f:claire-vs-demons-quality-nirep}. Here, D1, D2, D3, C1, and C2 correspond to different variants of the \demons{} algorithm and \claire{}. C1 corresponds to \claire{} with regularization parameter of \num{9.718750e-03} ($\epsilon_J = 0.3$) and C2 to \claire{} with a regularization parameter of \num{5.500000e-04} ($\epsilon_J = 0.25$). The first \demons{} variant D1 is SDDEM with $(\sigma_u,\sigma_d) = (0,3.5)$ (smooth setting). It yields results that are competitive with \claire{} in terms of the determinant of the deformation gradient. The second variant D2 is SDDEM with $(\sigma_u,\sigma_d) = (0,3.0)$, which gave us the best result (highest attainable Dice score with the determinant of the deformation gradient not changing sign for the training data \texttt{na01} and \texttt{na02}). The third variant D3 is SDDEM with $(\sigma_u,\sigma_d) = (0,1.0)$ (aggressive setting). We achieve results that are competitive with \claire{} in terms of the Dice score. We execute the \demons{} algorithm with a three-level grid continuation scheme with 150, 100, and 50 iterations per level, respectively. We refer the interested reader to the supplementary materials for more detailed results for these runs and an additional insight into the parameter search we have conducted to identify the best variant of the \demons{} algorithm. Detailed results for the \claire{} variant C1 are reported in \tabref{t:nirep-regquality-h1sdiv-3d3e-3}. Detailed results for the \claire{} variant C2 are reported in \tabref{t:nirep-regquality-h1sdiv-5d5e-4}. For \claire{}, we report Dice coefficients for the individual 32 gray matter labels in \figref{f:claire-quality-individual-labels}. Results for probing for adequate regularization parameters $\sigma_u$, $\sigma_d$, and $\sigma_v$ for different variants of the \demons{} algorithm are reported in \tabref{t:ddem:sweep} and \tabref{t:lddem:sweep} (exhaustive search). Building up on these results we extend this search by additionally increasing the iteration count. These results are reported in \tabref{t:dem-iterations}. We determined that SDDEM gives us the best results in terms of the Dice coefficient. Detailed results for the variants D1, D2, and D3 can be found in \tabref{t:demons-all-nirep-data}. \begin{figure} \begin{minipage}[c]{0.6\textwidth} \centering\vspace{0.3cm} \includegraphics[width=0.98\textwidth] {figure09} \end{minipage} \begin{minipage}[c]{0.37\textwidth} \caption{Estimation of the regularization parameter $\beta_v$. We use an $H^1$-div regularization model with $\beta_w=\num{1E-4}$. We show the trend of the mismatch with respect to the Gauss--Newton iterations (left column) and the trend of the extremal values of the determinant of the deformation gradient with respect to the continuation level (right column). The top block shows results for a bound of 0.3 for $\min\det\igrad\vect{y}$. The bound for the bottom row is 0.25. These bounds are illustrated as dashed gray lines in the plots on the right. Here, we show (per continuation level) the trend of $\max\det\igrad\vect{y}$ (marker: $\times$) and $\min\det\igrad\vect{y}$ (marker: $+$). If the bounds are violated, we display the marker in red. We separate the continuation levels with a vertical gray line in the plots for the mismatch; the color of the line corresponds to a particular regularization parameter (see legend).\label{f:claire-estimate-regularization-parameter-na01-na02-h1sdiv}} \end{minipage} \end{figure} \begin{figure} \begin{minipage}[c]{0.37\textwidth} \caption{Convergence results for \claire{} and SDDEM. We report the trend of the mismatch (left) and the Dice coefficient (right) versus the outer iterations. For \claire{}, we solve this problem more accurately than in the other runs on the real data to show the asymptotic behaviour of our solver. We do not perform any grid, scale, or parameter continuation for both methods. We consider the datasets {\tt na01} (reference image) and {\tt na02} (template image).\label{f:convergence-nirep-claire-vs-demons}} \end{minipage} \begin{minipage}[c]{0.6\textwidth} \centering \includegraphics[width=0.98\textwidth] {figure10} \end{minipage} \end{figure} \begin{figure} \begin{minipage}[c]{0.55\textwidth} \centering\vspace{0.3cm} \includegraphics[width=0.98\textwidth] {figure11} \end{minipage} \begin{minipage}[c]{0.43\textwidth} \caption{Registration results for the \nirep{} data. We consider three variants of the diffeomorphic \demons{} algorithm: D1 corresponds to SDDEM with $(\sigma_u,\sigma_d) = (0,3.5)$, D2 to SDDEM with $(\sigma_u,\sigma_d) = (0,3.0)$, and D3 to SDDEM with $(\sigma_u,\sigma_d) = (0,1.0)$. These choices are based on an exhaustive search (we refer the interested reader to the supplementary materials for details). For \claire{} we use two different choices of the regularization parameter for the $H^1$-div regularization model (C1 corresponds to \claire{} with $\beta_v = \num{9.718750e-03}$ and C2 to \claire{} with $\beta_v = \num{5.500000e-04}$; these parameters are determined via a binary search (see \figref{f:claire-estimate-regularization-parameter-na01-na02-h1sdiv})). We report results for the entire \nirep{} dataset. The plot on the left shows the Dice coefficient (on the very left, we also provide a box plot for the Dice coefficient before registration). This coefficient is computed for the union of all gray matter labels (to simplify the analysis). The middle and right box plot show the extremal values for the determinant of the deformation gradient.\label{f:claire-vs-demons-quality-nirep}} \end{minipage} \end{figure} \ipoint{Observations} The most important observations are the following: \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item \claire{} yields a smaller mismatch/higher Dice coefficient with a better control of the determinant of the deformation gradient (see \figref{f:claire-vs-demons-quality-nirep}). We obtain an average Dice coefficient of \num{8.376830e-01} with $(\min,\max) = (\num{4.137990e-01}, \num{1.106347e+01})$ as extremal values for the determinant of the deformation gradient (on average). The Dice score for the best variant of the \demons{} algorithm, SDDEM, is $\num{8.422854506E-01}$. To attain this score we have to commit to nondiffeomorphic deformation maps (as judged by the values for the determinant of the deformation gradient reported by the \demons{} software). An extension of \claire{}, which we did not consider in this work, is to enable a monitor for the determinant of the deformation gradient that increases the regularization parameter if we hit the bound we used to estimate $\beta_v$. This would prevent the outliers we observe in this study, without having to probe for a new regularization parameter for each individual dataset. \item For \claire{}, the average runtime (across all registrations) is \SI{1.084713e+02}{\second} and \SI{2.425679e+02}{\second} for $\beta_v = \num{9.718750e-03}$ and $\beta_v = \num{5.500000e-04}$, respectively. This is between $1.5\times$ and $5\times$ slower than the \demons{} algorithm if we execute \demons{} using 15, 10, and 5 iterations per level. Notice that \demons{} is executed for a fixed number of iterations. The runs reported here use 10$\times$ more iterations per level (which slightly improves the performance of \demons{}; we refer the interested reader to \tabref{t:dem-iterations} in the supplementary materials for details). This increases the runtime of the \demons{} algorithm by roughly a factor of 10. \claire{} uses a relative tolerance for the gradient as a stopping criterion. Moreover, \demons{} uses a grid continuation scheme. We execute these runs on the fine resolution, and perform a parameter continuation instead (since we observed it is more stable for vanishing $\beta_v$; see \secref{s:time-to-solution}). \item On the fine grid (single-level registration), \claire{} converges significantly faster than the \demons{} algorithm. We reach a Dice score of more than 0.8 for \claire{} after only three Gauss--Newton iterations (see \figref{f:convergence-nirep-claire-vs-demons}). \end{itemize} \ipoint{Conclusions} With \claire{} we achieve \begin{inparaenum}[(\itshape i\upshape)]\item a computational performance that is close to that of the \demons{} algorithm ($1.5\times$ to $5\times$ slower for the fastest setting we used for \demons{}) with \item a registration quality that is superior (higher Dice coefficient with a better behaved determinant of the deformation gradient)\end{inparaenum}. \subsection{Scalability} \label{s:scalability} We study strong scaling of our new implementation of \claire{} for up to \num{3221225472} unknowns for a synthetic test problem consisting of smooth trigonometric functions (see \secref{s:data}). \ipoint{Setup} We consider grid sizes $128^3$, $256^3$, $512^3$, and $1024^3$. We use an $H^1$-div regularization model with $\beta_w=\num{1E-3}$ and $\beta_w=\num{1E-4}$. We use the two-level preconditioner with a nested PCG method with a tolerance of $0.1\epsilon_H$ to compute the action of the inverse of the preconditioner. We set the tolerance for the stopping condition for the relative reduction of the reduced gradient to $\num{1E-2}$ (with an absolute tolerance of $\num{1E-6}$ (not reached)). We execute the runs on TACC's Lonestar 5 system (see \secref{s:compute-systems} for specs). \ipoint{Results} We report strong scaling results for \claire{} in \figref{f:claire-strong-scaling}. We report the time-to-solution and compare it to the runtime we expect theoretically. We report detailed results, which form the basis of the runtime reported in \figref{f:claire-strong-scaling}, in~\tabref{t:scalability-synthetic-ls5}. Here, we report the execution time of the FFT and the interpolation kernels on the coarse (two-level preconditioner) and fine grid, the runtime of our solver (time-to-solution), and the strong scaling efficiency of our improved implementation of \claire{}. We refer the reader to \cite{Mang:2016c,Gholami:2017a} more detailed results on the scalability of our original implementation of \claire{} \begin{figure} \centering \includegraphics[width=0.8\textwidth] {figure12} \caption{Strong scaling results for a synthetic test problem on TACC's Lonestar 5 system (see \secref{s:compute-systems} for specs). We use 12 MPI tasks per node. We report the runtime (time-to-solution) for the entire inversion (in seconds). Our Newton--Krylov solver converges in three iterations (with three Hessian matvecs and a total of 15 PDE solves on the fine level). We consider grid sizes $128^3$, $256^3$, $512^3$, and $1024^3$ (from left to right). The largest run uses 4096 MPI tasks on 342 compute nodes (we solve for \num{3221225472} unknowns).\label{f:claire-strong-scaling}} \end{figure} \begin{table} \caption{Scalability results for \claire{} for a synthetic test problem. We report strong scaling results for up to \num{3221225472} unknowns (grid sizes: $128^3$, $256^3$, $152^3$, and $1024^3$). We execute these runs on TACC's Lonestar 5 system (see \secref{s:compute-systems} of the main manuscript for the specs). We consider an $H^1$-div regularization model with $\beta_v = \num{1e-3}$ and $\beta_w = \num{1e-4}$. We use a two-level preconditioner with a nested PCG method. We terminate the inversion if the gradient is reduced by $\num{1e-2}$. We execute these runs in single precision. We use 12 MPI tasks per node. We report the execution time for the FFT and the interpolation (on the coarse and the fine grid; in seconds), the runtime of the solver (time-to-solution; in seconds), and the strong scaling efficiency.\label{t:scalability-synthetic-ls5}} \setcounter{runidnum}{0}\centering\scriptsize \begin{tabular}{rrrRlrlrlrlrlL}\toprule grid & run & nodes & tasks & \multicolumn{4}{l}{fine grid} & \multicolumn{4}{l}{coarse grid} & runtime & efficiency \\ \midrule \multicolumn{4}{c}{\null} & \multicolumn{2}{l}{FFT} & \multicolumn{2}{l}{interpolation} & \multicolumn{2}{l}{FFT} & \multicolumn{2}{l}{interpolation} & & \\ \midrule $128^3$ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 1 & 2 & \num{4.247586e+00} & (32\%) & \num{2.817606e+00} & (21\%) & \num{2.213636e+00} & (17\%) & \num{1.726949e+00} & (13\%) & \num{1.332395e+01} & \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 1 & 4 & \num{2.445537e+00} & (32\%) & \num{1.457371e+00} & (19\%) & \num{1.294543e+00} & (17\%) & \num{9.215655e-01} & (12\%) & \num{7.488414e+00} & 89\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 1 & 8 & \num{1.346370e+00} & (32\%) & \num{8.137712e-01} & (19\%) & \num{7.315106e-01} & (17\%) & \num{5.128467e-01} & (12\%) & \num{4.259472e+00} & 78\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 2 & 16 & \num{7.388508e-01} & (28\%) & \num{5.686014e-01} & (22\%) & \num{4.366422e-01} & (17\%) & \num{3.114562e-01} & (12\%) & \num{2.594392e+00} & 64\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 3 & 32 & \num{4.160264e-01} & (23\%) & \num{3.906395e-01} & (21\%) & \num{3.778143e-01} & (21\%) & \num{2.545202e-01} & (14\%) & \num{1.819628e+00} & 46\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 6 & 64 & \num{3.119893e-01} & (26\%) & \num{3.451383e-01} & (28\%) & \num{1.522639e-01} & (13\%) & \num{1.215253e-01} & (10\%) & \num{1.211427e+00} & 34\% \\ \midrule $256^3$ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 1 & 2 & \num{5.550650e+01} & (40\%) & \num{2.770376e+01} & (20\%) & \num{2.079800e+01} & (15\%) & \num{1.471913e+01} & (11\%) & \num{1.392794e+02} & \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 1 & 4 & \num{2.698466e+01} & (37\%) & \num{1.405047e+01} & (19\%) & \num{1.177014e+01} & (16\%) & \num{7.591873e+00} & (10\%) & \num{7.231571e+01} & 96\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 1 & 8 & \num{1.449565e+01} & (37\%) & \num{7.703082e+00} & (20\%) & \num{6.300269e+00} & (16\%) & \num{4.136640e+00} & (11\%) & \num{3.919360e+01} & 89\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 2 & 16 & \num{6.870668e+00} & (35\%) & \num{3.503119e+00} & (18\%) & \num{3.412268e+00} & (18\%) & \num{2.126711e+00} & (11\%) & \num{1.946021e+01} & 89\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 3 & 32 & \num{4.058555e+00} & (36\%) & \num{1.938044e+00} & (17\%) & \num{2.014238e+00} & (18\%) & \num{1.153192e+00} & (10\%) & \num{1.131656e+01} & 77\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 6 & 64 & \num{2.151984e+00} & (35\%) & \num{1.041131e+00} & (17\%) & \num{1.052281e+00} & (17\%) & \num{6.378655e-01} & (10\%) & \num{6.141388e+00} & 71\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 11 & 128 & \num{1.204325e+00} & (33\%) & \num{6.262128e-01} & (17\%) & \num{5.915005e-01} & (16\%) & \num{3.903782e-01} & (11\%) & \num{3.628621e+00} & 60\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 22 & 256 & \num{7.077870e-01} & (30\%) & \num{4.376023e-01} & (18\%) & \num{3.341010e-01} & (14\%) & \num{2.577584e-01} & (11\%) & \num{2.337411e+00} & 47\% \\ \midrule $512^3$ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 2 & 16 & \num{8.013097e+01} & (41\%) & \num{3.261554e+01} & (17\%) & \num{3.391836e+01} & (17\%) & \num{1.852011e+01} & (10\%) & \num{1.942798e+02} & \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 3 & 32 & \num{4.523542e+01} & (41\%) & \num{1.790180e+01} & (16\%) & \num{1.944877e+01} & (18\%) & \num{9.856170e+00} & (\phantom{0}9\%) & \num{1.089049e+02} & 89\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 6 & 64 & \num{2.212043e+01} & (40\%) & \num{8.871014e+00} & (16\%) & \num{1.027469e+01} & (19\%) & \num{5.084882e+00} & (\phantom{0}9\%) & \num{5.539895e+01} & 88\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 11 & 128 & \num{1.069926e+01} & (38\%) & \num{4.299843e+00} & (15\%) & \num{5.591518e+00} & (20\%) & \num{2.681119e+00} & (10\%) & \num{2.809870e+01} & 86\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 22 & 256 & \num{5.698979e+00} & (37\%) & \num{2.262838e+00} & (15\%) & \num{3.158469e+00} & (20\%) & \num{1.576031e+00} & (10\%) & \num{1.559486e+01} & 78\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 43 & 512 & \num{2.997216e+00} & (35\%) & \num{1.450647e+00} & (17\%) & \num{1.403620e+00} & (16\%) & \num{9.389393e-01} & (11\%) & \num{8.659814e+00} & 70\% \\ \midrule $1024^3$ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 22 & 256 & \num{5.688231e+01} & (42\%) & \num{2.156576e+01} & (16\%) & \num{2.679725e+01} & (20\%) & \num{1.135775e+01} & (\phantom{0}8\%) & \num{1.367671e+02} & \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 43 & 512 & \num{2.853562e+01} & (39\%) & \num{1.060915e+01} & (14\%) & \num{1.703841e+01} & (23\%) & \num{6.417702e+00} & (\phantom{0}9\%) & \num{7.339710e+01} & 93\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 86 & 1024 & \num{1.451158e+01} & (39\%) & \num{5.225239e+00} & (14\%) & \num{7.749017e+00} & (21\%) & \num{3.290969e+00} & (\phantom{0}9\%) & \num{3.735317e+01} & 92\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 171 & 2048 & \num{7.222220e+00} & (35\%) & \num{3.263639e+00} & (16\%) & \num{4.129433e+00} & (20\%) & \num{2.150985e+00} & (10\%) & \num{2.077145e+01} & 82\% \\ & {\color{gray}\stepcounter{runidnum}\#\therunidnum} & 342 & 4096 & \num{4.488453e+00} & (28\%) & \num{2.300169e+00} & (15\%) & \num{3.201794e+00} & (21\%) & \num{1.756468e+00} & (11\%) & \num{1.553637e+01} & 55\% \\ \bottomrule \end{tabular} \end{table} \ipoint{Observations} The most important observations are the following: \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item We obtain a good strong scaling efficiency that is at the order of 60\%. \item The strong scaling results are in accordance with the performance reported in~\cite{Mang:2016a,Gholami:2017a}. The key difference is that the scalability of our new solver is dominated by the coarse grid discretization within the preconditioner. That is, we do not observe the scalability reported in~\cite{Mang:2016a,Gholami:2017a} if we execute \claire{} with the same amount of resources for a given resolution of the data. However, if we compare the scalability results reported in~\cite{Gholami:2017a} with a resolution that matches the coarse grid in the preconditioner, we can observe a similar strong scaling efficiency. \item We can solve clinically relevant problems in about \SI{2}{\second} if we execute \claire{} with 256 MPI tasks (see \runref{14} in \tabref{t:scalability-synthetic-ls5}). \item We can solve problems with up to \num{3221225472} unknowns in less then \SI{5}{\second} with 4096 MPI tasks on 342 compute nodes on TACC's Lonestar 5 system (see \runref{25} in \tabref{t:scalability-synthetic-ls5}). The solver converges in \SI{1.367671e+02}{\second} if we execute the run on 22 nodes with 256 MPI tasks. \end{itemize} \ipoint{Conclusions} With \claire{} we deploy a solver that scales on HPC platforms. \claire{} approaches run-times that represent a significant step towards providing \iquote{real-time} capabilities for clinically relevant problem sizes (inversion for $\sim$50 million unknowns in \SI{2.34}{\second} using 256 MPI tasks; see also~\cite{Mang:2016c,Gholami:2017a}). \claire{} provides fast solutions on moderately sized clusters (which could potentially be deployed to hospitals). We note that \claire{} does not require a cluster. It can be executed on individual compute nodes. Further accelerations on reduced hardware resources form the basis of our current work. \claire{} can also be used to solve diffeomorphic image registration problems of unprecedented scale, something that is of interest for whole body imaging~\cite{Tarnoki:2015a,Lecouvet:2016a} or experimental, high-resolution microscopic imaging~\cite{Kutten:2017a,Chung:2013a,Tomer:2014a}. The largest problem we have solved with our original implementation of \claire{} is \num{25769803776} unknowns (see~\cite{Gholami:2017a}). To the best of our knowledge, \claire{} is the only software for large deformation diffeomorphic registration with these capabilities. \section{Conclusions} \label{s:conclusions} With this publication we release \claire{}, a memory-distributed algorithm for stationary velocity field large deformation diffeomorphic image registration in 3D. This work builds up on our former contributions on constrained large deformation diffeomorphic image registration~\cite{Mang:2015a,Mang:2016a,Mang:2016c,Mang:2017b,Gholami:2017a,Mang:2018a}. We have performed a detailed benchmark study of the performance of \claire{} on synthetic and real data. We have studied the convergence for different schemes for preconditioning the reduced space Hessian in~\secref{s:precond-performance}. We have examined the rate of convergence of our Gauss--Newton--Krylov solver in \secref{s:convergence-nks}. We have reported results for different schemes available in \claire{} in \secref{s:time-to-solution} to study the time-to-solution. We have compared the registration quality obtained with \claire{} to different variants of the diffeomorphic \demons{} algorithm in \secref{s:reg-quality}. We have also reported strong scaling results for our improved memory-distributed solver on supercomputing platforms (see \secref{s:scalability}). We note that we accompany this work with supplementary materials that provides a more detailed picture about the performance of our method. The most important conclusions are the following: \begin{itemize}[align=left,leftmargin=1.8em,itemindent=0pt,labelsep=0pt,labelwidth=1.2em] \item \claire{} delivers high-fidelity results with well-behaved deformations. Our results are in accordance with observations we have made for the two-dimensional case~\cite{Mang:2016a}. Our $H^1$-div formulation outperforms the diffeomorphic \demons{} algorithm in terms of data fidelity and deformation regularity (as judged by the higher dice score and more well-behaved extremal values for the determinant of the deformation gradient; see \figref{f:claire-vs-demons-quality-nirep} in \secref{s:reg-quality}). \item Our Gauss--Newton--Krylov solver converges after only a few iterations to high-fidelity results. The rate of convergence of \claire{} is significantly better than that of the \demons{} algorithm (if we run the code on a single resolution level; see \figref{f:convergence-nirep-claire-vs-demons} in \secref{s:reg-quality}). \item \claire{} introduces different acceleration schemes. These schemes not only stabilize the computations but also lead to a reduction in runtime (see \tabref{t:results-nirep-runtime} in \secref{s:time-to-solution}). \claire{} delivers a speedup of $5\times$ for the parameter continuation. We observed a speedup of up to $17\times$ when considering a grid continuation scheme (results not reported here). We disregarded this scheme, because we observed a significant dependence of the performance on the regularity of the velocity. Combining the grid and parameter continuation scheme may yield an even better performance. Designing an effective schedule for a combined scheme remains subject to future work. \item Our two-level preconditioner is effective. We achieve the best performance if we compute the action of its inverse with a nested PCG method. This allows us to avoid a repeated estimation of spectral bounds of the reduced space Hessian operator, which is necessary if we consider a semi-iterative Chebyshev method. For real data, we achieve a moderate speedup of about $4\times$ for the entire inversion compared to our prior work~\cite{Mang:2016a}. Moreover, we saw that the performance of our schemes for preconditioning the reduced space Hessian is \emph{not} independent of the regularization parameter for the velocity. Designing a preconditioner that yields a good performance for vanishing regularity of the objects requires more work. \item \claire{} delivers good scalability results. In this work, we showcase results for up to $\num{3221225472}$ unknowns on 342 compute nodes of TACC's Lonestar 5 system executed with 4096 MPI tasks. This demonstrates that we can tackle applications that require the registration of high-resolution imaging data such as, e.g., CLARITY imaging (a new optical imaging technique that delivers sub-micron resolution~\cite{Kutten:2017a,Chung:2013a,Tomer:2014a}). Further, we demonstrated that \claire{} can deliver runtimes that represent a significant step towards providing \iquote{real-time} capabilities for clinically relevant problem sizes (inversion for $\sim$50 million unknowns in about \SI{2}{\second} using 256 MPI tasks). To the best of our knowledge, \claire{} is the only software with these capabilities. We emphasize that \claire{} does not need to be executed on an HPC system; it can be executed on a standard compute node with a single core. Further runtime accelerations on limited hardware resources form the basis of our current work. \end{itemize} With this work we have identified several aspects of \claire{} that need to be improved. The time-to-solution on a single workstation is not yet fully competitive with the diffeomorphic \demons{} algorithm. We are currently working on improvements to our computational kernels to further reduce the execution time of \claire{}. In addition to algorithmic improvements, we are also actively working on a GPU implementation of \claire{}. In our scheme, we fix the parameter that controls the penalty on the divergence of the velocity; we only search for an adequate the regularization parameter for the velocity automatically (using a binary search). We found that this scheme works well in practice. Introducing this penalty not only yields better behaved deformation map (determinant of deformation gradient remains close to one) but also stabilizes the computations~\cite{Mang:2017b}. Designing an efficient method to automatically identify both parameters requires more work. As we have mentioned in the limitations, \claire{} does not support time dependent (nonstationary) velocities. We note that certain applications may benefit from nonstationary $\vect{v}$. In this work, we have demonstrated experimentally that if we are only interested in registering two images, stationary $\vect{v}$ produce good results. This is in accordance with observations made in our past work~\cite{Mang:2015a,Mang:2016a,Mang:2017c,Scheufele:2019a,Gholami:2019a} as well as observations made by other groups~\cite{Arsigny:2006a,Ashburner:2007a,Hernandez:2009a,Lorenzi:2013a,Lorenzi:2013b,Vercauteren:2009a}. The design of efficient numerical schemes for nonstationary (time dependent) velocities is something we will address in our future work. Moreover, we are currently adding support for new distance measures to enable multi-modal registration. \paragraph{Acknowledgements.} We would like to thank Anna-Lena Belgardt for suggesting the name \claire{}.
\section*{Acknowledgement} The authors thank Joshua Anderson, Professors Emily Hoover, and Cindy Tong from the Department of Horticultural Science, University of Minnesota, for their expertise and help with the experiments. This work is supported in part by NSF grant \# 1317788, USDA NIFA MIN-98-G02 and the MnDrive initiative. \section*{References} \section{Conclusion and Future Work}\label{sec:conc} In this paper, we presented a complete yield estimation system for apple orchards from monocular images. From a purely technical point of view, our main contributions are a semi-supervised clustering method relying on color for identifying the apples and an unsupervised clustering method relying on shape to estimate the number of apples in a cluster. We verified the performance of our algorithms on multiple small datasets. Results indicate that these algorithms perform well in practice and outperform most of the existing methods in terms of detection and counting accuracy. As reported in section~\ref{subsec:count_res}, we count $89\% - 98\%$ of the visible apples from a single side of the row in different datasets. To be of practical usage though, we needed to correlate this single side counts with harvested yield. With the help of our recent work (\cite{dong2018treeSBA,techreportroy}), we merged the fruit counts from both sides of fruit tree rows. Our method achieved a varying accuracy of $91.98\% - 94.81\%$ across different datasets. In future, we would like to couple our system more closely with the 3D geometry of the environment. We would like to develop techniques to localize each individual apple in a cluster, find the pose of the fruit and measure its diameter. \subsection{Performance Evaluation of the Counting Method}\label{subsec:count_res} In this section, we quantify the performance of our counting method. We investigate how the algorithm (per-frame counting) performs on individual segmented images and how the overall performance (merging counts across frames) compares to human-perceived counts and ground truth. It is notable that following the segmentation step, all the bounding boxes with above nonzero intersection over union threshold are used in the counting step. For evaluating both per frame counting and merging, we utilize the videos collected from the validation datasets (Dataset1 - Dataset4). We start with the per-frame counting method. \subsubsection{Evaluation of Per-frame Counting Method:} To evaluate the performance of the per-frame counting algorithm, we took all the segmented images from seven videos collected from the four datasets. Afterward, we performed a connected component analysis on them, randomly selected $5000$ components and marked each one with the perceived count from a human point of view. These counts are then compared to the counts obtained from the algorithm. At this stage, we want the segmented images to be accurate and consequently, we use the \supemph{user-supervised} model for segmentation. \begin{figure*}[!hbpt] \centering \begin{subfigure}[b]{\textwidth}\begin{subfigure}[b]{.55\textwidth} \includegraphics[width=\textwidth]{confusionmat} \caption{Confusion matrix for the per-frame counting method.} \label{fig:confusionmat} \end{subfigure}\quad \begin{subfigure}[b]{.40\textwidth} \includegraphics[width=\textwidth]{ClusterDist} \caption{Distribution of cluster sizes.} \label{fig:clusterDist} \end{subfigure} \end{subfigure}\\ \begin{subfigure}[b]{\textwidth} \includegraphics[width=\textwidth]{datasetcount_} \caption{Accuracy of the per-frame counting method across different videos collected from Dataset1-Dataset4.} \label{fig:countdatasets} \end{subfigure} \caption{Evaluating the performance of the per-frame counting algorithm- confusion matrix (left), distribution of cluster sizes (middle) and performance across different datasets (right). The right-bottom cell in the confusion matrix (figure on left) shows that the overall accuracy of our method is $94.4\%$. The rightmost column (Rows $1-6$) shows the precision per cluster size and the bottom row (Columns $1-6$) shows recall per cluster size. From the figure on the middle, we find that single apple clusters are dominating the data ($75.31\%$). The figure on right shows how our counting accuracy varied from $94.01\% - 95.38\%$ across different videos.} \label{fig:analysis} \end{figure*} Essentially, we have three key insights from this experiment. First, it is evident from the confusion matrix (Fig.~\ref{fig:analysis}(\subref{fig:confusionmat})), that recall drops with increasing cluster size (varies from $62.7\% - 99\%$) but precision stays over $87\%$ for any cluster size (varies from $87.8\% - 96\%$). Second, for a large portion of the data - single apples ($75.31\%$ of entire data (Fig.~\ref{fig:analysis}(\subref{fig:clusterDist}))); the precision and recall of our algorithm are $96\%$ and $99\%$ respectively. Consequently, the overall accuracy of our method is high ($94.4\%$) (shown in the right-bottom cell in the confusion matrix). Third, low recall rates for larger clusters does not affect the overall performance. In the next section, utilizing the high precision and multiple views we achieve good recall on the entire data (Fig.~\ref{fig:countingtrack}(\subref{fig:dsetcountmodel})). Next, we quantify the effect of lighting conditions (sunny, shady, cloudy etc.) on the counting method. We computed the accuracy of the per-frame counting method across all the collected videos (which were collected in different lighting conditions). Our counting accuracy varied from $94.01\% - 95.38\%$. Undercounting percentage varies from $3.62\%- 5.67\%$ and overcounting varies from $.74\% - 1.1\%$. These results are presented in Fig.~\ref{fig:analysis}(\subref{fig:countdatasets}). In the next section, we evaluate the performance of merging the apple counts using camera motion. \subsubsection{Merging Counts Across Multiple Frames}To verify the performance of the merging method, we utilize the manual annotations. We treat the manually annotated fruits as human perceived ground truth. Afterward, we track these fruits across frames using camera motion (3D camera poses) to avoid double counting and find the number of unique apples. The counts obtained in this manner are then compared to the counts from our merging algorithm. \begin{figure*}[!hbpt] \centering \begin{subfigure}[b]{\textwidth}\begin{subfigure}[b]{.49\textwidth} \includegraphics[width=\textwidth]{trackingbyHomography_} \caption{Evaluation of tracking by homography.} \label{fig:trackHom} \end{subfigure}\quad \begin{subfigure}[b]{.49\textwidth} \includegraphics[width=\textwidth]{datasetWiseCountingModel_} \caption{Performance comparison of \supemph{semi-supervised} and \supemph{user-supervised} models for counting.} \label{fig:dsetcountmodel} \end{subfigure} \end{subfigure} \caption{Evaluating the performance of the counting algorithm along with tracking. The figure on left shows the percentage of overcounting due to using homography for tracking (up to $8\%$). Figure on the right shows, the percentage of visible apples counted by our method using both \supemph{semi-supervised} and \supemph{user-supervised} models.} \label{fig:countingtrack} \end{figure*} First, we quantify the amount of overcounting due to approximating the camera motion using homography. We performed this evaluation by simply comparing the number of unique manually labeled apples obtained from homography to the number of unique apples obtained by utilizing full 3D camera motion. The camera motions were computed using a commercial photogrammetry software Agisoft (\cite{agisoft}). We found that across different datasets; using homography can lead to $8\%$ overcounting. Fig.~\ref{fig:countingtrack}(\subref{fig:trackHom}) shows these results. Next, we evaluate the accuracy of the merged counts (tracking by homography) to human-perceived counts (tracking by 3D camera poses). To understand the importance of user interaction, we perform this analysis for both \supemph{semi-supervised} and \supemph{user-supervised} models (Fig.~\ref{fig:countingtrack}(\subref{fig:dsetcountmodel})). Our accuracy with respect to human perceived ground truth varies from $89\% - 98\%$ for the \supemph{user-supervised} model and $48\% - 98\%$ for the \supemph{semi-supervised} model. The drop in accuracy for the semi-supervised model was propagated from the segmentation phase. The main takeaways from these results are, 1)~accurate segmentation is very important for obtaining correct counts. 2)~based on the geometry of the environment and lighting conditions, we count $89\% - 98\%$ of the visible apples from a single side. In the next section, we investigate how the single side counts correlate with the actual yield. \subsection{Yield Estimation} Our original goal is to get an accurate yield estimate. For that, we need to correlate the counts from our algorithm (from the single side of a row) to the actual ground truth (number of harvested fruits). Toward this, we first try to find out a correlation between the number of visible apples from a single side and the actual yield. As mentioned earlier, we determine the total number of visible apples by tracking the manually labeled apples from a single side, utilizing estimated camera motion. For this step, we will use datasets where videos from both sides were collected (Dataset1, Dataset3, Dataset4). From Fig.~\ref{fig:singlesideyield}(\subref{fig:labelgt}), it is evident that the number of visible apples from a single side vary greatly across different datasets ($40.85\% - 79.83\%$). This is expected as the orchard from which we collected the data is not well trimmed and the size and shape of the trees varies significantly even within the same row. \begin{figure}[!hbpt] \centering \includegraphics[width =0.85\columnwidth]{dataset1_3d} \caption{Merged reconstruction for Dataset1.} \label{fig:mergeboth} \end{figure} Another simple solution is adding the apple counts from both sides and finding a correlation with the actual yield. Fig.~\ref{fig:singlesideyield}(\subref{fig:yieldsum}) shows these results and again, the summed yields vary considerably across datasets ($101.93\% - 150\%$). Therefore, to get a useful estimate we need to merge the fruit counts from both sides of the tree rows. Next, we discuss this procedure in details. To merge counts from both sides, we utilize the 3D geometry of the environment. We reconstruct each side of the row using captured images. We use a photogrammetry software Agisoft (\cite{agisoft}) for this purpose. Afterward, we merge the reconstructions from both sides using semantic constraints (\cite{dong2018treeSBA,techreportroy}). Fig.~\ref{fig:mergeboth} shows an example (merged reconstruction for Dataset1). \begin{figure*}[!hbpt] \centering \begin{subfigure}[b]{\textwidth}\begin{subfigure}[b]{.485\textwidth} \includegraphics[width=\textwidth]{labelledvsgt_} \caption{Percentage of visible apples from a single side compared to ground truth yield.} \label{fig:labelgt} \end{subfigure}\quad \begin{subfigure}[b]{.485\textwidth} \includegraphics[width=\textwidth]{summedYield_} \caption{Summed counts from single sides compared to obtained ground truth.} \label{fig:yieldsum} \end{subfigure} \end{subfigure} \caption{Correlation between single side fruit counts and actual yield. The figure on left shows the percentage of visible apples from a single side compared to ground truth ($40.85\% - 79.83\%$). Figure on the right shows the summed fruit counts from both sides compared to ground truth fruit counts ($101.93\% - 150\%$).} \label{fig:singlesideyield} \end{figure*} Next, we detect the fruits using our segmentation method (Section~\ref{sec:segmentation}) and back-project the detected fruits in the images to obtain the fruit location in the 3D reconstruction. Fig.~\ref{fig:applecountingbothsides} shows an example. We perform a connected component analysis to detect the apple clusters in 3D. Then we project individual 3D clusters back to the images by utilizing the recovered camera motion. We count the fruits from these reprojected images using our counting method developed in Section~\ref{sec:counting}. A 3D cluster can be tracked over many frames. We choose three frames with the highest amount of detected apple pixels (from the 3D cluster) and report the median count of these three frames as the fruit count for the cluster. We follow this procedure for all the detected 3D clusters and aggregate the fruit count from a single side. To merge the counts from both sides, we compute the intersection of the connected components from both sides. Afterward, we compute the total counts by using the inclusion-exclusion principle (\cite{andreescu2004inclusion}). Essentially, we sum up the counts from all the connected components, compute the intersections area among them and add/subtract the weighted parts accordingly. Fig.~\ref{fig:fruitCount} shows our result. Our counting accuracy from both sides for Dataset1, Dataset3 and Dataset4 are $94.81\%,91.98\%,\text{and } 94.68\%$ respectively. Compared to both side counts, if we just add the single side counts we overcount significantly ($128.89\%,150\%,\text{and } 101.93\%$ for Dataset1, Dataset3, and Dataset4 respectively). Table~\ref{tab:yield} summarizes the final yield result. It indicates that merging the rows from both sides is essential to obtain accurate yield. \begin{figure*}[!hbpt] \centering \includegraphics[width=0.90\textwidth]{Apples_in_3D.pdf} \caption{Apples in 3D and intersecting clusters from both sides. Left figure shows the apples from the front side of Dataset1 detected in 3D. Figure in the middle shows the computed connected components on this apples. Figure in the right shows how the connected components from the back are intersecting with the front ones.} \label{fig:applecountingbothsides} \end{figure*} \begin{table*} \centering \begin{tabular}{|c|c|c|c|} \hline \rule[-1ex]{0pt}{2.5ex} & Harvested fruit counts & Merged fruit counts from both sides & Sum of fruit counts from single sides \\ \hline \rule[-1ex]{0pt}{2.5ex} Dataset1 & $270$ & $256$ ($94.81\%$) & $348$ ($128.89\%$) \\ \hline \rule[-1ex]{0pt}{2.5ex} Dataset3 & $274$ & $252$ ($91.98\%$) & $411$ ($150\%$)\\ \hline \rule[-1ex]{0pt}{2.5ex} Dataset4 & $414$ & $392$ ($94.68\%$) & $422$ ($101.93\%$)\\ \hline \end{tabular} \caption{Summary of yield results.} \label{tab:yield} \end{table*} \begin{figure}[!hbpt] \centering \includegraphics[width =0.90\columnwidth]{full3DCount1} \caption{Total fruit counts computed from the merged reconstruction and independent single side reconstructions compared to ground truth. The single side fruit counts are computed by summing up independent single side counts ($101.93\%- 150\%$). Evidently, the counts from merged reconstructions are more consistent ($91.98\% - 94.81\%$).} \label{fig:fruitCount} \end{figure} \section{Counting Apples and Merging the Counts across Multiple Frames}\label{sec:counting} After the segmentation phase, we count the number of apples from each segmented frame and merge the counts across multiple frames utilizing the estimated camera motion. In this section, we present both of these methods in detail. We start with per frame counting in the following section. \subsection{Per Frame Counting}\label{subsec:perframecount} Given a segmented input image, we would like to find the number and location of all the apples in the image. We use a Gaussian Mixture Models (GMM) based clustering method. Instead of color, we now focus on the spatial components of the image. This method holds numerous advantages over the Circular Hough Transform (CHT) based techniques (\cite{cht}) - it does not require manual parameter tuning, can handle a significant level of occlusion and find apples of rapidly varying size. A preliminary version of this algorithm was presented in (\cite{roy2016counting}). In ~\cite{roy2016counting}, we showed the comparison of this method with a baseline method similar to CHT and it outperformed it significantly (the accuracy of baseline method $69\%$, the accuracy of GMM based method $91\%$). In this, paper we further validate the method with ground truth from multiple datasets and implement it in a close to a real-time system performing at 2-3 fps. In our method, each apple is modeled by a Gaussian probability distribution function (pdf) and apple clusters are modeled as a mixture of Gaussians. We start by converting the input cluster image $I$ to binary. Let this binary image be denoted by $I_{b}$. The locations of the non-zero pixels in the binary image are used as input to GMM. \noindent Let X represent the set of apples we are trying to find. Then, we can convert our problem to a Gaussian mixture model formulation in the following way: \begin{equation} P(I_b|X) = G^k(\phi,\mu,\Sigma) = \sum_{i = 1}^k \phi_{i} G_{i}(\mu_{i},\Sigma_{i}) \end{equation} Here, $G^k(\phi,\mu,\Sigma)$ is a Gaussian mixture model with $k$ components, and $G_{i}$ is the $i$~th component of the mixture. $\mu_{i}$ and $\Sigma_{i}$ are the mean and covariance of the $i^{th}$ component. The covariance matrix $\Sigma_{i} = \left[\sigma_{x_{i}}^2,\sigma_{y_{i}}^2\right]$ is diagonal. $\phi_{i}$ is the weight of the $i^{th}$ component where $\sum_{i= 1}^k \phi_{i} = 1$ and $0\leq \phi_{i}\leq 1$. Given model parameters $\theta = \{ \phi, \mu, \Sigma \}$, the problem of finding the location of the center of the apples and their pixel diameters can be formulated as computing the world model which maximizes $P(I_b|X)$. Each component $G_{i}(\mu_{i},\Sigma_{i})$ of the mixture model represents an apple with center at $\mu_{i}$, equatorial radius $2\sigma_{x_{i}}$ and axial radius $2\sigma_{y_{i}}$. \noindent A common technique to solve for $\arg \max P(I_b|X)$ is the expectation maximization (EM) algorithm (\cite{em}). As is well-known, EM provides us a local greedy solution to the problem. Since EM is susceptible to local maxima, initialization is very important. We used K-means++ (\cite{kmeans}) (which uses randomly-selected seeds to avoid local maxima) for initialization of EM. \textbf{Selecting the Number of Components:} In our problem formulation, the number of components $k$ is the total number of apples in image $I$. EM enables us to find the optimal location of the apples given the total number of apples $k$. Our main technical contribution is a method to calculate the correct $k$. Let the correct number of apples in the input image be $\kappa$. We tried different state-of-the-art techniques (Akaike Information Criterion (AIC) (\cite{mdt}), Minimum Description Length (MDL) (\cite{mdt}) etc.) for finding $\kappa$. None of them worked out of the box for our purposes (Fig.~\ref{fig:aic}). Therefore, we propose a new heuristic for evaluating mixture models with a different number of components based on MDL. \begin{figure}[!hbpt] \centering \includegraphics[scale = .25]{AIC} \caption{Popular methods like AIC/BIC do not work out of the box for our purposes. These criteria have a tendency of choosing higher values of $k$. In this synthetic image, we have only five circles but the AIC based criterion value (Bar plot in the middle) was lowest for $k = 6$ and consequently, it finds eight apples.} \label{fig:aic} \end{figure} Let $\sigma_{min} = min(\sigma_{x_{i}},\sigma_{y_{i}})$ and $\sigma_{max} = max(\sigma_{x_{i}},\sigma_{y_{i}})$. Using the mean and covariances of the $i$th component we define a $2D$ Gaussian kernel $\mathcal{G}(\mu_{i},\sigma_{max})$ where $\sigma_{max}$ is the variance. Let $P(\mu_{i})$ denote the response of the kernel when placed at the center $\mu_{i}$ in the original input image $I$ and $C_{i}$ denote the total number of pixels clustered by $G_{i}(\mu_i,\Sigma_i)$. For each component $G_{i}(\mu_i,\Sigma_i)$, of the mixture model $G^k(\phi,\mu,\Sigma)$ we define the reward $R_{i}$ in the following way, \begin{equation} \begin{split} R_i(G_{i}) = \phi_{i}\left[ P(\mu_{i})+ P(\mu_{i})\left(\frac{\sigma_{min}}{\sigma_{max}}\right)^2 +\right. \\ \left. P(\mu_{i})\frac{C_{i}}{\pi \sigma_{max}\sigma_{min}} - \frac{1}{3}\left( \pi\sigma_{x_{i}}\sigma_{y_{i}} -C_{i} \right) \right] \end{split} \label{eq:reward} \end{equation} For most of the images, we only capture the frontal views of the apples, which can be easily approximated by circles lying on a plane. All four terms in equation~\eqref{eq:reward} reward specific spatial characteristics of the Gaussian pdf related to this fact. $P(\mu_{i})$ represents the strength of the distribution in terms of pixel values and is present in the first three terms. The second term rewards circular shaped distributions using the eccentricity of the pdf. As the eccentricity $\epsilon = \sqrt{1- \frac{\sigma_{min}^2}{\sigma_{max}^2}}$ for circles is zero, we use $1-\epsilon^2 = \left(\frac{\sigma_{min}}{\sigma_{max}}\right)^2$ as the rewarding factor. The third term rewards coverage. The fourth term penalizes Gaussian pdfs covering large area and clustering very few points. Now if we find out the reward $R_i(G_{i}(\mu_i,\Sigma_i))$ for all the components $k$, the total reward for the mixture model $G^k(\phi,\mu,\Sigma)$ can be computed by summing them together. Next, we define the penalty term. The traditional MDL penalty term is $U = c p \log(|Y|)$ where $p$ is the number of parameters in the model, $|Y|$ is the total size of the input data, and $c = \frac{1}{2}$ is a constant. Based on this principle, our penalty term is $V(G^k(\phi,\mu,\Sigma))$ is defined as the following \begin{equation} V(G^k(\phi,\mu,\Sigma)) = c'(3k) \log(\sum_{\vec{x}}(I_b(\vec{x}) \neq 0))) \label{eq:penalty} \end{equation} where $x$ represents the pixel index across the image $I_b$. Compared to the traditional MDL based penalty we have the constant $c' =\frac{3}{2}$ instead of $c =\frac{1}{2}$. This is attributed to the fact that the reward expression~\eqref{eq:reward} has three terms compared to one. The number of components $k$ is multiplied by three as each Gaussian has three parameters $\left[\mu_i,\sigma_{x_i}, \sigma_{y_i}\right]$. With these terms defined, we choose the correct number of components $\kappa$ in the following way: \begin{equation} \kappa = \argmax_k R(G^k(\phi,\mu,\Sigma))- V(G^k(\phi,\mu,\Sigma)) \label{eq:numcomp} \end{equation} \begin{figure}[!hbpt] \begin{subfigure}{\columnwidth} \centering \includegraphics[width = \columnwidth]{isersyncov} \caption{Predicted circles for different number of components in GMM.} \label{fig:gmmsyn} \end{subfigure}\\ \begin{subfigure}{\columnwidth} \centering \begin{subfigure}{.32\columnwidth} \centering \includegraphics[width = \textwidth]{iserscorepart11} \caption{Rewards.} \label{fig:gmmkplotrew} \end{subfigure}\begin{subfigure}{.32\columnwidth} \centering \includegraphics[width = \textwidth]{iserscorepart22} \caption{Penalties.} \label{fig:gmmkplotpen} \end{subfigure} \begin{subfigure}{.32\columnwidth} \centering \includegraphics[width = \textwidth]{iserscorepart33} \caption{Final score.} \label{fig:gmmkplot} \end{subfigure} \end{subfigure} \caption{A synthetic example consisting of six random circles and plots illustrating how the number of components are selected. Figure~(\subref{fig:gmmsyn}) shows how the pdfs cover the circles for different values of $k$. Figure~(\subref{fig:gmmkplotrew})-(\subref{fig:gmmkplot})shows the score calculated from the rewards and penalties following the right hand side of equation~\eqref{eq:numcomp}. The plot shows that the score is maximum for $k = 6$ which is indeed the correct number of components.} \label{fig:grpsyn} \end{figure} To have a better understanding of the selection procedure, we demonstrate a synthetic example at Fig.~\ref{fig:grpsyn}(\subref{fig:gmmsyn}). From Fig.~\ref{fig:grpsyn}(\subref{fig:gmmkplotrew}), it is evident that except for $k =6$, other mixtures have low circularity. The coverage rewards and pixel density components increase with $k$ and converge to a steady state. While the penalty for minimum description length principle increases with $k$, generally the penalty for coverage decreases with $k$. In this example, the crucial factors in determining the score are circularity and the coverage penalty. For $k = 6$ circularity is at the peak and coverage penalty is lowest and consequently, the score was maximum for $k = 6$. The plot of the corresponding rewards, penalties and final scores are shown in Fig.~\ref{fig:grpsyn}(\subref{fig:gmmkplotrew}) - (\subref{fig:gmmkplot}). We show sample results from our datasets in Fig.~\ref{fig:grpcongmm}. \begin{figure}[!hbpt] \centering \includegraphics[scale = .2]{applejournalcountreal.png} \label{fig:gmmex} \caption{A sample output from GMM on real data.} \label{fig:grpcongmm} \end{figure} After executing the counting algorithm on each of the bounding boxes we have the location of the apples within each box and the number of apples per box. This is the input to our merging method that merges the apple counts across multiple frames. We describe this procedure in details in the next section. \subsection{Merging Count Across Multiple Frames}\label{subsec:mergecount} The per-frame counting method provides us with the apple counts for a single frame. In natural settings though, the visibility of a particular cluster can change drastically with a change in camera position. A cluster might be completely invisible/partially visible from a particular view and yet clearly visible from other views. For these reasons, our segmentation method may not able to obtain the perfect segmentation in each frame and consequently, the predicted number of apples might be incorrect. Therefore, to obtain the correct apple count for each cluster we merge the counts from different frames. For this operation, we need to establish the correspondence between the clusters across multiple frames. It is executed by utilizing the camera motion. As our camera viewing direction does not change much, and the scene is roughly planar, we model the camera motion between consecutive frames by pairwise homography (\cite{eshel2008homography}). The homography between frames is estimated by matching SIFT (\cite{sift}) features above the ground. Using homography we will keep track of the boxes generated by the connected component analysis across the entire image sequence (Fig.~\ref{fig:trackcluster}). \begin{figure}[!hbpt] \centering \includegraphics[width =0.99\columnwidth]{clusterTrack_} \caption{Tracking an apple cluster over $31$ frames. For clarity only $13$ frames with significant changes are shown. The arrows indicate the direction of the views from start to end.} \label{fig:trackcluster} \end{figure} Let $b^1_1, b^1_2, \ldots b^1_m$ be the bounding boxes generated by connected component analysis for frame $1$. Let the apple count for each of this boxes be $c^1_1, c^1_2, \ldots c^1_m$ (computed by the counting method). When we find a bounding box for the first time we initialize a counting list that contains computed counts from the first frame. Now for frame $2$, let the bounding boxes be $b^{2}_1, b^{2}_2, \ldots b^{2}_n$ and the counts be $c^{2}_1, c^{2}_2, \ldots c^{2}_n$. Let the homography that maps frame $1$ to frame $2$ be $^2 H_{1}$. We propagate all the bounding boxes in frame $1$ to frame $2$ using $^2 H_{1}$. This is executed by multiplying the center of each bounding box with $^2 H_{1}$. Next, we check the overlap between these propagated bounding boxes and the original bounding boxes on frame $2$. If the overlap is more than $10\%$ we assume that these bounding boxes correspond to the same cluster. We will add the apple count to the list initialized previously using the following rules: \begin{itemize} \item When a bounding box in the current frame does not overlap with any of the propagated bounding boxes, a new counting list for this box is initialized with the current count. \item When only one bounding box in the current frame overlaps with a propagated bounding box, the count from the bounding box in the current frame is added to the counting list for the propagated box \item Otherwise, when two or more bounding boxes overlap with a bounding box from the previous frame, their counts are added to obtain the total count to be recorded in the list. To have a better understanding of this rule, we consider the following scenario: Let $b^2_1, b^2_3$ be overlapping with $b^1_1$. Prior to frame $2$ the counting list of $b^1_1$, $c_{b^1_1}$ had only one entry, $c^1_1$. As there is overlap, a new entry will be inserted. This new entry is $c'^2_1 = c^{2}_1 + c^{2}_3$. \item The overlapping bounding boxes are unioned to obtain a new bounding box covering all of them. These new bounding boxes will be propagated to the next frame. \end{itemize} \begin{figure}[!hbpt] \centering \includegraphics[width =0.90\columnwidth]{mergeApples_} \caption{Merging Apple Counts Across Frames. We keep track of the corresponding bounding boxes generated connected component analysis across multiple frames using homography. The count for every box from different frames is recorded throughout the entire video. In this example, $box_1$ appeared in frame $1,3, \ldots ,8$ and the counts for each of these frames $C_1,C_3 \ldots C_8$ were recorded. The median counts for each box are reported as the final output of the counting method.} \label{fig:mergecount} \end{figure} At the end of the image sequence, we have a set of unique boxes with count lists. We compute the median for each of the boxes and the sum of these are reported as the total count (Fig.~\ref{fig:mergecount}). \subsection{Datasets}\label{subsec:datasets} To verify the performance of our algorithms, we collected multiple datasets. We group these datasets into two categories, namely - ``Validation Datasets and Training Datasets''. As their names suggest, they are used for the purposes of validation, and training. All data were collected at the University of Minnesota Horticulture Research Center at Victoria Minnesota (Fig.~\ref{fig:datasite}), over the course of two years (2015 - 2016). \begin{figure}[!hbpt] \centering \begin{subfigure}[b]{.45\columnwidth} \includegraphics[width=\textwidth]{rowmap1} \end{subfigure}\quad \begin{subfigure}[b]{.45\columnwidth} \includegraphics[width=\textwidth]{rows1} \end{subfigure} \caption{Data collection site with annotated rows. The figure on left shows the orchard location and the figure on right shows the individual rows of apple trees.} \label{fig:datasite} \end{figure} Each of the videos collected from these datasets is tagged sunny/shady/cloudy based on the weather condition and whether the particular side of the row (captured in the video) was facing/opposing the sun. \paragraph{\textbf{Validation Datasets}} Since this is a research site, it is home to many different kinds of apple trees. We arbitrarily chose four different sections in the orchard. We collected seven videos from these four segments, all of which were annotated manually with fruit locations (annotation procedure will be discussed in the next section). We also collected ground truth for all of them by labeling the apples physically by stickers and measuring their diameter after harvest. The details of these datasets are the following: \begin{figure*}[!hbpt] \centering \begin{subfigure}{.18\textwidth} \includegraphics[width=\textwidth]{dataset11} \end{subfigure}\quad \begin{subfigure}{.18\textwidth} \includegraphics[width=\textwidth]{dataset222} \end{subfigure}\quad \begin{subfigure}{.18\textwidth} \includegraphics[width=\textwidth]{dataset31} \end{subfigure}\quad \begin{subfigure}{.18\textwidth} \includegraphics[width=\textwidth]{dataset41} \end{subfigure}\quad \begin{subfigure}{.18\textwidth} \includegraphics[width=\textwidth]{dataset20151} \end{subfigure} \caption{Sample images from used datasets. First four figures show sample images from the test datasets and the last one shows a sample image from our training dataset.} \label{fig:datasets} \end{figure*} \begin{description} \item[Dataset1] This dataset contains six trees. Most of the apples on these trees were fully red and the trees were mostly planar (most of the apples are visible from both sides). We collected videos from both sides (the side facing the sun and opposing the sun) of the row. In total, there were $270$ apples in these six trees. See Fig.~\ref{fig:datasets} (leftmost) for a sample image from this dataset. \item[Dataset2] This dataset contains four trees. The trees had a mixture of red and green apples and complex (non-planar) geometry. We collected a video from a single side of the row (the side facing the sun). In total, there were $568$ apples in these four trees. See Fig.~\ref{fig:datasets} (second from left) for a sample image from this dataset. \item[Dataset3] This dataset contains ten trees. Apples in these trees were mostly red and the trees had non-planar geometry. In total, there were $274$ apples in these ten trees. We collected videos from both sides (the side facing the sun and opposing the sun) of the row. See Fig.~\ref{fig:datasets} (third from left) for a sample image from this dataset. \item[Dataset4] This dataset contains six trees. Fruits in these trees were a mixture of red and green apples and the trees had non-planar geometry. We collected videos from both sides of the row (the side facing the sun and opposing the sun). In total, there were $414$ apples in these six trees. See Fig.~\ref{fig:datasets} (fourth from left) for a sample image from this dataset. \end{description} All of the videos collected from these datasets are used to validate our segmentation and counting algorithms. Additionally, Dataset $1,3$ and $4$ are used to verify the total fruit counts from both sides. As we only collected video from a single side of the row from Dataset2, it is not used to verify both side fruit counts. \paragraph{\textbf{Training Datasets}} To validate how our algorithms perform without user supervision, we picked a dataset from 2015. This dataset contains $76$ trees. Fruits in these trees were a mixture of red and green apples and the trees had non-planar geometry. We collected a video from a single side of a row (it was a cloudy day, both sides were illuminated similarly). This video is not annotated manually and ground truth for this dataset is unknown. We only used this dataset for developing a model to identify apples without any user intervention. In other words, the user input was provided for the 2015 dataset and used without modification for 2016 dataset. The four validation datasets were captured using a Samsung Galaxy $S4$ camera in September 2016. The training dataset was collected in 2015 using a Garmin VR camera. It is notable that, our data collection facility is not a commercial orchard. Consequently, there is a great amount of variability in the shape of the trees even within the same crop row, which makes the yield estimation problem harder. In the next section, we look at the process of annotating the datasets. \section{Experimental Results}\label{sec:expresult} In this section, we present experimental results validating our algorithms. We start with the datasets. \section{Related Work} \label{sec:relwork} There has been a significant recent activity for automating yield estimation(\cite{wang, das2015devices, hung2015feature,gongal2016apple}) in apple orchards. While some of these existing works focus on the entire yield estimation systems, others focus on specific components only. In this section, we first discuss complete yield estimation systems and then focus on individual components. Besides apples, our discussion includes yield estimation systems and components for fruits similar to apples such as citrus, pomegranates, tomatoes etc. \textbf{Complete Yield Estimation Systems:} \cite{wang} presented a complete system for apple yield estimation. Their system used a side facing, wide-baseline vertical stereo rig mounted on an autonomous ground vehicle. The system operated in controlled artificial illumination settings at night. It uses flashlights to illuminate the apples and classified them using HSV color thresholds. In addition to count information, the stereo system extracted fruit sizes. \cite{hung2015feature} presented a feature based learning approach for identification of red and green apples and extraction of fruit count. They used a conditional random field classifier to segment fruits using color and depth data. \cite{das2015devices} developed a sensor suite for extracting plant morphology, canopy volume, leaf area index and fruit counts that consists of a laser range scanner, multi-spectral cameras, a thermal imaging camera and navigational sensors. They used a Support Vector Machine (SVM) trained on pixel color to locate apples in images. \cite{gongal2016apple} developed a new sensor system with an over-the-row platform integrated with a tunnel structure which acquired images from opposite sides of apple trees. The tunnel structure is used to minimize illumination of apples with direct sunlight and to reduce the variability in lighting. In contrast to these systems, our goal is to develop a general computer vision system to extract the count of apples in an orchard row from a monocular camera. The system is independent of any particular hardware platform and can be used with a various type of robotic and non-robotic systems. In the rest of this section, we will discuss systems developed for tackling specific portions of the yield estimation system. \textbf{Apple Detection:} The problem of locating fruits from captured photographs have been studied extensively in the literature. Early systems relied on hard color thresholds. The early methods relying on machine learning were targeted to learn these thresholds. \cite{jimenez2000survey} presented a survey of these early computer vision methods for locating fruits on trees. More recent approaches include \cite{zhouGala}, who presented a method that uses RGB and HSV color thresholds to detect Gala apples. \cite{Linker}, used K-nearest neighbor (KNN) classifier along with blob and arc fitting to find red and green apples. The authors avoid specular lighting conditions by capturing images close to sunset. \cite{changyi2015apple} developed an apple detection method that uses backpropagation neural network (\cite{hecht1989theory}) trained on color features. Similar to them, \cite{liu2016method} presented a method for detecting apples at night using pixel color and position as features in neural networks. The earliest work close to our method is (\cite{tabb2006segmentation}) who developed a method for detecting apples from videos using background modeling by global Gaussian mixture models (GMM). The method relied on images collected using an over-the-row harvester platform that provides a consistent background and illumination setting. In contrast, we operate in natural settings, use GMM for unsupervised clustering in every image and classify them using pre-trained models. \textbf{Deep Learning for Detecting Apples:} Recent advancements in deep learning inspired researchers to apply these techniques for identifying apples. \cite{bargoti2017image} used Multi-Scale Multi-Layered Perceptron network (MLP) for apple and almond detection. \cite{stein2016image} used a similar deep learning technique to identify mangoes. \cite{chen2017counting} used a Fully Convolutional Neural Network (\cite{long2015fully}) for apple segmentation. Though deep learning methods are accurate, they require a large amount of training data [e.g we trained a Fully Convolutional Network (FCN) using the data from (\cite{bargoti2017image}) and the network did not perform well on our data. When we use some of our data for training though, performance improved drastically]. Generating such training data for different varieties of apples, in different lighting conditions are tedious and cumbersome. In contrast, our method generalizes to any variety of apples and different lighting conditions (as long as apples can be distinguished from other objects by color) using a modest amount of user assistance. \textbf{Registering Fruits Across Images:} Compared to locating fruits in images, the studies on registering fruits across multiple images has been limited. Only the systems with full yield estimation pipelines studied this problem. \cite{wang} used stereo cameras and point cloud alignment (using odometry and GPS) to avoid double counting. They aligned the apples in 3D space and removed the ones which are within five centimeters of a previously registered apple. \cite{hung2015feature} used sampling at certain intervals to remove overlap between images. \cite{das2015devices} used optical flow and navigational sensors to avoid duplicate apples. In our previous work (\cite{roy2016surveying}), we presented a novel method for registering apples based on affine tracking (\cite{Kannade}) and incremental structure from motion (SfM) (\cite{sinha2014multi}). In this work, we are using homography between frames to track fruits and to avoid double counting. To obtain an accurate yield estimate, in addition to registering fruits from a single side, we need to register the fruits from both sides of the row. Only \cite{wang} handles this problem and used point cloud alignment using odometry and GPS. In this paper, we utilize a novel technique that utilizes global and local semantic information (ground plane, tree trunks, the silhouette of foliage etc.) for merging the apple counts from both sides (\cite{dong2018treeSBA,techreportroy}). \textbf{Counting Fruits:} Most of the yield estimation work described before report counting results. The methods for counting fruits from segmented images are dominated by circular Hough transforms (CHT) (\cite{silwal2014apple,changyi2015apple,liu2016method}). The main bottleneck of using CHT is that the parameters need to be tuned across different datasets. Another issue with this method is occlusion. Due to occlusion many apples are not fully visible and cannot be approximated by a circle. Different from these methods, \cite{senthilnath2016detection} used K-means, a mixture of Gaussians and Self-Organizing Maps (SOM) to detect individual tomatoes within a cluster. They used the Bayesian Information Criterion (BIC) (\cite{bic}) to select the optimal number of components in these methods. \cite{chen2017counting} used a neural network for determining the count of the apples. In contrast, we use a Gaussian mixture model to count the apples from registered and segmented apple clusters. Unlike CHT, our method does not require any parameter tuning and can handle arbitrarily complex clusters. Unlike the neural network based methods, it does not require any training. The method yields competitive results compared to most of the state of the art methods. In this paper, we present a complete computer vision system for yield estimation in apple orchards. We present a novel segmentation method for detecting apples, a tracking method based on homography and a non-parametric counting algorithm. We start with an overview of the entire system in the next section. \subsection{Performance Evaluation of the Segmentation Method}\label{subsec:seg_res} \begin{figure*}[!hbpt] \centering \begin{subfigure}[b]{.31\textwidth} \includegraphics[width =\textwidth]{seg_eval} \caption{Evaluation metric for segmentation} \label{fig:segmentation_evaluation} \end{subfigure}\quad \begin{subfigure}[b]{.30 \textwidth} \raggedleft \includegraphics[width = \textwidth]{recall_individual_zero_} \caption{Per-frame recall} \label{fig:inherent_fuziness} \end{subfigure}\quad \begin{subfigure}[b]{.32 \textwidth} \raggedleft \includegraphics[width = \textwidth]{pframePrecision_} \caption{Per-frame precision} \label{fig:pframeprecision} \end{subfigure} \caption{Evaluation metric for segmentation, per-frame recall and precision. Figure on left shows how segmentation accuracy is evaluated by performing one to one comparison between the ground truth and our resultant bounding boxes. The figure on the middle, shows the variance in recall for per frame segmentation. The rightmost image shows that, our precision per-frame is always over $87\%$. Coupling this with multiple views we achieve high precision and recall (Fig.~\ref{fig:recgoodmarginal}, \ref{fig:prec}, \ref{fig:rec}, \ref{fig:f1measure}) for the entire videos.} \label{fig:eval_metric} \end{figure*} In this section, we study the performance of our segmentation method. In particular, we investigate its sensitivity with respect to user supervision across the validation datasets. We use three metrics, precision, recall and $F_1$- measure for this purpose. As is well-known in literature, these metrics are obtained using true positives (TP), false positives (FP) and false negatives (FN). Formally, $\texttt{precision} = \frac {\texttt{TP}}{\texttt{TP}+\texttt{FP}}$ and $\texttt{recall} = \frac {\texttt{TP}}{\texttt{TP}+\texttt{FN}}$ and $F_1$ measure = $2 \left(\frac{\texttt{precision} \cdot \texttt{recall}}{\texttt{precision} + \texttt{recall}} \right)$. We define \texttt{TP, FP} and \texttt{FN} using manually tagged apples and the apples detected by our algorithm. Specifically, \texttt{TP =} apples detected by our algorithm and tagged manually, \texttt{FP =} apples detected by the algorithm but not tagged manually, \texttt{FN =} apples tagged manually but not detected by our algorithm. We compare the bounding boxes computed by our algorithm to manually drawn bounding boxes (guidelines for the manual annotation procedure was described in the previous section). To evaluate the quality of a particular bounding box generated by our algorithm, we use a metric well-known in the literature as the intersection over union (IoU) threshold (\cite{intersectionunion}). This method factors in how much of each bounding box is detected by our algorithm (Fig.~\ref{fig:eval_metric}(\subref{fig:segmentation_evaluation})). We demonstrate the performance of our algorithm in terms of precision, recall and $F_1$- measure over the entire range of intersection over union threshold. For the purposes of counting though, we utilize a nominal nonzero intersection over union threshold ($\textbf{0.01}$). One of the advantages of our algorithm is that, we do not detect all the apples on a single image. We utilize multiple views available from the video. It is evident from Fig.~\ref{fig:eval_metric}(\subref{fig:inherent_fuziness}) that for single frames even for nonzero intersection over union threshold (means if the algorithm detected bounding boxes just touches the ground truth), the per-frame apple detection rate (recall) varies significantly. Nevertheless, our per-frame precision is always over $87\%$ and with the help of multiple views of each apple cluster we achieve high precision and recall ( Fig.~\ref{fig:recgoodmarginal}, \ref{fig:prec}, \ref{fig:rec}, \ref{fig:f1measure}). In order to test the performance without user intervention, we trained a classification model from the dataset collected in 2015 and used this model for detecting apples from the validation dataset collected in 2016. To test the effect of user supervision on specific videos collected from datasets, we let users choose the apples from the first fifty frames of the input video. We utilize the clusters chosen by the users to build the classification model and use this model for segmenting apples. For the rest of the paper, we will refer to these two types of classification models as \textbf{\emph{semi-supervised}} and \textbf{\emph{user-supervised}} models. \begin{figure*}[!hbpt] \centering \includegraphics[width=\textwidth]{rec_good_marginal1} \caption{Recall (hit rate) for clearly visible, marginally visible and all apples for both semi-supervised and \supemph{user-supervised} case. As expected, the recall for clearly visible apples are high, and the recall for marginally visible apples are low. The overall recall is in between this low and high bound.} \label{fig:recgoodmarginal} \end{figure*} First, we evaluate the computed recall for clearly and marginally visible apples. According to the visibility guidelines discussed in Section~\ref{subsec:manuallabel}, the recall/ hit rate for clearly visible apples should be higher than the recall for marginally visible apples. Fig.~\ref{fig:recgoodmarginal} shows, that this is indeed the case for both the \supemph{semi-supervised} and \supemph{user-supervised} classification models. We show the results for two different videos from the validation datasets (Dataset1 and Dataset2) in Fig.~\ref{fig:recgoodmarginal}. For the figures on the top row, both models achieve high recall. For the figures on bottom row the \supemph{semi-supervised} model has a low recall and the \supemph{user-supervised} model has high recall. Importantly though, for all the figures we see that recall for clearly visible apples are higher than recall for marginally visible apples and the overall recall is in between these two (especially for high IoU thresholds). \begin{figure*}[!hbpt] \centering \includegraphics[width=.9\textwidth]{precision_alldataset_} \caption{Precision for \supemph{semi-supervised} and \supemph{user-supervised} models. For all the videos, the obtained precision is similar for both models.} \label{fig:prec} \end{figure*} Second, we investigate the sensitivity of user input. For the \supemph{user-supervised} case, we only allow choosing apples for the first fifty frames. We see in Fig.~\ref{fig:prec},\ref{fig:rec} for the first five videos collected from Dataset1, Dataset3 and Dataset4 the precision and recall for both the \supemph{user-supervised} and \supemph{semi-supervised} models are similar. However, for the video collected from Dataset2, the apples are a mixture of red and green. Therefore, the \supemph{semi-supervised} classification model does not generalize well. Consequently, the precision is similar but the recall drops by $20\%$. \begin{figure*}[!hbpt] \centering \includegraphics[width=.9\textwidth]{recall_alldataset_} \caption{Recall for \supemph{semi-supervised} and \supemph{user-supervised} models. For the five videos (collected from Dataset1, Dataset3, Dataset4) the recall for both models is similar. For the last video (collected from Dataset2) the recall for the \supemph{semi-supervised} model drops by $20\%$. This is due to the fact that, the apples contained this video are a mixture of green and red which is not captured by the \supemph{semi-supervised} model representing primarily red apples.} \label{fig:rec} \end{figure*} Finally, it is desired to obtain a single number associated with the performance of the algorithm. We use $F_1$- measure for this purpose. This is the harmonic mean of precision and recall. Our $F_1$-measure ranges from $.95-.97$ for six videos (Fig. \ref{fig:f1measure}, Table~\ref{tab:f1}) for nonzero intersection over union threshold. The best known $F_1$-measure $.91$ was obtained by (\cite{deepApple}). As the datasets are different, and our method does not maximize detection for a single image, a direct comparison is not possible. In the next section, we investigate the performance of our counting algorithm. \begin{figure*}[!hbpt] \centering \includegraphics[width=.9\textwidth]{f1measure_} \caption{$F_1$ - measure for both \supemph{semi-supervised} and \supemph{user-supervised} models.} \label{fig:f1measure} \end{figure*} \begin{table} \begin{tabular}{|c|c|c|} \hline Datasets & \supemph{Semi-supervised} & \supemph{User-supervised} \\ \hline $D_1$ (Sunny) & .9662 & .9658 \\ \hline $D_1$ (Shady) & .9585 & .9609 \\ \hline $D_3$ (Sunny) & .9738 & .9711 \\ \hline $D_3$ (Shady) & .9541 & .9592 \\ \hline $D_4$ (Sunny) & .9774 & .9775 \\ \hline $D_2$ (Sunny) & .8931 & .9710 \\ \hline \end{tabular} \caption{$F_1$- Measure for the Validation Dataset for IoU = .01. Here, $D_1, D_2, D_3, D_4$ denote Dataset1, Dataset2, Dataset3 and Dataset4.} \label{tab:f1} \end{table} \section{Apple Segmentation}\label{sec:segmentation} In the segmentation stage, the goal is to identify pixels which are likely to belong to an apple. Specifically, the segmentation algorithm takes as input an RGB image and produces a binary mask where pixels belonging to apples are marked as ones and all other pixels are marked as zeros. One approach to segmentation is to simply choose apple pixels based on predetermined thresholds on color values. While this approach has the advantage of simplicity, in field conditions it often fails due to the variability of lighting conditions. In recent years, deep-learning-based approaches such as convolutional neural networks emerged as powerful, general methods for image classification. Recently their extension to Fully Convolutional Networks (FCN) trained for pixel-wise prediction has gained popularity for fruit and crop segmentation (\cite{chen2017counting}). While these models achieve high accuracy, training a network general enough to accommodate variations in light and visibility conditions remains challenging. Further, training FCN’s for each orchard video separately requires a significant amount of human labor involved in generating ground truth label for each apple. We propose a semi-supervised image segmentation method based on color and shape features of apples. By itself, the segmentation algorithm runs at $5$ to $6$ frames per second on images of size $1920 \times 1080$ and 15 frames per second for images of the size of $640 \times 480$ on a DELL XPS laptop with 16GB RAM and 2GB GPU memory. The training required from the user is minimal. It is assisted by a simple, convenient user interface. As we show in Section~\ref{subsec:seg_res}, the method generalizes well for the cases where the training and testing data are from different portions of an orchard taken on different days. Our method is expected to work for cases where apples are visibly distinguishable from the surrounding vegetation based on the color. Some working and challenging conditions are shown in Fig.~\ref{fig:Conditions}. \begin{figure}[!hbpt] \centering \includegraphics[width= \columnwidth]{all_semantic_entities1} \caption{Gaussian representation of semantic entities. Each blue data point is the mean LAB color for each superpixel in the image. Each $3D$ ellipsoid represents the Gaussian fit on clusters obtained from unsupervised clustering using EM and GMM. For visualization, showing $19\%$ of the standard deviation for each Gaussian ellipsoid. Red colored ellipsoids are capturing the superpixels belonging to apples.} \label{fig:all_semantic_entities} \end{figure} \begin{figure}[!hbpt] \centering \begin{subfigure}{0.4\textwidth} \includegraphics[scale= 0.4]{init_and_usage.pdf} \caption{Input is a video. For each frame in the initialization step, among all Gaussian components $G_i$, $G_k$ are chosen and saved in a list using a UI. These saved $G_k$ are used for finding Gaussian components in the usage step.} \label{fig:init_and_usage} \end{subfigure}\quad \begin{subfigure}{0.35\textwidth} \includegraphics[scale= 0.5]{General_paradigm} \hspace*{-1cm}\caption{A general way of using the Usage and Initialization phase for a dataset.} \label{fig:General_paradigm} \end{subfigure} \caption{Explanation of the user interface.} \label{fig:init_genparadigm} \end{figure} \textbf{Details of the segmentation process:} For each frame in the image sequence, we convert it from RGB to LAB (\cite{gauch1992comparison}) color space and perform SLIC superpixel segmentation (Fig.~\ref{fig:seg_pipeline}(\subref{fig:pipe2})) (\cite{achanta2012slic}). This generates a set of superpixels $\mathcal{S}$ for each image. $$\mathcal{S}=\{\mathbf{s_1},...,\mathbf{s_N}\}$$ Here each superpixel $\mathbf{s_i}$ is represented by $\{ \mu^L_i, \mu^A_i, \mu^B_i \}$, the mean L,A,B values for all pixels $\mathbf{s_i}$. We assume that the set $\mathcal{S}$ of superpixels can be modeled as a density function $p(\mathbf{s}|\theta)$ governed by the set of parameters $\theta$. For soft segmentation, we model $\mathcal{S}$ as a Gaussian Mixture Model(GMM) (\cite{chuang2001bayesian, ruzon2000alpha}) with $M$ components. Hence $p$ is represented by a set of Gaussian components $G_i$ and parameters $\theta$ as the respective mean $\mu_i$ and covariances $\Sigma_i$ for each $G_i$. $$ p(\mathbf{s}|\theta)=\sum_{i=1}^M{\alpha_i G_i(\mathbf{s}|\mu_i, \Sigma_i)} $$ such that $\sum_{i=1}^M{\alpha_i}=1$ The likelihood function of the parameters can be written as: $$ \mathcal{L}(\mu,\Sigma|\mathcal{S}) = \prod_{i=1}^N{p(\mathbf{s_i}|\mu_i,\Sigma_i)} $$ The resultant Gaussian mixture density estimation problem is: $$(\mu^*, \Sigma^*) = \arg\!\max_{\mu, \Sigma} {\mathcal{L}(\mu,\Sigma|\mathcal{S})} $$ where $\mu^*={\mu^*_1,...,\mu^*_M}$ and $\Sigma^*={\Sigma^*_1,...,\Sigma^*_M}$. Expectation Maximization (EM) is used (\cite{em}) to estimate $\mu^*_i, \Sigma^*_i$ for each Gaussian cluster $G_i$. Each Gaussian cluster $G_i$ thus generated contains similar colored superpixels (Fig.~\ref{fig:all_semantic_entities}) and represents different semantic entities of an orchard frame such as the sky, soil, apples, leaves, branches, etc. Next, we identify which among these $G_i$ capture superpixels belonging to apples. We divide this step into two parts: (1)~$\textit{initialization}$ and (2)~$\textit{usage}$ (Fig.~\ref{fig:init_genparadigm}(\subref{fig:init_and_usage})). In the $\textit{initialization}$ phase, we provide an interface for a user to interact with the $G_i$. Here the user is allowed to: \begin{itemize} \item select components $G_k$ which completely capture apples. For each selected $G_k$, their respective $\mu_k^*$ and $\Sigma_k^*$ are pushed in a list in memory. \item delete components from the list stored in memory. This step is generally needed where there is a sudden illumination change and the previous stored components $G_k$ become bad (Fig.~\ref{fig:init_genparadigm}(\subref{fig:General_paradigm})). We can update the old list, and continue the segmentation process from the current frame. \end{itemize} In the $\textit{usage}$ phase, the user interface is not invoked. To find components belonging to apples, we perform a simple matching between the current frame's $G_i$ and the saved $G_k$. We use KL Divergence as the distance measure for comparing Gaussians from $G_i$ and $G_k$. For a matched Gaussian $G_i$, all the superpixels within the $90\%$ confidence bounds are identified as superpixels belonging to apples. A normal usage paradigm is shown in Fig.~\ref{fig:init_genparadigm}(\subref{fig:General_paradigm}). \begin{figure*}[!hbpt] \centering \begin{subfigure}[b]{.23 \textwidth} \includegraphics[scale=.15]{pipeline1} \caption{Input image.} \label{fig:pipe1} \end{subfigure}\quad \begin{subfigure}[b]{.23 \textwidth} \includegraphics[scale=.15]{pipeline2} \caption{Superpixel segmentation.} \label{fig:pipe2} \end{subfigure} \begin{subfigure}[b]{.23 \textwidth} \includegraphics[scale=.15]{pipeline5} \caption{Apple segmentation.} \label{fig:pipe4} \end{subfigure} \begin{subfigure}[b]{.23 \textwidth} \includegraphics[scale=.15]{pipeline4} \caption{Detection.} \label{fig:pipe5} \end{subfigure} \caption{Segmentation pipeline.} \label{fig:seg_pipeline} \end{figure*} \section{Problem Formulation and Overview of Our Computer Vision System}\label{sec:system} In this section, we formalize our problem definition and present a brief overview of our system. We start with the problem definition.\\ \textbf{Problem Formulation:} Given a set of images from a calibrated monocular camera facing one side of a row in an apple orchard (where it is assumed that the variance in viewing direction is very small), we want to compute the total apple counts from the entire image sequence. To solve this problem, we proceed in a per frame manner - separate the apple pixels from others in every frame and count the number of apples in each of them. Afterward, we merge the information across multiple frames by utilizing the approximate camera motion from pairwise homographies. We discuss the components of our system briefly in the rest of this section. \subsection{Segmentation}\label{subsec:syssegmentation} The segmentation component takes as input a color image for each frame, and outputs a binary mask which marks whether each pixel in the image belongs to the class \texttt{apple} (Fig.~\ref{fig:seg_pipeline}). This component is presented in detail at Section~\ref{sec:segmentation}. First, the image is over-segmented into SLIC superpixels (\cite{achanta2012slic}), using the LAB colorspace. A single representative color (mean LAB color of the pixels within the superpixel) is assigned to each superpixel. Then superpixels are clustered by color into approximately $25$ color classes. Finally, it is determined for each class whether it describes apples, based on KL divergence (\cite{goldbergerKLdivergence}) from hand-labeled classes. These hand-labeled classes can be obtained from the unsupervised clusters of the first few frames of a particular video, to easily account for current lighting conditions and the color of the particular apple variety at its particular ripeness. \subsection{Per Frame Counting}\label{subsec:sysperframecounting} The per frame counting component takes as input the binary segmented mask for each frame, and outputs a set of bounding boxes and associated integers for each frame where each bounding box represents a connected cluster of apples, and the integer is the estimated number of apples in that cluster (Fig.~\ref{fig:counting_ex}, \ref{fig:full_count}). This component is presented in detail at Section~\ref{subsec:perframecount}. First, a connected component analysis is performed on the binary apple mask. Each connected component is examined separately, to determine how many apples it contains. We perform a Gaussian Mixture Model (GMM) based clustering to estimate the number of apples contained within the bounding box, as well as their positions. \subsection{Camera Motion Approximation}\label{subsec:syscammotion} The camera motion approximation component takes as input the detected SIFT (\cite{sift}) features in the original input images. It computes a pairwise homography using the SIFT feature matches. \subsection{Merging the Counts From Multiple Views}\label{subsec:sysmergecount} The merging component takes as input a sequence of per frame bounding boxes with apple counts, as well as estimated frame-to-frame homographies of the approximately planar scene. The output is a total count of unique apples seen in the frame sequence (Fig.~\ref{fig:tracking}, \ref{fig:mergecount}). This component is presented in Section~\ref{subsec:mergecount}. Essentially, it propagates the computed bounding boxes forward and recomputes the counts when a bounding box overlaps with another one. \subsection{Manual Annotation of Apples for Verifying Detection and Counting}\label{subsec:manuallabel} In order to validate our segmentation and counting methods, we need image level ground truth (detected apples in each individual input image). This is different from the number of harvested apples from trees. For this purpose, we annotated the boundary of individual apples in the input images. This provides us with the ability to compare the bounding boxes generated by our algorithm with bounding boxes drawn manually. For manual annotation, frames were selected arbitrarily every $1-3$ second for the test videos (frame rate $30$ fps), depending on how much the camera moved since the last annotated frame. For each of these frames, apples were tagged as $\textit{clearly visible}$ or $\textit{marginally visible}$ based on visibility guidelines (Fig.~\ref{fig:goodMarginal}). An apple was considered clearly visible if more than half of its cross-sectional area and more than half of its perimeter were unoccluded. Otherwise, if it was still detected as an apple by the human, it was marked as marginally visible. The marginally visible apples have more ambiguous bounding boxes, and might not even have a one-to-one mapping between boxes and apples. In addition to these guidelines, apples that were growing on trees in the rows behind the main row of interest, and apples that had fallen to the ground, were not tagged. Seven videos collected from the validation datasets (Dataset1 to Dataset4), described in the previous section, were tagged in this manner. The manually drawn bounding boxes were then propagated to the rest of the frames using camera motion between the frames. In the next sections, we investigate the performance of our segmentation and counting algorithms using these hand labeled datasets. Additionally, we will look at the relationship of computed yield vs actual yield for Dataset1, Dataset2, and Dataset4. \begin{figure}[hbt] \centering \begin{subfigure}{.4\columnwidth} \includegraphics[width=\textwidth]{goodMarginal1} \end{subfigure}\quad \begin{subfigure}{.4\columnwidth} \includegraphics[width=\textwidth]{goodMarginal21} \end{subfigure} \caption{ Manual annotation of clearly visible and marginally visible apples for two sample images. An apple was considered $\textit{clearly visible}$ if more than half of its cross-sectional area and more than half of its perimeter were unoccluded (green boxes). Otherwise, if it was still detected as an apple by the human, it was marked as $\textit{marginally visible}$ (red boxes).} \label{fig:goodMarginal} \end{figure} Our segmentation algorithm detects the ground apples as well. The manual annotation procedure ignores them. To remove ground apples, we let users choose a single line at the start of each video. This line is propagated using homography for the entire image sequence and any apple detected below this line are labeled as ground apples, and they are ignored for both segmentation and counting.
\section{INTRODUCTION}\label{sec:intro} The \emph{Gaia} mission \citep{2016AA...595A...1G} is reshaping our understanding of the Solar neighborhood and the Milky Way kinematics. The Data Release 1 of the \emph{Gaia} mission \citep{2016AA...595A...4L} on 2016 September 14 published precise parallaxes ($\simeq$\,0.3\,mas) and proper motions for 2 million stars in the Tycho-2 catalog \citep{2000AA...355L..27H}, more than a factor two improvement over the Hipparcos mission ($\simeq$1\,mas; \citealp{1997AA...323L..49P,2007AA...474..653V}) that was still widely used to characterize stars and young associations in the Solar neighborhood (e.g., \citealp{2004ARAA..42..685Z,2008hsf2.book..757T}). The first data release already led to the discovery of several new pairs and larger groups of co-moving stars (e.g., \citealp{2017MNRAS.472..675A,2017AJ....153..259O,2017AJ....153..257O}). The Data Release 2 of \emph{Gaia} (\emph{Gaia}~DR2 hereafter; \added{\citealt{GaiaCollaboration:2018io,Lindegren:2018gy}})\footnote{\added{See also \cite{Luri:2018eu}, \cite{Mignard:2018bj}, \cite{Babusiaux:2018di},\cite{Sartoretti:2018jm}, \cite{Soubiran:2018fz}, \cite{Cropper:2018jx}, \cite{Evans:2018cj}, \cite{Hambly:2018gr}, and \cite{Riello:2018bo} for relevant calibration.}} published $\simeq$\,1.3 billion trigonometric distances and $\simeq$\,7.2 million radial velocities on 2018 April 25 with a precision 100 times better than that of Hipparcos, and is instigating a revolution in stellar astronomy, among other fields. \begin{figure*} \centering \includegraphics[width=0.965\textwidth]{VCA_params.pdf} \caption{Projections in Galactic position $XYZ$ and space velocities $UVW$ of the Volans-Carina association members (black circles) compared to 1 to 3$\sigma$ contours of the BANYAN~$\Sigma$ multivariate Gaussian models (orange lines). Over-densities and under-densities of the data with respect to the Gaussian models are designated with blue and green shaded regions, respectively. The 1-dimensional panels show histograms of the members (green bars) compared to the projected 1$\sigma$ model contour (orange lines) and a kernel density estimate of the members distribution (black lines). See Section~\ref{sec:model} for more detail.} \label{fig:oh30_params} \end{figure*} The new ensembles of co-moving stars identified by \cite{2017AJ....153..257O} include group~30, consisting of 8 stars at a distance of $\simeq$\,80--90\,pc with similar sky positions and proper motions. This group was further vetted by \cite{2018arXiv180409058F} where they performed a comprehensive check of the 4\,555 groups identified by \cite{2017AJ....153..257O} and found that group~30 was a new coeval association within 100\,pc with an age similar to the Pleiades ($112 \pm 5$\,Myr; \citealt{2015ApJ...813..108D}) based on its color-magnitude diagram and the X-ray properties of a single member. The reason why this group had not been identified before is likely because its members are close to the Galactic plane ($b = -10 \pm 1$\textdegree). In this paper, we use \emph{Gaia}~DR2 data to characterize this new association of stars and compile a more complete list of members and candidate members. The 8 stars in group~30 are located in the Carina constellation, however there are already two associations of stars named after this constellation (the Carina-Near moving group; \citealp{2006ApJ...649L.115Z}; and the Carina association; \citealp{2008hsf2.book..757T}). We will show in this paper that \volanscand\ new candidate members of this group\deleted{, as well as its brightest member (the B8 supergiant c~Car)} not initially identified by \cite{2017AJ....153..257O}\deleted{,} are located in the Volans constellation. We will therefore refer to group~30 as the Volans-Carina Association ("VCA" or "Vol-Car"). \input{table_orig_oh30.tex} An initial list of Volans-Carina members is compiled in Section~\ref{sec:ident}. In Section~\ref{sec:model}, we build a kinematic model of Volans-Carina based on the \cite{2017AJ....153..257O} compilation of members and include it in the BANYAN~$\Sigma$ Bayesian classification algorithm \citep{2018ApJ...856...23G}. We use this updated version of BANYAN~$\Sigma$ to identify additional members and candidate members based on \emph{Gaia}~DR2, 2MASS and AllWISE in Section~\ref{sec:census}. In Section~\ref{sec:discussion}, we investigate the age of the Volans-Carina association, the chromospheric activity of its members, and we build its preliminary present-day mass function. We conclude in Section~\ref{sec:conclusion}. \section{IDENTIFICATION OF THE VOLANS-CARINA ASSOCIATION}\label{sec:ident} \cite{2017AJ....153..257O} identified a list of 8 co-moving \emph{Gaia}~DR1 stars in Volans-Carina, which they \replaced{refer to}{designated} as group~30. \cite{2018arXiv180409058F} verified that the stars from group~30 filled out a logical sequence in a color-magnitude diagram, confirmed this association as newly identified within 100\,\added{p}c, and found\added{ one} of its members \added{(HIP~47017 or HD~83359) }to be detected in ROSAT. In Section~\ref{sec:census} we will use the BANYAN~$\Sigma$ \added{\citep{2018ApJ...856...23G}} Bayesian classification algorithm to uncover new members with \emph{Gaia}~DR2, 2MASS \citep{2006AJ....131.1163S} and AllWISE \citep{2010AJ....140.1868W,2014ApJ...783..122K}. Before building a kinematic model of Volans-Carina and including it in BANYAN~$\Sigma$, we searched \emph{Gaia}~DR2 for any obvious additional members will full kinematics. We cross-matched the \cite{2017AJ....153..257O} list of group~30 stars with \emph{Gaia}~DR2 and calculated the average Galactic positions $XYZ$ and space velocities $UVW$ of the 5 members that have a radial velocity measurement provided by \emph{Gaia}~DR2\footnote{We weighted individual measurements with their squared inverse errors}. We find average values of $XYZ = (22,-80,-15)$\,pc and $UVW = (-16.0,-27.9,-0.7)$\,\hbox{km\,s$^{-1}$}. The $XYZUVW$ positions of all \emph{Gaia}~DR2 entries within 125\,pc of the Sun with radial velocity measurements were calculated similarly, which allowed us to identify 13 new objects within 4\,\hbox{km\,s$^{-1}$}\ (in $UVW$) and 15\,pc (in $XYZ$) that we included in our list of members. This search also recovered the 8 members of \cite{2017AJ....153..257O} in addition to the 13 new objects. We also recovered two A/F-type stars (HD~83523 and HD~83946) that were previously identified by \cite{2011ApJS..192....2S} as co-moving with the \cite{2017AJ....153..257O}\added{ group~30 member HD~83359.}\deleted{ star HD~83359, which is a member of group~30.} We recovered one additional member of Volans-Carina by doing a similar box search in \emph{Gaia}~DR2 that did not require a radial velocity measurement directly in the \emph{Gaia}~DR2 catalog. To do so, we calculated the average sky position ($\alpha = 145.9$\textdegree, $\delta = -66.1$\textdegree), proper motion ($\mu_\alpha\cos\delta = -37.5$\,$\mathrm{mas}\,\mathrm{yr}^{-1}$, $\mu_\delta = 43.6$\,$\mathrm{mas}\,\mathrm{yr}^{-1}$), radial velocity ($22.3$\,\hbox{km\,s$^{-1}$}) and parallax ($11.8$\,mas) of the members by weighting individual measurements with the squared inverse of their error bars. We then identified any object in the 125\,pc \emph{Gaia}~DR2 sample within 10 degrees, 10\,$\mathrm{mas}\,\mathrm{yr}^{-1}$\ in both directions of proper motion, and 3\,mas in parallax. The 160 resulting objects were cross-matched with SIMBAD \citep{2000AAS..143...23O} to verify whether they have radial velocity measurements in the literature. Only 3 objects (TYC~9205--1922--1, c~Car and HD~83523) had radial velocity measurements with a precision better than 10\,\hbox{km\,s$^{-1}$}, and of those three only the B8 star c~Car had a radial velocity ($25.0 \pm 4.1$\,\hbox{km\,s$^{-1}$}; \citealt{2006AstL...32..759G}) consistent with that of the average Volans-Carina members ($22.3$\,\hbox{km\,s$^{-1}$}). We therefore added c~Car to the list of members, which are compiled in Table~\ref{tab:orig}. This table does not include the original \cite{2017AJ....153..257O} members HD~83948, HD~82406 and HD~83359, because they do not yet have a radial velocity measurement. \section{A KINEMATIC MODEL OF VOLANS-CARINA}\label{sec:model} In this section we build a kinematic model (in $XYZ$ Galactic positions and $UVW$ space velocities) of the Volans-Carina members to include it in the BANYAN~$\Sigma$ Bayesian classification algorithm \citep{2018ApJ...856...23G}. BANYAN~$\Sigma$ uses the sky position, proper motion and optionally radial velocity and/or distance of a star to compare it with the kinematic models of 27 young associations within 150\,pc of the Sun, excluding Volans-Carina, and a model of the field stars within 300\,pc. The kinematic models are composed of one multivariate Gaussian in $XYZUVW$ space for each group, or a mixture of 10 multivariate Gaussians for the field. We used the method described in Section~5 of \cite{2018ApJ...856...23G} to fit a single multivariate Gaussian to the $XYZUVW$ distribution of Volans-Carina members listed in Table~\ref{tab:xyzuvw}.\added{ The BANYAN~$\Sigma$ tool itself is not used to build the kinematic models, but instead will rely on the model to calculate membership probabilities.} The resulting central position for the Volans-Carina model in $XYZUVW$ space is: \begin{align} \bar x_0 &= \begin{bmatrix} 21.6 & -80.3 & -14.3 & -16.11 & -28.13 & -0.85 \end{bmatrix},\notag \end{align} \noindent in units of pc and \hbox{km\,s$^{-1}$}, and its covariance matrix (in the same units) is: \begin{align} \bar{\bar\Sigma} &= \begin{bmatrix} 15 & 2.6 & 1.6 & 0.80 & -0.73 & -0.56 \\ 2.6 & 25 & 2.6 & 4.4 & 2.2 & 0.77 \\ 1.6 & 2.6 & 20 & 0.93 & 1.1 & -1.5 \\ 0.80 & 4.4 & 0.94 & 2.0 & 0.48 & 0.39\\ -0.73 & 2.2 & 1.1 & 0.48 & 2.0 & -0.16\\ -0.56 & 0.77 & -1.5 & 0.39 & -0.16 & 1.0 \end{bmatrix}.\notag \end{align} The 1$\sigma$ contours of the Gaussian model projected on the $XYZUVW$ axes are the square root of the diagonal elements of $\bar{\bar\Sigma}$, and the off-diagonal elements of $\bar{\bar\Sigma}$ represent the covariances in the distribution of members in 6-dimensional space. The construction of BANYAN~$\Sigma$ kinematic models also includes a Monte Carlo calculation (see Section~7 of \citealt{2018ApJ...856...23G}) where $10^7$ random synthetic stars are drawn and where a Bayesian prior is adjusted such that 50\%, 68\%, 82\% or 90\% of the true members are recovered with a Bayesian probability $P > 90$\% when the input measurements include (1) sky position and proper motion only, (2) sky position, proper motion and radial velocity, (3) sky position, proper motion and parallax, or (4) sky position, proper motion, radial velocity and parallax, respectively. This is done to make BANYAN~$\Sigma$ easier to use with a single probability threshold that generates a fixed recovery rate of true members across all associations. We found the following values for the natural logarithm of these Bayesian priors for Volans-Carina (referred to as $\ln\alpha_k$ in \citealt{2018ApJ...856...23G}) in the order corresponding to the scenarios of input data described above: \begin{align} \ln\alpha_k &= \begin{bmatrix} -17.2 & -18.7 & -21.1 & -22.0 \end{bmatrix}.\notag \end{align} Other relevant characteristics of Volans-Carina are listed in Table~\ref{tab:vca}, and its new model was included in version 1.2 of BANYAN~$\Sigma$ in both the IDL and Python versions of the algorithm\footnote{An IDL version is available at \url{https://github.com/jgagneastro/banyan_sigma_idl} and a Python version at \url{https://github.com/jgagneastro/banyan_sigma} \citep{zenodobanyansigmapython,zenodobanyansigmaidl}, and a web tool is available at \url{www.exoplanetes.umontreal.ca/banyan/banyansigma.php}.}, where the Volans-Carina association is abbreviated as VCA. \begin{deluxetable}{lc} \renewcommand\arraystretch{0.9} \tabletypesize{\small} \tablecaption{Fundamental and Average Properties of the Volans-Carina association \label{tab:vca}} \tablehead{\colhead{Property} & \colhead{Value}} \startdata Age (Myr) & $89_{-7}^{+5}$\\ Members & 19\\ Candidate members & 46\\ Spatial size\tablenotemark{a} (pc) & 4.4\\ Kinematic size (\hbox{km\,s$^{-1}$}) & 1.2\\ $\left<{\rm R.A.}\right>$ & 09:37:00\,$\pm$\,2.7\,\textdegree\\ $\left<{\rm Decl.}\right>$ & --65:18:00\,$\pm$\,2.8\,\textdegree\\ $\left<\mu_\alpha\cos\delta\right>$ ($\mathrm{mas}\,\mathrm{yr}^{-1}$) & $-36 \pm 7$\\ $\left<\mu_\delta\right>$ ($\mathrm{mas}\,\mathrm{yr}^{-1}$) & $42 \pm 6$\\ $\left<{\rm RV}\right>$ (\hbox{km\,s$^{-1}$}) & $23 \pm 2$\\ $\left<{\rm Trig. dist.}\right>$ (pc) & $86 \pm 5$\\ $\left<{\rm Parallax}\right>$ (mas) & $11.6 \pm 0.6$\\ $\left<X\right>$ (pc) & $20.5 \pm 3.0$\\ $\left<Y\right>$ (pc) & $-81.6 \pm 4.8$\\ $\left<Z\right>$ (pc) & $-4.6 \pm 8.5$\\ $\left<U\right>$ (\hbox{km\,s$^{-1}$}) & $-16.14 \pm 0.88$\\ $\left<V\right>$ (\hbox{km\,s$^{-1}$}) & $-28.4 \pm 1.1$\\ $\left<W\right>$ (\hbox{km\,s$^{-1}$}) & $-1.1 \pm 1.2$\\ \enddata \tablenotetext{a}{The spatial and kinematic sizes are defined as the radius of a sphere that would have the same volume as the 1$\sigma$ contour of the $XYZ$ or $UVW$ projections of the 6-dimensional BANYAN~$\Sigma$ kinematic model.} \tablecomments{All average values $\left<X\right>$ are obtained with a weighted average of the individual measurements of the members listed in Table~\ref{tab:orig}, and their error bars are obtained with an un-biased weighted standard deviation. In both cases, the weights are set to the squared of the individual inverse error bars. The error bars are representative of the intrinsic scatter, not an error on the average. See \cite{2018ApJ...856...23G} for more details.} \end{deluxetable} \section{COMPLETING THE CENSUS OF CANDIDATE MEMBERS}\label{sec:census} In this Section, we use the BANYAN~$\Sigma$ Bayesian classifier algorithm to identify additional candidate members of the Volans-Carina association. We perform two separate searches: the first one is based on the full \emph{Gaia}~DR2 nearest 125\,pc sample, and is appropriate to identify the previously missing stellar members of Volans-Carina, especially among the \emph{Gaia}~DR2 entries that do not have a radial velocity measurement. The second search is based on a cross-match of the 2MASS \citep{2006AJ....131.1163S} and AllWISE \citep{2010AJ....140.1868W,2014ApJ...783..122K} surveys, and is appropriate to identify the substellar members too faint to be detected in \emph{Gaia}~DR2. \begin{figure} \centering \includegraphics[width=0.465\textwidth]{spt_hist_volcar.pdf} \caption{Spectral types histogram of Volans-Carina members and candidates. The census of members is dominated by M-type dwarfs, which is expected for a typical initial mass function. See Section~\ref{sec:census} for more detail.} \label{fig:spt} \end{figure} \subsection{A \emph{Gaia}~DR2 Search for Stellar Members}\label{sec:dr2census} The 1\,427\,111 \emph{Gaia}~DR2 entries within 125\,pc\added{\footnote{including those without radial velocity measurements}} were analyzed with the BANYAN~$\Sigma$ Bayesian classification algorithm to identify additional candidate members of the Volans-Carina association. The 58 entries with Volans-Carina Bayesian membership probabilities above 90\% and a predicted $UVW$ position within 5\,\hbox{km\,s$^{-1}$}\ of the locus of Volans-Carina members were selected. The spectral types of the new candidate members recovered here were estimated based on their absolute \emph{Gaia}~DR2 $G$-band magnitude with the relations of \cite{2018ApJ...862..138G}, and they are reported in Table~\ref{tab:cms} with the list of candidate members. \subsection{A 2MASS--AllWISE Search for Substellar Members} We selected all 2MASS and AllWISE entries located between \replaced{R.A. 127--155.5\textdegree and Decl. $-$72.3..$-$57\textdegree}{127$^{\circ}$ $<$ $\alpha$ $<$ -155$^{\circ}$.5 and -72$^{\circ}$.3 $<$ $\delta$ $<$ -57$^{\circ}$}, and performed a cross-match where each 2MASS entry was paired with its nearest AllWISE neighbor. A proper motion was then calculated for each of these 5\,136\,857 matches based on the 2MASS and AllWISE astrometries, with the method described by \cite{2015ApJ...798...73G}. The sky positions and proper motions of all matches were analyzed with the BANYAN~$\Sigma$ classification algorithm, and the 2\,927 entries with a Bayesian probability above 90\% and located at minimum distance of less than 5\,\hbox{km\,s$^{-1}$}\ from the locus of Volans-Carina members in $UVW$ space were selected for further consideration. All resulting 2MASS entries were cross-matched with \emph{Gaia}~DR2 by projecting back the \emph{Gaia} entries at epoch 2000 (using the sky positions and proper motions of \emph{Gaia}~DR2) with a cross-match radius of 2$''$. All 2\,884 matches in \emph{Gaia}~DR2 with parallaxes were rejected because they were already investigated in Section~\ref{sec:dr2census}. A visual inspection of near-infrared color-magnitude diagrams at the average distance of Volans-Carina (86\,pc) for the 43 remaining candidate members allowed us to reject 29 of them that have photometric properties inconsistent with substellar objects of either young or field ages (i.e., those with $W1-W2 < 0.1$ and $M_{W1} >8.5$; or those with $J-K_S <0.8$ were rejected; see \citealp{2011ApJS..197...19K,2012ApJS..201...19D,2016ApJS..225...10F}). The Digitized Sky Survey, 2MASS and \emph{WISE} images of the remaining sources were inspected, allowing us to reject an additional 11/14 that were bright at visible wavelengths, extended sources or clearly contaminated by neighbors.\added{ Such rejection criteria are typical of brown dwarf surveys (e.g., \citealp{2011ApJS..197...19K,2016ApJ...830..144R}), and we rely on them because our 2MASS--AllWISE candidates not in \emph{Gaia}~DR2 have colors typical of substellar objects. The first two criteria are especially useful to distinguish nearby substellar objects from distant extragalactic contaminants, which can otherwise have similar near-infrared colors.} The remaining three objects (2MASS~J09254243--6408524, 2MASS~J09285886--6541371 and 2MASS~J09374003--6226201) are listed in Table~\ref{tab:cms} and have respective spectral type estimates M7, M9 and M6 based on their absolute $K_S$-band magnitudes at the average distance of Volans-Carina compared with the spectral type--absolute magnitude relations of \cite{2016ApJS..225...10F}. A spectroscopic follow-up will be needed to confirm their substellar nature, and measure their radial velocities and spectroscopic signs of youth to confirm their membership in the Volans-Carina association. \begin{figure} \centering \includegraphics[width=0.465\textwidth]{oh30_cmd.pdf} \caption{\emph{Gaia} absolute $G$ versus $G-G_{\rm RP}$ magnitude for the 100\,pc sample of high-quality parallaxes in \emph{Gaia}~DR2 (black dots) compared to the proposed members and candidate members of the Volans-Carina association (red empty circles). See Section~\ref{sec:census} for more detail.} \label{fig:volans_cmd} \end{figure} \section{DISCUSSION}\label{sec:discussion} In this Section, we investigate the fundamental properties of the Volans-Carina members, including their\deleted{ metallicity (Section~\ref{sec:feh}),} age (Section~\ref{sec:age}), chromospheric activity (Section~\ref{sec:activ}) and present-day mass function (Section~\ref{sec:imf}). We also discuss a white dwarf interloper that has a cooling age that is too old for it to be a member of Volans-Carina (Section~\ref{sec:wd}), and the similarity between the age and kinematics of Volans-Carina and the Platais~8 association (Section~\ref{sec:relat}). \input{table_xyzuvw_oh30.tex} \subsection{The Age of the Volans-Carina Association}\label{sec:age} We used a Bayesian method to determine a probability density for the age of Volans-Carina, based on the fiducial MIST solar-metallicity model isochrones of \cite{2016ApJ...823..102C} that include stellar rotation ($v = 0.4 v_{\rm crit}$) and were generated with the revised \emph{Gaia}~DR2 photometric zero points of \cite{2018arXiv180409368E}\footnote{The corrected models are available at \url{http://waps.cfa.harvard.edu/MIST/model_grids.html} since 2018 April 27, 3:30PM EST.}. It is well known that the model-derived bolometric corrections as a function of effective temperature have systematic biases that depend on spectral types and surface gravity (i.e., mass and age). Therefore, relying on the models without calibration would generate biased ages (e.g., see \citealt{2015MNRAS.454..593B}). Additional potential causes of systematic errors include the effect of magnetic fields that inflate the radius of young low-mass stars (e.g., see \citealp{2014ApJ...792...37M,2016AA...593A..99F}) and the effect of increased chromospheric activity on the colors of K- and possibly later-type dwarfs \citep{2003AJ....126..833S}. \begin{figure*} \centering \includegraphics[width=0.965\textwidth]{ple_oh30_mist.pdf} \caption{\emph{Gaia} absolute $G$ versus $G - G_{\rm RP}$ magnitude for members of Volans-Carina (blue leftward triangles) and the Pleiades (red circles) compared to the $112$\,Myr solar-metallicity MIST isochrone (dashed gray line), and the empirically corrected isochrone (thick black line). The 1$\sigma$ uncertainties in the corrected isochrone resulting from the intrinsic spread in the Pleiades members are displayed as thin gray lines, and the potential unresolved multiples are marked with green squares. Members of the Pleiades were de-reddened with the relation of \cite{2008AJ....136.1388T}, and the over-luminous Pleiades members that likely correspond to multiple systems were removed.\replaced{ Members of Volans-Carina were de-reddened with $E(B-V) = 0.008$\,mag with the exception of c~Car ($E(B-V)= 0.023$\,mag).}{ Members of Volans-Carina have negligible reddening.} The sequence formed by the members of Volans-Carina is similar to that of the Pleiades members, indicating that the two associations are likely coeval. See Section~\ref{sec:age} for more detail.} \label{fig:volans_ple_isoc} \end{figure*} One way to circumvent these systematic biases is to use associations with a well-calibrated age to apply color corrections on the model isochrones, however in general this still requires assumptions on how these corrections depend on age. Fortunately, the members of Volans-Carina form a sequence that is remarkably close to that of the Pleiades ($112 \pm 5$\,Myr; \citealt{2015ApJ...813..108D}) in color-magnitude diagrams (e.g., see Figure~\ref{fig:volans_ple_isoc}), which indicates that the two associations have a similar age. We can therefore derive an absolute magnitude-dependent color correction of the model isochrones based on the Pleiades members that will be valid for ages in the vicinity $\simeq$\,112\,Myr. Model isochrones at very different ages will yield small probabilities of matching all members of Volans-Carina, and therefore applying an age-dependence on the Pleiades-derived color correction would only have a small effect on our age determination. Members of the Pleiades were de-reddened with the relation of \cite{2008AJ....136.1388T}; i.e., $E(B-V) = 0.057 \pm 0.008$\,mag for R.A.\,$<$\,56.819\textdegree, and $E(B-V) = 0.034 \pm 0.011$\,mag otherwise.\deleted{ A cross-match of our list of Volans-Carina members with \cite{2006ApJ...638.1004A} allowed us to obtain reddening estimates for 5 objects, with a median $E(B-V) = 0.008$\,mag, and median absolute deviation of $E(B-V) = 0.001$\,mag: we therefore de-reddened the members of Volans-Carina using this value. In the case of c~Car, which is spatially located in the outskirts of Volans-Carina, we used the revised Q-method of \cite{2013ApJS..208....9P} with the mean photometry of \cite{1987AAS...71..413M}\footnote{$V = 3.835 \pm 0.005$, $B-V = -0.103 \pm 0.005$ and $U-B = -0.440 \pm 0.006$; see \url{http://vizier.u-strasbg.fr/viz-bin/VizieR-5?-ref=VIZ5b0eda1fb49b&-out.add=.&-source=II/168/ubvmeans&recno=22342}.} to estimate a reddening of $E(B-V)= 0.023$\,mag.}\added{ The reddening map of \cite{2017AA...606A..65C} and the distance and position of VCA indicates a reddening of $E(B-V) = 0.009 \pm 0.016$\,mag. We also identified 5 stars\footnote{HD~77370 (26\,pc; $E(b-y) = -0.004 \pm 0.009$), HD~75171 (59\,pc; $E(b-y) = -0.006 \pm 0.006$), HD~79629 (83\,pc; $E(b-y) = 0.005 \pm 0.007$), HD~80563 (VCA~2; 91\,pc; $E(b-y) = -0.003 \pm 0.012$), HD~82244 (112\,pc; $E(b-y) = 0.008 \pm 0.014$).} in the reddening catalog of \cite{2011ApJ...734....8R} in the direction of VCA at distances 26--112\,pc. All of them have a negligible reddening within the error bars, consistent with the reddening map of \cite{2017AA...606A..65C}. We therefore consider that the members of VCA are subject to a negligible amount of reddening from interstellar extinction.} \added{The Q-method de-reddening calibration for dwarf stars from \cite{2013ApJS..208....9P} is inappropriate for c~Car as the star is a supergiant (B8\,II with Mn metallic lines; \citealt{1994AJ....107.1556G}), and has been classified by other authors since the 1950s as class II or III (B8\,III; \citealt{1977AAS...30...71C}; B8\,II; \citealt{1957MNRAS.117..449D}). \cite{1979PASP...91..299G} shows that the there is considerable spread in intrinsic ($U-B$) and ($B-V$) colors between supergiants and giants, however the Johnson colors or c~Car ($U-B = -0.440 \pm 0.006$, $B-V = -0.103 \pm 0.005$; \citealt{1994cmud.book.....M}\footnote{Vizier catalog II/168/ubvmeans}) appear to be consistent with a negligibly reddened star with type between B7 and B8 and luminosity class II and III. \cite{1980AAS...40..199P} dereddened the $uvby$ photometry and estimated color excess of $E(b-y) = 0.009$, consistent with $A_v = 0.04$ following the calibration of \cite{1971AJ.....76.1041G}.} In Figure~\ref{fig:ple_corr}, we show deviations in the $G - G_{\rm RP}$ colors of Pleiades members compared to the $112$\,Myr MIST isochrone, as a function of absolute $G$-band magnitude. We used a sliding weighted average to derive a color correction in steps of 0.5\,mag and a running box width of 1\,mag. We used weights proportional to the squared inverse of the error bars on the colors of individual members. A 1$\sigma$ error bar was also calculated at each point of the sequence by using a sliding un-biased weighted standard deviation\footnote{See \url{https://www.gnu.org/software/gsl/manual/html_node/Weighted-Samples.html}} with the same weights and box width. The average color correction and its error bars were then smoothed with a sliding average using a box width of 3 array elements. The resulting color correction is displayed in Figure~\ref{fig:ple_corr}, and is only valid for the \emph{Gaia}~DR2 absolute $G$-band versus $G - G_{\rm RP}$ color-magnitude diagram, for stars with colors in the range $-$0.18..1.37\,mag and absolute magnitudes in the range $-$2..12.6\,mag. \input{table_cms_oh30.tex} \begin{figure} \centering \includegraphics[width=0.465\textwidth]{ple_mist_color_corr.pdf} \caption{Empirical color correction in $G - G_{\rm RP}$ color versus $G$-band absolute magnitude based on a comparison of Pleiades members (red circles) with the $112$\,Myr solar-metallicity MIST isochrone. The average and 1$\sigma$ errors on the color correction are displayed as full and dashed blue lines, respectively. The data behind this figure are available in the online version of this paper. See Section~\ref{sec:age} for more detail.} \label{fig:ple_corr} \end{figure} We used the empirical color correction displayed in Figure~\ref{fig:ple_corr} to correct all MIST isochrones and we built an age probability density function for both the Pleiades and Volans-Carina, using all members listed in Table~\ref{tab:phot} (but excluding 4 over-luminous members (HD~83359, J0917--6628, J0926--6236 and HD~309681) that are likely multiple systems, see Figure~\ref{fig:volans_ple_isoc}) with the method described by \cite{Gagne:2018un}. In summary, the minimum $N\sigma$ distance is calculated between a star and each corrected MIST model isochrone (excluding giant phases) in color-magnitude space, where $\sigma$ are the measurement errors for the star in color and absolute magnitude. The $N\sigma$ distance is translated to a probability density function by assuming that the measurement errors are Gaussian, and the probability density functions of all association members are multiplied to obtain a final probability density for the age of the association as a whole. In this analysis, we also included the error bars on the color correction in the $N\sigma$ calculations, which means that the uncertainty caused by the intrinsic spread of Pleiades members in this color-magnitude space is taken into account. The resulting age probability density functions are displayed in Figure~\ref{fig:age_pdf} for the Pleiades and Volans-Carina. We find a Pleiades age of $105^{+13}_{-9}$\,Myr consistent with our initial assumption of $112 \pm 5$\,Myr, and we find an age of $89_{-7}^{+5}$\,Myr for Volans-Carina. This age is consistent with the determination of \cite{2018arXiv180409058F} based on a \emph{Gaia}~DR1 absolute $G$ versus \emph{Gaia}--2MASS $G-J$ color-magnitude diagram and X-ray properties of its 8 members identified by \cite{2017AJ....153..257O}.\deleted{ The error bars are larger for the age of Volans-Carina because of its smaller number of members. We note that most of the age information relies on the most massive B8-type member c~Car, because it is located in a region of the color-magnitude diagram where isochrones vary strongly with age. Excluding c~Car from this analysis would result in a much wider 68\% confidence age range of 100--400\,Myr.} Future age determinations based on the lithium depletion boundary will be useful to confirm our age measurement. At the age of the Pleiades, the lithium depletion boundary is expected to happen at spectral types $\simeq$\,M6--M7 \citep{2015ApJ...813..108D}. There are 4 candidate members listed in Table~\ref{tab:cms} with estimated spectral types that fall in this range. \begin{figure} \centering \includegraphics[width=0.465\textwidth]{volans_age_pdf.pdf} \caption{Age probability density function for Volans (black line) and the Pleiades (blue line) derived with our comparison to empirically corrected MIST isochrones. The age of the Pleiades ($112 \pm 5$\,Myr) that was assumed to correct the MIST isochrones is displayed with green dashed and dot-dashed lines. We find an age of $89_{-7}^{+5}$\,Myr for Volans-Carina. See Section~\ref{sec:age} for more detail.} \label{fig:age_pdf} \end{figure} In Figure~\ref{fig:agedist}, we show the global properties of Volans-Carina compared to other young associations within 150\,pc of the Sun. Volans-Carina fills a space un-occupied by any other association in the age--distance plane, which presents the opportunity to study a $\simeq$\,90\,Myr-old population brighter than the Pleiades, but not nearby enough that its members are spread on a large region of the sky. \begin{figure} \centering \includegraphics[width=0.465\textwidth]{ymg_ages_vca.pdf} \caption{Distribution of ages and distances of young associations within 150\,pc of the Sun. The Volans-Carina Association (VCA) fills a region in age and distance unoccupied by any other association. The full names of young associations are: 118~Tau (118TAU), AB~Doradus (ABDMG), $\beta$~Pictoris ($\beta$PMG), Carina (CAR), Carina-Near (CARN), Coma Berenices (CBER), Columba (COL), Corona~Australis (CRA), $\epsilon$~Chamaeleontis (EPSC), $\eta$~Chamaeleontis (ETAC), the Hyades cluster (HYA), Lower Centaurus Crux (LCC), Octans (OCT), Platais~8 (PL8), the Pleiades cluster (PLE), $\rho$~Ophiuchi (ROPH), the Tucana-Horologium association (THA), 32~Orionis (THOR), TW~Hya (TWA), Upper Centaurus Lupus (UCL), Upper~CrA (UCRA), the core of the Ursa~Major cluster (UMA), Upper~Scorpius (USCO), Taurus (TAU), Volans-Carina (VCA) and $\chi^1$~For (XFOR). See Section~\ref{sec:age} for more detail.} \label{fig:agedist} \end{figure} \subsection{Chromospheric Activity}\label{sec:activ} Young stars have stronger chromospheric activity compared to their field-aged counterparts, which translates into stronger and more variable H$\alpha$ emission (e.g., \citealt{2007AJ....133.2258S}), more frequent flares (e.g., \citealt{2010AJ....140.1402H}) and stronger emission at UV and X-ray wavelengths (e.g., \citealp{2003ApJ...585..878K,2011ApJ...727...62R,2013ApJ...774..101R,2014ApJ...788...81M}). This stronger level of chromospheric activity is correlated with faster rotation rates (e.g., see \citealt{2010AA...520A..15M}), as rotation drives stellar dynamos (e.g., \citealt{charbonneau2010,2012AJ....143...93R}). We cross-matched our sample of members and candidate members with the \emph{ROSAT} all-sky survey \citep{2016AA...588A.103B} and the \emph{GALEX} catalog \citep{2005ApJ...619L...1M} and found that 5 of them have entries in one or both of the catalogs. We compared the X-ray and UV emission properties of these stars with those of field stars and members of young associations compiled by \cite{2018ApJ...856...23G} in Figures~\ref{fig:xray} and \ref{fig:nuv}. All 5 stars have emission levels typical for ages younger than a few hundred Myr, consistent with our age determination in Section~\ref{sec:age}. \begin{figure} \centering \includegraphics[width=0.465\textwidth]{xray_volans_carina.pdf} \caption{\emph{ROSAT} X-ray luminosity of Volans-Carina M-type candidate members compared to the \cite{2014ApJ...788...81M} compilations and the new candidate members of young associations identified by \cite{2018ApJ...862..138G}. The two Volans-Carina objects detected in \emph{ROSAT} have a level of X-ray emission consistent with the age derived here. See Section~\ref{sec:activ} for more detail.} \label{fig:xray} \end{figure} \begin{figure} \centering \includegraphics[width=0.465\textwidth]{galex_volans_car.pdf} \caption{\emph{GALEX}--\emph{Gaia} $NUV - G$ color as a function of \emph{Gaia} $G - G_{\rm RP}$ colors of field stars (black circles), members of young associations (compiled by \citealt{2018ApJ...856...23G}; purple leftward triangles) and candidate members of Volans-Carina detected in \emph{GALEX} (red upward triangles). None of the new candidate members of Volans-Carina listed in Table~\ref{tab:cms} are detected in \emph{GALEX}. The Volans-Carina candidate members have $NUV - G$ colors bluer than the field sequence, which is indicative of strong chromospheric activity and consistent with a young age. See Section~\ref{sec:activ} for more detail.} \label{fig:nuv} \end{figure} \subsection{Present-Day Mass Function}\label{sec:imf} In this section we construct a preliminary present-day mass function for the Volans-Carina association, based only on the members with a parallax mesurement in \emph{Gaia}~DR2. The analysis presented here does not include errors on the model-derived masses or small number statistics Poisson error bars -- A more detailed measurement will be done after a spectroscopic confirmation of all Volans-Carina members presented here. We calculated a preliminary present-day mass function of the Volans-Carina association by comparing the 58 candidate members in Table~\ref{tab:phot} with the empirically corrected MIST isochrone track discussed in Section~\ref{sec:age}. The mass of each star was assigned with the point on the model track at the closest $N\sigma$ separation in a $G$ versus $G-G_{\rm RP}$ color-magnitude diagram. This $N\sigma$ separation is calculated using the error of the $G - G_{\rm RP}$ color and the absolute $G$-band measurement, as well as the error on the empirical color correction discussed in Section~\ref{sec:age}. The eight candidates with colors redder than the full MIST sequence were ignored, and they likely correspond to stars with masses below 0.1\,$M_{\odot}$. Their spectral types are in the range M6--M9.\added{ We refrain from using less reliable substellar cooling tracks to estimate the masses of these redder objects until a deeper survey focused on the Volans-Carina brown dwarfs allows us to uncover additional such low-mass objects.} The resulting present-day mass function is displayed in Figure~\ref{fig:imf}, with a fiducial log-normal initial mass function ($\sigma = 0.5$\,dex, $m_c = 0.25$\,$M_{\odot}$; \citealt{2010AJ....139.2679B}) anchored on the members with masses 1--3\,$M_{\odot}$. Our preliminary present-day mass function is well represented by a log-normal distribution in the range $\geq$\,0.2\,$M_{\odot}$, indicating that our census of Volans-Carina members is likely near completion in this range of masses. If we assume that the fiducial log-normal present-day mass function remains valid down to the lowest-mass brown dwarfs, we estimate a total stellar and substellar population of $\simeq$\,120 members in Volans-Carina. Counting all candidate members not in \emph{Gaia}~DR2 or otherwise excluded from our determination of the present-day mass function, around $\simeq$\,40 members would remain to be discovered, $\simeq$\,75\% of which would be in the substellar regime. These missing objects are likely too faint to be in \emph{Gaia}~DR2. \begin{figure} \centering \includegraphics[width=0.465\textwidth]{volans_car_imf.pdf} \caption{Preliminary present-day mass function for the Volans-Carina members with a \emph{Gaia}~DR2 parallax (black lines), compared with a fiducial log-normal initial mass function ($\sigma = 0.5$\,dex, $m_c = 0.25$\,$M_{\odot}$) anchored on the 1--3\,$M_{\odot}$\ members. The current census of Volans-Carina members seems complete down to $\simeq$\,0.2\,$M_{\odot}$. See Section~\ref{sec:imf} for more detail.} \label{fig:imf} \end{figure} \subsection{A White Dwarf Interloper}\label{sec:wd} An inspection of the \emph{Gaia}~DR2 entries in the vicinity of Volans-Carina that share similar proper motions revealed one potential white dwarf member (Gaia~DR2~5298305642425782528, J0852--6143 hereafter), located at J2000 coordinates 8$^{\rm h}$52$^{\rm m}$40$^{\rm s}$.39, --61\textdegree43$'$46\farcs4 at epoch 2015. However, this object only obtains a 19.7\% Volans-Carina membership probability based on BANYAN~$\Sigma$. We compared J0852--6143 with the \cite{2001PASP..113..409F} white dwarf cooling tracks\footnote{Available at \url{http://www.astro.umontreal.ca/~bergeron/CoolingModels/}} (see also \citealp{2006AJ....132.1221H,2006ApJ...651L.137K,2011ApJ...730..128T,2011ApJ...737...28B}) in a \emph{Gaia}~DR2 absolute $G$ magnitude versus $G_{\rm BP} - G_{\rm RP}$ color-magnitude diagram (see Figure~\ref{fig:volans_wd}) to construct a probability density function of its mass, age and temperature. We used unit priors on all parameters, and compared J0852--6143 to the models with pure hydrogen (thin and thick) and pure helium atmospheres. We calculated its most probable age, $T_{\rm eff}$\ and mass by marginalizing over all other dimensions (including the atmospheric composition), and found an age of 3--8\,Gyr, a mass of $\simeq$\,0.15\,$M_{\odot}$\ and $T_{\rm eff}$\,$=$\,$3000_{-800}^{+500}$\,K. The extremely low mass of this white dwarf is also indicative that it is likely a more massive, older and slightly cooler double-degenerate binary. Given that the age of J0852--6143 is safely much older than that of Volans-Carina, we reject it as a candidate member. \added{Based on our selection criteria and the Monte Carlo analysis of \citeauthor{2018ApJ...856...23G} (\citeyear{2018ApJ...856...23G}; Section~8), we expect less than one additional such interloper in our list of members and candidate members presented in Table~\ref{tab:cms}.} \begin{figure} \centering \includegraphics[width=0.465\textwidth]{J0852-6143_wd_seq.pdf} \caption{Color-magnitude position of the white dwarf J0852--6143 (red star) compared to the 100\,pc sample of \emph{Gaia}~DR2 white dwarfs (black circles) and isochrones calculated from the cooling tracks of \cite{2001PASP..113..409F}. J0852--6143 is older than 3\,Gyr, regardless of its atmospheric composition. See Section~\ref{sec:wd} for more detail.} \label{fig:volans_wd} \end{figure} \subsection{Is Volans-Carina Related to Other Known Associations?}\label{sec:relat} Despite its similar age to the Pleiades association and the AB~Doradus moving group, the average $UVW$ space velocities of the Volans-Carina members with full kinematics ($U = -16.1 \pm 0.9$\,\hbox{km\,s$^{-1}$}, $V = -28.4 \pm 1.1$\,\hbox{km\,s$^{-1}$}, $W = -1.1 \pm 1.2$\,\hbox{km\,s$^{-1}$}) are different from those of the Pleiades ($U = -6.4 \pm 1.9$\,\hbox{km\,s$^{-1}$}, $V = -28.7 \pm 0.7$\,\hbox{km\,s$^{-1}$}, $W = -14.1 \pm 1.1$\,\hbox{km\,s$^{-1}$}) and the AB~Doradus moving group ($U = -7.7 \pm 0.8$\,\hbox{km\,s$^{-1}$}, $V = -27.8 \pm 0.7$\,\hbox{km\,s$^{-1}$}, $W = -15.3 \pm 1.8$\,\hbox{km\,s$^{-1}$}) in the $U$ and $W$ directions. \added{Both the spatial and kinematic sizes of Volans-Carina (reported in Table~\ref{tab:vca}) are typical of other nearby associations such as the Pleiades and Hyades (see panels c and d of Figure 3 in \citealt{2018ApJ...856...23G}). Its spatial size is slightly smaller than the typical sizes of the looser nearby young moving groups such as Tucana-Horologium, $\beta$~Pictoris and AB~Doradus ($\sim$\,10--20\,pc) although its kinematic size is comparable to them.} Comparing the center of the BANYAN~$\Sigma$ Volans-Carina model in $UVW$ space to those of the other 27 associations included in the algorithm (see \citealt{2018ApJ...856...23G}), we find that the closest known association in $UVW$ space is the slightly younger ($\simeq$\,60\,Myr; \citealt{1998AJ....116.2423P}) Platais~8\footnote{The members of Platais~8 have average $UVW$ space velocities of $U = -11.5 \pm 1.0$\,\hbox{km\,s$^{-1}$}, $V = -23.2 \pm 0.8$\,\hbox{km\,s$^{-1}$}, $W = -4.1 \pm 0.5$\,\hbox{km\,s$^{-1}$}.}, located at 8\,\hbox{km\,s$^{-1}$}\ from Volans-Carina in $UVW$ space, and $\simeq$\,46\,pc in $XYZ$ space. Both associations are spatially much smaller than the physical separation between the two groups (5.0\,pc and 4.4\,pc respectively for Platais~8 and Volans-Carina), but their relative proximity and similar ages and kinematics indicates that the two groups may correspond to two star-formation events that originally took place in the same complex of molecular clouds. \section{CONCLUSIONS}\label{sec:conclusion} We present a characterization of the young Volans-Carina association, identified as `Group~30', a group of 8 co-moving stars by \cite{2017AJ....153..257O} and \cite{2018arXiv180409058F}. We find 11 additional high-likelihood members with \emph{Gaia}~DR2, and we use the MIST isochrones anchored on the Pleiades to determine an age of $89_{-7}^{+5}$\,Myr for Volans-Carina. We build a kinematic model of its members in $XYZUVW$ space and include it in the BANYAN~$\Sigma$ Bayesian classification tool to identify 43\ additional candidate members with estimated spectral types in the range A0--M9 in \emph{Gaia}~DR2, and 3\ with estimated spectral types in the range M6--M9 in 2MASS and AllWISE. We find that the present-day mass function of Volans-Carina follows a fiducial log-normal distribution and seems complete for masses above 0.2\,$M_{\odot}$, and we estimate that $\simeq$\,40 additional members, mostly brown dwarfs, remain to be discovered in the association. Brown dwarfs in Volans-Carina with spectral types $\gtrsim$\,L1 are too faint to be detected in 2MASS, but the members with spectral types up to $\gtrsim$\,L6 should be detected in the WISE $W2$ band. Proper motion surveys based on only WISE such as Backyard Worlds: Planet~9 \citep{2017ApJ...841L..19K} will be needed to identify them. \acknowledgments We thank the anonymous referee for valuable suggestions. We thank Ricky L. Smart, Pierre Bergeron and Am\'elie Simon for useful comments, and Pierre Bergeron for sending white dwarf model tracks in the \emph{Gaia}~DR2 passbands. This research made use of: the SIMBAD database and VizieR catalog access tool, operated at the Centre de Donn\'ees astronomiques de Strasbourg, France \citep{2000AAS..143...23O}; data products from the Two Micron All Sky Survey (\emph{2MASS}; \citealp{2006AJ....131.1163S}), which is a joint project of the University of Massachusetts and the Infrared Processing and Analysis Center (IPAC)/California Institute of Technology (Caltech), funded by the National Aeronautics and Space Administration (NASA) and the National Science Foundation \citep{2006AJ....131.1163S}; data products from the \emph{Wide-field Infrared Survey Explorer} (\emph{WISE}; and \citealp{2010AJ....140.1868W}), which is a joint project of the University of California, Los Angeles, and the Jet Propulsion Laboratory (JPL)/Caltech, funded by NASA. The Digitized Sky Surveys were produced at the Space Telescope Science Institute under U.S. Government grant NAG W-2166. The images of these surveys are based on photographic data obtained using the Oschin Schmidt Telescope on Palomar Mountain and the UK Schmidt Telescope. The plates were processed into the present compressed digital form with the permission of these institutions. The Second Palomar Observatory Sky Survey (POSS-II) was made by the California Institute of Technology with funds from the National Science Foundation, the National Geographic Society, the Sloan Foundation, the Samuel Oschin Foundation, and the Eastman Kodak Corporation. The Oschin Schmidt Telescope is operated by the California Institute of Technology and Palomar Observatory. This work presents results from the European Space Agency (ESA) space mission Gaia. Gaia data are being processed by the Gaia Data Processing and Analysis Consortium (DPAC). Funding for the DPAC is provided by national institutions, in particular the institutions participating in the Gaia MultiLateral Agreement (MLA). The Gaia mission website is https://www.cosmos.esa.int/gaia. The Gaia archive website is https://archives.esac.esa.int/gaia. This research was started at the NYC Gaia DR2 Workshop at the Center for Computational Astrophysics of the Flatiron Institute in 2018 April. Part of this research was carried out at the Jet Propulsion Laboratory, California Institute of Technology, under a contract with the National Aeronautics and Space Administration. EEM acknowledges support from the NASA NExSS program. \input{table_phot_oh30.tex} \emph{JG} wrote the codes, manuscript, generated figures and led all analysis; \emph{JKF} provided data on the \cite{2017AJ....153..257O} members and general comments; \emph{EEM} provided general comments, helped parse the literature and provide additional information on the members of Volans-Carina, and provided help with the determination of the association name and reddening. \software{BANYAN~$\Sigma$ \citep{2018ApJ...856...23G}.} \bibliographystyle{apj}
\section{Introduction} Let $E$ be an elliptic curve over a number field $k$. It is well-known that the torsion subgroup $E(k)_{\textup{tors}}$ is a finite subgroup of $({\mathbb Q}/{\mathbb Z})^2$. In 1996, Merel \cite{Merel}, building on work of Mazur~\cite{Mazur} and Kamienny~\cite{Kamienny92}, proved the landmark uniform boundedness theorem: that for any positive integer $d$, there exists a constant $B = B(d)$ such that for all number fields $k$ of degree at most $d$ and all elliptic curves $E/k$, \[ \#E(k)_{\textup{tors}} \leq B(d). \] Merel's theorem can equivalently be phrased as a statement about closed points on modular curves: that for any positive integer $d$, there exists a constant $B' = B'(d)$ such that for $n> B'$, the modular curve $X_1(n)/{\mathbb Q}$ has no non-cuspidal degree $d$ points. Around the same time as Merel's work, Frey~\cite{Frey-InfinitelyManyDegreed} observed that Faltings's theorem implies that an arbitrary curve $C$ over a number field $k$ can have infinitely {many points of degree at most $d$} if and only if these infinitely many points are parametrized by ${\mathbb P}^1_k$ or a positive rank subabelian variety of $\Jac(C)$.\footnote{{While Frey assumes that $C$ has a $k$-point, an inspection of the proof reveals that this is needed only to obtain a $k$-morphism $\Sym^d(C) \to \Jac(C)$. Since the existence of a degree $d$ point also guarantees the existence of a suitable such morphism, the hypothesis on the existence of a rational point can be removed.}} From this, Frey deduced that if a curve $C/k$ has infinitely many degree $d$-points, then the $k$-gonality of the curve\footnote{The $k$-gonality of a curve $C$ is the minimal degree of a $k$-rational map $\phi\colon C \to {\mathbb P}^1_k$.} must be at most $2d$. Frey's criterion combined with Abramovich's lower bound on the gonality of modular curves~\cite{Abramovich-Gonality} immediately shows that there exists a (computable!) constant $B'' = B''(d)$ such that for $n> B''$, the modular curve $X_1(n)/{\mathbb Q}$ has only finitely many degree $d$ points, {or in other words, that for $n> B''$ all degree $d$ points on $X_1(n)$ are \defi{sporadic}.\footnote{A closed point $x$ on a curve $C$ is sporadic if $C$ has only finitely many points of degree at most $\deg(x)$.}} {Thus, the strength of the uniform boundedness theorem is in controlling the existence of sporadic points of bounded degree on $X_1(n)$ {as $n$ tends to infinity}. } In this paper, we study sporadic points {and, more generally, \defi{isolated}\footnote{A closed point $x$ on a curve $C$ is isolated if it is not contained in a family of effective degree $d$ divisors parametrized by ${\mathbb P}^1$ or a positive rank abelian variety. See Definition~\ref{def:Isolated} for more details.} points} of arbitrary degree, focusing particularly on such points corresponding to non-CM elliptic curves. We prove that non-CM non-cuspidal sporadic, {respectively isolated, }points on $X_1(n)$ map to sporadic, {respectively isolated,} points on $X_1(d)$, for $d$ some bounded divisor of $n$. \begin{theorem}\label{thm:UnconditionalMain} Fix a non-CM elliptic curve $E$ over $k$, and let $m$ be an integer divisible by $2,3$ and all primes $\ell$ where the $\ell$-adic Galois representation of $E$ is not surjective. Let $M = M(E, m)$ be the level of the $m$-adic Galois representation of $E$ and let $f$ denote the natural map $X_1(n) \to X_1(\gcd(n,M))$. If $x\in X_1(n)$ is sporadic, {respectively isolated}, with $j(x) = j(E)$, then $f(x) \in X_1(\gcd(n,M))$ is sporadic, {respectively isolated}. \end{theorem} {For many elliptic curves, we may take both $m$ and $M$ to be quite small. For instance, let ${\mathcal E}$ be the set of elliptic curves over ${\mathbb Q}$ where the $\ell$-adic Galois representation is surjective for all $\ell> 3$ and where the $6$-adic Galois representation has level dividing $24$. Note that ${\mathcal E}$ contains all Serre curves~\cite[Proof of Prop. 22]{Serre-OpenImage} (that is, elliptic curves over ${\mathbb Q}$ whose adelic image is of index 2 in $\GL_2({\hat{\Z}})$, which is as large as possible) and hence contains almost all elliptic curves over ${\mathbb Q}$ when counted according to height~\cite[Theorem 4]{Jones10}. For $E \in {\mathcal E}$, we may apply Theorem~\ref{thm:UnconditionalMain} with $m = 6$ and $M|24$. The curve $X_1(24)$ has infinitely many quartic points, but no rational or quadratic points, nor cubic points corresponding to elliptic curves over ${\mathbb Q}$~\cites{Mazur, KenkuMomoseQuadratic, Morrow}. Therefore $X_1(24)$ has no sporadic points with ${\mathbb Q}$-rational $j$-invariant. For $M$ a proper divisor of $24$, the curves $X_1(M)$ have genus $0$, and so also have no sporadic points. Hence Theorem~\ref{thm:UnconditionalMain} yields the following corollary. \begin{cor} For all $n$, there are no sporadic points on $X_1(n)$ corresponding to elliptic curves in ${\mathcal E}$. In particular, there are no sporadic points corresponding to Serre curves. \end{cor}} {In addition to giving strong control on sporadic points over a fixed $j$-invariant, we are also able to use Theorem~\ref{thm:UnconditionalMain} to derive a uniform version that is conditional on a folklore conjecture motivated by a question of Serre.} \begin{conj}[Uniformity Conjecture]\label{conj:Uniformity} Fix a number field $k$. There exists a constant $C = C(k)$ such that for {all non-CM} elliptic curves $E/k$, the mod-$\ell$ Galois representation of $E$ is surjective for all $\ell > C$. \end{conj} \begin{conj}[Strong Uniformity Conjecture]\label{conj:StrongUniformity} Fix a positive integer $d$. There exists a constant $C = C(d)$ such that for all degree $d$ number fields $k$ and all {non-CM} elliptic curves $E/k$, the mod-$\ell$ Galois representation of $E$ is surjective for all $\ell > C$. \end{conj} \begin{remark}\label{rmk:ConjForQ} {Conjecture~\ref{conj:Uniformity} when $k = {\mathbb Q}$, or equivalently Conjecture~\ref{conj:StrongUniformity} when $d=1$, is the case originally considered by Serre~\cite[\S4.3]{Serre-OpenImage}. In this case, Serre asked whether $C$ could be taken to be $37$~\cite[p.399]{Serre-37}. The choice $C=37$ has been formally conjectured by Zywina~\cite[Conj. 1.12]{Zywina-PossibleImages} and Sutherland~\cite[Conj. 1.1]{Sutherland-ComputingGaloisImages}.} \end{remark} \begin{theorem}\label{thm:Main} Assume Conjecture~\ref{conj:Uniformity}. Then for any number field $k$, there exists a positive integer $M=M(k)$ such that if $x \in X_1(n)$ is a non-cuspidal, non-CM sporadic, {respectively isolated,} point with $j(x) \in k$, then $\pi(x) \in X_1(\gcd(n,M))$ is a sporadic, {respectively isolated,} point. Moreover, if the stronger Conjecture~\ref{conj:StrongUniformity} holds, then $M$ depends only on $[k:{\mathbb Q}]$. \end{theorem} We call a point in $j\in X_1(1)\cong {\mathbb P}^1$ an {isolated} $j$-invariant if it is the image of an {isolated} point on $X_1(n)$, for some positive integer $n$ . Since {any curve only has finitely many isolated points (see Theorem~\ref{thm:FiniteIsolated}\eqref{case:FinitelyManyIsolated})} and there are only finitely many CM $j$-invariants of bounded degree, we immediately obtain the following corollary. \begin{cor}Fix a number field $k$.\hfill \begin{enumerate}[leftmargin=*] \item[a)] Assume Conjecture~\ref{conj:Uniformity}. There are finitely many $k$-rational isolated $j$-invariants. \item[b)] Assume Conjecture \ref{conj:StrongUniformity}. There are finitely many isolated $j$-invariants of bounded degree. \end{enumerate} \end{cor} The integer $M$ in Theorem \ref{thm:Main} depends on the constant $C(k)$ or $C(d)$ from Conjecture~\ref{conj:Uniformity} or Conjecture~\ref{conj:StrongUniformity}, respectively, and also depends on a uniform bound for the level of the $\ell$-adic Galois representation for all $\ell\leq C(k)$, respectively $C(d)$. The existence of this latter bound depends on Faltings's Theorem and as such is ineffective. However, in the case when $k = {\mathbb Q}$, it is possible to make a reasonable guess for $M$. This is discussed more in Section~\ref{sec:RationaljInvariant}. \subsection{Prior work}\label{subsec:PriorWork} CM elliptic curves provide a natural class of examples of sporadic points due to fundamental constraints on the image of the associated Galois representation. Indeed, Clark, Cook, Rice, and Stankewicz show that there exist sporadic points corresponding to CM elliptic curves on $X_1(\ell)$ for all sufficiently large primes $\ell$~\cite{CCS}. Sutherland has extended this argument to include composite integers~\cite{Sutherland-Survey}. In the non-CM case, all known results on sporadic points have arisen from explicit versions of Merel's theorem for low degree. For instance, in studying cubic points on $\cup_{n\in {\mathbb N}}X_1(n)$, Najman identified two degree $3$ sporadic points on $X_1(21)$ all corresponding to the same non-CM elliptic curve with rational $j$-invariant~\cite{Najman}. Derickx, Etropolski, van Hoeij, Morrow, and Zureick-Brown {are currently classifying all degree $3$ non-cuspidal non-CM sporadic points on $X_1(n)$, and preliminary results suggest that these examples of Najman are the only examples} \cite{DEvHZB}. Work of van Hoeij~\cite{vanHoeij}, Derickx--van Hoeij \cite{DerickxVanHoeij}, and Derickx--Sutherland~\cite{DerickxSutherland} show that there are additional sporadic points, e.g., degree 5 points on $X_1(28)$ and $X_1(30)$ and a degree $6$ point on $X_1(37)$. {There are also examples of isolated points that are not sporadic. Derickx and van Hoeij \cite{DerickxVanHoeij} have shown $X_1(25)$ has a (nonempty) finite collection of points of degree $d=6$ and $d=7$. These points are isolated by Theorem \ref{thm:FiniteIsolated}, but not sporadic since the ${\mathbb Q}$-gonality of $X_1(25)$ is 5. In general, having infinitely points on a curve of degree $d$ does not preclude the existence of isolated points of degree $d$: see \cites{Siksek, Bruin-Najman, Gunther-Morrow, Box} for some examples}. \subsection{Outline} We set notation and review relevant background in Section~\ref{sec:Background}. In Section~\ref{sec:AdelicGroups} we record results about subgroups of $\GL_2({\hat{\Z}})$ that will be useful in later proofs; in particular, Proposition~\ref{prop:levelforcomp} is useful for determining the level of an $m$-adic Galois representation from information about the $\ell$-adic representations. {In Section~\ref{sec:MapsOfCurves}, we prove a general criterion for the images of sporadic or isolated points to remain sporadic or isolated (Theorem~\ref{thm:PushingForwardSporadicIsolated}); this result is likely of independent interest.} In Section~\ref{sec:FixedjInvariant}, we study isolated points on modular curves over a fixed non-CM $j$-invariant and prove Theorem~\ref{thm:UnconditionalMain}. This is then used in Section~\ref{sec:Uniform} to prove Theorem~\ref{thm:Main}. Theorem~\ref{thm:Main} implies that, assuming Conjecture~\ref{conj:StrongUniformity}, there are finitely many isolated $j$-invariants of bounded degree. This raises two interesting questions: \begin{enumerate} \item Are there finitely many isolated \emph{points} lying over $j$-invariants of bounded degree, or can there be infinitely many isolated points over a single $j$-invariant? \label{question:LiftingSporadic} \item In the case of degree $1$, when there is strong evidence for Conjecture~\ref{conj:StrongUniformity}, can we come up with a candidate list for the rational isolated $j$-invariants?\label{question:RationalSporadic} \end{enumerate} Question~\ref{question:LiftingSporadic} is the focus of Section~\ref{sec:LiftingSporadic}, where we show that any CM $j$-invariant has infinitely many isolated (and in fact, sporadic!) points lying over it. Section~\ref{sec:RationaljInvariant} focuses on Question~\ref{question:RationalSporadic}; there we provide a candidate list of levels from which the rational isolated $j$-invariants can be found. \section*{Acknowledgements} This project was started at the Women in Numbers 4 conference, which was held at the Banff International Research Station. We thank BIRS for the excellent working conditions and the organizers, Jennifer Balakrishnan, Chantal David, Michelle Manes, and the last author, for their support. We also thank the other funders of the conference: the Clay Mathematics Institute, Microsoft Research, the National Science Foundation, the Number Theory Foundation, and the Pacific Institute for Mathematics Sciences. We thank Jeremy Rouse, Drew Sutherland, and David Zureick-Brown for helpful conversations. {We also thank Nigel Boston, Pete L. Clark, Lo\"{i}c Merel, Filip Najman, Paul Pollack, and the anonymous referees for comments on an earlier draft. }The third author was partially supported by NSF grant DMS-1652116 and DMS-1301690 and the last author was partially supported by NSF CAREER grant DMS-1553459. \section{Background and notation}\label{sec:Background} \subsection{Conventions} Throughout, $k$ denotes a number field, ${\overline{\Q}}$ denotes a fixed algebraic closure of ${\mathbb Q}$, and $\Gal_k$ denotes the absolute Galois group $\Gal({\overline{\Q}}/k)$. We use $\ell$ to denote a prime number and ${\mathbb Z}_{\ell}$ to denote the $\ell$-adic integers. For any positive integer $m$, we write $\Supp(m)$ for the set of prime divisors of $m$ and write ${\mathbb Z}_m := \prod_{\ell\in\Supp(m)}{\mathbb Z}_{\ell}$. We use $S$ to denote a set of primes, typically finite; when $S$ is finite, we write ${\mathfrak m}_S := \prod_{\ell\in S}\ell.$ For any subgroup $G$ of $\GL_2({\hat{\Z}})$ and any positive integer $n$, we write $G_n$ and $G_{n^{\infty}}$, respectively for the images of $G$ under the projections \[ \GL_2({\hat{\Z}})\to \GL_2({\mathbb Z}/n{\mathbb Z}) \quad\textup{and}\quad \GL_2({\hat{\Z}}) \to \GL_2({\mathbb Z}_n). \] In addition, for any positive integer $m$ relatively prime to $n$ we write $G_{n\cdot m^{\infty}}$ for the image of $G$ under the projection \[ \GL_2({\hat{\Z}}) \to \GL_2({\mathbb Z}/n{\mathbb Z})\times \GL_2({\mathbb Z}_m). \] Throughout, we will abuse notation and use $\pi$ to denote any natural projection map among the groups $G, G_{n^{\infty}},$ and $G_n$. {By curve we mean a projective nonsingular geometrically integral $1$-dimensional scheme over a field. For a curve $C$, we write ${\mathbf k}(C)$ for the function field of $C$ and $\Pic_C$ for the Picard scheme of $C$. For any non-negative integer $d$, we write $\Pic^d_C$ for the connected component of $\Pic_C$ consisting of divisor classes of degree $d$ and $\Sym^d C$ for the $d^{th}$ symmetric product of $C$, i.e., $C^d/S_d$.} If $C$ is defined over the field $K$, we use $\gon_K(C)$ to denote the $K$-gonality of $C$, which is the minimum degree of a dominant morphism $C \rightarrow \mathbb{P}^1_K$. If $x$ is a closed point of $C$, we denote the residue field of $x$ by ${\mathbf k}(x)$ and define the degree of $x$ to be the degree of the residue field ${\mathbf k}(x)$ over $K$. A point $x$ on a curve $C/K$ is \defi{sporadic} if there are only finitely many points $y\in C$ with $\deg(y)\leq \deg(x)$. {We also consider other related properties of a closed point on a curve: \defi{isolated}, $\PP^1\textup{\defi{-isolated}}$, and $\defAVisolated$; these terms are defined in Section~\ref{sec:MapsOfCurves}.} We use $E$ to denote an elliptic curve, i.e., a curve of genus $1$ with a specified point $O$. {Unless stated otherwise,} we will consider only elliptic curves defined over {number fields}. We say that an elliptic curve $E$ over a field $K$ has complex multiplication, or {CM}, if the geometric endomorphism ring is strictly larger than $\mathbb{Z}$. Given an elliptic curve $E$ over a number field $k$, an affine model of $E$ is given by a short Weierstrasss equation $y^2=x^3+Ax+B$ for some $A,B \in k$. Then the $j$-invariant of $E$ is $j(E):=1728\frac{4A^3}{4A^3+27B^2}$ and uniquely determines the geometric isomorphism class of $E$. For a positive integer $n$, we write $E[n]$ for the subgroup of $E$ consisting of points of order at most $n$. \subsection{Modular Curves} For a positive integer $n$, let \[ \Gamma_1(n) \coloneqq \left\{{\left(\begin{smallmatrix}a & b \\ c & d \end{smallmatrix}\right)} \in \SL_2({\mathbb Z}) : c \equiv 0 \pmod{n}, \, a \equiv d \equiv 1 \pmod{n}\right\}. \] The group $\Gamma_1(n)$ acts on the upper half plane $\mathbb{H}$ via linear fractional transformations, and the points of the Riemann surface \[ Y_1(n) \coloneqq \mathbb{H}/\Gamma_1(n) \] correspond to $\mathbb{C}$-isomorphism classes of elliptic curves with a distinguished point of order $n$. That is, a point in $Y_1(n)$ corresponds to an equivalence class of pairs $[(E,P)]$, where $E$ is an elliptic curve over ${\mathbb C}$ and $P\in E$ is a point of order $n$, and where $(E,P) \sim (E',P')$ if there exists an isomorphism $\varphi\colon E \rightarrow E'$ such that $\varphi(P)=P'$. By adjoining a finite number of cusps to $Y_1(n)$, we obtain the smooth projective curve $X_1(n)$. {Concretely, we may define the extended upper half plane $\mathbb{H}^* \coloneqq \mathbb{H}\cup {\mathbb Q} \cup \{\infty\}$. Then $X_1(n)$ corresponds to the extended quotient $\mathbb{H}^*/\Gamma_1(n)$.} In fact, we may view $X_1(n)$ as an algebraic curve defined over ${\mathbb Q}$ (see \cite[Section 7.7]{DiamondShurman} or~\cite{DeligneRapoport} for more details). \subsubsection{Degrees of non-cuspidal algebraic points} If $x=[(E,P)]\in X_1(n)({\overline{\Q}})$ is a non-cuspidal point, then the moduli definition implies that $\deg(x)=[{\mathbb Q}(j(E), \mathfrak{h}(P)):{\mathbb Q}],$ where $\mathfrak{h}: E \rightarrow E/\Aut(E) \cong \mathbb{P}^1$ is a Weber function for $E$. From this we deduce the following lemma: \begin{lemma}\label{lem:degree} Let $E$ be a non-CM elliptic curve defined over the number field $k={\mathbb Q}(j(E))$, let $P\in E$ be a point of order $n$, and let $x = [(E,P)]\in X_1(n)$. Then \[ \deg(x)=c_x[k(P):{\mathbb Q}], \] where $c_x=1/2$ if {$2P \neq O$ and} there exists $\sigma \in \Gal_k$ such that {$\sigma(P)=-P$} and $c_x=1$ otherwise. \end{lemma} \begin{proof} Let $E$ be a non-CM elliptic curve defined over $k={\mathbb Q}(j(E))$ and let $\mathfrak{h}$ be a Weber function for $E$. If $\sigma \in \Gal_{k(\mathfrak{h}(P))}$, then $\sigma(P)=\xi(P)$ for some $\xi \in \Aut(E)$. Thus in the case where $\Aut(E)=\{\pm 1\}$, \[ [k(P):k( \mathfrak{h}(P))]=1 \text{ or } 2. \] If there exists $\sigma \in \Gal_k$ such that $\sigma(P)=-P$, then $[k(P):k( \mathfrak{h}(P))]=2$ and $c_x=1/2$. Otherwise $k(P)=k( \mathfrak{h}(P))$ and $c_x=1$. \end{proof} \subsubsection{Maps between modular curves} \begin{proposition}\label{prop:Degree} For positive integers $a$ and $b$, there is a natural ${\mathbb Q}$-rational map $f\colon X_1(ab) \rightarrow X_1(a)$ with \[ \deg(f)= c_{f}\cdot b^2 \prod_{p \mid b,\, p \nmid a} \left(1-\frac{1}{p^2}\right), \] where $c_{f}=1/2$ if $a \leq 2$ and $ab>2$ and $c_{f}=1$ otherwise. \end{proposition} \begin{proof} Since $\Gamma_1(ab) \subset \Gamma_1(a)$, we have a natural map $X_1(ab) \rightarrow X_1(a)$ that complex analytically is induced by $\Gamma_1(ab)\tau \mapsto \Gamma_1(a)\tau$ for {$\tau \in \mathbb{H}^*$}. On non-cuspidal points, this map has the moduli interpretation $[(E,P)] \mapsto [(E,bP)]$, which shows that it is ${\mathbb Q}$-rational. Since $-I\in \Gamma_1(n)$ if and only if $n|2$, the degree computation then follows from the formula~\cite[p.66] {DiamondShurman}, which states \[ \deg(f)= \begin{cases} [\Gamma_1(a):\Gamma_1(ab)]/2 & \textup{if } -I \in \Gamma_1(a)\textup{ and } -I \not\in \Gamma_1(ab)\\ [\Gamma_1(a):\Gamma_1(ab)] & \textup{otherwise.}\hfill \end{cases}\qedhere \] \end{proof} \subsection{Galois Representations of Elliptic Curves}\label{sec:Serre} Let $E$ be an elliptic curve over a number field $k$. Let $n$ be a positive integer. After fixing two generators for $E({\overline{k}})[n]$, we obtain a Galois representation \[ \rho_{E, n} \colon \Gal_k \to \GL_2({\mathbb Z}/n{\mathbb Z}). \] {Note that the conjugacy class of the image of $\rho_{E, n}$ is independent of the choice of generators.} After choosing compatible generators for each $n$, we obtain a Galois representation \[ \rho_E \colon \Gal_k \to \GL_2({\hat{\Z}}) \cong \prod_{\ell}\GL_2({\mathbb Z}_{\ell}), \] which agrees with $\rho_{E,n}$ after reduction modulo $n$. For any positive integer $n$ we also define \[ \rho_{E, n^{\infty}} \colon \Gal_k \to \GL_2({\mathbb Z}_{n}) \] to be the composition of $\rho_E$ with the projection onto the $\ell$-adic factors for $\ell|n$. Note that $\rho_{E,n^{\infty}}$ depends only on the support of $n$. We refer to $\rho_{E, n}$, $\rho_{E, n^{\infty}},$ and $\rho_{E}$ as the mod $n$ Galois representation of $E$, the $n$-adic Galois representation of $E$, and the adelic Galois representation of $E$, respectively. If $E{/k}$ does not have complex multiplication, then Serre's Open Image Theorem \cite{Serre-OpenImage} states that $\rho_{E}(\Gal_k)$ is open---and hence of finite index---in $\GL_2({\hat{\Z}})$. Since the kernels of the natural projection maps $\GL_2({\hat{\Z}}) \rightarrow \GL_2({\mathbb Z}/n{\mathbb Z})$ form a fundamental system of open neighborhoods of the identity in $\GL_2({\hat{\Z}})$~\cite[Lemma 2.1.1]{RibesZalesskii}, it follows that for any open subgroup $G$ of $\GL_2({\hat{\Z}})$ there exists $m\in {\mathbb Z}^+$ such that $G= \pi^{-1} (G \mod m)$. Thus Serre's Open Image Theorem can be rephrased in the following way: for any non-CM elliptic curve $E/k$, there exists a positive integer {$M$} such that \[ \im \rho_{E} = \pi^{-1}(\im \rho_{E, M}). \] {We call the smallest such $M$ the level and denote it $M_E$.} {Similarly, for any finite set of primes $S$, we let $M_E(S)$ be the least positive integer such that $\im \rho_{E, {\mathfrak m}_S^\infty} = \pi^{-1}(\im\rho_{E, M_E(S)})$ and we say that $M_E(S)$ is the level of the ${\mathfrak m}_S$-adic Galois representation. } We also define {\begin{equation}\label{eq:DefnOfSE} S_E = S_{E/k} := \left\{2, 3\right\} \cup \left\{ \ell : \rho_{E, \ell^{\infty}}(\Gal_k) \not\supset \SL_2({\mathbb Z}_{\ell}) \right\} \cup \left\{5, \textup{ if }\rho_{E, 5^{\infty}}(\Gal_k) \neq \GL_2({\mathbb Z}_5)\right\}; \end{equation}} by Serre's Open Image Theorem, this is a finite set. For any elliptic curve $E/{\mathbb Q}$ with discriminant $\Delta_E$,\footnote{{While the discriminant depends on a Weierstrass model, the class of $\Delta_E\in {\mathbb Q}^{\times}/{\mathbb Q}^{\times2}$ is independent of the choice of model. Since we are concerned only with $\Delta_E$ mod squares, we allow ourselves this abuse of notation.}} Serre observed that the field ${\mathbb Q}(\sqrt{\Delta_E})$ is contained in the $2$-division field ${\mathbb Q}(E[2])$ as well as a cyclotomic field ${\mathbb Q}(\mu_n)$ for some $n$, which in turn is contained in the $n$-division field ${\mathbb Q}(E[n])$. Thus if $\ell>2$ is a prime that divides the squarefree part of $\Delta_E$, then $2\ell$ must divide the level $M_E$ {(see~\cite[Proof of Prop. 22]{Serre-OpenImage} for more details)}. In particular, the level of an elliptic curve can be arbitrarily large. In contrast, for a fixed prime $\ell$, the level of the $\ell$-adic Galois representation is bounded depending only on the degree of the field of definition. \begin{theorem}[{\cite[Theorem 1.1]{CadoretTamagawa}, see also \cite[Theorem 2.3]{ClarkPollack}}]\label{thm:UniformIndex} Let $d$ be a positive integer and let $\ell$ be a prime number. There exists a constant {$C=C(d,\ell)$} such that for all number fields $k$ of degree $d$ and all non-CM elliptic curves $E{/k}$, \[ [\GL_2({\mathbb Z}_{\ell}):\im\rho_{E,\ell^{\infty}}]<C. \] \end{theorem} \section{Subgroups of $\GL_2({\hat{\Z}})$}\label{sec:AdelicGroups} The proofs in this paper involve a detailed study of the mod-$n$, $\ell$-adic and adelic Galois representations associated to elliptic curves. As such, we use a number of properties of closed subgroups of $\GL_2({\hat{\Z}})$ and subgroups of $\GL({\mathbb Z}/n{\mathbb Z})$ that we record here. Throughout $G$ denotes a subgroup of $\GL_2({\hat{\Z}})$. In Section~\ref{sec:Goursat}, we state Goursat's lemma. In Section~\ref{sec:Kernels} we show that {if $\ell=5$ and $G_5 = \GL_2({\mathbb Z}/5{\mathbb Z})$ or if $\ell>5$ is a prime such that $G_{\ell} \supset \SL_2({\mathbb Z}/\ell{\mathbb Z})$}, then for any integer $n$ relatively prime to $\ell$, the kernel of the projection $G_{\ell^sn}\to G_n$ is large, in particular, it contains $\SL_2({\mathbb Z}/\ell^s{\mathbb Z})$. This proof relies on a classification of subquotients of $\GL_2({\mathbb Z}/n{\mathbb Z})$: that $\GL_2({\mathbb Z}/n{\mathbb Z})$ can contain a subquotient isomorphic to {$\PGL_2({\mathbb Z}/5{\mathbb Z})$ or $\PSL_2({\mathbb Z}/\ell{\mathbb Z})$ for $\ell>5$ only if $5 | n$ or $\ell | n$ respectively}. This result is known in the case $\ell> 5$ (see \cite[Appendix, Corollary 11]{CojocaruKani}), but we are not aware of a reference in the case $\ell = 5$. In Section~\ref{sec:LevelIndex} we review results of Lang and Trotter that show that the level of a finite index subgroup of $\Gl_2({\mathbb Z}_{\ell})$ can be bounded by its index. Finally in Section~\ref{sec:madiclevel} we show how to obtain the $m$-adic level of a group from information of its $\ell$-adic components. \subsection{Goursat's Lemma}\label{sec:Goursat} \begin{lemma}[{Goursat's Lemma, see e.g., \cite[pg75]{Lang-algebra} or \cite{Goursat89}}]\label{lem:Goursat} Let $G, G'$ be groups and let $H$ be a subgroup of $G \times G'$ such that the two projection maps \[ \rho \colon H \to G \quad \textup{ and } \quad \rho' \colon H \to G' \] are surjective. Let $N \coloneqq \ker(\rho)$ and $N' \coloneqq \ker (\rho')$; one can identify $N$ as a normal subgroup of $G'$ and $N'$ as a normal subgroup of $G$. Then the image of $H$ in $G/N' \times G'/N$ is the graph of an isomorphism \[ G/N' \simeq G'/N. \] \end{lemma} \subsection{Kernels of reduction maps}\label{sec:Kernels} \begin{prop}\label{prop:surjectiveSL} {Let $\ell \geq 5$ be a prime. Assume that $G_{\ell} \supset \SL_2({\mathbb Z}/\ell{\mathbb Z})$ when $\ell>5$ and $G_{\ell} = \GL_2({\mathbb Z}/\ell{\mathbb Z})$ when $\ell=5$. } Then $\SL_2({\mathbb Z}/\ell^s {\mathbb Z}) \subset \ker (G_{\ell^s n} \to G_n)$ for any positive integer $n$ with $\ell\nmid n$. \end{prop} {For $\ell>5$, a key ingredient in the proof is a classification result that implies that $\PSL_2({\mathbb Z}/\ell{\mathbb Z})$ cannot appear as a subquotient of $G_n$ \cite[Appendix, Corollary 11]{CojocaruKani}. This is false when $\ell = 5$ (for instance, there is a subquotient of $\GL_2({\mathbb Z}/11{\mathbb Z})$ that is isomorphic to $\PSL_2({\mathbb Z}/5{\mathbb Z})$). However, we prove that $\PGL_2({\mathbb Z}/5{\mathbb Z})$ cannot be isomorphic to a subquotient of $G_n$ unless $5|n$.} \begin{lemma}\label{lem:Subquo} {Let $n$ be a positive integer.} If $\GL_2({\mathbb Z}/n{\mathbb Z})$ has a subquotient that is isomorphic to {$\PGL_2({\mathbb Z}/5{\mathbb Z})$}, then {$5\mid n$}. \end{lemma} \begin{remark} Throughout the proof, we freely use the isomorphism $\PGL_2({\mathbb Z}/5{\mathbb Z})\cong S_5$ and $\PSL_2({\mathbb Z}/5{\mathbb Z})\cong A_5$ to deduce information about subgroups and subquotients contained in these groups. \end{remark} \begin{proof} The lemma is a straightforward consequence of the following $3$ claims (Claim~\eqref{Claim:InductionPGL} is applied to the set $T = \Supp(n)$). \begin{enumerate} \item The projection \[ \GL_2({\mathbb Z}/n{\mathbb Z}) \to \prod_{{p \in\Supp(n)}}\PGL_2({\mathbb Z}/p{\mathbb Z}) \] is an injection when restricted to any subquotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$.\label{claim:ProjectiontoProdPGL} \item Let $\emptyset\neq S\subsetneq T$ be finite sets of primes. If $\prod_{p\in T}\PGL_2({\mathbb Z}/p{\mathbb Z})$ has a subquotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$ then so does at least one of \[ \prod_{p\in S}\PGL_2({\mathbb Z}/p{\mathbb Z}) \quad\textup{or}\quad \prod_{p\in T-S}\PGL_2({\mathbb Z}/p{\mathbb Z}). \] Hence, by induction, if $\prod_{p\in T}\PGL_2({\mathbb Z}/p{\mathbb Z})$ has a subquotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$ then $\PGL_2({\mathbb Z}/p{\mathbb Z})$ has a subquotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$ for some $p\in T$.\label{Claim:InductionPGL} \item If $p$ is a prime and $\PGL_2({\mathbb Z}/p{\mathbb Z})$ has a subquotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$, then $p=5$.\label{Claim:IsomorphicPGLs} \end{enumerate} \textbf{Proof of Claim~\ref{claim:ProjectiontoProdPGL}:} Let $N\vartriangleleft G < \GL_2({\mathbb Z}/n{\mathbb Z})$ be subgroups and let $\pi$ denote the surjective map \[ \pi\colon\GL_2({\mathbb Z}/n{\mathbb Z}) \to \prod_{p \in \Supp(n)}\PGL_2({\mathbb Z}/p{\mathbb Z}). \] Using the isomorphism theorems, we obtain the following \begin{equation}\label{eq:IsomorphismTheorems} \frac{\pi(G)}{\pi(N)}\cong \frac{G/(G\cap \ker \pi)}{N/(N\cap\ker \pi)} \cong\frac{G}{N\cdot(G\cap\ker\pi)}\cong \frac{G/N}{(G\cap \ker\pi)/(N\cap \ker\pi)}. \end{equation} For each prime $p$, the kernel of $\GL_2({\mathbb Z}/{p}^m{\mathbb Z})\to \GL_2({\mathbb Z}/p{\mathbb Z})$ is a $p$-group and the kernel of $\GL_2({\mathbb Z}/p{\mathbb Z})\to \PGL_2({\mathbb Z}/p{\mathbb Z})$ is a cyclic group, so $\ker \pi$ is a direct product of solvable groups. Hence $\ker \pi$ is solvable and so is $(G\cap\ker\pi)/(N\cap \ker \pi)$ for any $N \vartriangleleft G < \GL_2({\mathbb Z}/n{\mathbb Z})$. Since the only solvable normal subgroup of $\PGL_2({\mathbb Z}/5{\mathbb Z})$ is the trivial group, if $G/N \cong \PGL_2({\mathbb Z}/5{\mathbb Z})$, then $\pi(G)/\pi(N)\cong G/N$. \textbf{Proof of Claim~\ref{Claim:InductionPGL}:} Let $N\vartriangleleft G< \prod_{p\in T}\PGL_2({\mathbb Z}/p{\mathbb Z})$ be subgroups such that $G/N\cong \PGL_2({\mathbb Z}/5{\mathbb Z})$. Let $H$ be the normal subgroup of $G$ containing $N$ such that $H/N\cong\PSL_2({\mathbb Z}/5{\mathbb Z})$. Consider the following two maps \[ \pi_S \colon \prod_{p\in T}\PGL_2({\mathbb Z}/p{\mathbb Z})\to \prod_{p\in S}\PGL_2({\mathbb Z}/p{\mathbb Z}) \quad \textup{and}\quad \pi_{S^c} \colon \prod_{p\in T}\PGL_2({\mathbb Z}/p{\mathbb Z})\to \prod_{p\in T-S}\PGL_2({\mathbb Z}/p{\mathbb Z}). \] Since the only quotient of $\PGL_2({\mathbb Z}/5{\mathbb Z})$ that contains a subgroup isomorphic to $\PSL_2({\mathbb Z}/5{\mathbb Z})$ is $\PGL_2({\mathbb Z}/5{\mathbb Z})$ itself, by (\ref{eq:IsomorphismTheorems}) it suffices to show that either $\pi_S(H)/\pi_S(N)$ or $\pi_{S^c}(H)/\pi_{S^c}(N)$ is isomorphic to $\PSL_2({\mathbb Z}/5{\mathbb Z})$. Furthermore, since $\PSL_2({\mathbb Z}/5{\mathbb Z})$ is simple, it suffices to rule out the case where $\pi_S(H)= \pi_S(N)$ and $\pi_{S^c}(H)= \pi_{S^c}(N)$, which by the isomorphism theorems are equivalent, respectively, to the conditions that \[ \frac{H\cap \ker\pi_S}{N\cap \ker\pi_S}\cong \PSL_2({\mathbb Z}/5{\mathbb Z}) \quad \textup{and} \quad \frac{H\cap \ker\pi_{S^c}}{N\cap \ker\pi_{S^c}}\cong \PSL_2({\mathbb Z}/5{\mathbb Z}). \] Let \begin{align*} H_S := & (H\cap \ker \pi_S)\cdot(H\cap \ker\pi_{S^c}) \cong (H\cap \ker \pi_S)\times (H\cap \ker\pi_{S^c}),\\ N_S := & (N\cap \ker \pi_S)\cdot(N\cap \ker\pi_{S^c}) \cong (N\cap \ker \pi_S)\times (N\cap \ker\pi_{S^c}). \end{align*} Assume by way of contradiction that $H_S/N_S\cong \frac{H\cap \ker\pi_S}{N\cap \ker\pi_S} \times \frac{H\cap \ker\pi_{S^c}}{N\cap \ker\pi_{S^c}} \cong \left(\PSL_2({\mathbb Z}/5{\mathbb Z})\right)^2$, and consider the normal subgroup $(H_S\cap N)/N_S$. The isomorphism theorems yield an inclusion \[ \frac{H_S/N_S}{(H_S\cap N)/N_S}\cong H_S/(H_S\cap N) \cong H_SN/N \hookrightarrow H/N \cong \PSL_2({\mathbb Z}/5{\mathbb Z}), \] so $(H_S\cap N)/N_S$ must be a nontrivial normal subgroup of $H_S/N_S$. However, the only proper nontrivial normal subgroups of $\left(\PSL_2({\mathbb Z}/5{\mathbb Z})\right)^2$ are $\PSL_2({\mathbb Z}/5{\mathbb Z})\times \{1\}$ or $\{1\}\times \PSL_2({\mathbb Z}/5{\mathbb Z})$, so $N_S$ must contain either $H\cap \ker\pi_S$ or $H\cap \ker \pi_{S^c}$, which results in a contradiction. \textbf{Proof of Claim~\ref{Claim:IsomorphicPGLs}:} Let $G< \PGL_2({\mathbb Z}/p{\mathbb Z})$ be a subgroup that has a quotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$. If $p\nmid \#G$, then by~\cite[Section 2.5]{Serre-OpenImage}, $G$ must be isomorphic to a cyclic group, a dihedral group, $A_4$, $S_4$ or $A_5\cong \PSL_2({\mathbb Z}/5{\mathbb Z})$, so has no quotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$. Thus, $p$ must divide $\#G$. Then $G\cap \PSL_2({\mathbb Z}/p{\mathbb Z})$ is also of order divisible by $p$ and so by \cite[Theorem~6.25, Chapter 3]{Suzuki}, $G\cap \PSL_2({\mathbb Z}/p{\mathbb Z})$ is solvable or equal to $\PSL_2({\mathbb Z}/p{\mathbb Z})$. Since $G$ has a quotient isomorphic to $\PGL_2({\mathbb Z}/5{\mathbb Z})$, $G\cap \PSL_2({\mathbb Z}/p{\mathbb Z})$ cannot be solvable and hence $G = \PGL_2({\mathbb Z}/p{\mathbb Z})$ and $p=5$. \end{proof} \begin{proof}[Proof of Proposition~\ref{prop:surjectiveSL}] Since we have $G_{\ell^sn}<\GL_2({\mathbb Z}/\ell^sn{\mathbb Z})\simeq \GL_2({\mathbb Z}/\ell^s{\mathbb Z}) \times \GL_2({\mathbb Z}/n{\mathbb Z})$, there are natural surjective projection maps \[ \pi_{s}: G_{\ell^s n} \to G_{\ell^s} \quad \text{and} \quad \varpi_s: G_{\ell^sn}\to G_n. \] Observe that $\ker \pi_{s}$ and $\ker \varpi_s$ can be identified as normal subgroups of $G_n$ and $G_{\ell^s}$ respectively, and by Goursat's Lemma (see Lemma~\ref{lem:Goursat}), we have \begin{equation}\label{eq:Goursat} G_{\ell^s}/ \ker \varpi_s \cong G_n / \ker \pi_{s}. \end{equation} We first prove the proposition for the case when $s=1$. {By \cite[Theorem 4.9]{Artin57}, $\ker \varpi_1$ either contains $\SL_2({\mathbb Z}/\ell{\mathbb Z})$ or is a subgroup of the center $Z(\GL_2({\mathbb Z}/\ell{\mathbb Z}))$ of $\GL_2({\mathbb Z}/\ell{\mathbb Z})$. If $\ker\varpi_1 \subseteq Z(\GL_2({\mathbb Z}/\ell{\mathbb Z}))$ and $\ell=5$, then the left-hand side of \eqref{eq:Goursat} has a quotient $\PGL_2({\mathbb Z}/5{\mathbb Z})$, which contradicts Lemma~\ref{lem:Subquo} since the right-hand side cannot have such a quotient. Similarly, if $\ker \varpi_1 \subseteq Z(\GL_2({\mathbb Z}/\ell{{\mathbb Z}}))$ and $\ell>5$, then the left-hand side of \eqref{eq:Goursat} has a subquotient $\PSL_2({\mathbb Z}/\ell{\mathbb Z})$, which is impossible by \cite[Appendix, Corollary~11]{CojocaruKani}. Therefore, $\ker \varpi_1$ must contain $\SL_2({\mathbb Z}/\ell{\mathbb Z})$.} For $s>1$, since $\varpi_s$ is surjective and factors through \[ G_{\ell^s n} \subset \GL_2({\mathbb Z}/\ell^s n{\mathbb Z}) \to \GL_2({\mathbb Z}/\ell n {\mathbb Z}) \to \GL_2({\mathbb Z}/n{\mathbb Z}), \] $\ker \varpi_s \subset \GL_2({\mathbb Z}/\ell^s {\mathbb Z})$ maps surjectively onto $\ker\varpi_1\subset \GL_2({\mathbb Z}/\ell{\mathbb Z})$. Then the proposition follows from~\cite[Appendix, Lemma 12]{CojocaruKani}. \end{proof} \subsection{Bounding the level from the index}\label{sec:LevelIndex} \begin{prop}[{\cite[Part I, \S6, Lemmas 2 \& 3]{LangTrotter-FrobeniusDistributions}}] \label{prop:MaximalKernelGivesLevel} Let $\ell$ be a prime and let $G$ be a closed subgroup of $\GL_2({\mathbb Z}_{\ell})$. Set $s_0 = 1$ if $\ell$ is odd and $s_0 = 2$ otherwise. If \[ \ker (G \bmod \ell^{s+1} \to G \bmod \ell^s) = I + \Mat_2(\ell^s{\mathbb Z}/\ell^{s+1}{\mathbb Z}) \] for some $s\geq s_0$, then \[ \ker (G \to G \bmod \ell^s) = I + \ell^s\Mat_2({\mathbb Z}_{\ell}). \] \end{prop} \begin{remark} This proof follows the one given by Lang and Trotter. We repeat it here for the reader's convenience and to show that the proof does give the lemma as stated, even though the statement of~\cite[Part I, \S6, Lemmas 2 \& 3]{LangTrotter-FrobeniusDistributions} is slightly weaker. \end{remark} \begin{proof} For any positive integer $n$, let $U_n := \ker (G \to G \bmod \ell^n)$ and let $V_n := I + \ell^n\Mat_2({\mathbb Z}_{\ell})$. Note that for all $n$, $U_n\subset V_n$ and $U_n = U_1 \cap V_n$. Observe that for $s\geq s_0$, raising to the $\ell^{th}$ power gives the following maps \[ V_s/V_{s+1} \stackrel{\sim}{\to} V_{s+1}/V_{s+2}, \quad\textup{and}\quad U_s/U_{s+1} \hookrightarrow U_{s+1}/U_{s+2}. \] By assumption, the natural inclusion $U_s/U_{s+1} \subset V_s/V_{s+1}$ is an isomorphism for some $s\geq s_0$. Combining these facts, we get the following commutative diagram for any positive $k$: \[ \begin{tikzcd} U_s/U_{s+1} \arrow[hook]{d} \arrow{r}{\sim} & V_s/V_{s+1}\arrow{d}{\sim}\\ U_{s+k}/U_{s+k+1} \arrow[hook]{r} & V_{s+k}/V_{s+k+1}, \end{tikzcd} \] where the vertical maps are raising to the $({\ell^{k}})^{th}$ power and the horizontal maps are the natural inclusions. Hence, $U_{s+k}/U_{s+k+1} = V_{s+k}/V_{s+k+1}$ for all $k\geq 0$ and so $U_s = V_s$. \end{proof} \subsection{Determining $m$-adic level from level of $\ell$-adic components}\label{sec:madiclevel} \begin{proposition}\label{prop:levelforcomp} Let $\ell_1, \dots, \ell_q$ be distinct primes and let ${\mathfrak m} := \prod_{i=1}^q \ell_i$. For $i = 1, \dots, q$, let $t_i\geq 1$ be positive integers and let ${\mathfrak m}_i := \prod_{j \neq i}{\ell_{j}}$. If $G$ is a closed subgroup of $\GL_2({\hat{\Z}})$ such that $G_{{\mathfrak m}_i\cdot{\ell_i}^{\infty}}=\pi^{-1}(G_{{\mathfrak m}_i{\ell_i}^{t_i}})$ for each $i$, then $G_{{\mathfrak m}^{\infty}}=\pi^{-1}(G_M)$ for $M=\prod_{i=1}^q {\ell_i}^{t_i}$. \end{proposition} \begin{proof} For any $1\leq i\leq q$ and $r_i\geq 0$, consider the following commutative diagram of natural reduction maps. \[ \xymatrix{ G_{M {\ell_i}^{r_i}} \ar@{->>}[r]\ar@{->>}[d] & G_{M} \ar@{->>}[d]\\ G_{{\mathfrak m}_i {\ell_i}^{r_i+t_i}} \ar@{->>}[r] & G_{{\mathfrak m}_i {\ell_i}^{t_i}}} \] The kernel of the top horizontal map is a subgroup of $I + \Mat_2(M{\mathbb Z}/M\ell_i^{r_i}{\mathbb Z})$, so its order is a power of $\ell_i$. Similarly, the order of the kernel of the lower horizontal map is a power of $\ell_i$, while the order of the kernels of the vertical maps are coprime to $\ell_i$. {Since $\# \ker(G_{M_i \ell_i^{r_i}} \to G_{M}) \cdot \# \ker(G_{M} \to G_{{\mathfrak m}_i\ell_i^{t_i}})$ is equal to $\# \ker(G_{M_i \ell_i^{r_i}} \to G_{{\mathfrak m}_i\ell_i^{r_i}}) \cdot \# \ker( G_{{\mathfrak m}_i \ell_i^{r_i}} \to G_{{\mathfrak m}_i\ell_i^{t_i}})$,} the kernels of horizontal maps must be isomorphic, and hence $G_{M{\ell_i}^{r_i}}$ is the full preimage of $G_{M}$, by assumption. To complete the proof, it remains to show that for any collection of positive integers $\{r_i\}_{i=1}^q$, $G_{M\prod_{i = 1}^q\ell_i^{r_i}}$ is the full preimage of $G_M$. We do so with an inductive argument. Let $1\leq q'\leq q$ and let $\{r_i\}_{i=1}^{q'}$ be a collection of positive integers. Consider the following commutative diagram of natural reduction maps. \[\xymatrix{ G_{M\prod_{i=1}^{q'}{\ell_i}^{r_i}} \ar@{->>}[r]\ar@{->>}[d] & G_{M\prod_{i=1}^{q'-1}{\ell_i}^{r_i}}\ar@{->>}[d]\\ G_{M{\ell_{q'}}^{r_{q'}}} \ar@{->>}[r] & G_{M}} \] Again the kernels of the horizontal maps and the kernels of the vertical maps have coprime orders and so, by the induction hypothesis, the kernels of all maps are as large as possible. \end{proof} \section{Images of isolated points} \label{sec:MapsOfCurves} Let $C$ be a curve over a number field $F$ and consider the morphism \[ \phi_d\colon \Sym^d C\to \Pic^d_C \] that sends an unordered tuple of points to the sum of their divisor classes. Let $W^d$ be the image of $\Sym^d C$ in $\Pic^d_C$. Note that if there is a degree $d$ point on $C$ then $\Pic^d_C \cong \Pic^0_C$ and in particular is an abelian variety. \begin{definition}\label{def:Isolated}\hfill \begin{enumerate} \item A degree $d$ point $x\in C$ is $\PP^1\textup{\defi{-isolated}}$ if there is no other point $x'\in (\Sym^d C)(F)$ such that $\phi_d(x) = \phi_d(x')$. \item A degree $d$ point $x\in C$ is $\defAVisolated$ if there is no positive rank subabelian variety $A\subset \Pic^0_C$ such that $ \phi_d(x) + A \subset W^d$. \item A degree $d$ point $x\in C$ is \defi{isolated} if it is $\PP^1\textup{-isolated}$ and $\AVisolated$. \item A degree $d$ point $x\in C$ is \defi{sporadic} if there are only finitely many closed points $y\in C$ with {$\deg(y) \leq \deg(x)$}. \end{enumerate} \end{definition} Faltings's theorem \cite{Faltings} on rational points on subvarieties of abelian varieties implies the following two results on isolated and sporadic points. \begin{thm}\label{thm:FiniteIsolated} Let $C$ be a curve over a number field. \begin{enumerate} \item There are infinitely many degree $d$ points on $C$ if and only if there is a degree $d$ point on $C$ that is \emph{not} isolated. In particular, sporadic points are isolated.\label{case:CharacterizingFiniteDegreed} \item There are only finitely many isolated points on $C$.\label{case:FinitelyManyIsolated} \end{enumerate} \end{thm} \noindent We provide the details of the proof in Section~\ref{sec:ProofTheoremFiniteIsolated}. In this section, we consider an arbitrary morphism of curves, and give a criterion for when images of isolated points remain isolated. Our main result is the following. \begin{theorem}\label{thm:PushingForwardSporadicIsolated} Let $f\colon C \to D$ be a finite map of curves, let $x\in C$ be a closed point, and let $y = f(x) \in D$. Assume that $\deg(x) = \deg(y)\cdot\deg(f)$. \begin{enumerate} \item If $x$ is $\PP^1\textup{-isolated}$, then $y$ is $\PP^1\textup{-isolated}$.\label{case:Pisolated} \item If $x$ is $\AVisolated$, then $y$ is $\AVisolated$.\label{case:Aisolated} \item If $x$ is sporadic, then $y$ is sporadic.\label{case:sporadic} \end{enumerate} \end{theorem} \begin{proof} Let $d = \deg(y)$ and let $e = \deg(f)$. Then by assumption $de = \deg(x)$. \eqref{case:Pisolated} {Assume that $y$ is not $\PP^1\textup{-isolated}$, so there exists a point $y'\in (\Sym^dC)(F)$, different from $y$, such that $\phi_d(y) = \phi_d(y')$, or, in other words such that there exists a function $g\in {\mathbf k}(D)^{\times}$ such that $\divv(g) = y - y'$. Since $y$ is a degree $d$ point (and not just an effective degree $d$ {divisor}), the assumption that $y\neq y'$ implies that $y$ and $y'$ have distinct support.} Therefore the map $g\colon D \to {\mathbb P}^1$ has degree $d$, and hence $g\circ f$ gives a degree $de$ map. Then for any $z\in {\mathbb P}^1(F)$ different from $g(f(x))$, the fiber $(g\circ f)^{-1}(z)$ gives a point of $(\Sym^{{de}}C)(F)$, distinct from $x$, such that $\phi_{de}(x)=\phi_{de}((g\circ f)^{-1}(z)).$ In particular, $x$ is not $\PP^1\textup{-isolated}$. \eqref{case:Aisolated} Assume that $y$ is not $\AVisolated$, so there exists a subabelian variety $A\subset \Pic^0_D$ such that $\phi_d(y)+ A\subset W^d$. The morphism $f$ induces a commutative diagram \[ \xymatrix{ \Sym^d D \ar[r]^{\phi_d} \ar[d] & \Pic^d_D \ar[d]^{f^*}\\ \Sym^{de} C \ar[r]^{\phi_{de}} & \Pic^{de}_C, } \] where the left vertical arrow sends $y$ to $x$. Therefore, $\phi_{de}(x) + f^*A\subset W^{de}$. Since $f^*A$ is a positive rank subabelian variety of $\Pic^0 C$, the point $x$ is not $\AVisolated$. \eqref{case:sporadic} Assume that $y$ is not sporadic, i.e., that there are infinitely many closed points $y'\in D$ with $\deg(y')\leq \deg(y) = d$. For each of these points $y'$, there is a closed point $x'\in f^{-1}(y')$ such that \[ \deg(x') \leq \deg(y')e \leq \deg(y)e = de = \deg(x). \] Hence, the point $x$ is not sporadic. \end{proof} \subsection{Proof of Theorem~\ref{thm:FiniteIsolated}}\label{sec:ProofTheoremFiniteIsolated} {\eqref{case:CharacterizingFiniteDegreed}} The forward direction is a straightforward consequence of Faltings's theorem \cite{Faltings}; we include the details for the readers' convenience. Assume that there are infinitely many degree $d$ points. Then either there are two degree $d$ points $x, x'\in C$ such that $\phi_d(x) = \phi_d(x')$ and so in particular $x$ and $x'$ are not $\PP^1\textup{-isolated}$, or $\phi_d$ is injective on the set of degree $d$ points. In the latter case, $W^d\subset \Pic_C^d$ contains infinitely many rational points. Faltings's theorem states that the rational points on $W^d$ are a finite union of translates of subabelian varieties, so in particular, there must be a positive rank abelian variety $A\subset \Pic^0_C$ and a degree $d$ point $x\in C$ such that $x + A\subset W^d$, i.e., the degree $d$ point $x$ is not $\AVisolated$. Now we prove the backwards direction, which requires a more detailed study of Faltings's theorem. Let $x\in C$ be a degree $d$ point that is not isolated. If $x$ is not $\PP^1\textup{-isolated}$, then there exists an $x'\in (\Sym^d C)(F), x\ne x'$, such that $\phi_d(x) = \phi_d(x')$, or equivalently, there exists a rational function $g\in {\mathbf k}(C)^{\times}$ such that $\divv(g) = x - x'$. Since $x$ is a closed point and $x'\in (\Sym^d C)(F)$, $x\ne x'$ implies that $x$ and $x'$ have disjoint support. Thus the function $g$ gives a degree $d$ morphism $g\colon C \to {\mathbb P}^1$. By Hilbert's irreducibility theorem~\cite[Chap. 9]{Serre-MWLectures}, there are infinitely many degree $1$ points $z\in {\mathbb P}^1$ such that $g^{-1}(z)$ has degree $d$, which gives the desired result. Now assume that $x$ is $\PP^1\textup{-isolated}$ but not $\AVisolated$, i.e., that $x$ is not equivalent to any other effective divisors and that there is a positive rank subabelian variety $A\subset \Pic^0 C$ such that $x + T \subset W^d$. Since the cokernel of $\Pic C \to \left(\Pic \overline{C}\right)^{\Gal(\overline{F}/F)}$ is torsion, there is a finite index subgroup $H\subset A(F)$ such that every divisor class in $H$ (and therefore every divisor class in $x + H$) is represented by an $F$-rational divisor, and every divisor class in $A(F)\setminus H$ is \emph{not} represented by an $F$-rational divisor. In other words, $\phi_d\left((\Sym^d C)(F)\right)\cap (x + A(F)) = x + H$. Since $H$ has positive rank, taking the preimage of $x + H$ under $\phi_d$ yields infinitely many rational points on $\Sym^d C$, or, equivalently, infinitely many effective degree $d$ $0$-cycles on $C$. It remains to prove that infinitely many of these $0$-cycles are irreducible, i.e., are not in the image of $\cup_i\left((\Sym^{d-i}C)(F)\times (\Sym^i C)(F)\right)$. Consider the following commutative diagram \[ \xymatrix{ (\Sym^{d-i} C)(F) \times (\Sym^i C)(F) \ar[rr]^(.63){\phi_{d-i}\times \phi_i} \ar[d] && W^{d-i} \times W^i \ar[d]\\ (\Sym^{d} C)(F) \ar[rr]^{\phi_{d}} && W^{d}, } \] where the vertical maps are induced by concatenation and summation, respectively. If there are only finitely many degree $d$ points on $C$, then all but finitely many of the points in $x + H$ are contained in the union $\cup_i (W^{d-i}(F) + W^i(F))$. Faltings's theorem on rational points on subvarieties of abelian varieties implies that \begin{equation}\label{eq:ImageOfLowerWd} \bigcup_{i=1}^{\lfloor d/2\rfloor} (W^{d-i}(F) + W^i(F)) = \bigcup_{j=1}^n y_j + A_j(F), \end{equation} where $n$ is some nonnegative integer, the $A_j$'s are some subabelian varieties of $\Pic^0_C$ and the $y_j$'s are degree $d$ divisors on $C$, which can be taken to be reducible and effective. We are concerned with the intersection \begin{align*} (x + H) \cap \left(\bigcup_{j=1}^n y_j + A_j(F)\right) & = x + \left(H \cap \left(\bigcup_{j=1}^n y_j - x + A_j(F)\right)\right)\\ &= x + \bigcup_{j=1}^n \left(H\cap \left(y_j-x + A_j(F)\right)\right) \end{align*} If the intersection $H\cap (y_j-x + A_j(F))$ is nonempty, then it is a coset of $H\cap A_j(F)$. In addition, since $x$ is a $\PP^1\textup{-isolated}$ degree $d$ point on $C$, $x$ cannot be written as the sum of two nonzero effective divisors, so by definition of~\eqref{eq:ImageOfLowerWd}, $H\cap (y_j-x + A_j(F))$ does not include the identity. Thus, \[ (x + H) \cap \left(\bigcup_{j=1}^n y_j + A_j(F)\right) = x + \bigcup_{j\in J} \left(z_j + H\cap A_j(F)\right), \] where $J\subset \{1, \dots, n\}$ and $z_j\in H\setminus H\cap A_j(F)$. For each $j\in J$, let $G_j$ be a subgroup of $H$ of finite index that contains $H\cap A_j(F)$ and that does not contain $z_j$. Then we have \begin{align*} (x + H) \cap \left(\bigcup_{j=1}^n y_j + A_j(F)\right) & = x + \bigcup_{j\in J} \left(z_j + H\cap A_j(F)\right)\\ & \subset x + \bigcup_{j\in J} \left(z_j +G_j\right)\\ & \subset (x+ H) \setminus \left(x + \cap_{j\in J}G_j\right)\subsetneq x + H. \end{align*} Since each $G_j$ is finite index in $H$, so is the intersection $\cap_{j\in J} G_j$. Hence, the image of $\cup_i (W^{d-i}(F) + W^i(F))$ misses infinitely many rational points of $x+H$, and so there are infinitely many degree $d$ points on $C$. {\eqref{case:FinitelyManyIsolated}} If $C$ has genus $0$, then no point is ${\mathbb P}^1$-isolated, so the statement trivially holds. Now assume that $g:= \textup{genus}(C)$ is positive, and let $P$ be a point of degree $d$. If $d> g + 1$, then by Riemann-Roch, $\ell(P) = d - g + 1 > 2$ and so $P$ is not ${\mathbb P}^1$-isolated. Therefore, any isolated point on $C$ must have bounded degree, and so it suffices to prove that there are only finitely many isolated points of a fixed degree $d$. Recall that degree $d$ points on $C$ give rise to rational points on $\Sym^d C$ that in turn map, via $\phi_d$, injectively to rational points on $W^d$. By Faltings's theorem, $W^d(F)$ is the finite union of translates of subabelian varieties of $\Pic^0 C$. By definition, any degree $d$ point on $C$ that lands in a translate of a positive rank subabelian variety is not $\AVisolated$. Therefore, the set of degree $d$ isolated points of $C$ must inject (under $\phi_d$) into a finite union of translates of rank $0$ subabelian varieties, so in particular must be finite. \qed \section{Isolated points above a fixed non-CM $j$-invariant} \label{sec:FixedjInvariant} For any non-CM elliptic curve $E$ over a number field $k$, recall from \S\ref{sec:Serre} that { \[ S_E = S_{E/k} := \left\{2, 3\right\} \cup \left\{\ell : \rho_{E, \ell^{\infty}}(\Gal_k) \not\supset \SL_2({\mathbb Z}_{\ell})\right\} \cup \left\{5, \textup{if }\rho_{E, 5^{\infty}}(\Gal_k) \neq \GL_2({\mathbb Z}_{5})\right\}. \]} {In this section we show that the degree of a non-cuspidal non-CM point $x \in X_1(n)$ is as large as possible given the degree of its image in $X_1(a)$ for $a = \gcd(n, M_{E_{x}}(S_{E_{x}}))$, where $E_{x}$ is an elliptic curve over ${\mathbb Q}(j(x))$ with $j$-invariant $j(x)$. } \begin{theorem}\label{thm:DegreeOfMapFixedjInvariant} Fix a non-CM elliptic curve $E$ over a {number field $k$}. Let $S$ be a finite set of places containing $S_E$ and let {${\mathfrak m}_S := \prod_{\ell\in S}\ell$. Let} $M$ be a positive integer with $\Supp(M)\subset S$ satisfying \begin{equation}\label{eq:FullPreimage} \im \rho_{E, {\mathfrak m}_S^\infty} = \pi^{-1}(\im\rho_{E, M}). \end{equation} If $x\in X_1(n)$ is a closed point with $j(x) = j(E)$, then { $\deg(x) = \deg(f)\deg(f(x)),$ where $f$ denotes the natural map $X_1(n) \to X_1(\gcd(n,M)).$} \end{theorem} \begin{remark}\label{Rmk:Leveljinvariant} Note that if $E$ and $E'$ are quadratic twists of each other, both defined over a {number field $k$}, then $S_E = S_{E'}$ (see, e.g., \cite[Lemma 5.27]{Sutherland-ComputingGaloisImages}). Furthermore, for any $S$, \begin{equation}\label{eq:MaximalDegreeGrowth} \pm (\im\rho_{E, {\mathfrak m}_{S}^{\infty}}) = \pm (\im\rho_{E', {\mathfrak m}_{S}^{\infty}}) \end{equation} (see, e.g., \cite[Lemma 5.17]{Sutherland-ComputingGaloisImages}). Since any open subgroup of $\GL_2({\mathbb Z}_{{\mathfrak m}_S})$ has only finitely many subgroups of index $2$, there is an integer $M$ that will satisfy~\eqref{eq:FullPreimage} for all quadratic twists of a fixed elliptic curve. \end{remark} {This theorem combined with Theorem~\ref{thm:PushingForwardSporadicIsolated} yields the following corollary, of which Theorem~\ref{thm:UnconditionalMain} is a special case. \begin{cor}\label{cor:SporadicPtsFixedjInvariant} Fix a non-CM elliptic curve $E$ over a number field $k$. Let $S$ be a finite set of places containing $S_E$ and let $M$ be a positive integer with $\Supp(M)\subset S$ satisfying \[ \im \rho_{E, {\mathfrak m}_S^\infty} = \pi^{-1}(\im\rho_{E, M}). \] Let $x\in X_1(n)$ be a point with $j(x) = j(E)$, and let $f$ denote the natural map $X_1(n) \to X_1(\gcd(n,M)).$ \begin{enumerate} \item If $x$ is $\PP^1\textup{-isolated}$, then $f(x)$ is $\PP^1\textup{-isolated}$. \item If $x$ is $\AVisolated$, then $f(x)$ is $\AVisolated$. \item If $x$ is sporadic, then $f(x)$ is sporadic. \end{enumerate} \end{cor} From this, we deduce the following.} \begin{cor}\label{cor:SurjectivePrimes} Let $E$ be a non-CM elliptic curve defined over $k := {\mathbb Q}(j(E))$. If $\ell\notin S_E$, then there are no sporadic {or isolated} points on $X_1(\ell^s)$ lying over $j(E)$ for any $s\in {\mathbb N}$. \end{cor} {In Section~\ref{subsec:SporadicPointsLowerLevel}, specifically Lemma~\ref{lem:LargeGaloisImageDegreeOfMap}, we show that the desired maximal degree growth condition (i.e., the conclusion of Theorem~\ref{thm:DegreeOfMapFixedjInvariant}) is implied by a condition on the degree of field extensions $k(P)/k(bP)$ where $P$ is a point of order $ab$ on a non-CM elliptic curve $E$. We then show that the assumed growth of the Galois representation~\eqref{eq:FullPreimage} implies the hypothesis of Lemma~\ref{lem:LargeGaloisImageDegreeOfMap} in two different cases. First, for maps $X_1(n) \to X_1(n\ell^{-1})$ for prime divisors $\ell$ of $n$ outside of $S_E$ (see Section~\ref{subsec:SurjectivePrimes}), and second, for maps $X_1(ab)\to X_1(a)$ for integers $a,b$ with bounded support (see Section~\ref{subsec:FixedSupport}). The results of these two sections are brought together in Section~\ref{subsec:ProofOfFixedjInvariant} to prove Theorem~\ref{thm:DegreeOfMapFixedjInvariant}.} \begin{remark} As discussed in Section~\ref{sec:Serre}, the full strength of Serre's Open Image Theorem implies that for any non-CM elliptic curve $E/k$, there exists a positive integer {$M_E$} such that \[ \im \rho_{E} = \pi^{-1}(\im \rho_{E, {M_E}}). \] The arguments in Section~\ref{subsec:FixedSupport} alone then imply that {$\deg(x) = \deg(f)\deg(f(x)),$ where $f$ denotes the natural map $X_1(n) \to X_1(\gcd(n,M_E))$}, which yields a weaker version of Theorem~\ref{thm:DegreeOfMapFixedjInvariant}. While there is not a dramatic difference in the strength of these results for a fixed elliptic curve, the difference is substantial when applied to a family of elliptic curves. It is well-known that {$M_{E}$} can be arbitrarily large for a non-CM elliptic curve {$E$} over a fixed number field $k$ (see Section~\ref{sec:Serre}). However, for a fixed finite set of places $S$, we prove that $M_{E}(S)$ can be bounded depending only on $[k:{\mathbb Q}]$. This allows us to obtain the uniform version of Corollary~\ref{cor:SporadicPtsFixedjInvariant}, namely Theorem~\ref{thm:Main} (see \S\ref{sec:Uniform}). \end{remark} \subsection{Field-theoretic condition for maximal degree growth}\label{subsec:SporadicPointsLowerLevel} \begin{lemma}\label{lem:LargeGaloisImageDegreeOfMap} Let $a$ and $b$ be positive integers, $E$ a non-CM elliptic curve over {a number field} $k$, and $P\in E$ a point of order $ab$. Let $x:=[(E,P)] \in X_1(ab)$ and let $f$ denote the map $X_1(ab) \to X_1(a)$. If $[k(P) : k(bP)]$ is as large as possible, i.e., if $[k(P): k(bP)] =\# \{Q\in E: bQ = bP, Q \textup{ order }ab\}$, then \[ \deg(x) = {\deg(f)}\deg(f(x)). \] \end{lemma} \begin{proof} From the definition of $X_1(n)$, we have that \begin{equation}\label{eq:DegreeModularCurveMap} \#\{Q\in E : bQ = bP, Q \textup{ order }ab\} = \begin{cases} 2\deg(X_1(ab) \to X_1(a)) & \textup{if }a\leq2 \textup{ and }ab>2,\\ \phantom{2}\deg(X_1(ab) \to X_1(a)) & \textup{otherwise}. \end{cases} \end{equation} Let us first consider the case that $a \leq 2$ and $ab > 2$. Then $\deg(f(x)) = [k(bP):{\mathbb Q}]$. Since $[k(P):k(bP)]$ is as large as possible and $a\leq 2$, there must be a $\sigma \in \Gal_k$ such that $\sigma(P) = -P$. Hence $\deg(x) = \frac12[k(P):{\mathbb Q}]$ by Lemma \ref{lem:degree}, so~\eqref{eq:DegreeModularCurveMap} yields the desired result. Now assume that $ab \leq 2$. Then $\deg(f(x)) = [k(bP):{\mathbb Q}]$ and $\deg(x) = [k(P):{\mathbb Q}]$, so~\eqref{eq:DegreeModularCurveMap} again yields the desired result. Finally we consider the case when $a>2$. Note that for any point $y\in X_1(ab)$, $\deg(y) \leq \deg(f(y)) \cdot \deg(X_1(ab)\to X_1(a))$. Combining this with~\eqref{eq:DegreeModularCurveMap}, it remains to prove that \[ \frac{\deg(x)}{\deg(f(x))} \geq \#\{Q \in E : bQ = bP, Q \textup{ order }ab\}. \] {By Lemma \ref{lem:degree}, $\deg(x) = c_x \cdot [k(P): {\mathbb Q}]$ and $\deg(f(x)) = c_{f(x)}\cdot [k(bP):{\mathbb Q}]$ where $c_x, c_{f(x)} \in \{1, 1/2\}.$ Since any $\sigma\in \Gal_k$ that sends $P$ to $-P$ also sends $bP$ to $-bP$}, $c_x\geq c_{f(x)}$ and so these arguments together show that \[ \frac{\deg(x)}{\deg(f(x))} = \frac{c_x [k(P): {\mathbb Q}]}{c_{f(x)} [k(bP):{\mathbb Q}]} = \frac{c_x}{c_{f(x)}} [k(P):k(bP)] \geq [k(P):k(bP)]. \] By assumption, $[k(P):k(bP)] = \#\{Q \in E : bQ = bP, Q \textup{ order }ab\}$, yielding the desired inequality. \end{proof} \subsection{Eliminating primes with {large} Galois representation}\label{subsec:SurjectivePrimes} \begin{prop}\label{prop:EliminatingSurjectivePrimes} Let $E$ be a non-CM elliptic curve over {a number field $k$}, let $\ell$ be a prime {not contained in $S_E$}, and let $a$ and $s$ {be positive integers}. Let $x\in X_1(a\ell^s)$ {be a closed point with $j(x) = j(E)$ and let $f\colon X_1(a\ell^s) \to X_1(a)$ be the natural map. Then \[ \deg(x) = \deg(f)\deg(f(x)). \]} \end{prop} \begin{proof} {Write $a = b\ell^t$ where $\ell\nmid b$, let $g$ denote the map $X_1(a) \to X_1(b)$ and let $h\colon X_1(a\ell^s) \to X_1(b)$ be the composition $g\circ f$. Since $\deg(h) = \deg(f)\deg(g)$, the general case follows from the case when $\ell\nmid a$. We work with this assumption for the remainder of the proof.} {Let $P\in E$ be a point of order $a\ell^s$ such that $x = [(E,P)]$ and for any $c|a\ell^s$, let $B_{c}^1\subset \Aut(E[c])$ be the stabilizer of $\frac{a\ell^s}{c}P$.} Let $H$ denote the kernel of the projection map $\im \rho_{E, a\ell^s} \to \im \rho_{E, a}$. {We wish to prove $[k(P) : k(\ell^sP)] = \#\{ Q\in E: \ell^sQ=\ell^sP,\; Q \text{ order } a\ell^s\}$, so that we can apply Lemma~\ref{lem:LargeGaloisImageDegreeOfMap}.} Note that we always have the following upper bound \[ \#\left(\Aut(E[\ell^s])/B_{\ell^s}^1\right) = \#\{ Q\in E: \ell^sQ=\ell^sP,\; Q \text{ order } a\ell^s\} \geq [k(P):k(\ell^sP)]. \] We may also apply Galois theory to the towers of fields $k(E[a\ell^s])\supset k(P) \supset k(\ell^sP)$ and $k(E[a\ell^s])\supset k(E[a]) \supset k(\ell^sP)$ to obtain the following lower bound. \begin{align*} [k(P):k(\ell^s P)] & = \frac{[k(E[a\ell^s]):k(E[a])]\cdot [k(E[a]):k(\ell^s P)]}{[k(E[a\ell^s]):k(P)]} = \frac{\#H \cdot \#\left(\im \rho_{E,a}\cap \BB{a}\right)} {\#\left(\im \rho_{E,a\ell^s}\cap \BB{a\ell^s}\right)}\\ & \geq \frac{\#H \cdot \#\left(\im \rho_{E,a}\cap \BB{a}\right)} {\#(H\cap \BB{a\ell^s})\cdot\#\left(\im \rho_{E, a} \cap \BB{a}\right)} = \frac{\#H}{\#(H\cap \BB{a\ell^s})} = \frac{\#H}{\#(H\cap \BB{\ell^s})}. \end{align*} {Since {$\ell\not\in S_E$}, we may use Proposition~\ref{prop:surjectiveSL} to conclude that $H$ must contain $\SL_2({\mathbb Z}/\ell^s{\mathbb Z}).$} Therefore we have set inclusions \begin{equation}\label{eq:EqualityOfQuotients} \SL_2({\mathbb Z}/\ell^s{\mathbb Z})/\left(\SL_2({\mathbb Z}/\ell^s{\mathbb Z})\cap \BB{\ell^s}\right)\hookrightarrow H/\left(H\cap\BB{\ell^s}\right) \hookrightarrow \Aut(E[\ell^s])/\BB{\ell^s}. \end{equation} Since the sets on the right and the left of \eqref{eq:EqualityOfQuotients} have the same cardinality, all inclusions in \eqref{eq:EqualityOfQuotients} must be bijections. {Hence, the upper and lower bounds obtained above agree, and, in particular, $[k(P) : k(\ell^sP)] = \#\{ Q\in E: \ell^sQ=\ell^sP,\; Q \text{ order } a\ell^s\}$ as desired.} \end{proof} \subsection{Maps between $\{X_1(n)\}$ where $n$ has specified support}\label{subsec:FixedSupport} \begin{prop} \label{prop:FixedSupportAndLevel} Let $E$ be a non-CM elliptic curve over {a number field $k$}, let $S$ be a finite set of primes, and let ${\mathfrak m}_S := \prod_{\ell\in S}\ell$. Let $M = M_E(S)$ be a positive integer with $\Supp(M) \subset S$ such that \[ \im \rho_{E, {\mathfrak m}_S^{\infty}} = \pi^{-1}(\im \rho_{E, M}) \] and let $a$ and $b$ be positive integers with $ \gcd(ab, M) | a$ and $\Supp(ab) \subset S$. {Let $x\in X_1(ab)$ be a closed point with $j(x) = j(E)$ and let $f$ denote the natural map $X_1(ab) \to X_1(a).$ Then \[ \deg(x) = \deg(f)\deg(f(x)). \]} \end{prop} \begin{proof} Let $M' := \lcm(a, M)$ and let $n = ab$. By definition, $\im \rho_{E, n}$ is the mod $n$ reduction of $\im \rho_{E, {\mathfrak m}_S^{\infty}}$ and $\im \rho_{E, a}$ is the mod $a$ reduction of $\im \rho_{E, M'}$. Since $\im \rho_{E, {\mathfrak m}_S^{\infty}} = \pi^{-1}(\im \rho_{E, M})$, this implies that \[ \im \rho_{E, {\mathfrak m}_S^{\infty}} = \pi^{-1}(\im \rho_{E, M'}) \quad \textup{ and that }\quad \im \rho_{E, n} = \pi^{-1}(\im \rho_{E, a}), \] where by abuse of notation, we use $\pi$ to denote both natural projections. In other words, the mod $n$ Galois representation is as large as possible given the mod $a$ Galois representation. Hence, for any $P\in E$ of order $n$, the extension $[k(P):k(bP)]$ is as large as possible, i.e., $[k(P):k(bP)] = \# \{Q\in E : bQ = bP, Q \textup{ order }n\}$. In particular this applies to a point $P\in E$ such that $x=[(E, P)]\in X_1(n).$ Therefore, Lemma~\ref{lem:LargeGaloisImageDegreeOfMap} completes the proof. \end{proof} \subsection{Proof of Theorem~\ref{thm:DegreeOfMapFixedjInvariant}} \label{subsec:ProofOfFixedjInvariant} {Let $x\in X_1(n)$ be a closed point with $j(x) = j(E)$ and write $n = n_0n_1$ where $\Supp(n_0) \subset S$ and $\Supp(n_1)$ is disjoint from $S$. Note that $\gcd(n, M)|n_0$. We factor the map $f$ as \[ X_1(n) \stackrel{f_1}{\to} X_1(n_0) \stackrel{f_2}{\to} X_1(\gcd(n,M)). \] By inductively applying Proposition~\ref{prop:EliminatingSurjectivePrimes} to powers of primes $\ell\notin S_E$, we see that $\deg(x) = \deg(f_1)\deg(f_1(x))$. Then we apply Proposition~\ref{prop:FixedSupportAndLevel} with $a = \gcd(n, M)$, $b = n_0/\gcd(n, M)$ to show that \[ \deg(f_1(x)) = \deg(f_2)\deg(f_2(f_1(x))). \]} \section{Proof of Theorem~\ref{thm:Main}}\label{sec:Uniform} In this section we prove Theorem~\ref{thm:Main}. For a fixed number field $k$, Conjecture~\ref{conj:Uniformity} implies that there is a finite set of primes $S = S(k)$ such that for all {non-CM} elliptic curves $E/k$, $S \supset S_{E/k}$ (see~\eqref{eq:DefnOfSE}). Furthermore, Conjecture~\ref{conj:StrongUniformity} implies that $S(k)$ can be taken to depend only on $[k:{\mathbb Q}]$. Thus, to deduce Theorem~\ref{thm:Main} from Corollary~\ref{cor:SporadicPtsFixedjInvariant}, it suffices to show that for any positive integer $d$ and any finite set of primes $S$, there is an integer $M = M_d(S)$ such that for all number fields $k$ of degree $d$ and all {non-CM} elliptic curves $E/k$, we have \[ \im \rho_{E, {\mathfrak m}_S^{\infty}} = \pi^{-1}(\im \rho_{E, M}). \] Hence Proposition~\ref{prop:UniformLevelFiniteSetPrimes} completes the proof of Theorem~\ref{thm:Main}. \begin{prop}\label{prop:UniformLevelFiniteSetPrimes} Let $d$ be a positive integer, $S$ a finite set of primes, and ${\mathcal E}$ a set of non-CM elliptic curves over number fields of degree at most $d$. \begin{enumerate} \item\label{item1}\label{part:TheoreticalBound} There exists a positive integer $M$ with $\Supp(M) \subset S$ such that for all $E/k \in {\mathcal E}$ \[ \im \rho_{E, {\mathfrak m}_S^{\infty}} = \pi^{-1}(\im \rho_{E, M}). \] \item\label{item2}\label{part:ExplicitBoundByInduction} {Let $M_d(S,{\mathcal E})$ be the smallest such $M$ as in~\eqref{item1} and for all }$\ell\in S$, define \[ {\tau = \tau_{S,{\mathcal E}, \ell} := \max_{E/k \in {\mathcal E}} \left( v_{\ell}\left(\#\im\rho_{E, {\mathfrak m}_{S-\{\ell\}}}\right)\right) \leq v_{\ell}(\#\GL_2({\mathbb Z}/{\mathfrak m}_{S-\{\ell\}}{\mathbb Z})).} \] Then $v_{\ell}(M_d(S,{\mathcal E})) \leq \max(v_{\ell}(M_d(\{\ell\}, {\mathcal E})), v_{\ell}(2\ell)) + \tau$. \end{enumerate} \end{prop} \begin{remark} In the proof of Proposition~\ref{prop:UniformLevelFiniteSetPrimes}\eqref{item2}, if $\im\rho_{E,{\mathfrak m}_{S-\{\ell\}}}$ is a Sylow $\ell$-subgroup of $\GL_2({\mathbb Z}/{\mathfrak m}_{S-\{\ell\}}{\mathbb Z})$, then a chief series (a maximal normal series) of {$\im\rho_{E,{\mathfrak m}_{S-\{\ell\}}}$} does have length $\tau$. So the bound in \eqref{item2} is sharp if the group structure of $\im\rho_{E,\ell^{\infty}}$ allows. However, given set values for $d, S,$ and ${\mathcal E}$, information about the group structure of possible Galois representations (rather than just bounds on the cardinality) could give sharper bounds. \end{remark} \begin{remark} {A weaker version of Proposition~\ref{prop:UniformLevelFiniteSetPrimes} follows from~\cite[Proof of Lemma 8]{Jones09v2}. Indeed, Jones's proof goes through over a number field and for \emph{any} finite set of primes $S$ (rather than only $S = \{2,3,5\}\cup\{p: \im \rho_{E,p} \neq \GL_2({\mathbb Z}/p{\mathbb Z})\}\cup \Supp(\Delta_E)$, {which is the case under consideration in~\cite[Lemma 8]{Jones09v2}}) and shows that \[ v_{\ell}(M_d(S,{\mathcal E})) \leq \max(v_{\ell}(M_d(\{\ell\}, {\mathcal E})), v_{\ell}(2\ell)) + v_{\ell}(\#\GL_2({\mathbb Z}/{\mathfrak m}_{S-\{\ell\}}{\mathbb Z})). \] The proof here and the one in~\cite{Jones09v2} roughly follow the same structure; however, by isolating the purely group-theoretic components (e.g., Proposition~\ref{prop:levelforcomp}), we are able to obtain a sharper bound in~\eqref{part:ExplicitBoundByInduction}.} \end{remark} \begin{proof} When $\#S = 1$, part~\eqref{part:TheoreticalBound} follows from Theorem~\ref{thm:UniformIndex} and Proposition~\ref{prop:MaximalKernelGivesLevel} and part~\eqref{part:ExplicitBoundByInduction} is immediate. {We prove part~\eqref{part:TheoreticalBound} when $\#S$ is arbitrary} by induction using Proposition~\ref{prop:levelforcomp}. Let $S = \{\ell_1, \dots, \ell_q\}$, let $M_i = M_d(\{{\ell_i}\}, {\mathcal E})$, let $s_i = \max(v_{\ell_i}(M_i), v_{\ell_i}(2\ell_i))$, and let $N_i = \prod_{j\neq i}\ell_j^{s_j}$. It suffices to show that for all $1\leq i\leq q$ there exists a $t_i \geq s_i$ such that for all $E/k\in {\mathcal E}$ \[ \im \rho_{E, N_i\cdot \ell_i^{\infty}} = \pi^{-1}(\im \rho_{E, N_i\ell_i^{t_i}}); \] then Proposition~\ref{prop:levelforcomp} implies that we may take $M = \prod_{i}\ell_i^{t_i}.$ Fix {$i\in \{1,\dots, q\}$}. For any $E/k\in{\mathcal E}$ and any $s\geq s_i$, define \[ K_{E,s}^i := \ker(\im \rho_{E, N_i\cdot \ell_i^s} \to \im \rho_{E, N_i}), \quad \textup{and} \quad L_{E,s}^i := \ker(\im \rho_{E, N_i\cdot \ell_i^s} \to \im \rho_{E, \ell_i^s}). \] By definition, $K^i_{E, s'}$ maps surjectively onto $K^i_{E,s}$ for any $s'\geq s$, so $K^i_{E,s}$ is the mod $N_i\ell_i^s$ reduction of $K_E^i := \ker(\im \rho_{E, N_i\cdot {\ell_i^{\infty}}} \to \im \rho_{E, N_i})$. Let us now consider $L^i_{E,s}$. Since $\ell_i\nmid N_i$, $L^i_{E,s}$ can be viewed as a subgroup of $\im\rho_{E, N_i}$ and {we have} $L^i_{E,s'}\subset L^i_{E,s}$ for all $s'\geq s$. Let $r\geq s_i$ be an integer such that $L^i_{E,r} = L^i_{E, r+1}$. Then we have the following diagram \begin{equation}\label{eq:diag2} \xymatrix{ \im \rho_{E, \ell_i^{r+1}}/K^i_{E,r+1} \ar@{->>}[r] \ar[d]^{\cong} & \im \rho_{E, \ell_i^{r}}/K^i_{E,r} \ar[d]^{\cong} \\ \im \rho_{E, N_i} / L^i_{E,r+1} \ar@{=}[r] & \im \rho_{E, N_i} / L^i_{E,r}} \end{equation} where the vertical isomorphisms are given by Goursat's Lemma (Lemma~\ref{lem:Goursat})\footnote{By tracing through the isomorphism given by Goursat's lemma, one can prove that this diagram is commutative. We do not do so here, since the claims that follow can also be deduced from cardinality arguments.}. Since $r\geq s_i$, $\im \rho_{E, \ell_i^{r+1}}$ is the full preimage of $\im\rho_{E, \ell_i^r}$ under the natural reduction map. So \eqref{eq:diag2} implies that $K^i_{E,r+1}$ is the full preimage of $K^i_{E, r}$ under the natural reduction map. Then by Proposition~\ref{prop:MaximalKernelGivesLevel}, $K^i_E$ is the full preimage of $K^i_{E, r}$ under the map $\GL_2({\mathbb Z}_\ell) \to \GL_2({\mathbb Z}/\ell^r{\mathbb Z})$ and therefore $\im \rho_{E, N_i\cdot\ell_i^\infty} = \pi^{-1} (\im\rho_{E, N_i\ell_i^r})$. Hence we may take {$t_{E,i}$} to be the minimal {$r\geq s_i$} such that $L^i_{E,r} = L^i_{E, r+1}$. Since $L^i_{E,s}$ is a subgroup of $\im\rho_{E, N_i} \subset \GL_2({\mathbb Z}/N_i{\mathbb Z})$, {$t_{E,i}$} may be bounded independent of $E/k$, depending only on $N_i$. This completes the proof of~\eqref{part:TheoreticalBound}. It remains to prove~\eqref{part:ExplicitBoundByInduction}. Let $s\geq s_i$ and consider the following diagram, where again the vertical isomorphisms follow from Goursat's Lemma. \begin{equation}\label{eq:diag3} \xymatrix{ \im \rho_{E, \ell_i^{s}}/K^i_{E,s} \ar@{->>}[r] \ar[d]^{\cong} & \im \rho_{E, \ell^{s_i}}/K^i_{E, s_i} \ar[d]^{\cong} \\ \im \rho_{E, N_i} / L^i_{E,s} \ar@{->>}[r] & \im \rho_{E, N_i} / L^i_{E,s_i} } \end{equation} The kernel of the top horizontal map is an $\ell_i$-primary subgroup, so the index of $L^i_{E,s}$ in $L^i_{E,s_i}$ is a power of $\ell_i$. Thus, the maximal chain of proper containments $L^i_{E, s_i}\supsetneq L^i_{E, s_i+1}\supsetneq \dots\supsetneq L^i_{E, t_i}$ is bounded by $v_{\ell_i}({\#}\im \rho_{E, N_i}) = v_{\ell_i}({\#}\im \rho_{E, {\mathfrak m}_{{S-\{\ell_i\}}}})$, which yields~\eqref{part:ExplicitBoundByInduction}. \end{proof} \section{Lifting sporadic points}\label{sec:LiftingSporadic} {In this section we study when a sporadic point on $X_1(n)$ lifts to a sporadic point on a modular curve of higher level.} We give a numerical criterion that is sufficient for lifting sporadic points (see Lemma~\ref{lem:Lifting}), and use this to prove that there exist sporadic points such that \emph{every} lift is sporadic. The examples we have identified correspond to {CM elliptic curves}. \begin{theorem} \label{thm:CM} Let $E$ be an elliptic curve with CM by an order in an imaginary quadratic field $K$. Then for all sufficiently large primes $\ell$ which split in $K$, there exists a sporadic point $x=[(E,P)] \in X_1(\ell)$ with only sporadic lifts. Specifically, for any positive integer $d$ and any point $y \in X_1(d\ell)$ with $\pi(y) = x$, the point $y$ is sporadic, where $\pi$ denotes the natural map $X_1(d\ell) \rightarrow X_1(\ell)$. \end{theorem} The key to the proof of Theorem \ref{thm:CM} is producing a sporadic point of sufficiently low degree so we may apply the following lemma. It is a consequence of Abramovich's lower bound on gonality in \cite{Abramovich-Gonality} and the result of Frey \cite{Frey-InfinitelyManyDegreed} which states that a curve $C_{/K}$ has infinitely many points of degree at most $d$ only if $\gon_K(C) \leq 2d$. \begin{lemma}\label{lem:Lifting} {Suppose there is a point $x \in X_1(N)$ with \[ \deg(x) < \frac{7}{1600}[\PSL_2({\mathbb Z}) : \Gamma _1(N)]. \] {Then $x$ is sporadic and} for any positive integer $d$ and any point $y \in X_1(dN)$ with $\pi(y) = x$, the point $y$ is sporadic, where $\pi$ denotes the natural map $X_1(dN) \rightarrow X_1(N)$.} \end{lemma} \begin{proof} {We claim that the assumption on the degree of $x$ implies that $\deg(y) < \frac{7}{1600}[\PSL_2({\mathbb Z}) : \Gamma _1(dN)]$. Then~\cite[Thm. 0.1]{Abramovich-Gonality}, shows that \[ \deg(y) < \frac{1}{2}\gon_{\mathbb{Q}}(X_1(d N))\quad\textup{and}\quad \deg(x) < \frac{1}{2}\gon_{\mathbb{Q}}(X_1(N)). \] Thus $x$ and $y$ are sporadic by \cite[Prop. 2]{Frey-InfinitelyManyDegreed}.} Now we prove the claim. Let $x \in X_1(N)$ be a $ \deg(x) \leq \frac{7}{1600}[\PSL_2({\mathbb Z}) : \Gamma _1(N)]$. In particular, this implies $N>2$. Thus for any point $y \in X_1(dN)$ with $\pi(y)=x$ we have \begin{align*} \deg(y) &\leq \deg(x) \cdot \deg(X_1(dN) \rightarrow X_1(N))\\ &< \dfrac{7}{1600} [\PSL_2({\mathbb Z}) : \Gamma _1(N)] \cdot d^2 \prod_{p \mid d, \, p \nmid N} \left(1 - \frac{1}{p^2} \right) \, \, \, \, \, \text{(see Proposition \ref{prop:Degree})}\\ &= \dfrac{7}{1600}\cdot \frac{1}{2}(dN) \prod_{p \mid dN} \left(1 + \frac{1}{p} \right) \varphi(dN) \\ &=\dfrac{7}{1600} [\PSL_2({\mathbb Z}) : \Gamma _1(dN)]. \end{align*} \end{proof} \begin{proof}[Proof of Theorem~\ref{thm:CM}] Let $E$ be an elliptic curve with CM by an order $\mathcal{O}$ in an imaginary quadratic field $K$. Then $L := K(j(E))$ is the ring class field of $\mathcal{O}$ and $[L:K] = h(\mathcal{O})$, the class number of $\mathcal{O}$. (See \cite[Thms. 7.24 and 11.1]{Cox} for details.) Let $\ell$ be a prime that splits in $K$ and satisfies \[ \ell > \left(\dfrac{6400}{7} \cdot \dfrac{h(\mathcal{O}) }{\# \mathcal{O} ^{\times}}\right) - 1. \] By~\cite[Thm. 6.2]{BourdonClark}, there is a point $P \in E$ of order $\ell$ with \[ [L(\mathfrak{h}(P)):L] = \frac{\ell - 1}{\# \mathcal{O} ^{\times}} .\] Then for $x = [(E, P)] \in X_1(\ell)$, \begin{align*} \deg (x) = [{\mathbb Q}(j(E), \mathfrak{h}(P)): {\mathbb Q}] &\leq [K(j(E), \mathfrak{h}(P)): {\mathbb Q}] = [L(\mathfrak{h}(P)):{\mathbb Q}] = \frac{\ell - 1}{\# \mathcal{O} ^{\times}} \cdot h(\mathcal{O}) \cdot2\\ &< (\ell - 1) \cdot \dfrac{7}{6400}(\ell + 1) \cdot 2 = \dfrac{7}{1600} [\PSL_2({\mathbb Z}) : \Gamma _1(\ell )]. \end{align*} The result now follows from Lemma~\ref{lem:Lifting}. \end{proof} \begin{remark} Note that none of the known non-cuspidal non-CM sporadic points satisfy the degree condition given in Lemma~\ref{lem:Lifting}. Thus it is an interesting open question to determine whether there exist non-CM sporadic points with infinitely many sporadic lifts. If no such examples exist, then by Theorem \ref{thm:Main} there would be only finitely many non-CM sporadic points corresponding to $j$-invariants of bounded degree, assuming Conjecture \ref{conj:StrongUniformity}. \end{remark} \section{{Isolated} points with rational $j$-invariant} \label{sec:RationaljInvariant} In this section, we study non-CM {isolated} points with rational $j$-invariant. {Our main result of this section (Theorem~\ref{thm:classification}) gives a classification of the non-cuspidal non-CM {isolated} points on $X_1(n)$ with rational $j$-invariant. We prove that they either arise from elliptic curves whose Galois representations are very special (and may not even exist), or they can be mapped to {isolated} points on $X_1(m)$ for an explicit set of integers $m$. } Later, we focus on sporadic points with rational $j$-invariant on $X_1(n)$ for particular values of $n$. We show that if $n$ is prime (Proposition~\ref{prop:Primes}), is a power of $2$ (Proposition~\ref{prop:2primary}), or, conditionally on Sutherland~\cite[Conj. 1.1]{Sutherland-ComputingGaloisImages} and Zywina~\cite[Conj. 1.12]{Zywina-PossibleImages}), has $\min(\Supp(n))\geq 17$ (Proposition~\ref{prop:LevelDivisibleByLargePrime}), then any non-CM, non-cuspidal sporadic point with rational $j$-invariant has $j(x) = -7\cdot 11^3$. \subsection{Classification of non-CM isolated points with rational $j$-invariant}\label{subsec:classification} \begin{theorem}\label{thm:classification} Let $x\in X_1(n)$ be a non-CM non-cuspidal {isolated} point with $j(x)\in {\mathbb Q}$. Then one of the following holds: \begin{enumerate} \item There is an elliptic curve $E/{\mathbb Q}$ with $j(E) = j(x)$ and {a prime $\ell\in \Supp(n)$ such that either $\ell> 17, \ell\neq 37$ and $\rho_{E, \ell}$ is not surjective or $\ell = 17$ or $37$ and $\rho_{E, \ell}$ is a subgroup of the normalizer of a non-split Cartan {subgroup}.} \label{case:LargePrimeNonSurjective} \item There is an elliptic curve $E/{\mathbb Q}$ with $j(E) = j(x)$ and two distinct primes $\ell_1 > \ell_2 > 3$ {in $\Supp(n)$ }such that both $\rho_{E, \ell_1}$ and $\rho_{E, \ell_2}$ are not surjective.\label{case:TwoPrimesNonSurjective} \item There is an elliptic curve $E/{\mathbb Q}$ with $j(E) = j(x)$ and a prime $2<\ell \leq 37$ {in $\Supp(n)$} such that the $\ell$-adic Galois representation of $E$ has level greater than $169$.\label{case:LargeLevel} \item {There is a divisor of $n$ of the form $2^a3^bp^c$ such that the image of $x$ in $X_1(2^a3^bp^c)$ is {isolated} and such that $a\leq a_{p}$, $b\leq b_{p}$, $p^c\leq 169$ for one of the following values of $p$, $a_{p}$, $b_{p}$.} \[ \begin{tabular}{c||c|c|c|c|c|c|c} $p$ & 1& 5 & 7 & 11 & 13 & 17 & 37 \\ \hline $a_{p}$ & 9 & 14 & 14 & 13 & 14 & 15 & 13 \\ \hline $b_{p}$ & 5 & 6 & 7 & 6 & 7 & 5 & 8 \end{tabular} \]\label{case:SporadicLevels} \end{enumerate} \end{theorem} {\begin{remark} This theorem also holds for $x$ a $\PP^1\textup{-isolated}$, $\AVisolated$, or sporadic point, respectively, at the expense of~\eqref{case:SporadicLevels} giving the statement that the image of $x$ is $\PP^1\textup{-isolated}$, $\AVisolated$, or sporadic, respectively. \end{remark}} \begin{remark}\label{rmk:UnlikelyGaloisRep} Each of cases $\eqref{case:LargePrimeNonSurjective}$, $\eqref{case:TwoPrimesNonSurjective}$, and $\eqref{case:LargeLevel}$ should be rare situations, if they occur at all. Indeed, the question of whether elliptic curves as in~\eqref{case:LargePrimeNonSurjective} exist is related to a question originally raised by Serre in 1972, and their non-existence has since been conjectured by Sutherland~\cite[Conj. 1.1]{Sutherland-ComputingGaloisImages} and Zywina~\cite[Conj. 1.12]{Zywina-PossibleImages}. Assuming $\eqref{case:LargePrimeNonSurjective}$ does not hold, elliptic curves as in~\eqref{case:TwoPrimesNonSurjective} correspond to points on finitely many modular curves of genus greater than $2$, so there are at worst finitely many $j$-invariants in this case \cite[Tables 6--14, Theorem 16A]{DanielsGonzalezJimenez}. Additionally, there are no elliptic curves in the LMFDB database~\cite{LMFDB} as in~\eqref{case:TwoPrimesNonSurjective}, so in particular, any elliptic curve as in~\eqref{case:TwoPrimesNonSurjective} must have conductor larger than $400,000.$ (The Galois representation computations in LMFDB were carried out using the algorithm from~\cite{Sutherland-ComputingGaloisImages}.) {If we do not assume~\eqref{case:LargePrimeNonSurjective} does not hold, then we must consider the case where $\ell_1>37$. In this case the elliptic curves of interest no longer correspond to points on finitely many modular curves, but nevertheless, Lemos has shown that such elliptic curves do not exist, assuming that $\im \rho_{E,\ell_2}$ is contained in the normalizer of a split Cartan subgroup or in a Borel subgroup~\cites{Lemos-Borel, Lemos-CartanNS}.} Sutherland and Zywina's classification of modular curves of prime-power level with infinitely many points~\cite{SZ-primepower} shows that there are only finitely many rational $j$-invariants corresponding to elliptic curves as in~\eqref{case:LargeLevel}, and suggests that in fact they do not exist. Table~\ref{table:SZsummary} gives, for each prime $\ell$, the maximal prime-power level for which there exists a modular curve of that level with infinitely many rational points. \begin{table}[h] \begin{tabular}{c||c|c|c|c|c|c|c} $\ell$ & 3 & 5 & 7 & 11 & 13 & 17 & 37 \\ \hline max level & 27 & 25 & 7 & 11 & 13 & 1 & 1 \\ \end{tabular}\caption{Maximal prime-power level for which there exists a modular curve with infinitely many rational points}\label{table:SZsummary} \end{table} Therefore, for $3\leq \ell\leq 37$, respectively, there are already only finitely many $j$-invariants of elliptic curves with an $\ell$-adic Galois representation of level at least $81$, $125$, $49$, $121$, $169$, $17$, or $37$. Since such $j$-invariants are already rare, it seems reasonable to expect any such correspond to elliptic curves of $\ell$-adic level \emph{exactly} $81$, $125$, $49$, $121$, $169$, $17$ and $37$, respectively. This has been (conditionally) verified by Drew Sutherland in the cases $\ell = 17$ and $\ell = 37$. For these primes, there are conjecturally only $4$ $j$-invariants corresponding to elliptic curves with non-surjective $\ell$-adic Galois representation: $-17\cdot 373^3/2^{17}, -17^2 \cdot 101^3/2, -7 \cdot 11^3,$ and $-7 \cdot 137^3 \cdot 2083^3$~\cite[Conj. 1.12]{Zywina-PossibleImages}. For each of these $j$-invariants, Sutherland computed that the $\ell$-adic Galois representation is the full preimage of the mod $\ell$ representation, so the representations are indeed of level $\ell$ and not level $\ell^2$ \cite{Sutherland-PersonalCommunication}.\footnote{Sutherland used a generalization of the algorithm in~\cite{Sutherland-ComputingGaloisImages} to prove in each case the index of the mod-$\ell^2$ image is no smaller than that of the mod-$\ell$ image. It then follows from~\cite[Lemma 3.7]{SZ-primepower} that the $\ell$-adic image is the full preimage of the mod-$\ell$ image.} \end{remark} \begin{proof} Let $x\in X_1(n)$ be a non-cuspidal non-CM {isolated} point with $j(x)\in {\mathbb Q}$. Let $E$ be an elliptic curve over {${\mathbb Q}$} with $j(E)=j(x)$. Assume that~\eqref{case:LargePrimeNonSurjective} does not hold, so in particular $E$ has surjective mod $\ell$ representation for every $\ell > 17$ and $\ell \neq 37$. Thus Proposition~\ref{prop:EliminatingSurjectivePrimes} {and Theorem~\ref{thm:PushingForwardSporadicIsolated}} together imply that $x$ maps to an {isolated} point on $X_1(n')$ where $n'$ is the largest divisor of $n$ that is not divisible by any primes greater than $17$ except possibly $37$. Now assume further that~\eqref{case:TwoPrimesNonSurjective} does not hold, so there is at most one prime $p>3$ for which the $p$-adic Galois representation is not surjective. If the $p$-adic Galois representation of $E$ is surjective for all primes larger than $3$, then we will abuse notation and set $p=1$. Under these assumptions, additional applications of Proposition~\ref{prop:EliminatingSurjectivePrimes} {and Theorem~\ref{thm:PushingForwardSporadicIsolated}} show that $x$ maps to an {isolated} point on $X_1(n'')$ where $n''$ is a divisor of $n'$ with $\Supp(n'') \subset S := \{2,3,p\}$\footnote{When $p = 1$, we conflate the set $\{2,3,p\}$ with the set $\{2,3\}$.} and $p \in \{1,5,7,11,13,17,37\}$. Furthermore, Corollary~\ref{cor:SporadicPtsFixedjInvariant} shows that $x$ maps to an {isolated} point on $X_1(\gcd(n'', M))$, where $M$ is the level of the {${\mathfrak m}_S^{\infty}$} Galois representation of $E$. Now we will further assume that~\eqref{case:LargeLevel} does not hold. Let ${\mathcal E}$ denote the set of all {non-CM} elliptic curves over ${\mathbb Q}$. Proposition~\ref{prop:UniformLevelFiniteSetPrimes} states that there is an integer {$M_1(S, {\mathcal E})$} such that the level of the {${\mathfrak m}_S^{\infty}$} Galois representation of $E$ divides {$M_1(S, {\mathcal E})$ for all $E\in {\mathcal E}$}. We will show that {$M_1(\{2,3, p\}, {\mathcal E})$} divides $2^{a_{p}}3^{b_{p}}p^c$ for $p, a_{p}, b_{p}, c$ as in~\eqref{case:SporadicLevels}. By the assumption that~\eqref{case:LargeLevel} does not hold and~\cite[Corollary~1.3]{RouseZureickBrown}, we have the following values for the constant $M_1(\{\ell\}, {\mathcal E})$ from Proposition~\ref{prop:UniformLevelFiniteSetPrimes}. \begin{center} \begin{tabular}{c||c|c|c|c|c|c|c|c} $\ell$ & 2 & 3 & 5 & 7 & 11 & 13 & 17 & 37 \\ \hline $M_1(\{\ell\}, {\mathcal E})$ & $2^5$ & $3^4$ & $5^3$ & $7^2$ & $11^2$ & $13^2$ & 17 & 37 \end{tabular} \end{center} By Proposition~\ref{prop:UniformLevelFiniteSetPrimes}\eqref{part:ExplicitBoundByInduction}, \[ v_{\ell}(M_1(S, {\mathcal E})) \leq \max(v_{\ell}(M_1(\{\ell\}, {\mathcal E})), v_{\ell}(2\ell)) + \sum_{\ell'\in S-\{\ell\}} v_{\ell}(\#\GL_2({\mathbb Z}/\ell'{\mathbb Z})). \] This upper bound combined with Table~\ref{table:SizeGL2} yields the desired divisibility except for the case where $p = 17$ or $p=37$. \begin{table}[h] \begin{tabular}{c||c|c|c|c|c|c|c|c} $\ell$ & 2 & 3 & 5 & 7 & 11 & 13 & 17 & 37 \\ \hline\\[-1em] $\#\GL_2({\mathbb Z}/\ell{\mathbb Z})$ & $2\cdot 3$ & $2^43$ & $2^53^1 5$ & $2^53^27$ & $2^43^15^211$ & $2^53^27^113$ & $2^93^217$ & $2^53^419^137$ \end{tabular} \vspace{1em}\caption{Cardinality of $\GL_2({\mathbb Z}/\ell{\mathbb Z})$}\label{table:SizeGL2} \end{table} Let us consider the case that $p = 17$, {so $\rho_{E, 17}$ is not surjective}. Since we are not in case~\eqref{case:LargePrimeNonSurjective}, we know $\im\rho_{E,17}$ is not contained in the normalizer of the non-split Cartan. Thus~\cite[Thms. 1.10 and 1.11]{Zywina-PossibleImages} show that $\#\im\rho_{E,17} = 2^617$, so Proposition~\ref{prop:UniformLevelFiniteSetPrimes}\eqref{part:ExplicitBoundByInduction} implies that the level of the ${\mathfrak m}_S^{\infty}$ Galois representation divides $2^{15} 3^5 17$. The case when $p=37$ proceeds similarly. In this case~\cite[Thms. 1.10 and 1.11]{Zywina-PossibleImages} show that $\#\im\rho_{E, 37} = 2^4 3^3 37$ and so Proposition~\ref{prop:UniformLevelFiniteSetPrimes}\eqref{part:ExplicitBoundByInduction} implies that the level of the ${\mathfrak m}_S^{\infty}$ Galois representation divides $2^{13} 3^8 37$. \end{proof} \subsection{Rational $j$-invariants of non-CM non-cuspidal sporadic points on $X_1(n)$ for particular values of $n$}\label{subsec:SporadicClassification} \begin{prop}\label{prop:Primes} Fix a prime $\ell$. If $x\in X_1(\ell)$ is a non-CM non-cuspidal sporadic point with $j(x)\in {\mathbb Q}$ then $\ell = 37$ and $j(x) = -7\cdot11^3$. \end{prop} \begin{proof} Let $x=[(E,P)]$ be a non-CM sporadic point on $X_1(\ell)$ with $j(E) \in {\mathbb Q}$. We may assume $E$ is defined over ${\mathbb Q}$. Note that $X_1(\ell)$ has infinitely many rational points for $\ell \leq 10$. Further, $X_1(\ell)$ has gonality $2$ for $\ell=11, 13$, and no non-cuspidal rational points~\cite{Mazur}. Hence if $x\in X_1(\ell)$ is a non-cuspidal {non-CM} sporadic point, $\ell > 13$. If the mod $\ell$ Galois representation of $E$ is surjective, then $x$ cannot be a sporadic point on $X_1(\ell)$ by Corollary \ref{cor:SurjectivePrimes}, so assume that $\rho_{E,\ell}$ is not surjective. Then the {im $\rho_{E,\ell}$} is contained in a maximal subgroup, which can be an exceptional subgroup, a Borel subgroup or the normalizer of a (split or non-split) Cartan subgroup of $\GL_2({\mathbb F}_{\ell})$ \cite[Section 2]{Serre-OpenImage}. We will analyze each case separately. In the case {where im $\rho_{E,\ell}$} is contained in the normalizer of the non-split Cartan subgroup, Lozano-Robledo \cite[Theorem 7.3]{LR-TorsionFieldOfDefn} shows that the degree of a field of definition of a point of order $\ell$ is greater than or equal to $(\ell^2-1)/6$. Since {$\ell>13$ we have \[ \text{gon}_{{\mathbb Q}}(X_1(\ell)) \leq \text{genus}(X_1(\ell)) \leq \frac{1}{24}(\ell^2-1). \] Therefore $x$ cannot be sporadic in this case.} If {im $\rho_{E,\ell}$} is contained in the normalizer of the split Cartan subgroup, then by \cite{Split Cartan}, $\ell$ has to be less than or equal to $13$. Similarly, if {im $\rho_{E,\ell}$} is one of the exceptional subgroups, then by \cite[Theorem 8.1]{LR-TorsionFieldOfDefn}, $\ell \leq 13$. If {im $\rho_{E,\ell}$} is contained in a Borel subgroup, then $E$ has a rational isogeny of degree $\ell$. By \cite{Mazur-Isogenies}, $\ell$ is one of the following primes: $2,3,5,7,11,13,17,37$. {Thus we need only consider $\ell = 17$ and $37$.} For $\ell=17$, \cite[Table 5]{LR-TorsionFieldOfDefn} shows that {$\deg(x)\geq 4$}. Since the gonality of $X_1(17)$ is also $4$, {$x$ cannot} be sporadic. Finally when $\ell=37$, there are exactly two non-cuspidal points in $X_0(37)({\mathbb Q})$ \cite[Table 5]{LR-TorsionFieldOfDefn}. The one corresponding to an elliptic curve with $j$-invariant $-7\cdot 11^3$ gives a degree $6$ point on $X_1(37)$, {which is sporadic since $\gon_{{\mathbb Q}}X_1(37)=18$.} The other gives a point on $X_1(37)$ of degree 18, which is not sporadic. \end{proof} \begin{prop}\label{prop:2primary} Let $s\geq 1$. If $x\in X_1(2^s)$ is a non-cuspidal non-CM sporadic point, then $j(x) \notin {\mathbb Q}$. \end{prop} \begin{proof} By~\cite[Cor. 1.3]{RouseZureickBrown}, the $2$-adic Galois representation of any non-CM elliptic curve over ${\mathbb Q}$ has level at most $32$. Thus, by Proposition~\ref{prop:FixedSupportAndLevel} it suffices to show that $X_1(2^s)$ has no non-cuspidal non-CM sporadic points with rational $j$-invariant for $s \leq 5$. If $s=1,2$ or $3$, then modular curve $X_1(2^a)$ is isomorphic to ${\mathbb P}^1_{{\mathbb Q}}$ and so has no sporadic points. When $s = 4$, the modular curve $X_1(16)$ has genus $2$ and hence gonality $2$ which implies that it has infinitely many points of degree $2$. Additionally, as first established by Levi \cite{Levi}, $X_1(16)$ has no {non-cuspidal} points over ${\mathbb Q}$ and so has no {non-cuspidal} sporadic points. Now we consider $X_1(32)$, which has gonality $8$ (see \cite[Table 1]{DerickxVanHoeij}). Let $x=[(E,P)]$ be a non-CM sporadic point on $X_1(32)$ with $j=j(E)\in {\mathbb Q}$. We may assume that $E$ is defined over ${\mathbb Q}$. Since $x$ is a sporadic point, there are only finitely many points $y\in X_1(32)$ with $\deg(y) \leq \deg(x)$. Since the degree of a point $y\in X_1(32)$ {can be calculated from} the mod $32$ Galois representation of an elliptic curve with $j$-invariant $j(y)$, this implies that there are only finitely many $j$-invariants whose mod $32$ Galois representation is contained in a conjugate of {im $\rho_{E, 32}$}. By~\cite[Table~1]{RouseZureickBrown}, there are only eight non-CM $j$-invariants with this property: \[ 2^{11}, \; 2^417^3, \; \frac{4097^3}{2^4},\; \frac{257^3}{2^8}, \; -\frac{857985^3}{62^8},\; \frac{919425^3}{496^4},\; -\frac{3\cdot18249920^3}{171^6},\;\textup{and}\; -\frac{7\cdot1723187806080^3}{79^{16}}. \] Using \texttt{Magma}, we compute the degree of each irreducible factor of $32^{\textup{nd}}$ division polynomial for each of these $j$-invariants and we find that the least degree of a field where a point of order $32$ is defined is $32$, hence there are no non-CM sporadic points on $X_1(32)$ with a rational $j$-invariant. \end{proof} \begin{prop}\label{prop:LevelDivisibleByLargePrime} Let $n$ be a positive integer with $\min(\Supp(n)) \geq 17$. Assume~\cite[Conj. 1.1]{Sutherland-ComputingGaloisImages} or~\cite[Conj. 1.12]{Zywina-PossibleImages}. If $x\in X_1(n)$ is a non-cuspidal non-CM sporadic point with $j(x) \in {\mathbb Q}$, then $37|n$ and $j(x) = -7\cdot 11^3$. \end{prop} \begin{proof} Let $E$ be an elliptic curve over ${\mathbb Q}$ with $j(E) = j(x)$. We apply Theorem~\ref{thm:classification}. By assumption and Remark~\ref{rmk:UnlikelyGaloisRep}, cases~\eqref{case:LargePrimeNonSurjective} and~\eqref{case:LargeLevel} of Theorem~\ref{thm:classification} do not occur. Further, case~\eqref{case:TwoPrimesNonSurjective} only occurs if $17\cdot 37| n$ and $\im \rho_{E, 17}$ and $\im \rho_{E, 37}$ are both contained in Borel subgroups {(see proof of Proposition \ref{prop:Primes})}, which is impossible (see, e.g., {\cite[Table~4]{LR-TorsionFieldOfDefn}}). Hence, we must be in case~\eqref{case:SporadicLevels} of Theorem~\ref{thm:classification}. Since $\min(\Supp(n))\geq 17$, the only possible divisors of $n$ of the form $2^a3^bp^c$ (with $a, b, c, p$ as in Theorem~\ref{thm:classification}\eqref{case:SporadicLevels}) are $17$ or $37$. Thus, for one of $\ell = 17$ or $37$ we must have $\ell | n$ and $x$ maps to a sporadic point on $X_1(\ell)$. Proposition~\ref{prop:Primes} then completes the proof. \end{proof} \begin{bibdiv} \begin{biblist} \bib{Abramovich-Gonality}{article}{ author={Abramovich, Dan}, title={A linear lower bound on the gonality of modular curves}, journal={Internat. Math. Res. Notices}, date={1996}, number={20}, pages={1005--1011}, issn={1073-7928}, review={\MR{1422373}}, } \bib{Artin57}{book}{ author={Artin, E.}, title={Geometric algebra}, publisher={Interscience Publishers, Inc., New York-London}, date={1957}, pages={x+214}, review={\MR{0082463}}, } \bib{Split Cartan}{article}{ author={Bilu, Yuri}, author={Parent, Pierre}, author={Rebolledo, Marusia}, title={Rational points on $X^+_0(p^r)$}, language={English, with English and French summaries}, journal={Ann. Inst. Fourier (Grenoble)}, volume={63}, date={2013}, number={3}, pages={957--984}, issn={0373-0956}, review={\MR{3137477}}, } \bib{BourdonClark}{misc}{, author = {Bourdon, Abbey}, author = {Clark, Pete L.}, title = {Torsion points and Galois representations on CM elliptic curves}, note = {Preprint, \tt{arXiv:1612.03229}}, } \bib{Box}{misc}{ author = {Box, Josha}, title = {Quadratic points on modular curves with infinite Mordell--Weil group} note = {Preprint, \tt{arXiv:1906.05206}}, } \bib{Bruin-Najman}{article}{ author={Bruin, Peter}, author={Najman, Filip}, title={Hyperelliptic modular curves $X_0(n)$ and isogenies of elliptic curves over quadratic fields}, journal={LMS J. Comput. Math.}, volume={18}, date={2015}, number={1}, pages={578--602}, issn={1461-1570}, review={\MR{3389884}}, doi={10.1112/S1461157015000157}, } \bib{CadoretTamagawa}{article}{ author={Cadoret, Anna}, author={Tamagawa, Akio}, title={A uniform open image theorem for $\ell$-adic representations, II}, journal={Duke Math. J.}, volume={162}, date={2013}, number={12}, pages={2301--2344}, issn={0012-7094}, review={\MR{3102481}}, } \bib{CCS}{article}{ author={Clark, Pete L.}, author={Cook, Brian}, author={Stankewicz, James}, title={Torsion points on elliptic curves with complex multiplication (with an appendix by Alex Rice)}, journal={Int. J. Number Theory}, volume={9}, date={2013}, number={2}, pages={447--479}, issn={1793-0421}, review={\MR{3005559}}, } \bib{ClarkPollack}{article}{ author={Clark, Pete L.}, author={Pollack, Paul}, title={Pursuing polynomial bounds on torsion}, journal={Israel J. Math.}, volume={227}, date={2018}, number={2}, pages={889--909}, issn={0021-2172}, review={\MR{3846346}}, doi={10.1007/s11856-018-1751-8}, } \bib{CojocaruKani}{article}{ author={Cojocaru, Alina Carmen}, title={On the surjectivity of the Galois representations associated to non-CM elliptic curves}, note={With an appendix by Ernst Kani}, journal={Canad. Math. Bull.}, volume={48}, date={2005}, number={1}, pages={16--31}, issn={0008-4395}, review={\MR{2118760}}, doi={10.4153/CMB-2005-002-x}, } \bib{Cox}{book}{ author={Cox, David A.}, title={Primes of the form $x^2 + ny^2$}, series={Pure and Applied Mathematics (Hoboken)}, edition={2}, note={Fermat, class field theory, and complex multiplication}, publisher={John Wiley \& Sons, Inc., Hoboken, NJ}, date={2013}, pages={xviii+356}, isbn={978-1-118-39018-4}, review={\MR{3236783}}, } \bib{DanielsGonzalezJimenez}{article}{ author={Daniels, Harris}, author={Gonz\'{a}lez-Jim\'{e}nez, Enrique}, title={Serre's constant of elliptic curves over the rationals}, note = {Preprint, \tt{arXiv:1812.04133}}, } \bib{DeligneRapoport}{article}{ author={Deligne, P.}, author={Rapoport, M.}, title={Les sch\'emas de modules de courbes elliptiques}, language={French}, conference={ title={Modular functions of one variable, II}, address={Proc. Internat. Summer School, Univ. Antwerp, Antwerp}, date={1972}, }, book={ publisher={Springer, Berlin}, }, date={1973}, pages={143--316. Lecture Notes in Math., Vol. 349}, review={\MR{0337993}}, } \bib{DEvHZB}{misc}{ author={Derickx, Maarten}, author={Etropolski, Anastassia}, author={van Hoeij, Mark}, author={Morrow, Jackson S.}, author={Zureick-Brown, David}, title={Sporadic cubic torsion}, note = {In preparation}, } \bib{DerickxVanHoeij}{article}{ author={Derickx, Maarten}, author={van Hoeij, Mark}, title={Gonality of the modular curve $X_1(N)$}, journal={J. Algebra}, volume={417}, date={2014}, pages={52--71}, issn={0021-8693}, review={\MR{3244637}}, } \bib{DerickxSutherland}{article}{ author={Derickx, Maarten}, author={Sutherland, Andrew V.}, title={Torsion subgroups of elliptic curves over quintic and sextic number fields}, journal={Proc. Amer. Math. Soc.}, volume={145}, date={2017}, number={10}, pages={4233--4245}, issn={0002-9939}, review={\MR{3690609}}, } \bib{DiamondShurman}{book}{ author={Diamond, Fred}, author={Shurman, Jerry}, title={A first course in modular forms}, series={Graduate Texts in Mathematics}, volume={228}, publisher={Springer-Verlag, New York}, date={2005}, pages={xvi+436}, isbn={0-387-23229-X}, review={\MR{2112196}}, } \bib{Faltings}{article}{ author={Faltings, Gerd}, title={The general case of S. Lang's conjecture}, conference={ title={Barsotti Symposium in Algebraic Geometry}, address={Abano Terme}, date={1991}, }, book={ series={Perspect. Math.}, volume={15}, publisher={Academic Press, San Diego, CA}, }, date={1994}, pages={175--182}, review={\MR{1307396}}, } \bib{Frey-InfinitelyManyDegreed}{article}{ author={Frey, Gerhard}, title={Curves with infinitely many points of fixed degree}, journal={Israel J. Math.}, volume={85}, date={1994}, number={1-3}, pages={79--83}, issn={0021-2172}, review={\MR{1264340}}, } \bib{Goursat89}{article}{ author={Goursat, Edouard}, title={Sur les substitutions orthogonales et les divisions r\'eguli\`eres de l'espace}, language={French}, journal={Ann. Sci. \'Ecole Norm. Sup. (3)}, volume={6}, date={1889}, pages={9--102}, issn={0012-9593}, review={\MR{1508819}}, } \bib{Gunther-Morrow}{misc}{ author={Gunther, Joseph}, author={Morrow, Jackson S.}, title={Irrational points on random hyperelliptic curves}, note = {Preprint, \tt{arXiv:1709.02041}}, } \bib{Jones09v2}{article}{ author={Jones, Nathan}, title={A bound for the torsion conductor of a non-CM elliptic curve}, journal={Proc. Amer. Math. Soc.}, volume={137}, date={2009}, number={1}, pages={37--43}, issn={0002-9939}, review={\MR{2439422}}, } \bib{Jones10}{article}{ author={Jones, Nathan}, title={Almost all elliptic curves are Serre curves}, journal={Trans. Amer. Math. Soc.}, volume={362}, date={2010}, number={3}, pages={1547--1570}, issn={0002-9947}, review={\MR{2563740}}, } \bib{Kamienny92}{article}{ author={Kamienny, S.}, title={Torsion points on elliptic curves and $q$-coefficients of modular forms}, journal={Invent. Math.}, volume={109}, date={1992}, number={2}, pages={221--229}, issn={0020-9910}, review={\MR{1172689}}, } \bib{KenkuMomoseQuadratic}{article}{ author={Kenku, M. A.}, author={Momose, F.}, title={Torsion points on elliptic curves defined over quadratic fields}, journal={Nagoya Math. J.}, volume={109}, date={1988}, pages={125--149}, issn={0027-7630}, review={\MR{931956}}, doi={10.1017/S0027763000002816}, } \bib{LMFDB}{webpage}{ author = {The {LMFDB Collaboration}}, title = {The L-functions and Modular Forms Database}, note = {\url{http://www.lmfdb.org}}, date = {2013}, label = {LMFDB}, } \bib{Lang-algebra}{book}{ author={Lang, Serge}, title={Algebra}, series={Graduate Texts in Mathematics}, volume={211}, edition={3}, publisher={Springer-Verlag, New York}, date={2002}, pages={xvi+914}, isbn={0-387-95385-X}, review={\MR{1878556}}, } \bib{LangTrotter-FrobeniusDistributions}{book}{ author={Lang, Serge}, author={Trotter, Hale}, title={Frobenius distributions in ${\rm GL}_{2}$-extensions}, series={Lecture Notes in Mathematics, Vol. 504}, note={Distribution of Frobenius automorphisms in ${\rm GL}_{2}$-extensions of the rational numbers}, publisher={Springer-Verlag, Berlin-New York}, date={1976}, pages={iii+274}, review={\MR{0568299}}, } \bib{Lemos-Borel}{article}{ author={Lemos, Pedro}, title={Serre's uniformity conjecture for elliptic curves with rational cyclic isogenies}, journal={Trans. Amer. Math. Soc.}, volume={371}, date={2019}, number={1}, pages={137--146}, issn={0002-9947}, review={\MR{3885140}}, doi={10.1090/tran/7198}, } \bib{Lemos-CartanNS}{article}{ author={Lemos, Pedro}, title={Some cases of Serre's uniformity problem}, journal={Math. Z.}, volume={292}, date={2019}, number={1-2}, pages={739--762}, issn={0025-5874}, review={\MR{3968924}}, doi={10.1007/s00209-018-2189-8}, } \bib{Levi}{article}{ author={Levi, Beppo}, title={Saggio per una teoria aritmetica delle forme cubiche ternarie}, journal={Atti della Reale Acc. Sci. di Torino}, volume={43}, date={1908}, pages={99--120, 413--434, 672--681}, } \bib{LR-TorsionFieldOfDefn}{article}{ author={Lozano-Robledo, \'Alvaro}, title={On the field of definition of $p$-torsion points on elliptic curves over the rationals}, journal={Math. Ann.}, volume={357}, date={2013}, number={1}, pages={279--305}, issn={0025-5831}, review={\MR{3084348}}, } \bib{Mazur-Isogenies}{article}{ author={Mazur, B.}, title={Rational isogenies of prime degree (with an appendix by D. Goldfeld)}, journal={Invent. Math.}, volume={44}, date={1978}, number={2}, pages={129--162}, issn={0020-9910}, review={\MR{482230}}, } \bib{Mazur}{article}{ author={Mazur, B.}, title={Modular curves and the Eisenstein ideal}, journal={Inst. Hautes \'Etudes Sci. Publ. Math.}, number={47}, date={1977}, pages={33--186 (1978)}, issn={0073-8301}, review={\MR{488287}}, } \bib{Merel}{article}{ author={Merel, Lo\"\i c}, title={Bornes pour la torsion des courbes elliptiques sur les corps de nombres}, language={French}, journal={Invent. Math.}, volume={124}, date={1996}, number={1-3}, pages={437--449}, issn={0020-9910}, review={\MR{1369424}}, } \bib{Morrow}{article}{ author={Morrow, Jackson S.}, title={Composite images of Galois for elliptic curves over ${\mathbb Q}$ and Entanglement fields}, journal={Math. Comp.}, volume={88}, date={2019}, number={319}, pages={2389--2421}, issn={0025-5718}, review={\MR{3957898}}, } \bib{Najman}{article}{ author={Najman, Filip}, title={Torsion of rational elliptic curves over cubic fields and sporadic points on $X_1(n)$}, journal={Math. Res. Lett.}, volume={23}, date={2016}, number={1}, pages={245--272}, issn={1073-2780}, review={\MR{3512885}}, } \bib{RibesZalesskii}{book}{ author={Ribes, Luis}, author={Zalesskii, Pavel}, title={Profinite groups}, series={Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics]}, volume={40}, edition={2}, publisher={Springer-Verlag, Berlin}, date={2010}, pages={xvi+464}, isbn={978-3-642-01641-7}, review={\MR{2599132}}, } \bib{RouseZureickBrown}{article}{ author={Rouse, Jeremy}, author={Zureick-Brown, David}, title={Elliptic curves over $\mathbb Q$ and 2-adic images of Galois}, journal={Res. Number Theory}, volume={1}, date={2015}, pages={Art. 12, 34}, issn={2363-9555}, review={\MR{3500996}}, } \bib{Serre-OpenImage}{article}{ author={Serre, Jean-Pierre}, title={Propri\'et\'es galoisiennes des points d'ordre fini des courbes elliptiques}, language={French}, journal={Invent. Math.}, volume={15}, date={1972}, number={4}, pages={259--331}, issn={0020-9910}, review={\MR{0387283}}, } \bib{Serre-37}{article}{ author={Serre, Jean-Pierre}, title={Quelques applications du th\'eor\`eme de densit\'e de Chebotarev}, language={French}, journal={Inst. Hautes \'Etudes Sci. Publ. Math.}, number={54}, date={1981}, pages={323--401}, issn={0073-8301}, review={\MR{644559}}, } \bib{Serre-MWLectures}{book}{ author={Serre, Jean-Pierre}, title={Lectures on the Mordell-Weil theorem}, series={Aspects of Mathematics}, edition={3}, note={Translated from the French and edited by Martin Brown from notes by Michel Waldschmidt; With a foreword by Brown and Serre}, publisher={Friedr. Vieweg \& Sohn, Braunschweig}, date={1997}, pages={x+218}, isbn={3-528-28968-6}, review={\MR{1757192}}, doi={10.1007/978-3-663-10632-6}, } \bib{Serre-Abelianladic}{book}{ author={Serre, Jean-Pierre}, title={Abelian $l$-adic representations and elliptic curves}, series={Research Notes in Mathematics}, volume={7}, note={With the collaboration of Willem Kuyk and John Labute; Revised reprint of the 1968 original}, publisher={A K Peters, Ltd., Wellesley, MA}, date={1998}, pages={199}, isbn={1-56881-077-6}, review={\MR{1484415}}, } \bib{Siksek}{article}{ author={Siksek, Samir}, title={Chabauty for symmetric powers of curves}, journal={Algebra Number Theory}, volume={3}, date={2009}, number={2}, pages={209--236}, issn={1937-0652}, review={\MR{2491943}}, doi={10.2140/ant.2009.3.209}, } \bib{Sutherland-ComputingGaloisImages}{article}{ author={Sutherland, Andrew V.}, title={Computing images of Galois representations attached to elliptic curves}, journal={Forum Math. Sigma}, volume={4}, date={2016}, pages={e4, 79}, issn={2050-5094}, review={\MR{3482279}}, } \bib{Sutherland-PersonalCommunication}{misc}{ author={Sutherland, Andrew V.}, date={2017}, note = {Personal communication} } \bib{Sutherland-Survey}{article}{ author={Sutherland, Andrew V.}, title={Torsion subgroups of elliptic curves over number fields}, note={Preprint, available at \url{https://math.mit.edu/~drew/MazursTheoremSubsequentResults.pdf}}, } \bib{SZ-primepower}{article}{ author={Sutherland, Andrew V.}, author={Zywina, David}, title={Modular curves of prime-power level with infinitely many rational points}, journal={Algebra Number Theory}, volume={11}, date={2017}, number={5}, pages={1199--1229}, issn={1937-0652}, review={\MR{3671434}}, doi={10.2140/ant.2017.11.1199}, } \bib{Suzuki}{book}{ author={Suzuki, Michio}, title={Group Theory. I.}, series={Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]}, volume={247}, publisher={Springer-Verlag, Berlin-New York}, date={1982}, pages={}, isbn={3-540-10915-3}, review={\MR{0648772}}, } \bib{vanHoeij}{article}{ author={van Hoeij, Mark}, title={Low degree places on the modular curve $X_1(N)$}, note={Preprint, \tt{arXiv:1202.4355}}, } \bib{Zywina-PossibleImages}{article}{, author = {{Zywina}, D.}, title = {On the possible images of the mod $\ell$ representations associated to elliptic curves over ${\mathbb Q}$}, note = {Preprint, \tt{arXiv:1508.07660}}, } \end{biblist} \end{bibdiv} \end{document}
\section{Introduction} With more advanced Deep Neural Networks (DNNs) developed every day, there is a big challenge to deploy such complicated models in edge devices under strict constraints on power budget, delay, form factor, and cost. Researchers are actively investigating approaches to map the DNN workloads onto FPGAs by taking advantage of their improved latency and energy efficiency in order to deliver intelligence from edge devices \cite{zhang2017machine,zhao2017accelerating,zhuge2018face,guan2017fp,umuroglu2017finn}. One of the most arresting approaches is to reduce the complexities and model sizes of DNNs. Existing works on neural network model compression can be divided into two main approaches: (1) compress the original large and complicated network into a smaller one, or (2) directly generate a network with extremely low bit-width (ELB) data. Deep compression \cite{han2015deep_compression} is a representative work of the first approach, which uses weak connection pruning, weight quantization, and Huffman coding to compress the network model and remove the redundant network connections. In the second approach, Binarized Neural Networks (BNN) \cite{Courbariaux-binary} and Ternary Neural Network (TNN) \cite{Ternarynet} are proposed to constrain the weights to binary and ternary bit-width respectively. These two approaches can both significantly reduce the computation complexity and network model size, while their corresponding acceleration designs are discussed in \cite{han2016eie} and \cite{Nurvitadhi2016AcceleratingBN}, respectively. In this work, we introduce more flexibility on bitwidth optimization compared to previous works, e.g., BNN, TNN and the DoReFa-Net \cite{dorefa}, and adopt a hybrid quantization scheme for both weights and activations so that different bit-widths can be applied for both inter- and intra-layers. For instance, our proposed design method allows us to use binary weights in fully-connected (FC) layers for significantly cutting down their demands of memory access bandwidth while use ternary weights for the convolutional (CONV) layers to balance the network accuracy and computational overhead. In terms of the first and the last layer, where usually higher data precision is required, we would use more bit-widths instead of sticking with the low precision options. Such flexible quantization schemes are helpful for building highly customized DNN accelerators in hardware with high capacity to trade off the network accuracy and resource utilization. Although GPUs are widely deployed for accelerating the DNN training and inference, they are not very efficient for handling the hybrid ELB-NNs with non-uniform quantization schemes. On the contrary, FPGA based solution is more suitable to address the arbitrary numerical precisions by taking advantage of its fine-grained customization capability, and the abundant LUT resource can also be effectively utilized for computation. We will present a design flow of accelerating large scale hybrid ELB-NN deployment in FPGA for edge devices. Using flexible quantization schemes offers better balance among accuracy, latency, and throughput when we target embedded FPGAs in edge devices. We develop a Caffe based framework for efficient training and accuracy evaluation of ELB-NN. To the best of our knowledge, it is the {\bf first} ELB network design flow that enables different bit-width quantizations for inter- and intra-layers in a comprehensive manner. In order to accommodate the diverse quantization schemes in the proposed ELB-NN design method and seek for higher throughput, we construct a pipeline architecture for boosting the inference of DNNs. To make ELB-NN on FPGA implementation much easier, we build an end-to-end automation tool, called AccELB. Given a hybrid ELB-NN model, AccELB can automatically generate a high performance FPGA implementation with pre-built optimized RTL libraries. To summarize, the detailed contributions of this work are: \vspace{-0pt} \leftmargini=0mm \leftmarginii=0mm \begin{itemize} \item \textbf{Hybrid ELB-NN for accuracy and computational complexity tradeoffs}. Our experimental results indicate that the accuracy varies with the precisions of weights and activations with regard to the layer types (e.g. CONV, FC) and the layer locations. We observe that the precision of the activation function is in general more sensitive than that of the weights. Also, the first and the last layers require higher data precision than other layers. Our proposed flow allows network designers to adjust the precisions of weights and activations within or across the layers, which provides more flexibility of effective accuracy and throughput/energy trade-offs. \item \textbf{An end-to-end automation tool}. To easily deploy the hybrid ELB-NN in embedded FPGA, we develop an integrated automation tool -- AccELB, to map hybrid ELB-NN definitions (e.g. the Caffe prototxts) to FPGA board-level implementations. With such an integrated automation tool, users are no longer required to program at RTL level nor to perform manual design space exploration. \end{itemize} The rest of this paper is organized as follows. In Section 2, the background and related works are introduced. In Section 3, the whole design flow from training to deployment is described. The hybrid ELB-NN and the automation tool AccELB are described in Section 4 and 5 respectively. Experimental results are provided in Section 6. Section 7 concludes this paper. \section{Background and related work} \subsection{Low Precision Neural Network} \vspace{-0pt} Recent research works have considerably reduced the DNN model size and computation complexity by quantizing the weights and activations to low bit-widths while retaining similar accuracy \cite{Courbariaux-low-precison}\cite{gysel2016hardware}. A much more aggressive quantization approach was proposed in \cite{Courbariaux-binary} that binarizes both the weights and activation to +1/-1, but it only achieved good performance for some small datasets like MNIST, CIFAR10 and SVHN. XNOR-Net by Rastegari \cite{xnor-net} extended the binary nerual network (BNN) to large scale ImageNet dataset and achieved competitive top-1 accuracy for both fully or partially binarized network. DoReFa-Net \cite{dorefa} investigated the effects of the low precision not only in inference but also in training stage by quantizing the gradients in back propagation. Ternary weight networks \cite{Ternarynet}\cite{ternary}, with weights constrained to +1, 0 and -1 along with a scaling factor, were proposed to increase the capacity of model expression, and achieved approximated accuracy of full precision weight networks. In \cite{ADMM}, the authors adopted the Alternating Direction Method of Multipliers (ADMM) to train the network with extremely low bit weights, and achieved state-of-the-art performance. \vspace{-0pt} \subsection{Deep Neural Network Acceleration on FPGA} \vspace{-0pt} There are many studies on accelerating the neural networks in FPGA. The authors in \cite{jason15fpga} proposed an analytical design scheme for FPGA with a roofline model and used optimization techniques such as loop tiling and transformation to deal with the memory bandwidth issue. In \cite{wangyu16fpga}, the authors further studied larger networks and proposed dynamic-precision data quantization method and a convolver design to improve the bandwidth and resource utilization. The authors in \cite{2017High} proposed a resource allocation scheme for minimizing the network inference latency and deployed different quantization schemes for the weights and feature maps. Previous literature also focused on building framework for auto-generating FPGA-based DNN accelerator \cite{guan2017fp}. There are also studies of mapping the low bit-width networks onto FPGA targeting embedded systems. In \cite{zhao2017accelerating}, a neural network with binarized weights was implemented on a tiny FPGA using HLS by caching all the feature map data in the on-chip memory, and demonstrated its efficiency for networks with small model size. FINN in \cite{umuroglu2017finn} introduced methods to optimize the layers in a binary network to meet throughput targets. A detailed comparison of implementing BNN in CPU, GPU, FPGA and ASIC was conducted in \cite{Nurvitadhi2016AcceleratingBN}. Overall, these previous works only target small or full binary neural networks. The systematic study for hybrid low bitwidth versus accuracy tradeoffs across different intra- and inter-layer scenarios is also not provided. \section{Design Flow of Hybrid ELB-NN} \label{deign_overview} In this section, we investigate the hybrid quantization scheme, since different precisions of the weights and activations within or across the layers may have significantly different impacts on the accuracy and throughput. The relationship is non-linear and subtle (i.e., reduction of bitwidths might not necessarily reduce the accuracy in a linear fashion), and our work attempts to provide insights and principles studying the relationship across these different design dimensions. To make hybrid ELB-NN design and performance evaluation in FPGA much easier, we build an end-to-end design flow from training to deployment in embedded FPGA. As shown in Fig. \ref{fig:overall_design_flow}, it integrates three steps as \textit{design}, \textit{generation}, and \textit{execution}. \begin{figure}[t] \centering \setlength{\belowcaptionskip}{-8pt} \includegraphics[width=0.98\columnwidth]{Figs/step1.png} \caption{Hybrid ELB-NN design flow from network design, code generation to execution in FPGA.} \label{fig:overall_design_flow} \end{figure} \textbf{\textit{Design}}: We develop a Caffe based framework extended from Caffe-Ristretto \cite{gysel2016hardware} to support the training of hybrid ELB-NN, which allows different data bit-widths (including binary and ternary status) for inter- or intra- network layer optimization and delivers great possibilities to explore the tradeoffs among hardware performance and network accuracy. This framework also provides a hybrid quantization scheme for more stable training and faster convergence. The trained model (including the Caffe prototxt file and binary Caffe model file) could be directly used to generate Verilog code for FPGA deployment. \textbf{\textit{Generation}}: After settling down with the network model, our tool AccELB then covers three critical procedures as 1) network parsing for building network structures on a layer by layer basis from abstract network definitions (e.g. Caffe prototxt files); 2) auto optimization for performing design space exploration under given FPGA devices; and 3) network construction for instantiating the pre-built optimized hardware libraries. In network parsing, network components such as CONV, pooling, and Batch Normalization (BN) are analyzed and corresponding parameters are extracted, such as kernel size, feature map size, type of layer, etc. We also concatenate the highly related network components, such as CONV, BN, and ReLU layer to flatten the targeted neural network and limit the number of network layer types which would be instantiated on FPGA. In terms of auto optimization, we try to balance each pipelined stage with considerations of network's computation complexity, available hardware logic, and memory resource constraints and eventually maximize the overall throughput performance. After that, optimized parallelism parameters are generated so that the pre-built hardware libraries are instantiated with the most appropriate configurations. \textbf{\textit{Execution}}: In the last execution step, the accelerator is generated by AccELB with unified FIFO-like I/O interfaces which can be easily instantiated in FPGAs for board level testing. ELN-NN designers are likely to try different configurations in the whole design space to find an optimal quantization that satisfies the accuracy and throughput requirements. It is time-consuming to generate the FPGA bit file and evaluate the performance in FPGA board for each try. Thus, we provide an evaluation tool that can profile the FPGA hardware utilization, such as LUTs, memory and bandwidth cost, etc, and provide the estimated throughput as well before touching the hardware, which could greatly shorten the exploration time. \section{Hybrid ELB-NN in Case Study} In this section, we use a case study to explain the motivation of hybrid ELB-NN. Through this experiment, we also provide some insights and guidelines for the hybrid-ELB design, which also guides our hardware architecture design for AccELB described in Sec. \ref{AccELB}. \subsection{Experimental Network Setup} \vspace{-0pt} As a starting point, we study the Convolutional Neural Network (CNN), and specifically focus on tuning the precisions of weights and activations, to investigate their impacts on the overall classification accuracy. Although our proposed hybrid ELB-NN and the corresponding automation tool AccELB support diverse precisions of the activations crossing layers, in this experiment, we still use unified precision for the intermediate activations to reduce the searching space. The binary weights can be calculated as Eq. \ref{eq:binary}. Here $\tilde{w}$ represents full precision weights after back propagation while {\bf $E(|\tilde{w}|)$} represents the mean of all the full-precision weights as a scaling factor. For the ternary training, the $w_t$ (representing ternary weight) can be calculated following Eq. \ref{eq:ternary}. Here we set the threshold $w_{thres}=0.7E(|\tilde{w}|)$ as suggested in \cite{Ternarynet}; we also follow \cite{Ternarynet} to calculate the scaling factor $E$. We use 8 bits fixed point in the first and the last layer's weights, where generally higher data precision is required than the intermediate layers. The image input (RGB data) and output (last FC's output) are also quantized to 8 bits and 16 bits respectively in our design. \begin{equation} w_b = sign(|\tilde{w}|)\times\textbf{E}(|\tilde{w}|) \label{eq:binary} \end{equation} \begin{equation} w_t = \begin{cases} sign(\tilde{w})\times $E$ & \mbox{$|w_t|>w_{thres}$}\\ 0 & \mbox{$|w_t| \leq w_{thres}$} \end{cases} \label{eq:ternary} \end{equation} We modified Alexnet \cite{krizhevsky2012imagenet} with our hybrid ELB-NN method as the experimental benchmark. Alexnet has diverse CONV and FC layer structure and is very suitable for our investigation as a starting point. \subsection{Evaluation Results} \label{training_accuracy} To sum up, we focus on studying the impact of {\bf (1)} the binary and ternary weights of the CONV layer and FC layer, and {\bf (2)} low bit-width activations. As we mentioned before, we apply relatively high precision (i.e., 8 bits) to the first CONV and last FC layer. We use mid-CONV to denote all the CONV layers except the first CONV layer, and use mid-FC to denote all the FC layers except the last FC layer. The naming rule of proposed hybrid precision network can be referred to Fig. \ref{fig:representation}. We first study a full 8 bits fix-point network (AlexNet-8-8888) with all weights and activations quantized to 8 bits. Then, we reduce the precision of the mid-CONV and mid-FC layers to binary or ternary, and study the accuracy characteristics. Finally, we reduce the bit-width of activations to investigate the impact. Our detailed experiments and the corresponding classification results are summarized in Table \ref{tbl:accuracy}. \begin{figure} \begin{centering} \vspace{-0.1in} \includegraphics[width=0.9\columnwidth]{Figs/network_definition.pdf} \caption{Network representation} \vspace{+2pt} \label{fig:representation} \end{centering} \end{figure} \begin{table} \centering \caption{Classification accuracy for different weights and activation precision based ImageNet 2012 \cite{deng2009imagenet} dataset.} \label{tbl:accuracy} \begin{tabular}{|c|c|} \hline Network precision & Accuracy (Top-1)\\ \hline Alexnet with float32 & 55.9\%\cite{dorefa} \\ \hline Alexnet-8-8888 & 54.6\% \\ \hline Alexnet-8-8228 & 53.3\% \\ \hline Alexnet-8-8218 & 52.6\% \\ \hline Alexnet-8-8118 & 51.1\% \\ \hline Alexnet-4-8218 & 49.3\% \\ \hline Alexnet-2-8218 & 46.1\% \\ \hline Alexnet-4-8218 (w/o group) & 53.2\%\\ \hline Alexnet-4-8218 (extended) & 54.5\%\\ \hline \end{tabular} \vspace*{-8pt} \end{table} The preliminary results of the classification accuracy are encouraging. We find that the 8 bits fixed-point design (Alexnet-8-8888) only reduces the accuracy of the original network by 1.3\% after training. Further, with the precision of mid-CONV and mid-FC layer becoming ternary (Alexnet-8-8228), the classification accuracy reduces by another 1.3\% compared with the 8 bits version. Then, the accuracy reduces by an additional 0.7\% when the weights of the mid-FC layers are binarized (Alexnet-8-8218). That said, with the ternary and binary weights used in mid-CONV and mid-FC layer respectively, the accuracy is still promising. In other words, the network is relatively robust to the precision of weights. This insight is very helpful when mapping this quantized model to hardware, because the neural network acceleration usually suffers from the limited memory bandwidth, especially for the edge devices, and reducing the precision of weights to binary/ternary can reduce the required memory bandwidth dramatically. It is advisable to use binary status for the FC layer to seek even lower bandwidth consumption with very limited accuracy loss. More accuracy degradation of 1.5\% is observed when reducing the precision of CONV weights from ternary to binary status (AlexNet-8-8118), which indicates the weight precision of CONV layer has larger impact on accuracy than that of FC layer. The precision of activations also has more significant impact to the classification accuracy. Compared to the Alexnet-8-8218 in Table \ref{tbl:accuracy}, reductions of 3.3\% and 6.5\% accuracy are observed when the precision of activation moves from 8 bits to 4 bits (Alexnet-4-8218) and 2 bits (Alexnet-2-8218). It also gives us some ideas why fully binarized network suffers significant accuracy loss as stated in \cite{xnor-net}. In ELB-NN, each CONV or FC layer is followed by a Batch Normalization (BN) and a ReLU layer, which generates non-negative activations. It means the sign bit is useless and it could be used by the fractional part. For example, a 4 bits non-negative activation has the same representative capability as a 5 bits signed activation. Thus, it is a good choice to allocate all available bits to the value of activation instead of wasting one bit as a sign bit. To further investigate the impact of model complexity in ELB-NN, we firstly disable the group function in CONV2, CONV4, CONV5 of the Alexnet, which is originally proposed to handle the GPU memory issue and distribute one CONV layer to two GPUs. As a result, the amount of computation is increased by 80\%, and a significant accuracy improvement of 3.9\% is observed. Secondly, starting from Alexnet-4-8218 (w/o group), we increase the kernel number for the five CONV layers from C96-C256-C384-C384-C256 to C128-C384-C512-C512-C384 to enlarge the model's representation capability, and 1.3\% accuracy gain is obtained by affording extra 61\% computation when comparing to Alexnet-4-8218 (w/o group). Our initial experimental results suggest that increasing the model complexity can definitely bring back the accuracy which is sacrificed by using ELB quantizations. Given the large design space, it is still challenging to find an optimal design in the entire design space in terms of various ELB settings, model scale and hardware efficiency. However, a heuristic method could be leveraged along with the design flow proposed in Sec. \ref{deign_overview} in an iterative way to find an optimized design. We may also leverage the machine learning based technology to perform fast design space exploration, which could be the future work. \section{AccELB Design} \label{AccELB} The detailed procedure of RTL code generation using AccELB has been described in Sec. \ref{deign_overview}. In this section, we focus on its hardware architecture design. \subsection{Data Access Pattern Investigation} How to effectively utilize the bandwidth between the on-chip and off-chip memory is the key question when designing an accelerator. Most of the prior approaches perform the memory access in a recurrent manner, which means they reuse the same computation units and let all layers in DNNs share the same hardware accelerator with periodically data load/store operations. For each CONV layer, the computation engine needs to load the input feature map from the off-chip memory and store the output feature map back to the memory when the CONV computation completes. This transfer of feature map from and to external memory is costly in terms of latency and energy, which is much more serious for high resolution input. Take the classic Alexnet for the example, as mentioned in \cite{FuseCNN}, the feature map data occupies about 25\% of overall data in convolutional layers, and this number increases to over 50\% for more advanced models, such as VGG and GoogleNet. While in ELB-NN, more bits are required for feature maps comparing to weights as discussed in Sec. \ref{training_accuracy}, and the feature map movement becomes constrained by the bandwidth consumption. A typical configuration of 8 bits activations and ternary weights will make feature map data to be around 60\% and 80\% of the overall data for Alexnet and VGG, respectively. If considering high definition (HD, such as 720P/1080P) inputs, which are necessary for small object detection, nearly all the data movements relate to the intermediate feature maps. A layer fusion based CNN accelerator was proposed to significantly alleviate the burden of feature map data movement in \cite{FuseCNN} where output feature maps are not stored off-chip but kept inside the on-chip memory. In this paper, we use a full pipeline design and maintain the output feature maps in on-chip memory, which totally eliminates the tremendous intermediate feature map data moving cost. Meanwhile, the pipeline design also naturally supports the hybrid ELB-NN that requires diverse precision in layer granularity. \subsection{Hardware Architecture} \begin{figure} \begin{centering} \includegraphics[width=3.4in]{Figs/architecture2.png} \caption{AccELB architecture} \label{fig:architecture} \vspace{-8pt} \end{centering} \end{figure} We apply a pipeline structure in AccELB to better accommodate high throughput and real-time performance. Each pipeline stage handles one concatenated layer (i.e., CONV + BN + ReLU) and video/image frames can be streamed in with very high throughput. Fig. \ref{fig:architecture} shows two of the proposed pipelined stages where data can be fetched from two sources as the FPGA on-chip memory (BRAM-implemented buffers) and the external memory (DRAM). The on-chip reshape buffers are built for storing input feature map, while the weight buffers between external memory and Computation Engine (CE) are set up as caches of the external DRAM for reducing data access latency. We design an array of CEs (CE array) for parallel computing. More details are described below. \subsubsection{Computation Engine (CE)} Since the major part of convolutional computation is located in multiple nested loops, we propose a parameterized CE to introduce parallel instantiation by handling a certain number of CONV kernels and channels simultaneously. We also propose a flattened layer hierarchy operation by concatenating CONV, BN, and activation function and eventually improve the performance of the loops. Inside the CE, highly related network components, such as CONV, BN, and activation function, are concatenated to form an compact and efficient structure. As shown in Fig. \ref{fig:kernel}, we present a four-input-parallel CE as an example, where four inputs are first processed by ELB CONV (including binary/ternary operations and accumulation) and then followed by BN and activation function. In CONV, we follow the rules in the top-right of Fig. \ref{fig:kernel} and implement binary and ternary operations with \textit{combinatorial logic}. By using multiplexer, the output of Ternary or Binary operator can be selected among the input, the inverse of input, and zero accordingly. That said, no multiplications are required in CONV. The precision of the accumulator is adjustable to avoid overflow when large CONV kernel or higher precision of input data are applied. This adjustable precision is intended to allow more flexible quantization designs and maintain the output accuracy. For higher number of inputs, an adder tree will be used before the accumulator for easier timing enclosure. BN in the inference stage could be degenerated to a simple formula $\alpha x+\beta$ (according to the definition of BN), and the scaling factor $E$ for binary/ternary weights in Eq. \ref{eq:binary} and Eq. \ref{eq:ternary} can also be integrated to this formula, resulting a total scaling factor of $\alpha E$. The last component is the activation function, such as ReLU, in which the output is processed by a simple saturated truncation to a desired bit-width. \begin{figure}[t] \begin{centering} \includegraphics[width=0.9\columnwidth]{Figs/CK.png} \caption{Computation engine (CE) with binary and ternary logic operations} \vspace{-10pt} \label{fig:kernel} \end{centering} \end{figure} \subsubsection{Memory System} In this section, the hierarchical memory system is introduced to tolerate the data access latency from external memory. Since there are few on-chip memory blocks available in embedded FPGAs, we need to limit the on-chip memory utilization by placing the trained weights off-chip especially for large DNNs. Although the weights and biases are quantized, the on-chip memory can be still insufficient when trying to deploy large-scale DNNs. To solve the data access latency, we insert on-chip ping-pong buffer between the CE and the external memory. This hierarchical memory system enables AccELB with the capability of deploying large scale models. \section{Experimental results} \begin{table*}[t] \scriptsize \vspace{-2pt} \caption{AccELB performance evaluated on Xilinx ZC706 board} \label{tab:performance} \vspace{-6pt} \begin{center} \newcommand{\tabincell}[2]{\begin{tabular}{@{}#1@{}}#2\end{tabular}} \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Network} & \multicolumn{4}{c|} {Utilization (include SDK, around 11\% LUT and BRAM)} & \multirow{2}{*}{\tabincell{c}{Batch\\size}} & \multirow{2}{*}{\tabincell{c}{Bandwidth\\(GBytes/s)}} & \multirow{2}{*}{\tabincell{c}{Complexity\\(GOP)}} & \multirow{2}{*}{\tabincell{c}{Speed\\(imges/s)}} & \multirow{2}{*}{\tabincell{c}{Performance\\(TOPS)}}\\ \cline{2-5} & LUT & FF & BRAM & DSP & \multicolumn{1}{c|}{} & \multicolumn{1}{c|}{} & \multicolumn{1}{c|}{} & \multicolumn{1}{c|}{} & \multicolumn{1}{c|}{} \\ \hline Alexnet-8-8888 (baseline) & \tabincell{c}{86262(39\%)} & \tabincell{c}{51387(12\%)} & \tabincell{c}{303(56\%)} & \tabincell{c}{808(90\%)} & 2 & 10.8 & 1.45 & 340 & 0.493 \\ \hline Alexnet-8-8218 & \tabincell{c}{103505(47\%)} & \tabincell{c}{90125(21\%)} & \tabincell{c}{498(91\%)} & \tabincell{c}{550(61\%)} & 5 & 3.35 & 1.45 & 856.1 & 1.24 \\ \hline Alexnet-4-8218 & \tabincell{c}{105673(48\%)} & \tabincell{c}{94149(22\%)} & \tabincell{c}{463(85\%)} & \tabincell{c}{880(98\%)} & 8 & 3.35 & 1.45 & 1369.6 & 1.99 \\ \hline Alexnet-4-8218 (w/o group) & \tabincell{c}{127393(58\%)} & \tabincell{c}{105328(24\%)} & \tabincell{c}{435(80\%)} & \tabincell{c}{839(93\%)} & 7 & 4.30 & 2.61 & 1198.5 & 2.59 \\ \hline Alexnet-4-8218 (extended) & \tabincell{c}{124317(57\%)} & \tabincell{c}{101558(23\%)} & \tabincell{c}{481(88\%)} & \tabincell{c}{783(87\%)} & 7 & 3.4 & 4.22 & 599.2 & 2.53 \\ \hline \hline VGG16-4-8218 & \tabincell{c}{112992(52\%)} & \tabincell{c}{99396(23\%)} & \tabincell{c}{509(93\%)} & \tabincell{c}{298(33\%)} & 2 & 5.85 & 31.0 & 110.7 & 3.43 \\ \hline VGG16-2-8118 & \tabincell{c}{137973(63\%)} & \tabincell{c}{113262(26\%)} & \tabincell{c}{499(92\%)} & \tabincell{c}{651(72\%)} & 3 & 6.67 & 31.0 & 332.2 & 10.3 \\ \hline \end{tabular} \end{center} \end{table*} \begin{table*}[t] \scriptsize \vspace{-2pt} \caption{Comparison with existing FPGA-based low precision DNN accelerators} \vspace{-6pt} \label{tab:comp} \begin{center} \newcommand{\tabincell}[2]{\begin{tabular}{@{}#1@{}}#2\end{tabular}} \begin{tabular}{|c|c|c|c|c|c|c|} \hline Reference & \cite{zhao2017accelerating} & \cite{umuroglu2017finn} & \cite{Nicholas2017scale} & \cite{Nurvitadhi2016AcceleratingBN} & AccELB(1)-VGG16 & AccELB(2)-VGG16\\ \hline FPGA chip & XC7Z020 & XC7Z045 & XCKU115 & Arria10 1150 & XC7Z045 & XC7Z045\\ \hline Frequency & 143MHz & 200 MHz & 125 MHz & N/A & 200MHz & 200 MHz \\ \hline Network Type & Binary & Binary & Binary & Binary & Hybrid(4-8218) & Hybrid(2-8118)\\ \hline kLUTs (used/total) & 46.9/53.2 & 82.9/218.6 & 392.9/663 & N/A & 113.0/218.6 & 138.0/218.6\\ \hline Performance (TOPS) & 0.21 & 9.1 & 14.8 & 9.8 & 3.43 & 10.3\\ \hline efficiency (GOPS/kLUT) & 3.95 & 41.6 & 22.3 & N/A & 15.6 & 47.1\\ \hline \end{tabular} \vspace{-6pt} \end{center} \end{table*} A Xilinx ZC706 evaluation platform with Zynq XC7Z045 FPGA (which consists of a Xilinx Kintex-7 FPGA and a dual ARM Cortex-A9 CPU) is used as the evaluation device. The hybrid ELB-NN with different precision configurations are automatically deployed and optimized by AccELB. After synthesis by Vivado 2016.4, placement and routing are completed subsequently showing resource consumptions and performance in Table \ref{tab:performance}. We achieved 200 MHz working frequency in this 28nm chip, which also shows the advantage of a full RTL level implementation. The SDK occupies around 11\% LUT and BRAM for generating the necessary infrastructure, such as the image/video data interface, the video/accelerator DMAs, the MIG, etc. \subsection{Alexnet Performance} As shown in Table \ref{tab:performance}, Alexnet with 8 bits weight and activation implementation is firstly presented as a baseline. To balance the accuracy and off-chip memory access bandwidth, we use ternary weights for the mid-CONV layer and binary weights for mid-FC layer. In Alexnet, the computation of the first CONV layer occupies around 14.5\% of the total computation. We can achieve the throughput of 171.2 images/s without using batch. For Alexnet-8-8218, we can place at most 5 batches simultaneously and the BRAMs are first to be exhausted when placing more batches. While for Alexnet-4-8218, we can place 8 batches simultaneously and the DSP resource that is mostly consumed by the first layer becomes the bottleneck although we have explored to use one DSP block for two 8 bits multipliers \cite{XilinxInt8}. Therefore, we can not benefit more in terms of total throughput by further reducing the precision of activations to 2 bits. In our design, there are several multipliers for address computation in the pipeline control logic. In this case (Alexnet-4-8218), we use LUT resource to instantiate these address-computation multipliers instead of build-in DSP blocks since the performance is bounded by the DSP resource. Thus, the LUT usage in this case is a little higher than usual. The bandwidth requirements of both ELB settings are significantly reduced to 3.35 GBytes/s, which is acceptable for edge-devices with power constraints. The Alexnet-4-8218 (w/o group) achieves the throughput of 1198.5 images/s, which is slightly slower than Alexnet-4-8218 (w/ group). However, the accuracy is significantly improved by 3.9\% as reported in Table \ref{tbl:accuracy}, which even outperforms Alexnet-8-8218 by 0.6\%. The speed of extended Alexnet-4-8218 can reach up to 599.2 images/s, which surpasses the baseline (Alexnet-8-8888) by 1.76x while still keeping the same accuracy as reported in Table \ref{tbl:accuracy}. As for the bandwidth cost, a significant reduction of 68\% is observed when comparing to the baseline resulting less power consumption. Meanwhile, bandwidth reduction can also reduce DDR hardware cost (e.g., using 32 bits instead of 64 bits DDR), since 3.4 GBytes/s bandwidth requirement can be well satisfied by using 32 bits DDR3 @1600MT/S instead of 64 bits. \subsection{Scaling to large scale networks} In order to demonstrate AccELB's capability of scaling to very large scale networks, we then present performance evaluation for VGG16 using ELB-NN, which is around 20x more complicated than standard Alexnet. We use VGG16-4-8218 as the case study. The top-1 accuracy is 55.8\%, which is trained using the same epochs and hyper parameters as those in Alexnet. We achieve the higher performance of 3.43 TOPS as shown in Table \ref{tab:performance}, which outperforms the best performance in Alexnet-4-8218 (w/o group) with the same ELB setting but using less LUT resources. The major reasons are {\bf (1)} The kernel number of CONV in VGG16 is much larger than that in Alexnet, and we can use higher parallelism in CE for VGG16. It will result in higher LUT efficiency, which is defined as GOPS$/$\# (of LUTs used). Based on our experiment on a typical CE with ternary weight and 4 bits data width, the LUT efficiency of 64 inputs outperforms that of 16 inputs by 1.4x. {\bf (2)} VGG16 has unified CONV kernel (3$\times$3 with stride 1) and pooling pattern (2$\times$2 with stride 2), which makes the whole pipeline perfectly balanced without any computation resource waste under the constraint that parallel factors in CEs should be power of 2. The more balanced for latency of each layer, the higher LUT efficiency. \subsection{Comparison to FPGA Accelerators} We compare our design with four recent FPGA-based accelerators in Table \ref{tab:comp}. All of these four existing works focus on the BNNs, and only consider small models for their benchmark (even Alexnet was not considered). For their cases, all the binarized weights could be stored in the on-chip memory of FPGA. In our AccELB, we do not only consider the implementation of hybrid quantization, but also investigate the performance in very large scale models, such as VGG16. In this case, the weights can not be stored in on-chip memory any more even when all the weights are binarized, and a memory hierarchy mechanism should be involved. For fair comparison, we use the hybrid configuration of 2-8118, which is the closest precision setting to BNN. We achieve the peak performance of 10.3TOPS. Even we use one more bit for the activations, we still outperform the existing works except \cite{Nicholas2017scale}, in which they used a much more powerful FPGA with a greater amount of LUT resource (2x more than ours). However, for the LUT efficiency in terms of GOPS per kilo LUTs, our implementation still outperforms \cite{Nicholas2017scale} by 2x, and is better than the most efficient work in \cite{umuroglu2017finn} by 13\%. \subsection{Comparison to GPU} \begin{figure}[t] \centering \includegraphics[width=0.98\columnwidth]{Figs/power.png} \caption{Board level implementation in Xilinx ZC706 and power analysis during (left) idle state and (right) busy state.} \vspace{+6pt} \label{fig:power} \end{figure} \begin{table}[t] \scriptsize \caption{Energy efficiency comparison (Alexnet)} \vspace{-2pt} \label{tb:comp_gpu_cpu} \begin{center} \newcommand{\tabincell}[2]{\begin{tabular}{@{}#1@{}}#2\end{tabular}} \begin{tabular}{|c|c|c|c|c|c|} \hline Platform & Precision & \tabincell{c}{Batch\\size} & \tabincell{c}{Speed\\(img./s)} & \tabincell{c}{Power\\(w)} & \tabincell{c}{Efficiency\\(img./s/w)} \\ \hline AccELB(1) & 4-8218 & 8 & 1369.6 & 4.2 & 325.3\\ \hline AccELB(2) & 8-8218 & 5 & 856.1 & 4.1 & 208.8 \\ \hline AccELB(3) & 4-8218 (extended) & 8 & 599.2 & 4.8 & 124.8 \\ \hline GPU-TX2 & FP16 & 128 & 463 & 5.6 & 82.7\\ \hline GPU-P4 & INT8 & 128 & 6084 & 56 & 109\\ \hline GPU-P40 & INT8 & 128 & 11000 & 155 & 71\\ \hline \end{tabular} \end{center} \vspace{-8pt} \end{table} We extend our comparison to latest GPUs both in data center \cite{Nvidia-P4-p40} and edge device\cite{NVidia_TX2} as shown in Table \ref{tb:comp_gpu_cpu}. All these hardware platforms are running inference for ImageNet-2012 on Alexnet. We use a Yokogawa WT310 digital power meter to measure the power consumption. As shown in Fig. \ref{fig:power}, the proposed design (Alexnet-4-8218) consumes 14.2W in idle state (when Linux OS is running at 800MHz) and 18.4W in busy state (when OS and the proposed design are running in ARM core and FPGA, respectively). To eliminate the affects of CPU (we did not use ARM core for DNN inference) and other unnecessary peripherals in this development board, we subtract the two power readings. Thus, the power consumed by target FPGA is 4.2W. As is clear from the comparison for the ELB-NN in Table \ref{tb:comp_gpu_cpu}, the energy efficiency in our proposed designs (Alexnet-4-8218 and Alexnet-8-8218) surpasses those of the latest Nvidia GPUs for data center (P4) and edge (TX2) inferences by up to 3.0x and 3.9x (the Alexnet-4-8218 case) even if we use much smaller batch size, but we also pay the price for the accuracy. Referring to Table \ref{tbl:accuracy}, 8-bit GPU's accuracy would be 54.6\%, where our implementations have accuracy of 52.6\% for AccELB(2) and 49.3\% for AccELB(1). A clear tradeoff between accuracy and efficiency can be observed. For the extended Alexnet-4-8218, which has the same accuracy as INT8 implementation, the energy efficiency still outperforms that of the most efficient GPU (P4) solution by 14\%. GPU can also support ELB-NN by using different kernel implementations. However, existing literature \cite{Courbariaux-binary} suggests that BNN implementation (XNOR + popcount) is only 3.2x faster than FP32 cuBLAS implementation, and is very close to the INT8 performance \cite{INT8vsFP32}. Thus, no obvious gain is obtained in GPU when applying ELB-NN. While for FPGA, 4x throughput (Alexnet-4-8218) compared with the INT8 implementation (Alexnet-8-8888) is reported per Table \ref{tab:performance}. \section{Conclusions} In this paper, we proposed a design flow of accelerating large scale hybrid ELB-NN from training to deployment in FPGA to provide flexible accuracy and computation tradeoffs, which is critical for resource and power constrained edge devices. Especially, we presented AccELB, an end-to-end automation tool for deploying our proposed hybrid ELB-NN in embedded FPGAs to handle edge-computing applications with higher performance and energy efficiency. Provided with the trained ELB models, AccELB can generate a highly optimized FPGA implementation without involving any RTL programming. We tested AccELB on large scale ELB-NNs in a Xilinx ZC706 evaluation board and achieved peak performance up to 10.3 TOPS, as well as better energy efficiency (325.3 image/s/watt for running Alexnet) compared to existing approaches. With our proposed design flow from training to deployment, the user can easily bring the AI capability to edge-devices for fast prototyping or actual deployment with FPGAs. \section*{Acknowledgment} \vspace{-0pt} This work was partly supported by the IBM-Illinois Center for Cognitive Computing System Research (C3SR) -- a research collaboration as part of IBM AI Horizons Network. \bibliographystyle{unsrt}
\section{Introduction} A communication network is a collection of directed links connecting transmitters, switches, and receivers, whose underlying structure can be mathematically represented by a directed graph $\mathcal{G} = (\mathcal{V},\mathcal{E})$ as introduced by Li \emph{et al.} \cite{ACLY00}. Koetter and M\'edard in \cite{KM03} studied the network code design as an algebraic problem that depends on the structure of the underlying graph. They made a connection between a given network information flow problem and an algebraic variety over the closure of a finite field. In particular, a multicast network is an error-free network with unit-capacity channels represented by a directed acyclic graph and with the communication requirement that every receiver demands the message sent by every source. Treating the messages as elements of some large enough finite field $\mathbb{F}_q$, it is known that linear network coding suffices to transmit the maximal number of messages. Code graphs condense the information in a choice of edge-disjoint paths of a multicast network based on the coding points, i.e.\ edges which are ``bottlenecks" where messages are combined in linear network coding. Under this framework, linear network coding is reduced to assigning vectors to vertices in the code graph with independence conditions based on receivers. The triangular semilattice networks are then a family of code graphs embedded in the integer lattice restricted to nonnegative coordinates of some maximum 1-norm with edges between adjacent lattice points directed towards the origin. This paper is organized as follows. In Section $2$, we refer briefly to and improve upon coding points, code graph, and $\mathbb{F}_q$-labeling of a code graph; these are discussed in detail in \cite{anderson}. We then present a result with regards to determinants in the $\mathbb{F}_q$-labeling. In Section $3$, we introduce a type of code graph called the triangular semilattice network. We discuss receiver placements and invariance of the minors corresponding to receiver placements under symmetries. From this general study, we shift to a complete study of triangular semilattice network with up to four sources in section $4$. \section{Coding Points and Code Graph} In this work, we represent a multicast network by a directed acyclic graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with a set $\mathcal{S}\subset \mathcal{V}$ of sources, i.e.\ vertices without incoming edges, and a set $\mathcal{R}\subset \mathcal{V}$ of receivers, i.e.\ vertices without outgoing edges. Each directed edge is a unit capacity noise-free communication channel over a finite field $\mathbb{F}_q$. We further assume that the edge mincut between each source and each receiver is at least one and the overall mincut between the set of sources and each receiver is at least the number of sources. Together with the assumption of coordination at source level and with the requirement that every receiver $R \in \mathcal{R}$ gets the message from every source $S \in \mathcal{S}$, the network is equivalent to a multicast network as defined in \cite{ACLY00}. If $\mathcal{R}$ consists of a single receiver, the communication requirement is satisfied by a routing solution if and only if $\abs{\mathcal{S}} \leq \mincut(\mathcal{S},R)$ as a result of Menger's Theorem, which states that the edge $\mincut(\mathcal{S},R)$ is equal to the maximum number of edge-disjoint paths between the source set $\mathcal{S}$ and the receiver $R$ \cite{anderson}. In the case of multiple receivers where $\abs{\mathcal{S}} \leq \min_{R \in \mathcal{R}} \mincut(\mathcal{S},R)$, Ahlswede \emph{et al.} \cite{ACLY00} first showed that a network coding solution exists; later it was found that a linear network coding solution over a finite field $\mathbb{F}_q$ exists when $q$ is sufficiently large \cite{LYC03}, in particular, $q \geq \abs{\mathcal{R}}$ was found to be sufficient \cite{jaggi05}. Interested readers may also refer to \cite{Ksc11} for a complete algebraic proof showing that $q > \abs{\mathcal{R}}$ is sufficient. To condense the information about these receiver requirements, we consider the corresponding code graph of a multicast network. Anderson \emph{et al.} \cite{anderson} explain coding points of a network as the bottlenecks of the network where the linear combinations occur. More formally: \begin{defi} Let $\mathcal{G}$ be the underlying directed acyclic graph of a multicast network and for each $R \in \mathcal{R}$ let $\mathcal{P}_R = \{P_{S,R} \mid S \in \mathcal{S}\}$ be a set of edge-disjoint paths, where $P_{S,R}$ denotes a path from $S$ to $R$. A coding point of $\mathcal{G}$ is an edge $e=(v,v') \in \mathcal{E}$ such that: \begin{itemize} \item There are distinct sources $S, S'\in \mathcal{S}$ and distinct receivers $R,R'\in \mathcal{R}$ such that $e$ appears in both $P_{S,R} \in \mathcal{P}_R$ and $P_{S',R'} \in \mathcal{P}_{R'}$. \item The parents of $v$ in $P_{S,R}$ and $P_{S',R'}$ are distinct. \end{itemize} \end{defi} \begin{defi} A coding-direct path in $\mathcal{G}$ from $v_1 \in \mathcal{V}$ to $v_2 \in \mathcal{V}$ is a path from $v_1$ to $v_2$ that does not pass through any coding point in $\mathcal{G}$, except possibly in the first edge. \end{defi} Note that coding points are dependent on the choices of edge disjoint paths to each receiver. With $\mathcal{G}=(\mathcal{V},\mathcal{E},\mathcal{S},\mathcal{R} ,\{\mathcal{P}_R\mid R \in \mathcal{R}\})$ we denote a multicast network with chosen sets of edge-disjoint paths from the sources to each receiver. For a given multicast network, Anderson \emph{et al.} \cite{anderson} define the code graph as a directed graph with labeled vertices that preserves the essential information of the network: \begin{defi} Let $\mathcal{G}=(\mathcal{V},\mathcal{E},\mathcal{S},\mathcal{R} ,\{\mathcal{P}_R\mid R \in \mathcal{R}\})$ be a multicast network and let $\mathcal{Q}$ be its set of coding points. Let the code graph $\Gamma = \Gamma(\mathcal{G})$ be the vertex-labeled directed acyclic graph constructed as follows: \begin{itemize} \item The vertex set of $\Gamma$ is $\mathcal{S} \cup \mathcal{Q}$. Given a vertex $v$ of $\Gamma$, the corresponding source or coding point in $\mathcal{G}$ is called the $\mathcal{G}$-object of $v$. \item The edge set of $\Gamma$ is the set of all ordered pairs of vertices of $\Gamma$ such that there is a coding-direct path in $\mathcal{G}$ between the corresponding $\mathcal{G}$-objects. \item Each vertex $v$ of $\Gamma$ is labeled with a subset $L_v\subseteq\mathcal{R}$. A receiver $R\in \mathcal{R}$ is in $L_v$ if and only if there is a coding-direct path in $\mathcal{G}$ from the $\mathcal{G}$-object of $v$ to $R$. \end{itemize} \end{defi} In general, Anderson \emph{et al.} \cite{anderson} present the following proposition that attempts to outline the properties of a code graph: \begin{prop} For any code graph $\Gamma=\Gamma(\mathcal{G})$, we have that: \begin{itemize} \item $\Gamma$ is an acyclic graph. \item every vertex in $\Gamma$ either has in-degree 0, in which case its $\mathcal{G}$-object is a source, or it has in-degree at least 2, in which case its $\mathcal{G}$-object is a coding point. \item for each $R\in\mathcal{R}$, the set of vertices $V_R = \{v \in V \mid R \in L_v\}$ has cardinality $\abs{\mathcal{S}}$, and there are $\abs{\mathcal{S}}$ vertex-disjoint paths from the sources to this set corresponding to the original $\abs{\mathcal{S}}$ edge-disjoint paths. \end{itemize} \end{prop} The networks we consider in this work will satisfy these properties. Nonetheless, the condition on the in-degree of a coding point seems to require additional constraints. In Figure~\ref{fig:badcodepath}, the code graph construction only produces one edge to the bottom coding point. \begin{figure}[htbp] \begin{subfigure}{.25\textwidth} \begin{center} \begin{tikzpicture} \SetGraphUnit{.6} \SetVertexMath \tikzstyle{every node}=[font=\scriptsize] \renewcommand*{\VertexInterMinSize}{10pt} \Vertex{S_1} \SOEA[NoLabel](S_1){A} \NOEA(A){S_2} \SetVertexNoLabel \SO(A){B} \SOWE(B){C} \SOEA(B){D} \SOEA(C){E} \SO(E){F} \SetVertexLabel \SOWE(F){R_1} \SOEA(F){R_2} \SetUpEdge[style={->}] \Edge(S_1)(A) \Edge(S_2)(A) \Edge[color=black!30,lw=1.5pt](A)(B) \Edge(B)(C) \Edge(B)(D) \Edge(D)(E) \Edge(C)(E) \Edge[color=black!30,lw=1.5pt](E)(F) \Edge(F)(R_1) \Edge(F)(R_2) \Edge(S_1)(C) \Edge(C)(R_1) \Edge(S_2)(D) \Edge(D)(R_2) \end{tikzpicture} \end{center} \caption{The Network} \end{subfigure}\begin{subfigure}{.25\textwidth} \begin{center} \begin{tikzpicture} \SetVertexMath \SetGraphUnit{.6} \tikzstyle{every node}=[font=\scriptsize] \renewcommand*{\VertexInterMinSize}{10pt} \Vertex{S_1} \SOEA[NoLabel](S_1){A} \NOEA(A){S_2} \SetVertexNoLabel \SO(A){B} \SOWE(B){C} \SOEA(B){D} \SOEA(C){E} \SO(E){F} \SetVertexLabel \SOWE(F){R_1} \SOEA(F){R_2} \SetUpEdge[style={->}] \Edge(S_2)(A) \Edge[color=black!30,lw=1.5pt](A)(B) \Edge(B)(D) \Edge(D)(E) \Edge[color=black!30,lw=1.5pt](E)(F) \Edge(F)(R_1) \Edge(S_1)(C) \Edge(C)(R_1) \end{tikzpicture} \end{center} \caption{Paths to $R_1$} \end{subfigure}\begin{subfigure}{.25\textwidth} \begin{center} \begin{tikzpicture} \SetVertexMath \SetGraphUnit{.6} \tikzstyle{every node}=[font=\scriptsize] \renewcommand*{\VertexInterMinSize}{10pt} \Vertex{S_1} \SOEA[NoLabel](S_1){A} \NOEA(A){S_2} \SetVertexNoLabel \SO(A){B} \SOWE(B){C} \SOEA(B){D} \SOEA(C){E} \SO(E){F} \SetVertexLabel \SOWE(F){R_1} \SOEA(F){R_2} \SetUpEdge[style={->}] \Edge(S_1)(A) \Edge[color=black!30,lw=1.5pt](A)(B) \Edge(B)(C) \Edge(C)(E) \Edge[color=black!30,lw=1.5pt](E)(F) \Edge(F)(R_2) \Edge(S_2)(D) \Edge(D)(R_2) \end{tikzpicture} \end{center} \caption{Paths to $R_2$} \end{subfigure}\begin{subfigure}{.24\textwidth}\begin{center} \begin{tikzpicture} \SetVertexMath \tikzstyle{every node}=[font=\scriptsize] \renewcommand*{\VertexInterMinSize}{10pt} \SetGraphUnit{.7} \Vertex{R_1} \SOEA[NoLabel](R_1){A} \NOEA(A){R_2} \SetGraphUnit{1.1}\SO(A){R_1R_2} \SetUpEdge[style={->}] \Edge(R_1)(A) \Edge(R_2)(A) \Edge(A)(R_1R_2) \end{tikzpicture} \end{center} \caption{Code Graph} \end{subfigure} \caption{Convoluted choice of paths} \label{fig:badcodepath} \end{figure} A slight modification of this construction shows that taking a set of paths with the minimum number of coding points is insufficient to guarantee that the in-degree of every coding point is at least two. For simplicity, edges between sources and receivers are omitted. \begin{figure}[htbp] \begin{center} \begin{tikzpicture} \SetGraphUnit{.5} \SetVertexMath \tikzstyle{every node}=[font=\tiny] \renewcommand*{\VertexInterMinSize}{6pt} \renewcommand*{\VertexInnerSep}{.5pt} \Vertex{S_1} \SOEA[NoLabel](S_1){A} \NOEA(A){S_2} \SetVertexNoLabel \SO(A){B} \SOWE(B){C} \SOEA(B){D} \SO(C){G} \SO(D){H} \SOEA(G){E} \SO(E){F} \SetVertexLabel \SOWE(F){R_1} \SOEA(F){R_2} \SetGraphUnit{.3} \SOWE(S_1){S_3} \SOEA(S_2){S_4} \NOWE(C){R_3} \NOEA(D){R_4} \SetUpEdge[style={->}] \Edge(S_1)(A) \Edge(S_2)(A) \Edge[color=black!30,lw=1.5pt](A)(B) \Edge(B)(C) \Edge(B)(D) \Edge(C)(G) \Edge(D)(H) \Edge(G)(E) \Edge(H)(E) \Edge[color=black!30,lw=1.5pt](E)(F) \Edge(F)(R_1) \Edge(F)(R_2) \Edge(S_1)(C) \Edge(G)(R_1) \Edge(S_2)(D) \Edge(H)(R_2) \Edge(S_3)(A) \Edge(S_4)(A) \Edge(B)(R_3) \Edge(B)(R_4) \Edge(S_3)(R_3) \Edge(S_4)(R_4) \end{tikzpicture} \end{center} \caption{Bottom coding point has in-degree one when taking paths analogous to the above} \end{figure} Anderson \emph{et al.} \cite{anderson} also provide a criterion to determine when a labeled network is a code graph: \begin{prop} Let $\Gamma = (V,E)$ be a vertex-labeled, directed acyclic graph where each vertex $v$ is labeled with a finite set $L_v$. Let $\mathcal{S} := \{v \in V \mid v \text{ has in-degree } 0\}, \mathcal{Q} := V\backslash\mathcal{S}$, and $\mathcal{R} = \bigcup_{v\in V} L_v$. Suppose: \begin{itemize} \item The in-degree of every vertex in $\mathcal{Q}$ is at least 2. \item For each $R\in\mathcal{R}$, the set $V_R = \{v \in V: R \in L_v\}$ has $\abs{\mathcal{S}}$ vertices. \item For each $R \in \mathcal{R}$ there is a set $\Pi_R = \{\pi_{S,R}\mid S\in \mathcal{S}\}$ of vertex-disjoint paths where every vertex and edge of $\Gamma$ is contained in some $\pi_{S,R}$.b \end{itemize} Then $\Gamma$ is the code graph for a reduced multicast network whose sources, coding points, and receivers are in one-to-one correspondence with the elements of $\mathcal{S},\mathcal{Q},$ and $\mathcal{R}$, respectively. \end{prop} In Figure~\ref{fig:badpath}, we find that the condition that a single choice of vertex-disjoint paths using all edges and vertices may be insufficient to guarantee that a graph is a code graph of some multicast network. In this case, the bottom node cannot act as a coding point as the two paths to it originate from the same source. One can note that the edge between the coding points can be avoided completely when instead taking the path directly from the second source to the bottom coding point as the path to $R_1$. \begin{figure}[htbp] \begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \SetVertexMath \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.8} \Vertex{R_1} \SOEA(R_1){R_2} \NOEA[NoLabel](R_2){A} \SOEA(R_2){R_1R_2} \SetUpEdge[style={->}] \Edge(R_1)(R_2) \Edge(A)(R_2) \Edge(R_2)(R_1R_2) \Edge(A)(R_1R_2) \end{tikzpicture} \end{center} \subcaption{The Code Graph} \end{subfigure}\begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \SetVertexMath \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.8} \Vertex{R_1} \SOEA(R_1){R_2} \NOEA[NoLabel](R_2){A} \SOEA(R_2){R_1R_2} \SetUpEdge[style={->}] \Edge(A)(R_2) \Edge(R_2)(R_1R_2) \end{tikzpicture} \subcaption{Paths to $R_1$} \end{center} \end{subfigure}\begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \SetVertexMath \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.8} \Vertex{R_1} \SOEA(R_1){R_2} \NOEA[NoLabel](R_2){A} \SOEA(R_2){R_1R_2} \SetUpEdge[style={->}] \Edge(R_1)(R_2) \Edge(A)(R_1R_2) \end{tikzpicture} \end{center} \subcaption{Paths to $R_2$} \end{subfigure} \caption{Convoluted Choice of Paths} \label{fig:badpath} \end{figure} Note that it is still insufficient to require that all choices of vertex disjoint paths $\{\Pi_R\}_{R\in\mathcal{R}}$ use all edges/vertices. Consider Figure~\ref{fig:allpaths} below, which has the following forced vertex disjoint paths but for which the bottom vertex cannot be a coding point. Further in this paper, we will require various receiver placements which will ensure that the formed labeled directed acyclic graphs are code graphs. \begin{figure}[htbp] \begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\tiny] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.65} \Vertex[L={$R_2$}]{1} \SOEA[L={$R_1$}](1){4} \SOEA[L={$R_1R_2$}](4){6} \NOEA[NoLabel](4){2} \SOEA[L={$R_2$}](2){5} \NOEA[L={$R_1$}](5){3} \SetUpEdge[style={->}] \Edges(1,4,6) \Edges(2,4) \Edges(2,5) \Edges(3,5,6) \end{tikzpicture} \end{center} \caption{The Code Graph} \end{subfigure}\begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\tiny] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.65} \Vertex[L={$R_2$}]{1} \SOEA[L={$R_1$}](1){4} \SOEA[L={$R_1R_2$}](4){6} \NOEA[NoLabel](4){2} \SOEA[L={$R_2$}](2){5} \NOEA[L={$R_1$}](5){3} \SetUpEdge[style={->}] \Edges(1,4) \Edges(2,5,6) \end{tikzpicture} \end{center} \caption{Paths to $R_1$} \end{subfigure}\begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\tiny] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.65} \Vertex[L={$R_2$}]{1} \SOEA[L={$R_1$}](1){4} \SOEA[L={$R_1R_2$}](4){6} \NOEA[NoLabel](4){2} \SOEA[L={$R_2$}](2){5} \NOEA[L={$R_1$}](5){3} \SetUpEdge[style={->}] \Edges(2,4,6) \Edges(3,5) \end{tikzpicture} \end{center} \caption{Paths to $R_2$} \end{subfigure} \caption{Only one choice of paths (but not a code graph)} \label{fig:allpaths} \end{figure} There exists extensive literature, eg. \cite{KM03}, \cite{Ksc11}, \cite{SYLL15 , that follow the approach of assigning edge transfer coefficients or vertex transfer matrices directly to the multicast network. Fragouli and Soljanin \cite{FS06} introduced (as coding vectors) and Anderson \emph{et al.}\ \cite{anderson} expanded on the concept of $\mathbb{F}_q$-labelings of code graphs, which allow us to focus on the linear dependence and independence conditions of a single matrix. \begin{defi} Let $\mathcal{G}=(\mathcal{V},\mathcal{E},\mathcal{S},\mathcal{R} ,\{\mathcal{P}_R\mid R \in \mathcal{R}\})$ be a multicast network and $\Gamma=(V,E)$ be its corresponding code graph. Each $v \in V$ is labeled with a set of receivers $L_v \subseteq \mathcal{R}$. Let $V_R = \{v \in V \mid R \in L_v\}$. An $\mathbb{F}_q$-labeling of $\Gamma$ is an assignment of elements of $\mathbb{F}_q^{\abs{\mathcal{S}}}$ to the vertices of $\Gamma$ satisfying: \begin{itemize} \item The vectors assigned to the source nodes of the code graph are linearly independent and without loss of generality they can be chosen to be the standard basis. \item The vectors assigned to vertices labeled with a common receiver are linearly independent. \item The vector assigned to a coding point $Q \in V$ is in the span of vectors assigned to the tails of the directed edges terminating at $Q$. \end{itemize} We call the $\abs{\mathcal{S}} \times \abs{V}$ matrix consisting of the vectors of the $\mathbb{F}_q$-labeling, an $\mathbb{F}_q$-labeling matrix of $\Gamma$. \end{defi} Anderson \emph{et al.} \cite{anderson} note that the capacity of $\mathcal{G}$ is achievable over $\mathbb{F}_q$ if and only if there exists an $\mathbb{F}_q$-labeling of $\Gamma$. With this, it suffices to examine properties of code graphs as opposed to complete networks. In this paper, we study the solvability of a multicast network over various finite fields upon the addition of receiver placements. \begin{defi} \label{def:placementlabel} Let $\mathcal{G}=(\mathcal{V},\mathcal{E},\mathcal{S},\mathcal{R} ,\{\mathcal{P}_R\mid R \in \mathcal{R}\})$ be a multicast network and $\Gamma=(V,E)$ be its corresponding code graph and $R\in \mathcal{R}$. We call the set $V_R = \{v\in V \mid R \in L_v\}$ a receiver placement of $R$ and a vertex $v \in V_R$ a label of $R$ or more generally, a receiver label. The determinant of a receiver placement of $R$ is the maximal minor of the $\mathbb{F}_q$-labeling matrix of $\Gamma$ with columns corresponding to its labels \end{defi} Since a set of vectors forming a square matrix is linearly independent if and only if the matrix's determinant is nonzero, we examine the structure of the determinants of receiver placements. In particular, to assist in determining if such an $\mathbb{F}_q$-labeling matrix exists, we will consider the matrix over $\mathbb{F}_q[\alpha_{(u,v)}: (u,v) \in E]$ formed by assigning the standard basis to the sources and variable linear combinations of the parents' vectors, i.e.\ if $N_u$ is the vector in the $\mathbb{F}_q$-labeling matrix corresponding to a vertex $u \in V$, for some $v \in \mathcal{Q}$, we would consider the vector $\sum_{u: (u,v) \in E} \alpha_{(u,v)} \cdot N_u$. \begin{defi} Let $\mathcal{S}=\{S_1,\dots,S_n\}$ and $V_R$ be a receiver placement, i.e. $V_R = \{R^{(1)},\dots,R^{(n)}\}\subset V$. We introduce the following notations: \begin{itemize} \item $\pi_{i,j}$ denotes a path from $S_i$ to $R^{(j)}$. \item $\Pi_{R,\sigma} = \{\pi_{i,\sigma(i)}\mid i \in [n]\}$ for some $\sigma \in \mathcal{S}_n$, where $[n] = \{i\}_{i=1}^n$ and $\mathcal{S}_n$ is the symmetric group of degree $n$, is a set of paths matching the sources to the receiver labeled vertices \item $\Psi_R = \{\Pi_{R,\sigma}^{(j)} \mid \sigma \in \mathcal{S}_n, j \in [m_\sigma]\}$, where $m_\sigma$ is the number of paths, possibly 0, for this given matching of sources to receiver labeled vertices, consists of all sets of paths from the sources to the receiver labeled vertices. \item $\Phi_R = \{\Pi_{R,\sigma} = \Pi_{R,\sigma}^{(j)} \in \Psi_R \mid j \in [m_\sigma], \pi_{i,\sigma(i)}$ are vertex disjoint$\}$ consists of all sets of vertex disjoint paths from the sources to the receiver labeled vertices. \end{itemize} \end{defi} Note that the $\sigma$ corresponding to $\Pi_{R,\sigma}$ is well-defined and unique as we have $n$ sources and $n$ labels, but for a given $\sigma$, $\Pi_{R,\sigma}$ is not necessarily unique---it may not even exist. In a slight abuse of notation, we will also write $(u,v) \in \Pi_{R,\sigma}$ to denote that $(u,v) \in \pi_{i,\sigma(i)}$ for some $\pi_{i,\sigma(i)} \in \Pi_{R,\sigma}$. \begin{prop} \label{prop:detterms} Let $S_1,\dots,S_n$ denote the sources in a code graph with the $\mathbb{F}_q$-labeling matrix denoted $N$. Given a receiver placement of $R$, i.e.\ $V_R = \{R^{(1)},\dots,R^{(n)}\}$, we have \[\det(N_R) = \sum_{\Pi_{R,\sigma} \in \Phi_R} \sign(\sigma) \prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)}\in \mathbb{F}_q[\alpha_{(u,v)}: (u,v)\in E]\] where $N_R$ is the submatrix of $N$ corresponding to $R^{(1)},\dots,R^{(n)}$ and $\alpha_{(u,v)}$ is the transfer coefficient, also called channel gain, corresponding to the edge $(u,v)$ and $\mathbb{F}_q[\alpha_{(u,v)}: (u,v)\in E]$ is the multivariate polynomial ring where variables correspond to the transfer coefficients. \end{prop} This proposition says that the minor corresponding to a receiver placement in a $\mathbb{F}_q$-labeling matrix can be calculated by the sum over the sets of vertex disjoint paths to the receiver labeled vertices of the product of the transfer coefficients corresponding to the edges in any of those paths. In other words, sets including vertex-intersecting paths do not affect the minor. We first show the following property about the set $\Psi_R \backslash \Phi_R$ of sets of paths with vertex-intersecting paths. \begin{lem} \label{lem:detmatch} There is a matching of $\Psi_R \backslash \Phi_R$ without fixed points, meaning a bijective map $\mu:\Psi_R \backslash \Phi_R \rightarrow \Psi_R \backslash \Phi_R$ with $\mu \circ \mu = id$ and $\mu(\Pi_{R,\sigma})\neq\Pi_{R,\sigma}$ for all $\Pi_R\in \Psi_R \backslash \Phi_R$, such that for $\mu(\Pi_{R,\sigma}) = \Pi'_{R,\sigma'}$: \[\sign(\sigma) = -\sign(\sigma') \text{ and }\prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)} = \prod_{(u,v) \in \mu(\Pi_{R,\sigma})} \alpha_{(u,v)}\] \end{lem} \begin{proof} Let $\Pi_{R,\sigma} \in \Psi_R \backslash \Phi_R$ be arbitrary and let sources $S_{i}, S_{j}$ be the minimum $(i,j)$ (under lexicographic ordering) such that $\pi_{i,\sigma(i)}$ and $\pi_{j,\sigma(j)}$ intersect at some vertex. Let $x$ be the first vertex at which these paths intersect. Furthermore, let $\pi_{l,x} \subseteq \pi_{l,\sigma(l)}$ denote the subset of the path $\pi_{l,\sigma(l)}$ going from $S_{l}$ to $x$ and $\pi_{x,\sigma(l)} \subseteq \pi_{l,\sigma(l)}$ denote the subset of the path $\pi_{l,\sigma(l)}$ going from $x$ to $R^{(\sigma(l))}$ for $l = i,j$. We define $\mu(\Pi_{R,\sigma}) = \{\pi'_{k,\sigma'(k)}: k \in [n]\}$ where: \[\sigma'(k) = \begin{cases}\sigma(k) &\text{if }k \neq i, j\\\sigma(j) &\text{if }k = i\\\sigma(i) &\text{if }k = j\end{cases} \text{ and } \pi'_{k,\sigma'(k)} = \begin{cases}\pi_{k,\sigma(k)} &\text{if }k \neq i,j\\\pi_{i,x} \cup \pi_{x,\sigma(j)} &\text{if }k=i\\\pi_{j,x} \cup \pi_{x,\sigma(i)} &\text{if }k=j\end{cases}\] Note that this $\mu$ satisfies the desired properties: \begin{itemize} \item Clearly there is no $\mu(\Pi_{R,\sigma}) = \Pi_{R,\sigma}$ since necessarily distinct portions of the paths from two sources are swapped to get $\mu(\Pi_{R,\sigma})$. \item $\mu\circ\mu(\Pi_{R,\sigma}) = \Pi_{R,\sigma}$ as the minimum $(i,j)$ and first vertex of intersection are the same for $\Pi_{R,\sigma}$ and $\mu(\Pi_{R,\sigma})$, so applying $\mu$ again simply swaps the swapped portion back the the original paths, returning $\mu(\mu(\Pi_{R,\sigma}))$ to $\Pi_{R,\sigma}$. \item This is bijective since by the above, $\mu$ is its own inverse. \item We have that $\sign(\sigma) = -\sign(\sigma')$ as $\sigma' = \tau_{i,j}\circ\sigma$ (where $\tau_{i,j}$ denotes the transposition of $i,j$, which fixes all other elements). \item $\prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)} = \prod_{(u,v) \in \mu(\Pi_{R,\sigma})} \alpha_{(u,v)}$ as both sets of paths use exactly the same edges with the same multiplicity by definition.\qedhere \end{itemize} \end{proof} We now turn to the proof of the proposition: \begin{proof} {(Proposition \ref{prop:detterms})} Note that by definition of determinant: \[\det(N_R) = \sum_{\rho \in \mathcal{S}_n} \sign(\rho) \prod_{i=1}^n (N_R)_{i,\rho(i)}\] where we note that $\rho(i)$ determines at which receiver a path ends and $i$ determines from which source a path originates. As such, based on the line graph (like in Kschischang's argument in Appendix C \cite{Ksc11}), we see that an entry of the matrix is the sum over the paths from $S_i$ to $R^{(\rho(i))}$ of the product over the edges of the transfer coefficients, so: \[(N_R)_{i,\rho(i)} = \sum_{\pi_{i,\rho(i)}: \text{ a path}}\ \prod_{(u,v) \in \pi_{i,\rho(i)}} \alpha_{(u,v)}\] where $\pi_{i,\rho(i)}$ is any path from $S_i$ to $R^{(\rho(i))}$. Now expanding $\prod_{i=1}^n (N_R)_{i,\rho(i)}$, which is the product over the sources of the sums over different paths from that source to the desired receiver and thus the sum over the different sets of paths from the sources to the receivers of the product over those paths, we get: \[\prod_{i=1}^n (N_R)_{i,\rho(i)} = \prod_{i=1}^n \left(\sum_{\pi_{i,\rho(i)}:\text{ a path}} \left(\prod_{(u,v) \in \pi_{i,\rho(i)}} \alpha_{(u,v)} \right)\right)= \sum_{\Pi_{R,\sigma} \in \Psi_R : \sigma = \rho} \left(\prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)}\right)\] so by the uniqueness of $\sigma$ for a given $\Pi_{R,\sigma}$, we have: \[\det(N_R) = \sum_{\rho\in\mathcal{S}_n} \sign(\rho) \sum_{\Pi_{R,\sigma} \in \Psi_R: \sigma = \rho} \left(\prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)} \right)= \sum_{\Pi_{R,\sigma} \in \Psi_R} \sign(\sigma) \prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)}\] Now the only difference between our current expression for $\det(N_R)$ and the desired expression is that the set of paths $\Pi_{R,\sigma}$ for the determinant might not be vertex disjoint. But as a result of the matching in Lemma~\ref{lem:detmatch}, we have that \[\sum_{\Pi_{R,\sigma} \in \Psi_R\backslash\Phi_R} \sign(\sigma) \prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)} = \sum_{\{\Pi_{R,\sigma},\mu(\Pi_{R,\sigma})\} \subseteq \Psi_R\backslash\Phi_R} 0 = 0\] making \[\det(N_R) = \sum_{\Pi_{R,\sigma} \in \Phi_R} \sign(\sigma) \prod_{(u,v) \in \Pi_{R,\sigma}} \alpha_{(u,v)}\] as desired. \end{proof} \begin{corollary}\label{c:terms} The number of terms in $\det(N_R)$ is the number of sets of vertex disjoint paths from $S_1,\dots,S_n$ to $R^{(1)},\dots,R^{(n)}$. \end{corollary} This follows from Proposition~\ref{prop:detterms}. \begin{corollary} For a receiver placement $V_R$, the $\alpha_{(u,v)}$-degree of $\det(N_R)$ has degree at most 1. \end{corollary} This follows by noting that since the paths are vertex-disjoint, any edge can be traversed at most once among a set of paths. Therefore the corresponding variable can only appear once in a monomial corresponding to some path. \section{Triangular Semilattice Network} In this section, we introduce and discuss properties of the triangular semilattice network, a code graph with a structure that visually resembles an inverted equilateral triangle. We then seek to add receiver placements to require a greater minimum field size. \begin{defi}\label{def:triangular} Let a triangular semilattice code graph \net{n} of length $n$ for $n \in \mathbb{N}\setminus\{0\}$ be a code graph with its underlying directed acyclic graph given by the set: \begin{itemize} \item $V = \{(x,y) \in \mathbb{Z}^2 \mid x,y \geq 0, x + y < n\}$ is the vertex set; \item $E = \{((x+1,y),(x,y)): 0 \leq x+y < n-1\} \cup \{((x,y+1),(x,y)), 0 \leq x+y < n - 1\}$ is the set of edges. \end{itemize} For $1 \leq i \leq n$, we call the set of vertices $\{(a,b) \mid a+b = n-i\}$ the $i^{th}$ level where the $1^{st}$ level is denoted the top level and the $n^{th}$ level is denoted the bottom level. We enumerate the vertices in increasing order of level and then increasing order of the $x$ coordinate within the level. We may refer to the triangular semilattice network of length $n$ as any network with associated code graph \net{n}. \end{defi} Figure~\ref{fig:lattice3} shows \net{3} without receiver labels but the enumeration of the vertices. Later in this work, we will often identify vertices with the value in this enumeration. \begin{figure}[htbp] \centering\begin{subfigure}{.43\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\tiny] \renewcommand*{\VertexInterMinSize}{20pt} \SetGraphUnit{.75} \Vertex[L={$(0,2)$}]{1} \SOEA[L={$(0,1)$}](1){4} \SOEA[L={$(0,0)$}](4){6} \NOEA[L={$(1,1)$}](4){2} \SOEA[L={$(1,0)$}](2){5} \NOEA[L={$(2,0)$}](5){3} \SetUpEdge[style={->}] \Edges(1,4,6) \Edges(2,4) \Edges(2,5) \Edges(3,5,6) \end{tikzpicture} \end{center} \caption{Definition of \net{3}.} \end{subfigure}\begin{subfigure}{.43\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.75} \Vertex[L={$1$}]{1} \SOEA[L={$4$}](1){4} \SOEA[L={$6$}](4){6} \NOEA[L={$2$}](4){2} \SOEA[L={$5$}](2){5} \NOEA[L={$3$}](5){3} \SetUpEdge[style={->}] \Edges(1,4,6) \Edges(2,4) \Edges(2,5) \Edges(3,5,6) \end{tikzpicture} \end{center} \caption{Enumeration of the vertices.} \end{subfigure} \caption{Representation of a triangular semilattice code graph \net{3} with vertex enumeration.} \label{fig:lattice3} \end{figure} \begin{defi}\label{d:side-receivers} Let the left-side refer to the $n$ vertices in the \net{n} with $x$-coordinate equal to 0. Similarly the right-side refers to the $n$ vertices with $y$-coordinate equal to 0. We collectively refer to these as the sides. \end{defi} Note that embedding \net{n} as above, the left side corresponds with vertices without left children and the right side corresponds with vertices without right children. \subsection{Valid Receiver Placements} We introduce some more definitions and lemmas to help us prove the characterization of valid receiver placements, meaning labeled vertices distributed such that there is a choice of disjoint paths between sources and labeled vertices. \begin{defi} A $k$-triangle in a triangular semilattice network \net{n} is a subgraph isomorphic as a directed graph to a triangular semilattice network \net{k}. We call $k$ the length of a $k$-triangle. \end{defi} We will drop $k$ if the length of the triangle is clear from the context. Note that length can also be defined via the length of the longest path between any two vertices in the triangle (also considering number of vertices for length) or the number of vertices along the top of the triangle. \begin{defi} Given a receiver placement of $R$, a $k$-triangle is overcrowded if there are at least $k+1$ labels among its vertices. It is crowded if there are exactly $k$ labels. A $k$-triangle is distributed if no triangle contained in it is overcrowded. \end{defi} \begin{remark} It is insufficient to just consider $(n-1)$-triangles for the distributed property. Consider the network in Figure~\ref{fig:bigcrowd}, where the receiver labeled vertices are shown in gray. Note that there are 3 labels in a 2-triangle, making it not distributed but there are not 4 labels in a 3-triangle. \begin{figure}[htbp] \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.65} \Vertex{1} \SOEA(1){5} {\renewcommand{\VertexLineColor}{black!30} \renewcommand{\VertexTextColor}{black!50}\SOEA(5){8} \SOEA(8){10} \NOEA(10){9}} \NOEA(9){7} \NOWE(7){3} {\renewcommand{\VertexLineColor}{black!30} \renewcommand{\VertexTextColor}{black!50} \NOEA(7){4}} \SOWE(3){6} \NOWE(6){2} \SetUpEdge[style={->}] \Edges(1,5,8,10) \Edges(2,6,9) \Edges(3,7) \Edges(4,7,9,10) \Edges(3,6,8) \Edges(2,5) \end{tikzpicture} \end{center} \caption{No overcrowded $(n-1)$-triangle but an overcrowded 2-triangle} \label{fig:bigcrowd} \end{figure} \end{remark} \begin{defi} We say that two vertices $a$ and $b$ are consecutive if they share a child. A sequence $a_1,\dots,a_k$ of distinct vertices has consecutive vertices if $a_i$ and $a_{i+1}$ are consecutive for every $i=1,\dots,k-1$. A vertex $c$ is between $a$ and $b$ if there is a sequence of consecutive vertices with extremals $a$ and $b$ containing $c$. \end{defi} Intuitively, consecutive vertices are ``next to" each other on the same level of the network. \begin{defi} For two distinct vertices $a,b$ on the same level, we say that $a$ is to the left of $b$ (equivalently that $b$ is to the right of $a$) if its value in the enumeration is less than that of $b$. \end{defi} \begin{defi} For a vertex $a$ to the left of some vertex $b$, we say some vertex $c$ is trapped between $a$ and $b$ if the vertex is in the next level and it is between $a$'s right child and $b$'s left child. \end{defi} \begin{figure}[htbp] \begin{center} \begin{tikzpicture} \SetGraphUnit{1} \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{10pt} \SetVertexNoLabel {\renewcommand{\VertexLightFillColor}{black!50}\Vertex{A} \Vertex[x=3,y=0]{D}} \EA(A){B} \EA(B){C} {\renewcommand{\VertexLineWidth}{1.2pt}\Vertices[x=.5,y=-.5]{line}{E,F,G}} \SetUpEdge[style={->}] \Edge(A)(E) \Edge(B)(E) \Edge(B)(F) \Edge(C)(F) \Edge(C)(G) \Edge(D)(G) \end{tikzpicture} \caption{The thickly-outlined vertices are trapped between the two filled-in vertices} \label{fig:trapped} \end{center} \end{figure} \begin{defi} \label{def:extend} The extension of a $k$-triangle is the $(k+1)$-triangle containing the original $k$-triangle and all parents of the vertices in the $k$-triangle. \end{defi} \begin{lem} \label{lem:crowd} Let \net{n} be an distributed triangular semilattice network and a sequence of consecutive vertices where each vertex is contained in a crowded triangle. Then, there is a crowded triangle containing all vertices in this sequence. \end{lem} \begin{proof} We induct on the length of the sequence. If there is just one such vertex, we are done. On two consecutive vertices $x$ and $y$, we have a crowded $k$-triangle corresponding to $x$ which may intersect a crowded $l$-triangle corresponding to $y$ (where $k,l$ are some lengths). Note that if the intersection has length $i \geq 0$, it has at most $i$ labels or we have a contradiction. In that case, consider the triangle of length $k+l-i$ containing the two crowded triangles; note that it contains at least the labels in the $k$-triangle and $l$-triangle, which by Inclusion/Exclusion, have at least $k+l-i$ labels combined. By assumption, a $(k+l-i)$-triangle must have at most $k+l-i$ labels, so we have equality, thus forming a crowded triangle. Now for our inductive step, assume the result for $m\geq 2$ and consider $m+1$ consecutive vertices contained in crowded triangles. By the inductive hypothesis, we have some crowded $l$-triangle containing the first $m$ vertices. We can then apply the case for two vertices to the $m^{\text{th}}$ vertex (with the crowded $l$-triangle) and the $m+1^{\text{st}}$ vertex (with some crowded $k$-triangle) to get some crowded $j$-triangle containing all $m+1$ vertices (where $j,k,l$ are some lengths). \end{proof} \begin{lem} \label{lem:trapmatch} Let \net{n} be an distributed triangular semilattice network with $t>1$ labels in the top level. Then, there are $t-1$ unlabeled vertices in the second level such that upon labeling them, the bottom $(n-1)$-triangle is distributed. \end{lem} \begin{proof} Let $L$ be the leftmost labeled vertex in the top level. Note that it suffices to show that iteratively, for every top level labeled vertex $v \neq L$, we can label a previously unlabeled vertex trapped by $u$, the rightmost labeled vertex to the left of $v$, and $v$ such that the bottom $(n-1)$-triangle is distributed. We prove the claim by contraposition: assume that at some point, there exists a labeled vertex $v \neq L$ in the top level such that we create an overcrowded triangle in the bottom $(n-1)$-triangle for every such labeling. Then, we show that there was originally an overcrowded triangle in the network. In particular, we claim that if every labeling creates an overcrowded triangle, every vertex trapped by $v$ and the previous labeled vertex $u$ is in some crowded triangle. Each of the labeled trapped vertices forms a crowded 1-triangle. Moreover, by assumption, upon labeling each of the unlabeled trapped vertices, it is in a $k$-triangle with $\geq k+1$ labeled vertices. Without that added label, we thus have $\geq k$ labeled vertices in a $k$-triangle. If we have more than $k$ labels in this $k$-triangle, we arrive at a contradiction, otherwise, we have a crowded triangle. We can then apply Lemma~\ref{lem:crowd} to get a crowded $l$-triangle containing all of the trapped vertices. From there, we can extend the triangle to the first level to include $u$ and $v$ as in Definition~\ref{def:extend}, getting $l+2$ labels in an $(l+1)$-triangle in the original graph. \end{proof} \begin{thrm} \label{thm:valid} Given a triangular semilattice network \net{n}, a labeling $V_R$ of $n$ vertices corresponding to some receiver $R$ is valid, meaning that there are vertex-disjoint paths to the vertices labeled by $V_R$ from the sources, if and only if the network is distributed. \end{thrm} \begin{proof} We first show the forward direction. Fix a valid receiver placement and a triangle of length $k$. Consider the set $S_k$ of the vertices corresponding to the labels in the triangle. Note that the $\mincut$ from the sources to the set $S_k$ is at most $k$, since the top level of the triangle is a cut of size $k$. As such, by Menger's Theorem, there are at most $k$ vertex-disjoint paths to the set $S_k$, and thus, at most $k$ labels in the triangle. We now show the other direction by induction on $n$. The base cases of $n=1,2$ are trivial. Now assume the result for $n \geq 2$. Consider a triangular semilattice network \net{n+1} and a receiver placement satisfying the desired property. As there are at most $n$ labels in the bottom triangle of length $n$, there must be at least one label in the top level. We call the leftmost label $L$ and match the remaining $n$ vertices in the top level with the next level as follows. If there is only one label in the top level, we can iteratively match/biject all vertices in the first level, from left to right, to the leftmost unmatched vertex in the next level---in particular, we match the vertices to the left of $L$ with their right child and those to the right of $L$ with their left child. Applying the inductive hypothesis to the bottom $n$-triangle, we can extend the $n$ vertex-disjoint paths from the second level to the receivers to begin at the sources via the matching. With $\{L\}$, we then have our $n+1$ vertex-disjoint paths to the labels. Otherwise there are at least two labels in the top level. By Lemma~\ref{lem:trapmatch}, we have a matching of the labeled vertices in the top level to some trapped vertices in the next level. Note that if we enumerate the top level's vertices as $a_1,\dots,a_{n+1}$ and the second level's vertices as $b_1,\dots,b_n$, a vertex $a_i$ has children $b_{i-1}, b_i$ if $i-1,i \in [n]$. Now, we match each remaining unlabeled vertex in the top level with an unmatched child as follows: \begin{itemize} \item We can match any consecutive vertices $a_1,\dots,a_m$ up to $L$ (exclusive) by matching $a_i$ with $b_i$ for $i=1,\dots,m$. None of those $b_i$ have been matched as they are not trapped by any two labeled vertices. \item We can match any consecutive vertices $a_t,\dots,a_{n+1}$ after the rightmost labeled vertex in the top level by matching $a_{i+1}$ with $b_i$ for $i=t-1,\dots,n$. Again we note that none of these $b_i$ are trapped by any two labeled vertices. \item For the unlabeled vertices $a_r,\dots,a_s$ between two labeled vertices $u$ and $v$ in the top level, we match these to $\{b_{r-1},\dots,b_s\}\backslash\{b_p\}$ where $b_p$ is the vertex matched to $v$. For $1<r\leq i\leq p$, we match $a_i$ with $b_{i-1}$ and for $p < i \leq s$, we match $a_i$ with $b_i$. \end{itemize} Note that this process creates an bijection between vertices. Within a section (between the trapped vertices or at the ends), the process is clearly injective. Across the consecutive sections, we reach a label at position $a_j$ where the furthest right vertex the left section matches to is $b_{j-1}$ (and sections further left match to vertices further left) and the furthest left vertex the right section matches to is $b_j$. Finally, by our inductive hypothesis, we have vertex-disjoint paths from the sources/top level of the bottom $n$-triangle to the labels originally there and those added by Lemma~\ref{lem:trapmatch}. The set of vertex-disjoint paths in the original $(n+1)$-triangle is then as follows. Every label in the top level is just a path with a single vertex. For every other label in a lower level, we extend the path found in the bottom $n$-triangle via the matching with the unlabeled sources that we just found. This is vertex disjoint as there are no intersections in the top level and the paths when restricted to the bottom $n$-triangle are either empty or are as found in the inductive hypothesis. \end{proof} We can further locate some receiver placements with well-understood determinants. Previously we denoted transfer coefficients using $\alpha_{(u,v)}$ where $(u,v)\in E$. Henceforth we use $\alpha^{(i)}_j$ for the transfer coefficients of the triangular semilattice network \net{n} for $i\in [\abs{\netm{n-1}}]$, where $\abs{\netm{n-1}}$ is the number of vertices in \net{n-1} and thus the bottom $(n-1)$-triangle of \net{n}, and $j \in [2]$. Here, $\alpha^{(i)}_1$ is the transfer coefficient of the edge between vertex $(i+n)$ and its left parent and $\alpha^{(i)}_2$ is the one between $(i+n)$ and its right parent. \begin{prop} \label{prop:oneterm} Let $V_R$ be a receiver placement in a triangular semilattice network \net{n} consisting of exactly one label per level where each label is along the sides of the network, and let $V_{R'}$ be the reflected receiver placement, meaning that its labels are the remaining side labels together with the bottom one. Then \[\det(N_R)\det(N_{R'})=\pm\prod_{i \in [\abs{\netm{n-1}}], j\in [2]}\alpha_j^{(i)}\] \end{prop} \begin{proof} We prove this by induction on the length $n$ of the triangular semilattice network \net{n}. This is trivial in the case of \net{1}, as there are no variables. In the case of \net{2}, we either take the right source and the bottom vertex---for a determinant of $\alpha_2^{(1)}$---or the left source and the bottom vertex---for a determinant of $\alpha_1^{(1)}$, and we have the product is then $\alpha_1^{(1)}\alpha_2^{(1)}$, as desired. Now consider the triangular semilattice network \net{n+1} for $n \in \mathbb{N}, n \geq 2$ where we fix a receiver placement such that we have a label in each level along the sides. Let $N_R$ be the submatrix corresponding to this receiver placement. Consider: \[L = \begin{pmatrix}1&\alpha^{(1)}_1&0&\cdots&0\\0&\alpha^{(1)}_2&\alpha^{(2)}_1&\cdots&0\\\vdots&\vdots&\ddots&\vdots\\0&0&0&\cdots&\alpha^{(n)}_2\end{pmatrix}\qquad\text{or}\qquad L_{i,j} = \begin{cases}1&\text{if }i=j=1\\\alpha_1^{(j-1)}&\text{if }i+1=j\geq2\\\alpha_2^{(j)}&\text{if }i=j\geq2\\0&\text{otherwise}\end{cases}\] and \[T = \begin{pmatrix}0&\alpha^{(1)}_1&0&\cdots&0\\0&\alpha^{(1)}_2&\alpha^{(2)}_1&\cdots&0\\\vdots&\vdots&\ddots&\vdots\\1&0&0&\cdots&\alpha^{(n)}_2\end{pmatrix}\qquad\text{or}\qquad T_{i,j} = \begin{cases}1&\text{if }i=n \text{ and }j=1\\\alpha_1^{(j-1)}&\text{if }i+1=j\geq2\\\alpha_2^{(j)}&\text{if }i=j\geq2\\0&\text{otherwise}\end{cases}\] Extending to the field of fractions $\mathbb{F}_q(\alpha^{(i)}_j\mid i \in [\abs{\netm{n}}],\ j \in [2])$, note that $L^{-1}$ corresponds to the basis change taking the leftmost label and the 2$^{\text{nd}}$ level and $T^{-1}$ corresponds to the basis change taking the rightmost label and the 2$^{\text{nd}}$ level. Further note that $\det(L) = \prod_{i=1}^{n} \alpha^{(i)}_2$ and $\det(T) = \pm\prod_{i=1}^n \alpha^{(i)}_1$. To calculate $\det(N_R)$, it suffices to calculate $\det(LL^{-1}N_R)=\det(L)\det(L^{-1}N_R)$ or $\det(TT^{-1}N_R)=\det(T)\det(T^{-1}N_R)$. Now after the basis change (using $L$ if we picked the top left label and $T$ if we picked the top right label), the label's structure of the bottom $n$-triangle is identical to that of a triangular semilattice network \net{n}. Further note that the basis-changed matrix $\bar{N}_R = L^{-1}N_R$ or $T^{-1}N_R$ is in the block matrix form of \[\bar{N}_R=\begin{pmatrix}1&0\\0&\bar{N}_R'\end{pmatrix}\] where $\bar{N}_R'$ is the matrix corresponding to the bottom $n$ labels in \net{n}. Expanding by minors, we have $\det(\bar{N}_R) = \det(\bar{N}_R')$. By inductive hypothesis we have that $\det(\bar{N}_R')$ is a monomial where the product of this determinant and that corresponding to the reflection of the bottom $n$ labels is a monomial with all transfer coefficients in \net{n}. As switching between the leftmost top label and the rightmost top label swaps between $L$ and $T$, combining this with the bottom $n$-triangle for the original determinants, we get the desired result. \end{proof} As a consequence we obtain that a receiver placement $V_R$ for a triangular semilattice network \net{n} defined as in Proposition \ref{prop:oneterm} is a valid receiver for any choice of triangular semilattice network of length $n$ $n$ and there exists an $\mathbb{F}_q$-labeling with nonzero transfer coefficients for any finite field $\mathbb{F}_q$. As such, for the rest of the paper we consider the triangular semilattice network \net{n} to be equipped with two receivers: the left-side and the right-side receiver, meaning the receivers with placements $\{(0,n-1),\dots,(0,0)\}$ and $\{(n-1,0),\dots,(0,0)\}$ respectively as defined in Definition \ref{d:side-receivers}. \subsection{Invariance Under Symmetries of Receiver Placements} In this section we study properties of minors of $\mathbb{F}_q$-labelings from receiver placements. We will show that the property of having a $\mathbb{F}_q$-labeling for a receiver placement implies the existence of an $\mathbb{F}_q$-labeling for any receiver placement that is obtained from the original from either rotation or reflection with respect to the underlining graph of the network. \begin{defi} \label{def:tsnrotate} Let \net{n} defined as in Definition \ref{def:triangular}. Then, the maps $\rho:V\rightarrow V$ defined as $\rho(x,y)=(n-1-x-y,x)$ and the map $\sigma: V\rightarrow V$ defined as $\sigma(x,y)=(y,x)$ are a bijections of the set of vertices with $\rho^3=id$ and $\sigma^2=id$ respectively. \end{defi} Roughly speaking, $\rho$ represents a counterclockwise rotation of the vertices whereas $\sigma$ represents a reflection. These two maps can be naturally extended to subsets of vertices. We are going to use these maps prevalently on receivers placements, meaning that the directed structure of the network is not going to change. Let $V_R=\{v\in V \mid R\in L_v\}$ be a receiver placement, then $V_{\rho(R)}:=\{\rho(v)\in V \mid R\in L_v\}$ and $V_{\sigma(R)}:=\{\sigma(v)\in V \mid R\in L_v\}$ are two others receiver placements. Figure \ref{f:rot/ref} provide examples for the 3-semilattice network. \begin{figure}[htbp] \begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.65} \Vertex[L={$R$}]{1} \SOEA[L={$R$}](1){4} \SOEA[NoLabel](4){6} \NOEA[NoLabel](4){2} \SOEA[L={$R$}](2){5} \NOEA[NoLabel](5){3} \SetUpEdge[style={->}] \Edges(1,4,6) \Edges(2,4) \Edges(2,5) \Edges(3,5,6) \end{tikzpicture} \end{center} \caption{$V_R$ receiver placement.} \end{subfigure}\begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.65} \Vertex[NoLabel]{1} \SOEA[NoLabel](1){4} \SOEA[L={$R$}](4){6} \NOEA[L={$R$}](4){2} \SOEA[L={$R$}](2){5} \NOEA[NoLabel](5){3} \SetUpEdge[style={->}] \Edges(1,4,6) \Edges(2,4) \Edges(2,5) \Edges(3,5,6) \end{tikzpicture} \end{center} \caption{$V_{\rho(R)}$ receiver placement.} \end{subfigure}\begin{subfigure}{.33\textwidth} \begin{center} \begin{tikzpicture} \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{.65} \Vertex[NoLabel]{1} \SOEA[L={$R$}](1){4} \SOEA[NoLabel](4){6} \NOEA[NoLabel](4){2} \SOEA[L={$R$}](2){5} \NOEA[L={$R$}](5){3} \SetUpEdge[style={->}] \Edges(1,4,6) \Edges(2,4) \Edges(2,5) \Edges(3,5,6) \end{tikzpicture} \end{center} \caption{$V_{\sigma(R)}$ receiver placement.} \end{subfigure} \caption{Receiver placements of the 3-semilattice.} \label{f:rot/ref} \end{figure} \begin{thrm} Let $V_R$ be a receiver placement for a triangular semilattice network \net{n}. The following hold: \begin{enumerate} \item $V_{\rho(R)}$ and $V_{\sigma(R)}$ are valid if and only if $V_R$ is valid. \item If \net{n} is equipped with the side receivers, there exists an $\mathbb{F}_q$-labeling for \net{n} with valid receiver placements $V_{\rho(R)}$ or $V_{\sigma(R)}$ if and only if there exists an $\mathbb{F}_q$-labeling for \net{n} with the valid receiver placement $V_R$. \end{enumerate} \end{thrm} \begin{proof} By Theorem~\ref{thm:valid}, The receiver placement $V_R$ is valid if the triangular semilattice network \net{n} with the labels in $V_R$ is distributed. It is evident that being distributed is a property of the labeled network which is preserved by rotation or reflection of the labels. So it holds that $V_{\rho(R)}$ and $V_{\sigma(R)}$ are valid if and only if $V_R$ is valid. Let $N$ be a $\mathbb{F}_q$-labeling of the triangular semilattice network \net{n} with side receivers. Let $V_\mathcal{S}$, $V_\ell$ and $V_r$ in $V$ refer to the placements of the sources, the left receiver and the right receiver respectively. It holds that: \begin{align} &V_{\rho(\ell)}=V_r \textrm{ and } V_{\rho(r)}=V_\mathcal{S} \label{eq:1} \\ &V_{\sigma(\ell)}=V_r \textrm{ and } V_{\sigma(\mathcal{S})}=V_\mathcal{S}.\label{eq:2} \end{align} Let $V_R$ be a valid receiver placement and let $N$ be a $\mathbb{F}_q$-labeling. Let $N_v$ denote the column of $N$ corresponding to vector $v\in V$ and $N_{T}$ denote the submatrix of $N$ with columns indexed by $T\subseteq V$. Let $N^\rho$ be the matrix defined by the relation $N^\rho_v:=N_{\rho^{-1}(v)}$. Up to a multiplication of an invertible $|\mathcal{S}|\times |\mathcal{S}|$ matrix, $N^\rho$ is a $\mathbb{F}_q$-labeling of \net{n} with side receivers and receiver placement $V_{\rho(R)}$. In fact, by Equation \eqref{eq:1}, $N^\rho_\mathcal{S}$, $N^\rho_\ell$, $N^\rho_r$ and $N^\rho_{V_{\rho(R)}}$ are invertible since, up to reordering of the columns, they correspond to matrices $N_r$, $N_\mathcal{S}$, $N_\ell$ and $N_{V_R}$. A similar reasoning works for the reflection map $\sigma$. \end{proof} \section{Complete Study of Triangular Semilattice Network up to 4 Sources} In this section, we will demonstrate various properties relating to the receiver placements and minimum field sizes required to solve the $\mathbb{F}_q$-labeling conditions for the triangle semilattice network on small lengths. \subsection{The Triangular Semilattice Networks \net{2} and \net{3}} The 2-semilattice has three different valid receiver placements and is trivially solvable over $\mathbb{F}_2$. Note that it is the code graph for the butterfly network. The 3-semilattice has 17 different valid receiver placements. Excluding the receiver placement corresponding to the three corner nodes, all valid receiver placements have one term in its associated minor. Therefore, any choice of receiver placements that does not include that receiver placement is solvable over $\mathbb{F}_2$ by assigning all of the variables a value of $1$. When receiver placements are chosen to include those receiver placements along the left-side, along the right-side, and corresponding to the three corner nodes, $\mathbb{F}_2$ will cause one associated minor to equal zero, so the minimum field size over which the network is solvable is $\mathbb{F}_3$ \subsection{The Triangular Semilattice Network \net{4}} The triangular semilattice network \net{4} has 150 possible receiver placements. Through exhaustion (see appendix), we know that $\mathbb{F}_5$ is sufficient for \net{4} to be solvable when all 150 receiver placements are considered. We consider \net{4} together with the side receivers and we find the solvability of the network by increasing its receivers. \begin{figure}[htbp] \begin{center} \begin{tikzpicture}[scale=.65] \tikzstyle{every node}=[font=\footnotesize] \renewcommand*{\VertexInterMinSize}{15pt} \SetGraphUnit{1} \Vertices[dir=\NOEA]{line}{10,9,7,4} \Vertices[x=-1,y=1,dir=\NOEA]{line}{8,6,3} \Vertices[x=-2,y=2,dir=\NOEA]{line}{5,2} \Vertex[x=-3,y=3]{1} \SetUpEdge[style={->}] \Edges(4,7,9,10) \Edges(2,6,9) \Edge(3)(7) \Edges(1,5,8,10) \Edges(2,5) \Edges(3,6,8) \end{tikzpicture} \end{center} \caption{The triangular semilattice network \net{4}} \end{figure} \begin{prop} The semilattice network \net{4} together with any 2 receivers is solvable over $\mathbb{F}_q$ for $q \leq 3$. \end{prop} \begin{proof} First recall that having $\{1,5,8,10\}$ and $\{4,7,9,10\}$ as receiver placements forces every transfer coefficient of \net{4} to be nonzero as shown in Proposition~\ref{prop:oneterm}. Moreover, let $V_R$ be a receiver placement, then, from Corollary \ref{c:terms}, $\det(N_R)\in \mathbb{F}_q[\alpha^{(i)}_j\mid i \in [6],\ j \in [2]]$ is a multivariate polynomial with at most three terms. Let $[i,j]$ for $1 \leq i \leq j \leq 3$ represents the number of terms of the minors corresponding to the two further receivers where we assume $i \leq j$ without loss of generality. We are going to prove the theorem by working through the different cases. \begin{itemize}[leftmargin=.5cm] \item $[1,1], [1,3], [3,3]$: The minors have all odd numbers of terms and by setting all variables to 1 over $\mathbb{F}_2$, the value of every minor is then 1. \item $[1,2], [2,2]$: Set all variables to 1 over $\mathbb{F}_3$, the value of the 1-term minor would be 1 and the value of the 2-term minor(s) would be 2. \item $[2,3]$: This case is not solvable over $\mathbb{F}_2$ since then the 2-term minor is 0. We prove that this case is solvable over $\mathbb{F}_3$ by contradiction; assume that for every evaluation point $\mathsf{a}=(\mathsf{a}^{(i)}_j\mid i \in [6],\ j \in [2])\in \mathbb{F}_3^{12}$ without zero entries at least one of the minors is zero. Since all transfer coefficients must be nonzero, without loss of generality we can denote the minors as $A+B$ and $C+D+E$ where $A,B$ and $C,D,E$ are terms with no common factor respectively. In the following, swapping a nonzero value $a\in \mathbb{F}_3$ corresponds to taking the value $2a\in \mathbb{F}_3$. \begin{enumerate}[label=\arabic*)] \item[(i)]\label{item1} Let $\mathsf{a}\in \mathbb{F}_3^{12}$ be such that $(A+B)(\mathsf{a})=(C+D+E)(\mathsf{a})=0$ and $\alpha^{(i)}_j$ be a variable in $C+D+E$. Define $\mathsf{a}'\in \mathbb{F}_3^{12}$ to be equal to $\mathsf{a}$ except for $\mathsf{a}^{(i)}_j$, which is swapped; then $(C+D+E)(\mathsf{a}') \neq 0$. If the same $\alpha^{(i)}_j$ appears in $A+B$ as well, we have $(A+B)(\mathsf{a}')\neq 0$, a contradiction. If no variable in $C+D+E$ appears in $A+B$, instead define $\mathsf{a}'\in\mathbb{F}_3^{12}$ from $\mathsf{a}$ by swapping two values of it corresponding to some variable in $A+B$ and to some variable in $C+D+E$ independently to again get $(C+D+E)(\mathsf{a}')\neq 0, (A+B)(\mathsf{a}') \neq 0$, a contradiction again. \item[(ii)] Let instead for all $\mathsf{a}\in \mathbb{F}_3^{12}$ exactly one of $(A+B)(\mathsf{a})$ and $(C+D+E)(\mathsf{a})$ is 0. Note that all variables in $A+B$ must appear in $C+D+E$; assume for the sake of contradiction that there is some variable $\alpha_j^{(i)}$ which appears in $A+B$ which does not appear in $C+D+E$. Then, if $(A+B)(\mathsf{a})=0$ and $(C+D+E)(\mathsf{a})\neq0$, the evaluation point $\mathsf{a}'\in\mathbb{F}_3^{12}$ defined from $\mathsf{a}$ by swapping the value of $\mathsf{a}_j^{(i)}$ produces $(A+B)(\mathsf{a}')\neq0$ and $(C+D+E)(\mathsf{a}')\neq0$, a contradiction. If $(C+D+E)(\mathsf{a})=0,(A+B)(\mathsf{a})\neq0$, then taking $\mathsf{a}'\in\mathbb{F}_3^{12}$ defined from $\mathsf{a}$ by swapping the value of $\mathsf{a}_j^{(i)}$ produces $(A+B)(\mathsf{a}')=0,(C+D+E)(\mathsf{a}')=0$, again a contradiction for Item (i). This proves that all variables in $A+B$ must appear in $C+D+E$. \smallskip Let $\mathsf{a}\in \mathbb{F}_3^{12}$ be such that $(A+B)(\mathsf{a})= 0$ and $(C+D+E)(\mathsf{a})\neq 0$, then if $\mathsf{a}'$ is obtained by $\mathsf{a}$ by swapping one of the values corresponding to a variable contained in $A+B$, then $(A+B)(\mathsf{a}')\neq 0$ and $(C+D+E)(\mathsf{a}')=0$. Without loss of generality we can focus on the case where $\mathsf{a}\in \mathbb{F}_3^{12}$ is such that $(A+B)(\mathsf{a})\neq 0$ and $(C+D+E)(\mathsf{a})=0$. \begin{itemize} \item Consider now the case where there exists a variable $\alpha_j^{(i)}$ which appears in $C+D+E$ but not in $A+B$ and define $\mathsf{a}'\in \mathbb{F}_3^{12}$ from $\mathsf{a}$ by swapping the value of $\mathsf{a}_j^{(i)}$. Then, $(A+B)(\mathsf{a}') \neq 0$ and $(C+D+E)(\mathsf{a}')\neq 0$, a contradiction. \item Consider instead the case where $A+B$ and $C+D+E$ share the same set of variables. Let $\mathsf{a}\in \mathbb{F}_3^{12}$ be a root of $C+D+E$. As each swap changes whether $A+B$ is nonzero, if $\mathsf{a}'\in \mathbb{F}_3^{12}$ is obtained from $\mathsf{a}$ by swapping the values of two distinct variables $\alpha_{j_1}^{(i_1)},\alpha_{j_2}^{(i_2)}$ contained in $C+D+E$, we get back to $(C+D+E)(\mathsf{a}')=0$. Indeed, either the distinct variables appear in the same terms or they partition the terms. Note that two such variables $\alpha_{j_1}^{(i_1)},\alpha_{j_2}^{(i_2)}$ partitioning the terms exist since we cannot have everything sharing the same terms by assumption. Then, we are able to partition all variables as to whether they share a term with $\alpha_{j_1}^{(i_1)}$ or $\alpha_{j_2}^{(i_2)}$, so we can represent our sum in the form of $C+C+E$. This is impossible as the minor is formed by a sum of the product of transfer coefficients over different sets of paths while the repetition of $C$ corresponds to a repeated set of paths. \end{itemize} \qedhere \end{enumerate} \end{itemize} \end{proof} We can also characterize some sets of receivers in the 4-semilattice which require a larger field size. \begin{prop} \label{prop:sum3} There exists a choice of three receivers of the semilattice network \net{4} which is not solvable over $\mathbb{F}_q$ for $q \leq 3$ but it is over $\mathbb{F}_4$. \end{prop} \begin{proof} We prove that there is no evaluation point $\mathsf{a}\in \mathbb{F}_q^{12}$ without zero entries for $q=2,3$ such that the minors related to receiver placements $\{2,5,7,10\},$ $\{2,4,9,10\},\{1,4,5,10\}$ are simultaneously nonzero. It holds that \begin{align*} \det(N_{\{2, 5, 7, 10\}})&=\alpha_1^{(1)}\alpha_2^{(2)}\alpha_2^{(3)}\alpha_2^{(4)}\alpha_1^{(6)} + \alpha_1^{(1)}\alpha_2^{(2)}\alpha_2^{(3)}\alpha_1^{(5)}\alpha_2^{(6)}=A+B\\ \det(N_{\{2, 4, 9, 10\}})&=\alpha_1^{(1)}\alpha_2^{(2)}\alpha_1^{(4)}\alpha_1^{(5)}\alpha_1^{(6)} + \alpha_1^{(1)}\alpha_1^{(3)}\alpha_1^{(4)}\alpha_2^{(5)}\alpha_1^{(6)} =C+D\\ \det(N_{\{1, 4, 5, 10\}})&=\alpha_2^{(1)}\alpha_2^{(2)}\alpha_2^{(4)}\alpha_1^{(6)} + \alpha_2^{(1)}\alpha_2^{(2)}\alpha_1^{(5)}\alpha_2^{(6)} + \alpha_2^{(1)}\alpha_1^{(3)}\alpha_2^{(5)}\alpha_2^{(6)} \\ &=\alpha_2^{(1)}\frac{(A+B)(C+D)-AD}{\left(\alpha_1^{(1)}\right)^2\alpha_2^{(2)}\alpha_2^{(3)}\alpha_1^{(4)}\alpha_1^{(5)}\alpha_{1}^{(6)}} \end{align*} It is enough at least one of the three polynomials of the form $A+B, C+D$ and $(A+B)(C+D)-AD$ evaluate to zero. Over $\mathbb{F}_2$, note that $(A+B)(\mathsf{a})=1+1=0$. Over $\mathbb{F}_3$, if either $(A+B)(\mathsf{a})=0$ or $(C+D)(\mathsf{a})=0$, we are done. Otherwise, if there exists $\mathsf{a}\in\mathbb{F}_3^{12}$ such that $(A+B)(\mathsf{a})\neq 0$ and $(C+D)(\mathsf{a}) \neq 0$, then $A(\mathsf{a})=B(\mathsf{a})$ and $C(\mathsf{a})=D(\mathsf{a})$. It follows that \begin{align*} ((A+B)(C+D)-AD)(\mathsf{a}) &= ((2A)(2D))(\mathsf{a})-(AD)(\mathsf{a}) =(AD-AD)(\mathsf{a})=0\label{eq:4}. \end{align*} A solution over $\mathbb{F}_4 = \bigslant{\mathbb{F}_2}{(a^2+a+1)}$ for \net{4} with receiver placements $\{2,5,7,10\},$ $\{2,4,9,10\}$ and $\{1,4,5,10\}$ is \[\mathsf{a}=(1,a+1,a+1,a+1,a,a,a+1,a+1,a,1,a,a)\in \mathbb{F}_4^{12}.\] \qedhere \end{proof} By exhaustive search (see appendix), there exist 324 choices of 3 receiver placements (fixing the sides) that require a minimum field size of $\mathbb{F}_4$ to be solved. Also through exhaustive search, we know that any selection of up to 5 receiver placements is solvable over $\mathbb{F}_4$ or a smaller finite field. \begin{prop} There exists a choice of six receivers of the semilattice network \net{4} which is not solvable over $\mathbb{F}_q$ for $q \leq 4$ but it is over $\mathbb{F}_5$. \end{prop} \begin{proof} We prove that there is no evaluation point $\mathsf{a}\in \mathbb{F}_q^{12}$ without zero entries for $q\leq 4$ such that the minors related to receiver placements \[\{1,2,4,9\},\{1,3,4,8\},\{2,5,7,10\},\{1,4,8,9\}, \{1,4,5,10\},\{1,3,4,10\}\] are simultaneously nonzero. It holds that \begin{align*} \det(N_{\{1, 2, 4, 9\}})&= \alpha_2^{(2)}\alpha_1^{(5)} +\alpha_1^{(3)}\alpha_2^{(5)} = A + B\\ \det(N_{\{1, 3, 4, 8\}})&= \alpha_2^{(1)}\alpha_1^{(4)} + \alpha_1^{(2)}\alpha_2^{(4)} = C + D\\ \det(N_{\{2, 5, 7, 10\}})&= \alpha_1^{(1)}\alpha_2^{(2)}\alpha_2^{(3)}\alpha_2^{(4)}\alpha_1^{(6)} + \alpha_1^{(1)}\alpha_2^{(2)}\alpha_2^{(3)}\alpha_1^{(5)}\alpha_2^{(6)} = E+F\\ \det(N_{\{1, 4, 8, 9\}})&= \alpha_2^{(1)}\alpha_2^{(2)}\alpha_1^{(4)}\alpha_1^{(5)} +\alpha_2^{(1)}\alpha_1^{(3)}\alpha_1^{(4)}\alpha_2^{(5)} + \alpha_1^{(2)}\alpha_1^{(3)}\alpha_2^{(4)}\alpha_2^{(5)} = (A+B)(C+D)-AD\\ \det(N_{\{1, 4, 5, 10\}})&= \alpha_2^{(1)}\alpha_2^{(2)}\alpha_2^{(4)}\alpha_1^{(6)} + \alpha_2^{(1)}\alpha_2^{(2)}\alpha_1^{(5)}\alpha_2^{(6)} + \alpha_2^{(1)}\alpha_1^{(3)}\alpha_2^{(5)}\alpha_2^{(6)}= \alpha_2^{(1)}\tfrac{(A+B)(E+F)-BE}{\alpha_1^{(1)}\alpha_2^{(2)}\alpha_2^{(3)}\alpha_1^{(5)}}\\ \det(N_{\{1, 3, 4, 10\}})&=\alpha_2^{(1)}\alpha_1^{(4)}\alpha_1^{(6)} + \alpha_1^{(2)}\alpha_2^{(4)}\alpha_1^{(6)} +\alpha_1^{(2)}\alpha_1^{(5)}\alpha_2^{(6)} = \tfrac{(C+D)(E+F)-CF}{\alpha_1^{(1)}\alpha_2^{(2)}\alpha_2^{(3)}\alpha_2^{(4)}} \end{align*} The cases of $q=2,3$ follow from Proposition~\ref{prop:sum3} by just considering $A+B,C+D,(A+B)(C+D)-AD$. Let $\mathbb{F}_4 = \bigslant{\mathbb{F}_2}{(a^2+a+1)}$ and $\mathsf{a}\in \mathbb{F}_4^{12}$ be such that $(A+B)(\mathsf{a})\neq 0$, $(C+D)(\mathsf{a})\neq 0$ and $(D+E)(\mathsf{a})\neq 0$. Since $\mathsf{a}$ is not a zero of $A,C,E$, we can normalize the sums \[(A+B)(\mathsf{a}) = A(\mathsf{a})(1+b'), (C+D)(\mathsf{a})=C(\mathsf{a})(1+d'), (E+F)(\mathsf{a})=E(\mathsf{a})(1+f')\] where $b',d',f'\in \mathbb{F}_4^*$. It also holds that \[\frac{((A+B)(C+D)-AD)(\mathsf{a})}{(AC)(\mathsf{a})}=(1+b')(1+d')-d'=1+b'+b'd'\] \[\frac{((A+B)(E+F)-BE)(\mathsf{a})}{(AE)(\mathsf{a})}=(1+b')(1+f')-b'=1+f'+b'f'\] \[\frac{((C+D)(E+F)-CF)(\mathsf{a})}{(CE)(\mathsf{a})}=(1+d')(1+f')-f'=1+d'+d'f'\] If any of $1+b', 1+d', 1+f'$ are 0, then we are done. Otherwise if all of $1+b', 1+d', 1+f'$ are nonzero, then $b',d',f'\in\{a,a+1\}$, and by the Pigeonhole Principle we have that two of them are equal. Without loss of generality, let $b' = d'$, then note that $1+b'+b'd' = 1+b'+(b')^2=0$ by the field equation, which implies that $((A+B)(C+D)-AD)(\mathsf{a})=0$. A solution over $\mathbb{F}_5$ for \net{4} with receiver placements $\{1,2,4,9\}$, $\{1,3,4,8\}$, $\{2,5,7,10\}$, $\{1,4,8,9\}$, $\{1,4,5,10\}$ and $\{1,3,4,10\}$ is \[\mathsf{a}=(1, 4, 3, 1, 1, 4, 4, 1, 4, 3, 3, 2)\in \mathbb{F}_5^{12}.\] \end{proof} We have also found that there exist 8748 choices of 6 receiver placements that are solvable over minimum field size of $\mathbb{F}_5$. \subparagraph*{Valid Receiver Placements and Field Sizes' Implementations} Valid receiver placements for triangular semilattice networks \net{n} for $n$ up to 9 were calculated based on Theorem \ref{thm:valid} using Python and SML (see Table \ref{table:valid}). \begin{table}[htbp] \centering \begin{tabular}{c|c|c|c} Length & Valid & Invalid & Total \\ \hline 1 & 1 & 0 & 1 \\ 2 & 3 & 0 & 3 \\ 3 & 17 & 3 & 20 \\ 4 & 150 & 60 & 210 \\ 5 & 1848 & 1155 & 3003 \\ 6 & 29636 & 24628 & 54264 \\ 7 & 589362 & 594678 & 1184040 \\ 8 & 14032452 & 16227888 & 30260340 \\ 9 & 389622192 & 496540943 & 886163135 \\ \end{tabular} \caption{Number of Valid Receiver Placements}\label{table:valid} \end{table} To calculate whether a set of receiver placements is solvable in a given field size, we first calculate the minors corresponding to the receiver placements and multiply them together to get a polynomial $f$. As in the proof of the Linear Network Coding Theorem in \cite{Ksc11}, we have a nonzero solution for all of these minors if and only if $f$ has a nonzero root. This is also true if and only if the remainder of $f$ modulo $(x_i^q-x_i \mid i \in [n])$ in $\mathbb{F}_q$ is nonzero \cite[Proposition 2]{GMT08}. The largest possible minimum field size required for any set of receiver placements for \net{4} and \net{5} as been computed implementing this method on MAGMA \cite{magma}. \section{Acknowledgments} The authors are grateful to Clemson University for hosting the REU at which this work was completed. The REU was made possible by an NSF Research Training Group (RTG) grant (DMS \#1547399) promoting Coding Theory, Cryptography, and Number Theory at Clemson.
\section{\uppercase{#1}}} \newcommand{\bm}[1]{\ensuremath{\mbox{\boldmath $#1$}}} \newcommand{\cmbav}[1]{\av{#1}_{\mathrm{CMB}}} \newcommand{\lssav}[1]{\av{#1}_{\mathrm{LSS}}} \newcommand{\hat{\bf n}}{\hat{\bf n}} \newcommand{\epsilon_{dm}}{\epsilon_{dm}} \newcommand{\epsilon_{dm,0}}{\epsilon_{dm,0}} \newcommand{\langle\sigma_Av\rangle}{\langle\sigma_Av\rangle} \newcommand{\hat{\bf k}}{\hat{\bf k}} \newcommand{ \mathop{}_{\textstyle \sim}^{\textstyle >} }{ \mathop{}_{\textstyle \sim}^{\textstyle >} } \newcommand{ \mathop{}_{\textstyle \sim}^{\textstyle <}}{ \mathop{}_{\textstyle \sim}^{\textstyle <}} \newcommand{\vev}[1]{ \left\langle {#1} \right\rangle } \newcommand{{\bf x}}{{\bf x}} \newcommand{{\bf k}}{{\bf k}} \newcommand{{\bf q}}{{\bf q}} \newcommand{{\bf\Psi}}{{\bf\Psi}} \newcommand{{\bf s}}{{\bf s}} \newcommand{{\cal S}}{{\cal S}} \newcommand{{\bf y}}{{\bf y}} \newcommand{\delta_{\rm recon}}%\def$\Lambda$CDM{$\Lambda$CDM}{\delta_{\rm recon} \def$^{\prime\prime}${$^{\prime\prime}$} \defN_\ell{N_\ell} \defS_\ell{S_\ell} \def\theta_{\mathrm{FWHM}}{\theta_{\mathrm{FWHM}}} \def\bm \ell{\bm \ell} \def h^{-1} \mathrm{Mpc}{ h^{-1} \mathrm{Mpc}} \defMon. Not. R. Astron. Soc{Mon. Not. R. Astron. Soc} \defPhysics Reports{Physics Reports} \defN_{\mathrm{det}}{N_{\mathrm{det}}} \author[a,b]{Blake D.~Sherwin,} \author[c,d,e]{Martin White} \affiliation[a]{Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge CB3 0WA, UK} \affiliation[b]{Kavli Institute for Cosmology Cambridge, University of Cambridge, Cambridge CB3 0HA, UK} \affiliation[c]{Physics Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA} \affiliation[d]{Department of Physics, University of California, Berkeley, CA 94720} \affiliation[e]{Department of Astronomy, University of California, Berkeley, CA 94720} \emailAdd{<EMAIL>} \emailAdd{<EMAIL>} \title{The Impact of Wrong Assumptions in BAO Reconstruction} \keywords{cosmological parameters from LSS -- power spectrum -- galaxy clustering} \abstract{The process of density field reconstruction enhances the statistical power of distance scale measurements using baryon acoustic oscillations (BAO). During this process a fiducial cosmology is assumed in order to convert sky coordinates and redshifts into distances; fiducial bias and redshift-space-distortion parameters are also assumed in this procedure. We analytically assess the impact of incorrect cosmology and bias assumptions on the post-reconstruction power spectra using low-order Lagrangian perturbation theory, deriving general expressions for the incorrectly reconstructed spectra. We find that the BAO peak location appears to shift only by a negligible amount due to wrong assumptions made during reconstruction. However, the shape of the BAO peak and the quadrupole amplitude can be affected by such errors (at the percent- and five-percent-level respectively), which potentially could cause small biases in parameter inference for future surveys; we outline solutions to such complications.} \arxivnumber{18MM.NNNNN} \begin{document} \maketitle \flushbottom \section{Introduction} The measurement of baryon acoustic oscillations in the clustering of galaxies and the intergalactic medium provides some of our tightest constraints on the cosmological distance scale (for a review of recent measurements see \cite{BOSS_DR12}, e.g.~Fig.~14, for reviews of the methods see \cite{Wei13,PDG14}). With the exception of the intergalactic medium results, all recent measurements have employed a process known as ``reconstruction'' \cite{ESSS07}, which aims to undo some of the loss of signal due to non-linear evolution by estimating the motion of tracers under gravity and reversing it. In order to perform reconstruction, one typically assumes a fiducial cosmology to convert sky positions and redshifts into comoving coordinates; one also assumes a fiducial bias and redshift-space distortion (RSD) parameter to derive the density field from the galaxy distribution. However, the cosmology assumed may not match the true, underlying cosmology, and the fiducial bias and RSD parameters may also not equal their true values. In this paper we use Lagrangian perturbation theory to assess the impact of such errors in the assumed cosmology, biasing and RSD upon the two-point clustering of the reconstructed field. Reconstruction has been extensively studied in the literature using both N-body simulations and analytic models \cite{ESSS07,PWC09,NWP09,Seo10,Pad12,TasZal12b,McCSza12,SheZal12, Xu13,Sch15,BPH15,AchBla15,Whi15a,Coh16,Seo16,Var16,Hik17}. While the impact of incorrect choices of distance, growth rate and bias has been studied in numerical simulations in particular cases, we are not aware of any analytic treatment. Since the standard algorithm is based upon the Zel'dovich approximation \cite{Zel70}, we choose to similarly use low-order Lagrangian perturbation theory to assess the impact of incorrect assumptions about the cosmological model upon the recovered statistics. While the results will only be approximate, due to our approximate model of structure formation, they allow us to provide general formulae and hence estimate the errors introduced in any scenario. The outline of the paper is as follows. In Section \ref{sec:background} we briefly review Lagrangian perturbation theory and reconstruction and define our notation. Section \ref{sec:distances_wrong} explains the calculation of the reconstructed power spectra in a simple case where only the assumed distances are incorrect. Section \ref{sec:everything_wrong} describes the more general calculation where the distances, the growth rate and the bias assumed can all be wrong. In Section \ref{sec:discussion}, we evaluate our calculations and discuss the results. We conclude in Section \ref{sec:conclusions}. \section{Background} \label{sec:background} This section reviews material which has been extensively discussed in the literature already and is included primarily to set notation and present some results which will be of use later. We choose to study reconstruction within the framework of Lagrangian perturbation theory (largely following Refs.~\cite{Mat08a,Mat08b}). Lagrangian theory describes the evolution of large scale structure as a mapping from the original positions of a fluid element, ${\bf q}$, to the final position, ${\bf x}$, via a displacement vector, ${\bf\Psi}$. Mass conservation then implies that the Fourier-space mass density in Eulerian coordinates can be written \begin{equation} \delta({\bf k}) = \int d^3q\ e^{-i{\bf k}\cdot{\bf q}} \left( e^{-i {\bf k} \cdot {\bf\Psi}({\bf q})} - 1 \right). \label{eqn:delta_defn} \end{equation} As a first step we will neglect bias and redshift-space distortions. The computation of the power spectrum, at lowest order in (resummed) Lagrangian perturbation theory, then follows a standard procedure \cite{Mat08a,Mat08b}. Let us quickly review the steps. We compute $\langle\delta({\bf k}_1)\delta^\star({\bf k}_2)\rangle$ and use the cumulant theorem to evaluate the expectation value of an exponential: \begin{equation} \int d^3 q e^{-{\bf k} \cdot {\bf q}} \left(\left\langle e^{-i\left[{\bf k}\cdot{\bf\Psi}({\bf q}_1)-{\bf k}\cdot{\bf\Psi}({\bf q}_2)\right]} \right\rangle-1\right) \simeq \int d^3 q e^{-{\bf k} \cdot {\bf q}} \left(e^{-k^2\Sigma^2/2}\exp\left[2\,k_i k_j \xi_{ij}(q)\right]-1\right), \label{eqn:cumulant} \end{equation} where $q=\left|{\bf q}_1-{\bf q}_2\right|$, $\xi_{ij}(q)=\left\langle\Psi_i({\bf q}_1)\Psi_j({\bf q}_2)\right\rangle$ is the Lagrangian 2-point function and we have defined \begin{equation} \Sigma^2 = \int \frac{dk}{3\pi^2}\ P_L(k). \label{eqn:Sigma2} \end{equation} We caution the reader that there are other definitions of $\Sigma^2$ in the literature, differing by factors of 2. Expanding\footnote{Expanding the non-zero-lag piece of the correlator from the exponential while keeping the zero-lag ($\Sigma^2$) terms exponentiated is a reasonable approximation on large scales for CDM cosmologies, but can be problematic in general. See discussion in Refs.~\cite{TasZal12a,CLPT,Whi15a}.} the second, non-zero-lag (i.e., ${\bf q}_1 \neq {\bf q}_2$) exponential in Eq.~(\ref{eqn:cumulant}) to linear order in the $\xi_{ij}$ and dropping a constant term, the Fourier transform is simply the linear power spectrum $P_L(k)$. We thus obtain $P(k) = e^{-k^2 \Sigma^2/2}\ P_L(k) + \cdots$. This result reveals the well known fact that features in the power spectrum, such as the baryon acoustic oscillations, are damped by non-linear structure formation\footnote{In configuration space, the peak in the correlation function is convolved with a Gaussian of width $\Sigma$ and thus broadened.} \cite{Bha96}. Had we kept higher order terms (the $\cdots$), they would have included mode coupling terms which give a slight shift to the oscillations in the power spectrum or the location of the peak in the correlation function. These mode coupling terms are small, and they will be further multiplied by small factors of order the fractional errors in cosmology, bias and RSD; we will therefore neglect them in what follows. Continuing to neglect bias and redshift-space distortions, the standard reconstruction algorithm \cite{ESSS07} works as follows: we smooth the density field with a filter, $S(k)$, to remove small scale modes and compute the negative Zel'dovich displacement \begin{equation} {\bf s} ({\bf k}) \equiv -i \frac{{\bf k}}{k^2}\ S(k) \delta({\bf k}) \end{equation} The typical choice for the filter function, $S(k)$, is a Gaussian. We then displace the original density field tracers by this vector to give the ``displaced field'' \begin{equation} \delta_d({\bf k}) = \int d^3q\ e^{-i{\bf k} \cdot {\bf q}} \left( e^{-i{\bf k} \cdot \left[ {\bf\Psi}({\bf q})+{\bf s}({\bf q})\right]}-1 \right). \end{equation} We also displace a random set of particles by the same amount to give the ``shifted field'': \begin{equation} \delta_s({\bf k}) = \int d^3q\ e^{-i{\bf k} \cdot {\bf q}} \left( e^{-i{\bf k} \cdot \left[{\bf s}({\bf q})\right]}-1 \right) \end{equation} and define the reconstructed density field as $\delta_\mathrm{rec}({\bf k}) = \delta_d({\bf k})-\delta_s({\bf k})$. It then follows that \begin{equation} P_{\rm rec} = P_{dd}+P_{ss}-2P_{ds}. \end{equation} The computation of the reconstructed power spectrum $P_{\rm rec}$, at lowest order in (resummed) Lagrangian perturbation theory, then follows the same steps as above \cite{PWC09,NWP09,TasZal12b,McCSza12,SheZal12,Sch15,Whi15a,Coh16}. Working to lowest order\footnote{Continuing our neglect of higher order terms, in what follows we shall neglect the differences between Eulerian and Lagrangian positions in defining $\mathbf{s}$, since this will be higher order in $\mathbf{\Psi}$, and assume that after smoothing $\delta$ can be replaced by $\delta_L$. See Ref.~\cite{Whi15a} for further discussion.} the negative Zel'dovich displacement becomes ${\bf s}({\bf k}) = -S(k) {\bf\Psi}({\bf k})$ so the power spectrum of the shifted field is \begin{equation} P_{ss}(k) = e^{-k^2 \Sigma_{ss}^2/2}\ S^2(k)\,P_L(k) +\cdots \label{simple1} \end{equation} where $\Sigma_{ss}^2$ is as for Eq.~(\ref{eqn:Sigma2}) but with $P_L$ multiplied by $S^2$. For the displaced field, the combination ${\bf\Psi}+{\bf s}$ becomes $[1-S(k)]{\bf\Psi}({\bf k})$ so we obtain \begin{equation} P_{dd}=e^{-k^2\Sigma_{dd}^2/2}\ [1-S(k)]^2\, P_L(k) + \cdots \end{equation} where $\Sigma_{dd}^2$ is as for Eq.~(\ref{eqn:Sigma2}) but with $P_L$ multiplied by $[1-S]^2$. The cross-spectrum is \begin{equation} P_{ds}=-e^{-k^2 \Sigma_{ds}^2/2} S(k)[1-S(k)]\, P_L(k) + \cdots \label{simple2} \end{equation} with $\Sigma^2_{ds}=(\Sigma^2_{ss}+\Sigma^2_{dd})/2$. With these preliminaries in hand, we can now include bias and redshift-space distortions. For tracers that are locally biased in Lagrangian space, which we will assume throughout, the integral in Eq.~(\ref{eqn:delta_defn}) is modulated by a functional of the linear density field at the Lagrangian position: $F[\delta_L({\bf q})]$ \cite{Mat08b}. We will need only the lowest moments of this functional, as we will work throughout in the limit of linear bias which is appropriate on large scales. Taking the Fourier transform of $F$ we can write \cite{Mat08a,Mat08b} \begin{equation} \delta({\bf k}) = \int \frac{d\lambda}{2\pi} d^3q\ F(\lambda) e^{-i{\bf k}\cdot{\bf q}+i \lambda\delta({\bf q})} e^{- i{\bf k}\cdot{\bf\Psi}({\bf q})} \qquad\quad ({\bf k}\ne 0) \end{equation} Evaluating the exponential with the cumulant theorem and expanding to second order (though we again keep the zero-lag parts exponentiated) we obtain \cite{Mat08b} \begin{eqnarray} P(k) = e^{-k^2 \Sigma^2/2}\left[ 1 + \langle F' \rangle\right]^2 P_L(k) + \cdots = e^{-k^2 \Sigma^2/2} b^2 P_L(k) + \cdots, \end{eqnarray} where we have defined $b=1+\left\langle F'\right\rangle$. Redshift space distortions can also be added in a simple way in the Lagrangian perturbation theory formalism. In Eq.~(\ref{eqn:delta_defn}) we change ${\bf\Psi}({\bf q})$ to $\mathbf{R}{\bf\Psi}({\bf q})$, where the matrix $\mathbf{R}$ is defined via the RSD parameter $f$ as $R_{ij}=(\delta_{ij}+f\hat{z}_i\hat{z}_j)$ if the line-of-sight\footnote{We shall assume the plane-parallel approximation throughout. For a discussion of beyond plane-parallel terms in the Zel'dovich approximation see Ref.~\cite{CasWhi18}.} is the $\hat{z}$ direction. Using ${\bf k}\cdot\mathbf{R}{\bf k}=k^2(1+f\mu^2)$, with $\mu$ the cosine of the ${\bf k}$-vector to the line of sight, the redshift-space power spectrum then follows directly as: \begin{eqnarray} \frac{[{\bf k}\cdot\mathbf{Rk}]^2}{k^4}P_L(k) \times \exp{\left[- k_\bot^2 \Sigma^2/2 - (1+f)^2 k_\parallel^2 \Sigma^2/2 \right]} \\= [1+f \mu^2 ]^2 P_L(k) \times \exp{\left[- k_\bot^2 \Sigma^2/2 - (1+f)^2 k_\parallel^2 \Sigma^2/2 \right]}. \end{eqnarray} If we include bias at the same time the prefactor becomes $(b+f\mu^2)^2$ while the damping is unchanged. There are different choices that one can make in implementing reconstruction in the presence of redshift space distortions, and these are discussed in Refs.~\cite{Whi15a,Seo16,Coh16}. We follow the scheme in Ref.~\cite{Coh16}, again neglecting biasing at first. The shift field is computed as \begin{equation} \mathbf{s}({\bf k}) = -\frac{i {\bf k}}{k^2} S(k) \frac{\delta^{\rm obs}(k)}{1+f\mu^2} \simeq -\frac{i {\bf k}}{k^2} S(k) \delta(k). \end{equation} The displaced and shifted densities are generated by $\mathbf{R}({\bf\Psi}+{\bf s})$ and $\mathbf{R}{\bf s}$ respectively. Propagating these through a reconstruction analysis as discussed previously, we obtain \begin{equation} P_{\rm rec}({\bf k}) = [1+f \mu^2 ]^2 P_L(k) D({\bf k}) \end{equation} where \begin{align} D({\bf k}) &= S^2(k)\exp\left[-\frac{1}{2}k_\bot^2\Sigma_{ss}^2 - \frac{1}{2}(1+f)^2k_\parallel^2\Sigma_{ss}^2 \right] \nonumber \\ &+ \left[1-S(k)\right]^2 \exp\left[-\frac{1}{2}k_\bot^2\Sigma_{dd}^2 - \frac{1}{2}(1+f)^2k_\parallel^2\Sigma_{dd}^2\right] \nonumber \\ &+ 2S(k)\left[1-S(k)\right] \exp\left[-\frac{1}{2}k_\bot^2\Sigma_{ds}^2 - \frac{1}{2}(1+f)^2k_\parallel^2\Sigma_{ds}^2\right] \end{align} and the damping coefficients $\Sigma$ are defined as previously. If we now add bias, it does not affect the damping factors, but the non-zero-lag terms differ, resulting in: \begin{equation} P_{\rm rec}({\bf k}) = [b+f \mu^2 ]^2 P_L(k) D({\bf k}), \end{equation} with \begin{align} D({\bf k}) &= \left[\frac{1+f\mu^2}{b+f\mu^2}S(k)\right]^2 \exp\left[-\frac{1}{2}k_\bot^2 \Sigma_{ss}^2 -\frac{1}{2}(1+f)^2 k_\parallel^2 \Sigma_{ss}^2\right] \nonumber \\ &+ \left(1-\left[\frac{1+f\mu^2}{b+f\mu^2}S(k)\right]\right)^2 \exp\left[-\frac{1}{2}k_\bot^2 \Sigma_{dd}^2 - \frac{1}{2}(1+f)^2 k_\parallel^2 \Sigma_{dd}^2\right] \nonumber \\ &+ 2\left(\frac{1+f\mu^2}{b+f\mu^2}S(k)\right) \left(1-\left[\frac{1+f\mu^2}{b+f\mu^2}S(k)\right]\right) \exp\left[-\frac{1}{2}k_\bot^2 \Sigma_{ds}^2 - \frac{1}{2}(1+f)^2 k_\parallel^2 \Sigma_{ds}^2\right], \end{align} which agrees with the expression in Ref.~\cite{Coh16}. \section{Reconstruction with the wrong distances} \label{sec:distances_wrong} We now turn to the main focus of this paper, the impact of incorrect assumptions about the distance scale and dynamics when performing reconstruction. The impact of incorrect reconstruction assumptions has been studied in N-body simulations (e.g.~\cite{Var16}) but has not been investigated analytically before. The analytic theory turns out to be a relatively simple generalization of results which have already appeared in the literature and can be used to gain more insight into the effects that arise. In this section, we will begin by discussing the impact on reconstruction of inaccuracies in the distances. We simplify our treatment at first by considering the problem in real space, for the matter fields. In the next section we will generalize our analysis to include biasing and redshift space distortions, discussing reconstruction with incorrect fiducial growth rate and bias parameters. We assume that the impact of an incorrect choice of cosmology can be parameterized by a remapping the distance between pairs of objects as \begin{equation} r^f_\bot= \alpha_\bot r_\bot' \qquad , \qquad r^f_\parallel= \alpha_\parallel r_\parallel' \label{eqn:rescale} \end{equation} where $f$ indicates incorrectly assumed fiducial (or false) distances or other parameters, primes indicate true, physical distances, and we allow separate scalings transverse ($\alpha_\bot$) and parallel ($\alpha_\parallel$) to the line of sight. We assume further that the region being analyzed is small enough that a constant scaling is a good approximation over the relevant volume. What does this imply for our inferred, reconstructed power spectra? We first note that the volume change induced by Eq.~(\ref{eqn:rescale}) does not change our overdensities, since the effect on $\rho$ is canceled by the effect on $\bar{\rho}$. Hence we measure the following ``false'' density field: \begin{equation} \delta^f({\bf x})=\delta(\mathbf{A}^{-1}{\bf x}) \quad {\rm with}\quad \mathbf{A}=\left( \begin{array}{ccc} \alpha_\perp & 0 & 0 \\ 0 & \alpha_\perp & 0\\ 0 & 0 & \alpha_\parallel \end{array} \right) \qquad . \end{equation} Here ${\bf x}$ shall always refer to the ``observed'', false coordinates, i.e., we omit the superscript ${\bf x}^f$. It will be helpful to recall that since $\mathbf{A}$ (and its inverse) are diagonal, $(\mathbf{A}\mathbf{a})\cdot\mathbf{b}=(\mathbf{A}\mathbf{b})\cdot\mathbf{a}$ for any $\mathbf{a}$, $\mathbf{b}$. Fourier transforming $\delta^f({\bf x})$ we obtain: \begin{equation} \delta^f({\bf k}) = \alpha_\perp^2 \alpha_\parallel \delta(\mathbf{A} {\bf k}) = \alpha_\perp^2 \alpha_\parallel \int d^3q\ e^{-i \mathbf{A} {\bf k} \cdot {\bf q}} \left(e^{-i\mathbf{A} {\bf k} \cdot {\bf\Psi}({\bf q})} - 1\right) \end{equation} where ${\bf k}$, again omitting the superscript $^f$, is the conjugate wavenumber of the false coordinates. The power spectrum is given by \begin{equation} P^f({\bf k}) = \alpha_\perp^2 \alpha_\parallel\ P(\mathbf{A}{\bf k}), \end{equation} recalling that the momentum conserving $\delta$-function has units of volume. We turn now to reconstruction. Substituting $\tilde{\bf q}=\mathbf{A}{\bf q}$ and then relabeling $\tilde{\bf q}\rightarrow{\bf q}$ gives \begin{equation} \delta^f({\bf k}) = \int d^3q\ e^{-i {\bf k} \cdot {\bf q}} \left( e^{-i {\bf k} \cdot \left[ \mathbf{A} {\bf\Psi}(\mathbf{A}^{-1} {\bf q}) \right]} -1\right). \end{equation} The negative Zel'dovich displacement is \begin{equation} \mathbf{s}^f({\bf k}) = -i\,\alpha_\perp^2 \alpha_\parallel \ \frac{{\bf k}}{k^2}\ S(k)\,\delta(\mathbf{A}{\bf k}) \label{eqn:vecS_defn} \end{equation} If we define \begin{equation} \mathbf{S}(\mathbf{A} {\bf k} ) \equiv \left[ \frac{|\mathbf{A}{\bf k}|^2S(k)}{k^2}\mathbf{A}^{-1}\mathbf{A}^{-1}\right], \end{equation} then using \begin{equation} \mathbf{\Psi}(\mathbf{A}\mathbf{k}) = i\frac{\mathbf{Ak}}{|\mathbf{Ak}|^2} \delta(\mathbf{Ak}) \end{equation} we can write \begin{equation} \mathbf{s}^f({\bf k}) = -\alpha_\perp^2\alpha_\parallel \ \mathbf{S}(\mathbf{A}{\bf k})\,\mathbf{A}{\bf\Psi}(\mathbf{A}{\bf k}) \quad\Rightarrow\quad \mathbf{s}^f({\bf q})=-\mathbf{A} \mathbf{\tilde S}_{*}{\bf\Psi}(\mathbf{A}^{-1}{\bf q}) \label{shift} \end{equation} where the configuration-space expression $\mathbf{\tilde S}_{*}{\bf\Psi} \equiv \mathbf{\tilde S} \ast {\bf\Psi}$ is short for a convolution corresponding to the multiplication in Fourier space. We note that in terms of the argument $ {\bf k}'=\mathbf{A}{\bf k}$ of the Fourier transform of ${\bf\Psi}$, $\mathbf{S}$ corresponds to \begin{equation} \mathbf{S}({\bf k}' ) =\left[ \frac{ k^{'2} S(\mathbf{A}^{-1} {\bf k}')}{|\mathbf{A}^{-1} {\bf k}' |^2} \mathbf{A}^{-1} \mathbf{A}^{-1}\right] \equiv f({\bf k}')\mathbf{M}, \end{equation} where we define $\mathbf{M} =\mathbf{A}^{-1} \mathbf{A}^{-1} $ and $f({\bf k}') = k'^{2} S(\mathbf{A}^{-1} {\bf k}') / |\mathbf{A}^{-1} {\bf k}' |^2$. The displaced and shifted fields now become \begin{equation} \delta^f_s({\bf k}) = \int d^3q e^{-i {\bf k} \cdot {\bf q}} \left( e^{-i {\bf k}\cdot\left[ - \mathbf{A}\mathbf{\tilde S}_{*} {\bf\Psi}(\mathbf{A}^{-1} {\bf q})\right]} -1\right \end{equation} and \begin{equation} \delta^f_d({\bf k}) = \int d^3q e^{-i {\bf k} \cdot {\bf q}} \left( e^{-i {\bf k} \cdot \left[ \mathbf{A} {\bf\Psi}(\mathbf{A}^{-1} {\bf q}) -\mathbf{A} \mathbf{\tilde S}_{*}{\bf\Psi}(\mathbf{A}^{-1} {\bf q})\right]} -1\right). \label{displace} \end{equation} We back-substitute $\tilde {\bf q} = \mathbf{A}^{-1} {\bf q}$, relabel $\tilde{\mathbf{q}} \rightarrow \mathbf{q}$ and use ${\bf k}' = \mathbf{A} {\bf k}$ to obtain \begin{equation} \delta_s^{f}({\bf k}) = \mathrm{det}(\mathbf{A})\int d^3q\ e^{-i {\bf k}'\cdot{\bf q}} \left( e^{-i {\bf k}' \cdot\left[-\mathbf{\tilde S}_{*}{\bf\Psi}({\bf q})\right]} -1\right) \label{squash1} \end{equation} and \begin{equation} \delta_d^{f}({\bf k}) = \mathrm{det}(\mathbf{A})\int d^3q\ e^{-i{\bf k}'\cdot{\bf q}} \left( e^{-i{\bf k}'\cdot\left[{\bf\Psi}({\bf q}) - \mathbf{\tilde S}_{*}{\bf\Psi}({\bf q})\right]} -1\right), \label{squash2} \quad \end{equation} noting that ${\bf k}'= \mathbf{A}{\bf k}$ is the conjugate wavenumber of the true, physical coordinate ${\bf x}'=\mathbf{A^{-1}} {\bf x}$. These expressions were all calculated in the observed (unprimed, ${\bf x}$ or ${\bf q}$) coordinate system; however, as an aside, we note that the derivation can also be performed within the physical (primed) coordinate system, related by ${\bf q}'=\mathbf{A^{-1}} {\bf q}$. In this case we simply transform $\mathbf{s}^f({\bf q})$ into the physical (${\bf q}'$) coordinate system via $\mathbf{s}^f_i({\bf q}) \rightarrow (\partial q'_i/\partial q_j) \mathbf{s}^f_j({\bf q}({\bf q}'))$; therefore, in the physical coordinate system, the ``wrong'' shift vector is $\mathbf{A^{-1}}\mathbf{s}^f(\mathbf{A q'})$. From Eq.~(\ref{shift}) we conclude that this equals $-\mathbf{\tilde S}_{*}{\bf\Psi}({\bf q}')$; Eqs.~(\ref{squash1} - \ref{squash2}) follow. The reconstructed power spectrum, $P_{\mathrm{rec}}^f=P_{dd}+P_{ss}-2P_{ds}$, requires evaluation of \begin{eqnarray} P_{ss}&\sim&\int d^3q\ e^{-i{\bf k}'\cdot{\bf q}}\left\langle e^{-i {\bf k}' \cdot \left[ \mathbf{\tilde S}_{*} {\bf\Psi}({\bf q}_1)-\mathbf{\tilde S}_{*} {\bf\Psi}({\bf q}_2) \right]} \right\rangle \nonumber \\&=& \int d^3q\ e^{-i{\bf k}'\cdot{\bf q}}\exp\left[-\frac{1}{2}\left\langle \left( {\bf k}' \cdot \mathbf{\tilde S}_{*}{\bf\Psi}( {\bf q}_1)-{\bf k}' \cdot \mathbf{\tilde S}_{*}{\bf\Psi}({\bf q}_2) \right)^2 \right\rangle \right] \end{eqnarray} as well as similar terms for $P_{dd}$ and $P_{ds}$. Expanding out the square in the exponential gives a zero-lag part (involving products of ${\bf\Psi}$ evaluated at the same position) and a non-zero-lag piece (involving products evaluated at different positions ${\bf q}_1, {\bf q}_2$). We will evaluate these in turn. The zero-lag part of the $P_{ss}$ term is \begin{align} &\hphantom{=} \exp \left[-\left\langle \sum_{ij} k'_i [\mathbf{\tilde{S}}_{*}{\bf\Psi}(0) ]_i k'_j [\mathbf{\tilde{S}}_{*}{\bf\Psi}(0) ]_j \right\rangle \right] \nonumber \\ &= \exp \left[-\sum_{ij} k'_i k'_j \int \int \frac{d {\bf k}_1 d {\bf k}_2}{(2\pi)^6} \left[ -i \frac{\mathbf{M} {\bf k}_1}{k_1^2} \right]_i \left[ -i \frac{\mathbf{M} {\bf k}_2}{k_2^2} \right]_j f({\bf k}_1) f({\bf k}_2) \langle \delta({\bf k}_1) \delta({\bf k}_2) \rangle \right]\nonumber \\ &=\exp \left[- \sum_{i} k_i^{'2} \int \frac{d {\bf k}_1}{(2\pi)^3} \left[ \mathbf{M} {\bf k}_1 \right]_i^2 f^2({\bf k}_1) \frac{P_L(k_1)}{k_1^4} \right]\nonumber \\ &\equiv \exp\left[ - \frac{1}{2}\sum_i k_i^{'2} \Sigma^2_{ss,i} \right] \end{align} where we note that $\left[ \mathbf{M} {\bf k}_1 \right]_i=k_{1,i}/\alpha_i^2$ and we have defined $\Sigma^2_{ss,i}$ from the previous line. For the analogous zero-lag terms of $P_{dd}$ and $P_{ds}$, we obtain \begin{eqnarray} \exp \left[- \sum_{i} k_i^{'2} \int\frac{d {\bf k}_1}{(2\pi)^3} \left[ \{1-f({\bf k}_1)\mathbf{M}\} {\bf k}_1 \right]_i^2 \frac{P_L(k_1)}{k_1^4} \right] \equiv \exp\left[ - \frac{1}{2}\sum_i k_i^{'2} \Sigma^2_{dd,i}(\mathbf{A}) \right] \end{eqnarray} and \begin{eqnarray} \exp\left[ -\frac{1}{2}\sum_i k_i^{'2} \frac{\Sigma^2_{dd,i} (\mathbf{A}) + \Sigma^2_{ss,i} (\mathbf{A})}{2} \right] \equiv \exp\left[ - \frac{1}{2}\sum_i k_i^{'2} \Sigma^2_{ds,i} (\mathbf{A}) \right] \end{eqnarray} by similar manipulations. We now discuss the non-zero-lag pieces. After expanding the exponential, the non-zero-lag part of the $P_{ss}$ term is \begin{align} & \int d^3q\ e^{-i{\bf k}'\cdot{\bf q}} \sum_{ij}k'_i k'_j \left\langle[\mathbf{\tilde{S}}_{*}{\bf\Psi}({\bf q}_1)]_i [\mathbf{\tilde{S}}_{*}{\bf\Psi}({\bf q}_2)]_j \right\rangle \\ &\approx \int d^3q\ e^{-i{\bf k}'\cdot{\bf q}} \int\frac{d^3p}{(2\pi)^3}\ e^{i\mathbf{p}\cdot{\bf q}} \sum_{ij}k'_i k'_j \frac{[\mathbf{M p}]_i[\mathbf{Mp}]_jf^2(\mathbf{p})}{p^4} P_L(p) \\ &= \frac{[{\bf k}'\cdot\mathbf{Mk'}]^2f^2({\bf k}')}{k^{'4}} P_L(k') \end{align} Similarly, for the $P_{dd}$ and $P_{ds}$ terms we obtain \begin{eqnarray} \frac{\left[{\bf k}'\cdot\{\mathbf{1}-f({\bf k}')\mathbf{M} \}{\bf k}' \right]^2}{k^{'4}} P_L(k') \quad {\rm and}\quad -\frac{\left[{\bf k}'\cdot \{\mathbf{1}-f({\bf k}')\mathbf{M} \} {\bf k}' \right]\left[{\bf k}'\cdot \mathbf{M}{\bf k}' f({\bf k}')\right]}{k^{'4}} P_L(k') \quad . \end{eqnarray} Summarizing and noting that $\mathbf{k'\cdot Mk'}=|\mathbf{A^{-1} k'}|^2$ so that $\mathbf{k' \cdot Mk'}f({\bf k}') = k'^2S(\mathbf{A}^{-1}{\bf k}')=k'^2 S(k)$, while $\delta^{(D)}(\mathbf{A k})=\delta^{(D)}(\mathbf{k})/\mathrm{det}(\mathbf{A})$, we obtain: \begin{eqnarray} P_{\mathrm{rec}}^f({\bf k}) &=& \mathrm{det}(\mathbf{A}) P_L({\bf k}') \left\{\vphantom{\int} \right. \nonumber \\ &&\hphantom{+} \exp\left[ -\frac{1}{2}\sum_i k_i^{'2} \Sigma^2_{dd,i} (\mathbf{A})\right] \left[1-S(k) \right]^2 \nonumber \\ &&+ \exp\left[ -\frac{1}{2}\sum_i k_i^{'2} \Sigma^2_{ss,i}(\mathbf{A})\right] \left[S(k) \right]^2 \nonumber \\ &&+\left. \exp\left[ -\frac{1}{2}\sum_i k_i^{'2} \Sigma^2_{ds,i}(\mathbf{A})\right] 2 S(k) \left[1-S(k)\right] \right\} \end{eqnarray} This expression is our final result for the case of reconstruction with incorrect distances. We note that the results are similar in form to Eqs. (\ref{simple1}-\ref{simple2}); we recover these standard results for $\mathbf{A} =\mathbf{1}$, as expected. We note that for $\mathbf{A} =\mathbf{1}$, we recover the standard results of Eqs. (\ref{simple1}-\ref{simple2}) as expected. \section{Incorrect distances, bias and growth rate} \label{sec:everything_wrong} We now turn to the full problem: reconstruction with the wrong bias and redshift space distortion parameters, in addition to incorrect fiducial distances. Our starting point here is the density field, again measured with wrong assumptions about the distances, but now including bias and redshift space distortions as in Section \ref{sec:background}. Following an argument as in the previous section, we obtain (for $\mathbf{k}\ne 0$): \begin{equation} \delta^{f}({\bf k}) = \mathrm{det}(\mathbf{A}) \int\frac{d\lambda}{2\pi}\,d^3q\ F(\lambda) e^{-i{\bf k}'\cdot{\bf q}+i\lambda\delta({\bf q})} e^{-i {\bf k}'\cdot \left[\mathbf{R}{\bf\Psi}({\bf q})\right]}\label{eeq2}, \end{equation} with $R_{ij}=\left(\delta_{ij}+{f}\hat{z}_i\hat{z}_j\right)$. We now discuss reconstruction. In our analysis we consider a case where the growth rate is in fact $f$, but we incorrectly assume it to be $\tilde f$. We define $\tilde{R}_{ij}=\left(\delta_{ij}+\tilde{f}\hat{z}_i\hat{z}_j\right)$. Similarly the true bias is $b$ but we incorrectly assume it to be $\tilde{b}$. The negative Zel'dovich displacement we infer is then \begin{equation} \mathbf{s}^f({\bf k}) = - i\alpha_\perp^2 \alpha_\parallel \frac{{\bf k}}{k^2} S(k) \frac{\delta^{\rm obs}(\mathbf{A} {\bf k})}{{\tilde b+\tilde f\mu^2}} = - i\alpha_\perp^2 \alpha_\parallel \frac{{\bf k}}{k^2} S(k)\ \frac{ b+ f\mu_{\mathbf{A}{\bf k}}^2}{{\tilde b+\tilde f\mu^2}}\ \delta(\mathbf{A} {\bf k}), \label{densitydiv} \end{equation} where $\mu_{\mathbf{A{\bf k}}}^2 = \left[(\mathbf{A} {\bf k}) \cdot\mathbf{\hat z}/|\mathbf{A} {\bf k}|\right]^2$. Rewriting this in terms of the rescaled vector ${\bf k}' = \mathbf{A} {\bf k}$ as before and repeating the arguments following Eq.~(\ref{eqn:vecS_defn}), we obtain $\mathbf{s}^f({\bf q})$ as defined previously (Eq.~\ref{shift}), except that now $\mathbf{S}$ is instead given by \begin{equation} \mathbf{S}({\bf k}' ) \equiv \mathbf{A}^{-2} \frac{ k^{'2}}{|\mathbf{A}^{-1} {\bf k}' |^2} \left[ \frac{ b+ f\mu'^2}{{\tilde b+\tilde f\nu^2}} \right] S(\mathbf{A}^{-1} {\bf k}') \end{equation} where $\mu'=\mu_{\mathbf{A k}}={\bf k}' \cdot \hat{\mathbf{z}}/{k'}$ and we have defined $\nu^2\equiv\mu_{\mathbf{A^{-1}}{\bf k}'}^2 = \left[(\mathbf{A^{-1}}{\bf k}') \cdot\mathbf{\hat z}/|A^{-1}{\bf k}'|\right]^2=\mu^2=(\hat{\mathbf{k}}\cdot\hat{\mathbf{z}})^2$ to emphasize the distinction between the two variables. Displacing galaxies and randoms by $\mathbf{\tilde{R}}\mathbf{s}^f$, we obtain the shifted and displaced fields (assuming $\mathbf{k}\ne 0$): \begin{equation} \delta_s^{f}({\bf k}) = \mathrm{det}(\mathbf{A}) \int d^3q\ e^{-i{\bf k}'\cdot{\bf q}} e^{-i{\bf k}'\cdot\left[-\mathbf{\tilde R}\mathbf{\tilde S}_{*}{\bf\Psi}({\bf q})\right]}\label{eeq1} \end{equation} and \begin{equation} \delta_d^{f}({\bf k}) = \mathrm{det}(\mathbf{A}) \int\frac{d\lambda}{2\pi}\,d^3q\ F(\lambda) e^{-i{\bf k}'\cdot{\bf q}+i\lambda\delta({\bf q})} e^{-i {\bf k}'\cdot \left[\mathbf{R}{\bf\Psi}({\bf q}) - \mathbf{\tilde R}\mathbf{\tilde S}_{*}{\bf\Psi}({\bf q})\right]}\label{eeq2} \end{equation} Though Eqs.~(\ref{eeq1}-\ref{eeq2}) essentially follow as in the previous section, one small subtlety is that the biasing exponent $e^{i\lambda \delta(\mathbf{A^{-1}q})}$ could potentially complicate the displacement operation of Eq.~(\ref{displace}). However, our alternative derivation in the physical coordinate system proceeds exactly as previously, confirming the above expressions. We may now proceed to calculating the incorrectly reconstructed power spectrum, following the procedure in the previous section closely. To simplify the exposition, we explain all the details of the calculation in Appendix A, and here simply quote the final results: we obtain a general equation for the reconstructed power spectrum with errors in angle, distance, bias, and RSD. The final expression is: \begin{align} P_{\mathrm{rec}}^f({\bf k}) &= \alpha_\bot^2 \alpha_\parallel \left[b+f\mu^{'2}\right]^2 P_L(k') \left\{ \left[ \frac{1+\tilde f\nu^2}{\tilde b+\tilde f\nu^2} S(k)\right]^2 \mathcal{D}_{ss} \right. \nonumber \\ &+ \left. \left[1- \frac{1+ \tilde f \nu^2 }{\tilde b+ \tilde f \nu^2 } S(k) \right]^2 \mathcal{D}_{dd} + 2\left[1 - \frac{1+\tilde f\nu^2}{\tilde b+\tilde f\nu^2} S(k)\right] \left[ \frac{1+\tilde f\nu^2}{\tilde b+\tilde f\nu^2} S(k)\right] \mathcal{D}_{ds} \right\}, \label{eqn:Pfalse_rec} \end{align} where \begin{align} -2\ln\mathcal{D}_{ss} &= k_\bot^{'2} \Sigma^{{2~\tilde f, \tilde b, \mathbf{A}}}_{ss,\bot} + k_\parallel^{'2} (1+\tilde f)^2 \Sigma^{{2~\tilde f, \tilde b, \mathbf{A}}}_{ss,\parallel} \\ -2\ln\mathcal{D}_{dd} &= k_\bot^{'2} \Sigma^{{2~\tilde f, \tilde b, \mathbf{A}}}_{dd,\bot} + k_\parallel^{'2} (1+f)^2 \Sigma^{{2~\tilde f, \tilde b, \mathbf{A}}}_{dd,\parallel} \\ -2\ln\mathcal{D}_{ds} &= \frac{1}{2}\left[ -2\ln\mathcal{D}_{dd} - 2\ln\mathcal{D}_{ss} \right], \end{align} where we remind the reader that ${\bf k} =\mathbf{A^{-1}k'}$ and $\nu=\hat{{\bf k}}\cdot \hat{\mathbf{z}}$. For convenience, we will later refer to the expression in curly brackets as the damping function $D(k,\mu, \mathbf{A},\tilde{f},\tilde{b},f,b)$. The relevant damping coefficients are given by: \begin{eqnarray} \frac{1}{2} \Sigma^{2~\tilde f, \tilde b, \mathbf{A}}_{ss,\bot} = \int\frac{d {\bf k}_1}{(2\pi)^3} (1-\mu_1^2)k_{1}^2 g^2({\bf k}_1)S^2(\mathbf{A^{-1}} {\bf k}_1) \frac{P_L(k_1)}{2 k_1^4 \alpha_\bot^4 }\nonumber, \label{defS1} \end{eqnarray} \begin{equation} \frac{1}{2} \Sigma^{2~\tilde f, \tilde b, \mathbf{A}}_{ss,\parallel} = \int\frac{d{\bf k}_1}{(2\pi)^3} \mu_1^2 k_{1}^2 g^2({\bf k}_1)S^2(\mathbf{A^{-1}} {\bf k}_1) \frac{P_L(k_1)}{k_1^4 \alpha_\parallel^4 }\nonumber \end{equation} and \begin{eqnarray} \frac{1}{2}\Sigma^{2~\tilde f, \tilde b, \mathbf{A}}_{dd,\bot} = \int \frac{d {\bf k}_1}{(2\pi)^3} (1-\mu^2) k_{1}^2 (1- \frac{g({\bf k}_1)S(\mathbf{A^{-1}}{\bf k}_1)}{\alpha_\bot^2})^2\frac{P_L(k_1)}{2 k_1^4 } \end{eqnarray} \begin{eqnarray} \frac{1}{2} \Sigma^{2~\tilde f, \tilde b, \mathbf{A}}_{dd,\parallel} = \int\frac{d {\bf k}_1}{(2\pi)^3} \mu^2 k_{1}^2 (1- \frac{1+\tilde f}{(1+ f)\alpha_\parallel^2}g({\bf k}_1)S(\mathbf{A^{-1}}{\bf k}_1))^2 \frac{P_L(k_1)}{k_1^4 }, \end{eqnarray} where $g({\bf k}') = \left[\frac{ k^{'2}}{|\mathbf{A}^{-1} {\bf k}' |^2} \frac{ b+ f\mu'^2}{{\tilde b+\tilde f\nu^2}} \right]$. We note that, aside from errors in angle, distance, bias, and RSD, other wrong assumptions in cosmological parameters could occur; however, as long as these do not affect the construction of the displacement in Eq.~(\ref{densitydiv}), they do not have any reconstruction-specific effects. For example, even if the wrong linear power spectrum shape was assumed, the measured power spectrum would still be well-approximated by Eq.~(\ref{eqn:Pfalse_rec}) with the true $P_L(k)$. \section{Discussion} \label{sec:discussion} To gain an understanding of the impact of incorrect BAO reconstruction, we will now evaluate the expressions derived above for different types of wrong assumptions made in reconstruction. In particular, we will evaluate the multipoles of the wrongly-reconstructed power spectrum \begin{equation} P_\ell(k) = \frac{2\ell+1}{2}\int_{-1}^{1} d\mu\ P^f_{\mathrm{rec}}(k,\mu)\mathcal{L}_\ell(\mu) \end{equation} where $\mathcal{L}_\ell$ is the Legendre polynomial of order $\ell$. We will consider the following errors, each in turn: (i) a wrong scaling perpendicular to the line of sight, by $\alpha_\perp = 1.03$; (ii) an incorrect scaling along the line of sight, by $\alpha_\parallel = 1.03$ (iii) an incorrect bias of $b=1.1\times 2$ (the actual bias is taken to be $b=2$) (iv) an incorrect RSD parameter of $f=1.3\times 0.55$ (where the correct $f=0.55$). A $3\%$ error in distances was chosen because it corresponds approximately to the difference between the Planck and WMAP cosmologies evaluated at the redshifts of the BOSS survey. To calculate the matter power spectrum, we will use the fitting formula of \cite{EisHu}, assuming the TT, TE, EE + lowP + lensing + ext cosmology of the 2015 Planck release \cite{PlanckParams}. We will further assume a Gaussian smoothing function $S(k)=e^{-k^2\Sigma_{\mathrm{sm}}^2/4}$ following \cite{PWC09}, with a default smoothing scale of $\Sigma_{\mathrm{sm}}=14.1$ Mpc/h, though we will also discuss the impact of other choices. We begin by considering the Fourier space spectra obtained by calculating the multipoles of Eq.~(\ref{eqn:Pfalse_rec}). For different types of `wrong reconstruction', we show the differences between the incorrectly reconstructed monopole and quadrupole power spectra and the correctly reconstructed versions in Fig.~\ref{fig:Pk_all_diff}. For errors in $f$ and $b$, changes of order 1\% in the monopole are seen on some scales. Comparing with the default monopole, it can be seen that the incorrect reconstruction spectrum is approximately related to the default reconstruction spectrum by a transfer function that changes the oscillation envelope of the BAO peaks for both monopole and quadrupole, but does not change the peak locations significantly. A similar conclusion -- that the peak positions are not significantly affected by incorrect reconstruction -- applies when considering errors in cosmology, i.e. $\alpha_\perp \neq 1$ or $\alpha_\parallel \neq 1$; however, it should be noted that in this case, we should not compare the BAO peak scale with the $\alpha=1$ cases, but instead must search for the ``extra'' shift from incorrect reconstruction by comparing the measured scale with the rescaled correctly reconstructed power spectrum $P({\bf k}')$\footnote{The rescaled correctly reconstructed power spectrum is obtained by simply substituting $k, \nu$ by $k', \mu'$, and preserving the normalizing prefactor $\alpha_\parallel \alpha_\perp^2$ for simpler comparisons.}. We now approximately quantify the BAO monopole scale shift in Fourier space; rather than perform a fit for the BAO scale for a certain experimental configuration, we simply use the average of the first peak and trough locations as a rough estimate for the BAO scale (noting that higher peaks give consistent results). For the given errors in $\alpha_\perp$, $\alpha_\parallel$, $b$, $f$ we find monopole peak position shifts of order $\sim 3 \times 10^{-4}$ or less compared to the rescaled correctly reconstructed spectrum\footnote{An explanation for the non-zero (but still negligible) shifts found for $\alpha \neq 1$ could be that the smooth functions multiplying the oscillations (such as the damping factors) are modified by incorrect reconstruction in a way that is anisotropic; therefore, the relative contributions of perpendicular and parallel BAO scales to the BAO monopoles and quadrupoles is changed, resulting in a non-zero shift in the peak positions. This -- already negligible -- effect could be further reduced by fitting different damping scales in the line-of-sight-perpendicular and parallel directions; or perhaps to some extent by fitting a mean damping scale, as is typically done.}. This difference is negligible for experiments operating in the foreseeable future, and likely smaller than shifts induced by terms we have neglected. To gain further insight, a configuration space picture is helpful. Appropriately Fourier transforming the power spectra, we obtain the equivalent configuration space correlation functions, which are shown in Fig.~\ref{fig:Xi_all}. We also show the ratio of the correctly and incorrectly reconstructed correlation functions in Fig.~\ref{fig:Xi_all_ratio}. Fig.~\ref{fig:Xi_all_ratio} is particularly illuminating, as it confirms and clarifies our previous discussion. It can be seen from the plots of the correlation function ratios (as well as the correlation functions themselves in Fig.~\ref{fig:Xi_all}) that the BAO peak position is only negligibly affected, with the ratio fairly flat close to the BAO peak scale. Quantifying this, we find that the peak position is only affected at the negligible level of less than $\sim 2 \times 10^{-4}$, consistent with our Fourier space calculation. However, we see that incorrect reconstruction affects the peak and broadband shapes at the percent level. Why is the shift in the BAO position so small? To gain more understanding, we Taylor expand the analytical expressions for the reconstructed power spectrum (Eq.~\ref{eqn:Pfalse_rec}) in small errors $\mathbf{\Delta}$ in parameters such as distances $\mathbf{A}=\mathbf{1}+\mathbf{\Delta}$. If all first order corrections cancelled, this would provide an explanation for why shifts in the BAO peak scale are so small. However, we find that the linear terms of order $\mathbf{\Delta}$ do not directly cancel when expanding the reconstructed power spectrum; this is consistent with our observation that the broadband is affected substantially by wrong reconstruction (with changes of a few percent, i.e.~the same order as the fractional error in distances or other parameters). However, in the limit where the peaks are very narrow -- much narrower than the scale over which the damping function varies -- we can gain more intuition for the robustness of the position of the BAO peak. One of our key results is that wrong reconstruction only substantially modifies the damping factor $D$ in Eq.~\ref{eqn:Pfalse_rec}, beyond the usual Alcock-Paczynsky rescaling of the biased power spectrum ($P({\bf k}) \rightarrow P(\mathbf{A}{\bf k})$). For sharp peaks, simply modifying the slowly-varying damping factor, $D\rightarrow D + \mathbf{\Delta} \cdot \partial D / \partial \mathbf{\Delta}$, cannot significantly shift the positions of any of the peaks, because the location of an unperturbed maximum or minimum cannot be affected by a sufficiently smooth modulation. While the Alcock-Paczynski rescaling does change the peak positions in the biased power spectrum $P$ to leading order in $\mathbf{\Delta}$, in this case the first order effect is removed by comparing the peak positions to those in the rescaled, correctly reconstructed power spectrum. Since the first order effects in both $P$ and $D$ are thus removed, the leading order effect is a second order (or higher) one in $\mathbf{\Delta}$ -- consistent with the observation of $\sim 10^{-4}$ shifts in the peak positions for a $3\%$ error in the distances. \begin{figure*} \centering \subfigure[Wrong $\alpha_\perp$=1.03 ]{\includegraphics[width=.48\textwidth,clip]{finalPowerSpecDiffApp103100BiasRSD20055.eps}} \subfigure[Wrong $\alpha_\parallel$=1.03 ]{\includegraphics[width=.48\textwidth,clip]{finalPowerSpecDiffApp100103BiasRSD20055.eps}}\\ \subfigure[Wrong $b=1.1\times 2$ ]{\includegraphics[width=.48\textwidth,clip]{finalPowerSpecDiffApp100100BiasRSD22055.eps}} \subfigure[Wrong $f=1.3\times 0.55$ ]{\includegraphics[width=.48\textwidth,clip]{finalPowerSpecDiffApp100100BiasRSD20071.eps}}\\ \label{tbf} \caption{Effect of errors in fiducial cosmology, bias and RSD on the reconstructed power spectra. Shown are the differences between the incorrectly reconstructed power spectra and the correctly reconstructed default ones; the monopole difference is plotted in blue, the quadrupole difference in red. For reference, the default reconstructed power spectrum monopole itself is shown, rescaled by a factor $0.03$, with a black dotted line. (Note that for all power spectra we have isolated the BAO feature by first subtracting a ``no-wiggle'' power spectrum without oscillations \cite{EisHu} and then dividing by the linear power spectrum amplitude.)} \label{fig:Pk_all_diff} \end{figure*} \begin{figure*} \centering \subfigure[Wrong $\alpha_\perp$=1.01 ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationDiffApp103100BiasRSD20055.eps}} \subfigure[Wrong $\alpha_\parallel$=1.01 ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationDiffApp100103BiasRSD20055.eps}}\\ \subfigure[Wrong $b=1.1\times 2$ ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationDiffApp100100BiasRSD22055.eps}} \subfigure[Wrong $f=1.3\times 0.55$ ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationDiffApp100100BiasRSD20071.eps}}\\ \label{tbf} \caption{Configuration space picture of wrong reconstruction. Shown are the wrongly reconstructed correlation function (solid line), the rescaled correctly reconstructed correlation function (with ${\bf k}\rightarrow \mathbf{A}\mathbf{k}$; dashed line) and the default correctly reconstructed correlation function (dotted line). To show the differences from the default reconstruction more clearly, we add twice the difference with respect to the default reconstruction to the wrong and rescaled curves. The monopole is shown in blue, the quadrupole in red.} \label{fig:Xi_all} \end{figure*} \begin{figure*} \centering \subfigure[Wrong $\alpha_\perp$=1.03: ratio ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationRatioApp103100BiasRSD20055.eps}} \subfigure[Wrong $\alpha_\parallel$=1.03: ratio ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationRatioApp100103BiasRSD20055.eps}}\\ \subfigure[Wrong $b=1.1\times 2$: ratio ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationRatioApp100100BiasRSD22055.eps}} \subfigure[Wrong $f=1.3\times 0.55$: ratio ]{\includegraphics[width=.48\textwidth,clip]{finalCorrelationRatioApp100100BiasRSD20071.eps}}\\ \label{tbf} \caption{The ratio of the wrongly reconstructed correlation function to the rescaled correctly reconstructed correlation function. As before, blue indicates the monopole, red the quadrupole. The deviation from unity of the quadrupole has been reduced by a factor $5$ to fit on the same plot scale (it is also only shown for $r>18 \mathrm{Mpc}/h$, since the zero-crossing of the quadrupole at smaller $r$ makes ratios somewhat unstable). It can be seen that no appreciable change in the BAO peak scale results from wrong reconstruction, though the peak shape and quadrupole amplitude can be changed somewhat.} \label{fig:Xi_all_ratio} \end{figure*} We now turn to the magnitude of the quadrupole. From Fig.~\ref{fig:Xi_all_ratio} (as well as Fig.~\ref{fig:Pk_all_diff}), we note that the size and shape of the quadrupole is affected at the $\sim 5\%$ level by even moderate errors in the fiducial cosmology, RSD parameters and biases. Some care must thus be taken when using quadrupole information, especially at small separations $r$, and incorrect reconstruction assumptions should be considered and investigated as a cause of anomalous quadrupole signals. We also investigate the impact of using a larger smoothing scale $\Sigma_{\mathrm{sm}}=20~\mathrm{Mpc}/h$ and a smaller scale $10~\mathrm{Mpc}/h$ than that of our default analysis ($\Sigma_{\mathrm{sm}}=14.1 ~\mathrm{Mpc}/h$). Our previous results for the BAO peak shift still hold in both cases -- the shifts we obtain are at the level of $3 \times 10^{-4}$ or less and thus negligible. The detailed form of the correlation function, however, is affected at some level by a different scale choice. In particular, the deviations from unity in the correlation function ratio as shown in Fig.~3 increase somewhat (by a factor 1-2 for the monopole, 2-3 for the quadrupole) when we use the smaller $10~\mathrm{Mpc}/h$ smoothing scale; when using the larger smoothing scale, the departures from unity are reduced by a factor 1-2 for the monopole and $\approx$2 for the quadrupole. Despite this, our results are qualitatively similar in all cases and our conclusions are thus not strongly dependent on the smoothing scale. A caveat to our analysis is that we have only expanded the non-zero-lag terms in our derivation to leading order in perturbation theory. At higher order, mode-coupling terms are known to enter and lead to shifts in the BAO peak position. However, as mentioned previously, assuming that the errors in the assumed cosmology, bias or RSD parameters are fairly small, any modification of the mode-coupling part will arise from a product of these small errors and the small higher order mode-coupling terms; such terms are thus expected to be negligible. How do our results compare to previous work based on simulations? In \cite{Xu13}, the authors find mean shifts in the BAO scale of order $\leq 10^{-3}$ when assuming 20\% errors on bias and RSD parameters, but given the scatter on their results these shifts do not differ from zero with statistical significance. Errors when assuming a significantly wrong cosmology ($\Omega_m = 0.4$) are larger, but the authors use a linearized template that, the authors note, is expected to fail for large deviations in cosmology. Ref.~\cite{Var18} perform a similar analysis with a wrong fiducial cosmology which differs by $0.5\%$ in the matter density $\Omega_m$. They find a shift of $\approx 9\times 10^{-4}$ for wrong reconstruction. Ref.~\cite{Meh15} also investigated BAO reconstruction in presence of errors on the bias parameters, but they focus on the damping and do not report potential shifts. Thus, while our results are generally in agreement with simulated results, in a few cases the simulations give slightly higher values of the spurious shifts in the BAO scale. One possible explanation for this is that the shape of the BAO peak (or oscillation envelope in Fourier space) is modified in our calculation, which could lead to non-negligible shifts when fitting with an unmodified template. Our work suggests that a straightforward solution to this problem would be to use Eq.~(\ref{eqn:Pfalse_rec}) or a fitting function of a similar form as the expectation value for the power spectrum in constructing a likelihood. We note that the information content might be slightly enhanced by such a choice, as the peak shape or oscillation envelope may contain some information about parameters such as $\alpha_\perp$. However, it is unclear how much of this information would still be present after marginalizing over all nuisance parameters (such as the damping scale). As an alternative to modifying the likelihood, one could consider marginalizing the power spectrum measurement not just over an additive broadband component, but also a multiplicative component in Fourier space. Other solutions might include iterating the reconstruction until the cosmology is converged; given that the effects of wrong reconstruction are small, we expect convergence to be rapid (although propagating noise fluctuations through reconstruction could potentially also cause small biases). We defer an exploration of all these ideas to future work. \section{Conclusions} \label{sec:conclusions} In this paper we have analytically calculated how wrong assumptions about the fiducial cosmology, bias and RSD parameters impact the reconstructed power spectrum. We have derived a full expression for this power spectrum (Eq.~\ref{eqn:Pfalse_rec}) and have evaluated it for realistic scenarios. Assuming large but not unrealistic reconstruction errors ($3\%$ on distances, $10\%$ on bias, $30\%$ on RSD) we find that: \begin{itemize} \item The shifts in the BAO monopole peak position(s) in both Fourier and configuration space appear negligible. \item The shape of the BAO peak or the oscillation envelope in Fourier space can be modified at the percent level. Fitting with a wrong template could potentially lead to small errors in parameter inference; possible solutions include incorporating a wrong-reconstruction template (from Eq.~\ref{eqn:Pfalse_rec}) in the likelihood, marginalizing over an oscillation envelope shape in a Fourier space analysis, or potentially iterating the reconstruction. \item The quadrupole can be affected at the $5\%$ level by even moderate errors in the assumed cosmology, bias and RSD. \end{itemize} Future research directions include investigating new likelihoods or iterative fitting and examining whether wrong reconstruction impacts BAO constraints on $N_\mathrm{eff}$, the effective number of neutrinos \cite{NeffTh,NeffMeas}. \acknowledgments{We thank Hee-Jong Seo and Florian Beutler for helpful comments on the draft as well as useful discussions. BDS acknowledges support from an Isaac Newton Trust Early Career Grant as well as an STFC Ernest Rutherford Fellowship. BDS also thanks Lawrence Berkeley Laboratory and the Berkeley Center for Cosmological Physics for hospitality during the completion of this work. MW is supported by the DOE and by NSF.}
\section{Introduction} \setcounter{equation}{0} It is well known that General Relativity (GR) exhibits serious incompatibilities when it comes to link its domain of validity with the realm of Quantum Field Theory. The hope is to overcome these obstacles, so that it would be possible to describe the behavior of any interaction including gravity even when quantum effects are not negligible. In this direction, many reasonable and solid proposals have been made (such as Loop Quantum Gravity and String Theory), but the sensation is that there is still a great amount of conceptual problems and obstacles to overcome. However, there is a shared and accepted awareness that allows us to look for a unified theory at Planck scale (namely $m_P\simeq 10^{19}$ GeV); this fact may not be surprising from a theoretical point of view anymore, but practically it means that it is impossible to detect even the smallest signal of quantum gravity. In other words, experiments do not provide any criterion to discern whether a physical argument can be rejected or not at those energy levels. Nevertheless, even in current laboratory tests, there is still the possibility to search for little traces that can be directly related to an underlying unified theory, and one of the most important concepts in this perspective is represented by Lorentz symmetry breaking. Such a violation is highly recurrent in many candidates of quantum gravity, and for this reason it is considered an essential notion to take into account for a natural extension of our knowledge in such an unknown domain. Actually, Lorentz violation has widely been used as one of the main bedrocks on which to develop physics beyond the Standard Model (SM). SME (Standard Model Extension~\cite{Kost1,Kost4,newkost,Kost2}) is therefore born within this environment, and it is considered one of the most important effective field theories that includes SM as a limiting case. The intuition at the basis of SME comes from the study of covariant string field theory~\cite{string}. The idea is to build all possible scalars of the SME Lagrangian by contracting SM and gravitational fields with suitable coefficients that induce Lorentz (and CPT) violation. Of course, we expect these coefficients to be heavily suppressed, and thus to be considered extremely small if analyzed at current scales. However, many focused experiments have been performed to put constraints on their values and to gather useful information on them~\cite{Kost5}. For an accurate overview on SME, see Ref.~\cite{bluhm}. In this paper, we consider the Casimir effect in curved spacetime, where the metric is deduced by the gravitational sector of the SME Lagrangian. Generally speaking, the Casimir effect~\cite{casimir1,casimir2} arises when a quantum field is bounded in a finite space. Such a confinement reduces the modes of the quantum field producing, as a consequence, a measurable manifestation. The Casimir effect has been studied in flat spacetime in great detail~\cite{casimir_exp1,nesterenkoC,nesterenkoC2,nesterenkoC3,nesterenkoC4,nesterenkoC5,nesterenkoC6,nesterenkoC7,casimir_exp2,casimir_exp3, casimir_exp4}, showing the robustness of the assumptions at the basis of its theoretical explanation. In this framework, there are already works that study the Casimir effect with the contribution of the SME coefficients for the fermion and photon sector~\cite{frank,escobar}. In some recent papers~\cite{setare, calloni, caldwell,sorge,EspNapRos, BimEspRos, Calloni14, Borzoo, BuoCan,TanPir,lamb}, instead, the analysis of the role of a gravitational field in the vacuum energy density of a quantum field inside a cavity has been performed. This opened the doors to many interesting developments and lines of research. Indeed, an interesting investigation on the consistency between the Casimir energy and the equivalence principle is conduced in Refs.~\cite{Fulling}. Moreover, possible modifications in the vacuum energy could become relevant in the dynamics of the universe~\cite{caldwell,brevik}. Microscopically, modifications of Casimir's energy could be crucial in the context of quark confinement based on string interquark potentials~\cite{lambiase,lambiase2,lambiase3,lambiase4}. Finally, the implications of gravity on Casimir effect deal with the open issue regarding the limits of validity of GR at small distances~\cite{mostepanenko}. The aims of this article are essentially two: \begin{itemize} \item[--] to obtain a significant and plausible constraint on SME Lorentz-violating terms derived within a Post-Newtonian expansion of the metric tensor describing the spacetime in proximity of a point-like source of gravity \cite{Kost3}; \item[--] to see how the pressure between the Casimir plates changes in the above context. \end{itemize} In order to do this, we analyze the dynamics of a massless scalar field in the context of Casimir effect, employing a technique already used in the search for direct evidences of extended theories of gravity \cite{lamb,FOG_CGL2,stabile_stabile_cap,stabstab,FOG_CGL}. Klein-Gordon equation between the two Casimir plates shall be solved, assuming that the distance between them is much smaller than the distance between the source of the gravitational field and the plates. The paper is organized as follows: in Sec.~II the metric tensor is presented, as derived in the Post-Newtonian approximation of the purely gravitational sector of SME in Ref.~\cite{Kost3}. In Sec.~III the dynamics of a canonic massless scalar field is studied within the Casimir plates, and in Sec.~IV the bound and the expression for the pressure are obtained. Discussions and conclusions are given in Sec.~V. \section{Metric tensor for a point-like source with Lorentz-violating terms} \label{sect1} The most general Lagrangian density for the SME gravitational sector of Ref.~\cite{Kost2} contains both a Lorentz-invariant and a Lorentz-violating term. The background is represented by a Riemann-Cartan spacetime, but for our purposes we take the limit of vanishing torsion, in such a way that the Lorentz-invariant part is the usual Einstein-Hilbert contribution. The effective action in which we consider only the leading-order Lorentz-violating terms is thus given by \begin{equation} S=S_{EH}+S_{LV}+S_{m}, \end{equation} where \begin{equation} S_{EH}=\frac{1}{2\kappa}\int d^{4}x\,\sqrt{-g}\,\mathcal{R}, \end{equation} is the aforementioned Einstein-Hilbert action, with $\kappa=8\pi G$, $S_{m}$ the matter action and $S_{LV}$ the Lorentz-violating term: \begin{equation}\label{lfields} S_{LV}=\frac{1}{2\kappa}\int d^{4}x\,\sqrt{-g}\left(-u\,\mathcal{R}+s^{\mu\nu}\,R_{\mu\nu}^{T}+t^{\rho\lambda\mu\nu}\,C_{\rho\lambda\mu\nu}\right). \end{equation} Here, $\mathcal{R}$ is the Ricci scalar, $R_{\mu\nu}^{T}$ the trace-free Ricci tensor, $C_{\rho\lambda\mu\nu}$ the Weyl conformal tensor and all other terms contain the information of Lorentz violation. Of course, they must depend on spacetime position and have to be treated as dynamical fields, in order to be compatible with lack of prior geometry, a typical feature of GR\footnote{See Ref.~\cite{mattingly} for a detailed explanation of this concept.}. Since the fields $u$, $s^{\mu\nu}$ and $t^{\rho\lambda\mu\nu}$ in Eq.~(\ref{lfields}) are the ones responsible for Lorentz violation, they acquire a vacuum expectation value, so that it is possible to write fluctuations around them as \begin{equation}\label{assumption1} u=\bar{u}+\tilde{u}, \qquad s^{\mu\nu}=\bar{s}^{\mu\nu}+\tilde{s}^{\mu\nu}, \qquad t^{\rho\lambda\mu\nu}=\bar{t}^{\rho\lambda\mu\nu}+\tilde{t}^{\rho\lambda\mu\nu}. \end{equation} Furthermore, following Ref.~\cite{Kost3}, we require that each first element of the r.h.s. of Eq.~(\ref{assumption1}) is constant in asymptotically inertial Cartesian coordinates. However, the fundamental assumption is that, when dealing with Lorentz violation, one always takes into account only the vacuum expectation values of Eq.~(\ref{assumption1}), completely neglecting fluctuations. This ansatz is reasonable, because we expect to have extremely small deviations from Lorentz symmetry realized in nature. Without entering the details of calculation given in Ref.~\cite{Kost3}, it is possible to derive the most general metric tensor for a point-like source of gravity, whose non-null components are given by \begin{eqnarray}\nonumber &&g_{00}=1-\frac{GM}{r}\left(2+3\,\bar{s}^{00}\right),\\[2mm] &&g_{ij}=\left[-1-\frac{GM}{r}\left(2-\bar{s}^{00}\right)\right]\delta_{ij}. \label{Metric1} \end{eqnarray} \section{Dynamics of a massless scalar field} \label{sect2} Let us now consider a conventional massless scalar field $\psi\left(\mathbf{x},t\right)$ in curved background, i. e. we consider the SME parameters are only into gravity sector. In general, the $\bar{s}^{\mu\nu}$ parameters can be moved from the gravity sector into the scalar sector using a coordinate choice \cite{newkost}. The choice does not change the physics, so although the calculation looks different it must give the same result. In our analysis, the Klein-Gordon equation reads~\cite{BirDav} \begin{equation}\label{FiedlEquation} \left(\Box+\zeta\,\mathcal{R}\right)\psi\left(\mathbf{x},t\right)=0, \end{equation} where $\Box$ is the d'Alembert operator in curved space and $\zeta$ is the coupling parameter between geometry and matter. \begin{figure}[h] \includegraphics[scale=.5]{KOSTE.eps} \caption{The Casimir-like system in a gravitational field is represented above. Here, $D$ denotes the distance between the plates, $S$ their surface and $R$ the distance from the source of gravity of mass $M$, with $D<\sqrt{S}\ll R$.} \label{fig_1} \end{figure} As it can be seen in Fig.~(\ref{fig_1}), the configuration is simple: the plates are set in such a way that the one nearer to the source of gravity is distant $R$ from it, and hence we can choose Cartesian coordinates so that $r=R+z$, where the variable $z$ is free to vary in the interval $\left[0,\,D\right]$, if we denote with $D$ the separation between the plates. Clearly, the relation $D\ll R$ holds. A further simplification comes from the fact that the only Cartesian coordinate explicitly present in the quantities appearing in Eq.~(\ref{FiedlEquation}) is $z$. In fact, denoting $\phi=-\frac{GM}{R}$ and recalling that $\frac{z}{R}\ll1$, the metric tensor becomes \begin{eqnarray}\nonumber g_{00}&\approx & 1-\phi\left(1-\frac{z}{R}\right)\left(2+3\,\bar{s}^{00}\right),\\[2mm] g_{ij}&\approx &\left[-1-\phi\left(1-\frac{z}{R}\right)\left(2-\bar{s}^{00}\right)\right]\delta_{ij}\,, \end{eqnarray} with the scalar curvature that assumes the form\footnote{The presence of Lorentz-violating terms allows for a non-vanishing scalar curvature. However, details of its form will not be necessary in the next steps, since it contributes to the mean vacuum energy density only at higher orders.} $\mathcal{R}\equiv\mathcal{R}_1+z\,\mathcal{R}_2$. At this point, it is clear that the interest is focused on the variation of the field along the radial direction (namely, along the z-axis). Because there is no explicit dependence on other coordinates, one can think of a solution of the form $\psi\left(\mathbf{x},t\right)=Ne^{i\left(\omega t-\mathbf{k}_{\perp}\cdotp\mathbf{x}_{\perp}\right)}\varphi\left(z\right)$, where $\mathbf{k}_{\perp}=\left(k_{x},k_{y}\right)$, $\mathbf{x}_{\perp}=\left(x,y\right)$ and $N$ is the normalization factor. The field equation can thus be rewritten as \begin{equation} \partial_{z}^{2}\,\varphi+C_1\,\partial_{z}\,\varphi+C_2\,\varphi=0\,, \end{equation} where \begin{equation} C_1=-2\,\frac{\phi}{R}\,\bar{s}^{00}, \qquad C_2=a+b\, z\,, \end{equation} with \begin{equation}\nonumber a=\omega^{2}\left[1-2\,\phi\left(\bar{s}^{00}+2\right)\right]+\zeta\,\frac{\phi}{R^{2}}\left(4-10\,\bar{s}^{00}\right)-\mid\mathbf{k}_{\perp}\mid^{2}, \end{equation} \vspace{-4.5mm}\begin{equation} b=4\,\frac{\phi}{R}\left(\omega^{2}-3\,\frac{\zeta}{R^{2}}\right). \end{equation} The solution of this differential equation is a linear combination of Airy functions of the first and of the second kind, with argument $x\left(z\right)=\left[\frac{1}{4}\left(C_1^{2}-4\,a\right)-b\, z\right]\left(-b\right)^{-\frac{2}{3}}.$ In the considered approximation, the solution can be written as \begin{equation} \varphi\left(z\right)= k_{1}\,\mathrm{Ai}\left(\frac{-a-b\, z}{\left(-b\right)^{\frac{2}{3}}}\right)+k_{2}\,\mathrm{Bi}\left(\frac{-a-b\, z}{\left(-b\right)^{\frac{2}{3}}}\right). \end{equation} Airy functions can be expressed in terms of Bessel functions~\cite{Zuber}. Due to the form of $a$ and $b$, it is clear that the argument of the Bessel functions $\eta(z)\equiv\left[a+ b z\right]\left(-b\right)^{-\frac{2}{3}}\gg1$, and hence their asymptotic behavior yields \begin{equation} \varphi\left(z\right)\approx\sqrt{\frac{3}{\pi\sqrt{\eta(z)}}}\,\sin\left[\frac{2}{3}\eta^{\frac{3}{2}}(z)+\tau\right]\,. \end{equation} If we impose the Dirichlet boundary conditions on the plates for the field $\varphi(z)$, that is $\varphi(0)=\varphi(D)=0$, we get the relation $\frac{2}{3} \bigl[\eta^{3/2}(0)-\eta^{3/2}(L) \bigr]=n\,\pi$, where $n$ is an integer. From these boundary conditions, we find the energy spectrum \begin{eqnarray}\label{Energy_Spectrum}\nonumber \omega^2_n\,&=&\,\bigl[1-2\,\phi\,(\bar{s}^{00}+2)+4\,\frac{\phi}{R}\,D\bigr]\biggl[\textbf{k}_\bot^2+\\ &&+\biggl( \frac{n\pi}{D}\biggr)^2\biggr]+ \frac{\zeta\,\phi}{R}\,\biggl[10\,\bar{s}^{00}-4+\,\frac{6\,D}{R}\biggr]\,. \end{eqnarray} Finally, using the scalar product defined for quantum fields in curved spacetimes \cite{BirDav}, one derives the normalization constant \begin{eqnarray}\label{N^2} N_n^2\,=\,\frac{a}{3\,S\,\,b^{1/3}\omega_n\,n\bigl[1-\phi\left(1+\frac{3}{2}\bar{s}^{00}\right)\bigl]}, \end{eqnarray} with $S$ being the surface of the plates. \section{Derivation of the bound and of the pressure}\label{sect3} In order to calculate the mean vacuum energy density $\varepsilon$ between the plates, we use the general relation \cite{BirDav} \begin{eqnarray} \varepsilon\,=\,\frac{1}{V_p}\sum_n\int d^2\,\textbf{k}_\bot\int dx\,dy\,dz\,\sqrt{-g} \,\bigl( g_{00}\bigr)^{-1}\,T_{00}, \end{eqnarray} where $T_{00}\equiv T_{00}\bigl( \psi_n,\psi_n^*\bigr)$ is a component of the energy-momentum tensor $T_{\mu\nu}\,=\,\partial_{\mu}\,\psi\,\partial_{\nu}\,\psi-\frac{1}{2}g_{\mu\nu}g^{\alpha\beta}\partial_{\alpha}\,\psi\,\partial_{\beta}\,\psi$ and $V_p=\int dx\,dy\,dz\,\sqrt{-g}$ is the proper volume. Using the Schwinger proper-time representation and $\zeta$-function regularization, we find the mean vacuum energy density \begin{eqnarray}\label{DEV} &\varepsilon&\,=\,\varepsilon_0+\varepsilon_{GR}+\varepsilon_{LV}\,,\\[2mm] &\varepsilon_0&\,=\,-\frac{\pi^{2}}{1440\,D_p^{4}},\\[2mm] \label{DEVGR} &\varepsilon_{GR}&\,= -\frac{\phi \,D_p}{R}\,\varepsilon_0\,,\\[2mm] \label{DEVLV} &\varepsilon_{LV}&\,= -6\,\phi\, \bar{s}^{00}\,\varepsilon_0\,, \end{eqnarray} where $\varepsilon_0$ is the standard term of Casimir effect, $\varepsilon_{GR}$ is the contribution due to GR and $\varepsilon_{LV}$ is the Lorentz-violating term, with $D_p=\int dz\,\sqrt{-g}$ being the proper length of the cavity. Note that, in our analysis, we have neglected higher-order contributions. Equation~(\ref{DEV}) gives us the expression of Casimir vacuum energy density at the second order $\mathcal{O}(R^{-2})$ in the framework of SME. We note that the part related to GR (Eq.~(\ref{DEVGR})) does not have contributions at the first order in $\mathcal{O}(R^{-1})$, but only at higher orders, such as $\mathcal{O}(R^{-2})$. The Lorentz-violating sector Eq.~(\ref{DEVLV}), instead, exhibits a first order factor in $\mathcal{O}(R^{-1})$ connected to $\bar{s}^{00}$. To obtain a plausible bound on $\bar{s}^{00}$, we make the assumption $|\varepsilon_{LV}|\lesssim | \varepsilon_{GR}|$. This agrees with several considerations and results expressed in Refs.~\cite{Kost5, frank, Kost3} and ensures the fact that Lorentz-violating manifestations are small, as widely employed in Lorentz-violation phenomenology~\cite{Kost3}. However, the reasonableness of the constraint we derive cannot be directly tested, since $\varepsilon$ is still now an unmeasurable quantity. This is why we need to compare the heuristic constraint with a physical one, which can only be calculated using the pressure. Apart from the previous comment, considering the case of the Earth and requiring $D_p\thicksim 10^{-7}$\,m (a typical choice for the proper length in standard literature) for the plausible assumption exhibited above, we get \begin{eqnarray}\label{CONSTRAINTENR} \bar{s}^{00} \lesssim \frac{D_p}{6\,R_\oplus} \lesssim 10^{-14}, \end{eqnarray} where $R_\oplus\thicksim 6.4\times 10^{6}$\,m. It must be pointed out that recent developments in nanotechnology can further strengthen the above bound by one or two orders of magnitude. In fact, in the near future, the value of $D_p$ could reach scales even smaller than nanometers (as already contemplated, for example, in Ref.~\cite{exp}), thus transforming Eq.~(\ref{CONSTRAINTENR}) into a more stringent constraint, $\bar{s}^{00}\lesssim 10^{-15}$. Let us now turn the attention to the pressure. The attractive force observed between the cavity plates is obtained by the relation $F=-\frac{\partial {\cal E}}{\partial D_p}$, where ${\cal E}=\varepsilon\,V_P$ is the Casimir vacuum energy. Then, the pressure is simply given by $P=F/S$, and hence \begin{eqnarray}\label{pressure} P&=&P_{0}+P_{GR}+P_{LV}\,,\\[2mm] P_{0}&=&-\frac{\pi^{2}}{480D_p^{4}}\,,\label{po}\\[2mm] P_{GR}&=&3\,\phi\, P_{0}\,,\label{pgr}\\[2mm] P_{LV}&=&-6\,\phi\,\bar{s}^{00}\,P_{0}\,,\label{plv} \end{eqnarray} where $P_{0}$ is the pressure in the flat case, while $P_{GR}$ is the pressure in GR and $P_{LV}$ is the contribution connected to Lorentz-violation. We now want to test the compatibility of SME with the experimental data to check how much a concrete bound differs from the heuristic one obtained in Eq.~\eqref{CONSTRAINTENR}. This can be achieved by using the pressure as a measurable physical quantity. In fact, imposing the constraint $|P_{LV}|\lesssim \delta P$, where $\delta P$ is the experimental error, we obtain the following relation: \begin{equation}\label{Constraint} \bar{s}^{00}\,\lesssim\frac{\delta P}{P_{0}}\frac{1}{6\phi}=\frac{1}{3}\frac{\delta P}{P_{0}}\frac{R}{R_S}\,, \end{equation} where $R_S$ is Schwarzschild radius. The total absolute experimental error of the measured Casimir pressure~\cite{mostepanenko2} is 0.2\% ($ \delta P/P_0\simeq 0.002$). Typical values of the ratio $\frac{R}{R_S}$ in the Solar System are included between $10^7\div10^{10}$. In particular, for the Earth we have $7.2\times10^{8}$, which means that the term on the r.h.s. of Eq.~(\ref{Constraint}) is of order $10^{6}$. The comparison of such a result with Eq.~\eqref{CONSTRAINTENR} clearly shows that we cannot use\footnote{Unless we believe the heuristic bound to be true and thus physically consistent.} the Casimir experiment to measure the pressure in order to significantly constrain the parameter $\bar{s}^{00}$. To to this, we need to enhance the experimental sensitivity on Earth by at least six order of magnitude, in such a way that $\frac{\delta P}{P}\lesssim 10^{-9}$. Nevertheless, in the near future, gravitational interferometers may provide a valid framework to test SME. Indeed, they have reached a high sensitivity, and therefore they could be, in principle, used as the tool to detect the small effects induced by the the Lorentz-violating contributions on Casimir pressure. Finally, a word must be spent on the choice of point-like source of gravity. Although it has been considered only to simplify the treatment of the problem, the relevance of the outcome does not depend on it. In fact, even if we considered a rotating spherical object instead of a point, the value of the constraint would basically be the same. Lorentz-violating factors will very likely appear as combinations of the $\bar{s}^{\mu\nu}$ already introduced in this work, but the line of reasoning would exactly be the same. Consequently, we expect Eqs.~(\ref{CONSTRAINTENR}) and \eqref{Constraint} to be modified only in its l.h.s., for example with contributions such as $\bar{s}^{00}+\sum_{\mu,j}\bar{s}^{\mu j}$ at the lowest order. \section{Conclusions} In the context of SME, working in the weak field approximation, we have studied the dynamics of a massless scalar field confined between two nearby parallel plates in a static spacetime background generated by a point-like source. In order to obtain a reasonable constraint on Lorentz-violating terms in the context of the Casimir effect, we have derived the corrections to the flat spacetime Casimir vacuum energy density Eq.~(\ref{DEV}), in the framework of SME. We have found that, in the energy density, GR gives us only contributions at the second order $\mathcal{O}(R^{-2})$, while Lorentz-violating corrections occur at first order $\mathcal{O}(R^{-1})$. After that, we have evaluated the pressure Eq.~\eqref{pressure} to observe how it changes from the usual expression in flat spacetime, Eq.~\eqref{po}, in the presence of gravity (see Eq.~\eqref{pgr}) and with SME coefficients (see Eq.~\eqref{plv}). By requiring $|\varepsilon_{LV}|\lesssim | \varepsilon_{GR}|$, we have then been able to find a significant bound on the SME coefficient $\bar{s}^{00}$. Such an assumption is related to the fact that manifestations of Lorentz violation in nature are expected to be extremely evanescent. If the above inequality did not hold true, it would have been possible to detect traces of Lorentz-violating terms in the tests proposed in Ref.~\cite{Kost3} and in other experiments involving the intertwining between SME and gravity, but this is not the case. We remark that, for the problem at hand, there is the necessity to have a direct access to the vacuum energy density in order to evaluate $\bar{s}^{00}$. Actually, as already pointed out, the true measurable physical quantity in the context of the Casimir effect is the pressure $P$. One can possibly extract a constraint for $\bar{s}^{00}$ also with $P$ as done in Eq.~\eqref{Constraint}, but its order of magnitude would be extremely high if compared to Eq.~(\ref{CONSTRAINTENR}) and especially to the data of Ref.~\cite{Kost5}. The current technology is far from allowing a direct experimental check of the influence of SME on Casimir effect. Nevertheless, in the near future, gravitational interferometers might achieve high sensitivity, providing an alternative tool for testing the SME with a more stringent and efficient bounds reachable through the evaluation of the pressure. We also point out that, following the same analysis of Refs.~\cite{Fulling}, no violation of equivalence principle arises in our framework, i.e. the parameter space here analyzed leads to the conclusion that the coefficients $\bar{s}^{\mu\nu}$ do not allow to discriminate between inertial mass and gravitational mass. Finally, the consideration after Eq.~(\ref{CONSTRAINTENR}) is corroborated by the fact that, assuming we have to deal with the Kerr metric for a more detailed analysis, the off-diagonal contribution related to the angular momentum $J$, that is $\frac{G J_\oplus}{R_\oplus c^3}$, has the same order of magnitude of the diagonal term \begin{equation} \label{esteem} \frac{2 G M_\oplus}{R_\oplus c^2}\thicksim 10^{-9}\,. \end{equation} This knowledge tells us that, in Eq.~(\ref{DEVGR}), we would obtain an analytically different expression, $\varepsilon_{GR}=f(M, D_p, R, J)\,\varepsilon_0$, which nonetheless should possess the same order of magnitude of Eq.~(\ref{CONSTRAINTENR}). Moveover, outcomes of a recent work \cite{sorge2} suggest that, in the case of a geostationary orbit, the effects of rotation on the mean vacuum energy density can be completely neglected, due to the fact that the Casimir-like system acquires the same angular velocity of the Earth. These hints strengthen the conjecture that implications of the current work are basically untouched also in a more realistic treatment of the studied phenomenon, which however will be the object of future investigation. \medskip \section*{Acknowledgments} The authors would like to thank V. A. Kosteleck\'y and E. Calloni for useful discussions and comments.
\section{Introduction} \label{sec:Intro} For which costs is the Monge ansatz justified in multi-marginal optimal transport? This deep question remains much less well understood than its two-marginal counterpart \cite{Vi09}. For interesting examples of Monge and non-Monge minimizers see, respectively, \cite{GS98, He02, Ca03, Pa11, CFK11, BDG12, CDD13, DGN15} and \cite{CN08, Pa10, FMPCK13, Pa13, CFP15, MP17, GKR18}. Our goal in this paper is to point out a fundamental difference between multi-marginal and two-marginal optimal transport. Namely, in the important case of finite state spaces and uniform marginals -- which arises by equi-mass discretization from any continuous optimal transport problem on $\R^d$ with absolutely continuous marginals \cite{CFM14} -- {\it the Monge ansatz is sufficient for 2 marginals, but not for 3 or more marginals.} The sufficiency for 2 marginals is the content of the remarkable Birkhoff-von Neumann theorem \cite{Bi46, vN53}. The insufficiency for 3 marginals is shown here; what is more, we construct by systematic arguments the lowest-dimensional counterexample possible for symmetric and pairwise costs, which turns out to occur for 3 marginals and 3 marginal states (or ``sites'', see below). The counterexample has a simple physical meaning related to the Frenkel-Kontorova model \cite{BK98} of solid state physics (see Figure \ref{F:FKmodel}), as we will of course explain. For multi-index assignment problems, i.e. multi-marginal problems with finite state space, it has long been known that there exist ``non-integer vertices'' of the $-$ suitably renormalized $-$ polytope of Kantorovich plans \cite{Cs70, Kr07, LL14}. These can be shown \cite{Fi14} to correspond to non-Monge plans. By abstract duality principles this implies the existence of costs with unique non-Monge minimizers; but we are not aware of previous explicit examples, let alone ones of mathematically simple (e.g., pairwise and symmetric) and physically relevant form. \\[2mm] {\bf Multi-marginal optimal transport.} Given a finite state space \begin{equation} \label{space} X=\{a_1,...,a_\ell\} \end{equation} consisting of $\ell$ distinct points, and a cost function $c\, : \, X^N\to\R\cup\{+\infty\}$, the $N$-marginal optimal transport problem in Kantorovich form consists of the following: Minimize the total cost \begin{equation} \label{Kant} {\mathcal{C}}[\gamma] = \int_{X^N} c_N(x_1,...,x_N) \, d\gamma(x_1,...,x_N) \end{equation} over probability measures $\gamma$ on $X^N$ with one-point marginals ${\overline{\lambda}}$, i.e. \begin{equation} \label{Kantconstr} \gamma(X^{i-1}\times A_i\times X^{N-i}) = {\overline{\lambda}}(A_i) \mbox{ for all subsets }A_i\mbox{ of }X \mbox{ and all }i=1,...,N, \end{equation} where ${\overline{\lambda}}$ is the uniform measure on $X$, that is to say \begin{equation} \label{unif} {\overline{\lambda}} = \sum_{i=1}^\ell \tfrac{1}{\ell} \, \delta_{a_i}. \end{equation} Here and below, $\delta_{a_i}$ denotes the Dirac measure on the point $a_i$, and we use the common notation $\gamma\mapsto{\overline{\lambda}}$ for the validity of eq.~\eqref{Kantconstr}. Probability measures $\gamma$ on $X^N$ satisfying \eqref{Kantconstr} are known as {\it Kantorovich plans}. \\[2mm] The Monge form of the above optimal transport problem is to find $N$ permutations $\tau_1$, ..., $\tau_N \, : \, \{1,...,\ell\} \to \{1,...,\ell\}$ which minimize the cost \begin{equation} \label{Monge} {\mathcal{C}}[\tau_1,...,\tau_N ] = \frac{1}{\ell} \sum_{\nu=1}^\ell c(a_{\tau_1 (\nu )},...,a_{\tau_N (\nu )}). \end{equation} This corresponds to making the special ansatz \begin{equation} \label{Mongeansatz} \gamma = \frac{1}{\ell} \sum_{\nu=1}^\ell \delta_{a_{\tau_1(\nu)}}\otimes \cdots \otimes \delta_{a_{\tau_N(\nu)}} \end{equation} in the Kantorovich problem. Note that the requirement that the $\tau_i$ be permutations ensures the marginal condition \eqref{unif}. Kantorovich plans of this form are called {\it Monge states}. By re-ordering the sum in \eqref{Monge} and \eqref{Mongeansatz} one may assume $\tau_1=id$, but we prefer the above more symmetric formulation. \\[2mm] The problems \eqref{Kant}--\eqref{unif} and \eqref{Monge}--\eqref{Mongeansatz} arise in many contexts including economics \cite{CE10, CMN10}, image processing \cite{AC11, RPDB12}, mathematical finance \cite{BHP13, GHT14}, optimal assignment problems (see the reviews \cite{Sp00, BDM12}), and -- more recently -- electronic structure \cite{CFK11, BDG12}. In the latter context, Kantorovich plans correspond to the joint probability distribution of electron positions in an $N$-electron molecule, $X$ is a collection of discretization points in $\R^3$, and the cost $c(x_1,...,x_N)$ is given by the Coulomb interaction energy $\sum_{1\le i<j\le N}|x_i-x_j|^{-1}$ between the electrons, with $|\cdot |$ being the euclidean distance. Partially inspired by this example, we propose a more general physical problem which is described by \eqref{Kant}--\eqref{unif}. We find that thinking about this physical problem provides novel and valuable intuition about \eqref{Kant}--\eqref{unif}. \\[2mm] {\bf Molecular packing problem:} {\it Find the ground state of an ensemble of $N$-particle molecules confined to $\ell$ sites $a_1,...,a_\ell\in\R^d$ subject to the constraint that all sites must be occupied equally often. The molecules are composed of $N$ identical particles (``atoms''), and the cost $c$ which is to be minimized is the intramolecular interaction energy between the particles within a molecule.} \\[2mm] In this problem, the state of a single $N$-particle molecule is described by a Dirac measure $\delta_{x_1}\otimes \cdots \otimes \delta_{x_N}$, with $x_1,...,x_N$ denoting the positions of the $N$ particles, and the state of the ensemble is described by a superposition $\gamma=\sum_{\nu} p_\nu \delta_{x_1^{(\nu)}}\otimes \cdots \otimes \delta_{x_N^{(\nu)}}$ of single-molecule states, with the $p_\nu$ denoting occupation probabilities. The passage from single-molecule states to ensembles may be viewed as a physics analogue of the passage from pure to mixed states in game theory. A typical state of the ensemble can be visualized by filling the sites with as many $N$-atom molecules as needed to make the number of molecules in each state proportional to the state's occupation probability. See Figure \ref{F:1} for a typical state of such an ensemble, and Example 1.1 for an instructive example of a ground state. This visualization ignores the order in which the tensor factors $\delta_{x_i}$ appear, but uniquely characterizes the symmetrization $S\gamma$ of the state (with $S$ as defined in \eqref{S}). Note that the latter provides a physically appropriate description of an ensemble of molecules when the particles (``atoms'') within each molecules are indistinguishable. With the help of $S\gamma$ we can also give physical meaning to the marginal condition \eqref{Kantconstr}: for any probability measure $\gamma$ on $X^N$, \begin{equation} \label{margphys} \mbox{$S\gamma$ satisfies \eqref{Kantconstr}} \; \Longleftrightarrow \; \begin{array}{c} \mbox{the associated molecular packing} \\ \mbox{occupies all sites equally often}. \end{array} \end{equation} \begin{figure} \begin{center} \includegraphics[width=0.33\textwidth]{PackingSchematic} \end{center} \vspace*{-10mm} \caption{A typical Kantorovich plan, visualized as a molecular packing. The picture corresponds to the plan $\gamma=\tfrac{1}{2}\delta_{a_2}\otimes\delta_{a_2}\otimes\delta_{a_3} + \tfrac{1}{3}\delta_{a_1}\otimes\delta_{a_1}\otimes\delta_{a_1} + \tfrac{1}{3}\delta_{a_4}\otimes\delta_{a_4}\otimes\delta_{a_4} + \tfrac{1}{6}\delta_{a_3}\otimes\delta_{a_3}\otimes\delta_{a_3}$. Since the probability coefficients are in the ratio $3:2:2:1$, we can visualize the whole plan as $3$ molecules with particle positions $a_2$, $a_2$, $a_3$, $2$ molecules with particle positions $a_1$, $a_1$, $a_1$, $2$ molecules with particle positions $a_4$, $a_4$, $a_4$, and one molecule all of whose particles are at $a_3$. The different colors serve to distinguish the different molecules.} \label{F:1} \end{figure} Due to the finiteness of the space $X$, probability measures on $X^N$ can be identified with order-$N$ tensors $(\gamma_{i_1...i_N})$ with components $\gamma_{i_1...i_N}\in\R$ and indices $i_1,...,i_N$ running from $1$ to $\ell$, via $\gamma_{i_1...i_N}:=\gamma(\{(a_{i_1},...,a_{i_N})\})$. It is instructive to write out our optimal transport problem in tensor notation in the special cases of two and three marginals. {\it Two-marginal case:} For $N=2$, the Kantorovich optimal transport problem corresponds via $c_{ij}:=c(a_i,a_j)$ and $\mu_{ij}:=\ell\gamma(\{(a_i,a_j)\})$ to the celebrated Birkhoff-von Neumann problem: for given cost coefficients $c_{ij}$, \begin{equation} \label{BvN} \mbox{Minimize }\sum_{i,j=1}^\ell c_{ij}\mu_{ij} \end{equation} over the $\mu_{ij}$ subject to the constraint that $(\mu_{ij})_{i,j=1}^\ell$ is a bistochastic matrix, i.e. that \begin{equation} \label{BvNconstr} \mu_{ij}\ge 0 \mbox{ for all }i,j, \;\; \sum_{i}\mu_{ij}=1 \mbox{ for all }j, \;\; \sum_{j}\mu_{ij}=1 \mbox{ for all }i. \end{equation} (The prefactor $\ell$ in the definition of the $\mu_{ij}$ just serves to adapt the probability coefficients $\gamma(\{(a_i,a_j)\})$, which sum to $1$, to the normalization convention in economics and game theory, where one instead wants the partial sums in \eqref{BvNconstr} to be $1$.) The Monge problem corresponds to the sparse ansatz that $(\mu_{ij})$ is a permutation matrix, that is to say each row and each column contains exactly one $1$ and $\ell\! - \! 1$ zeros. {\it Three-marginal case:} For $N=3$, the Kantorovich optimal transport problem corresponds via $c_{ijk}:=c(a_i,a_j,a_k)$ and $\mu_{ijk} = \ell \gamma(\{(a_i,a_j,a_k)\})$ to the axial three-index assignment problem: \begin{equation} \label{A3IAP} \mbox{Minimize }\sum_{i,j,k=1}^\ell c_{ijk}\mu_{ijk} \end{equation} subject to the constraint that $(\mu_{ijk})$ is a tristochastic $\ell\times\ell\times\ell$ tensor of order three, i.e. \begin{equation} \label{A3IAPconstr} \begin{array}{ll} \mu_{ijk}\ge 0 \mbox{ for all }i,j,k, & \sum_{i,j} \mu_{ijk}=1 \mbox{ for all }k, \\ \sum_{i,k} \mu_{ijk}=1 \mbox{ for all }j=1, & \sum_{j,k} \mu_{ijk}=1 \mbox{ for all }i=1. \end{array} \end{equation} The Monge problem corresponds to the sparse ansatz that each of the 3$\ell$ ``planes'' associated with the above sum constraints, i.e. $(\mu_{ijk})_{i,j=1}^\ell$, $(\mu_{ijk})_{i,k=1}^\ell$, $(\mu_{ijk})_{j,k=1}^\ell$, contains exactly one $1$ and $\ell^2\! - \! 1$ zeros. \\[2mm] {\bf The counterexample.} The Birkhoff-von Neumann theorem \cite{Bi46, vN53} says that for $N=2$, the extreme points of the polytope of bistochastic $\ell\times\ell$ matrices are precisely the permutation matrices. In particular, for any cost function $c \, : \, X\times X\to\R$ the Kantorovich problem \eqref{Kant}--\eqref{unif} possesses a minimizer which is of Monge form \eqref{Monge}. \\[2mm] For $N=3$ and $\ell=3$ we will show that the polytope of tristochastic $\ell\times\ell\times\ell$ tensors of order three possesses extreme points which are not of Monge form; in particular, there exist cost functions $c \, : \, X\times X\times X\to\R$ such that none of the minimizers of the Kantorovich problem \eqref{Kant}--\eqref{unif} is of Monge form \eqref{Monge}. As we will see, this phenomenon even occurs in the class of {\it pairwise and symmetric} costs, i.e. \begin{equation} \label{pairwsymm} c(x,y,z) = v(x,y) + v(x,z) + v(y,z) \mbox{ for some }v\, : \, X\times X \to \R \mbox{ with } v(x,y)=v(y,x). \end{equation} \begin{example} \label{E:counter} (Optimal packing of Frenkel-Kontorova molecules) Consider the Kantorovich problem \eqref{Kant}--\eqref{unif} with $N=\ell=3$ and $X$ given by three equi-spaced points on the real line, i.e. $X=\{1,2,3\}\subset\R$ (physically: consider an ensemble of $3$-particle molecules confined to the sites $1$, $2$, $3\in\R$ subject to the constraint that all sites must be occupied equally often). For the cost \begin{equation} \label{counterex} C[\gamma] = \int_{X^3}\bigl( v(|x-y|) + v(|y-z|) + v(|x-z|)\bigr)\, d\gamma(x,y,z), \;\; v(r)=(r - a)^2, \;\; a=\tfrac{3}{4} \end{equation} (physically: when the particles within a molecule are mutually connected by springs of equilibrium length $a=\tfrac{3}{4}$), the unique minimizer is given by $\gamma_* = S \gamma$ where $\gamma=\tfrac{1}{2}(\delta_1\otimes\delta_1\otimes\delta_2 + \delta_2\otimes\delta_3\otimes\delta_3)$ and $S$ is the symmetrization operator \eqref{S}. This $\gamma_*$ is not a Monge state. It is not a symmetrized Monge state either. \end{example} \begin{figure} \begin{minipage}{0.49\textwidth} \begin{center} \includegraphics[width=0.9\textwidth]{FrenkelKontorovaModel} \end{center} \end{minipage} \begin{minipage}{0.49\textwidth} \begin{center} \vspace*{-0.2cm} \includegraphics[width=0.65\textwidth]{FrenkelKontorovaGroundState} \end{center} \end{minipage} \vspace*{-5mm} \caption{{\it Left:} The Frenkel-Kontorova model. Particles are linked by springs with positive equilibrium length $a$, and subject to an external potential of period $L$ (set here to $1$). The competition between springs and external potential leads to symmetry breaking, i.e. the preferred distance between particle 1 and 2 is different from that between particle 2 and 3. {\it Right:} Ground state of the total spring energy of an ensemble of $3$-particle molecules when the external potential is replaced by rigid confinement to three consecutive minima and we impose the constraint that each minimum must be occupied by the same number of particles. This is precisely the multi-marginal optimal transport problem from Example 1.1.} \label{F:FKmodel} \end{figure} Example 1.1 is the ``simplest example possible'', in the following precise sense: $N$ and $\ell$ are minimal (see Remark 2 following Theorem \ref{T:1}); and $v$ cannot be taken to be monotone (see Examples 4.3 and 4.4 in section \ref{S:gallery}). \\[2mm] Physically, the above minimizer is very intuitive, and can be heuristically derived as follows. In its original form, the Frenkel-Kontorova (FK) model \cite{BK98} describes the equilibria and excitations of a 1D chain of particles (``atoms'') linked by springs of positive equilibrium length and subject to a periodic external potential (describing the interaction of the chain with a ``substrate''); in our case the chain is a ring, with each atom linked to the two others. See Figure \ref{F:FKmodel}, left panel. Now Example 1.1 corresponds to the limiting situation when particle positions in the ``holes'' (minima of the periodic external potential) are not just energetically favoured but rigidly enforced. Moreover we require all holes to be filled equally, and the only quantity that remains to be minimized is the interaction energy due to the springs. The FK model, and its adaptation here, favours symmetry breaking (see again Figure \ref{F:FKmodel}, left panel) when the spring equilibrium length is a bit smaller than the distance between the holes. Hence one expects that the FK ground state, when enforcing particle positions in the ``holes'', consists of two particles occupying the same hole and the third particle a neighbouring hole (see Section \ref{S:geo} for a mathematical proof of this fact). But it is intuitively obvious that the -- up to repetition only -- way to fill $3$ neighbouring holes uniformly by ground state molecules is the packing in Figure \ref{F:FKmodel}, right panel. Next we translate this packing into a Kantorovich plan according to the prescription in Figure \ref{F:1}. The blue state corresponds to $\delta_{1}\otimes\delta_1\otimes\delta_2$, since the first two blue particles are in hole $1$ and the third blue particle is in hole $2$. Likewise, the purple state corresponds to $\delta_{2}\otimes\delta_3\otimes\delta_3$. The whole ensemble corresponds to $\gamma=\tfrac{1}{2}\delta_{1}\otimes\delta_1\otimes\delta_2 + \tfrac{1}{2}\delta_{2}\otimes\delta_3\otimes\delta_3$, where the prefactors $\tfrac{1}{2}$ give the probability of the ensemble to be in either state. Finally, since the three holes are occupied equally often, the symmetrization $\gamma_*:=S\gamma$ satisfies the marginal constraint \eqref{Kantconstr} (see \eqref{margphys}). The key to deriving the ground state mathematically -- and to understand how one might come up with Example 1.1 in the first place -- is to avoid intransparent ad hoc calculations and instead study the convex geometry of the set of Kantorovich plans (see Section \ref{S:geo}). \\[2mm] The overall significance of Example 1.1 is that it destroys -- even for pairwise, symmetric, simple costs -- the hope that the low-dimensional Monge ansatz \eqref{Mongeansatz} can be used to numerically tackle the high-dimensional Kantorovich problem \eqref{Kant}--\eqref{Kantconstr} for large $N$ and $\ell$, as would be desirable e.g. in applications to electronic structure; not that the number of unknowns in \eqref{Kant}--\eqref{Kantconstr} grows combinatorially in both $N$ and $\ell$. An almost as low-dimensional ansatz which cures the insufficiency of Monge states at the expense of only $2\ell$ additional unknowns independently of $N$ is presented in \cite{FV18}, where Example 1.1 was announced. \section{Convex geometry of the set of Kantorovich plans} \label{S:geo} First, following \cite{FMPCK13} we introduce some relevant sets of probability measures. This may look technical at first, but it makes optimal transport {\it simpler}: the only thing one really needs to understand is the convex geometry of these (universal, i.e. cost-function-independent) sets. Let $X$ be the finite state space \eqref{space}, and let ${\mathcal{P}}(X^N)$ denote the set of probability measures on $X^N$. The set of admissible competitors in the Kantorovich problem \eqref{Kant}--\eqref{unif} are the probability measures with uniform one-point marginal, \begin{equation} \label{Plambdabar} {\mathcal{P}}_{{\overline{\lambda}}}(X^N) := \{ \gamma \in {\mathcal{P}}(X^N) \, : \, \gamma\mapsto{\overline{\lambda}} \}. \end{equation} Due to finiteness of the state space $X$, ${\mathcal{P}}_{{\overline{\lambda}}}(X^N)$ is a convex polytope, i.e. a compact convex finite-dimensional set with only a finite number of extreme points. Recall that a point $x$ in a convex set $K$ is an extreme point if, whenever $x=\alpha x_1 + (1-\alpha)x_2$ for some $x_1$, $x_2\in K$ and some $\alpha\in(0,1)$, we have that $x_1=x_2=x$; recall also that, by Minkowski's theorem, any compact convex finite-dimensional set is the convex hull of its extreme points. A simplification arises because for physical reasons, in this paper we are only interested in symmetric and pairwise costs, i.e. costs $c\, : \, X^N\to\R\cup\{+\infty\}$ such that \begin{equation} \label{pairwsymm'} c(x_1,...,x_N) = \sum_{1\le i<j\le N} v(x_i,x_j) \mbox{ for some }v\, : \, X\times X\to\R\cup\{+\infty\} \mbox{ with }v(x,y)=v(y,x). \end{equation} For such costs we trivially have that \begin{equation} \label{costid} {\mathcal{C}}[\gamma] \; = \; {\mathcal{C}}[S\gamma] \; = \; \underbrace{\mbox{${N\choose 2}$} \int_{X\times X} v(x,y) \, d\bigl(M_2S\gamma\bigr)(x,y)}_{=:{\mathcal{C}}'[M_2 S \, \gamma ]} \end{equation} where $S$ is the symmetrizer and $M_2$ is the map from $N$-point probability measures to their two-point marginals, i.e. \begin{equation} \label{S} (S\gamma )(A_1 \times\cdots\times A _N) = \frac{1}{N!} \sum_{\sigma\in S_N} \gamma\bigl( A_{\sigma(1)} \times \cdots \times A_{\sigma(N)}\bigr) \mbox{ for all }A_1,...,A_N\subseteq X, \end{equation} where $S_N$ denotes the group of permutations $\sigma \, : \{ 1,...,N\} \to \{ 1,...,N\}$, and \begin{equation} \label{M2} (M_2\gamma)(A) = \gamma(A\times X^{N-2}) \mbox{ for all }A\subseteq X^{N-2}. \end{equation} The identity \eqref{costid} says that the cost ${\mathcal{C}}[\gamma]$ depends on $\gamma$ only through its symmetrization $S\gamma$, and moreover only on the two-point marginal of the latter. This allows the following simple but fruitful reformulations of the Kantorovich problem \eqref{Kant}--\eqref{unif} as optimization problems over successively lower-dimensional polytopes obtained by successively applying $S$ and $M_2$, $S{\mathcal{P}}_{\overline{\lambda}}(X^N)=:{\mathcal{P}}_{sym,{\overline{\lambda}}}(X^N) $ and $M_2{\mathcal{P}}_{sym,{\overline{\lambda}}}(X^N)=:{\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2) $. Before stating the reduced problems, let us comment on these two sets and explain the above notation. \begin{definition} A probability measure $\gamma\in{\mathcal{P}}(X^N)$ is called symmetric if and only if $\gamma(A_1\times ... \times A_N) = \gamma(A_{\sigma(1)}\times ... \times A_{\sigma(N)})$ for all subsets $A_i$ of $X$ and all permutations $\sigma$. \end{definition} Clearly, a probability measure $\gamma\in{\mathcal{P}}(X^N)$ is symmetric if and only if $\gamma=S\gamma$. Hence the first of our two lower-dimensional sets is the set of symmetric $N$-point probability measures with uniform marginal, \begin{equation} \label{newset1} {\mathcal{P}}_{sym,{\overline{\lambda}}}(X^N) = \{ \gamma\in{\mathcal{P}}(X^N) \, : \, \gamma \mbox{ symmetric, } \gamma\mapsto{\overline{\lambda}}\}. \end{equation} \begin{definition} {\rm \cite{FMPCK13}} A probability measure $p$ on $X^2$ is called {\it $N$-representable} (for some $N\ge 2$) if there exists a symmetric probability measure $\gamma$ on $X^N$ such that $M_2\gamma = p$. \end{definition} Hence the second set is the set of $N$-representable two-point probability measures with uniform marginal, \begin{equation} \label{newset2} {\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2) = \{ p\in{\mathcal{P}}(X^2) \, : \, p \mbox{ $N$-representable, }p\mapsto{\overline{\lambda}}\}. \end{equation} It follows from \eqref{costid} that \begin{equation} \label{minid} \min_{\gamma\in{\mathcal{P}}_{{\overline{\lambda}}}(X^N)} {\mathcal{C}}[\gamma] \; = \; \min_{\gamma\in{\mathcal{P}}_{sym,{\overline{\lambda}}}(X^N)} {\mathcal{C}}[\gamma] \; = \; \min_{p\in{\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2)} {\mathcal{C}}'[p]. \end{equation} Thus symmetric costs are ``dual'' to the smaller polytope of symmetric $N$-point probability measures with uniform marginal; symmetric and pairwise costs are ``dual'' to the even smaller polytope of $N$-representable two-point probability measures with uniform marginal. \\[2mm] In the following, we call the sets ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^N)$ (see \eqref{newset1}) and ${\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2)$ (see \eqref{newset2}), respectively, the {\it symmetric Kantorovich polytope for N marginals and $\ell$ states} and the {\it reduced Kantorovich polytope for $N$ marginals and $\ell$ states}. \\[2mm] As already mentioned in the introduction, we may represent any probability measure $p$ on $X^2$ with uniform marginals via \begin{equation} \label{matrep} \mu_{ij} = \ell \, p(\{(a_i,a_j)\} ) \;\;\; (i,j=1,...,\ell) \end{equation} by a bistochastic $\ell\times\ell$ matrix $(\mu_{ij})_{i,j=1}^\ell$. In this matrix representation, the reduced Kantorovich polytope ${\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2)$ becomes a subset of the Birkhoff polytope of all bistochastic $\ell\times\ell$ matrices. \\[2mm] We will frequently use the shorthand notation \begin{equation} \label{sh} \delta_i := \delta_{a_i}, \;\;\; \delta_{i_1...i_N} := \delta_{a_{i_1}}\otimes\cdots\otimes\delta_{a_{i_N}}. \end{equation} \begin{theorem} \label{T:1} The reduced Kantorovich polytope ${\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2)$ for $3$ marginals and $3$ states ($N=\ell=3$) has precisely $8$ extreme points, given by $M_2\gamma$ where $\gamma$ is one of the following Kantorovich plans from Table \ref{Table:1}: \begin{equation} \label{corners} {\rm Id, \; T12, \; T13, \; T23, \; C, \; F112, \; F113, \; F122.} \end{equation} (See Figure \ref{F:KantPoly} for a picture of the polytope, Figure \ref{F:KantStatesIconized} for the physical meaning of the 8 plans, and Remark 3 for an explanation of nomenclature.) Moreover for each extreme point $p=M_2\gamma$, $\gamma$ is the unique element of the symmetric Kantorovich polytope ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^N)$ such that $p=M_2\gamma$. The first five of the plans \eqref{corners} are symmetrized Monge plans (i.e. of the form $S\tilde{\gamma}$ for some Monge state $\tilde{\gamma}$) but the last three are not. \end{theorem} \begin{figure} \begin{center} \includegraphics[width=0.75\textwidth]{KantorovichPolytope} \end{center} \vspace*{-12mm} \caption{The reduced Kantorovich polytope ${\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2)$ for three marginals and three states ($N=\ell=3$). The coordinate axes indicate the upper triangular matrix elements in the representation \eqref{matrep}. These matrix elements uniquely specify any element of the Kantorovich polytope, due to the symmetry and bistochasticity of the matrix $(\mu_{ij})$. The red, blue and purple vertices correspond to symmetrized Monge states but the yellow vertices do not. The nomenclature for the vertices is explained in Remark 3.} \label{F:KantPoly} \end{figure} Some remarks are in order. \\[2mm] 1) The most important message of Figure \ref{F:KantPoly} is that some but not all of the vertices are Monge. Hence there exist costs for which the Monge ansatz is wrong. Moreover such costs can even be found in the symmetric pairwise class \eqref{pairwsymm'}, with which the pictured polytope is in duality (see \eqref{minid}). \\[2mm] 2) \label{R:1} The numbers $N$ and $\ell$ in Theorem \ref{T:1} are minimal for the existence of non-Monge vertices. For $N=2$ such vertices are ruled out by the Birkhoff-von Neumann theorem. And for $N=3$, $\ell=2$ it is easy to show using the results in \cite{FMPCK13} that the Kantorovich polytope is the line segment with the two endpoints $M_2\gamma_1$, $M_2\gamma_2$, where $\gamma_1= \tfrac{1}{2}(\delta_{111}+\delta_{222})$ and $\gamma_2 = S \tfrac{1}{2}(\delta_{112} + \delta_{221})$; but these $\gamma$'s are symmetrized Monge states. \\[2mm] 3) The above picture provides fruitful and hitherto lacking intuition about {\it when} the Monge ansatz is correct. Costs favouring small off-diagonal entries will drive the system to the bottom left back corner, which is Monge; this is suggestive of the fundamental continuum result of Gangbo and \'{S}wi\k{e}ch that the Monge ansatz is correct for the multi-marginal Wasserstein cost $c(x_1,...,x_N)=\sum_{i<j}|x_i-x_j|^2$ on the Euclidean space $X=\R^d$. Costs favouring large diagonal entries will drive the system to the top right front corner, which is also Monge; this provides a hint towards the important continuum result of Colombo, DiMarino, and DePascale \cite{CDD13} which justifies the Monge ansatz for the multi-marginal 1D Coulomb cost $\sum_{i<j}|x_i-x_j|^{-1}$. ``Intermediate'' costs favouring some off diagonal elements to be large and others to be small should favour vertices such as ${\rm F} 112$ which are seen in the picture to minimize $\mu_{13}$ and also maximize the sum $\mu_{12}+\mu_{23}$; in particular, this suggests that costs favouring symmetry breaking (like the Frenkel-Kontorova cost in Figure \ref{F:FKmodel}) may lead to non-Monge vertices, and led to the design of Example 1.1. For a systematic translation of these insights into rigorous results for interesting classes of costs see Section \ref{S:gallery}. \\[2mm] 3) \label{R:2} The nomenclature in Theorem \ref{T:1}, Figure \ref{F:KantPoly} and Table \ref{Table:1} is as follows. Monge states are labelled by the underlying permutations $\tau\, : \, \{1,2,3\}\to\{1,2,3\}$, as follows. ${\rm Id}$, ${\rm T}_{ij}$ ($i<k$), ${\rm C}$, and ${\rm C'}$ stand, respectively, for the identity, the transposition of elements $i$ and $j$, the cyclic permutation $1\mapsto 2$, $2\mapsto 3$, $3\mapsto 1$, and its inverse. Recall that, for any Monge state \eqref{Monge}, by re-ordering the sum we can take $\tau_1$ to be the identity. The Monge state associated with the three permutations ${\rm Id}$, $\tau$, $\tau^2$ is denoted by $\tau$, as is its symmetrization. Thus, for example, ${\rm T}12$ stands for the state $S\tfrac{1}{3}\sum_{\nu=1}^3 \delta_{Id(\nu)}\otimes\delta_{{\rm T}_{12}(\nu)}\otimes\delta_{{\rm T}_{12}^2(\nu)}$. Interestingly, such multi-marginal Monge states generated by a single permutation have previously appeared in continuous optimal transport problems \cite{GM13, CDD13}. Any Monge state not generated by a single permutation, i.e. associated with three permutations ${\rm Id}$, $\tau$, $\tau'$ with $\tau'\neq \tau^2$, is denoted by $\tau,\tau'$, as is its symmetrization. We call the fundamental Kantorovich plans of non-Monge form which appear in Theorem \ref{T:1} and Figure \ref{F:KantPoly} Frenkel-Kontorova states, on account of their occurrence as minimizers in the Frenkel-Kontorova problem in Example 1.1; hence the letter ${\rm F}$. The subsequent digits indicate the first Dirac mass appearing; note that the second Dirac mass is, up to the order of appearance of the indices, uniquely determined by the marginal condition, and hence unique under the convention that indices appear in nondecreasing order. Thus, for example, ${\rm F} 112$ stands for the ground state $\frac{1}{2}S(\delta_{112} + \delta_{233})$ in Example 1.1. Finally, the more complicated Kantorovich plans of non-Monge form appearing in Table \ref{Table:1} are denoted with the letter ${\rm K}$ followed by the index sequences of the biggest two Dirac masses; under our convention that indices apper in nondecreasing order, the remaining Dirac mass is again unique. Thus, e.g., ${\rm K} 233,111$ stands for the state $\frac{1}{2}S\delta_{233} + \tfrac{1}{3}\delta_{111} + \tfrac{1}{6}\delta_{222}$. \begin{table}[htbp] \hspace{5mm} \resizebox{0.9\textwidth}{!}{ \begin{tabular}{|l|l|l|l|l|} \hline Name & Kantorovich plan $\gamma$ & Monge? & 2-point marginal times $\ell$ & $\begin{array}{l}\mbox{2-point marg.} \\ \mbox{extremal?}\end{array}$ \\ \hline \hline Id & $\tfrac{1}{3}(\delta_{111}+\delta_{222}+\delta_{333})$ & Yes & $\delta_{11}+\delta_{22}+\delta_{33}$ & Yes \\ \hline T12 & $\tfrac{1}{3}(\delta_{333}+S\delta_{112}+S\delta_{122})$ & Yes & $\delta_{33}+\tfrac{1}{3}(\delta_{11}+\delta_{22}) + \tfrac{4}{3}S\delta_{12}$ & Yes \\ \hline T13 & $\tfrac{1}{3}(\delta_{222}+S\delta_{113}+S\delta_{133})$ & Yes & $\delta_{22}+\tfrac{1}{3}(\delta_{11}+\delta_{33}) + \tfrac{4}{3}S\delta_{13}$ & Yes \\ \hline T23 & $\tfrac{1}{3}(\delta_{111}+S\delta_{223}+S\delta_{233})$ & Yes & $\delta_{11}+\tfrac{1}{3}(\delta_{22}+\delta_{33}) + \tfrac{4}{3}S\delta_{23}$ & Yes \\ \hline F112 & $\tfrac{1}{2}S(\delta_{112}+\delta_{233})$ & No & $\tfrac{1}{2}(\delta_{11}+\delta_{33}) + S(\delta_{12}+\delta_{23})$ & Yes \\ \hline F113 & $\tfrac{1}{2}S(\delta_{113}+\delta_{223})$ & No & $\tfrac{1}{2}(\delta_{11}+\delta_{22}) + S(\delta_{13}+\delta_{23})$ & Yes \\ \hline F122 & $\tfrac{1}{2}S(\delta_{122}+\delta_{133})$ & No & $\tfrac{1}{2}(\delta_{22}+\delta_{33}) + S(\delta_{12}+\delta_{13})$ & Yes \\ \hline C & $S \delta_{123}$ & Yes & $S (\delta_{12}+\delta_{13}+\delta_{23})$ & Yes \\ \hline \hline K233,111 & $\tfrac{1}{2}S\delta_{233}+\tfrac{1}{3}\delta_{111}+\tfrac{1}{6}\delta_{222}$ & No & $\delta_{11}+\tfrac{1}{2}(\delta_{22}+\delta_{33}) + S\delta_{23}$ & No \\ \hline K133,222 & $\tfrac{1}{2}S\delta_{133}+\tfrac{1}{3}\delta_{222}+\tfrac{1}{6}\delta_{111}$ & No & $\delta_{22}+\tfrac{1}{2}(\delta_{11}+\delta_{33}) + S\delta_{13}$ & No \\ \hline K122,333 & $\tfrac{1}{2}S\delta_{122}+\tfrac{1}{3}\delta_{333}+\tfrac{1}{6}\delta_{111}$ & No & $\delta_{33}+\tfrac{1}{2}(\delta_{11}+\delta_{22}) + S\delta_{12}$ & No \\ \hline K223,111 & $\tfrac{1}{2}S\delta_{223}+\tfrac{1}{3}\delta_{111}+\tfrac{1}{6}\delta_{333}$ & No & $\delta_{11}+\tfrac{1}{2}(\delta_{22}+\delta_{33}) + S\delta_{23}$ & No \\ \hline K113,222 & $\tfrac{1}{2}S\delta_{113}+\tfrac{1}{3}\delta_{222}+\tfrac{1}{6}\delta_{333}$ & No & $\delta_{22}+\tfrac{1}{2}(\delta_{11}+\delta_{33}) + S\delta_{13}$ & No \\ \hline K112,333 & $\tfrac{1}{2}S\delta_{112}+\tfrac{1}{3}\delta_{333}+\tfrac{1}{6}\delta_{222}$ & No & $\delta_{33}+\tfrac{1}{2}(\delta_{11}+\delta_{22}) + S\delta_{12}$ & No \\ \hline K112,223 & $S(\tfrac{1}{2}\delta_{112}+\tfrac{1}{4}\delta_{223})+\tfrac{1}{4}\delta_{333}$ & No & $\tfrac{3}{4}\delta_{33}+\tfrac{1}{2}\delta_{11}+\tfrac{1}{4}\delta_{22} + S(\delta_{12}+\tfrac{1}{2}\delta_{23})$ & No \\ \hline K113,233 & $S(\tfrac{1}{2}\delta_{113}+\tfrac{1}{4}\delta_{233})+\tfrac{1}{4}\delta_{222}$ & No & $\tfrac{3}{4}\delta_{22}+\tfrac{1}{2}\delta_{11}+\tfrac{1}{4}\delta_{33} + S(\delta_{13}+\tfrac{1}{2}\delta_{23})$ & No \\ \hline K223,133 & $S(\tfrac{1}{2}\delta_{223}+\tfrac{1}{4}\delta_{133})+\tfrac{1}{4}\delta_{111}$ & No & $\tfrac{3}{4}\delta_{11}+\tfrac{1}{2}\delta_{22}+\tfrac{1}{4}\delta_{33} + S(\delta_{23}+\tfrac{1}{2}\delta_{13})$ & No \\ \hline K122,113 & $S(\tfrac{1}{2}\delta_{122}+\tfrac{1}{4}\delta_{113})+\tfrac{1}{4}\delta_{333}$ & No & $\tfrac{3}{4}\delta_{33}+\tfrac{1}{2}\delta_{22}+\tfrac{1}{4}\delta_{11} + S(\delta_{12}+\tfrac{1}{2}\delta_{13})$ & No \\ \hline K133,112 & $S(\tfrac{1}{2}\delta_{133}+\tfrac{1}{4}\delta_{112})+\tfrac{1}{4}\delta_{222}$ & No & $\tfrac{3}{4}\delta_{22}+\tfrac{1}{2}\delta_{33}+\tfrac{1}{4}\delta_{11} + S(\delta_{13}+\tfrac{1}{2}\delta_{12})$ & No \\ \hline K233,122 & $S(\tfrac{1}{2}\delta_{233}+\tfrac{1}{4}\delta_{122})+\tfrac{1}{4}\delta_{111}$ & No & $\tfrac{3}{4}\delta_{11}+\tfrac{1}{2}\delta_{33}+\tfrac{1}{4}\delta_{22} + S(\delta_{23}+\tfrac{1}{2}\delta_{12})$ & No \\ \hline Id,C & $\tfrac{1}{3}S(\delta_{112}+\delta_{133}+\delta_{223})$ & Yes & $\tfrac{1}{3}(\delta_{11}+\delta_{22}+\delta_{33}) + \tfrac{2}{3}S(\delta_{12}+\delta_{13}+\delta_{23})$ & No \\ \hline ${\rm Id,C'}$ & $\tfrac{1}{3}S(\delta_{113}+\delta_{122}+\delta_{233})$ & Yes & $\tfrac{1}{3}(\delta_{11}+\delta_{22}+\delta_{33}) + \tfrac{2}{3}S(\delta_{12}+\delta_{13}+\delta_{23})$ & No \\ \hline \end{tabular} } \caption{The $22$ extreme points of the symmetric Kantorovich polytope ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^N)$ for $3$ marginals and $3$ states ($N=\ell=3$). The extreme points fall into two geometric classes, depending on whether their 2-point marginal is also extreme (top $8$ states) or not (bottom $14$ states). Within each class, we have ordered the extreme points by total size (more precisely: sum) of off-diagonal elements of 2-point marginal. Thus elements near the top of their class are expected to optimize attractive costs, while those near the bottom of their class should correspond to repulsive costs. This intuition is made rigorous in Section \ref{S:gallery}.} \label{Table:1} \end{table} We feel that the proof of Theorem \ref{T:1} is not so important and hence we postpone it. Instead we first use the theorem to infer Example 1.1. \\[2mm] {\bf Proof of Example 1.1.} We need to show that the Kantorovich plan $\gamma_*$ or -- in the notation of Theorem \ref{T:1}, Figure \ref{F:KantPoly}, and Table \ref{Table:1} -- ${\rm F} 112$ is the unique ground state of the optimal transport problem in the example. Recall that in the example, the competing Kantorovich plans are {\it not} required to be symmetric. We solve the OT problem stepwise, by establishing the following claims: \\[1mm] 1) $\gamma_*$ is the unique ground state of ${\mathcal{C}}$ on the set ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ of symmetric probability measures on $X^3$ with uniform one-point marginal ${\overline{\lambda}}$. \\[1mm] 2) $\gamma_*$ is a ground state of ${\mathcal{C}}$ on the set ${\mathcal{P}}_{{\overline{\lambda}}}(X^3)$ of all probability measures on $X^3$ with uniform one-point marginal ${\overline{\lambda}}$. \\[1mm] 3) The ground state of ${\mathcal{C}}$ on ${\mathcal{P}}_{{\overline{\lambda}}}(X^3)$ is unique. \\[1mm] ad 1): By Theorem \ref{T:1} and formula \eqref{costid} it suffices to check that ${\mathcal{C}}'[M_2\gamma_*]<{\mathcal{C}}'[M_2\tilde{\gamma}]$ where $\tilde{\gamma}$ is any of the extreme points of ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ other than $\gamma_*$ whose $2$-point marginal is an extreme point of ${\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2)$. From the explicit expressions in Table \ref{Table:1} we can read off the cost in terms of the spring equilibrium bond length $a$ (see Figure \ref{F:FKresults}): \begin{eqnarray*} {\mathcal{C}}[{\rm Id}] &=& 3v(0) \; = \; 3a^2, \\ {\mathcal{C}}[{\rm T} 12] &=& {\mathcal{C}}[{\rm T} 23] = \tfrac{5}{3} v(0) + \tfrac{4}{3} v(1) \; = \; \tfrac{5}{3}a^2 + \tfrac{4}{3}(1-a)^2, \\ {\mathcal{C}}[{\rm T} 13] &=& \tfrac{5}{3} v(0) + \tfrac{4}{3} v(2) \; = \; \tfrac{5}{3}a^2 + \tfrac{4}{3}(2-a)^2, \\ {\mathcal{C}}[{\rm F} 112] &=& v(0) + 2v(1) \; = \; a^2 + 2(1-a)^2, \\ {\mathcal{C}}[{\rm F} 113] &=& {\mathcal{C}}[{\rm F} 122] \; = \; v(0) + v(1) + v(2) \; = \; a^2 + (1-a)^2 + (2-a)^2, \\ {\mathcal{C}}[{\rm C} ] &=& 2v(1) + v(2) = 2(1-a)^2 + (2-a)^2. \end{eqnarray*} It follows (see Figure \ref{F:FKresults}) that for $a\in(0,\tfrac{1}{2})$ the unique minimizer is $\gamma={\rm Id}=\tfrac{1}{3}(\delta_{111}+\delta_{222}+\delta_{333})$, whereas for $a\in(\tfrac{1}{2},1)$, and in particular for $a=\tfrac{3}{4}$, the unique minimizer is $\gamma={\rm F} 112 = \tfrac{1}{2}S(\delta_{112}+\delta_{233})$. \\[1mm] \begin{figure} \begin{center} \vspace*{-1cm} \includegraphics[width=0.6\textwidth]{FrenkelKontorovaResults3} \end{center} \vspace*{-2.5mm} \caption{Frenkel-Kontorova energy \eqref{counterex} of the eight Kantorovich plans with extremal $2$-point marginal from Figure \ref{F:KantPoly}, as a function of the mismatch parameter $a$ (see Figure \ref{F:FKmodel}). As $a$ crosses $\tfrac{1}{2}$, the minimizer changes from the Monge plan ${\rm Id}$ to the non-Monge plan ${\rm F} 112$.} \label{F:FKresults} \end{figure} ad 2): This follows from the first equality in \eqref{costid}. \\[1mm] ad 3): Let $\gamma$ be any minimizer of ${\mathcal{C}}$ on ${\mathcal{P}}_{{\overline{\lambda}}}(X^3)$. By the first equality in \eqref{costid} so is $S\gamma$, whence by 1) we must have $S\gamma=\gamma_*$. Since, for any probability measure on $X^N$, $supp\, \gamma\subseteq supp\, S\gamma$, it follows that $\gamma=a\delta_{112}+b\delta_{121} + c\delta_{211} + d\delta_{233} + e\delta_{323} + f\delta_{332}$ for some $a,\, b, \, c, \, d, \, e, \, f\ge 0$. The marginal condition \eqref{Kantconstr} implies, in particular, that $\gamma(\{ a_1 \}\times X\times X) = \gamma(X\times\{ a_1 \} \times X)=\gamma(X\times X\times \{ a_1 \} ) =\tfrac{1}{3}$, whence $a+b=a+c=b+c=\tfrac{1}{3}$. By elementary linear algebra, this system is uniquely solved by $a=b=c=\tfrac{1}{6}$. Analogously, by evaluating the marginals of $\gamma$ on $\{ a_3 \}$ instead of $\{ a_1 \}$ we obtain $d=e=f=\tfrac{1}{6}$. This shows that $\gamma=\gamma_*$. \\[1mm] Finally we need to show that $\gamma_*$ is neither Monge nor symmetrized Monge. The former is obvious because otherwise $\gamma_*$ would have to be a linear combination of $3$ Dirac measures not $6$. To prove the latter, we note that the relation $\gamma_*=S\gamma$ for some Monge state $\gamma$ would imply, by way of the first equality in \eqref{costid}, that $\gamma$ itself is a minimizer, contradicting uniqueness since $\gamma$ cannot be equal to the non-Monge state $\gamma_*$. \\[2mm] We will infer Theorem \ref{T:1} from the stronger result below which gives the extreme points of the symmetric Kantorovich polytope. \begin{theorem}\label{T:2} The symmetric Kantorovich polytope ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ for $3$ marginals and $3$ states ($N=\ell=3$) has precisely $22$ extreme points, given by the Kantorovich plans in Table \ref{Table:1}. $7$ of these are symmetrized Monge states and $15$ are not (see the 3rd column). \end{theorem} The physical meaning of the $22$ extreme points as molecular packings is shown in Figure \ref{F:KantStatesIconized}. In this visualization, extremality has a simple physical meaning, not limited to $N=\ell=3$: \begin{equation} \label{irred} \hspace*{-4mm} \begin{array}{c} \mbox{$\gamma$ is an extreme point of the} \\ \mbox{symmetric Kantorovich polytope} \end{array} \! \Longleftrightarrow \begin{array}{c} \mbox{the molecular packing is {\it irreducible}, that is, not decom-} \\ \mbox{posable into uniform fillings with fewer molecules.} \end{array} \end{equation} \begin{figure} \begin{center} \vspace*{-1cm} \includegraphics[width=0.6\textwidth]{KantorovichStates1} \\ \vspace*{-2.5mm} \includegraphics[width=0.6\textwidth]{KantorovichStates2} \\ \vspace*{-7.5mm} \includegraphics[width=0.6\textwidth]{KantorovichStates3} \end{center} \vspace*{-2.5mm} \caption{Physical meaning of the 22 extreme points of the symmetric Kantorovich polytope ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ for 3 marginals and 3 sites ($N=\ell=3$) as molecular packings. Each Kantorovich plan corresponds to a uniform filling of the $3$ sites by $3$-particle molecules; extremal plans correspond to irreducible fillings (see \eqref{irred}). See Figure \ref{F:1} for how to translate the pictures into the plans in Table \ref{Table:1}.} \label{F:KantStatesIconized} \end{figure} \noindent {\bf Proof of Theorem \ref{T:1} using Theorem \ref{T:2}:} Since the reduced polytope ${\mathcal{P}}_{N-rep,{\overline{\lambda}}}(X^2)$ is the image of the symmetric polytope ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ under the marginal map $M_2$, and since this map is linear, the reduced polytope is the convex hull of the set $$ \{M_2\gamma \, : \, \gamma \mbox{ is an extreme point of }{\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)\}. $$ The elements of the latter set are listed in Table \ref{T:1} (see column 4). By inspection the first $8$ elements are all different, and by inspection of \ref{F:KantPoly} none of them is contained in the convex hull of the others. Furthermore, we claim that the last $14$ elements in column 4 are strict convex combinations of the first $8$ elements, more precisely: \begin{align} & M_2(Kiij,kkk) = \tfrac{1}{4} M_2({\rm Id}) + \tfrac{3}{4} M_2(Tij) \;\;\; (i, \, j, \, k \mbox{ all different}), \\ & M_2(Kiij,jjk) = \tfrac{1}{2} \bigl( M_2({\rm F} iij) + M_2({\rm K} iij,kkk ) \bigr) \;\;\; (i, \, j, \, k \mbox{ all different}), \\ & M_2({\rm I},{\rm C} ) = M_2({\rm I}, {\rm C} ') = \tfrac{1}{3}M_2(I) + \tfrac{2}{3} M_2({\rm C} ). \end{align} (Here index sequences like $iij$ are to be interpreted as $jii$ in case $j<i$, to match the notation in Table \ref{Table:1}.) These relations can be seen geometrically in Figure \ref{F:KantPoly2}. \begin{figure} \begin{center} \includegraphics[width=0.75\textwidth]{KantorovichPolytopeExtended2} \\ \end{center} \vspace*{-2.5mm} \caption{The 2-point marginals of the 22 extreme points of the symmetric Kantorovich polytope ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ for 3 marginals and 3 sites ($N\! =\!\ell\!=\! 3$). Coordinate axes are as in Fig.~\ref{F:KantPoly}. Here $Kiij$ stands for the state $Kiij,kkk$, and the unannotated grey points correspond to the states $Kiij,jjk$.} \label{F:KantPoly2} \end{figure} It follows that the extreme points of the reduced Kantorovich polytope consist of the first $8$ elements of Table \ref{Table:1} column 4, and moreover that these elements have no other inverse image under $M_2$ in the symmetric Kantorovich polytope than the corresponding plans in column 2. This establishes all claims in Theorem \ref{T:1} except which of the first 8 plans in column 2 are symmetrized Monge plans. That the $5$ plans ${\rm Id}$, ${\rm T} ij$ ($i<j$), and ${\rm C}$ are symmetrized Monge is clear. The most elementary (if not the most elegant) way to check that ${\rm F} 122$, ${\rm F} 113$, ${\rm F} 122$ are not goes as follows: list the $3!=6$ permutations of $\{1,2,3\}$ in the form $\{\tau_1,...,\tau_6\}$; note that each symmetrized Monge state can be written in the form $S\gamma$ with $\gamma$ as in \eqref{Mongeansatz} with three permutations ${\rm Id}$, $\tau_i$, $\tau_j$ ($i<j$), which gives $\tbinom{6}{2}=15$ possibilities; check that the 10 remaining possibilities other than those leading to the $5$ already discussed Monge plans do not yield ${\rm F} 122$, ${\rm F} 113$, ${\rm F} 122$. A more elegant criterion for when a plan is symmetrized Monge is given in \cite{FV18}. \\[2mm] {\bf Proof of Theorem \ref{T:2}}. The symmetric Kantorovich polytope is a finite-dimensional set defined by both linear inequality and linear equality constraints; by standard results from linear programming (see e.g. \cite{Be09} Section 2) the extreme points can be found by solving certain subsystems of the linear constraint equations. In our case these subsystems are at most $3\times 3$ since -- due to the state space consisting only of $3$ points -- the marginal constraint \eqref{Kantconstr} is $3$-dimensional. Thus finding the extreme points is an exercise in linear algebra, and can quickly be done by hand without resorting to (symbolic or numerical) software. For completeness we include the details. \\[1mm] The linear space spanned by the symmetric probability measures on $X^3$ has the canonical basis $\{S\delta_{ijk} \, : \, 1\le i\le j\le k\le \ell\}$, i.e., for $\ell=3$, $\{\delta_{111}, \; \delta_{222}, \; \delta_{333}, \; S\delta_{112}, \; S\delta_{113}, \; S\delta_{122}, \; S\delta_{223}, $ $S\delta_{133}, \; S\delta_{233}, \; S\delta_{123}\}$. Thus we may identify symmetric measures on $X^3$ with ten-dimensional vectors $$ \alpha = (\alpha_{111}, \, \alpha_{222}, \, \alpha_{333}, \, \alpha_{112}, \, \alpha_{113}, \, \alpha_{122}, \, \alpha_{223}, \, \alpha_{133}, \, \alpha_{233}, \, \alpha_{123}), $$ via the expansion $\gamma=\sum_{1\le i\le j \le k}\alpha_{ijk}S\delta_{ijk}$. With this identification, the symmetric Kantorovich polytope \eqref{newset1} turns into the set of vectors $\alpha\in\R^{10}$ satisfying \begin{align} & \;\; \alpha \ge 0 \mbox{ componentwise}, \label{Pos} \\[-10\jot] & \underbrace{\begin{pmatrix} 1 & 0 & 0 & \tfrac{2}{3} & \tfrac{2}{3} & \tfrac{1}{3} & 0 & \tfrac{1}{3} & 0 & \tfrac{1}{3} \\[0.5mm] 0 & 1 & 0 & \tfrac{1}{3} & 0 & \tfrac{2}{3} & \tfrac{2}{3} & 0 & \tfrac{1}{3} & \tfrac{1}{3} \\[0.5mm] 0 & 0 & 1 & 0 & \tfrac{1}{3} & 0 & \tfrac{1}{3} & \tfrac{2}{3} & \tfrac{2}{3} & \tfrac{1}{3} \end{pmatrix}}_{=:A} \begin{array}{c} \textcolor{white}{\vdots} \\ \textcolor{white}{.} \\ \begin{pmatrix} \alpha_{111} \\[0.5mm] \alpha_{222} \\[0.5mm] \alpha_{333} \\[0.5mm] \vdots \\[0.5mm] \alpha_{123} \end{pmatrix} \end{array} = \begin{pmatrix} \tfrac{1}{3} \\[0.5mm] \tfrac{1}{3} \\[0.5mm] \tfrac{1}{3} \end{pmatrix}. \label{linconstr} \end{align} It is well known (see e.g. \cite{Be09} Section 2) that the extreme points are given by those vectors satisfying \eqref{Pos}--\eqref{linconstr} such that the matrix columns corresponding to the nonzero components of $\alpha$ are linearly independent. In particular, the number of nonzero components of $\alpha$ must be either $1$, $2$, or $3$, giving us three cases to investigate. \\[1mm] {\bf Case 1: $\alpha$ has $1$ nonzero component.} The only constant column of $A$ is the last one, so the nonzero component of $\alpha$ must be the last one, i.e. $\alpha_{123}$. This yields the extreme point $\gamma=S\delta_{123}$ (called ${\rm C}$ in Table \ref{Table:1} because it is the symmetrized Monge state generated by the powers of the cyclic permutation ${\rm C}$). \\[1mm] {\bf Case 2: $\alpha$ has $2$ nonzero components.} First we claim that $\alpha_{123}$ must be zero. This is because otherwise the constraint \eqref{linconstr} would force the column of $A$ corresponding to the other nonzero component of $\alpha$ to be a constant vector, contradicting linear independence. Next, the first $3$ components of $\alpha$ must also be zero, because otherwise $A\alpha$ would contain two unequal components. Thus the columns associated with the nonzero components of $\alpha$ must both come from the ``middle block'' (columns 4 to 9). The only combinations that work are $\alpha_{112}=\alpha_{233}=\tfrac{1}{2}$, $\alpha_{113}=\alpha_{223}=\tfrac{1}{2}$, and $\alpha_{122}=\alpha_{233}=\tfrac{1}{2}$, yielding the three ``Frenkel-Kontorova'' extreme points ${\rm F} 112$, ${\rm F} 113$, ${\rm F} 122$ in the table. \\[1mm] {\bf Case 3: $\alpha$ has $3$ nonzero components.} First, note that again $\alpha_{123}$ must be zero, since otherwise the marginal condition forces the sum of the other two columns to be a constant vector, contradicting linear independence. We subdivide the remaining possibilities according to the number of columns from the ``first block'' (columns 1 to 3). \\[1mm] {\bf 3a: $3$ columns from the first block.} In this case $\alpha_{111}=\alpha_{222}=\alpha_{333}=\tfrac{1}{3}$, yielding $\gamma=\tfrac{1}{3}(\delta_{111}+\delta_{222}+\delta_{333})$ (called ${\rm Id}$ in the table because it is the Monge state generated by the powers of the identity). \\[1mm] {\bf 3b: $2$ columns from the first block.} The remaining column must be one of the six columns from the middle block. If it is, e.g., the first of these columns (corresponding to $\alpha_{112}\neq 0$), one finds that the other two columns must be the ones corresponding to $\alpha_{222}$ and $\alpha_{333}$, yielding $\gamma=\tfrac{1}{2}S\delta_{112} + \tfrac{1}{6}\delta_{222} + \tfrac{1}{3}\delta_{333}$. Proceeding analogously for the other five columns from the middle block gives the six states from ${\rm K} 233,111$ to ${\rm K} 112,333$ in the table. \\[1mm] {\bf 3c: $1$ column from the first block.} Suppse, e.g., that it is the first column, corresponding to $\alpha_{111}\neq 0$. The other two columns cannot contain the entry $\tfrac{2}{3}$, because otherwise the first component of $A\alpha$ would exceed the maximum of the other two components. This leaves only $\tbinom{4}{2}=6$ choices. The only ones yielding a solution to \eqref{Pos}--\eqref{linconstr} are the column pairs corresponding to $\alpha_{122}$ and $\alpha_{233}$, or $\alpha_{133}$ and $\alpha_{223}$, or $\alpha_{223}$ and $\alpha_{233}$. This gives the three extreme points $\tfrac{1}{4}(\delta_{111}+S\delta_{122}) + \tfrac{1}{2}S\delta_{233} = {\rm K} 233,122$, $\tfrac{1}{4}(\delta_{111}+S\delta_{133}) + \tfrac{1}{2}S\delta_{223} = {\rm K} 223,133$, and $\tfrac{1}{3}(\delta_{111}+S\delta_{223}+S\delta_{233}) ={\rm T} 23$. Proceeding analogously for $\alpha_{222}$ and $\alpha_{333}$ yields the six states from ${\rm K} 112,223$ to ${\rm K} 233,122$ and the three states from ${\rm T} 12$ to ${\rm T} 23$ in the table. \\[1mm] {\bf 3d: No column from the first block.} Hence all three columns come from the middle block. Suppose, e.g., that one of them is the first column, corresponding to $\alpha_{112}\neq 0$. This leaves only $\tbinom{5}{2}=10$ choices for the additional column pair. The only choice yielding a solution to \eqref{Pos}--\eqref{linconstr} is the pair corresonding to $\alpha_{223}$ and $\alpha_{113}$, giving $\gamma=\tfrac{1}{3}S(\delta_{112} + \delta_{223} + \delta_{133})$. Taking into account that we could have started with any other component from the middle block in place of $\alpha_{112}$, we obtain the two states ${\rm I,C}$ and ${\rm I,C'}$ in the table. This completes the derivation of the set of extreme points. \\[1mm] Finally, to complete the proof of Theorem \ref{T:2} it remains to check which of these extreme points is symmetrized Monge. This can be done in a straightforward manner by proceeding as in the proof of Theorem \ref{T:1}. \section{Convex geometry of the Monge ansatz} The Monge ansatz \eqref{Mongeansatz} corresponds to replacing the reduced Kantorovich polytope of $N$-representable two-point probability measures with uniform marginal by the convex hull of those probability measures which come from symmetrized Monge states, \begin{equation} \label{Mongeset} {\mathcal{M}}_{N-rep}(X^2) = conv\{p\in{\mathcal{P}}(X^2)\, : \, p=M_2S\gamma \mbox{ for some }\gamma \mbox{ of form }\eqref{Mongeansatz}\}, \end{equation} where $conv$ means convex hull. We call this set the {\it reduced Monge polytope for $N$ marginals and $\ell$ states}. Unfortunately, the definition \eqref{Mongeset}, just like \eqref{Plambdabar}, is very abstract, and poorly understood. Many questions pose themselves: \\[2mm] 1) What does the passage from \eqref{Plambdabar} to \eqref{Mongeset} mean {\it geometrically}? 2) How ``big'' is the difference between the two polytopes? 3) How big is the induced error in optimal cost, at worst? 4) For precisely which class of costs is the error zero? \\[2mm] In our model case $N=\ell=3$, the reduced Monge polytope is straightforwared to calculate explicitly (see Proposition \ref{P:Monge} below), and is plotted in Figure \ref{F:MongePoly}, thereby answering Question 1). One sees that as compared to the Kantorovich polytope in Figure \ref{F:KantPoly}, three slices of significant size around each of the vertices ${\rm F} 112$, ${\rm F} 113$, ${\rm F} 122$ are cut off. \begin{figure} \begin{center} \includegraphics[width=0.75\textwidth]{MongePolytope} \end{center} \caption{The reduced Monge polytope for $3$ marginals and $3$ states ($N=\ell=3$). It is obtained from the Kantorovich polytope in Figure \ref{F:KantPoly} by moving the non-Monge vertices ${\rm F} 112$, ${\rm F} 113$, ${\rm F} 122$ by an amount of $\tfrac{1}{6}$ towards the point $C$.} \label{F:MongePoly} \end{figure} \begin{proposition} \label{P:Monge} The reduced Monge polytope \eqref{Mongeset} has precisely $8$ extreme points, given by $M_2\gamma$ where $\gamma$ is one of the following plans: \begin{align} & {\rm Id, \; T12, \; T13, \; T23, \; C} \;\; \mbox{(see Table \ref{Table:1})}, \\ & \underbrace{S\tfrac{1}{3}(\delta_{121}+\delta_{213} + \delta_{332})}_{=:{\small {\rm T} 12,\!{\rm T} 23}}, \;\;\; \underbrace{S\tfrac{1}{3}(\delta_{131}+\delta_{223} + \delta_{312})}_{=:{\small {\rm T} 13,{\rm T} 23}}, \;\;\; \underbrace{S\tfrac{1}{3}(\delta_{123}+\delta_{212} + \delta_{331})}_{=:{\small {\rm T} 12,{\rm T} 13}}. \end{align} The last three states correspond, respectively, to the collection of permutations $\{{\rm Id},\, {\rm T} 12, \, {\rm T} 23\}$, $\{{\rm Id},\, {\rm T} 13, \, {\rm T} 23\}$, $\{{\rm Id},\, {\rm T} 12, \, {\rm T} 13\}$ (see Remark 3 in the introduction for nomenclature). \end{proposition} {\bf Proof} The proof is straightforward: as in the proof of Theorem \ref{T:1}, we write each symmetrized Monge state in the form $S\gamma$ with $\gamma$ as in \eqref{Mongeansatz} and three permutations ${\rm Id}$, $\tau_i$, $\tau_j$ ($i<j$), which gives 15 possibilities, compute the associated $2$-point marginals, and check which of them lie outside the convex hull of the others. \\[2mm] The physical meaning of the extreme points is shown in Figure \ref{F:MongeStatesIconized}. \begin{figure} \begin{center} \includegraphics[width=0.6\textwidth]{MongeStatesIconized1} \end{center} \caption{Physical meaning of the $8$ extreme points of the reduced Monge polytope ${\mathcal{M}}_{N-rep}(X^2)$ for $3$ marginals and $3$ states ($N=\ell=3$) as molecular packings. This picture immediately reveals that the states in the 3rd row fail to be extreme points of the symmetric Kantorovich polytope as they can be decomposed into two uniform packings with fewer molecules. This fact does not appear to be so obvious from the mathematical expressions in Proposition \ref{P:Monge}.} \label{F:MongeStatesIconized} \end{figure} \section{Gallery of 3-marginal problems on 3 sites with pairwise interaction minimized by Monge states} \label{S:gallery} Our geometric results from Section \ref{S:geo} can not just be used to find counterexamples to the Monge ansatz, but also to justify it for various interesting costs. Let $X=\{a_1,a_2,a_3\}$, i.e. $\ell=3$, and let $d$ be an arbitrary metric on $X$. Prototypical is the euclidean distance $d(x,y)=|x-y|$ when $X$ is a collection of points in $\R^d$. Our interest is in the three-marginal OT problem with pairwise costs which depend only on the metric distances between the points in $X$ (i.e., physically, the interparticle distances). That is to say we consider functionals of form \begin{equation} \label{metrcost} {\mathcal{C}}[\gamma ] = \int_{X^3} \bigl( v(d(x,y)) + v(d(y,z)) + v(d(x,z)) \bigr) \, d\gamma(x,y,z) \mbox{ for some potential }v\, : \, [0,\infty )\to\R. \end{equation} Our goal is to minimize \eqref{metrcost} over the set \eqref{newset1} of symmetric probability measures on $X^3$ with uniform marginal, for various interesting classes of potentials $v$. Of course, it would be of interest to extend the results below to arbitrary finite state spaces \eqref{space}, i.e. an arbitrary number of sites, or even to continuous state spaces. Nevertheless we feel that analyzing the minimalistic case of only 3 sites is of value because one can see without being impeded by combinatoric or analytic complications how common consitutive assumptions on the potential such as monotonicity or convexity drive the minimizers towards the ``Monge'' region of the symmetric Kantorovich polytope. \\[2mm] {\bf Example 4.1: Positive power cost $v(d)=d^p$, $0<p<\infty$}. Note that for $p=2$ this is the Gangbo-\'{S}wi\k{e}ch cost \cite{GS98}. The unique minimizer of \eqref{metrcost} on ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ is the Monge state $\gamma=\tfrac{1}{3}(\delta_{111} + \delta_{222} + \delta_{333})$, which corresponds to the collection of permutations $\{\tau_1,\tau_2,\tau_3\} = \{{\rm Id},{\rm Id},{\rm Id}\}$. This is trivial because the integrand in \eqref{metrcost} is minimized pointwise if and only if $x=y=z$, and the above $\gamma$ is the only element of ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ which is supported on the diagonal $\{(x,x,x)\, : \, x\in X\}$. \\[2mm] {\bf Example 4.2: Negative power cost $v(d)=\tfrac{1}{d^{\alpha}}$, $\alpha>0$}. Note that for $\alpha=1$ this is the Coulomb cost \cite{CFK11,BDG12,FMPCK13,Pa13,CDD13,CFM14,CFP15}, see also \cite{SGS07,Se99}. The unique minimizer of \eqref{metrcost} on ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ is the symmetrized Monge state $\gamma=S\delta_{123}$. This is because $v(d(x,x))=\infty$ for all $x\in X$ (since $d$ is a metric, which implies $d(x,x)=0$), and the above $\gamma$ is the unique element of ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ whose 2-point marginal vanishes on the diagonal $\{(x,x)\, : \, x\in X\}$ of $X^2$. \\[2mm] {\bf Example 4.3: General attractive costs, i.e. $v(d)$ strictly increasing in $d$}. As in Example 4.1, the unique minimizer is the Monge state $\gamma=\tfrac{1}{3}(\delta_{111} + \delta_{222} + \delta_{333})$ generated by powers of the identity. This follows by arguing as in Example 4.1. \\[2mm] {\bf Example 4.4: General repulsive costs, i.e. $v(d)$ strictly decreasing in $d$}. This example is a little less trivial, and illustrates the virtues of the Monge ansatz. We claim that there always exists a minimizer of Monge form. This can be seen as follows. Denote $d_{ij}:=d(a_i,a_j)$, $c_{ij}:=v(d_{ij})$, $\mu_{ij}:=\ell (M_2\gamma)(\{(a_i,a_j)\} )$. For any $\gamma\in {\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ we find by first using the symmetry of $\gamma$ and then the marginal equations $\mu_{11}=1-(\mu_{12}+\mu_{13})$, $\mu_{22}=1-(\mu_{12}+\mu_{23})$, $\mu_{33}=1-(\mu_{13}+\mu_{23})$ that the cost \eqref{metrcost} evaluates to \begin{eqnarray} {\mathcal{C}}[\gamma] &=& \sum_{i=1}^3 c_{ii}\mu_{ii} + 2\sum_{i<j} c_{ij}\mu_{ij} \; = \; c_{11} + c_{22} + c_{33} \\ && + \bigl(2c_{12}-(c_{11}\! +\! c_{22})\bigr) \mu_{12} + \bigl(2c_{13}-(c_{11}\! +\! c_{33})\bigr) \mu_{13} + \bigl(2c_{23}-(c_{22}\! +\! c_{33})\bigr) \mu_{23}. \label{Cred} \end{eqnarray} Since, for $i\neq j$, $d_{ij}>0=d_{ii}=d_{jj}$, and $v$ is strictly decreasing, we have \begin{equation} \label{star} 2c_{ij} - (c_{ii}+c_{ij}) < 0 \mbox{ for all }i<j. \end{equation} This means that the vertex $(\mu_{12},\mu_{23},\mu_{13})=(\tfrac12,\tfrac12,\tfrac12)$ of the reduced Kantorovich polytope (see Figure \ref{F:KantPoly}) (corresponding to $\gamma={\rm C}$) always gives lower cost than the vertex $(0,0,0)$ (corresponding to $\gamma={\rm Id}$) and the vertices $(\tfrac12,\tfrac12,0)$, $(\tfrac12,0,\tfrac12)$, $(0,\tfrac12,\tfrac12)$ (corresponding to ${\rm F} 112$, ${\rm F} 122$, ${\rm F} 113$). This shows that for any strictly decreasing $v$, one of ${\rm T} 12$, ${\rm T} 13$, ${\rm T} 23$, ${\rm C}$ is a minimizer. In particular, there always exists a minimizer of symmetrized Monge form, as asserted. Moreover every minimizer is a convex combination of these 4 states. That all these 4 states can indeed occur as unique minimizers of repulsive costs can be seen from Examples 4.5 and 4.6. \\[2mm] {\bf Example 4.5: Repulsive positive-power cost, i.e. $v(d)=-d^p$, $p>0$}. Here we confine ourselves to $X=\{1,2,3\}\subset\R$ (equidistant points on the line), $d(x,y)=|x-y|$ (euclidean 1D metric). Note that $p=2$ corresponds to the repulsive harmonic oscillator \cite{DGN15, GKR18}. Heuristically, because the largest distance is $d_{13}$, if $p$ is large this cost should favour the vertex $(\mu_{12},\mu_{23},\mu_{13})=(0,0,\tfrac{2}{3})$ of the reduced Kantorovich polytope, i.e. the state ${\rm T} 13$. Indeed, we already know from Example 4.4 that any minimizer is a convex combination of the four states ${\rm T} 12$, ${\rm T} 13$, ${\rm T} 23$, ${\rm C}$, and by plugging them into \eqref{Cred} we find that for $p<\log 6/\log 2=2.58496...$ the unique minimizer of \eqref{metrcost} on ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ is ${\rm C}$, while for $p>\log 6/\log 2$ it is ${\rm T} 13$. The critical exponent emerges because ${\mathcal{C}}[{\rm C}]-{\mathcal{C}}[{\rm T} 12]=-2 + 2^p/3$. \\[2mm] {\bf Example 4.6: General repulsive convex costs, i.e. $v$ strictly decreasing and convex}. Here we consider again an arbitrary metric $d$ on $X$. We claim that the unique minimizer of \eqref{metrcost} on ${\mathcal{P}}_{sym,{\overline{\lambda}}}(X^3)$ is the symmetrized Monge state $\gamma=S\delta_{123}$ generated by the cyclic permutation ${\rm C}$. By the findings of Example 4.4, it suffices to show that ${\mathcal{C}}[{\rm C}]<{\mathcal{C}}[{\rm T} ij]$ for all $i<j$. Consider, for instance, ${\rm T} 13$. To start with, by the triangle inequality for the metric, $$ d_{13}\le d_{12} + d_{23} =: d'_{13}, $$ and consequently -- since $v$ is decreasing -- \begin{equation} \label{one} c_{13} = v(d_{13}) \ge v(d_{13}')=:c_{13}'. \end{equation} Moreover, since $d_{13}'>0$ we may write, with $\lambda := d_{12}/d_{13}'$, $d_{12}=(1-\lambda)\cdot 0 + \lambda d_{13}'$ and $d_{23}=\lambda\cdot 0 + (1-\lambda)d_{13}'$. By convexity of $v$, it follows that \begin{eqnarray*} c_{12} &\le & (1-\lambda )v(0) + \lambda c_{13}', \\ c_{23} &\le & \lambda v(0) + (1-\lambda )c_{13}'. \end{eqnarray*} Adding these inequalities yields \begin{equation} \label{two} c_{12} + c_{23} \le v(0) + c_{13}'. \end{equation} Armed with these inequalities, we can now analyze the cost difference ${\mathcal{C}}[{\rm C}]-{\mathcal{C}}[{\rm T} 13]$. By \eqref{Cred} and the fact that ${\rm C}$ and ${\rm T} 13$ correspond, respectively, to $(\mu_{12},\mu_{23},\mu_{13})=(\tfrac12,\tfrac12,\tfrac12)$ and $(0,0,\tfrac23)$ (see Figure \ref{F:KantPoly}), we find that $$ {\mathcal{C}}[{\rm C}]-{\mathcal{C}}[{\rm T} 13] = (2c_{12}-2v(0))\cdot \tfrac12 + (2c_{23}-2v(0))\cdot\tfrac12 + (2c_{13}-2v(0))\cdot (-\tfrac16) = c_{12}+c_{23}-\tfrac13 c_{13} - \tfrac53 v(0). $$ Plugging \eqref{one}, \eqref{two} into this expression gives $$ {\mathcal{C}}[{\rm C}] - {\mathcal{C}}[{\rm T} 13] \le \tfrac{2}{3}(c_{13}-v(0)), $$ which is $<0$ since $v$ is strictly decreasing. Arguing analogously for ${\rm T} 12$ and ${\rm T} 23$ establishes that ${\rm C}$ is the unique minimizer. \section{Frenkel-Kontorova gas and formation of microstructure} \label{S:micro} At first sight our finite-state-space results in Section \ref{S:geo} may seem far from continuous optimal transport. In fact they can be used to establish the following simple -- and physically intuitive -- continuous counterexample to the Monge ansatz in 3-marginal optimal transport. \\[2mm] Let us replace the finite state space \eqref{space} by an interval $X=[a,b]$ and the marginal measure \eqref{unif} by its continuous analogue on $[a,b]$, \begin{equation} \label{unif'} \lambda = \tfrac{1}{b-a} \, dx \; \mbox{ where $dx$ is the Lebesgue measure}. \end{equation} For $3$ marginals ($N=3$), the marginal condition \eqref{Kantconstr} becomes \begin{equation} \label{Kantconstr'} \gamma( \Omega\times X\times X) = \gamma( X\times\Omega\times X) = \gamma( X\times X\times\Omega) \mbox{ for all Borel sets }\Omega\subseteq X \end{equation} (notation: $\gamma\mapsto\lambda$), leading to the set of Kantorovich plans ${\mathcal{P}}_\lambda(X^3)=\{\gamma \in {\mathcal{P}}(X^3)\, : \, \eqref{Kantconstr'}\}$. Here ${\mathcal{P}}(X^3)$ denotes the set of Borel probability measures on $X^3$. The Monge ansatz \eqref{Mongeansatz} turns into \begin{equation} \label{Monge'} \gamma = \int_{[a,b]} d(x) \delta_{T_2(x)}(y) \delta_{T_3(x)}(z) \, dx \mbox{ for some }T_2, \, T_3\in{\mathcal{M}}_\lambda \end{equation} (or, in optimal transport notation, $\gamma = (id,T_2,T_3)_\sharp \lambda$), where $d(x)=\tfrac{1}{b-a}$ is the (constant) density of the measure \eqref{unif'} and ${\mathcal{M}}_\lambda$ is the usual set of Monge maps which push $\lambda$ forward to itself, \begin{equation} \label{MongeMaps} {\mathcal{M}}_\lambda = \{ T \, : \, X\to X \, : \, T \mbox{ Borel measurable, }T_\sharp \lambda = \lambda \}. \end{equation} Here, as usual, $(T_i)_\sharp \lambda = \nu$ means that $T$ pushes $\lambda$ forward to $\nu$, i.e. $\lambda(T^{-1}(\Omega)) = \nu(\Omega)$ for all Borel sets $\Omega$. Maps belonging to \eqref{MongeMaps} are called Monge maps and the resulting 3-point probability measures \eqref{Monge'} are called Monge plans. As before our interest is in symmetric and pairwise costs \begin{equation} \label{Kantcts} {\mathcal{C}}[\gamma ]= \int_{[a,b]^3} \bigl( v(|x-y|) + v(|y-z|) + v(|x-z|) \bigr) \, d\gamma(x,y,z), \;\; v\, : \, [0,\infty )\to\R \mbox{ continuous}. \end{equation} For Monge plans \eqref{Monge'} the cost obviously satisfies ${\mathcal{C}}[\gamma]=I[T_2,T_3]$ where \begin{equation} \label{Mongered} I[T_2,T_3] = \int_a^b d(x) \bigl( v(|x-T_2(x)|) + v(|T_2(x)-T_3(x)|) + v(|x-T_3(x)|) \bigr) \, dx . \end{equation} \begin{example} \label{E:cts} (1D homogeneous Frenkel-Kontorova gas) Let $X=[0,3]$ and $v(r)=\frac{r^4}4-\frac{r^3}3$, and consider the 3-marginal OT problem of minimizing \eqref{Kantcts} subject to $\gamma\mapsto\lambda$. (Physically, this corresponds to seeking the ground state of a 1D homogeneous gas of 3-particle molecules, with particles within a molecule interacting via the Frenkel-Kontorova-like potential $v$ (see Figure \ref{F:micro}, right panel.) \\[1mm] a) The infimum of ${\mathcal{C}}$ over the set of Monge plans \eqref{Monge'} is not attained. The infimum over symmetrized Monge plans is not attained either. \\[1mm] b) A minimizer of ${\mathcal{C}}$ over the set of Kantorovich plans ${\mathcal{P}}_\lambda(X^3)$ is given by $$ \gamma = S\int_0^3 \!\! \alpha(x) \delta_{T_2(x)}(y)\delta_{T_3(x)}(z) \, dx $$ (or, in optimal transport notation, $\gamma = S \, (id,T_2,T_3)_\sharp \, \alpha \, dx$) where $S$ is the symmetrization operator \eqref{S} and $$ \alpha(x) = \begin{cases} \tfrac12, & x\in [0,1]\cup[2,3] \\ 0, & x\in (1,2), \end{cases}, \;\; T_2(x)=x, \;\; T_3(x) = \begin{cases} x+1, & x\in[0,1], \\ x, & x\in(1,2) \\ x-1, & x\in[2,3]. \end{cases} $$ \end{example} We remark that the plan in b) has the form of a continuous analogue of a {\it quasi-Monge state}; the latter notion is introduced in \cite{FV18}. \\[2mm] To understand heuristically what is going on, let us rewrite the Kantorovich minimizer as \begin{equation} \label{super} \gamma = \int_{[0,1]} S \Bigl( \tfrac12 \delta_a (x) \delta_a (y) \delta_{a+1}(z) +\tfrac12 \delta_{a+1} (x) \delta_{a+2} (y) \delta_{a+2}(z) \Bigr) \, da. \end{equation} This is nothing but a continuous superposition of translates of the Frenkel-Kontorova minimizer $\gamma_*={\rm F} 112$ from Example \ref{E:counter}. The first contribution in the integrand is a copy of the blue molecule in the right panel of Figure \ref{F:FKmodel}, translated by $a$ to the right; the second contribution is a copy of the purple molecule, translated likewise. \\[2mm] As regards the nonattainment of the Monge infimum, the reader may wonder what a typical minimizing sequence, i.e. a sequence of Monge maps $T_2^{(\nu)}$, $T_3^{(\nu)}$ such that $\lim_{\nu\to\infty} I[T_2^{(\nu)},T_3^{(\nu)}] = \inf I$, will look like. An example of a minimizing sequence is shown in Figure \ref{F:micro}. (To obtain the sequence from the single picture, take the width of the intervals where the maps are affine to be $\tfrac{1}{2\nu}$.) \begin{figure} \begin{minipage}{0.67\textwidth} \begin{center} \includegraphics[width=\textwidth]{MicrostructureComputergraphics} \end{center} \end{minipage} \begin{minipage}{0.32\textwidth} \begin{center} \includegraphics[width=0.76\textwidth]{Potential} \end{center} \end{minipage} \vspace*{-5mm} \caption{Microstructure and nonattainment in Monge multi-marginal optimal transport. {\it Left panel}: Minimizing sequence of the problem in Example \ref{E:cts}. Physically the problem corresponds to finding the ground state of a 1D homogeneous gas of 3-particle molecules, with particles (``atoms'') within a molecule interacting via the potential $v$. {\it Right panel}: The Frenkel-Kontorova-like interatomic potential $v(r)=\tfrac{r^4}{4}-\frac{r^3}{3}$ which causes these wild oscillations. } \label{F:micro} \end{figure} Note that if the width of the intervals on which the maps are affine is made smaller and smaller, the triple of distances $|x-T_2(x)|$, $|T_2(x)-T_3(x)|$, $|x-T_3(x)|$ approaches the optimal set of values $\{(0,1,1),(1,0,1),(1,1,0)\}$, for every $x$. But this means that $T_2^{(\nu)}$ and $T_3^{(\nu)}$ develop faster and faster oscillations (``microstructure'') everywhere in the domain and converge weakly but not strongly in $L^p([0,3])$ ($1<p<\infty$) to the non-minimizing maps $$ T_2(x)=T_3(x)=\begin{cases} x+\tfrac12, & x\in[0,1] \\ x, & x\in(1,2) \\ x-\tfrac12, & x\in[1,2]. \end{cases} $$ Unfortunately we cannot offer an analogous result for {\it all} minimizing sequences. \\[2mm] {\bf Proof of the assertions in Example \ref{E:cts}}. The proof is perhaps even more instructive than the example itself. Instead of ad hoc arguments we proceed by reduction to a finite state space, then use the geometric results from Section \ref{S:geo}. First of all let us determine the pointwise minimizers of the integrand in \eqref{Kantcts}. Because $x,y,z\in\R$, one of the distances $|x-y|$, $|y-z|$, $|x-z|$ is the sum of the other two, and the elementary calculus problem of minimizing $v(r_1)+v(r_2)+v(r_1+r_2)$ on $[0,\infty)^2$ is solved precisely when $(r_1,r_2)=(0,1)$ or $(1,0)$ (hence our choice of the potential $v$). It follows that the integrand in \eqref{Kantcts} is minimized if and only if $(|x-y|,|y-z|,|x-z|)\in\{ (0,1,1),(1,0,1),(1,1,0)\}$. The plan \eqref{super} is clearly supported on this set, establishing b). To show a), note first that by b), any minimizer $\tilde{\gamma}$ must be supported in the above set. Suppose $\tilde{\gamma}$ is of Monge form. Since $|T_j(x)-x|\in\{0,1\}$ a.e., we must in particular have $T_j(x)\in[0,3]\cap (x+\mathbb{Z})$ a.e. We partition the integration in \eqref{Mongered} according to these finitely many possiblities, and parametrize the possiblities by two maps $t_1,\, t_2\, : \, B=\{-1,0,1\} \to B$. Why this is a good parametrization will be come clear shortly. For any two such maps, define $$ \Omega_{t_2,t_3} := \{ x\in (1,2) \, : \, T_2(x+b)=x+t_2(b) \mbox{ for all }b\in B, \; T_3(x+b)=x+t_3(b) \mbox{ for all }b\in B\} . $$ Then, up to a set of measure zero, $$ [0,3] = \bigcup_{t_2, \, t_3\, : \, B\to B} \Omega_{t_2,t_3} \cup (\Omega_{t_2,t_3}-1) \cup (\Omega_{t_2,t_3}+1) \;\; (\mbox{disjoint union}) $$ and consequently, by decomposing the integral over $[0,3]$ in \eqref{Mongered} accordingly, \begin{equation} \label{partition} {\mathcal{C}}[\tilde{\gamma} ] = \sum_{t_2,t_3\, : \, B\to B} |\Omega_{t_2,t_3}| \, \tilde{{\mathcal{C}}}[\tilde{\gamma}_{t_2,t_3}], \;\;\; \sum_{t_2,t_3\, : \, B\to B} |\Omega_{t_2,t_3}|=1, \end{equation} where $\tilde{\gamma}_{t_2,t_3}$ is the following probability measure on the finite state space $B^3$ $$ \tilde{\gamma}_{t_2,t_3} = \tfrac13 \sum_{b\in B=\{-1,0,1\} } \delta_{b} \otimes \delta_{t_2(b)} \otimes \delta_{t_3(b)}, $$ and $\tilde{C}$ is the finite-state-space cost on ${\mathcal{P}}(B^3)$ obtained from \eqref{Kantcts} by replacing the domain of integration $[a,b]^3$ by $B^3$. In fact we know more about the $\tilde{\gamma}_{t_2,t_3}$. By the push-forward condition in \eqref{MongeMaps} we have $(T_j)_\sharp \lambda|_{\Omega\cup(\Omega-1)\cup(\Omega+1)} = \lambda|_{\Omega\cup(\Omega-1)\cup(\Omega+1)}$ for all Borel $\Omega\subseteq (1,2)$ and consequently, whenever $|\Omega_{t_2,t_3}|>0$, $(t_j)_\sharp {\overline{\lambda}} = {\overline{\lambda}}$ where ${\overline{\lambda}}$ is the uniform measure $\tfrac{1}{3}\sum_{b\in B}\delta_b$ on $B$, that is to say the $t_j$ are permutations. So the $\tilde{\gamma}_{t_2,t_3}$ are finite Monge states; but we know from Section \ref{S:geo} that the cost of symmetrized Monge states (and hence, by \eqref{minid}, of Monge states) is strictly bigger than the Kantorovich minimum of $\tilde{{\mathcal{C}}}$, since the only extreme point of the symmetric Kantorovich polytope supported in the set of minimizers of $v(|x-y|)+v(|y-z|)+v(|x-z|)$ on $B^3$ is the non-Monge plan ${\rm F} 112$ (see Theorem \ref{T:2} or Figure \ref{F:KantStatesIconized}). This together with \eqref{partition} shows that the minimum cost in the continuous and the finite problem are equal, i.e. $$ \min_{\gamma\in{\mathcal{P}}_\lambda([0,3]^3)} {\mathcal{C}}[\gamma] = \min_{\tilde{\gamma}\in{\mathcal{P}}_{\overline{\lambda}}(B^3)} \tilde{{\mathcal{C}}}[\tilde{\gamma}], $$ and that $\tilde{\gamma}$ as well as its symmetrization $S\tilde{\gamma}$ have strictly bigger cost, i.e. \begin{equation} \label{ineq} {\mathcal{C}}[\tilde{\gamma}] = {\mathcal{C}}[ S\tilde{\gamma} ] > \min_{\gamma\in{\mathcal{P}}_\lambda ([a,b]^3)} {\mathcal{C}}[\gamma]. \end{equation} Finally, it is well known for much more general OT problems than the one here that the Kantorovich minimum equals the Monge infimum. Together with \eqref{ineq} this establishes b). \\[5mm] {\bf Acknowledgements.} The author thanks Maximilian Fichtl and Daniela V\"ogler for helpful discussions. \begin{small}
\section{Summary and outlook}\label{sec.summary} Dynamic stabilisation (DS) was introduced to deal with instabilities found in complex Langevin simulations, especially when the gauge coupling is small or the unitarity norm rises steadily. The method is based on adding a non-holomorphic drift to complex Langevin dynamics to keep simulations in the vicinity of the SU($3$) manifold. We have studied the dependence of the observables on the control parameter $\alpha_{\mathrm{DS}}$ and have presented a criterion to tune it appropriately. We also found numerical evidence that the DS drift decreases when the lattice spacing is reduced and has a localised distribution. Dynamic stabilisation improved results on the deconfinement transition for HDQCD, previously shown in \cite{Seiler:2012wz}, where a discrepancy between reweighting and complex Langevin was observed. We find good agreement with reweighting for all gauge couplings in both confined and deconfined phases. We presented a study of complex Langevin simulations of QCD with na\"ive staggered fermions at vanishing chemical potential. After extrapolating the Langevin results to zero step size, we found excellent agreement between complex Langevin and hybrid Monte-Carlo simulations for the plaquette and chiral condensate for four different lattice volumes, despite dynamic stabilisation adding a non-holomorphic drift. Our findings rectify the discrepancy found in earlier studies in~\cite{Sinclair:2015kva, Sinclair:2016nbg}. For $\mu > 0$, we were able to observe changes in the chiral condensate as the chemical potential increases at high temperatures. In those cases, dynamic stabilisation kept the unitarity norm under control and allowed for long simulations. However, the extent of these studies were limited, as simulations at lower temperatures showed a numerical difficulty arising from the inversion of the fermion matrix. More analytical work on the justification of dynamic stabilisation is desirable, as DS formally violates the proof of convergence of CL. Nevertheless, numerical evidence clearly shows no difference between HMC and CL, even at a sub-permille level. This needs to be confirmed at non-zero $\mu$, by comparing with other approaches, such as those mentioned in section~\ref{intro}. We are currently working on using improved algorithms and state-of-the-art inversion techniques. Those will allow for better control over the inversion of quark matrix and enable simulations at lower temperatures and finite density. \section{Introduction} \label{intro} Strongly interacting matter at finite baryon number density and temperature has been, and remains, an active research subject to understand QCD under extreme conditions. Features of QCD are typically studied in thermodynamic equilibrium, where the theory has two external parameters: the temperature $T$ and and baryon chemical potential $\mu_B$. Varying those allows the exploration of the QCD phase diagram in the $T$--$\mu_B$ plane. Known phases include ordinary nuclear matter and the quark-gluon plasma (QGP), with a colour superconducting phase expected at large $\mu_B$. Of great appeal are also the boundaries that mark the transition between these phases. This phase diagram has a fascinating structure, which is of significance for the study of hot and/or dense systems, such as the early universe and heavy-ion collisions. Heavy-ion collisions have been successfully used to investigate the high temperature behaviour of QCD at the Relativistic Heavy Ion Collider (RHIC) and the Large Hadron Collider (LHC). These facilities, together with future ones, namely the Facility for Antiproton and Ion Research (FAIR) and the Nuclotron-based Ion Collider Facility (NICA), will further explore the phase diagram of QCD. They will allow the study of hadronic interactions under extreme conditions, such as higher baryonic density or very high temperatures. From a theoretical perspective, some insight, at high temperature or density, can be gained from perturbation theory. A full picture of the phase diagram, however, requires non-perturbative methods. Recent lattice results at non-zero temperature include~\cite{Borsanyi:2013bia,Bazavov:2014pvz}. Typically, lattice QCD simulations at finite baryon/quark density are carried out using the grand canonical ensemble, with the chemical potential introduced as conjugate variable to the appropriate number density (quark, baryon, etc). At finite quark chemical potential, the simulations have to overcome the infamous \textit{sign problem}---a complex weight in the Euclidean path integral. This imposes severe limitations on the applicability of standard numerical methods~\cite{deForcrand:2010ys, Aarts:2015tyj}. Many approaches to deal with the sign problem have been proposed, including the complex Langevin method~\cite{Parisi:1984cs,Klauder:1983nn,Klauder:1983zm,Klauder:1983sp}, strong coupling expansions~\cite{deForcrand:2014tha,Glesaaen:2015vtp,deForcrand:2017fky}, Lefschetz thimbles~\cite{Witten:2010cx,Cristoforetti:2012su,Alexandru:2015sua,Fujii:2013sra,Nishimura:2017vav}, holomorphic gradient flow~\cite{Alexandru:2016gsd}, density of states~\cite{Langfeld:2012ah,Gattringer:2016kco,Garron:2016noc,Endrodi:2018zda} and sign-optimized manifolds~\cite{Alexandru:2018fqp}. The complex Langevin (CL) method is an extension of the stochastic quantisation technique~\cite{Parisi:1980ys} to a complexified configuration space, without requiring a positive weight~\cite{Parisi:1984cs,Klauder:1983zm,Klauder:1983sp}. The complex nature of the method allows the circumvention of the sign problem, even when it is severe~\cite{Aarts:2008wh,Aarts:2010gr,Aarts:2011zn}. However, convergence to wrong limits has been observed both at Euclidean time~\cite{Ambjorn:1985iw, Ambjorn:1986fz, Aarts:2010aq}, and real time~\cite{Berges:2006xc, Berges:2007nr}. These cases of incorrect convergence can be identified \textit{a posteriori}, based on the theoretical justification of the method~\cite{Aarts:2009uq,Aarts:2011ax,Aarts:2012ft,Aarts:2013uza}. Further discussions on the criteria for correct convergence of complex Langevin can be found in~\cite{Nagata:2016vkn,Nagata:2018net}. Moreover, gauge cooling (GC)~\cite{Seiler:2012wz} has improved the convergence of complex Langevin simulations for gauge theories. The effects of gauge cooling on the complex Langevin method have been studied analytically in~\cite{Nagata:2015uga}. Investigations of gauge cooling in random matrix theories has been performed in~\cite{Nagata:2016alq,Bloch:2017sex}. Complex Langevin simulations, combined with gauge cooling, have successfully been used in QCD with a hopping expansion to all orders~\cite{Aarts:2014bwa}, with fully dynamical staggered fermions~\cite{Sexty:2013ica} and to map the phase diagram of QCD in the heavy-dense limit (HDQCD)~\cite{Aarts:2016qrv}. In that work, we noticed that, despite the use of gauge cooling, instabilities might appear during the simulations. Here, we introduce and elaborate on our method of Dynamic Stabilisation (DS), which has been constructed to deal with these instabilities. This paper is organised as follows: in section~\ref{sec.complexLangevin} we review the complex Langevin method. Section~\ref{sec.DS} motivates and introduces the method of dynamic stabilisation. Tests of this procedure, applied to QCD in the limit of heavy-dense quarks (HDQCD)~\cite{Bender:1992gn,Aarts:2008rr} are discussed in sections~\ref{sec.alphaScan} and~\ref{sec.betaScan}. Section~\ref{sec.stag.DS} shows the outcome of applying dynamic stabilisation to simulations with staggered quarks at zero chemical potential and at finite chemical potential and high temperatures. We summarise our findings in sec.~\ref{sec.summary}. Appendices~\ref{sec.hdqcd} and~\ref{sec.stag} review the HDQCD approximation and the staggered formulation of lattice quarks, which have been used in our investigations. Preliminary results on dynamic stabilisation have already appeared in~\cite{Aarts:2016qhx, Attanasio:2016mhc, Attanasio:2017rxk}. \section{Complex Langevin}\label{sec.complexLangevin} We study QCD by employing the method of stochastic quantisation~\cite{Parisi:1980ys}, with which quantum expectation values can be computed using Langevin dynamics. These expectation values are evaluated as averages over a stochastic process, in which dynamical variables are evolved over a fictitious time $\theta$. Notably, importance sampling does not enter in this formulation. The partition function for lattice QCD in the grand canonical ensemble, where the (quark) chemical potential $\mu$ couples to the quark number, is \begin{equation} Z = \int DU \, \det M \, e^{-S_{\mathrm{YM}}} \equiv \int DU \, e^{-S}\,, \end{equation} where, for the second equality, the bilinear quark fields have been integrated out. $U$ represents the gauge links, $S_{\mathrm{YM}}$ is the Yang--Mills action and $M$ the fermion matrix, which depends on the gauge links and the chemical potential, and $S = S_{\mathrm{YM}} - \ln \det M$. We consider a SU($3$) gauge theory with links $U_{x,\nu}$, defined on a lattice of spatial volume $N_s^3$ and temporal extent $N_\tau$. A Langevin update, using a first-order discretisation scheme in the Langevin time $\theta = n \varepsilon$, is given by~\cite{Damgaard:1987rr} \begin{equation} U_{x,\nu}(\theta + \varepsilon) = \exp\left[ i\lambda^a \left(\varepsilon K^a_{x,\nu} + \sqrt{\varepsilon} \eta^a_{x,\nu} \right) \right] U_{x,\nu}(\theta)\,, \end{equation} where $\lambda^a$ are the Gell-Mann matrices, with $\mathrm{Tr} \left[ \lambda^a \lambda^b \right] = 2 \delta^{ab}$, and $\eta^a_{x,\nu}$ are Gaussian white noise fields satisfying \begin{equation} \langle \eta^a_{x,\mu} \rangle = 0\,, \quad \langle \eta^a_{x,\mu} \eta^b_{y,\nu} \rangle = 2 \delta_{xy} \delta^{ab} \delta_{\mu\nu}\,. \end{equation} The Langevin drift, $K^a_{x,\nu}$, is obtained from the action $S$, \begin{equation}\label{eq.drift} K^a_{x,\nu} = -D^a_{x,\nu} S = -D^a_{x,\nu} S_{\mathrm{YM}} + \mathrm{Tr} \left[ M^{-1} D^a_{x,\nu} M \right]\,, \end{equation} where $D^a_{x,\nu}$ is the gauge group derivative \begin{equation} D^a_{x,\nu} f(U) = \frac{\partial}{\partial \alpha} f \left.\left( e^{i \alpha \lambda^a} U_{x,\nu} \right)\right|_{\alpha=0}\,. \end{equation} Poles may appear in the drift in the presence of quarks, when $\det M = 0$ and $M^{-1}$ does not exist. In some situations this has a negative impact on the results~\cite{Mollgaard:2013qra,Nishimura:2015pba}, but, as far as understood, this is not the case in HDQCD~\cite{Aarts:2014bwa,Splittorff:2014zca}. For further reference, we refer the reader to the extended discussion on the issues arising from the branch cuts of the logarithm of the determinant~\cite{Mollgaard:2013qra,Splittorff:2014zca,Greensite:2014cxa,Nishimura:2015pba} In~\cite{Aarts:2017vrv} it was clarified that it is the drift's behaviour around the poles, rather than the branch cuts, that affects the reliability of the complex Langevin method. It is necessary to employ adaptive algorithms to change the Langevin step size $\varepsilon$, in order to avoid numerical instabilities and regulate large values of the drift~\cite{Aarts:2009dg}. When the sign problem is present, the Langevin drift is complex. This results in the exploration of a larger configuration space. The sign problem is circumvented by allowing the gauge links to take values in enlarged manifolds~\cite{Aarts:2008rr,Parisi:1984cs,Klauder:1983nn,Klauder:1983zm,Klauder:1983sp,Aarts:2008wh,Aarts:2009uq}. In the case of QCD, the gauge group extends from SU($3$) to SL($3,\mathbb{C}$). The extra freedom can lead to trajectories where the non-unitary parts of the gauge links are not small deformations of the original theory. The ``distance'' from the unitary manifold can be used to identify these trajectories. A possible measurement of this distance is given by the unitarity norm \begin{equation} d = \frac{1}{3 \Omega} \sum_{x,\nu} \mathrm{Tr} \left[ U_{x,\nu} U^\dagger_{x,\nu} - \mathbb{1} \right]^2 \geq 0\,, \end{equation} where $\Omega = N_s^3 N_\tau$ is the four dimensional lattice volume. This norm is invariant under SU($3$) gauge transformations and vanishes only if all links $U_{x,\nu}$ are unitary. It has been shown that simulations in which the unitarity norm is kept under control lead to reliable results, matching exact ones or results from different methods, when available \cite{Seiler:2012wz,Aarts:2016qrv}. One procedure to reduce the distance to the unitary manifold is known as gauge cooling \cite{Seiler:2012wz}. It consists of a sequence of SL($3,\mathbb{C}$) gauge transformations, designed to decrease the unitarity norm in a steepest descent style \begin{align} U_{x,\nu} &\to e^{-\varepsilon \alpha \lambda^a f^a_x} \, U_{x,\nu} \, e^{\varepsilon \alpha \lambda^a f^a_x}\,,\\ f^a_x = 2 \sum_\nu &\mathrm{Tr}\left[ \lambda^a \left( U_{x,\nu} U^\dagger_{x,\nu} - U^\dagger_{x-\nu,\nu} U_{x-\nu,\nu} \right) \right]\,. \end{align} The transformation parameters, $f^a_x$, are obtained by requiring that the first variation of $d$ with respect to a gauge transformation is negative semi-definite. The coefficient $\alpha$ can be changed adaptively to optimise the cooling procedure \cite{Aarts:2013uxa}. A variable number of gauge cooling steps, depending on the rate of change of the unitarity norm, can be applied between successive Langevin steps \cite{Aarts:2015hnb}. In our studies involving the heavy-dense limit of QCD (HDQCD)~\cite{Bender:1992gn,Aarts:2008rr}, we have considered the expectation value of the traced (inverse) Polyakov loops, \begin{align} \langle P \rangle &= \frac{1}{V} \sum_{\vec{x}} \langle P_{\vec{x}} \rangle\,, \qquad P_{\vec{x}} = \frac{1}{3} \mathrm{Tr} \mathcal{P}_{\vec{x}}\,,\\ \langle P^{-1} \rangle &= \frac{1}{V} \sum_{\vec{x}} \langle P^{-1}_{\vec{x}} \rangle\,, \qquad P^{-1}_{\vec{x}} = \frac{1}{3} \mathrm{Tr} \mathcal{P}^{-1}_{\vec{x}}\,, \end{align} where $V$ is the spatial volume. The average Polyakov loop is an order parameter for Yang-Mills theories, as it is related to the free energy of a single quark by $\langle P \rangle \sim e^{-F_q / T}$. In the presence of dynamical quarks, it is no longer an order parameter. However, it still provides information on whether quarks are free or confined within hadrons. Another useful observable is the average phase of the quark determinant, measured in a phase quenched ensemble, \begin{equation} \left\langle e^{2i \phi} \right\rangle = \left\langle \frac{\det M(\mu)}{\det M(-\mu)} \right\rangle_{\mathrm{PQ}}\,. \end{equation} When the sign problem is mild, the phase is not expected to vary much, leading to an average close to unity. On the other hand, in situations with severe sign problems, $e^{2i \phi}$ can average out to zero. When dealing with fully dynamical quarks, we have studied the chiral condensate \begin{equation} \langle \overline{\psi} \psi \rangle = \frac{T}{V} \frac{\partial}{\partial m} \ln Z\,. \end{equation} This is an order parameter only for massless quarks, but like the Polyakov loop, still provides information on quark confinement in general. \section{Heavy-dense QCD}\label{sec.hdqcd} A useful testing ground for methods to deal with the sign problem is the heavy-dense limit of QCD (HDQCD)~\cite{Bender:1992gn,Aarts:2008rr}. In this model, quarks can only evolve in the (Euclidean) temporal direction, with the spatial hoppings neglected. The gluonic action is the standard Wilson gauge action. The temporal hoppings are kept, so that all dependence on the chemical potential is retained. This model shares interesting features with QCD, such as the sign and overlap problems as well as a phase transition at zero temperature and finite $\mu$, and is therefore ideal for testing the effects of dynamic stabilisation. The QCD effective action reads \begin{equation} S = S_{\mathrm{YM}} - \ln \det M(U, \mu)\,, \end{equation} with $S_{\mathrm{YM}}$ being the Wilson gauge action, at inverse coupling $\beta$. The HDQCD fermion determinant simplifies to \begin{equation} \det M = \prod_{\vec{x}} \left\{ \det \left[ 1 + h e^{\mu/T} \mathcal{P}_{\vec{x}} \right]^2 \left[ 1 + h e^{-\mu/T} \mathcal{P}^{-1}_{\vec{x}} \right]^2 \right\}\,, \end{equation} where $T = 1/N_\tau$ is the temperature, $\mu$ is the chemical potential, $h = (2 \kappa)^{N_\tau}$. Lattice units are used throughout this paper. The Polyakov loop and its inverse read \begin{equation} \mathcal{P}_{\vec{x}} = \prod^{N_\tau-1}_{\tau=0} U_{(\vec{x},\tau), \hat{4}}\,, \quad \mathcal{P}^{-1}_{\vec{x}} = \prod^{0}_{\tau=N_\tau-1} U^{-1}_{(\vec{x},\tau), \hat{4}}\,. \end{equation} The term with $e^{-\mu/T}$, which is irrelevant in the heavy-dense limit ($\kappa \to 0$ and $\mu \to \infty$, with $\kappa e^\mu$ kept constant), is required for the symmetry $\left[ \det M(\mu) \right]^* = \det M(-\mu^*)$. \section{Staggered quarks}\label{sec.stag} We have used the unimproved staggered fermion action for $N_F$ fermion flavours, whose matrix elements read \begin{align} M(U, \mu)_{x,y} &= m \delta_{x,y} + \sum_\nu \frac{\eta_\nu(x)}{2} \left[ e^{\mu \delta_{\nu, 4}} U_{x,\nu} \delta_{x + a_{\nu}, y} \right.\nonumber\\ &\quad\left. - e^{-\mu \delta_{\nu, 4}} U^{-1}_{x-a_{\nu},\nu} \delta_{x - a_{\nu}, y} \right]\,,\label{eq.stag.matrix} \end{align} with $x$ and $y$ being spacetime coordinates, $\eta_\nu(x)$ the Smit-Kawamoto phase and $a_\nu$ is a unit vector in the $\nu$-direction. \iffalse , \begin{equation} \eta_\nu(x) = (-1)^{\sum_{i=1}^{\nu-1} x_\mu}\,, \quad \eta_1(x) = 1\,. \end{equation} \fi The staggered fermion matrix has the symmetry, \begin{equation} \epsilon_x M(U,\mu)_{x,y} \epsilon_y = M^*(U, -\mu^*)_{y,x}\,, \end{equation} where $\epsilon_x = (-1)^{x_1 + x_2 + x_3 + x_4}$ is the staggered equivalent of $\gamma_5$. This implies that $\det M(U, \mu) = \det M^\dagger(U, -\mu^*)$, leading to a complex effective action and a sign problem for real chemical potentials. The Langevin drift originating from the effective action using eq. (\ref{eq.stag.matrix}) is given by \begin{align} K_F &= D^a_{x,\mu} \ln \det M(U,\mu) \nonumber\\ &=\frac{N_F}{4} \mathrm{Tr} \left[ M^{-1}(U, \mu) D^a_{x,\mu} M(U, \mu) \right]\,. \end{align} We have used the bilinear noise scheme and the conjugate gradient method to evaluate the trace and inversion, respectively, in the fermionic drift~\cite{Sexty:2013ica}. At $\mu=0$ the drift is real. However, in the bilinear noise scheme this is true only on average. Therefore, a non-zero unitarity norm is expected. \section{Dynamic stabilisation}\label{sec.DS} We found that even with a large number of gauge cooling steps, instabilities still may appear~\cite{Aarts:2016qrv} in HDQCD simulations. These change the distribution of the observables during the Langevin process and lead to wrong results. \begin{figure} \centering \includegraphics[width=0.95\linewidth]{plots/alphaScan/polyakovNorm.pdf} \caption{\label{fig.HD.tunnel} The average Polyakov loop (red) and unitarity norm (green) as functions of the Langevin time for HDQCD on a $10^3 \times 4$ lattice, with $\kappa=0.04$, $\beta=5.8$ and $\mu=0.7$. Agreement with reweighting is found when the unitarity norm is lower than $O(0.1)$. The data was first presented in~\protect\cite{Aarts:2016qrv}.} \end{figure} Figure~\ref{fig.HD.tunnel} shows the Langevin time evolution of the Polyakov loop and of the unitarity norm. This situation has a very mild sign problem, with average phase $\langle e^{2i\phi} \rangle = 0.9978(2) - 0.0003(57)i$, and thus results from reweighting are reliable. We observe two distinct regions: one is characterised by a sufficiently small unitarity norm and agreement between gauge cooling and reweighting results. At a larger Langevin time, i.e. $\theta \gtrsim 50$, the agreement disappears as the unitarity norm becomes too large. It has been concluded in~\cite{Aarts:2016qrv} that a large unitarity norm is an indicator of these instabilities, with $0.03$ being a conservative threshold, after which results become unreliable. To keep the unitarity norm under control we have developed a new technique---dynamic stabilisation---which consists of adding a SU($3$) gauge invariant force to the Langevin drift. This force is designed to grow rapidly with the unitarity norm $d$ and to be directed towards the SU($3$) manifold. One possible implementation is given by the substitution \begin{equation}\label{eq.drift.lang.DS} K^a_{x,\mu} \to K^a_{x,\mu} + i \alpha_{\mathrm{DS}} M^a_x\,, \end{equation} with the new term \begin{equation}\label{eq.DS.term} M^a_x = i b^a_x \left( \sum_c b^c_x b^c_x \right)^3 \end{equation} and \begin{equation} b^a_x = \mathrm{Tr} \left[ \lambda^a \sum_\nu U_{x,\nu} U^\dagger_{x,\nu} \right]\,. \end{equation} We remark that our choice for the additional force, which acts equally in all four directions, is not unique. The parameter $\alpha_{\mathrm{DS}}$ allows us to control the strength of the this force. A similar strategy has been used successfully for nonrelativistic fermions in one dimension~\cite{Loheac:2017yar,Rammelmuller:2017vqn}. We point out that $M^a_x$ is not invariant under general SL($3, \mathbb{C}$) gauge transformations, but it is with respect to SU($3$) transformations. Moreover, it is not holomorphic, since it is constructed to be a function of only the non-unitary part of the gauge links, i.e., of the combination $UU^\dagger$. This is necessary to make $M^a_x$ scale with the unitarity norm, such that explorations of the non-unitary directions can be controlled. Therefore, it cannot be obtained from a derivative of the action. This invalidates the standard justification for the validity of complex Langevin~\cite{Aarts:2009uq,Aarts:2011ax}, which require a holomorphic Langevin drift. Nevertheless, numerical evidence of the convergence to the correct limit of CL simulations with dynamic stabilisation will be shown in sections~\ref{sec.betaScan} and~\ref{sec.stag.DS}. A na\"ive expansion of $M^a_x$ in powers of the lattice spacing is possible if one writes the SL($3,\mathbb{C}$) gauge links as $U_{x,\nu} = \exp\left[ i a \lambda^a \left( A^a_{x,\nu} + i B^a_{x,\nu} \right) \right]$. Then, formally, \begin{align} M^a_x &\sim a^7 \left( \sum_c \overline{B}^c_x \overline{B}^c_x \right)^3 \overline{B}^a_x + O(a^8)\,,\\ \overline{B}^a_x &= \sum_\nu B^a_{x,\nu}\,. \end{align} The continuum behaviour will be discussed in section \ref{sec.betaScan}, where we show results for different gauge couplings. By construction, the DS drift is purely imaginary and thus acts only on the imaginary parts of the Langevin drift. Checks of how the Langevin and DS drifts behave in a situation with a severe sign problem are shown in section~\ref{sec.alphaScan}. An initial result of complex Langevin simulations using one step of gauge cooling\footnote{We have checked that multiple gauge cooling steps lead to a negligible improvement. At least one gauge cooling step is required, since dynamic stabilisation does not affect the real part of the drift, which can develop large fluctuations~\cite{Aarts:2013uxa}.} and dynamic stabilisation is shown in fig.~\ref{fig.HD.tunnel.DS}. We have used the same parameters of fig.~\ref{fig.HD.tunnel} and found agreement with reweighting for the entire length of the simulation. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/polyakovDS.pdf} \caption{\label{fig.HD.tunnel.DS} The average Polyakov loop as function of the Langevin time for HDQCD on a $10^3 \times 4$ lattice, with $\kappa=0.04$, $\beta=5.8$, $\mu=0.7$ and $\alpha_{\mathrm{DS}}=100$.} \end{figure} Figure~\ref{fig.HD.tunnel.DS} also demonstrates that it is possible to stabilise complex Langevin simulations in a way that gauge cooling alone is not able to, allowing for longer simulation times and thus smaller statistical errors. \section{Dependence of observables on \texorpdfstring{$\alpha_{\mathrm{DS}}$}~}\label{sec.alphaScan} The complexity of gauge theories makes it difficult to predict the effect of the control parameter $\alpha_{\mathrm{DS}}$ on the Langevin dynamics. However, two limiting cases can be expected: for small $\alpha_{\mathrm{DS}}$ the DS drift becomes very small, essentially not affecting the dynamics. For large values of $\alpha_{\mathrm{DS}}$, the DS force heavily suppresses excursions into the non-unitary directions of SL($3,\mathbb{C}$), which can be interpreted as a gradual reunitarisation of the gauge links. We illustrate the effect of different $\alpha_{\mathrm{DS}}$ on complex Langevin simulations of HDQCD in two cases. The first scenario corresponds to an average phase of the quark determinant close to unity, i.e., when the sign problem is mild and comparisons with reweighting are possible. In the second case, the average phase is very small, indicating a severe sign problem. Both scenarios have been simulated with inverse coupling $\beta=5.8$ and hopping parameter $\kappa=0.04$. Additionally, one gauge cooling step has been applied between consecutive Langevin updates. Results for the first scenario are shown in fig.~\ref{fig.alpha.scan}. These simulations use a volume of $\Omega=10^3 \times 4$ and chemical potential $\mu=0.7$. We find agreement with reweighting for sufficiently large $\alpha_{\mathrm{DS}}$. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/polyakovDSnew.pdf} \caption{\label{fig.alpha.scan} The average Polyakov loop as a function of $\alpha_{\mathrm{DS}}$ compared with the result generated with reweighting for HDQCD in a $10^3 \times 4$ lattice, with $\kappa=0.04$, $\beta=5.8$ and $\mu=0.7$. Agreement is found once $\alpha_{\mathrm{DS}}$ is sufficiently large.} \end{figure} Figure~\ref{fig.alpha.scan} seems to indicate that one could choose an arbitrarily large $\alpha_{\mathrm{DS}}$. However, it is necessary to keep in mind that, for these parameters, these simulations have the average phase of the fermion determinant close to unity, and a very mild sign problem. When the sign problem is severe, indicated by a highly oscillating phase of the fermion determinant, reweighting cannot be applied reliably. In principle, complex Langevin combined with gauge cooling is a viable option to simulate these regions of the phase diagram. However, as seen in fig.~\ref{fig.HD.tunnel}, we have observed disagreement with reweighting, when the unitarity norm becomes too large. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/polyakov2.pdf} \caption{\label{fig.HD.zeroDet.time}The Langevin time evolution of the Polyakov loop using gauge cooling (top) and dynamic stabilisation (bottom) for HDQCD on a $8^3 \times 20$ lattice, with $\kappa=0.04$, $\beta=5.8$ and $\mu=2.45$. After a short Langevin time ($\theta \approx 20$) the Polyakov loop changes its behaviour when DS is not used.} \end{figure} Figure~\ref{fig.HD.zeroDet.time} shows the Polyakov loop as function of the Langevin time for a scenario with severe sign problem, without and with DS. These simulations were carried out a volume of $\Omega=8^3 \times 20$ and $\mu=2.45$. In this case the average phase is $\langle e^{2i\phi} \rangle = -0.0042(35) - 0.0047(35)i$, indicating a very small overlap between the full and phase quenched models. The Polyakov loop in the simulation without DS changes to a different value for $\theta \gtrsim 20$ when the unitarity norm exceeds $O(0.1)$. We use the region before the unitarity norm rises as a reference point to test dynamic stabilisation. Due to this small sampling region, the statistical uncertainties of the gauge cooling simulations are comparatively large. The results are compatible for a wide region of $\alpha_{\mathrm{DS}}$, as shown in fig.~\ref{fig.alpha.scan.det.zero}. We find disagreement when $\alpha_{\mathrm{DS}}$ is outside a certain window. This can be understood as follows: for $\alpha_{\mathrm{DS}}$ very small the DS drift is too small to be effective; on the other hand, large values of the control parameter cause a heavy suppression of the exploration of the non-unitary directions. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/polyakovAlphaScan.pdf} \caption{\label{fig.alpha.scan.det.zero}The average Polyakov loop as function of $\alpha_{\mathrm{DS}}$ at $N_\tau=20$ and $\mu=2.45$. Also shown are results from simulations with gauge cooling. The vertical red lines indicate the region where there is agreement between GC and DS runs.} \end{figure} Figure~\ref{fig.alpha.scan.det.zero} shows the existence of a region in $\alpha_{\mathrm{DS}}$, which agrees with GC. Our data suggests that \begin{equation} \frac{\partial \mathcal{O}}{\partial \alpha_{\mathrm{DS}}} = 0\,, \label{eq.alphaDS} \end{equation} for a given observable $\mathcal{O}$, is a criterion for determining the region where DS gives the correct values\footnote{We thank Gert Aarts for suggesting this.}. In other words, the region of least sensitivity to $\alpha_{\mathrm{DS}}$ provides the best estimate. Fig.\ \ref{fig.alpha.scan.norm} shows the average unitarity norm as a function of $\alpha_{\mathrm{DS}}$ for both previously studied scenarions, with average phases close to unity and close to zero (parameters shown in the figure). It is visible that DS is able to restrict the exploration of SL($3,\mathbb{C}$) to submanifolds whose distance to SU($3$) decrease with $\alpha_{\mathrm{DS}}$. When the sign problem is severe, a plateau in the unitarity norm seems to emerge for large $\alpha_{\mathrm{DS}}$; while for milder sign problems, the results follow a power-law indicated by the line in the figure. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/normAlpha.pdf} \caption{\label{fig.alpha.scan.norm}The average unitarity norm as a function of $\alpha_{\mathrm{DS}}$ for HDQCD, with $\kappa=0.04$, $\beta=5.8$, and volume and chemical potential indicated on the figure. A power-law line was added to the data with average phase close to unity to guide the eye.} \end{figure} For the remainder of this section we study histograms of the drift of eq.~(\ref{eq.drift.lang.DS}), as they are relevant in the context of the criteria for correctness~\cite{Aarts:2009uq,Aarts:2011ax,Aarts:2012ft,Aarts:2013uza}: a heavy-tailed distribution leads to incorrect results. In fig.~\ref{fig.histogram.DS.det.zero} we show the histograms of the DS drift for four choices for the control parameter $\alpha_{\mathrm{DS}}$. These simulations correspond to the scenario with a severe sign problem, i.e. $\Omega=8^3 \times 20$ and $\mu=2.45$. Larger drifts are less frequent than smaller ones. For large enough values of $\alpha_{\mathrm{DS}}$ the histograms become more localised distributions. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/histograms/histogramRealDriftDS.pdf} \caption{\label{fig.histogram.DS.det.zero}Histogram of the drift added by dynamic stabilisation for different values of the control parameter $\alpha_{\mathrm{DS}}$.} \end{figure} For $\alpha_{\mathrm{DS}}=10^{0}$ we observe larger values of the product $\alpha_{\mathrm{DS}} \varepsilon M^a_x$, due to the larger unitarity norm. We remind the reader that $M^a_x$ is a function of the combination $UU^\dagger$ (see eq. \ref{eq.DS.term}), similar to the unitarity norm. As $\alpha_{\mathrm{DS}}$ increases, the unitarity norm decreases and then plateaus (seen in fig.~\ref{fig.alpha.scan.norm}), and so does $M^a_x$. Intuitively, for very large $\alpha_{\mathrm{DS}}$ the DS drift overshadows the Langevin drift coming from the physical action. The Langevin drift from eq.~(\ref{eq.drift.lang.DS}) has real and imaginary components given by \begin{align} \text{Re}[K^a_{x,\mu}] &= \text{Re}[-D^a_{x,\mu} S]\,,\label{eq.re.drift} \\ \text{Im}[K^a_{x,\mu}] &= \text{Im}[-D^a_{x,\mu} S] + i \alpha_{\mathrm{DS}} M^a_x\,.\label{eq.im.drift} \end{align} The suppression of the imaginary part of the Langevin drift can be seen in the histogram of fig.\ \ref{fig.histogram.Real.det.zero}. The real part of the drift is plotted in fig.\ \ref{fig.histogram.Imag.det.zero} and essentially remains unchanged by dynamic stabilisation, once $\alpha_{\mathrm{DS}}$ is sufficiently large, as evident in the inset. For too small values of $\alpha_{\mathrm{DS}}$, the system can explore a large region of SL($3,\mathbb{C}$), which causes a different behaviour and lead to convergence to a wrong limit. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/histograms/histogramRealDrift.pdf} \caption{\label{fig.histogram.Real.det.zero}Histogram of the imaginary part of the Langevin drift, i.e. eq.~(\ref{eq.im.drift}), multiplied by the Langevin step size, for different values of the DS control parameter $\alpha_{\mathrm{DS}}$.} \end{figure} \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/histograms/histogramImagDrift.pdf} \caption{\label{fig.histogram.Imag.det.zero}Histogram of the real part of the Langevin drift, i.e. eq.~(\ref{eq.re.drift}), multiplied by the Langevin step size, for different values of the DS control parameter $\alpha_{\mathrm{DS}}$.} \end{figure} \section{Continuum behaviour of dynamic stabilisation}\label{sec.betaScan} To check the continuum limit of the dynamic stabilisation, we have performed three simulations at different gauge couplings, specifically $\beta=5.4$, $5.8$ and $6.2$, in a lattice of volume $8^3 \times 20$, $\kappa=0.04$, $\mu=2.45$ and $\alpha_{\mathrm{DS}} = 10^3$. As in the previous section, we have applied one gauge cooling step between subsequent Langevin updates. The resulting histograms for the DS drift are shown in fig.~\ref{fig.histogram.DS.beta.det.zero}. At finer lattices, larger values of the dynamic stabilisation drift $M^a_x$ occur less frequently. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/histograms/histogramRealDriftDSbeta.pdf} \caption{\label{fig.histogram.DS.beta.det.zero}Histogram of the drift added by dynamic stabilisation for different values of the gauge coupling $\beta$.} \end{figure} Furthermore, the change in gauge coupling has a small effect on the real part of the Langevin drift, as seen in fig. \ref{fig.histogram.beta.det.zero}. These changes correspond to different physics being simulated at different lattice spacings. This implies that the drift arrising from DS, $M^a_x$, decreases faster than $K^a_x$. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/alphaScan/histograms/histogramImagDriftBeta.pdf} \caption{\label{fig.histogram.beta.det.zero}Histogram of the real part of the Langevin drift for different values of the gauge coupling $\beta$.} \end{figure} \section{Staggered quarks}\label{sec.stag.DS} \subsection{Staggered quarks at \texorpdfstring{$\mu = 0$}~} In order to evaluate the fermionic contribution to the Langevin drift of eq.~(\ref{eq.drift}) we employ a bilinear noise scheme and the conjugate gradient method to calculate the trace and inverse, respectively. One characteristic of the bilinear noise scheme is that, at $\mu=0$, the drift is real only on average~\cite{Sexty:2013ica}. Therefore, a non-zero unitarity norm is expected even for vanishing chemical potential. This can cause simulations to diverge. We have investigated whether DS is able to successfully keep the unitarity norm under control, by comparing complex Langevin and hybrid Monte-Carlo (HMC) simulations\footnote{We thank Philippe de Forcrand for providing the results from hybrid Monte-Carlo simulations.}. We have used four different lattice volumes, $6^4$, $8^4$, $10^4$ and $12^4$. First, we have identified a suitable value for the control parameter $\alpha_{\mathrm{DS}}$ following the procedure in section~\ref{sec.alphaScan}, i.e. using equation~(\ref{eq.alphaDS}). After finding the optimal values for $\alpha_{\mathrm{DS}}$ for each lattice size, we extrapolated the results to zero Langevin step size. We have performed studies with four degenerate quark flavours of mass $m = 0.025$ and inverse coupling $\beta = 5.6$. We have analysed the average values of the plaquette and (unrenormalised) chiral condensate. For these parameters, the quarks are deconfined, indicated by non-zero values for the chiral condensate. The results for the chiral condensate at zero chemical potential for $\Omega=6^4$ are shown in fig.~\ref{fig.stag.cc.zeroMu}, where the green band indicates the result from the HMC run. The Langevin simulations had an average step size of $\sim 4 \times 10^{-5}$, which leads to approximately $3000$--$5000$ independent configurations, including an auto-correlation analysis as proposed in~\cite{Wolff:2003sm}. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/staggered/zeroMu/6/cc.pdf} \caption{\label{fig.stag.cc.zeroMu}The chiral condensate at zero chemical potential as a function of $\alpha_{\mathrm{DS}}$. The green band represents the value obtained from a HMC simulation. The simulations were carried out in a volume of $6^3 \times 6$, four quark flavours of mass $m = 0.025$, and gauge coupling $\beta = 5.6$.} \end{figure} We find very good agreement between hybrid Monte-Carlo and complex Langevin simulations. The two leftmost points have a unitarity norm larger than $0.03$ and are thus not taken into account. Figure~\ref{fig.stag.plaq.zeroMu.12.extrap} displays a comparison of the plaquette between complex Langevin and HMC for the lattice volume of $12^4$. A straight line has been fitted to the points generated by the Langevin simulations to extrapolate to zero step size, as the integration scheme is of first order~\cite{Damgaard:1987rr}. We find clear agreement within the quoted uncertainties. Results for the average plaquette and chiral condensate after extrapolation to zero step size can be found in table~\ref{tb.stag.extrapolated}. The table shows excellent agreement between HMC and CL simulations for both observables in all four volumes considered. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/staggered/zeroMu/epsScan/plaq12.pdf} \caption{\label{fig.stag.plaq.zeroMu.12.extrap}The plaquette at zero chemical potential as a function of the average Langevin step size. The green band represents the value obtained from a HMC simulation and the blue region depicts the error band from the linear fit to the Langevin data.} \end{figure} \begin{table*} \centering \caption{\label{tb.stag.extrapolated}Average values for the plaquette and chiral condensate from simulations of four flavours of na\"ive staggered fermions at $\beta=5.6$, $m=0.025$ and $\mu=0$. The Langevin results have been obtained after extrapolation to zero step size.} \begin{tabular}{ccccc} \hline\noalign{\smallskip} & \multicolumn{2}{c}{Plaquette} & \multicolumn{2}{c}{$\overline{\psi} \psi$} \\ Volume & HMC & Langevin & HMC & Langevin \\ \noalign{\smallskip}\hline\noalign{\smallskip} $6^4$ & $0.58246(8)$ & $0.582452(4)$ & $0.1203(3)$ & $0.1204(2)$\\ $8^4$ & $0.58219(4)$ & $0.582196(1)$ & $0.1316(3)$ & $0.1319(2)$\\ $10^4$ & $0.58200(5)$ & $0.58201(4)$ & $0.1372(3)$ & $0.1370(6)$\\ $12^4$ & $0.58196(6)$ & $0.58195(2)$ & $0.1414(4)$ & $0.1409(3)$\\ \noalign{\smallskip}\hline \end{tabular} \end{table*} Recent works on complex Langevin and gauge cooling applied to staggered fermions include~\cite{Sinclair:2015kva, Sinclair:2016nbg}. There, a discrepancy between the CLE and exact results is reported for $V=12^4$ at the same inverse coupling and quark mass used here, but with two flavours of staggered fermions. This tension can potentially be removed by using dynamic stabilization and careful extrapolation to zero step size. A larger volume ($V=16^4$) has been considered in~\cite{Sinclair:2017zhn}. \subsection{Staggered quarks at \texorpdfstring{$\mu \neq 0$}~} We have carried out a qualitative simulation of staggered quarks at high temperatures spanning a wide range of $\mu$. The chemical potentials vary from $\mu=0$ until saturation, where the entire lattice is filled with quarks. We use lattices with a spatial volume of $V=12^3$ for two different temperatures, $N_\tau = 2$ and $4$, with two degenerate quark flavours of mass $m=0.025$. The inverse coupling is fixed to $\beta=5.6$. With these input parameters, the pion and nucleon masses are $m_\pi \approx 0.42$ and $m_N \approx 0.93$ in lattice units~\cite{Bitar:1993rk}. At high temperatures, the inversion of the fermion matrix is numerically cheap and converges quickly even for large $\mu$. At lower temperatures, however, we have seen that the inversion becomes more expensive, as the number of iterations easily exceed $10^4$. Further work using more state-of-the-art inverters and algorithms are under way and will enable simulations at lower temperatures. As before, we employ one step of gauge cooling and add a DS force with a control parameter of $\alpha_{\mathrm{DS}} = 10^3$. \begin{figure} \centering \includegraphics[width=0.85\linewidth]{plots/staggered/cc.pdf} \caption{\label{fig.stag.cc1}The chiral condensate as a function of the chemical potential, in units of the nucleon mass, for different temperatures. Also indicated are the lines of pion (left) and baryon (right) condensation.} \end{figure} The chiral condensate, shown in fig.~\ref{fig.stag.cc1}, is not extrapolated to zero step size, but serves a proof of principle. Also shown in the plot are vertical lines indicating the regions of pion ($\mu=m_{\pi}/2$) and baryon condensation ($\mu=m_N/3$). This figure shows that there are, in principle, no obstacles for a complex Langevin simulation of dynamical quarks. \section{Acknowledgements} We would like to thank Gert Aarts, D\'enes Sexty, Erhard Seiler and Ion-Olimpiu Stamatescu for invaluable discussions and collaboration. We are indebted to Philippe de Forcrand for providing us with the HMC results for staggered fermions. We are grateful for the computing resources made available by HPC Wales. This work was facilitated though the use of advanced computational, storage, and networking infrastructure provided by the Hyak supercomputer system at the University of Washington. The work of FA was supported by US DOE Grant No. DE-FG02-97ER-41014.
\section{Lower bound for $k$ uniformly placed agents in the ${\sf UNKNOWN}$\xspace setting} We now prove a lower bound on the idle time for any patrolling algorithm for $k$ agents with uniform initial placement in dynamic rings under the ${\sf UNKNOWN}$\xspace model. As mentioned in Section~\ref{sec:local}, this result holds only for agents with bounded memory. \noindent \textbf{Theorem~\ref{theorem:lowerboundlocal}}. {\it Consider a dynamic ring under the ${\sf UNKNOWN}$\xspace model with Local Snapshot and uniform initial placement. Given any patrolling algorithm ${\cal A}$ for $k$ agents, with $c={\cal O}(1)$ bits of memory, the idle time for patrolling is $I(n) \geq n-7\cdot2^{c}k$. In order to prove this result we have to introduce some concepts related to the state diagram of a patrolling algorithm ${\cal A}$ \paragraph{State diagram.} Given an algorithm ${\cal A}$ executed by an agent $a_j$, we can model it as a finite state machine with state diagram $H_{\cal A}$. We use the terms vertex and arc when we refer to the state diagram to no generate confusion with the terms edge and node used for the dynamic ring. We may also use the term state when we refer to a vertex of $H_{\cal A}$. Let $T_{\cal A}:(S,D)$ be the projection of $H_{\cal A}$ obtained consider only the arcs and vertices of $H_{\cal A}$ that are visited in executions where agents never meet. Each vertex $s \in S$ in $T_{\cal A}:(S,D)$ has three outgoing arcs, and each arch has a label in the form $Snapshot:Movement$. One arc leads to the state that is reached when the agent sees that both edges are incident in the local node (this arc has a label with $Snapshot=\{C,CC\}$). The second arc is the one corresponding to the state transition that agent does when the missing edge is the counter-clockwise one (this arc has a label with $Snapshot=\{C\}$). Finally, the last arc is the one used when the missing edge is the clockwise one ($Snapshot=\{CC\}$). Each arc label has also associated the movement $m$ that the agent performs when in state $s$ it sees a specific local snapshot (let us recall that a snapshot corresponds to the label of the arc). We have that $m \in \{0,-1,1\}$, $m=0$ if the agent stays at the current node, it is $-1$ if the agent moves to the counter-clockwise, and it is $+1$ if the agent moves to the clockwise. In Figure~\ref{fig:simple} there is the $T_{\cal A}$ of a simple algorithm in which an agent goes in fixed direction until it is blocked by an edge removal. Once blocked the agent switches direction. \begin{figure} \centering \includegraphics[width=0.6\textwidth]{simple_algorithm.pdf} \caption{Simple algorithm in which agents reverse direction when blocked. The arcs have label in the form $Snapshot:Movement$. The Snapshot is $\{C,CC\}$ if both edges are present and $\{C\}$ (resp. $\{CC\}$) if the clockwise (resp. counter-clockwise) edge is absent. The movement is $1$ if the agents move on the clockwise edge, $-1$ if it moves on the counter-clockwise edge and $0$ if it stays still. }\label{fig:simple} \end{figure} \paragraph{Reachability, fault free paths and cycle displacement.} Given two vertices $s,s' \in S$ we say that, in $T_{\cal A}$, vertex $s'$ is reachable from $s$ in $t$-steps if and only if there exits a simple directed path in $T_{\cal A}$ from $s$ to $s'$ that has length $t$. Notice that, the presence of such a path means that starting from state $s$ there always exists a scheduler of edge removals that forces the agent to reach $s'$, and in such scheduler the agent will traverses at most $t$ edges of the ring. Also notice that we must have $t \leq |S|^2$. Given a path $p$ in $T_{\cal A}$ we say that $p$ is a fault-free path, if any arc in $p$ has label with $Snapshot=\{C,CC\}$. The definition of fault-free cycle is analogous. Given a cycle $F$ in $T_{\cal A}$ the displacement of $d(F)$ is the sum of all the movements on the arcs in $F$. Essentially, a cycle has zero displacement when an agent placed at node $v$ at the end of cycle is still in node $v$. A cycle has positive displacement if, after the executions of all actions in the cycle, the agents moved clockwise. The negative displacement is analogous. See Figure~\ref{fig:cycles}  for examples of previous definitions. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{cycles.pdf} \caption{Example of cycles: we have a fault-free cycle $(A,B),(B,A)$ with zero displacement, a cycle $(B,C),(C,A),(A,B)$ with negative displacement equal to $-3$, and a cycle $(A,D),(D,B),(B,A)$ with positive displacement equal to $3$.}\label{fig:cycles} \end{figure} Before entering in the proof of our lower bound, we do a simple observation on the structure of any algorithm ${\cal A}$. \begin{observation}\label{obs:trivial} Let us consider any algorithm ${\cal A}$. Consider any state $s$ of $T_{\cal A}$. There always exists a path $p$, possibly empty, from $s$ to a vertex $s'$ such that: \begin{itemize} \item $p$ is fault-free. \item $s'$ belongs to a cycle $F_{s}$ of $T_{\cal A}$, and the cycle $F_{s}$ is fault free. \end{itemize} \end{observation} \begin{proof} The proof comes directly from the fact that there is no sink vertex in graph $U=(S,D[\{C,CC\}])$, with $D[\{C,CC\}]$ subset of $D$ containing only arcs with label $\{C,CC\}$. \end{proof} From Observation~\ref{obs:trivial} we have that for any algorithm ${\cal A}$ with initial state $s_0$ the cycle $F_{s_0}$ is well defined and exists. The proof of our lower bound is based on the following two lemmas. \begin{lemma}\label{lemma:nopatrol} Let us consider any algorithm ${\cal A}$ with initial state $s_0$. If from a vertex $s \in F_{s_0}$ there exists a path in $T_{\cal A}=(S,D)$ to a node $s^{*}$ such that $s^{*}$ belongs to a strongly connected component $K$ of $T_{\cal A}$ and to a fault-free cycle $F^{*}$ with $d(F^{*}) = 0$, then ${\cal A}$ does not solve patrolling. \end{lemma} \begin{proof} Let us consider a ring of size $n=4k^2(|S|+|F_{s_0}|+|F^{*}|)$. Now we create a scheduler that prevents ${\cal A}$ from patrolling. We first present the scheduler, then will the prove that such scheduler does not make agents to meet, and thus the state of each agent remains in $T_{\cal A}$. The scheduler first takes agent $a_{0}$ and forces it to go in state $s^{*}$, notice that this takes at most $|S|$ rounds. Thus, from round $r_1=|S|$ agent $a_{1}$ moves perpetually over a set of nodes of size at most $|F^{*}|$. Now the scheduler waits until $a_1$ enters in state $s$, this must happen: by Obs~\ref{obs:trivial} eventually the internal state of $a_1$ is in $F_{s_0}$. Once agent $a_{1}$ is in state $s$ the adversary forces it to go to $s^{*}$. This takes at most $|S|+|F_{s_0}|$ rounds, counting also the number of rounds needed by $a_1$ to enter in state $s$. By using this scheduler we have that at round $r_2=2|S|+|F_{s_0}|$ agents $a_{0},a_{1}$ are both in cycle $F^{*}$. This means that they perpetually move over a set of nodes of size at most $|F^{*}|$. By iterating the previous process for the agents $a_{2},a_{3},\ldots,a_{k-1}$ we have that at round $r_{k}=k|S|+(k-1)|F_{s_0}|$ all agents are in cycle $|F^{*}|$. From this round on, all agents perpetually over a set of nodes that has size at most $k|F^{*}|$. The set of nodes visited by all agents is upper bounded by $r_{k}+k|F^{*}|$, that is $k|F^{*}|+k|S|+(k-1)|F_{s_0}|$. It is immediate to see that half of the nodes in the ring have not been explored, an they will not be explored at any point in the future. It remains to show that during this process two agents do no meet. The maximum amount of node traversed by a single agent is upper bounded by $r_{k}+|F^{*}| \leq 2r_{k}$. However, the initial space between two agents is at least $4r_{k}$, recall that $4r_{k} \leq \frac{n}{k}$. Thus no two agents meet. This complete the proof. \end{proof} \begin{lemma}\label{lemma:dance} Let us consider any algorithm ${\cal A}$ with initial state $s_0$. If from a node $s \in F_{s_0}$ there exists a path in $T_{\cal A}=(S,D)$ to a node $s^{*}$ such that $s^{*}$ belongs to a strongly connected component $K$ and a fault-free cycle $F^{*}$ with $d(F^{*}) \neq 0$, then the patrolling time of ${\cal A}$ is $I(n) \geq n-7|S|k$. \end{lemma} \begin{proof} Let us consider a ring of size $n=4k^2(|S|+|F_{s_0}|+|F^{*}|)$. We create a scheduler that forces a maximum distance of $n-f(|S|)k$ between two agents, and that does not allow two agents to meet. The scheduler uses two phases, in the first phase it forces each agent to enter in cycle $F^{*}$, this is done in an analogous way to the one used in the proof of Lemma~\ref{lemma:nopatrol}, and we will omit its description. In the second phase the scheduler reduces the distances among agents until the maximum distance between two agents is $n-7|S|k$. The scheduler first takes $a_{k-2}$ and it blocks it on two neighbour nodes until the distance between $a_{k-2}$ and $a_{k-1}$ is $7|K|$. At this point the adversary it forces $a_{k-2}$ to go to $s^{*}$, this can be done since $K$ is strongly connected. Notice that, at the end of such process the distance between $a_{k-2}$ and $a_{k-1}$, decreased by at most $2|K|$ rounds. This means that their distance is at least $5|K|$. We now show that such distance is big enough to ensure that, if $a_{k-2}$ and $a_{k-1}$ are never blocked they never meet while they both cycle in $F^{*}$. The two agents are executing the same cycle $F^{*}$ but they are not synchronized, that is they are in two different vertices of the cycle. To prove that they never meet it is sufficient to show that they do not meet in a period of $2F^{*}$ rounds. First of all, notice that during the execution of $F^{*}$ each of them moves of at most $|F^{*}| \leq |K|$ edges. Second notice that if $a_{k-1}$ terminates the cycle $F^{*}$ at round $r'$, moving to the counter-clockwise of $d(F^{*}) \leq |K|$ edges, then by round $r'+|F^{*}|-1$ also $a_{k-2}$ moved to the counter-clockwise of $d(F^{*}) \leq |K|$ edges. This ensures that at each round the distance between the two is at least $2|K|$ edges and at most $7|K|$ edges. Now the scheduler uses the same procedure for agent $a_{k-3}$, putting it at distance at most $7|K|$ from $a_{k-2}$. This procedure is iterated until agent $a_{0}$. At this point, the maximum distance between $a_0$ and $a_{k-1}$ is $n-7k|K|$. \end{proof} From the two previous lemmas we can prove theorem~\ref{theorem:lowerboundlocal}. Given ${\cal A}$ with initial state $s_0$, we have to show that there exists a vertex $s \in F_{s_0}$ such that from $s$ there is a path to a strongly component $K$ of $T_{\cal A}$. But this is immediate consequence of the fact that ${\cal A}$ uses finite memory and that there is no sink vertex in $T_{\cal A}$. From Observation~\ref{obs:trivial} we have that from any vertex in component $K$ we can reach a fault free cycle $F^{*}$. Lemma~\ref{lemma:nopatrol} ensures that the displacement of $F^{*}$ is not zero. Therefore we can use Lemma~\ref{lemma:dance} proving the claim of the theorem. \section{Introduction} In recent years patrolling is gaining on popularity in the area of algorithms and in particular algorithmics of mobile agents and applications. Patrolling naturally occurs in daily routines requiring regular visits to specific (possibly mobile) objects and areas. It can also refer to monitoring of complex network processes or systems behaviour. Typical applications of patrolling include safety or security related surveillance, regular updates, data gathering, and other perpetual tasks. We consider the patrolling problem in networks (graphs) with the objective of visiting all nodes of the graph perpetually, optimizing the \emph{idle time} - the maximum time period during which any node is left unvisited. Unlike all previous results on the patrolling problem, we study the problem on a dynamic graphs where some links of the graph may be missing for certain duration of time. This complicates the problem and requires a strong coordination between the agents, in order to reduce the idle time, even in simple networks. We restrict our attention, in this paper to dynamic ring networks. In the case of a static ring network, the simple strategy of periodically cycling the nodes of the ring, is known to provide the optimal idle time. However, for patrolling dynamic rings, more involved strategies are required depending on the number of the agents, the capabilities of the agents and whether or not the dynamic structure of the network is known to the agents. Among various known dynamic graph models, we consider interval connected dynamic networks which ensures that the network is connected at any time interval. We distinguish between the ${\sf KNOWN}$\xspace setting when the agents know in advance about the changes in the graph structure, from the ${\sf UNKNOWN}$\xspace setting when such information is not available to the agents. We show a clear separation between the two cases, in terms of the minimum idle time for patrolling. For both cases, we provide lower bounds and almost matching upper bounds on the idle time for patrolling, supported by deterministic algorithms for collaborative patrolling. \subsection*{Related Work} \paragraph{Patrolling.} The problem of patrolling is a close relative to several classical algorithmic challenges which focus on monitoring and mobility. These challenges include the Art Gallery Problem \cite{DBLP:journals/ipl/Ntafos86}, where one is interested in determining the smallest number of inert guards and their location to constantly monitor all artefacts, and its dynamic alternative referred to as the k-Watchmen Problem \cite{DBLP:journals/ipl/Chin88,DBLP:journals/dcg/CarlssonJN99}. In further work on fence patrolling \cite{DBLP:conf/esa/CzyzowiczGKK11, DBLP:journals/dc/KawamuraK15,CollinsCGKKKMP13} the authors focus on monitoring vital (possibly disconnected) parts of a linear environment where each point is expected to be visited with the same frequency. A similar approach is adopted in \cite{DBLP:journals/algorithmica/CzyzowiczGKKKT17} where we find studies on monitoring of a linear environment by agents prone to faults. The problem of patrolling objects which require different frequencies of visits was first considered in \cite{DBLP:conf/sofsem/GasieniecKLLMR17}, where the authors assume availability of a single mobile agent. They also showed a close relationship between these type of patrolling and the Pinwheel scheduling problem \cite{DBLP:journals/algorithmica/ChanC93}. In a more recent work \cite{DBLP:conf/sofsem/GasieniecKLLMR17} the authors consider monitoring by two agents of $n$ nodes located on a line and requiring different frequencies of visits. The authors provide several approximation algorithms concluding with the best currently known $\sqrt{3}$-approximation. \paragraph{Dynamic networks and mobile agents.} The field of dynamic networks is an hot and active research topic \cite{HarG97,KuO11,CaFQS12,Michail16}. In the message passing model a lot of attention has been devoted to classic problems such as agreement \cite{KuMO11,AuPR13,BRS12}, information dissemination \cite{AwE84,KLyO10,OdW05,CleMPS11}, and counting \cite{di2015brief,icalpcounting}. Surprisingly, the investigation of mobile agents on dynamic networks started only recently. In the centralised setting (when agents know the dynamic of the graph apriori) the problem of exploring a graph in the fastest possible way has been studied in several papers \cite{Michail2014,ErHK15,cover1}. The task is NP-hard on general graphs and it becomes polynomial on special topologies \cite{cover2,IlKW14}. Notably, in the case of interval connected ring the exploration can be done in ${\cal O}(n)$ rounds \cite{IlcinkasW18}. The distributed setting (when agents do not know the dynamic of the graph) has been mostly overlooked, or limited to restrictive dynamic assumptions, such as periodic \cite{Flocchini2013,IlW11} or recurrent \cite{IlcinkasW18} graphs. The exploration with termination of interval connected rings has been studied in \cite{DBLP:conf/icdcs/LunaDFS16}. For rings that are connected over time, a perpetual self-stabilizing exploration algorithm has been proposed in \cite{BournatDD16}. Finally, the gathering problem on interval connected rings has been studied in \cite{LunaFPPSV17}. To the best of our knowledge there is no previous work studying the patrolling of a dynamic network. \subsection*{Our Contributions} \begin{table}[tb] \center \resizebox{0.6\textwidth}{!}{% \begin{tabular}{ l l | l | l |} \hline Adversary&&\multicolumn{2}{ |c| }{Number of Agents} \\ \cline{3-4} & & $k=2$ & $k>2$ \\ \hline \multirow{2}{*}{${\sf KNOWN}$\xspace}& Upper Bound & $3\lceil \frac{n}{2} \rceil$& $3\lceil \frac{n}{k} \rceil$\\ \cline{2-4} & Lower Bound & $n$ & $\frac{2n}{k}$ \\ \hline \multirow{2}{*}{${\sf UNKNOWN}$\xspace}& Upper Bound & $2n-2$& $4 \lceil \frac{n}{k} \rceil$\\ \cline{2-4} & Lower Bound & $2n-6$& $\frac{2n}{k}$ \\ \hline \end{tabular}} \vspace{0.2cm} \caption{ Results for the idle time in dynamic rings of $n$ nodes, with $k$ uniformly placed agents having global visibility. \label{table:iammiamm}} \end{table} We show, first of all, in Section~\ref{sec:local}, that when the agents have local visibility, limited to the current node, then patrolling has an idle time of $n-\alpha \cdot k$ rounds, both in case of arbitrary initial placement (where $\alpha=1$) and uniform initial placement with $b$-bits of persistent memory (where $\alpha=2^{b}$). This means that using multiple agents reduces the idle time by only an additive factor. In contrast, for a \emph{static} ring, the idle time for patrolling with $k$ agents is $\frac{n}{k}$, achieving a multiplicative factor efficiency over single agent patrolling. Thus, for the rest of paper, we consider agents having global visibility, allowing it to see the current configuration of the ring with set of available links. We start with team size of $k=2$ agents in Section~\ref{global:two} and then generalize these results to $k>2$ agents in Section~\ref{global:k}. The results of these two sections are summarized in Table~\ref{table:iammiamm}. The bounds denoted here are for the stable idle time, after a stabilization time that is at most $O(n)$. These results show a clear distinction between the case of ${\sf KNOWN}$\xspace adversary (where the dynamic structure of the network is known apriori) and the case of ${\sf UNKNOWN}$\xspace adversary when the agents do not have prior knowledge of the dynamic network. Other than the above results, we also show a slightly better lower bound of $\lfloor (1+\frac{1}{5})(n-1) \rfloor$ for the special case of two agents in dynamic ring with ${\sf KNOWN}$\xspace adversary, when the agents are arbitrarily placed. \input{section2} \input{section3} \input{section4} \input{section5} \section{Conclusion} We provided the first results on the patrolling problem in dynamic graphs. As patrolling is usually performed on boundaries of territories, it is natural to study the problem for ring networks. The results may be extended to other topologies e.g. by moving on any cycle containing all the nodes of a graph. Our results on the dynamic ring networks are almost complete, but there exists a small gap between the lower and upper bounds, specially for the case of $k>2$ agents which can be reduced by future work. In particular, we believe the lower bound for $k>2$ agents in the ${\sf UNKNOWN}$\xspace setting can be improved. \bibliographystyle{plain} \section{Model} A set of agents, $A:\{a_0,\ldots,a_{k-1}\}$, operates on a dynamic graph ${\cal G}$. Each agent follows the same algorithm (all agents are identical) executing a sequence of \textsf{Look}\xspace,\textsf{Compute}\xspace, \textsf{Move}\xspace cycles. In the \textsf{Look}\xspace phase of each cycle, the agent acquires a {\em snapshot} of the environment. In the {\textsf{Compute}\xspace} phase the agent uses the information from the snapshot and the contents of its local persistent memory to compute the next destination, which may be the current node or one of its neighbors. During the \textsf{Move}\xspace phase an agent traverses an edge to reach the destination node. The information contained in the persistent memory is the only thing that is preserved among cycles. \paragraph{\bf Synchronous system.} The system is {\em synchronous}, that is the time is divided in discrete units called rounds. Rounds are univocally mapped to numbers in $\mathbb{N}$, starting from round $0$. In each round, each agent in $A$ executes exactly one entire \textsf{Look}\xspace,\textsf{Compute}\xspace, \textsf{Move}\xspace cycle. \paragraph{\bf Interval connected ring.} A dynamic graph ${\cal G}$ is a function mapping a round $r \in \mathbb{N}$ to a graph $G_r:(V,E(r))$ where $V:\{v_0,\ldots,v_{n-1}\}$ is a set of nodes and $E: \mathbb{N} \rightarrow V \times V$ is a function mapping a round $r$ to a set of undirected edges. We restrict ourselves to $1$-interval-connected rings. A dynamic graph ${\cal G}$ is a $1$-interval-connected ring when the union of the graph instances $G_{\infty}=(V,E_{\infty})=(V,\cup_{i=0}^{+\infty} E(i))$ is a ring graph, and at each round $r$, the graph $G_r$ is connected. The graph ${\cal G}$ is anonymous, i.e. all nodes are identical to the agents. The endpoints of each edge are labelled as either {\em clockwise} or {\em counter-lockwise}, in a consistent manner (i.e the ring is oriented). \paragraph{\bf Local versus Global Snapshot.} \begin{itemize} \item Local Snapshot: the snapshot obtained by an agent at a node $v$ in round $r$ contains only information about the node $v$, i.e. the number of agents in $v$ and the set of available edges incident to node $v$ at round $r$. \item Global Snapshot: the snapshot obtained by an agent contains the graph $G_r$ (where the current location of the agent is marked), and for each node in $V$ the number of agents present in that node at round $r$. \end{itemize} \paragraph{\bf Knowledge of ${\cal G}$.} We examine two different settings: the one with known ${\cal G}$ (${\sf KNOWN}$\xspace) and the one without such knowledge (${\sf UNKNOWN}$\xspace). In the ${\sf KNOWN}$\xspace setting during the {\textsf{Compute}\xspace} phase agents have access to the dynamic graph ${\cal G}$. In this case the decision of what will be the movement of the agent depends on the snapshot, on the content of the persistent local memory and on the entire dynamic graph ${\cal G}$. On the contrary in the ${\sf UNKNOWN}$\xspace setting, during the { \textsf{Compute}\xspace} phase, no other information is available (an agent uses only the snapshot and the local memory). Another way to see the ${\sf UNKNOWN}$\xspace setting is to imagine that ${\cal G}$ is adaptive to the strategy of algorithm ${\cal A}$: there exists an adversarial entity, namely the {\em scheduler}, that decides the graph ${\cal G}$ according to the strategy of algorithm ${\cal A}$. \paragraph{\bf Configurations and initial placement of agents.} Given a graph $G_r$, and the set of agents $A$, a configuration at round $r$, is a function $C_r: A \rightarrow V$ that maps agents in $A$ to nodes of $V$ where agents are located. We say that there is a {\em uniform initial placement}, if $C_0$ is such that the segments of consecutive rings nodes not occupied by agents have size $\lfloor \frac{n}{k} \rfloor$ or $\lceil \frac{n}{k} \rceil$. We say that there is an {\em arbitrary initial placement} if the configuration $C_0$ is injective ( no two agents may start on the same node). \paragraph{\bf Idle time.} An algorithm ${\cal A}$ running on a graph ${\cal G}$, generates an execution ${\cal E}$. The execution ${\cal E}:\{C_0,C_1,C_2\ldots\}$ is an infinite sequence of configurations, one for each round $r$. Given a node $v$ and an execution ${\cal E}$ the set of visits of $v$, $S_{{\cal E},v}:\{r_1,r_2,r_3,\ldots \}$ is a set containing all rounds in which $v$ has been visited by some agent in execution ${\cal E}$; more formally, $r_j \in S_{{\cal E}, v}$ if and only if $C_{r_j}(a)=v$ for some $a \in A$. The idle set $I_{{\cal E},v}$ of node $v$ is a set containing all the intervals of time between two consecutive visits of node $v$ in execution ${\cal E}$; more formally, $x \in I_{{\cal E},v}$ if and only if there exists $r_i,r_{i-1}$ in $S_{{\cal E}, v}$ and $x=r_i-r_{i-1}$. We assume that each node has been visited at round $-1$. We say that an algorithm solves patrolling on a graph ${\cal G}$, if each node of the graph is visited infinitely often. Given an algorithm ${\cal A}$ and an integer $n \geq 5$, we define as $T_n$ the set of all executions of algorithm ${\cal A}$ over any ($1$-interval-connected) dynamic ring ${\cal G}$ with $n$ nodes. The idle time of algorithm ${\cal A}$ is the function $I(n)=\underset{{\forall {\cal E} \in T_n}}{\max}( \cup_{\forall v \in V}I_{{\cal E},v})$. \paragraph{Stable idle time.} Given an execution ${\cal E}$ we define as ${\cal E}[r,\infty]$ the execution obtained by removing the first $r$ configurations from ${\cal E}$, similarly we can define the idle set $I_{{\cal E}[r,\infty],v}$ . An algorithm ${\cal A}$ as a stable idle time $I_{r_s}(n)$ with stabilisation time $r_s$ if there exists a round $r_s$ such that $I_{r_s}(n)=\underset{{\forall {\cal E} \in T_n}}{\max}( \cup_{\forall v \in V}I_{{\cal E}[r_s,\infty],v})$. \section{Preliminaries} We devote this section to some simple observations based on previous results on dynamic rings. Note that for a single agent moving in a dynamic ring, an adaptive adversary can keep the agent confined to the starting node and one of its neighbors. \begin{observation} (\cite{KLyO10,OdW05}) \label{obs:2node} In a dynamic ring ${\cal G}$ under the ${\sf UNKNOWN}$\xspace model with global snapshot, a single agent can visit at most $2$ nodes. \end{observation} \begin{observation} (\cite{KLyO10,OdW05}) In a dynamic ring ${\cal G}$ under the ${\sf KNOWN}$\xspace model, a single agent can reach any node $V$ in at most $n-1$ rounds. \end{observation} Due to the above observations, the only interesting cases for patrolling is for $k\geq 2$ which we investigate in this paper. For any $k$ agents, we have the following observation derived from the proof of Proposition 1 in \cite{IlcinkasW18}. \begin{observation}\label{obs:ilcinkas} (\cite{IlcinkasW18}) Given a dynamic ring ${\cal G}$ the ${\sf UNKNOWN}$\xspace model with Global Snapshot. For any round $r$ and any $1 \leq h \leq n-1$, there are $n-h$ distinct nodes, such that if $n-h$ agents are placed in these nodes and they all move in the same direction from round $r$ until round $r+h-1$, then they visit exactly $h+1$ nodes. \end{observation} \begin{proof} The proof is contained in \cite{IlcinkasW18}. We report it here for completeness. Let us imagine to have an agent on each node. At each round an agent move counter-clockwise (or clockwise). W.l.o.g round $r=0$. The proof is by induction: \begin{itemize} \item (Base Step) Let $h=1$. Round is $r=0$. There is at most one edge missing, at most on agent is blocked. Thus there are $n-1$ agents that visit $2$ nodes. \item (Inductive step )Let $h=t+1$. Round is $r=t$. From the inductive hypothesis we that $n-t$ agents visited $t+1$ nodes by round $t-1$. At round $t$ at most $1$ of this agent is blocked, thus we have $n-t-1$ agents that visited $t+2$ nodes. \end{itemize}\end{proof} It is also possible to show an easy lower bound on the idle time of any algorithm under the strongest model considered in this paper (i.e. under global visibility and knowledge of ${\cal G}$) \begin{theorem}\label{2knw:lb} Consider the ${\sf KNOWN}$\xspace model with Global Snapshot. Let ${\cal A}$ be any patrolling algorithm for $k$ agents with uniform initial placement. We have that $I_{r_s}(n) \geq \frac{2n}{k}$ for any stabilization time $r_s$. \end{theorem} \begin{proof} The scheduler removes the same edge forever. At this point the $k$ agents have to patrol a line and the lower bound for idle time on a line with $k$ agents is $\frac{2n}{k}$ (See \cite{CollinsCGKKKMP13} for a proof). \end{proof} \section{Patrolling with Local Visibility} \label{sec:local} In this section we analyse the Local Snapshot model, we first examine the case in which the placement of the agents is arbitrary and then we examine the case in which the placement is uniform. \subsection{Lower bound for arbitrary initial placement} \begin{theorem}\label{th:trivial} Consider a dynamic ring under the ${\sf KNOWN}$\xspace model with Local Snapshot and arbitrary initial placement. Then any patrolling algorithm ${\cal A}$ for $k$ agents has stable idle time $I_{r_s}(n) \geq n-k$, for any stabilisation time $r_s$. \end{theorem} \begin{proof} Let us consider a static ring of $n$ nodes $G=(V=\{v_0,\ldots,v_{n-1}\}, E=\{(v_0,v_1),(v_1,v_2),\ldots\} )$ and a set of agents $\{a_0,\ldots,a_{k-1}\}$. Configuration $C_0$ is such that $C(a_j)=v_{j}$, that is agents are placed one on each node in $\{v_0,\ldots,v_{k-1}\}$. As the nodes of the ring are anonymous and the agents are identical with local visibility, each executing the same algorithm, at each round $r$ the configuration $C_r$ can only be a rotation of configuration $C_0$. Moreover, configuration $C_r$ is a rotation of either one step counter-clockwise or one step clockwise of configuration $C_{r-1}$. This implies that the best idle time is obtained by having agents to perpetually move in the same direction. The idle time of this strategy is $I_{r_s}(n) = n-k$ for any possible stabilization time $r_s$. \end{proof} The above result assumes the agents to be placed on consecutive nodes, and its proof does not hold when there is an uniform initial placement of agents. We consider the case of uniform placement in the next section. \subsection{Lower bound for uniform placement in the ${\sf UNKNOWN}$\xspace model} We now prove a lower bound on the idle time for any patrolling algorithm for $k$ agents with uniform initial placement in dynamic rings under the ${\sf UNKNOWN}$\xspace model. This result holds only for agents with bounded memory. \begin{theorem}\label{theorem:lowerboundlocal} Consider a dynamic ring under the ${\sf UNKNOWN}$\xspace model with local snapshots and uniform initial placement. Given any patrolling algorithm ${\cal A}$ for $k$ agents, with $c={\cal O}(1)$ bits of memory, the idle time for patrolling is $I(n) \geq n-7\cdot2^{c}k$. \end{theorem} In order to prove this result we have to introduce some concepts related to the state diagram of a patrolling algorithm ${\cal A}$ \paragraph{State diagram.} Given an algorithm ${\cal A}$ executed by an agent $a_j$, we can model it as a finite state machine with state diagram $H_{\cal A}$. We use the terms vertex and arc when we refer to the state diagram to no generate confusion with the terms edge and node used for the dynamic ring. We may also use the term state when we refer to a vertex of $H_{\cal A}$. Let $T_{\cal A}:(S,D)$ be the projection of $H_{\cal A}$ obtained consider only the arcs and vertices of $H_{\cal A}$ that are visited in executions where agents never meet. Each vertex $s \in S$ in $T_{\cal A}:(S,D)$ has three outgoing arcs, and each arch has a label in the form $Snapshot:Movement$. One arc leads to the state that is reached when the agent sees that both edges are incident in the local node (this arc has a label with $Snapshot=\{C,CC\}$). The second arc is the one corresponding to the state transition that agent does when the missing edge is the counter-clockwise one (this arc has a label with $Snapshot=\{C\}$). Finally, the last arc is the one used when the missing edge is the clockwise one ($Snapshot=\{CC\}$). Each arc label has also associated the movement $m$ that the agent performs when in state $s$ it sees a specific local snapshot (let us recall that a snapshot corresponds to the label of the arc). We have that $m \in \{0,-1,1\}$, $m=0$ if the agent stays at the current node, it is $-1$ if the agent moves to the counter-clockwise, and it is $+1$ if the agent moves to the clockwise. In Figure~\ref{fig:simple} there is the $T_{\cal A}$ of a simple algorithm in which an agent goes in fixed direction until it is blocked by an edge removal. Once blocked the agent switches direction. \begin{figure} \centering \includegraphics[width=0.6\textwidth]{simple_algorithm.pdf} \caption{Simple algorithm in which agents reverse direction when blocked. The arcs have label in the form $Snapshot:Movement$. The Snapshot is $\{C,CC\}$ if both edges are present and $\{C\}$ (resp. $\{CC\}$) if the clockwise (resp. counter-clockwise) edge is absent. The movement is $1$ if the agents move on the clockwise edge, $-1$ if it moves on the counter-clockwise edge and $0$ if it stays still. }\label{fig:simple} \end{figure} \paragraph{Reachability, fault free paths and cycle displacement.} Given two vertices $s,s' \in S$ we say that, in $T_{\cal A}$, vertex $s'$ is reachable from $s$ in $t$-steps if and only if there exits a simple directed path in $T_{\cal A}$ from $s$ to $s'$ that has length $t$. Notice that, the presence of such a path means that starting from state $s$ there always exists a scheduler of edge removals that forces the agent to reach $s'$, and in such scheduler the agent will traverses at most $t$ edges of the ring. Also notice that we must have $t \leq |S|^2$. Given a path $p$ in $T_{\cal A}$ we say that $p$ is a fault-free path, if any arc in $p$ has label with $Snapshot=\{C,CC\}$. The definition of fault-free cycle is analogous. Given a cycle $F$ in $T_{\cal A}$ the displacement of $d(F)$ is the sum of all the movements on the arcs in $F$. Essentially, a cycle has zero displacement when an agent placed at node $v$ at the end of cycle is still in node $v$. A cycle has positive displacement if, after the executions of all actions in the cycle, the agents moved clockwise. The negative displacement is analogous. See Figure~\ref{fig:cycles}  for examples of previous definitions. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{cycles.pdf} \caption{Example of cycles: we have a fault-free cycle $(A,B),(B,A)$ with zero displacement, a cycle $(B,C),(C,A),(A,B)$ with negative displacement equal to $-3$, and a cycle $(A,D),(D,B),(B,A)$ with positive displacement equal to $3$.}\label{fig:cycles} \end{figure} Before entering in the proof of our lower bound, we do a simple observation on the structure of any algorithm ${\cal A}$. \begin{observation}\label{obs:trivial} Let us consider any algorithm ${\cal A}$. Consider any state $s$ of $T_{\cal A}$. There always exists a path $p$, possibly empty, from $s$ to a vertex $s'$ such that: \begin{itemize} \item $p$ is fault-free. \item $s'$ belongs to a cycle $F_{s}$ of $T_{\cal A}$, and the cycle $F_{s}$ is fault free. \end{itemize} \end{observation} \begin{proof} The proof comes directly from the fact that there is no sink vertex in graph $U=(S,D[\{C,CC\}])$, with $D[\{C,CC\}]$ subset of $D$ containing only arcs with label $\{C,CC\}$. \end{proof} From Observation~\ref{obs:trivial} we have that for any algorithm ${\cal A}$ with initial state $s_0$ the cycle $F_{s_0}$ is well defined and exists. The proof of our lower bound is based on the following two lemmas. \begin{lemma}\label{lemma:nopatrol} Let us consider any algorithm ${\cal A}$ with initial state $s_0$. If from a vertex $s \in F_{s_0}$ there exists a path in $T_{\cal A}=(S,D)$ to a node $s^{*}$ such that $s^{*}$ belongs to a strongly connected component $K$ of $T_{\cal A}$ and to a fault-free cycle $F^{*}$ with $d(F^{*}) = 0$, then ${\cal A}$ does not solve patrolling. \end{lemma} \begin{proof} Let us consider a ring of size $n=4k^2(|S|+|F_{s_0}|+|F^{*}|)$. Now we create a scheduler that prevents ${\cal A}$ from patrolling. We first present the scheduler, then will the prove that such scheduler does not make agents to meet, and thus the state of each agent remains in $T_{\cal A}$. The scheduler first takes agent $a_{0}$ and forces it to go in state $s^{*}$, notice that this takes at most $|S|$ rounds. Thus, from round $r_1=|S|$ agent $a_{1}$ moves perpetually over a set of nodes of size at most $|F^{*}|$. Now the scheduler waits until $a_1$ enters in state $s$, this must happen: by Obs~\ref{obs:trivial} eventually the internal state of $a_1$ is in $F_{s_0}$. Once agent $a_{1}$ is in state $s$ the adversary forces it to go to $s^{*}$. This takes at most $|S|+|F_{s_0}|$ rounds, counting also the number of rounds needed by $a_1$ to enter in state $s$. By using this scheduler we have that at round $r_2=2|S|+|F_{s_0}|$ agents $a_{0},a_{1}$ are both in cycle $F^{*}$. This means that they perpetually move over a set of nodes of size at most $|F^{*}|$. By iterating the previous process for the agents $a_{2},a_{3},\ldots,a_{k-1}$ we have that at round $r_{k}=k|S|+(k-1)|F_{s_0}|$ all agents are in cycle $|F^{*}|$. From this round on, all agents perpetually over a set of nodes that has size at most $k|F^{*}|$. The set of nodes visited by all agents is upper bounded by $r_{k}+k|F^{*}|$, that is $k|F^{*}|+k|S|+(k-1)|F_{s_0}|$. It is immediate to see that half of the nodes in the ring have not been explored, an they will not be explored at any point in the future. It remains to show that during this process two agents do no meet. The maximum amount of node traversed by a single agent is upper bounded by $r_{k}+|F^{*}| \leq 2r_{k}$. However, the initial space between two agents is at least $4r_{k}$, recall that $4r_{k} \leq \frac{n}{k}$. Thus no two agents meet. This complete the proof. \end{proof} \begin{lemma}\label{lemma:dance} Let us consider any algorithm ${\cal A}$ with initial state $s_0$. If from a node $s \in F_{s_0}$ there exists a path in $T_{\cal A}=(S,D)$ to a node $s^{*}$ such that $s^{*}$ belongs to a strongly connected component $K$ and a fault-free cycle $F^{*}$ with $d(F^{*}) \neq 0$, then the patrolling time of ${\cal A}$ is $I(n) \geq n-7|S|k$. \end{lemma} \begin{proof} Let us consider a ring of size $n=4k^2(|S|+|F_{s_0}|+|F^{*}|)$. We create a scheduler that forces a maximum distance of $n-f(|S|)k$ between two agents, and that does not allow two agents to meet. The scheduler uses two phases, in the first phase it forces each agent to enter in cycle $F^{*}$, this is done in an analogous way to the one used in the proof of Lemma~\ref{lemma:nopatrol}, and we will omit its description. In the second phase the scheduler reduces the distances among agents until the maximum distance between two agents is $n-7|S|k$. The scheduler first takes $a_{k-2}$ and it blocks it on two neighbour nodes until the distance between $a_{k-2}$ and $a_{k-1}$ is $7|K|$. At this point the adversary it forces $a_{k-2}$ to go to $s^{*}$, this can be done since $K$ is strongly connected. Notice that, at the end of such process the distance between $a_{k-2}$ and $a_{k-1}$, decreased by at most $2|K|$ rounds. This means that their distance is at least $5|K|$. We now show that such distance is big enough to ensure that, if $a_{k-2}$ and $a_{k-1}$ are never blocked they never meet while they both cycle in $F^{*}$. The two agents are executing the same cycle $F^{*}$ but they are not synchronized, that is they are in two different vertices of the cycle. To prove that they never meet it is sufficient to show that they do not meet in a period of $2F^{*}$ rounds. First of all, notice that during the execution of $F^{*}$ each of them moves of at most $|F^{*}| \leq |K|$ edges. Second notice that if $a_{k-1}$ terminates the cycle $F^{*}$ at round $r'$, moving to the counter-clockwise of $d(F^{*}) \leq |K|$ edges, then by round $r'+|F^{*}|-1$ also $a_{k-2}$ moved to the counter-clockwise of $d(F^{*}) \leq |K|$ edges. This ensures that at each round the distance between the two is at least $2|K|$ edges and at most $7|K|$ edges. Now the scheduler uses the same procedure for agent $a_{k-3}$, putting it at distance at most $7|K|$ from $a_{k-2}$. This procedure is iterated until agent $a_{0}$. At this point, the maximum distance between $a_0$ and $a_{k-1}$ is $n-7k|K|$. \end{proof} From the two previous lemmas we can prove theorem~\ref{theorem:lowerboundlocal}. Given ${\cal A}$ with initial state $s_0$, we have to show that there exists a vertex $s \in F_{s_0}$ such that from $s$ there is a path to a strongly component $K$ of $T_{\cal A}$. But this is immediate consequence of the fact that ${\cal A}$ uses finite memory and that there is no sink vertex in $T_{\cal A}$. From Observation~\ref{obs:trivial} we have that from any vertex in component $K$ we can reach a fault free cycle $F^{*}$. Lemma~\ref{lemma:nopatrol} ensures that the displacement of $F^{*}$ is not zero. Therefore we can use Lemma~\ref{lemma:dance} proving the claim of the theorem. \section{Two agents with Global Visibility} \label{global:two} In this section we assume that the agents have access to a global snapshot of the configuration at each round during \textsf{Look}\xspace phase. We first consider the simpler case of $k=2$ agents and show upper and lower bounds on patrolling for both the ${\sf UNKNOWN}$\xspace and the ${\sf KNOWN}$\xspace setting. \subsection{${\sf UNKNOWN}$\xspace setting} \begin{figure}[h] \centering \includegraphics[width=0.7\textwidth]{pingpong.pdf} \caption{Algorithm {\sc Ping-Pong}\xspace state diagram. The starting state is S0. Transition are of the form $Predicate:Movement$ where values of $1,-1,0$ denotes clockwise, counter-clockwise or no move, respectively. }\label{fig:pingpong} \end{figure} Given the graph $G_r$ at round $r$, we define as $BC_{r}$ (resp. $BCC_{r}$) the set of all agents that are attempting to move clockwise (resp. counter-clockwise) from a node $v$ that has the clockwise (resp. counter-clockwise) edge missing at the round $r$. We will remove the subscript $r$ when it is clear that we are referring to the current round. \smallskip We now describe a patrolling algorithm called {\sc Ping-Pong}\xspace for $k=2$ agents in the ${\sf UNKNOWN}$\xspace setting. Initially, both agents move in the clockwise direction in each round, until they reach a round $r$ in which $BC_{r}$ is not empty. At this point the symmetry between agents is broken, and we assign to the agent in $BC_{r}$ the counter-clockwise direction while the other agent keeps the clockwise direction. Starting from round $r$, the agents continue to move according to the following rule: Move in the assigned direction until the minimum distance between the agents is less or equal to $1$; When this happen, both agents reverse their direction (i.e, the agents bounce off each other). The state diagram of the algorithm is presented in Figure~\ref{fig:pingpong}. \begin{theorem}\label{2unkwn:pingpong} For any dynamic ring in the ${\sf UNKNOWN}$\xspace model with Global Snapshot and arbitrary initial placement, Algorithm {\sc Ping-Pong}\xspace allows two agents to patrol the ring with an idle time $I(n) \leq 2(n-1)$. \end{theorem} \begin{proof} The algorithm has two distinct phases. In the first phase, both agents move in the same direction, while in the second phase the agents always move in opposite directions. We need to show that for any node $v$, given two consecutive visits of $v$ at round $r_0$ and $r_1$ it holds that $r_1-r_0 \leq 2(n-1)$. First, let $r_0$ and $r_1$ be both in the first phase of the algorithm. Observe that in this phase each agent loops around the ring visiting each node once in every $n$ rounds. Since the agents on distinct nodes we have at most $n-1$ rounds between two visits of node $v$; thus $r_1-r_0 \leq n-1$. Now we examine the case when $r_0$ and $r_1$ are both in the second phase. It takes at most $n-1$ rounds for the distance between the two agents to be $1$ or less--the agents are moving on opposing direction and at most one of them can be blocked at any round. This means that during a period that is upper bounded by $n-1$ all nodes are visited. Thus, there are at most $2(n-1)$ rounds between consecutive visits of a node $v$. Finally, we have to show that the bound still hold if $r_0$ is in the first phase and $r_1$ in the second. Let $r$ be the round in which the algorithm switches phase. We necessarily have $r-r_0=x \leq n-1$, by the previous discussion regarding the first phase. At round $r$, one agent is at distance $x$ from node $v$ and thus, the distance between the agents on the segment not containing $v$, is at most $(n-x-1)$. Now, if both agents are move towards $v$, then $v$ would be visited in the next $(n-1)$ rounds. Otherwise, the agents move away from $v$, therefore in at most $(n-x-2)$ rounds, the two agents would be at distance one or less. In the subsequent $n-1$ rounds all nodes would be visited (recall our previous discussion for the second phase). This implies that $r_1-r_0 \leq 2(n-1)$ in both cases. \end{proof} Surprisingly, the algorithm {\sc Ping-Pong}\xspace is almost optimal. \begin{theorem}\label{2unkwn:lb} Under the ${\sf UNKNOWN}$\xspace model with global snapshot and uniform initial placement, any patrolling algorithm ${\cal A}$ for two agents has idle time $I(n) \geq 2n-6$. \end{theorem} \begin{proof} We show that the adversarial scheduler can (1) entrap one of the agents on two neighboring nodes of the ring, say, nodes $v_{n-1},v_{n-2}$, and at the same (2) prevent the other agent from performing a full tour of the ring. Under the above two conditions, patrolling the ring by two agents reduces to patrolling a line of $l=n-2$ nodes by a single agent, for which we have an idle time of $2(l-1)=2n-6$. Note that condition (1) can be easily achieved by the adversary (see Observation~\ref{obs:2node}). Suppose the adversary traps agent $a$ in the two nodes $v_{n-1},v_{n-2}$. We will now show that the other agent, call it agent $b$, cannot traverse the segment $S_4$ containing the $4$ consecutive nodes $(v_0, v_{n-1}, v_{n-2}, v_{n-3})$. Suppose the agent $b$ approaches this segment from $v_0$ (i.e. clockwise direction); the other direction can be symmetrically treated. Figure~\ref{fig:leftgate} depicts all the configurations reachable from this scenario. The adversary can keep the agent $a$ trapped in the two nodes until the other agent reaches node $v_{n-1}$. At this time if the two agents are together, the adversary can keep both trapped using the same argument as before. The only other possibility is if the two agents are on the neighboring nodes $v_{n-1},v_{n-2}$, in which case the adversary removes edge $(v_{n-2}, v_{n-3})$, preventing any agent from leaving the segment $S_4$ in clockwise direction. Thus either both agents are trapped, or one of the agents can leave the segment by node $v_0$, i.e. the same direction in which the agent entered the segment. Notice the agents may swap roles, so that agent $a$ leaves and agent $b$ is blocked in nodes $v_{n-1},v_{n-2}$. In either case, the condition (1) and (2) are satisfied and therefore the theorem holds. \end{proof} \begin{figure} \hspace{-0.5cm} \includegraphics[width=\textwidth]{gate1.pdf} \caption{ Tree of reachable configurations for Theorem~\ref{2unkwn:lb}: agents are the black dot, ring nodes the white circles, and the missing edge the dotted line. We represent the set of reachable configurations as a tree, where we omit the child configuration when it is equal to the father configuration. A configuration is {\em closed} when there is only one agent in the $4$ nodes, that is also trapped in $v_{n-1},v_{n-2}$. We reach a closed configuration only when an agent moves using the counter-clockwise edge of node $v_{0}$. We can see that starting from the root, (or alternatively from Configuration $2$) all the reachable configurations are either {\em closed} configurations or configurations where no agent is on $v_{n-3}$.}\label{fig:leftgate} \end{figure} \subsection{${\sf KNOWN}$\xspace setting}\label{sec:placeandswipe} In this subsection we examine the ${\sf KNOWN}$\xspace setting. We first present a solution algorithm, namely {\sc Place-\&-Swipe}\xspace, that solves the problem with an idle time of $3 \lceil \frac{n}{2} \rceil$ rounds, when there is an uniform initial placement of the agents. We then discuss how the algorithm can be adapted to work under arbitrary initial placement by having a stabilisation time of $\lfloor \frac{n}{2} \rfloor$ and a stable idle time of $3 \lceil \frac{n}{2} \rceil$ rounds. \begin{figure}[htb] \centering \includegraphics[width=0.8\textwidth]{placeswipe.pdf} \caption{Algorithm {\sc Place-\&-Swipe}\xspace. The starting state in Pc, the Swiping Phase is Sf, and transitions are of the form $Predicate:Movement$}\label{fig:placeswipe} \end{figure} \paragraph{Patrolling Algorithm} The algorithm {\sc Place-\&-Swipe}\xspace (see Figure~\ref{fig:placeswipe}) perpetually alternates between two phases of fixed length (each phase lasts $\lceil \frac{n}{2} \rceil$ rounds). During the first phase, called \emph{Placement Phase}, the agents position themselves on a specially choosen pair of antipodal\footnote{A pair of nodes is antipodal if the distance between them in the ring is $\lfloor \frac{n}{2} \rfloor$.} nodes -- the {\em swiping nodes}. In the second phase, called the Swipe Phase, the agents together visit all nodes of the ring by both moving clockwise for $\lfloor \frac{n}{2} \rfloor$ rounds without stop. A Placement Phase followed by Swipe Phase is an epoch of the algorithm, we use $i \geq 0$ to indicate the epoch number. Since every node is visited once in every Swipe phase, in the worst case, a node may be visited at the beginning of a Swipe phase and subsequently at the end of the next Swipe Phase, giving an idle time of at most $3 \lceil \frac{n}{2} \rceil$ rounds. We now show that for each epoch $i$, there exists a a special pair $P_{i}$ of antipodal nodes which allow the Swipe Phase to cover all nodes in $\lfloor \frac{n}{2} \rfloor$ rounds. Let $start_i=i \cdot n$, and $end_i=\lceil (\frac{1}{2}+i)n \rceil -1$ be the starting and ending round of the $i$-th Placement Phase. \begin{lemma}\label{lemma:swipe} Given any dynamic ring ${\cal G}$ and any round $r=end_i+1$, there exists a pair of antipodal nodes $P_i$, such that two agents placed on $P_i$ and moving clockwise from round $end_i+1$ to the end round $start_{i+1}-1$, explore all nodes of the ring. \end{lemma} \begin{proof} The key idea to prove the existence of $P_{i}$ is Observation \ref{obs:ilcinkas}. By plugging $t=\lceil \frac{n}{2} \rceil -1$ in the statement of the observation. We have that there are $\lfloor \frac{n}{2} \rfloor +1$ nodes, let $E_i$ be this set, such that an agent being on one of these nodes at round $end_i+1$ moving clockwise visits exactly $\lceil \frac{n}{2} \rceil$ nodes by the end of round $start_{i+1}-1$. Now we have to prove that $E_i$ contains a pair of antipodal nodes. But this is obvious since the ring contains at least $\lfloor \frac{n}{2} \rfloor$ antipodal pairs and the cardinality of $E_i$ is $\lfloor \frac{n}{2} \rfloor +1$. Being the pair $P_{i}$ antipodals, when each agent visits $\lceil \frac{n}{2} \rceil$ nodes the ring has been explored. \end{proof} To prove correctness of the algorithm, we need to show that agents starting from any uniform configuration, the two agents can reach the chosen nodes $P_i$ in $\lceil \frac{n}{2} \rceil$ rounds. Note that, for computing $P_i$ in each epoch, the algorithm needs only the knowledge of the future $n$ rounds of ${\cal G}$. \begin{theorem}\label{th:placeswipe} Consider the ${\sf KNOWN}$\xspace model with Global snapshot and uniform initial placement. The algorithm {\sc Place-\&-Swipe}\xspace allows two agents to patrol a ring with an idle time $I(n) \leq 3\lceil \frac{n}{2} \rceil$. \end{theorem} \begin{proof} We first assume that agents are always able to reach $P_{i}$ in the $i$-th Placement Phase. By Lemma \ref{lemma:swipe} the agents explore in the Swipe Phase. Therefore, the idle time is upper bounded by the time that passes between the first round of Swipe Phase $i$ and the last round of Swipe Phase $i+1$. Since each Phase lasts $\lceil \frac{n}{2}\rceil$ rounds and between two Swipe Phases there is only one Placement Phase, then the idle time is $3\lceil \frac{n}{2} \rceil$ rounds. It remains to show that agents are able to reach $P_{i}$ during the $i$-th Placement Phase. First notice that at round $start_{i}$ agents are in antipodal positions: they start antipodal, and is easy to verify that at end of each Swipe Phase they are still antipodal. We have to show that given two agents on antipodal positions, they can reach, using the knowledge of ${\cal G}$, any pair of target antipodal positions in the interval $[start_{i},start_{i}+ \lceil \frac{n}{2}\rceil -1]$. Let $a_0,a_1$ be the agents and $v_i,v_j$ the target nodes disposed as in Figure \ref{fig:antipodal}. W.l.o.g we assume $x \leq \lfloor\frac{n}{2}\rfloor -x$ \begin{figure}[H] \centering \includegraphics[width=0.4\textwidth]{antipodal.pdf} \caption{The values on the ring arcs are the number of edges between the depicted nodes.}\label{fig:antipodal} \end{figure} If agent $a_0$ reaches node $v_i$ using the counter-clockwise path $p$ and $a_1$ does the same with $v_j$ during the interval $[start_{i},start_{i}+\lceil \frac{n}{2} \rceil-1]$, then we are done. Otherwise, let us assume, w.l.o.g., that agent $a_0$ cannot reach node $v_i$ using the counter-clockwise path $p$ during the interval $[start_{i},start_{i}+\lceil \frac{n}{2} \rceil-1]$. Then in ${\cal G}$ agent $a_0$ is blocked for at least $\lceil \frac{n}{2} \rceil-x+1$ rounds while trying to traverse path $p$. This implies that there are at least $\lceil \frac{n}{2} \rceil-x+1$ rounds in which edges that are not on path $p$ are present in the interval $[start_{i},start_{i}+\lceil \frac{n}{2} \rceil-1]$. But this implies that, by moving in clockwise direction, agent $a_0$ reaches node $v_j$ and agent $a_1$ node $v_i$. \end{proof} \paragraph{Arbitrary initial placement.} Theorem \ref{th:placeswipe} assumes that agents are starting at uniform distance. However, it is possible to easily adapt the algorithm to work under any initial placement sacrificing the stabilization time. Essentially, we need an initialization phase in which agents place themselves in antipodal positions. This can be done in $\lfloor \frac{n}{2} \rfloor$ rounds: in each round, agents move apart from each other increasing the distance by at least one unit per round. Thus, we obtain an algorithm with stabilization time $r_s=\lfloor \frac{n}{2} \rfloor$ and $I_{r_s}(n) \leq 3\lceil \frac{n}{2} \rceil$. \paragraph{Lower bounds.} A lower bound of $n$ for the ${\sf KNOWN}$\xspace setting is immediate from Th.~\ref{2knw:lb}. However, when the initial placement of the agents is arbitrary we can show a slightly better bound. \begin{theorem}\label{2knw:lbiplacement} Let ${\cal A}$ be a patrolling algorithm for two agents with arbitrary initial placement under the ${\sf KNOWN}$\xspace model with Global snapshot. For any even $n \geq 10$, there exists a $1$-interval connected ring where ${\cal A}$ has an idle time $I(n) \geq \lfloor (1+\frac{1}{5})(n-1) \rfloor$. \end{theorem} \begin{figure}[htb] \centering \begin{subfigure}{0.45\textwidth} \centering \includegraphics[width=\linewidth]{lowerbound1.pdf} \caption{Example of lower bound graph: the edge label is the round in which the edge is removed in the start-end wave.} \label{fig:lowerbound1} \end{subfigure}% \quad \begin{subfigure}{0.45\textwidth} \centering \includegraphics[width=\linewidth]{lowerbound.pdf} \caption{ Optimal Strategy for exploring all nodes an visit twice $v_{start_{a}}$.} \label{fig:lowerbound} \end{subfigure} \caption{Lower bound for the ${\sf KNOWN}$\xspace model with Global Snapshot and arbitrary initial placement.} \label{fig:problem} \end{figure} \begin{proof} The agents $a,b$ are initially positioned on two neighbour nodes, let them be $v_{start_{a}},v_{start_b}$ and let $v_{end_{a}},v_{end_b}$ the antipodal nodes, see Figure~\ref{fig:lowerbound1}. The edges removal follows a {\em wave} strategy, in which in alternating periods of ${\cal O}(n)$ rounds, edges are first removed in the direction that goes from the two start nodes to the end nodes and vice versa. See Figure \ref{fig:lowerbound1} for an example of start-end wave, If an agent tries to reach the end nodes from start nodes during a start-end wave it takes at least $n-2$ rounds. More formally, the scheduler of edges removal is as follows: Let $e^{up}_i$ (resp $e^{down}_i$) be the edge at distance $i$ from $v_{start_{a}}$ (resp. $v_{start_b}$) in the clockwise segment $v_{start_{a}},v_{end_{b}}$ (resp. counter-clockwise segment $v_{start_{b}},v_{end_{a}}$). Note that $i \in [0,\frac{n}{2}-2]$. Edge $e^{up}_i$ is absent in rounds $4x(\frac{n}{2}-1)+2i$ and $4(x+1)(\frac{n}{2}-1)-2(i+1)$ for $x\in \mathbb{N}$. Edge $e^{down}_i$ is absent in rounds $4x(\frac{n}{2}-1)+(2i+1)$ and $4(x+1)(\frac{n}{2}-1)-(2i+1)$ for $x\in \mathbb{N}$. Let us recall that the idle time is the maximum among the number of rounds between two consecutive visits of the same node, and the rounds needed to explore all nodes the first time. Therefore we focus on the minimum time that agents need to first explore all nodes and than to visit again node $v_{start_{a}}$. If agents try to minimise the exploration time, then they pay at least $2n-4$ rounds to go back to $v_{start_{a}}$: they have to move in parallels to nodes $v_{end_{a}},v_{end_b}$, this takes $n-2$ rounds; after, at least one has to go back to $v_{start_{a}}$ and this takes other $n-2$ rounds. Therefore, any strategies has to leave some nodes unexplored in the first $n-2$ rounds, one of the two agents has to go back to the start position before reaching the end nodes. While the other agent will take care of the nodes left unexplored by the first. The strategy is reported in Figure \ref{fig:lowerbound}, w.l.o.g. agents $b$ covers $v_{start_b}-v_{end_b}$ and it moves of $x$ steps in segment $v_{start_a}-v_{end_a}$. Agent $a$ moves clockwise of $d=\frac{n}{2}-1-x$ edges and it goes back to its initial position. The best $x$ is the one such that $a$ visits again $v_{start_a}$ exactly when $b$ completes the exploration. Thus imposing $3d=2(x+\frac{n}{2})$, by algebraic manipulation, we have $x=\frac{n}{10}-\frac{6}{10}$. The time to explore all nodes is $2(\frac{n}{2}+x)$ (agent $b$ is blocked half of the rounds), thus the time is at least $\lfloor (1+\frac{1}{5})(n-1) \rfloor$ rounds. \end{proof} \section{Patrolling with $k>2$ agents having Global Visibility} \label{global:k} In this section we examine the case of $k>2$ agents, showing how to generalize the algorithms of Section \ref{global:two} for this case. \subsection{${\sf UNKNOWN}$\xspace setting: Generalising {\sc Ping-Pong}\xspace for $k$ agents} We generalize {\sc Ping-Pong}\xspace for $k$ agents assuming that: $k$ divides $n$, $k$ is even, and that there is uniform initial placement. At the end of the section we discuss how to remove such assumptions. The new algorithm, called {\sc K-Ping-Pong}\xspace (see Figure \ref{fig:pingpongk}) is divided in two phases, {\em Single-Group-Swiping} and {\em Two-Groups-Swiping}, as described below. \begin{figure}[htb] \centering \includegraphics[width=\textwidth]{pingpongk.pdf} \caption{Algorithm {\sc K-Ping-Pong}\xspace state diagram. The starting state is S0. Movement on clockwise or counter-clockwise edge, or no move is denoted by $1$,$-1$,$0$ respectively.} \label{fig:pingpongk} \end{figure} The Single-Group-Swiping Phase starts at round $r=0$ and all agents move clockwise in this phase, keeping uniform distribution. The phase ends at the first round $r'$ when an agent is blocked. Starting from round $r'$, the Two-Groups-Swiping phase starts. Recall that $BC_{r'}$ is the set of agents trying to move clockwise in round $r'$ that encounter a missing edge. Since the agents are in distinct nodes, only one agent, say agent $a_j \in BC_{r'}$. This breaks the symmetry among the agents and they can partition themselves in two groups: group clockwise $G_{C}$ and group counter-clockwise $G_{CC}$. The group $G_{C}$ contains agent $a_{(j+2t) \mod k}$ with $t \in \mathbb{N}$, and group $G_{CC}$ contains all other agents (see Figure \ref{fig:problem1}). The partition into groups happens during the computation phase of round $r'$. From round $r'$, the agents move according to the following rules: \begin{itemize} \item Rule 1 (Group Movement): For $X \in {C,CC}$, an agent in $G_{X}$ moves in direction $X$ if no agent in $G_{X}$ is blocked, i.e. $\nexists a \in BX_{r} \bigcap G_{X}$ . This predicate is represented by the loops in states $C$, $CC$ of Figure \ref{fig:pingpongk}. \item Rule 2 (Membership Swapping): If at some round $r''$ agents in both groups are blocked, then the agents in $BC_{r''}$ and $BCC_{r''}$ swap their role, i.e. they exchange their states and thus their group membership in this round. Any other agent in $G_{X}$ moves in direction $X$ during this round. This rule is represented by the arrows that connect state $C$ and $CC$ for the blocked agents in Figure \ref{fig:pingpongk}. \end{itemize} Intuitively, for Rule $1$ a group $G_{X}$ moves when all the agents in the group would be able to move without trying to cross a missing edge. Rule $2$ is applied only when two agents, one from group $G_{C}$ and one from group $G_{CC}$ are on two nodes that share the same missing edge, and this allows the groups to perform a ``{\em virtual movement}'', see Figures \ref{fig:problem2}-\ref{fig:problem3}. \begin{figure}[H] \centering \begin{subfigure}{0.30\textwidth} \centering \includegraphics[width=\linewidth]{twogroups.pdf} \caption{Starting round of Two-Groups-Swiping. $G_{C}$ (resp. $G_{CC}$) agents are marked with squares (dots)} \label{fig:problem1} \end{subfigure}% \quad \begin{subfigure}{0.30\textwidth} \centering \includegraphics[width=\linewidth]{tdBlock2.pdf} \caption{ Rule 1: Group $G_{C}$ is blocked. $G_{CC}$ reaches the other endpoint of the missing edge.} \label{fig:problem2} \end{subfigure} \quad \begin{subfigure}{0.30\textwidth} \centering \includegraphics[width=\linewidth]{tdBlock3.pdf} \caption{ Rule 2: The two blocked agents swap roles. Others move normally.} \label{fig:problem3} \end{subfigure} \caption{Algorithm {\sc K-Ping-Pong}\xspace, depiction of salient cases.} \label{fig:problem} \end{figure} \begin{theorem}\label{twogroups:unkown} The {\sc K-Ping-Pong}\xspace algorithm has an idle time of $\frac{4n}{k}$. \end{theorem} \begin{proof} Consider two successive visits of a node $v$ at $r_0$ and $r_1$. If $r_0$ and $r_1$ belongs to the Single-Group-Swiping phase, then $r_1-r_0 \leq \frac{n}{k}$: the distance between two agents at most $\frac{n}{k}$ and they are all moving in the same direction. Let us examine now the case when $r_0$ and $r_1$ belongs to the Two-Groups-Swiping phase. Notice that: (1) in each round at least one group moves, and (2) At round $r_0+1$, the distances between node $v$ and the closest agents in $G_{CC}$ (resp. $G_{CC}$) that are moving towards $v$ are at most $\frac{2n}{k}-1$. Due to (1) we know that in the successive $\frac{4n}{k}$ rounds, at least one group performs $\frac{2n}{k}$ steps, thus reaching $v$. Therefore $r_1-r_0 \leq \frac{4n}{k}$. It remains to examine the last case when $r_0$ belongs to the Single-Group-Swiping phase and $r_1$ belongs to the Two-Groups-Swiping phase. Thus we have $r_0 \leq r' \leq r_1$. Notice that, the worst case is the one in which $r' -r_0$ is maximised, that is $r' -r_0=\frac{n}{k}-1$: $v$ was about to be visited by an agent $a$, but $a$ switches direction. In this case, the distance between $v$ and the first agent in $G_{CC}$ moving towards $v$, added to the distance between $v$ and the first agent in $G_{C}$ moving towards $v$, is $\frac{3n}{k}-1$. Using the same analysis of the previous case we obtain $r_1-r' \leq \frac{3n}{k}$ that gives $r_1-r_0 \leq \frac{4n}{k}$. \end{proof} \paragraph{When $k$ is not a divisor of $n$.} In the case $k$ does not divide $n$, we have that in the initial placement the minimum distance between two agents is $\lfloor \frac{n}{k} \rfloor$ and the maximum distance is $\lfloor \frac{n}{k} \rfloor+1$. We can use the same analysis of Theorem \ref{twogroups:unkown}, taking into account the difference in the distance, which gives a bound of $\lfloor \frac{4n}{k} \rfloor+2$. \paragraph{When agents are not uniformly placed.} If agents are not uniformly placed initially, they can arrive at a uniform configuration in $O(n)$ steps. \begin{observation}\label{obs:uniformspread} Consider a set of $k \geq 2$ agents arbitrarily placed in a dynamic ring under the ${\sf UNKNOWN}$\xspace model with global snapshot, then the agents need at most $2n$ rounds to reach an uniform placement in the ring. \end{observation} \begin{proof} According to the initial configuration we may have that it is possible to find total order among agents or not. Let us first assume the case when such total order does not exists. In this case the initial configuration is periodic, with period $P$, and it can be partitioned in $P$ segments. In each of this segment a total order among robots exists, thanks to the presence of chirality. Therefore in each segment we can uniquely identify an agent and place it in the correct position. If there are no edge removal this terminates in at most $n$ rounds. If there are edge removal then we will show that there exists a total order. So we will use the algorithm for the total order case. Let us consider the case when there is a total order, or when an edge is remove. When an edge is removed the symmetry between agents is broke: the first agent in the total order, let it be $a_0$, is the nearest clockwise agent to the removed edge. The others are ordered according to the clockwise direction starting from $a_0$. The agents place themselves uniformly using agent $a_0$ as reference. Agent $a_{j}$, with $j >0$ moves clockwise or counter-clockwise according to the need of shrinking or expanding its distance from the final position of $a_{j-1}$. In case $a_j$ is blocked, then all agents $a_{i}$ with $i < j$ move counter-clockwise or clockwise to set $a_j$ in the correct position. This process requires at most $n$ rounds. The bound of $2n$ rounds comes from composing the two previous algorithm in the obvious way: if there is no total order we run the algorithm for periodic configurations and we switch to the one with total order as soon as the adversary introduces a failure. \end{proof} \paragraph{When $k$ is odd.} The problem for odd $k$ is that once the algorithm switches to the Two-Group-Swiping phase, the groups $G_{C},G_{CC}$ do not have equal sizes. One group has size $\frac{k-1}{2}$ and the other $\frac{k+1}{2}$. Moreover, within each group the members are not uniformly placed. The last problem is easy fixable at the price of stabilization time using Observation \ref{obs:uniformspread}. Once the groups are uniformly placed, we can bound the idle time to $\frac{4nk}{k^2-1}+4$, as shown in the following lemma: \begin{lemma} When one group has size $\frac{k-1}{2}$ and the other $\frac{k+1}{2}$, the Two-Groups-Swiping phase of {\sc K-Ping-Pong}\xspace has an idle time of at most $\frac{4nk}{k^2-1}+4$ rounds. \end{lemma} \begin{proof} W.l.o.g. let $G_{C}$ be the group of size $\frac{k-1}{2}$ and $G_{CC}$ be the other group. Let $r_0,r_1$ be the times between two successive visits of some node $v$. In the worst case at round $r_0+1$, node $v$ could be at distance at most $\frac{2n}{k-1}+1$ from an agent in group $G_{C}$, and distance at most $\frac{2n}{k+1}+1$ from an agent in $G_{CC}$. The sum of these distances is $\frac{4nk}{k^2-1}+2$, and since only one group can be blocked at each round, this distance decreases by one at each round. This implies that $r_1-r_0 \leq \frac{4nk}{k^2-1}+2$, thus proving the bound. \end{proof} From the previous Lemma and using the same proof strategy of Theorem \ref{twogroups:unkown} we have that $\frac{4nk}{k^2-1}+4$ is the idle time of the algorithm. Unfortunately, it is not possible to bound the stabilization time of the algorithm. The adversary decides when, and if, the algorithm goes to the Two-Groups-Swiping phase, and when this happen a certain number of rounds has to be payed to position in an uniform way the members of each group. However, in any infinite execution of the algorithm, there are only finitely many times in which two consecutive visits of a node are spaced by more than $\frac{4nk}{k^2-1}+4$ rounds. \subsection{${\sf KNOWN}$\xspace setting: {\sc Place-\&-Swipe}\xspace for $k$ agents.} Generalizing the algorithm Section \ref{sec:placeandswipe}, for $k$ agents is immediate. The algorithm is essentially the same, the only variations are: each phase now lasts $\lfloor \frac{n}{k} \rfloor$ rounds and $P_{i}$ is not a pair of nodes but $k$ nodes uniformly placed. Also in this case we assume that agents start uniformly placed, such assumption can be dropped sacrificing the stabilization time (see Observation \ref{obs:uniformspread}). Lemma \ref{lemma:swipek} below is an equivalent of Lemma \ref{lemma:swipe} for $k\geq 2$ agents. Further, we can show that starting from any uniform configuration, the agents can reach, using the knowledge of ${\cal G}$, any given target uniform configuration in at most $\lceil \frac{n}{k} \rceil$ steps. \begin{lemma}\label{lemma:swipek} Given any 1-interval connected dynamic ring ${\cal G}$, for any round $r_i$, there exists a set $P_i$ of $k$ uniformly spaced nodes, such that $k$ agents placed on $P_i$ and moving clockwise from round $r_i$ to round $r_{i}+ \lfloor \frac{n}{k} \rfloor$, together explore all nodes of the ring. \end{lemma} \begin{proof} The key idea to prove the existence of $P_{i}$ is Observation \ref{obs:ilcinkas}. By plugging $t=\lceil \frac{n}{k} \rceil -1$ in the statement of the observation. We have that there are $\lfloor \frac{n}{k} \rfloor +1$ nodes, let $E_i$ be this set, such that an agent being on one of these nodes at round $r_i$ moving clockwise visits exactly $\lceil \frac{n}{k} \rceil$ nodes by the end of round $r_{i}+ \lfloor \frac{n}{k} \rfloor$. Now we have to prove that $E_i$ contains a set of uniformly placed nodes. But this is obvious since the ring contains at least $\lfloor \frac{n}{k} \rfloor$ uniformly placed nodes and the cardinality of $E_i$ is $\lfloor \frac{n}{k} \rfloor +1$. Being the agents in $P_{i}$ uniformly placed, when each agent visits $\lceil \frac{n}{k} \rceil$ nodes the ring has been explored. \end{proof} \begin{theorem}\label{th:Kplaceswipe} Consider the ${\sf KNOWN}$\xspace model with global snapshots. The algorithm {\sc Place-\&-Swipe}\xspace allows $k$ agents with uniform initial placement to patrol a ring with an idle time $I(n) \leq 3\lceil \frac{n}{k} \rceil$. \end{theorem} \begin{proof} The only thing to prove is that agents are able to reach $P_{i}$ during the $i$-th Placement Phase, since the correctness of the Swiping Phase is given by Lemma \ref{lemma:swipe}. First notice that at round $start_{i}$ for each epoch $i$, agents are uniformly placed in the ring, since the agents are initially uniformly placed and at the end of each Swipe Phase they are still uniformly placed. We have to show that starting from any uniform configuration, the agents can reach, using the knowledge of ${\cal G}$, any target uniform configuration, within the time interval $[start_{i},start_{i}+ \lceil \frac{n}{k} \rceil -1]$. At round $start_{i}$, the distance between agent $a_{j}$ and $a_{j-1}$ is at most $\lceil \frac{n}{k} \rceil$. Let $d_j$ be the distance between the point in $P_{i}$ that has the closest clockwise distance from $a_j$. W.l.o.g $d_{j} \leq \lceil \frac{n}{k} \rceil-d_{j}$, otherwise we can switch to the counter-clockwise orientation instead. Note for two agents $a_l,a_j$ it could be that $|d_{j}-d_{l}| = 1$ (in case $k$ is not an exact divisor of $n$), w.l.o.g. let us consider that $d_{j}$ is max($d_{j},d_{l}$). If each agent $a$ is able to move clockwise for at least $d_j$ steps we can reach configuration $P_i$. Otherwise, there exists at least one $a_{j}$ that has been blocked for at least $\lceil \frac{n}{k} \rceil-(d_{j}-1)$ rounds. This implies that by moving counter-clockwise each agent can move for at least $\lceil \frac{n}{k} \rceil-d_{j}+1$ rounds reaching the target node in $P_{i}$. \end{proof}
\section{Introduction} \label{section1} Recent years have witnessed massive efforts devoted to advancing the research over image re-ranking which allows significantly improving the retrieval accuracy by refining the query model. Among all the re-ranking approaches, the subspace based strategy has become a promising line of research due to its desirable property in uncovering the discriminative latent subspace underlying the original high-dimensional feature space. In particular, multi-view re-ranking methods are capable of exploring the visual complementarity among heterogeneous feature spaces, which, therefore, leads to a latent representation with sufficient descriptive power. In order to further improve the separability of the query model, the classification mechanism is usually encoded into the subspace learning based re-ranking method for producing a generic and discriminative framework\cite{JunTIP17,ArandjelovicCVPR12}. Despite their success in image re-ranking, conventional subspace based approaches directly leverage the visual features generated from the whole image for training the query model while ignores the important role of image objectness in similarity matching. In many cases, actually, it is the region of interest (ROI) characterizing the image objectness that captures the users' query intention rather than the whole image region containing complex background contents. In this sense, training the query model without considering the objectness tends to introduce the query-irrelevant noise, which leads to the biased re-ranking results and thus adversely affects the retrieval performance. Therefore, it is crucial for incorporating the objectness into the trained query model for further improving the re-ranking accuracy. It is well known that Privileged Information (PI) gives the supplementary cues about the training examples \cite{VapnikNN09,SharmanskaICCV13}. Since PI is typically more informative about the task at hand than the raw data per se, it is usually combined with the original training examples for further improving the accuracy of the trained model. Recent research substantially demonstrates the beneficial effect of PI learning in a wide range of vision tasks. Without loss of generality, PI can be defined as four different modalities in the context of object classification, namely attributes, annotator rationales, bounding boxes and textual descriptions \cite{SharmanskaICCV13}. In particular, the PI translated into the bounding boxes can be viewed as the image prior, since it is capable of highlighting the object region and encoding the principal visual cues in the image. Besides, it is also available with easy-to-implement ROI annotation, which is tailored for the user interaction in image re-ranking. Therefore, in this paper, we only focus on the PI formulated as the bounding box, whilst aim to exploit both the original and the supplementary PI features to train the re-ranking model for accurate retrieval. More specifically, inspired by the unified subspace based re-ranking framework proposed in \cite{JunTIP17}, we propose a discriminative PI-aware multi-view re-ranking method in which multi-view local PI features are also integrated into the query model training along with their global counterparts. \begin{figure} \centering \includegraphics[width=1.0\linewidth]{fig1} \caption{The system flowchart of the proposed approach. In our method, two major steps are involved, namely model training and on-the-fly re-ranking. With the original training data and the annotated PI regions derived from user interaction, the former integrates the global multi-view embedding and its PI-based counterpart into a unified framework, which produces a PI-aware latent subspace with sufficient discriminating power. For on-the-fly re-ranking, the latent representations of the target images are obtained by projecting the multi-view features onto the PI-aware subspace, and thus the images are re-ranked by the signed distances from the separating hyperplane accordingly.} \label{fig1} \end{figure} Fig. \ref{fig1} gives the processing pipeline of the proposed method. Analogous to the DMINTIR re-ranking method in \cite{JunTIP17}, our approach comprises two steps, namely query model training and on-the-fly re-ranking. In the model training, we first identify the query-relevant images from the top returned shortlist, whilst annotate the PI regions in these positive examples with cropped ROI bounding boxes via user interaction. In addition, the low-scored images in the original ranking list are automatically recognized as the negative training examples, and their corresponding PI regions can be obtained by the off-the-shelf saliency detector \cite{FengICCV11}. Thus, the training data consisting of both global contents and additional local PI regions can be handled in the original and the privileged spaces respectively. Then, we compute the multi-view features in both spaces and project them onto the respective latent subspaces for uncovering the underlying low-dimensional representations. Meanwhile, a PI-aware latent subspace with sufficient discriminating power can be obtained by jointly optimizing the separating hyperplanes of the dual subspaces. For the on-the-fly re-ranking, due to the unavailability of the PI in the target images, we directly project the multi-view features onto the PI-aware latent subspace for generating the discriminative representations, and thus the database images can be re-ranked by computing and sorting the distances from the separating hyperplane for performance improvement. \begin{figure} \centering \includegraphics[width=1.0\linewidth]{fig2} \caption{Some difficult query examples on Oxford5k and Paris6k. The left image with a red box is the query with the annotated image ROI while the right image is the corresponding target image in the dataset. The numbers beside the target images denote the image ranks in the returned list. Note that the DMINTIR proposed in \cite{JunTIP17} is closest to our method except excluding the PI features in training the query model. Apparently, our method significantly outperforms the DMINTIR when there exists dramatic variances in visual appearances of query object and background contents, which sufficiently suggests the benefits of PI for accurate re-ranking.} \label{fig2} \end{figure} Fig. \ref{fig2} presents some difficult query examples by using different approaches. It is shown that there exists dramatic visual variances in ROI regions and background contents between the query images and the target images. Since our approach takes into account the PI cues in training re-ranking model, it outperforms the state-of-the-art re-ranking method \cite{JunTIP17} which excludes PI features in model training. This also sufficiently suggests the beneficial effect of PI for improving the retrieval accuracy. Specifically, the advantage of exploiting PI for re-ranking manifests itself in the following two aspects. On the one hand, training with PI contributes to highlighting the dominant role of query object in the re-ranking model for further enhancing its discriminating power. On the other hand, PI-aware training somewhat allows suppressing the adverse effect of scale variance, illumination change, perspective transformation and cluttered background, and thus improves the robustness of the re-ranking model. To sum up, the contributions of this paper are three-fold as follows: \begin{itemize} \item We take into account the PI clues in training re-ranking to outweigh the objectness in the image. To our knowledge, this is the first time PI is involved in re-ranking for further performance boost. \item We simultaneously integrate the local PI features and the original global features into a unified PI-aware multi-view embedding framework for accurate image re-ranking. \item Extensive experimental evaluations and the comparative studies demonstrate the advantage of our method to other state-of-the-art approaches. \end{itemize} The remainder of this paper is structured as follows. After reviewing the related work in Section \ref{section2}, we will introduce the problem setup in Section \ref{section3}. Subsequently, we will elaborate the mathematical formulation of our method in Section \ref{section4} and give the optimization accordingly in Section \ref{section5}. Next, we will analyze the computational complexity in Section \ref{section6}. Extensive experimental evaluations and the comparative studies will be carried out in Section \ref{section7} before this paper is finally concluded in Section \ref{section8}. \section{Related Work} \label{section2} \subsection{Multi-view image re-ranking} In re-ranking, the single-view feature often fails to provide a comprehensive visual description, and thus leads to an image signature with insufficient descriptive power. By contrast, multi-view feature enables take advantage of the complementarity among multiple heterogeneous features, which, consequently, substantially benefits the re-ranking performance improvements. Earlier multi-view re-ranking approaches leverage the low-level features (e.g., Bag of features, color histogram and wavelet textures) for characterizing the visual contents in the images \cite{YuTC15,YuTIP14,YuTMM14,DengTMM14,LiTMM12}. Then, either a linear transformation \cite{LiTMM12} or complex hypergraph manifolds \cite{YuTC15,YuTIP14,YuTMM14} are learned from these multi-view features to uncover the intrinsic structure or a low-dimensional subspace for re-ranking. Besides, more robust estimator has also been utilized for multi-view intact space learning \cite{XuTPAMI15}. Low-level features encodes the visual patterns intuitively yet fails to provide higher-level image representation. Recently, deep features have been used as desirable alternative in multi-view learning, since they encode high-level semantic attributes in the image with preferable descriptive power \cite{JiINS17,JunTIP17,PanSIGIR14}. Particularly, a discriminative multi-view re-ranking approach has been proposed in \cite{JunTIP17} to integrate the deep CNN code and the best performing hand-crafted feature TE into a generic and unified framework, which produces a latent low-dimensional subspace maintaining sufficient separability. Thus, multi-view features can be projected onto this subspace such that robust latent representations can be generated for accurate re-ranking. Albeit effective, \cite{JunTIP17} directly exploits the global features for multi-view embedding while downplays visual cues in the query region. Therefore, it exhibits suboptimal performance when there exists complex background contents and severe geometric transformation of query object. \subsection{Learning using privileged information} In the computer vision community, PI, which is interpreted as the auxiliary information about the training data, can be used for learning better recognition systems. Recently, extensive efforts are devoted to exploring PI cues for enhancing the model training in a variety of vision tasks \cite{SharmanskaICCV13,XuTNNLS15,YanTMM16,MotiianCVPR16,YangCVPR17,ShiCVPR17,GordoCVPR17,TangTNNLS17,YangTIP18,LambertCVPR18}. The earliest research over PI learning integrates PI into the classic SVM algorithm, which produces an extended paradigm termed Learning Using Privileged Information (LUPI) \cite{VapnikNN09}. The resulting model is also referred to SVM+ accordingly. In \cite{SharmanskaICCV13}, four different PI types are explored and handled in a unified LUPI framework in the context of object classification. Besides, a novel rank transfer approach comparable to the conventional SVM+ algorithm is also proposed for solving the LUPI task. While the extensions of SVM+ algorithm to multiclass problem are possible, PI is also incorporated into the framework of generalized matrix learning vector for prototype-based classification \cite{FouadTNNLS13}. In face verification and person re-identification, the extra depth features used as PI are utilized for improving the distance metric learning \cite{XuTNNLS15}. Analogously, person re-identification is also addressed in \cite{YangTIP18} by joint distance metric learning with the help of PI. Besides, PI is also embedded into the deep Convolutional Neural Networks (CNNs) and Recurrent Neural Network (RNNs) for image classification and action recognition \cite{LambertCVPR18,YangCVPR17,ShiCVPR17}. In addition to the aforementioned applications, human-generated captions is used as PI for learning the improved representation in semantic retrieval \cite{GordoCVPR17}. In order to further exploit the complementary information among multiple features sets, a new multi-view privileged SVM model is proposed by incorporating the LUPI paradigm into multi-view learning framework, which satisfies both consensus and complementary principles for multi-view learning \cite{TangTNNLS17}. Although great progress has been made in PI learning, how to make use of PI cues in image re-ranking for further performance improvement remains an open problem. In this paper, we propose a generic PI-aware re-ranking framework in which the original global representations and the additional PI cues are simultaneously incorporated into subspace-based multi-view embedding. The resulting PI-aware subspace preserves sufficient discrimination in the image, and thus can be used for generating discriminative objectness-aware latent representation for accurate re-ranking. To the best of our knowledge, this is the first time the PI learning is explored in image re-ranking. \section{The problem formulation} \label{section3} Given a set of training examples $ \mathcal{S}=\{S^+,S^-\} $ with annotated ROI bounding boxes obtained by user interaction, the corresponding multi-view features generated from both the whole image and ROI can be denoted as $ \mathcal{Z}=\{Z_v\}_{v=1}^m $ in the original space and $ \mathcal{Z}^*=\{Z_v^*\}_{v=1}^m $ in the privileged space, where $ m $ is the number of views. Since both spaces share the same feature dimensionality for single-view data, we have $ Z_v, Z_v^* \in \mathbb{R}^{D_v \times n} $, where $ D_v $ is the feature dimensionality of the $ v^{th} $ view while $ n=|\mathcal{S}| $ is the size of the training set. Meanwhile, $ \mathcal{Y} \in \{+1,-1\}^{n \times 1} $ is the label vector denoting the query relevance of the training examples. The PI-aware multi-view re-ranking model training is aiming at learning the dual mapping functions: \begin{align} f&:\{\mathcal{Z},\mathcal{Y}\} \rightarrow \{X,w\} \label{equ1} \\ f^*&:\{\mathcal{Z^*},\mathcal{Y}\} \rightarrow \{X^*,w^*\} \label{equ2} \end{align} where $ X $ and $ X^* $ are the respective multi-view subspace embeddings, whilst $ w $ and $ w^* $ are the dual separating hyperplanes preserving sufficient discriminative power in both underlying subspaces. For the sake of consistency, we learn the function $ h(w,w^*) $ such that the two subspaces are mutually interlinked and a PI-aware low-dimensional subspace can be produced. For the on-the-fly re-ranking, since the PI data is unavailable, we directly project the multiple features of the target images $ \{\tilde{Z}_v\}_{v=1}^m $ on the trained PI-aware subspace for generating the latent representations $ \tilde{X} $. Thus, the image ranks can be refined by computing the signed distance of $ \tilde{X} $ from the decision boundary $ w $ for accurate re-ranking. All the mathematical notations involved in our formulation are summarized in Table \ref{tab1}. \begin{table} \addtolength{\tabcolsep}{+0.1cm} \renewcommand{\arraystretch}{1.2} \centering \caption{The annotations involved in our mathematical formulation} \label{tab1} \vspace{+.1cm} \begin{tabular}{|c|c|} \hline $n$ & the size of the training set \\ \hline $m$ & the number of data view \\ \hline $D_v$ & the view-specific feature dimensionality \\ \hline $d$ & the dimension of the latent subspace \\ \hline $z_v^{(i)} \in \mathbb{R}^{D_v \times 1}$ & the view-specific feature representation in the original space \\ \hline $z_v^{*(i)} \in \mathbb{R}^{D_v \times 1}$ & the view-specific feature representation in the privileged space \\ \hline $P_v \in \mathbb{R}^{D_v \times d}$ & the view-specific generation matrix in the original space \\ \hline $P_v^* \in \mathbb{R}^{D_v \times d}$ & the view-specific generation matrix in the privileged space \\ \hline $x_i \in \mathbb{R}^{d \times 1}$ & the sample-specific latent representation in the original space \\ \hline $x_i^* \in \mathbb{R}^{d \times 1}$ & the sample-specific latent representation in the privileged space \\ \hline $w \in \mathbb{R}^{d \times 1}$ & the separating hyperplane in the original space \\ \hline $w^* \in \mathbb{R}^{d \times 1}$ & the separating hyperplane in the privileged space \\ \hline $y_i \in \{1, -1\}$ & the sample label \\ \hline \end{tabular} \end{table} \section{DMVPIR: Discriminative Multi-view PI-aware Re-ranking} \label{section4} In the state-of-the-art subspace-based multi-view embedding methods, it is assumed that the image feature of a single view $ z_v \in \mathbb{R}^{D_v \times 1} $ can be recovered from a shared underlying subspace via a view-specific generation matrix $ P_v \in \mathbb{R}^{D_v \times d} $ such that: \begin{equation} \label{equ3} z_v=P_v \cdot x + \epsilon_v \end{equation} where $ x \in \mathbb{R}^{d \times 1} $ is the low-dimensional subspace representation, whilst $ \epsilon_v $ is the view-dependent mapping error. Thus, the latent subspace can be obtained by minimizing the following formulation: \begin{equation} \label{equ4} J(P_v,x)=\sum_{v=1}^m\|z_v-P_v \cdot x\|^2 + \lambda\sum_{v=1}^m\|P_v\|_F^2 + \beta\|x\|^2 \end{equation} where $ \lambda $ and $ \beta $ are the tradeoff parameters compromising between the two regularization terms. In our case, we impose the multi-view embedding on all the training examples in both the original and the privileged feature spaces, and thus we have the following formulations to minimize: \begin{align} J(P_v,x_i) &= \sum_{i=1}^n\sum_{v=1}^m\|z_v^{(i)}-P_v \cdot x_i\|^2 + \lambda\sum_{v=1}^m\|P_v\|_F^2 + \beta\sum_{i=1}^n\|x_i\|^2 \label{equ5} \\ J(P_v^*,x_i^*) &= \sum_{i=1}^n\sum_{v=1}^m\|z_v^{*(i)}-P_v^* \cdot x_i^*\|^2 + \lambda^*\sum_{v=1}^m\|P_v^*\|_F^2 + \beta^*\sum_{i=1}^n\|x_i^*\|^2 \label{equ6} \end{align} To ensure the model discrimination capability, learning separating hyperplane $ w $ and $ w^* $ in the dual subspaces should also be also encoded in the formulation to distinguish between query-relevant and irrelevant examples. Besides, $ w^* $ learning should play a dominant and leading role, since the privileged features are more informative and confident in discriminatively separating the examples. As a result, simultaneous learning of $ w $ and $ w^* $ can be formulated as: \begin{equation} \label{equ7} \begin{gathered} \min_{w,w^*,b,b^*}\dfrac{1}{2}(\|w\|^2+\gamma\|w^*\|^2) + C\sum_{i=1}^n w^{*T}x_i^*+b^* \\ s.t. \quad y_i(w^Tx_i + b) \geq 1-(w^{*T}x_i^* + b^*), \quad w^{*T}x_i^* + b^* \geq 0,\quad \forall i=1,...,n \end{gathered} \end{equation} Note that Equ.(7) is actually the formulation of SVM+ algorithm which uses the PI as a proxy to the slack oracle in the traditional SVM classifier \cite{SharmanskaICCV13}. Thus, we have the mathematical formulation of our Discriminative Multi-View PI aware Re-ranking (DMVPIR) model by integrating (5), (6) and (7) into a unified framework as follows: \begin{equation} \label{equ8} \begin{gathered} \mathcal{L}(x_i, x_i^*, P_v, P_v^*, w, w^*) = \min J(P_v, x_i) + J(P_v^*, x_i^*) \\ + \frac{1}{2}(\|w\|^2+\gamma\|w^*\|^2) + C\sum_{i=1}^n{w^*}^Tx_i^* + b^* \\ s.t.\quad y_i(w^Tx_i + b) \geq 1-(w^{*T}x_i^* + b^*), \quad w^{*T}x_i^* + b^* \geq 0,\quad \forall i=1,...,n \end{gathered} \end{equation} where \begin{align} J(P_v, x_i) &= \sum_{i=1}^n\sum_{v=1}^m\|z_v^{(i)}-P_vx_i\|^2 + \lambda\sum_{v=1}^m\|P_v\|_F^2 + \beta\sum_{i=1}^n\|x_i\|^2 \label{equ9} \\ J(P_v^*, x_i^*) &= \sum_{i=1}^n\sum_{v=1}^m\|z_v^{*(i)}-P_v^*x_i^*\|^2 + \lambda^* \sum_{v=1}^m\|P_v^*\|_F^2 + \beta^*\sum_{i=1}^n \|x_i^*\|^2 \label{equ10} \end{align} As shown in Equ. (\ref{equ8}), our DMVPIR re-ranking model aims to learn a PI-aware subspace with sufficient discriminative power encoded by decision boundary $ w $. For the on-the-fly re-ranking, we project the multi-view feature representations of the target images $\{\tilde{Z_v}\}_{v=1}^m$ onto the PI-aware latent subspace via the optimal learned view-dependent generation matrix $\{\hat{P_v}\}_{v=1}^m$, which results in the low-dimensional subspace representations $\tilde{X}$ for the subsequent similarity measure and re-ranking. Mathematically, $\tilde{X}$ can be obtained by solving for the following minimization problem: \begin{equation} \label{equ11} \min_{\tilde{X}}\mathcal{L}(\tilde{X}) = \min_{\tilde{X}}\sum_{v=1}^m\|\tilde{Z_v}-\hat{P_v}\tilde{X}\|_F^2 + \beta\|\tilde{X}\|_F^2 \end{equation} \section{Optimization} \label{section5} To solve the problem in Equ. (\ref{equ8}), we develop an efficient iterative alternating optimization algorithm in which the following five alternating optimization steps iteratively minimize the empirical loss. \textbf{First, we update $x_i$ by fixing the other parameters}, and thus the problem is reduced to the following formulation: \begin{equation} \label{equ12} \begin{gathered} \min_{x_i}\mathcal{L} = \min_{x_i}\sum_{v=1}^m\|z_v^{(i)}-P_vx_i\|^2 + \beta\|x_i\|^2 \\ s.t. \quad y_iw^Tx_i \geq c \end{gathered} \end{equation} where $c=1-(x_i^{*T}w^*+b^*)-y_ib$. Furthermore, the objective function in Equ. (\ref{equ12}) can be simplified as: \begin{equation} \label{equ13} \begin{aligned} \min_{x}\mathcal{L} & = \min_{x}\sum_{v=1}^m\|z_v-P_vx\|^2 + \beta\|x\|^2 \\ & = \min_{x}\sum_{v=1}^m({z_v}^T - x^TP_v^T)(z_v-P_vx) + \beta x^Tx \\ & = \min_{x}\sum_{v=1}^m(x^TP_v^TP_vx - 2z_v^TP_vx) + \beta{x^Tx} \\ & = \min_{x}{x^T}{\sum_{v=1}^mP_v^TP_v}{x} + \beta{x^Tx} - 2\sum_{v=1}^m{z_v^TP_v}x \\ & = \min_{x}x^T(\sum_{v=1}^mP_v^TP_v + \beta\textbf{I})x - (2\sum_{v=1}^m{z_v^TP_v})x \end{aligned} \end{equation} Thus, the problem is formulated as: \begin{equation} \label{equ14} \begin{gathered} \min_{x}\frac{1}{2}x^T(2\sum_{v=1}^mP_v^TP_v + 2\beta\textbf{I})x + (-2\sum_{v=1}^m{z_v^TP_v})x \\ s.t. \quad yw^Tx \geq c \end{gathered} \end{equation} where $c=1-(x^{*T}w^*+b^*)-yb$. Note that Equ. (\ref{equ14}) is the classic quadratic programming (QP) problem: \begin{equation} \label{equ15} \begin{gathered} \min_{x}\frac{1}{2}x^TUx + V^Tx \\ s.t. \quad Ax \leq g \end{gathered} \end{equation} where: \begin{equation} \label{equ16} \begin{gathered} U = 2\sum_{v=1}^mP_v^TP_v + 2\beta\textbf{I}, \quad V = -2\sum_{v=1}^m{P_v^Tz_v} \\ A = -yw^T, \quad g = -c \end{gathered} \end{equation} Thus, Equ. (\ref{equ15}) can be solved by using the QP solver at hand. \textbf{Second, we update $x_i^*$ by fixing the other parameters}, and thus the problem is reduced to the following formulation: \begin{equation} \label{equ17} \begin{gathered} \min_{x_i^*}\mathcal{L} = \min_{x_i^*}\sum_{v=1}^m\|z_v^{*(i)}-P_v^*x_i^*\|^2 + \beta^*\|x_i^*\|^2 + Cw^{*T}x_i^* \\ s.t. \quad x_i^{*T}w^* \geq c \\ x_i^{*T}w^* \geq -b^* \end{gathered} \end{equation} where $c=1-y_i(w^Tx_i+b) - b^*$. For the sake of simplicity, the objective function in Equ. (\ref{equ17}) can be expressed as: \begin{equation} \label{equ18} \begin{aligned} \min_{x^*}\mathcal{L} & = \min_{x^*}\sum_{v=1}^m\|z_v^*-P_v^*x^*\|^2 + \beta^*\|x^*\|^2 + Cw^{*T}x^* \\ & = \min_{x^*}\sum_{v=1}^m({x^*}^T{P_v^*}^TP_v^*x^* - 2{z_v^*}^TP_v^*x^*) + \beta^*{{x^*}^Tx^*} + C{w^*}^Tx^* \\ & = \min_{x^*}(\sum_{v=1}^m{x^*}^T{P_v^*}^TP_v^*x^* + \beta^*{{x^*}^Tx^*}) - \sum_{v=1}^m2{z_v^*}^TP_v^*x^* + C{w^*}^Tx^* \\ & = \min_{x^*}{x^*}^T(\sum_{v=1}^m{P_v^*}^TP_v^* + \beta^*\textbf{I})x^* + (-\sum_{v=1}^m2{z_v^*}^TP_v^*x^* + C{w^*}^Tx^*) \end{aligned} \end{equation} Thus, the problem can be formulated as: \begin{equation} \label{equ19} \begin{gathered} \min_{x^*}{x^*}^T(\sum_{v=1}^m{P_v^*}^TP_v^* + \beta^*\textbf{I})x^* + (-\sum_{v=1}^m2{z_v^*}^TP_v^* + C{w^*}^T)x^* \\ s.t. \quad {w^*}^Tx^* \geq c, \quad {w^*}^Tx^* \geq -b^* \end{gathered} \end{equation} Apparently, the problem in Equ. (\ref{equ19}) can be also interpreted as a QP problem formulated as \begin{equation} \label{equ20} \begin{gathered} \min_{x^*}\frac{1}{2}{x^*}^TUx^* + V^Tx^* \\ s.t. \quad Ax^* \leq g \end{gathered} \end{equation} where: \begin{equation} \label{equ21} \begin{gathered} U = 2\sum_{v=1}^m{P_v^*}^TP_v^* + 2\beta^*\textbf{I}, \quad V = Cw^* - \sum_{v=1}^m{2{P_v^*}^Tz_v^*} \\ A = -{w^*}^T, \quad g = -max(c, -b^*) \end{gathered} \end{equation} Analogously, the problem in Equ. (\ref{equ20}) can also be solved by an off-the-shelf QP solver. \textbf{Third, we update $P_v$ by fixing the other parameters}, and thus the problem is reduced to the following formulation: \begin{equation} \label{equ22} \min_{P_v}\mathcal{L} = \min_{P_v}\sum_{v=1}^m\|Z_v-P_vX\|_F^2 + \lambda\|P_v\|_F^2 \\ \end{equation} Equ. (\ref{equ21}) is a unconstrained ridge regression optimization, which could be transformed into: \begin{equation} \label{equ23} \begin{aligned} \min_{P_v}\mathcal{L} & = \min_{P_v}\sum_{v=1}^m\|Z_v-P_vX\|_F^2 + \lambda\|P_v\|_F^2 \\ & = \min_{P_v}\|Z_v-P_vX\|_F^2 + \lambda\|P_v\|_F^2 \\ & = \min_{P_v}tr(Z_v-P_vX)^T(Z_v-P_vX) + \lambda tr(P_v^TP_v) \\ & = \min_{P_v}tr(-X^TP_v^TZ_v - Z_v^TP_vX + X^TP_v^TP_vX) + \lambda tr(P_v^TP_v) \end{aligned} \end{equation} Thus, we take the derivatives of $\mathcal{L}$ w.r.t. $P_v$ and have: \begin{equation} \label{equ24} \begin{aligned} \nabla_{P_v}\mathcal{L} & = -\nabla_{P_v}tr{X^TP_v^TZ_v} - \nabla_{P_v}tr{Z_v^TP_vX} + \nabla_{P_v}tr{X^TP_v^TP_vX} + \lambda\nabla_{P_v}tr(P_v^TP_v) \\ & = -(XZ_v^T)^T - (XZ_v^T)^T + 2P_vXX^T + 2\lambda P_v\\ & = -2Z_vX^T + 2P_vXX^T + 2\lambda P_v \\ & = 0 \end{aligned} \end{equation} Therefore, we obtain the close-form of $P_v$ as follows: \begin{equation} \label{equ25} P_v = Z_vX^T(XX^T + \lambda\textbf{I})^{-1} \end{equation} \textbf{Next, we update $P_v^*$ by fixing the other parameters}, and thus the problem is reduced to the following formulation: \begin{equation} \label{equ26} \min_{P_v^*}\mathcal{L} = \min_{P_v^*}\sum_{v=1}^m\|Z_v^*-P_v^*X^*\|_F^2 + \lambda^*\|P_v^*\|_F^2 \\ \end{equation} Resembling solving for $P_v$, we derive the close-form solution of $P_v^*$ as follows: \begin{equation} \label{equ27} P_v^* = Z_v^*{X^*}^T(X^*{X^*}^T + \lambda^*\textbf{I})^{-1} \end{equation} \textbf{Finally, we update $w, w^*, b, b^*$ by fixing the other parameters}, and thus the problem is reduced to solving for a classic SVM+ problem: \begin{equation} \label{equ28} \begin{gathered} \min_{w, w^*, b, b^*}\mathcal{L} = \min_{w, w^*, b, b^*} \frac{1}{2}(\|w\|^2+\gamma\|w^*\|^2) + C\sum_{i=1}^n{w^*}^Tx_i^* + b^* \\ s.t.\quad y_i(w^Tx_i + b) \geq 1-(w^{*T}x_i^* + b^*), \quad w^{*T}x_i^* + b^* \geq 0,\quad \forall i=1,...,n \end{gathered} \end{equation} which can be solved by a fast algorithm in \cite{WenCVPR16}. We iteratively alternate between the five steps until the objective function (\ref{equ8}) converges with global optimal solutions. The corresponding training process is summarized in Algorithm \ref{alg1}. \begin{algorithm}[t] \caption{Summary of our optimization procedure} \label{alg1} \begin{algorithmic}[1] \REQUIRE\ $ \{z_v^{(i)}\}_{v=1}^m $, $ \{z_v^{*(i)}\}_{v=1}^m $, $ y_i $, $ \lambda $, $ \lambda^* $, $ \beta $, $ \beta^* $, $ \gamma $, $ C $, $ \quad \forall i=1,...,n $ \ENSURE\ $ \{x_i\}_{i=1}^n $, $ \{x_i^*\}_{i=1}^n $, $ \{P_v\}_{v=1}^m $, $ \{P_v^*\}_{v=1}^m $, $ w $, $ w^* $ \STATE Initialize: $ \{x_i^*\}_{i=1}^n $, $ \{P_v\}_{v=1}^m $, $ \{P_v^*\}_{v=1}^m $, $ w $, $ w^* $, $ b $, $ b^* $ \STATE \textbf{Repeat} \STATE $\boldsymbol{\{x_i\}_{i=1}^n}$ \textbf{update} through solving Equ. (\ref{equ15}) by QP algorithm \STATE $\boldsymbol{\{x_i^*\}_{i=1}^n}$ \textbf{update} through solving Equ. (\ref{equ20}) by QP algorithm \STATE $\boldsymbol{\{P_v\}_{v=1}^m}$ \textbf{update} by Equ. (\ref{equ25}) \STATE $\boldsymbol{\{P_v^*\}_{v=1}^m}$ \textbf{update} by Equ. (\ref{equ27}) \STATE $\boldsymbol{w,w^*,b,b^*}$ \textbf{update} by SVM+ algorithm \cite{WenCVPR16} \STATE \textbf{Until} Convergence \end{algorithmic} \end{algorithm} In order to generate the latent representations $ \tilde{X} $ for on-the-fly re-ranking, we take the derivative of Equ. (\ref{equ11}) w.r.t. $ \tilde{X} $ and have: \begin{equation} \label{equ29} \begin{aligned} \nabla_{\tilde{X}}\mathcal{L}(\tilde{X}) & = \sum_{v=1}^m\nabla_{\tilde{X}}\|\tilde{Z}_v-\hat{P}_v\tilde{X}\|_F^2 + \beta\nabla_{\tilde{X}}\|\tilde{X}\|_F^2 \\ & = \sum_{v=1}^m\nabla_{\tilde{X}}tr(\tilde{Z}_v^T-\tilde{X}^T\hat{P}_v^T)(\tilde{Z}_v-\hat{P}_v\tilde{X}) + \beta\nabla_{\tilde{X}}tr(\tilde{X}^T\tilde{X}) \\ & = \sum_{v=1}^m\nabla_{\tilde{X}}tr(-\tilde{X}^T\hat{P}_v^T\tilde{Z}_v - \tilde{Z}_v^T\hat{P}_v\tilde{X} + \tilde{X}^T\hat{P}_v^T\hat{P}_v\tilde{X}) + \beta\nabla_{\tilde{X}}tr(\tilde{X}^T\tilde{X}) \\ & = \sum_{v=1}^m(-2\hat{P}_v^T\tilde{Z}_v + 2\hat{P}_v^T\hat{P}_v\tilde{X}) + 2\beta \tilde{X} \\ & = 0 \\ \end{aligned} \end{equation} Thus, we have the close-form solution of $ \tilde{X} $ as follows: \begin{equation} \label{equ30} \tilde{X} = (\sum_{v=1}^m\hat{P}_v^T\hat{P}_v + \beta\textbf{I})^{-1}\sum_{v=1}^m\hat{P}_v^T\tilde{Z}_v \end{equation} \section{Analysis of the computational complexity} \label{section6} We now discuss the computational complexity of our DMVPIR algorithm for separate phases. In the model training, the overall computational overhead consists of three main parts, i.e., solving for $ x $ and $ x^* $ in Equ. (\ref{equ15}) and (\ref{equ20}), computing $ P_v $ and $ P_v^* $ in Equ. (\ref{equ25}) and (\ref{equ27}) as well as updating $ w,w^*,b,b^* $ with SVM+ algorithm. Since both $ x $ and $ x^* $ are estimated by an off-the-shelf QP solver in practice, the corresponding time complexity can be computed as $ O(d^3) $, and thus the total cost for the whole training set in dual spaces accounts for $ 2n \cdot O(d^3) $. In Equ. (\ref{equ25}) and (\ref{equ27}), computing $ P_v $ and $ P_v^* $ requires $ O(D_v \cdot n \cdot d)+O(d^2 \cdot n)+O(d^3)+ O(D_v \cdot d^2)$ time complexity. It can be approximated by $ O(D_v \cdot n \cdot d)+O(D_v \cdot d^2 ) $, since $ D_v \gg d $ in our case. Thus, updating all the view-specific generation matrices in dual spaces takes $ 2\sum_{v=1}^mO(D_v \cdot n \cdot d)+O(D_v \cdot d^2 ) $. As for the $ w,w^*,b,b^* $ update, we directly use the fast linear SVM+ algorithm implemented in \cite{WenCVPR16}, and the time complexity is roughly $ O(2d)+O(d) $\cite{WenCVPR16}. Therefore, the total cost amounts to $ 2n \cdot O(d^3)+2\sum_{v=1}^mO(D_v \cdot n \cdot d)+O(D_v \cdot d^2)+O(2d)+O(d)$, which is thus reduced to $ 2n \cdot O(d^3)+2\sum_{v=1}^mO(D_v \cdot n \cdot d)+O(D_v \cdot d^2) $ approximately. During the re-ranking stage, the computational cost comprises the multi-view embedding for generating the latent representations shown in Equ. (\ref{equ30}) and the subsequent cosine similarity. The former is calculated as $ \sum_{v=1}^mO(d^2 \cdot D_v)+O(d^3)+\sum_{v=1}^mO(d \cdot D_v \cdot n)+O(d^2 \cdot n ) $ which can be approximated by $ \sum_{v=1}^mO(d^2 \cdot D_v)+O(d \cdot D_v \cdot n) $, while the latter accounts for $ O(n \cdot d) $ time complexity for efficient similarity measure. \section{Experiments} \label{section7} In this section, we will evaluate our DMVPIR method for image re-ranking. First, we will introduce the public benchmark datasets as well as the experimental setup and the performance measure. Subsequently, thorough qualitative and quantitative evaluations will be carried out to demonstrate the performance of our approach. Besides, we also conduct a comparative study for showing the superiority of our method to the state-of-the-arts. \subsection{benchmark datasets and performance measure} We evaluate our DMVPIR re-ranking approach on two public datasets, Oxford5k \cite{PhilbinCVPR07} and Paris6k \cite{PhilbinCVPR08}, both of which are usually used as evaluation benchmarks for instance-level image retrieval. The two datasets include 5,063 and 6,392 images of 11 famous landmarks in Oxford and Paris respectively, and each landmark is represented by five query instances, which results in a total of 55 query groups used for querying the whole dataset. All the images in the dataset fall into four groups according to the query-specific relevance. Average Precision (AP) score is computed as the evaluation protocol for a single query, and thus mean Average Precision (mAP) is obtained by averaging all the AP scores for the overall performance measure. Besides, we also adopt the Normalized Discounted Cumulative Gain (NDCG) for evaluation \cite{JarvelinTOIS02}. The NDCG score at position $ P $ for a specific query can be computed as: \begin{equation} NDCG@P = Z_P\sum_{i=1}^P\frac{2^{l(i)} - 1}{log(i +1)} \end{equation} where $P$ is the ranking depth, $l(i)$ denotes the relevance of the $i^{th}$ ranked image to the specific query, and $Z_P$ is the normalization constant that makes the optimal NDCG@P equal 1. Similar to mAP, mean NDCG (mNDCG) score is also used for the overall performance evaluation. \subsection{Multi-view features} \label{subsection 6.2} Following \cite{JunTIP17}, we leverage three complementary image signatures for multi-view feature representations in our approach, namely \textbf{CNN}, \textbf{TE} and \textbf{VLAD+}. CNN feature is a 4,096-dimensional vector which consists in the activations of the upper layer of the deep VGG-16 architecture pretrained for the large-scale classification task \cite{SimonyanICLR15}. Known as the best shallow image signature thus far, TE referred to as triangulation embedding is viewed as a promising alternative to FV vector \cite{JegouCVPR14}, whilst VLAD+ developed from RootSIFT descriptor is more computationally efficient for fast retrieval \cite{ArandjelovicCVPR13}. In implementation, we use the same vocabulary sizes for TE and VLAD+ as in \cite{JunTIP17}, which leads to 8,064 and 16,384-dimensional vectors for respective representations. The complementarity among the three heterogeneous features can be fully exploited for multiple feature embedding, since deep CNN feature enables high-level image description, whilst TE and VLAD+ inherit desirable invariant property from robust local descriptors. \subsection{Interactive relevance feedback with PI annotation} Analogous to \cite{JunTIP17}, given the ranking images obtained in the first place, we utilize the user relevance feedback (URF) performed once for assembling the positive query-relevant images while automatically recognize the low-scored examples as the negative distractors for training our re-ranking model. Different from the conventional URF methods \cite{TaoPAMI06,JunTIP17,WangNEUCOM14}, however, not only a click indicating the query-relevance of an image but also the object ROI capturing the user query is required for obtaining the auxiliary PI data our scenario. To be specific, we annotate the image ROIs in the positive examples while adopt the off-the-shelf saliency detector \cite{FengICCV11} for generating the PI regions in the negative images. Thus, the original set of training images alongside the corresponding supplementary PI data are delivered to the subsequent module for extracting multi-view features. Since the user interaction with PI annotation is performed on the shortlisted images relatively accounting for a small proportion of the top returned results, this practice incurs affordable overhead on the system. \subsection{Model selection} In DMVPIR, six hyperparamters in Equ. (\ref{equ8}) need to be carefully tuned, i.e., $ \lambda $, $ \lambda^* $, $ \beta $, $ \beta^* $, $ \gamma $, $ C $. To this end, we perform model selection on a single query, and the optimal parameters obtained accordingly are used for evaluating the other query groups on the two benchmark datasets. In implementation, we select the query ``all\_souls\_1'' for model training with varying parameters. \subsection{Experimental results} \subsubsection{Comparison of baseline methods} In our baseline retrieval systems, a global image signature is combined with efficient cosine similarity for generating a set of ranking images in the first place. In our case, we evaluate three image representations introduced in section \ref{subsection 6.2}, which leads to different baseline methods respectively denoted as \textbf{TE\_cos}, \textbf{CNN\_cos} and \textbf{VLAD+\_cos}. Table \ref{tab2} gives the performance of different baselines. It is clearly shown that TE\_cos consistently outperforms the other two approaches by achieving highest mAP at 61.76\% and 62.04\% on the respective datasets as well as higher mNDCG scores. Surprisingly, CNN\_cos exhibits the suboptimal performance inferior to TE\_cos, which can be attributed to the pre-trained deep model with insufficient descriptive power. Although fine-tuning allows further improving the retrieval performance of CNN\_cos, we still use the TE\_cos as the baseline for the subsequent re-ranking, since in our work we only focus on the image re-ranking which operates independently of the baseline method. \begin{table} \addtolength{\tabcolsep}{-0.1cm} \renewcommand{\arraystretch}{1.15} \centering \caption{Comparison of the three baseline methods on Oxford5k and Paris6k (\%).} \vspace{.1cm} \label{tab2} \begin{tabular}{|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{\shortstack{Performance\\Measure}} & \multicolumn{3}{|c|}{Paris6k} & \multicolumn{3}{|c|}{Oxford5k} \\ \cline{2-7} & TE\_cos & CNN\_cos & VLAD+\_cos & TE\_cos & CNN\_cos & VLAD+\_cos \\ \hline mAP & \textbf{61.76} & 58.75 & 49.15 & \textbf{62.04} & 45.05 & 46.98 \\ \hline mNDCG@50 & \textbf{87.70} & 83.99 & 80.02 & \textbf{70.27} & 59.88 & 59.71 \\ \hline mNDCG@100 & \textbf{77.96} & 74.23 & 67.50 & \textbf{70.16} & 60.49 & 59.47 \\ \hline \end{tabular} \end{table} \subsubsection{The performance of our DMVPIR method} We impose our DMVPIR method on the baseline TE\_cos for accurate re-ranking. Fig. \ref{fig3} presents the comparison of the baseline and our re-ranking approach in terms of AP score. It is observed that DMVPIR provides significant performance gains ranging from 1.9\% on ``invalides'' to 56\% on ``bodleian'' for different query groups. In particular, DMVPIR reports respective mAP scores at \textbf{81.51\%} and \textbf{77.83\%} on two datasets and outperforms the baseline system by approximately \textbf{20\%} and \textbf{16\%}, which substantially suggests the beneficial effect of the proposed re-ranking approach. The only exceptions come from the queries ``notredame'' and ``sacrecoeur'' when slight performance drop occurs. This implies the generalization capability of DMVPIR is somewhat prone to the high nonlinearity of our model and the redundancy occasionally present in the training examples. \begin{figure} \centering \includegraphics[width=1.0\linewidth]{fig3} \caption{Comparison of the baseline and our re-ranking method on Oxford5k (left) and Paris6k (right) in terms of AP score.} \label{fig3} \end{figure} In addition, we compare the baseline and DMVPIR methods by computing NDCG scores. As shown in Table \ref{tab3} and \ref{tab4}, DMVPIR dramatically boosts the baseline results from 70.27\% to \textbf{79.30\%} on Oxford5k while the performance gains also reach 7\% on Paris 6k in terms of mNDCG@50. Similar trend can also be observed for mNDCG@100 score on both datasets, which demonstrates our re-ranking method considerably benefits the performance improvement. \begin{table} \addtolength{\tabcolsep}{0.0cm} \renewcommand{\arraystretch}{1.15} \centering \caption{Comparison of baseline and DMVPIR with NDCG scores on Oxford5k.} \label{tab3} \vspace{+.1cm} \begin{tabular}{|c|c|c|c|c|} \hline \multirow{2}{*}{Query} & \multicolumn{2}{|c|}{\textbf{Baseline}} & \multicolumn{2}{|c|}{\textbf{Re-ranking}} \\ \cline{2-5} & NDCG@50 & NDCG@100 & NDCG@50 & NDCG@100 \\ \hline \hline all\_souls & 0.7206 & 0.6683 & 0.7261 & 0.6843 \\ \hline ashmolean & 0.6617 & 0.6825 & 0.7858 & 0.7954 \\ \hline balliol & 0.6561 & 0.6860 & 0.7220 & 0.7305 \\ \hline bodleian & 0.5847 & 0.6297 & 0.9030 & 0.9133 \\ \hline christ\_church & 0.6259 & 0.6033 & 0.8136 & 0.7482 \\ \hline cornmarket & 0.8137 & 0.8137 & 0.9188 & 0.9252 \\ \hline hertford & 0.7462 & 0.7740 & 0.8318 & 0.8288 \\ \hline keble & 0.9486 & 0.9511 & 0.8775 & 0.8775 \\ \hline magdalen & 0.2492 & 0.2385 & 0.4471 & 0.4148 \\ \hline pitt\_rivers & 0.8830 & 0.8902 & 0.9161 & 0.9161 \\ \hline radcliffe\_camera & 0.8400 & 0.7803 & 0.7806 & 0.7656 \\ \hline mean & 0.7027 & 0.7016 & \textbf{0.7930} & \textbf{0.7818} \\ \hline \end{tabular} \end{table} \begin{table} \addtolength{\tabcolsep}{0.0cm} \renewcommand{\arraystretch}{1.15} \centering \caption{Comparison of baseline and DMVPIR with NDCG scores on Paris6k.} \label{tab4} \vspace{+.1cm} \begin{tabular}{|c|c|c|c|c|} \hline \multirow{2}{*}{Query} & \multicolumn{2}{|c|}{\textbf{Baseline}} & \multicolumn{2}{|c|}{\textbf{Re-ranking}} \\ \cline{2-5} & NDCG@50 & NDCG@100 & NDCG@50 & NDCG@100 \\ \hline \hline defense & 0.7482 & 0.5309 & 0.9592 & 0.7936 \\ \hline eiffel & 0.8872 & 0.8002 & 0.9260 & 0.8643 \\ \hline invalides & 0.9852 & 0.9378 & 0.9884 & 0.9473 \\ \hline louvre & 0.8224 & 0.7279 & 0.8674 & 0.7566 \\ \hline moulinrouge & 0.7690 & 0.6163 & 0.9882 & 0.9627 \\ \hline museedorsay & 0.6485 & 0.5262 & 0.8407 & 0.6952 \\ \hline notredame & 0.9910 & 0.8956 & 0.9860 & 0.8883 \\ \hline pantheon & 0.9941 & 0.9355 & 0.9982 & 0.9559 \\ \hline pompidou & 0.8641 & 0.8234 & 0.9008 & 0.8874 \\ \hline sacrecoeur & 0.9647 & 0.9084 & 0.9780 & 0.9257 \\ \hline triomphe & 0.9727 & 0.8734 & 0.9907 & 0.9745 \\ \hline mean & 0.8770 & 0.7796 & \textbf{0.9476} & \textbf{0.8774} \\ \hline \end{tabular} \end{table} \subsubsection{The comparative studies} In comparative studies, we compare our approach DMVPIR with other multi-view re-ranking methods as follows: 1) DMINTIR. We directly reproduce the algorithm in \cite{JunTIP17} with the analogous parameter setting adopted in our method. 2) DMINTIR-PI. For this approach, we leverage the local multi-view PI features for learning the separating hyperplane $w$ without taking into account the original multiple global feature representations. The online re-ranking is achieved by computing and sorting the distances from the global multi-view projections of the target images to the hyperplane $w$. 3) DQE by Concatenating Averaged Reduced-size Multi-View features for Re-ranking (DQE-CAR-MVR). We first impose PCA on the multi-view features for dimension reduction in both original and privileged space. Thus, we fuse the compressed view-specific features in the two spaces by average pooling and concatenate the pooled features of different views for the holistic representation. Subsequently, analogous to \cite{ArandjelovicCVPR12}, we train a linear SVM model on the resulting representation and compute the signed distance from the separating hyperplane for re-ranking. Note that the reduced feature dimensionality in this method is also set to be 128, which is consistent with the setting in our approach. 4) DQE by Concatenating Averaged Full-size Multi-View features for Re-ranking (DQE-CAF-MVR). This method is essentially the same with DQE-CAR-MVR except the original dimensionalities of the multi-view features are maintained without dimension reduction. 5) DQE by Averaging Reduced-size Multi-view features for Re-ranking (DQE-AR-MVR). Different from DQE-CAR-MVP and DQE-CAF-MVP, this approach directly utilizes average pooling for fusing all the multi-view features with reduced size in both spaces, which leads to the final image representation delivered to the linear SVM model. The reduced feature size is also set to be 128 for the sake of consistency. 6) Late Fusion on DQE with Averaged Reduced-size Multi-view features for Re-ranking (LFDQE-AR-MVR). In this method, the size of the multi-view features in dual spaces are firstly reduced by PCA and view-specific average pooling is also performed for generating fused representation similar to DQE-CAR-MVR. Then, we derive multiple DQE models from respective fused features and combine the output for the relevance score in re-ranking. 7) Late Fusion on DQE with Averaged Full-size Multi-view features for Re-ranking (LFDQE-AF-MVR). Different from LFDQE-AR-MVR, this approach adopts the full size of the multiple features without dimension reduction for respective DQE model training. To sum up, both DMINTIR and DMINTIR-PI simply take into account the visual information in a single space, whilst our approach along with the other competing methods combine the visual contents from both spaces. In particular, DQE-CAR-MVR, DQE-CAF-MVR as well as DQE-AR-MVR can be viewed as early fusion multi-view re-ranking strategies, whilst LFDQE-AR-MVR and LFDQE-AF-MVR fall into the category of late fusion techniques. Table. \ref{tab5} and \ref{tab6} present the performance of different multi-view re-ranking methods on the two benchmarks. Overall, our scheme demonstrates the unrivalled performance superior to the other competing approaches. In particular, the proposed method performs better than both DMINTIR and DMINTIR-PI, which implies the considerable benefit in combining the original visual clues with supplementary PI data for re-ranking. More specifically, DMVPIR reports higher mAP scores surpassing DMINTIR by 1.2\% and 0.7\% respectively on two datasets. Since there exists the asymmetry between the training and the testing information in DMINTIR-PI, DMVPIR exhibits more dramatic performance advantage against DMINTIR-PI with significant improvements over 15\%. In addition, our method also beats the other fusion-based re-ranking method by achieving substantial performance gains. This sufficiently suggests our subspace-based scheme allows learning the discriminative representation from heterogeneous multi-view features while works better then the methods which perform straightforward fusion strategies. Note that our scheme does not achieve the best mNDCG results on Oxford5k. We argue this results from the evaluation mechanism of NDCG where the junk images with certain ambiguity are also taken into consideration in computing the query-relevance, whereas they are discarded in evaluating mAP score. In this sense, our scheme enables having clear groundtruth images returned at higher ranks than those ambiguous examples. \begin{table} \addtolength{\tabcolsep}{0.1cm} \renewcommand{\arraystretch}{1.2} \centering \caption{Comparison of different classification-based multi-view re-ranking methods on Oxford5k (\%).} \vspace{.1cm} \label{tab5} \begin{tabular}{|c|c|c|c|} \hline Methods & mAP & mNDCG@50 & mNDCG@100 \\ \hline \hline DMINTIR & 80.34 & \textbf{82.82} & \textbf{81.13} \\ \hline DMINTIR-PI & 61.56 & 66.83 & 66.72 \\ \hline DQE-CAR-MVR & 77.39 & 79.23 & 77.91 \\ \hline DQE-CAF-MVR & 78.72 & 79.72 & 78.01 \\ \hline DQE-AR-MVR & 40.37 & 49.47 & 49.36 \\ \hline LFDQE-AR-MVR & 74.42 & 77.43 & 75.80 \\ \hline LFDQE-AF-MVR & 79.48 & 80.89 & 78.89 \\ \hline \hline Ours & \textbf{81.51} & 79.30 & 78.18\\ \hline \end{tabular} \end{table} \begin{table} \addtolength{\tabcolsep}{0.1cm} \renewcommand{\arraystretch}{1.2} \centering \caption{Comparison of different classification-based multi-view re-ranking methods on Paris6k (\%).} \vspace{.1cm} \label{tab6} \begin{tabular}{|c|c|c|c|} \hline Methods & mAP & mNDCG@50 & mNDCG@100 \\ \hline \hline DMINTIR & 77.09 & 94.64 & 87.28 \\ \hline DMINTIR-PI & 61.91 & 85.88 & 76.22 \\ \hline DQE-CAR-MVR & 72.36 & 92.22 & 83.85 \\ \hline DQE-CAF-MVR & 74.90 & 93.85 & 85.13 \\ \hline DQE-AR-MVR & 46.89 & 63.70 & 58.04 \\ \hline LFDQE-AR-MVR & 64.54 & 83.00 & 75.69 \\ \hline LFDQE-AF-MVR & 74.57 & 93.80 & 85.23 \\ \hline \hline Ours & \textbf{77.83} & \textbf{94.76} & \textbf{87.74} \\ \hline \end{tabular} \end{table} Besides, we also compare the proposed DMVPIR method with the state-of-the-arts in recent years. As illustrated in Table \ref{tab7}, DMVPIR achieves performance on par with both traditional BoW-based and recent CNN-based re-ranking approaches, which substantially suggests the promise of the proposed framework. In particular, compared with CNN-based methods, our approach significantly surpasses \cite{KalantidisECCVW16} on Oxford5k by over 14\% and reports comparable result on Paris6k with the same feature size. Additionally, DMVPIR consistently beats Faster R-CNN+CA-SR+QE which also makes use of the deep model pre-trained with VGG16 architecture \cite{SimonyanICLR15} while enjoys a more compact representation. Although fine-tuning the VGG16 network brings further performance gains, DMVPIR still achieves higher re-ranking accuracy than Faster R-CNN+CS-SR+QE on Oxford5k and rivals the performance on Paris6k. \begin{threeparttable} \addtolength{\tabcolsep}{0.3cm} \renewcommand{\arraystretch}{1.2} \centering \caption{Comparison of our approach and the state-of-the-art re-ranking methods on two datasets(mAP). $ d $ and $ K $ refers to the feature dimensionality and the vocabulary size respectively.} \label{tab7} \vspace{.1cm} \begin{tabular}{|c|c|c|c|} \hline BoW-based Methods & $ K $ & Oxford5k & Paris6k \\ \hline Recoprocal NN \cite{QinCVPR11} & 500k & 81.4 & 80.3 \\ \hline Database Saliency \cite{GaoTMM15} & 1024 & 0.835 & 0.814 \\ \hline HE+MA+PGM \cite{LiCVPR15} & 100k & 0.737 & - \\ \hline LS+R+LQE \cite{MohedanoICMR16} & 25k & 0.788 & 0.848 \\ \hline \hline CNN-based Methods & $ d $ & Oxford5k & Paris6k \\ \hline \multirow{3}{*}{CroW + QE \cite{KalantidisECCVW16}} & 128 & 0.670 & 0.793 \\ \cline{2-4} & 256 & 0.718 & 0.815 \\ \cline{2-4} & 512 & 0.749 & 0.848 \\ \hline R-MAC+AML+QE \cite{ToliasICLR16} & 512 & 0.773 & 0.865 \\ \hline Faster R-CNN+CA-SR+QE \cite{SalvadorCVPRW16} & 512 & 0.647 & 0.732 \\ \hline \multirow{2}{*}{Faster R-CNN+CS-SR+QE$ ^\star $\cite{SalvadorCVPRW16}} & 512 & 0.678 & 0.784 \\ \cline{2-4} & 512 & 0.786 & 0.842 \\ \hline \hline Ours & 128 & \textbf{0.8151} & \textbf{0.7783} \\ \hline \end{tabular} \begin{tablenotes} \small \item $ ^{\star} $achieved with two different fine-tuning strategies \end{tablenotes} \vspace{.3cm} \end{threeparttable} In addition to the above quantitative evaluations, we also present the qualitative results of different methods as shown in Fig. \ref{fig4}. It is observed that our scheme not only significantly improves the retrieval accuracy of the baseline but also demonstrates better performance than the-state-of-the-art DMINTIR method. Specifically, with the help of PI learning, our approach enables returning more top ranked ground-truth images even when the query-related instances only account for small regions with the surrounding complex visual background or are partially occluded by other objects (e.g., tree, person, lamp post) in the image. This sufficiently suggests incorporating PI learning in re-ranking contributes to further improving the retrieval performance. \begin{figure} \centering \includegraphics[width=1.0\linewidth]{fig4} \caption{Comparison of qualitative retrieval results achieved by baseline (the first row), DMINTIR \cite{JunTIP17} (the second row) and our scheme (the last row). Given an image with the annotated query region outlined by the red dashed box shown on the left, the top returned results are displayed accordingly on the right. Note that the junk images and the false alarms are highlighted in green and red boxes, respectively. It is observed that our approach significantly improves the baseline result and exhibits performance advantage against DMINTIR by returning more top ranked query-related images. } \label{fig4} \end{figure} \subsubsection{Quantitative computational cost} We quantitatively evaluate the time cost of the proposed DMVPIR algorithm in separate steps, i.e., the model training and on-the-fly re-ranking. As illustrated in table \ref{tab8}, training query-specific model costs approximately \textbf{80s} while fast on-the-fly re-ranking can be achieved with not more than \textbf{0.2s}, which indicates that our scheme lends itself to the real-time scenarios. In practice, all the experiments are conducted using Matlab on a machine with 3.20GHz Intel Core i5-6500 CPU and 8GB memory. \begin{table} \addtolength{\tabcolsep}{0.2cm} \renewcommand{\arraystretch}{1.2} \centering \caption{Time cost of our scheme on two datasets(s).} \label{tab8} \vspace{.1cm} \begin{tabular}{|c|c|c|} \hline Datasets & model training & re-ranking \\ \hline Oxford5k & 79.35 & 0.14 \\ \hline Paris6k & 78.66 & 0.18 \\ \hline \end{tabular} \end{table} \subsection{Parameter analysis} We now thoroughly discuss the impact of various parameters in the proposed DMVPIR framework on the re-ranking performance, including the vocabulary size $ k $ for generating the TE and VLAD+ features, the six hyperparameters to tune in Equ. (\ref{equ8}), the length of the shortlist $ K $ for user interaction and the subspace dimensionality $ d $. \subsubsection{The impact of the vocabulary size} In our method, the re-ranking performance largely depends on the multiple features including TE and VLAD+ both of which need a well-trained vocabulary. As for the TE signature, we follow the standard practice \cite{JegouCVPR14,BabenkoICCV15,TaoCVPR15} to set the vocabulary size $ k $ as 64 for generating a 8,064 dimensional feature with low frequency dimensions removed, since further increasing $ k $ yields limited boost in performance while severely compromises the computational efficiency \cite{JegouCVPR14}. In terms of VLAD+, we use the vocabulary of the same size as in \cite{JunTIP17}. In order to explore the impact of $ k $ on the performance, we further increase $ k $ to 256 and 1024 respectively. Consistent with \cite{JunTIP17}, the resulting performance gains consist in less than 1\% and 1.5\% at the cost of considerable growth in memory footprint and computational overhead. Therefore, we use $ k=256 $ for VLAD+ in all tests for the tradeoff between accuracy and efficiency. \subsubsection{The impact of tradeoff hyperparameters} For model selection, we evaluate different combinations of hyperparameters $ \{\lambda,\lambda^*,\beta,\beta^*,\gamma, C\} $ on a single query group ``all\_souls\_1'' to obtain the optimal ones. As illustrated in Fig. \ref{fig5}, the highest AP score is achieved at 90.42\% when the hyperparameters take the values of $ \{0.6,0.6,0.1,0.1,1.0,1.3\} $. Thus, we use the set $ \{0.6,0.6,0.1,0.1,1.0,1.3\} $ for evaluations on both datasets. Overall, the performance with different hyperparameter combinations fluctuates slightly from 88.72\% to 90.42\%, which, to some extent, implies the desirable property of DMVPIR in hyperparameter insensitivity. This can be explained by the fact that introducing PI into our framework brings the performance boost varying within a certain range dependent on the tradeoff between respective regularization terms. \begin{figure} \centering \includegraphics[width=1.0\linewidth]{fig5} \caption{The parameter analysis on query group ``all\_souls\_1''.} \label{fig5} \end{figure} \subsubsection{The influence of the user interaction} Analogous to \cite{JunTIP17}, user interaction is involved in training DMVPIR model for obtaining the query-relevant positive images with annotated PI regions from the top returned shortlist. Thus, it is essential to explore the effect of the shortlist size $ K $ on the re-ranking performance. Fig. \ref{fig6} gives the DMVPIR performance with varying $ K $ on the query ``all\_souls''. It is shown that the re-ranking accuracy improves with an increase in $ K $, yet the growth declines, which implies further increasing $ K $ leads to limited performance improvements at the cost of more user interaction and human workload. In practise, we do not take into account the case when $ K $ takes the value greater than 50, since not only a user click indicating the query-relevance but also annotating the PI region is required in our case. Therefore, larger $ K $ tends to incur unaffordable burden and thus adversely affect the efficiency of the whole system. In implementation, we assume $ K=40 $ is a reasonable choice with desirable compromise between accuracy and efficiency. Since the images with low ranks are recognized as the negative training data without using any user interaction, the size of the negative set is empirically set to be 100. Thus, we use this parameter setting (40/100) for all query groups. \begin{figure} \centering \includegraphics[width=1.0\textwidth]{fig6} \caption{The effect of the user interaction on the query ``all\_souls''.} \label{fig6} \end{figure} \subsubsection{The effect of the subspace dimension} Fig. \ref{fig7} illustrates the performance of our approach with different low-dimensional subspaces on query ``all\_souls''. Overall, the retrieval performance grows with an increase in $ d $ when the highest mAP score is reported at 72.09\% with $ d=128 $. Besides, a slight performance drop is observed when the subspace dimension exceeds 128. Interestingly, increasing the subspace dimension does not bring further performance boost, which sufficiently implies the feature redundancy present in the original multi-view spaces. As a result, we use the 128-dimensional subspace in our scenario. \begin{figure} \centering \includegraphics[width=1.0\textwidth]{fig7} \caption{The performance of DMVPIR with different subspace dimensions $ d $.} \label{fig7} \end{figure} \section{Conclusion and future work} \label{section8} In this paper, we propose a discriminative multi-view PI-aware image re-ranking method termed as DMINTIR. Different from the conventional multi-view re-ranking approaches, we take into consideration the supplementary PI cues, since they are capable of characterising the dominant information in the image that captures the query intention. In model training, the auxiliary PI data and the original training data are simultaneously delivered to the unified multi-view embedding framework for producing a PI-aware subspace with sufficient discriminating power. For accurate re-ranking, the PI-aware latent representations can be obtained by projecting the multi-view features of the target images onto the underlying space for efficient similarity measure. Extensive evaluations on the public datasets for landmark retrieval task demonstrate our scheme outperforms the classical multi-view re-ranking strategies and achieves the comparable results on par with the state-of-the-arts. Despite effective, DMINTIR somewhat relies on the user interaction for PI annotation. In the future, we will further study the generalization capability of the re-ranking model when the PI cues are limited. Besides, improving the efficiency and the scalability of our algorithm is another line of research in our future work.
\section{Introduction}\label{intro} Molecular communication is a novel paradigm allowing information exchange between biological nanomachines (bio-nanomachines) over short ranges, within an aqueous environment \cite{Akyildiz08}. In this model, a transmitter nanomachine emits molecules, which propagate and eventually are received by a receiver nanomachine. The information is usually encoded in either the timing or the amplitude of the concentration of molecules. The reception process usually consists of a chemical reaction between those molecules (ligand) and compliant receptors present on the receiver surface. Bio-nanomachines are made of biological materials and can perform a number of simple tasks which need to be coordinated, by means of message exchange, in order to accomplish complex functions. Diffusion-based molecular communications are a special form of molecular communications \cite{Nakano12c}, very common in nature. They can be roughly classified in two categories, namely pure-diffusion and diffusion with drift. For instance, the former includes communications in the extracellular matrix of the connective tissue, whilst the latter encompasses communications in circulatory and lymphatic systems. In this paper, we consider drug delivery in pure-diffusion molecular communications. In drug delivery systems a nearly continuous flow of molecules is transmitted from the transmitter (TX) to the receiver (RX) \cite{Allen04}, in order to achieve a desired effective average drug delivery rate at a specific target. In these applications, the TX node has the role of an actuator, and the RX node is either the target or a sensor which measures and controls the delivery of drug/grow factors molecules to the surrounding cells. In this scenario, the space around the receiver could become full of drug molecules, which produce congestion. Congestion control in packet networks is a research topic that attracted researchers in the last 30 years (see, e.g., \cite{Winstein:2013:TEM:2486001.2486020,Sivaraman:2014:ESL:2619239.2626324}), since the seminal works of Van Jacobson \cite{Jacobson:1988:CAC:52324.52356} and K.K. Ramakrishnan \cite{Ramakrishnan:1990:BFS:78952.78955}. However, until now, little attention has been paid to the issue of congestion in molecular communications, beyond some initial investigations reported in \cite{nakano13,TCPm14}. Indeed, molecular communications, especially those making use of diffusion-based propagation \cite{Philibert2006}, are not only very sensitive to congestion, but also difficult to control due to the high communication latency. Thus, an early detection of congestion is necessary in order to avoid heavy receiver overload. However, beforehand, we have to give a definition of congestion in molecular communications. In molecular communications, congestion consists in the inability of receivers to capture all molecules in the receptor space. This limitation is due to the combination of two factors, which are the number of receptors present over the receiver surface and the trafficking time \cite{Lauffenburger1993}, which can be regarded as the molecule reception time. The trafficking time is defined as the time needed to make a binding between a ligand and a compliant receptor, plus the time to internalize the resulting complex, plus the time to re-expose another receptor. It can last up to tens of seconds \cite{Lauffenburger1993} and significantly affect the molecule absorption process. \textbf{Motivation}: in the bio-medical field, the receiver congestion problem is referred to as ``receptor saturation''. Building a model for receptor saturation is a very important open issue, since the lack of a general model requires executing expensive lab experiments for receptors characterization \cite{pmid21760560}. In addition, receptors saturation affects drug delivery and disease modeling \cite{pmid22830443}. However, most of research in the molecular communications either neglect the presence of individual receptors (absorbing receiver \cite{6807659}), or neglect the absorption time of molecules (absorbing receptors \cite{6967753}). A more accurate model, which partially addresses these shortcomings by modeling molecules absorption via receptors with a birth-death Markov process, is presented in \cite{Pierobon2011sept}. However, also this model has its shortcomings. In fact, it models receptors as a pool of servers, which can be invoked and used when any new molecule enters the system. Instead, receptors are isolated service elements, and this nature must be taken into account. \textbf{Main contributions}: the paper has two main contributions. The first one is the analysis of the causes of congestion at RX when a continuous flow of molecules is transmitted by the TX. The second and main contribution is a queuing model that includes these causes, which has been validated by an extensive simulation campaign. Our idea is to model each receptor on the RX surface as a pure loss queuing system. Specifically, we model each receptor by an M/M/1/1 queue, where the mean service time is the mean trafficking time. Given the unguided diffusion of the transmitted signal, we model the receiving nanomachine as a node with a large number of receiving antennas (receptors), each interfaced to a layer 2 with very high processing time (the trafficking time) without waiting room. Thus, when the concentration of molecules nearby the RX surface becomes excessive (channel congestion) and a significant part of receptors are busy, also the RX becomes congested (receiver congestion). This analogy between diffusion-based molecular communications and wireless communications is motivated also by recent papers dealing with multiple-input and multiple-output schemes \cite{mimo} and directional antennas \cite{antenna} to build directional receivers in the field of molecular communications, similarly as in the wireless world. Finally, although the queuing theory has already been used in the field of bio-physics for modeling ligand-receptor systems \cite{McQuarrie,Lauffenburger1993}, the novel contribution of this paper consists of using this theory for modeling receptor saturation from the communications perspective, thus treating it as a congestion problem in communications networks. To the best of our knowledge, this is the first paper using this approach. The paper is organized as follows. In section \ref{back}, we illustrate the related work in the field. Section \ref{model} presents the system model, including a detailed description of our proposed model, which is able to capture the root causes of congestion. Numerical results, which include the results of the simulation campaign, used to validate the proposed mechanisms, are presented in Section \ref{perf}. Finally, we draw our conclusions in Section \ref{conclu}. \section{Background and Related Works}\label{back} \subsection{Molecular communications} A complete view of a layered network architecture for molecular communications has been proposed in \cite{Vasilakos14}. Following the layered architecture of traditional communication networks, such as the Open Systems Interconnection model (OSI) and TCP/IP reference model, a formal model was developed for each layer, and potential research directions are illustrated for each of them. Other works explore issues related to the high protocol layers, including connection-oriented protocols\cite{TCPm14}, feedback-based rate control \cite{nakano13}, network coding \cite{6867315}, and security issues \cite{6879470}. However, major research efforts in molecular communications are focused on the physical layer issues of different communication media. In particular, the information capacity and the physical features (e.g., delay, signal attenuation and amplification) of molecular communications are studied by using random walk models \cite{Moore09,Nakano12d,Kuran201086}, random walk models with drift \cite{Kadloor2012,Srinivas12}, diffusion-based models \cite{Akan08,Atakan10,Mahfuz10,Pierobon10,Pierobon11c}, diffusion-reaction-based models \cite{Nakano10a,Nakano11b}, active transport models \cite{Moore09,6766704}, and a collision-based model \cite{Guney2012}. As for the diffusion-based models, which is the model considered in this work, a review of different transmission schemes is provided in \cite{ShahMohammadian2012}, where the existing schemes are classified into pulse position modulation (PPM, \cite{Kadloor2012}), concentration shift keying (CSK, \cite{Atakan2010}), and molecule shift key (MoSK), a further proposed category which combines bursts of different molecules to encode data. The possible trade-off between symbol duration and communication distance is analyzed in \cite{6612809}. Some recent papers show enhanced receivers for diffusion-based molecular communications \cite{lltatser13, Kuran201086,6612809,6906290,6881686,6782407,6708551,Yilmaz2014136}. However, these works, as most of research papers in molecular communications, do not take into account that signal reception occurs via binding between a signal molecule and the relevant surface receptor, and the number of receptors is typically assumed to be so large to cover all the receiving nanomachine surface. This is referred as the so-called \textit{absorbing} receiver model \cite{6807659}, in which a molecule, when gets in touch with the surface of the RX node, is immediately absorbed and removed from the surrounding environment. Although the absorbing receiver model is acceptable for some processes used by cells to engulf other cells, microvesicles, or proteins (phagocytosis and/or pynocytosis, \cite{pmid23584393}), most of cells communications are carried out via receptors. Thus, in some situations the assumption of using an absorbing receiver is a very rough approximation, since receptors are a finite resource and each nanomachine usually has a limited, yet large, number of receptors of a given type. A variation of the absorbing receiver model is the receiver with absorbing receptors \cite{6967753}, in which a molecule is instantaneously absorbed when it hits a compliant receptors. Again, although this model is acceptable in some specific situations (e.g. for modeling ions channels \cite{pmid19339978}), in most of cases it does not, since the stochastic nature of the ligand-receptor binding is not considered. Differently, it is contemplated in \cite{Pierobon2011sept}, and further investigated in \cite{daigle14}, which also includes the trafficking time \cite{Lauffenburger1993} in the reception process. \subsection{Drug delivery systems} One of the most popular topics in nanomedicine is the targeted drug delivery, since it could be the basis for the modern medical therapeutics. Its main goal is to provide a localized drug delivery only where medication is needed, thus avoiding to affect other healthy parts of the body. This is due to the very small size of the particles delivering medicine, which is in the order of nanometers (nanoparticles), which allow them to diffuse into the bloodstream and across the vascular and interstitial barriers. Nanoparticles present ligands on their surface, in order to improve cell targeting. In fact, these ligands increase the chances of binding to the surface receptors of target cells \cite{Elias2013194}. Many types of drug delivery, based on molecular communications, have been proposed in the technical literature, with both passive and active transport of molecules. For what concerns passive transport, the most popular approach is based on particle diffusion, with or without drift. In case the drug delivery happens via the circulatory or lymphatic system, the most appropriate model is the diffusion with drift, by also considering the effect of collisions with blood cells \cite{Tan2012,Felicetti201398}. In case the drug delivery happens outside blood vessels, e.g. in the extracellular matrix, the mere diffusion-based model is sufficiently accurate. In case of active transport, the main alternatives are those based on bacteria. In order to design an efficient and targeted drug delivery, it is essential to correctly determine the distribution of particles over time. For this reason, the relevant research has produced several approaches, from statistical models \cite{PhysRevE.86.021905} to analytical ones \cite{6548006}. In particular, drugs delivered through bloodstream can reach any part of the body, by passing through the complex network of blood vessels (Particulate Drug Delivery System, PDDS). In \cite{6548006}, further expanded in \cite{7103028,7031911}, the authors propose a specific model of the cardiovascular system, by analyzing the peculiarities of different vessels, from the smallest to the largest ones, thus obtaining a drug propagation network model which takes into account even bifurcations and junctions of vessels. The resulting model includes also the individual features of the cardiovascular system by physiological parameters, such as the heartbeat rate profile. This model could be useful to guarantee that the drug concentration does not reach toxic levels in the body and it is essential for optimizing the drug injection, by identifying the suitable injection points that guarantee the best delivery profile for maximizing the treatment benefits while minimizing the amount of drugs in the other parts of the body. To this aim, it is necessary to realize a complete control of the drug release, from the initial release, to the suitable release rate. A different and even more innovative model considers the delivery from a number of nanomachines (nano-actuator), implanted close to the target (e.g. a tumor), which bypasses the injection through the cardiovascular system, thus minimizing the side effects on the healthy parts of the body. A theoretical model on the local rate control between a nano-controller and a nano-actuator has been presented in \cite{nakano13}. However, this is a high abstraction model, which does not consider fine grained dynamics and does not explore the receiver congestion phenomenon. Subsequently, a related communication protocol, inspired by the TCP congestion control, has been proposed in \cite{TCPm14}. This protocol can control the drug release process by using feedback messages. A challenging aspect of the protocol operation is the usage of feedback messages, which makes the protocol mostly suitable for environments without drift. Drug delivery systems lay their foundations on the interactions of drug molecules with the receptors at target cells \cite{Colquhoun2006149,Kenakin2004186,pmid16402126}. Two opposite main theories exist, namely the occupancy theory \cite{clark1933} and the rate theory \cite{paton1961}. The former assumes that the drug effects are maximized when all receptors at the target are occupied by the drug, whereas the rate theory is developed on the assumption that the excitation of a stimulant drug is proportional to the rate of the drug-receptor combination, rather than to the proportion of receptors occupied by the drug. However, behavior of drugs can be quite different. For instance, it is not always necessary to reach an occupancy of 100\% of receptors to produce a full response on the target cell \cite{Lambert01122004}. In addition, it was found that a good model for describing the effects of the drug-receptor interaction depends on the type of drug \cite{O'Brien1987327}. In any case, our proposed receiver model can be used for analyzing both of them. \section{The System Model}\label{model} The considered drug delivery scenario consists in two fixed bio-nanomachines, staying at a distance $d$ between their centers, as depicted in Fig. \ref{layout}. One of them is the transmitting node and the other is the receiver. The communication happens by means of signal molecules released by TX, which propagate by diffusion, modeled as Brownian motion \cite{Philibert2006}. The Brownian motion is characterized by the diffusion coefficient, given by $D=\frac{K_b T}{6 \pi \eta r_{c,tx}}$. $K_b$ is the Boltzmann constant, $T$ is the temperature expressed in Kelvins, $\eta$ is the viscosity of the medium, and $r_{c,tx}$ is the radius of the considered molecules. The shape of both RX and TX is spherical with radius $r_{RX}$ and $r_{TX}$, respectively. The number of receptors deployed on the RX surface is $R_{RX}$, and they are modeled as a circular area of radius $r_{r,rx}$. The transmission is organized in bursts of molecules of size $Q$, spaced in time by a short period equal to $\Delta t$, so as to emulate a continuous emission of drug molecules with rate $Q/\Delta t$. The reception process at receptors is modeled as an exponential random variable with mean $T_{traff}$. We assume that the communication session can be set up and torn down with a specific protocol, e.g. similar to the one shown in \cite{TCPm14}. However, since our results are unaffected by the protocol used, the latter is beyond the scope of this paper. Let us assume that the center of TX is located at the origin of the system of coordinates, and initially we neglect the disturbing presence of the RX. We recall that the RX is not absorbing, although able to capture molecules. We now solve the diffusion equation upon the transmission an impulse of size $Q$ molecules at $t=0$. The concentration of molecules $c(t,r)$, in a given point of the space at a distance $r$ from the center of system of coordinates and at a specific time $t$, can be obtained by solving the diffusion equation (Fick's second law of diffusion \cite{Philibert2006}), which is \begin{eqnarray}\label{fick_eq} \frac{\partial c(t,r)}{\partial t} &=& D \nabla^{2} c(t,r), \end{eqnarray} \noindent obtaining the system impulse response scaled by $Q$: \begin{equation} h_Q(t,r)= \frac{Q}{\left(4 \pi D t\right)^\frac{3}{2}} e^{\left(-\frac{r^2}{4D t}\right)}. \label{conca} \end{equation} \begin{figure}[!t] \centering \includegraphics[width=0.90\linewidth]{layout_BB} \caption{System model. We assume there is a circular symmetry around the axis $d$.} \label{layout} \end{figure} Since the diffusion equation is a linear equation \cite{6648629}, the solution to (\ref{fick_eq}) for a train of bursts of size $Q$ spaced by a period $\Delta t$ ($\sum_{i=1}^{\left\lfloor t/ {\Delta t} \right\rfloor} {Q \delta(t - i \Delta t)}$) and started at $t=0$ is \begin{equation} c(t,r)=\sum_{i=1}^{\left\lfloor t/ {\Delta t} \right\rfloor} { h_Q(t - i \Delta t,r) } \approx \frac{1}{\Delta t} \int_{0}^{t} {h_Q(\tau,r) d\tau}\xrightarrow[t \rightarrow \infty]{}\frac{Q}{{\Delta t} 4 \pi D r}. \label{train} \end{equation} This is a significant result, although obtained with the simplifying assumption of neglecting the presence of the RX node. The arrival rate of molecules in the receiver space depends on the concentration close to the receiver surface \cite{Pierobon2011sept}, which, in turn, from (\ref{train}), results to be inversely proportional to the distance from the source of molecules, that is $c(r) \propto \frac{1}{r}$. As mentioned above, most of the receiver models do not take into account the presence of receptors on the receiver surface, and assume that the receiver can capture all compliant molecules in the surrounding space (absorbing receiver). Clearly, these models are unsuitable for detecting congestion since it is due to the limited rate of creation of ligand-receptors bonds, and depends on both the number of receptors $R_{RX}$ and on the trafficking time $T_{traff}$. In this regard, a more accurate model is the ``reversible first-order reaction'' model presented in \cite{Pierobon2011sept}. Although this model has been proposed for a different goal, it is instructive to review it in the perspective of congestion in molecular communications. In addition, it allows further detailing the system model. \subsection{Review of reversible first-order reaction model}\label{review} According to \cite{Pierobon2011sept}, the status of the receiver at any time $t$ can be represented by the value of a random variable ${\tilde n}(t)$, which denotes the number of ligand-receptor bonds at time $t$. Thus, the receiver behavior is modeled by the random process $\set{\brack{{\tilde n}(t)}, t \geq 0}$. In general, ${\tilde n}(t)$ increases when new ligand-receptor bonds are created, and decreases due to the internalization of these bonds \cite{Lauffenburger1993}, that is ligand molecules assimilation. In our model, we neglect the probability of the secondary effect of the rupture of the ligand-receptor bond before its internalization, in order to simplify the comprehension of the main underlying phenomena. However, if needed, it can be easily introduced in the receiver model. The random process $\set{\brack{{\tilde n}(t)}, t \geq 0}$ is modeled as a birth-death, discrete-valued, continuous-time Markov process, with ${\tilde n}(t) \in \set{0, 1, 2, \dots, R_{RX}}$ \cite{Kleinrock:1975:TVQ:1096491}. Let $\pi_{i}(t)$ denote the probability that the Markov chain is in state $i$ at time $t$; that is, $\pi_{i}(t) = \prob{{\tilde n}(t)=i}$. This means that the system has $i$ active ligand-receptor bonds. Then the dynamical equations for the state probabilities are as follows: \begin{eqnarray}\label{GrindEQ__5A_} \frac{d}{dt} \pi_{i}(t) &=& \lambda_{i-1}\pi_{i-1}(t)-\paren{\lambda_i+ \mu_i} \pi_{i}(t)+ \mu_{i+1} \pi_{i+1}(t), \end{eqnarray} where is noted that all the rates $\lambda_i$ and $\mu_i$ are state-dependent. In particular, we observe that \begin{itemize} \item the coefficient $\lambda_i$ describes the bond formation rate when the number of active bonds are $i$. In a queuing system, it represents the users arrival rate when the system is in state $i$. It depends upon the number of available receptors on the cells surface, $R_{RX}-i$, the concentration of molecules close to the cells surface at a given time, $c(t,r)$, and on the per receptor association rate constant, ${k}_{+}$ \cite{Pierobon2011sept,Kuo1997}. Specifically, the constant ${k}_{+}$ in \cite{Pierobon2011sept} is defined as the product of $Z$, which represents how frequently a collision between a particle and an unbound receptor happens, and $F_C(E_{a})$, which is the fraction of collisions having an energy higher than the threshold $E_a$, so that they can form a bond. Clearly, it results that $Z$ is proportional to the average number of free receptors, that is $Z \propto (R_{RX}-n_b)$, where $n_b$ is the average number of bond receptors in steady-state conditions. In turn, $n_b$ is a function of the average arrival rate, $\lambda_a$, formally defined in (\ref{arrival}). As for $F_C(E_{a})$, in our model, each collision between a ligand and a compliant receptor corresponds to an assimilation, thus $F_C(E_{a})=1$. The resulting rate is the product of these three quantities, that is, \begin{equation}\label{Lambda_def}\lambda_i = {k}_{+}\ c(t,r) \paren{R_{RX}-i} = Z c(t,r) \paren{R_{RX}-i};\end{equation} \item the coefficient $\mu_i$ describes the bond internalization rate when the number of active bonds are $i$. A memoryless model for this phenomenon is widely accepted in literature \cite{Lauffenburger1993}. It depends upon the number of currently formed complexes and on the average trafficking time, where the trafficking time is a random variable exponentially distributed with average value $T_{traff}$. This means that \begin{equation}\label{mu_def}\mu_i = \mu i = i / T_{traff}.\end{equation} \end{itemize} We assume that the TX node sends molecules according to the constant pattern with rate $Q/ \Delta t$. Then, in the steady state, the arrival process at the receiver can be approximated as a Poisson process, due to the randomness and memoryless properties of Brownian motion. The average arrival rate $\lambda_a$ observed by the receiver is given by \begin{equation}\label{arrival}\lambda_a = \sum_{i=0}^{R_{RX}-1} {\lambda_i \pi_{i}}.\end{equation} However, in addition to the arrival rate, also the value of the rejection rate $\lambda_r$ is very important. In fact, since the model consists of a pure loss queuing system with $R_{RX}$ servers and state dependent arrival rate, it clearly exhibits some losses. $\lambda_r$ represents the rate at which a ligand-receptor bond cannot be formed, due to hits of ligand molecules with already busy receptors. By following a reasoning similar to the one reported above for evaluating $\lambda_i$, we can say that the state dependent rejection rate is equal to \begin{equation}\label{Lambda_def_r}\lambda_{i,r} = Z^{*} c(t,r) i = \lambda_i \frac{n_b i }{\paren{R_{RX}-n_b} \paren{R_{RX}- i}}.\end{equation} Clearly, the per state rejection rate is proportional to the number of busy receptor, $i$, and to the $Z^{*}$, which represents how frequently a collision between a particle and a busy receptor happens, which, in turn, is obviously proportional to $n_b$, and thus $Z^{*}= Z \frac{n_b}{R_{RX}-n_b}$. Consequently, the average rejection rate $\lambda_r$ can be evaluated as \begin{equation}\label{rejection}\lambda_r = \sum_{i=1}^{R_{RX}} {\lambda_{i,r} \pi_{i}}.\end{equation} \subsection{Proposed congestion model}\label{mymodel} We model the reception process of any single receptor as an M/M/1/1 queue (single server queueing system without waiting room, \cite{Kleinrock:1975:TVQ:1096491}). If we consider the quantities depicted in Fig. \ref{layout}, it is easy to express the distance from the center of TX to a generic point on the RX surface as a function of the angle $\alpha$ as \begin{eqnarray}\label{distanza} r(\alpha)=\sqrt{(d+R_{RX}sin(\alpha))^2+(R_{RX}cos(\alpha))^2}, \end{eqnarray} \noindent with $\alpha \in [-\pi/2,\pi/2]$. As for the absorption rate of molecules to the node RX ($\lambda^{*}_a$), which is a measurable parameter, it is the superposition of the rates of arrival to each receptor $j$, denoted as $\lambda^{*}_{a,j}$. Each receptor $j$ is identified by the corresponding angle $\alpha_j$ and its distance from the TX center is equal to $r(\alpha_j)$. We denote as $j$=1 the receptor corresponding to $\alpha=\pi/2$, for which the distance to the center of TX is $d+r_{RX}$. Considering that, as in the previously illustrated model \cite{Pierobon2011sept}, the arrival rate is proportional to the local concentration of molecules, and taking into account (\ref{train}), it results that \begin{eqnarray}\label{lambda_a} \lambda^{*}_a=\sum_{j=1}^{R_{RX}} {\lambda^{*}_{a,j}}=\lambda^{*}_{a,1} (d+r_{RX}) \sum_{j=1}^{R_{RX}} {\frac{1}{r(\alpha_j)}}, \end{eqnarray} where $\lambda^{*}_a$ is a system parameter which can be easily measured by the receiver. Thus, the assimilation rate for each receptor $\lambda^{*}_{a,j}$ can be derived by $\lambda^{*}_a$ by inverting (\ref{lambda_a}) and finding $\lambda^{*}_{a,1}$. In an M/M/1/1 queue, given the rate of accepted traffic $\lambda_a$, the rate of the rejected traffic is $\lambda_r=\frac{T_{traff}\lambda_a^2}{1-T_{traff}\lambda_a}$. Thus, by using this result for each receptor, it is easy to find the system level rejection rate $\lambda^{*}_r$, given by \begin{eqnarray}\label{lambda_r} \lambda^{*}_r=\sum_{j=1}^{R_{RX}} {\lambda^{*}_{r,j}}={\lambda^{*}_{a,1}} (d+r_{RX}) \sum_{j=1}^{R_{RX}} {\frac{1}{r(\alpha_j)\left(\frac{r(\alpha_j)}{\lambda^{*}_{a,1} (d+r_{RX}) T_{traff}} - 1\right)}}, \end{eqnarray} \noindent where $\lambda^{*}_{a,1}$ can be obtained by inversion of (\ref{lambda_a}), once the global arrival rate of molecules is known. It is worth to note that although the system model illustrated in Fig. \ref{layout} assumes that the target of the drug is modeled as a spherical bio-nanomachine, in order to resemble some types of cells, the application of the proposed model is much more general. In more detail, the target of the drug can be modeled as a surface with a generic shape provided with receptors. If fact, as it appears from (\ref{lambda_a}) and (\ref{lambda_r}), the per-receptor assimilation and rejection rates are functions of the receptor distance from the center of transmission nanomachine, and can be easily evaluated once a measure $\lambda^{*}_a$ is available. If we assume that receptors are uniformly distributed on the RX surface, and by using the symmetry around the axis connecting the center of TX with the center of RX, it is possible to find more results. By partitioning the RX surface into $R_{RX}$ areas, it results that the surface surrounding each receptor has an average size $S=4 \pi r_{RX}^2/R_{RX}$. The angle $\alpha_1=\beta$ corresponding to the receptor located at distance $d+r_{RX}$ will be equal to $\beta=2/\sqrt{R_{RX}}$ due to geometrical considerations. If we divide the remaining surface of half semi-sphere (that for positive value of $\alpha$, the same reasoning holds for negative ones) in a number of spherical zones with angle $\Delta \alpha$, all receptors in these zones have the same distance from the center of TX, thus they see the same local concentration of drug molecules, and thus the same arrival rate $\lambda^{*}_{a,j}$. If we assume that the area $S$ dedicated to each receptor has roughly a square shape, it results that $S=(r_{RX} {\Delta \alpha})^2$, thus ${\Delta \alpha}=\sqrt{S}/r_{RX}=\sqrt{4 \pi/R_{RX}}$, and the number of spherical zones $F$ are given by $F=\frac{\pi-\beta}{2 {\Delta \alpha}}$. Since the area of each $k$-th spherical zone identified by $\alpha_k= k {\Delta \alpha}$ is given by $S_k=2 \pi r_{RX}^2 \left(sin(k {\Delta \alpha}) - sin((k-1) {\Delta \alpha}) \right)$ (see also Fig. \ref{layout}), the number of receptors in such a zone is \begin{eqnarray}\label{rece} n_k=\frac{S_k}{S}=\frac{ R_{RX} \left(sin(k \sqrt{4 \pi/R_{RX}}) - sin((k-1) \sqrt{4 \pi/R_{RX}}) \right)}{2} \end{eqnarray} This means that (\ref{lambda_r}) becomes \begin{eqnarray}\label{lambda_r_2} \lambda^{*}_r={\lambda^{*}_{a,1}} (d+r_{RX}) \sum_{k=-F-1}^{F+1} {\frac{n_k}{r(\alpha_k)\left(\frac{r(\alpha_k)}{\lambda^{*}_{a,1} (d+r_{RX}) T_{traff}} -1\right)}}, \end{eqnarray} \noindent and $\lambda^{*}_{a,1}$ can be obtained by \begin{eqnarray}\label{lambda_a_1} \lambda^{*}_{a,1}=\frac{\lambda^{*}_{a}}{ (d+r_{RX}) \sum_{k=-F-1}^{F+1} {\frac{n_k}{r(\alpha_k)}}}. \end{eqnarray} In order to consider a different distribution of receptors, by assuming that the symmetry with respect to $d$ still holds, it is enough to change the values of $n_k$, given that the condition $\sum_{k=-F-1}^{F+1} {n_k}=R_{RX}$ is satisfied. \subsection{Application to drug delivery}\label{application} In this sub-section we illustrate the application of our congestion model to drug delivery systems. Without loss of generality, we refer to the occupancy theory \cite{clark1933}, since it is the most commonly accepted theory. It says that the magnitude of drug response depends on the occupancy ratio of receptors by drug molecules. What we illustrate in what follows can similarly be adapted to the rate theory. As shown in \cite{Lambert01122004}, in some cases (e.g. competitive antagonist drugs) a full drug response can be produced even at low receptor occupancy, and it results that excess receptors, not bound to drug molecules, are no further needed to obtain the maximum drug response. Thus, in this case study we assume the usage of a drug type which produces the desired response when at least a fraction $f$ of receptors of the target cells are bound to the drug molecules. Thus, in order to suitably configure the drug delivery system, the first step consists of determining the minimum drug release rate that allows achieving the desired percentage of bound receptors. By using the results shown in \cite{6967753}, it is easy to find that a good approximation of the arrival rate value $\lambda_o=\lambda^{*}_{a}+\lambda^{*}_{r}$ is given by \begin{eqnarray}\label{arrival} \lambda_o=\lambda^{*}_{a}+\lambda^{*}_{r}=\frac{r_{RX}}{d} \frac{R_{RX}r_{r,rx}}{\pi r_{RX} + R_{RX} r_{r,rx}} \frac{Q}{\Delta t}. \end{eqnarray} Thus, by applying (\ref{lambda_r_2}) and (\ref{lambda_a_1}) in (\ref{arrival}), it is easy to find a relationship between the release rate and $\lambda^{*}_{a}$. In addition, by using the Little's law \cite{Kleinrock:1975:TVQ:1096491}, it is immediate to find that the mean number of busy receptors (servers) in the system is given by $\lambda^{*}_{a} T_{traff}$, and the desired fraction $f$ results equal to the overall utilization coefficient $\rho$, which is equal to \begin{eqnarray}\label{ro} \rho=\frac{\lambda^{*}_{a} T_{traff}}{R_{RX}}=f. \end{eqnarray} \section{Performance Evaluation}\label{perf} The performance of the system has been evaluated by using the BiNS2 simulator \cite{Felicetti2012,Felicetti2013172}, which is a Java package designed to simulate nano-scale biological communications in 3D. The approach of BiNS2 is fine grained: the position of each element, nanomachine or molecule, is evaluated at each simulation step, and collisions are managed according to a partially inelastic model, described by means of the coefficient of restitution \cite{Gidaspow2009}. Not only molecules, but also nanomachines can be either fixed or mobile. The surrounding environment can be unbounded or bounded. In the latter case, the bounding surface can have different shapes; currently the supported ones are sphere, cylinder, and cube, or a combination of them \cite{Felicetti201398}. In addition, BiNS2 allows modeling a receiver node with a finite number of receptors $R_{RX}$. Each receptor implements a finite, non-negligible reception time (trafficking time). When a molecule hits one of the molecule-compliant receptors, if it is not busy in another bond, it locks the relevant receptor for an amount of time whose distribution of the can be selected from a number of known statistics. In this work, the trafficking time is exponentially distributed with average value $T_{traff}$, whereas the transmission rate at TX is fixed for the whole simulation duration. Instead, if the receptor is busy, the molecule is bounced back as it would have hit a portion of the surface of the receiver without receptors. In the scenario of this paper, nanomachines are fixed, whereas molecules move according to the Brownian motion and as results of collisions, which can occur with nanomachines or among themselves. The simulation reliability of BiNS2 has been assessed by tuning simulation results with lab experiments \cite{Felicetti2013172}. Finally, the BiNS2 package implements an octree-based computation approach \cite{Felicetti2013172}, which uses a dynamic splitting of the simulated environment into cubes of different size in order to parallelize the simulation, so as to benefit of the multi-thread capabilities of modern multi-core computer architectures, and thus strongly reducing the simulation time. In the simulation of the scenario considered in this paper, the simulation environment is unbounded; however, we implemented a cubic virtual boundary with side 1 mm to implement the octree algorithm. The TX nanomachine is located at the center of the cube. When molecules exit the cube, they are removed from the simulation, in order to limit the computational burden of the simulation. From the above description, it appears that BiNS2 implements exactly the receiver model that we consider in this paper. The main simulation parameters, together with their descriptions and values, are reported in Table \ref{tabella}. In the next subsection, we present the simulation results of the scenario described in section \ref{model}. \begin{table}[t] \caption{Simulation parameters} \centering \scalebox{0.80}{ \begin{tabular}{l|l|l} Symbol & Description & Value\\ \hline $T$ & Temperature & 310 K \\ $e$ & Coefficient of restitution (part. inelastic collisions) & 0.95\\ $\eta$ & Viscosity & 0.0011 Pl \cite{Gidaspow2009}\\ $r_{RX}$ & Radius node RX & 2.5 $\mu m$ \\ $r_{TX}$ & Radius node TX & 2.5 $\mu m$ \\ $R_{RX}$ & Amount of surface receptors (node RX) & 10000 \\ $r_{c,tx}$ & Radius emitted molecules & 1.75 nm \\ $r_{r,rx}$ & Receptor radius (RX) & 4 nm \\ $T_{traff}$ & Trafficking time & 2 or 4 s \\ $\Delta t$ & Emission period (TX) & 20 ms \\ $d$ & RX-TX distance & 26.5 $\mu m$\\ \end{tabular} \label{tabella} } \end{table} \subsection{Numerical results} Before evaluating system performance, it is necessary to verify the suitability of the assumption of Poisson distributed arrivals. Fig. \ref{poiss_test} presents the Q-Q plot of simulation data versus synthetic Poisson data generated with the same average value. The simulation data include both absorbed and rejected molecules, gathered in intervals of 0.1 seconds. The resulting agreement is evident. \begin{figure}[!t] \centering \includegraphics[width=0.9\linewidth]{poiss_test} \caption{Q-Q plot of arrivals (both absorbed and rejected molecules in intervals of 0.1 s) obtained via simulation versus synthetic Poisson data with the same average.} \label{poiss_test} \end{figure} From the results in sections \ref{model}, it can be argued that the concentration of molecules is higher on the portion of the receiver surface facing the TX. In this portion of the surface, there are a lot of molecules which cannot establish a bond with receptors since most of them are already busy. Instead, the concentration of molecules close to the opposite portion of the receiver surface is much lower, since the molecules, following the negative gradient of concentration, tend to leave the RX node. As shown in section \ref{mymodel}, this phenomenon has a significant impact also on assimilations (and rejections). This observation is confirmed in Fig. \ref{maps}, which shows the map of assimilations for a trafficking time equal to $T_{taff}$=4s, at different times, corresponding to different amount of assimilations. $N_a$ represents the cumulative number of assimilations for each receptor, and it is plotted by means of a discrete value, chromatic scale for all the $R_{RX}$ receptors of RX. Each receptor is identified by its spherical coordinates, that is the azimuth $\theta$, whose range is (-$\pi$,$\pi$] radians, and the altitude $\phi$, whose range is (-$\pi/2$,$\pi/2$] radians. The direction connecting the center of TX and RX corresponds to $\paren{\theta,\phi}=\paren{0,0}$. As expected, the largest number of assimilations (i.e., $N_a$ values), in all considered samples, is located in the region around the center of the plot, that is $\paren{\theta,\phi}=\paren{0,0}$, which also represents the closest point between the RX and the TX. With respect to (\ref{conca}), the presence of the RX perturbs the concentration of molecules. In particular, those colliding with the portion of surface with values of $\theta$ and $\phi$ close to zero continue remaining close to the surface of the RX, due to negative gradient of the concentration, which ``pushes'' them towards large values of $d$. This facilitates the creation of ligand-receptor bonds on a larger area. However, in the region with coordinates close to $\paren{\theta,\phi}=\paren{0,0}$, the values of $N_a$ are often more than twice the value in the remaining of the RX surface. Since these receptors of the RX receive a larger portion of binding attempts, they are also responsible for most of rejections. \begin{figure*}[!ht] \centering \includegraphics[width=1.0\linewidth]{maps_x} \caption{Maps of the number of assimilations for each surface receptor ($N_a$), as a function of its spherical coordinates, azimuth and the altitude, for increasing numbers of total assimilation: a) 7850, b) 48761, c) 72891, and d) 117920.} \label{maps} \end{figure*} We now show simulation results obtained by using both the proposed model and the one illustrated in \cite{Pierobon2011sept}, suitably adapted to calculate the rejection rate, as described in section \ref{review}. In order to compare simulations with the theoretical models, we have assumed that they have the same mean arrival rate $\lambda_a=\lambda^{*}_{a}$ (and thus the same mean number of busy receptors). We have evaluated the rejection rate, since $\lambda_a$ is the only parameter that the RX can estimate reliably. In the simulation, we have tracked the number of rejection events, whereas the theoretical value in (\ref{rejection}) has been determined by evaluating the state probabilities numerically. As for the proposed model, the rate of rejection (i.e. unabsorbed drug molecules due to collisions with busy receptors) is evaluated by means of (\ref{lambda_r_2}). In addition, in the simulation we have verified that the ratio between the collisions of molecules with any of the deployed receptors, either busy or not, and those with the portion of surface of the RX not covered by receptors, closely match the theoretical value of $R_{RX} \frac{\paren{r_{r,rx}+r_{c,rx}}^2}{4 r_{RX}^2}$, where $r_{r,rx}$ is the receptor radius, $r_{c,tx}$ is the molecules radius, and $r_{RX}$ is the RX node radius. Results are shown in Fig. \ref{rejections}. In Fig. \ref{rejections}.a, the ordinate axis reports the rejection rate for the case $T_{traff}=4$ seconds, for both the simulations and the two theoretical models. The rejection rate derived from the model in \cite{Pierobon2011sept} and presented in section \ref{review} is labeled as ``Symmetric''. Fig. \ref{rejections}.b shows the same quantities for $T_{traff}=2$ seconds. In both figures, the abscissa reports the absorption rate measured at RX, expressed in drug molecules per second. Both abscissa and ordinate are expressed on a logarithmic scale. The first comment is that the symmetric model strongly underestimates the values of rejection rate $\lambda_r$, which means that it is not able to effectively detect congestion. Instead, our proposed model exhibits an excellent match with simulation results in all cases. This is an expected result, since in \cite{Pierobon2011sept} it is assumed that the concentration of molecules is the same all over the surface of the receiver. Instead, it could be not true, especially for low transmission rates and for short trafficking times. In addition, and this is the most important reason, receptors do not behave as a pool of servers, which can be invoked and used upon a new user enters the system (M/M/m/m model). Instead, they are isolated service elements, and this nature must be taken into account. Even if the symmetric model tries to mitigate this effect, by using a state dependent arrival process, it is not sufficient. In particular, at low $T_{traff}$ values, the difference between the results of the symmetric model and the simulation increases, since it is expected that the RX is eager to assimilate drug molecules and to re-present available receptors. Nevertheless, this is true only in unlikely case of uniform concentration. Instead, an interesting behavior appears in the case $T_{traff}$=4s when the absorption rate is very high, larger than 1000 molecules/s. In this case, as shown in Fig. \ref{rejections}.a, the estimation of the rejection rate given by the symmetric model tends to converge to the simulation values, which is also the value estimated by our model. Also this phenomenon can be easily explained. In fact, when the $T_{traff}$ value increases, the receiver is less prompt to free receptors. This means that when the absorption rate increases beyond a threshold value, due to a significant increase of the concentration of drug molecules nearby RX, even if the concentration close to the receiver surface is not homogeneous, it is so high that the limiting factor becomes the number of free receptors (about the 50\% in average), and thus the differences between the simulation and the two theoretical models tends to vanish. This trend is only barely visible for the case of $T_{traff}=2 s$, due to the fact that, at the maximum transmission rate, the average number of busy receptors is still low (about 32\%). In all the other cases, the difference between the symmetric and the proposed model is in the range of at least one order of magnitude. \begin{figure}[!ht] \centering \includegraphics[width=1.0\linewidth]{perf_coppia} \caption{Rejections as a function of the absorption rate: a) $T_{traff}$ equal to 4 seconds, and b) $T_{traff}$ equal to 2 seconds.} \label{rejections} \end{figure} \begin{figure}[!ht] \centering \includegraphics[width=1.0\linewidth]{l_a_1} \caption{Blocking probability as a function of the absorption rate.} \label{l_a} \end{figure} \begin{figure}[!ht] \centering \includegraphics[width=1.0\linewidth]{rece_bbb} \caption{Rejection rate as a function of the absorption rate for different number of receptors and trafficking times.} \label{rece} \end{figure} Fig. \ref{l_a} shows the blocking probability, evaluated as $\frac{\lambda^{*}_r}{\lambda_o}$, where $\lambda_o=\lambda^{*}_r+\lambda^{*}_a$ is the system arrival rate. The abscissa reports the absorption rate, expressed in molecules per second. The net effect of the behaviors observed in the previous Fig. \ref{rejections} is a nearly liner increase of the blocking probability, as a function of the arrival rate, which is typical of pure loss systems in overload. Finally, Fig. \ref{rece} shows the effect of varying the total number of receptors $R_{RX}$ by 20\% on the rejection rate, while keeping constant $\lambda^{*}_a$, indicated in the abscissa. As expected, when $R_{RX}$ increases, the rejection rate also decreases. Instead, when $R_{RX}$ decreases, a marked increase of the rejection rate appears. Again, this phenomenon can be explained with the fact that receptors are not a multiplexed resource, but they are rather multiple, single resources. By increasing the distance between TX and RX, we have also investigated the occurrence of any marked decrease in the rejection rate, due to the fact that different concentration values should be less significant for large $d$ (see also Fig. \ref{maps}). However, we have found a nearly negligible decrease for the rate of rejected molecules with $d$ for $T_{traff}=4s$, not reported in this paper. This is probably due to the fact that the phenomenon visible in Fig. \ref{maps} is due to not only to the transmission distance, but also to the disturbing effect of the presence of the node RX itself. This is another confirmation that, when the system absorption rate $\lambda^{*}_a$ is kept constant, the factor with the most significant impact is the number of receptors, since it is not a multiplexed resource. \subsection{Lesson learned towards drug delivery} In the previous subsection, we have analyzed the proposed model through simulations. Now, we highlight some key issues learned from this analysis, and focus on the operational procedure for designing an effective, localized drug delivery system. First, in order to make use of the proposed model, it is necessary to characterize the underlying system. This can be done by means of lab experiments, or by using results already present in the literature. The goal of these experiments consists of estimating a small number of parameters, necessary for characterizing the system behavior. These parameters are the average trafficking time $T_{traff}$, and the number of surface receptors of the considered type, $R_{RX}$. Once the values of these two parameters are known, and the TX-RX distance $d$ is known, it is possible to make use of the model for any value of the emission rate $\frac{Q}{\Delta t}$ in order to evaluate the average number of busy receptors. Finally, according to the drug used, it is necessary to know the minimum fraction of receptors to be bound to drug molecules in order to maximize the drug effects. As mentioned above, for some types of drug this fraction could be quite low. For instance, in \cite{Lambert01122004}, the author shows that often only 5-10\% occupancy is needed to produce a full response when agonist drugs are used. For each drug, this value can be derived by in-vitro experiments. Thus, the final step consist of using the results obtained in subsection \ref{application} for estimating the optimal drug release rate $\frac{Q}{\Delta t}$, which guarantees the desired fraction of receptors bound to drug molecules, that is at least $f$, without drug overloading. Fig. \ref{balocco}.a shows the percentage of busy receptors as a function of the release rate of drug molecules, for the trafficking time values already used in this paper, 2s and 4s, respectively. As expected, the value of $f$ increases with the rate $\frac{Q}{\Delta t}$. This sublinear increase is due to congestion. Fig. \ref{balocco}.b depicts the minimum release rate of drug molecules necessary to achieve the target occupancy $f$, versus the transmission range, for different values of the trafficking time. A first comment is that the dependency of drug release rate is nearly linear with the transmission range. In addition, the trafficking time has a significant influence on the slope of the release rate curve. In particular, the lower the trafficking time, the prompter is the target cell to absorb the drug, which makes it necessary to transmit more molecules to maintain the target occupancy $f$. \begin{figure}[!ht] \centering \includegraphics[width=1.0\linewidth]{balocco} \caption{Percentage of busy receptors as a function of drug molecules release rate.} \label{balocco} \end{figure} \section{Conclusion}\label{conclu} In this paper, we have introduced the concept of congestion in diffusion-based molecular communications, and proposed a model for both illustrating the dynamical behavior of the phenomenon and analyzing the root causes of it. The considered continuous emission of molecules is typical of localized drug delivery systems. Our proposed model of the receiver nanomachine includes an M/M/1/1 queue for each receptor. This model can capture the dependency of the arrival rate (ligand-receptor bond formation) on both transmission range and nature of receptor. Receptors cannot be simply considered a set of multiplexed resources such as a server pool. They behave as isolated, multiple nano-receivers, independent of each other. An extensive numerical analysis shows that this model is effective in modeling congestion conditions, especially in the range of distances typical of diffusion-based molecular communication. The results of this work can be used for implementing rate control algorithms for molecular communications, in particular for drug delivery systems. We have detailed the operational procedure for determining the suitable drug delivery rate from a set of implanted emitting nanomachines, which release drug nanoparticles close to the target cells. In addition, since the arrival rate can be measured by the receiver bio-nanomachine by counting the absorbed molecules, the system can also be designed with adaptive features. In particular, it is possible to add a further controller nanomachine, which can estimate whether the used transmission rate is optimal, and adapt its value to any change of the operational conditions. Release rate adjustments can be triggered by using feedback messages \cite{nakano13} sent when the observed deviations from the original design conditions are significant. The drug delivery system analyzed in this paper is analyzed in a quasi-static environment, such as the extracellular matrix. Drug delivery in more dynamic environments, such as blood vessels, we will be the object of future investigations. In such scenarios different configurations can be studied, such as fixed transmitters, anchored to vessel wall, and mobile targets (e.g. circulating tumor cells), or mobile transmitters and mobile targets, or mobile transmitters and fixed targets (e.g. solid tumors). \bibliographystyle{IEEEtran}
\section{Introduction} Despite their popularity and impressive achievements \cite{lecun2015deep} Artificial Neural Networks (ANNs) remain difficult to analyze. From a deep kernel learning perspective \cite{wilson2016deep}, the action of the last layer of an ANN can be seen as that of regressing the data with a kernel parameterized by the weights of all the previous layers. Therefore analysing the problem of performing a regression of the data with a kernel that is also learnt from the data could help understand ANNs and elaborate a rigorous theory for deep learning. Hierarchical Bayesian Inference \cite{schwaighofer2005learning} (placing a prior on a space of kernels and conditioning on the data) and Maximum Likelihood Estimation \cite{williams1996gaussian} (choosing the kernel which maximizes the probability of observing the data) are well known approaches for learning the kernel. In this paper we explore a numerical approximation approach (motivated by interplays between Gaussian Process Regressions and Numerical Homogenization \cite{OwhScobook2018}) based on the simple premise that a kernel must be good if the number of points $N$ used to perform the interpolation of data can be reduced to $N/2$ without significant loss in accuracy (measured using the intrinsic RKHS norm $\|\cdot\|$ associated with the kernel). Writing $u$ and $v$ for the interpolation of the data with $N$ and $N/2$ points, the relative error $\rho=\frac{\|u-v\|^2}{\|u\|^2}$ induces a data dependent ordering on the space of kernels. The Fr\'{e}chet derivative of $\rho$ identifies the direction of the gradient descent and leads to a simple algorithm (Kernel Flow) for its minimization: (1) Select $N_f$ ($\leq N$) points (at random, uniformly, without replacement) from the $N$ training data points (2) Select $N_c=N_f/2$ points (at random, uniformly, without replacement) from the $N_f$ points (3) Perturb the kernel in the gradient descent direction of $\rho$ (computed from the current kernel and the $N_f, N_c$ points) (4) Repeat. To provide some context for this algorithm, we first summarize (in Section \ref{sec2}) interplays between Kriging, Gaussian Process Regression, Game Theory and Optimal Recovery. The identification (in Sec.~\ref{sec3}) of $\rho$ and its Fr\'{e}chet derivative leads (in Sec.~\ref{secfamker}) to the proposed algorithm in a parametric setting. In Sec.~\ref{secjhdkhj33} we describe interplays between the proposed algorithm and Numerical Homogenization \cite{OwhScobook2018} by implementing and testing the parametric version of Kernel Flow for the (simple and amenable to analysis) problem of (1) recovering the unknown conductivity $a$ of the PDE $-\operatorname{div}(a\nabla u)=f$ based on seeing $u\in \mathcal{H}^1_0((0,1))$ at a finite number $N$ of points (2) approximating $u$ between measurement points. For this problem, $a$, $u$ and $f$ are all unknown, we only know that $f\in L^2$ and we try to learn the Green's function of the PDE (seen as a kernel parameterized by the unknown conductivity $a$). Experiments suggest that, by minimizing $\rho$ (parameterized by the conductivity), the algorithm can recover the conductivity and significantly improve the accuracy of the interpolation. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/kf2} \caption{The game theoretic interpretation of the step $n\rightarrow n+1$ of Kernel Flow. (1) Starting from $F_n$ and the $N$ data points $(F_n(x_i),y_i)$ (2) Select $N_f$ indices out of $N$ (3) Select $N_f/2$ indices out of $N_f$ (4) Consider the zero sum adversarial game where Player I chooses the labels of the $N_f$ points to be $y_i$ and Player II sees half of them and tries to guess the other and let $\rho$ be the loss of Player II in that game (using relative error in the RKHS norm associated with $K_1$) (5, 6) Move the $N_f$ selected points $F_n(x_i)$ to decrease the loss of Player II (7) Move the remaining $N-N_f$ (and any other point $x$) points via interpolation with the kernel $K_1$ (this specifies $F_{n+1}$) (8) Repeat.} \label{figkf2} \end{center} \end{figure} Next (in Sec.~\ref{secKernelFlow}) we derive a non parametric version of the proposed algorithm that learns a kernel of the form \begin{equation} K_n(x,x')=K_{1}(F_n(x),F_n(x'))\,, \end{equation} where $K_1$ is a standard kernel (e.g. Gaussian $K_1(x,x')=e^{-\gamma |x-x'|^2}$) and $F_n$ maps the input space into itself, $n\rightarrow F_n$ is a discrete flow in the input space, and $F_{n+1}$ is obtained from $F_n$ by interrogating random subsets of the training data as described in Fig.~\ref{figkf2} (which also summarizes the game theoretic interpretation of the proposed Algorithm, note that the game is incrementally rigged to minimize the loss of Player II). \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/kf1} \caption{The Kernel Flow Algorithm. (1) $N_f$ indices $s_{f,n}(1),\ldots,s_{f,n}(N_f)$ are randomly sampled out of $N$ and $G_{n+1}$ belongs to the linear span of the $K(F(x_{s_{f,n}(i)}^{(n)}),x)$ (2) the coefficients in the representation of $G_{n+1}$ are found as the direction of the gradient descent of $\rho$ (3) The value of $F_{n+1}(x_i)$ is the sum of $F_n(x_i)$ a small perturbation depending on the joint values of the $F_n(x_{s_{f,n}(j)})$. } \label{figkf1} \end{center} \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/swissroll2} \caption{Swiss Roll Cheesecake. $N=100$. Red points have label $-1$ and blue points have label $1$. $F_n(x_i)$ for 8 different values of $n$. } \label{figswissroll2} \end{center} \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/fmnist2} \caption{Results for Fashion-MNIST. $N=60000$, $N_f=600$ and $N_c=300$. (1, 3, 5) Training data $x_i$ (class 3, 5 and 6) (2, 4, 6) $F_n(x_i)$ (class 3, 4 and 6) for $n=50000$. } \label{figfmnist2} \end{center} \end{figure} The proposed algorithm (see Fig.~\ref{figkf1} for a summary of its structure) can be reduced to an iteration of the form \begin{equation} K_n(x,x')=K_{n-1}(x+\epsilon G_n(x), x+ \epsilon G_n(x')). \end{equation} Writing $x_i$ for the training points and $F_1(x)=x$ and $F_n(x)=(I_d+\epsilon G_n)\circ F_{n-1}(x)$, the network $F_n$ (composed of $n$ layers) is learnt from the data in a recursive manner (across layers) by (1) using $g_i^{(n)}:=G_n \circ F_{n-1}(x_{s_{f,n}(i)})$ for a random subset $\{x_{s_{f,n}(i)}|1\leq i \leq N_f\}$ of the points $\{x_i|1\leq i\leq N\}$ as training parameters and interpolating $G_n$ with the kernel $K_1$ in between the points $F_{n-1}(x_{s_{f,n}(i)})$ (2) selecting $g_i^{(n)}$ in the direction of the gradient descent of $\rho$ at each step. Writing $(x_i,y_i)$ for the $N$ training data points, $G_{n+1}$ ends up being of the form \begin{equation}\label{eqkejdkdh} G_{n+1}(x)=\sum_{i=1}^{N_f} c_i^{(n)} K_1(F_n(x_{s_{f,n}(i)}),x)\, \end{equation} where $s_{f,n}(1),\ldots, s_{f,n}(N_f)$ are $N_f$ indices sampled at random (uniformly without replacement) from $\{1,\ldots,N\}$. Note that the kernel $K_n$ produced at any step $n$, is a Deep Hierarchical Kernel (in the sense of \cite{wilson2016deep, steinwart2016learning}) satisfying the nesting equations \begin{equation} K_n(x,x')=K_{n-1}(x+\epsilon \sum_{i=1}^{N_f} c_i^{(n-1)} K_{n-1}(x_{s_{f,n-1}(i)},x), x'+\epsilon \sum_{i=1}^{N_f} c_i^{(n-1)} K_{n-1}(x_{s_{f,n-1}(i)},x'))\,. \end{equation} Furthermore, the structure of the network defined by that kernel is randomized through the random selection of the $N_f$ points (see Fig.~\ref{figkf1}.3). The coefficients $c_i^{(n)}$ in \eqref{eqkejdkdh} are identified through one step of gradient descent of the relative error $\rho$ (measured in the RKHS norm associated with $K_1$) of the approximation of the labels (the $y_{s_{f,n}(i)}$) of those $N_f$ points upon seeing half of them. From the game theoretic perspective of Fig.~\ref{figkf2}, $\rho$ is the loss of Player II (attempting the guess the unseen labels) and the points $F_{n+1}(x_{s_{f,n}(i)})$ are perturbations of the points $F_n(x_{s_{f,n}(i)})$ in a direction which seeks to minimize this loss. Note also that the proposed (Kernel Flow) algorithm produces a flow $F_n$ (randomized through sampling of the training data) in the input space and a (stochastic) dynamical system $K_1(F_n(x),F_n(y))$ in the kernel space. Since learning becomes equivalent to integrating a dynamical system, it does not require back-propagation nor guessing the architecture of the network, which enables the construction of very deep networks and the exploration of their properties. We implement this algorithm (and visualize its flow) for MNIST \cite{yann1998mnist}, Fashion-MNIST \cite{xiao2017fashion}, the Swiss Roll Cheesecake. See Fig.~\ref{figswissroll2} and Fig.~\ref{figfmnist2} for illustrations of the flow $F_n(x)$ for the Swiss Roll Cheesecake and Fashion-MNIST. For these datasets we observe that (1) the flow $F_n$ unrolls the Swiss Roll Cheesecake (2) the flow $F_n$ expands distances between points that are in different classes and contracts distances between points in the same class (towards archetypes of each class) (3) at profound depths ($n=12000$ layers for MNIST and $n=50000$ layers for Fashion-MNIST) the resulting kernel $K_n$ achieves a small average error ($1.5\%$ for MNIST and $10\%$ for Fashion-MNIST) using only $10$ points as interpolation points (i.e. one point for each class) (4) the incremental data-dependent perturbations $\epsilon G_{n+1}$ seem to take advantage of a cooperative mechanism appearing as the counterpart of the one associated with adversarial examples \cite{szegedy2013intriguing, owhadiBayesiansirev2013}. Finally (in Sec.~\ref{secCNN}) we derive an ANN version of the algorithm by identifying the action of the last layer of the ANN as that of regressing the data with a kernel parameterized by the weights of all the previous layers (learnt by minimizing $\rho$ or its analogous $L^2$ version). This algorithm is then tested for the MNIST and Fashion-MNIST data sets and shown to contract in-class distances and inter-class distances in a similar manner as above (thereby achieving accuracies comparable to the state of the art with a small number of interpolation points). For kernels parameterized by the weights of a given Convolutional Neural Network, minimizing $\rho$ or its $L^2$ version, appears, for the MNIST and fashion MNIST data sets, to outperform training (the same CNN architecture) with relative entropy and dropout. This paper is not aimed at identifying the state of the art algorithm in terms of accuracy nor complexity. It is simply motivated by an attempt to offer some insights (from a numerical approximation perspective) on mechanisms that may be at play in deep learning. \section{Learning as an interpolation problem}\label{sec2} It is well understood \cite{poggio2003mathematics} that ``learning techniques are similar to fitting a multivariate function to a certain number of measurement data'', e.g. solving the following problem. \begin{Problem}\label{pb1} Given input/output data $(x_1,y_1),\ldots,(x_N,y_N)\in {\bf\mathcal{X}} \times {\bf\mathcal{Y}}$ recover an unknown function $u^\dagger$ mapping ${\bf\mathcal{X}}$ to ${\bf\mathcal{Y}}$ such that \begin{equation}\label{eqkkkhhiuhiu} u^\dagger(x_i)=y_i\text{ for }i\in \{1,\ldots,N\}\,. \end{equation} \end{Problem} \paragraph{Optimal recovery.} In the setting of optimal recovery \cite{micchelli1977survey} the ill posed problem \ref{pb1} can be turned into a well posed one by restricting candidates for $u$ to belong to a space of functions $\mathcal{B}$ endowed with a norm $\|\cdot\|$ and identifying the optimal recovery as the minimizer of the relative error \begin{equation}\label{eqihdiudehd} \min_{v} \max_{u}\frac{\|u-v\|^2}{\|u\|^2}\,, \end{equation} where the max is taken over $u \in \mathcal{B}$ and the min is taken over candidates in $v\in \mathcal{B}$ such that $v(x_i)=u(x_i)$. Observe that $\mathcal{B}^*$, the dual space of $\mathcal{B}$, must contain delta Dirac functions \begin{equation} \phi_i(\cdot):=\updelta(\cdot-x_i)\,. \end{equation} for the validity of the constraints $u(x_i)=y_i$. Consider now the case where $\|\cdot\|$ is quadratic, i.e. such that \begin{equation} \|u\|^2=[Q^{-1}u, u]\,, \end{equation} where $[\phi,u]$ stands for the duality product between $\phi\in\mathcal{B}^*$ and $u\in \mathcal{B}$ and $Q\,:\,\mathcal{B}^*\rightarrow \mathcal{B}$ is a positive symmetric linear bijection (i.e. such that $[\phi,Q\phi]\geq 0$ and $[\phi,Q\varphi]=[\varphi,Q\phi]$ for $\varphi,\phi \in \mathcal{B}^*$). In that case the optimal solution of \eqref{eqihdiudehd} has the explicit form (writing $y_i$ for $u(x_i)$) \begin{equation}\label{eqkjehdkjheg} v^\dagger=\sum_{i,j=1}^N y_i A_{i,j} Q \phi_j\,, \end{equation} where $A=\Theta^{-1}$ and $\Theta$ is the $N\times N$ Gram matrix with entries $\Theta_{i,j}=[\phi_i, Q \phi_j]$. Furthermore $v^\dagger$ can also be identified as the minimizer of \begin{equation}\label{eqvarform} \begin{cases} \text{Minimize }\|\psi\|\\ \text{Subject to }\psi\in \mathcal{B}\text{ and }[\phi_i,\psi]=y_i, \quad i\in \{1,\ldots,N\}. \end{cases} \end{equation} \paragraph{Kriging.} Defining $K$ as the kernel \begin{equation} K(x,x')=[\updelta(\cdot-x), Q \updelta(\cdot-x')]\,, \end{equation} $(\mathcal{B},\|\cdot\|)$ can be seen as a Reproducing Kernel Hilbert Space endowed with the norm \begin{equation} \|u\|^2=\sup_{\phi \in \mathcal{B}^*} \frac{(\int \phi(x) u(x)\,dx)^2}{\int \phi(x)K(x,y)\phi(y)\,dx\,dy}\,, \end{equation} and \eqref{eqkjehdkjheg} corresponds to the classical representer theorem \begin{equation}\label{eqjehgdgd} v^\dagger(\cdot)=y^T A K(x_.,\cdot)\,, \end{equation} using the vectorial notations $y^T A K(x_.,\cdot)=\sum_{i,j=1}^N y_i A_{i,j} K(x_j,\cdot)$ with $A=\Theta^{-1}$ and $\Theta_{i,j}=K(x_i,x_j)$. \paragraph{Gaussian Process Regression numerical approximation games.} Writing $\xi$ for the centered Gaussian Process with covariance function $K$, \eqref{eqjehgdgd} can also be recovered via Gaussian Process Regression as \begin{equation} v^\dagger(x)=\mathbb{E}\big[\xi(x)\mid \xi(x_i)=y_i\big]\,. \end{equation} This link between Numerical Approximation and Gaussian Process Regression emerges naturally by viewing \eqref{eqihdiudehd} as an adversarial zero sum game \cite{OwhScobook2018, OwhadiMultigrid:2015, gamblet17, SchaeferSullivanOwhadi17} between two players (I and II where I tries to maximize the relative error and II tries to minimize it after seeing the values of $u$ at the points $x_i$) and observing that $\xi$ and $v$ are optimal mixed/randomized strategies for players I and II (forming a saddle point for the minimax lifted to measures over functions). \section{What is a good kernel?}\label{sec3} Although the optimal recovery of $u^\dagger$ has a well established theory, it relies on the prior specification of a quadratic norm $\|\cdot\|$ or equivalently of a kernel $K$. In practical applications the performance of the interpolant \eqref{eqjehgdgd} (e.g. when employed in a classification problem) is sensitive to the choice of $K$. How should $K$ be selected to achieve generalization? Although ANNs \cite{lecun2015deep} seem to address this question (by performing variants of the interpolation \eqref{eqjehgdgd} with the last layer of the network using a kernel $K$ parameterized by the weights of the previous layers and learnt by adjusting those weights) they remain difficult to analyze and the introduction of regularization steps (such as dropout or early stop) introduced to achieve generalization appear to be discovered through a laborious process of trial and error \cite{zhang2016understanding}. Is there a systematic way of identifying a good kernel? What is good kernel? We will now explore these questions from the perspective of interplays between numerical approximation and inference \cite{OwhScobook2018} and the simple premise that a kernel must be good if the number of points $N$ used to perform the interpolation of data can be reduced to $m=\operatorname{round}(N/2)$ without significant loss in accuracy (measured using the intrinsic RKHS norm associated with the kernel). To label the $m$ sub-sampled (test) data points, let $s(1),\ldots,s(m)$ be a selection of $m$ distinct elements of $\{1\ldots,N\}$. Observe that $\{x_{s(1)},\ldots,x_{s(m)}\}$ forms a strict subset of $\{x_1,\ldots,x_N\}$. Write $v^s$ for the optimal recovery of $u^\dagger$ upon seeing its values at the points $x_{s(1)},\ldots,x_{s(m)}$, and observe that $v^s(\cdot)=\sum_{i=1}^m \bar{y}_i \bar{A}_{i,j} K(x_{s(j)},i)$ with $\bar{y}_i=y_{s(i)}$ and $\bar{A}=\bar{\Theta}^{-1}$ with $\bar{\Theta}_{i,j}=\Theta_{s(i),s(j)}$. Let $\pi$ be the corresponding $m\times N$ sub-sampling matrix defined by $ \pi_{i,j}=\delta_{s(i), j}$ and observe that \begin{equation}\label{vsigm} v^s= y^T \tilde{A} K(x_.,\cdot) \end{equation} with $\tilde{A}=\pi^T \bar{A}\pi$ and $\bar{A}=(\pi \Theta \pi^T)^{-1}$. \begin{Proposition}\label{propjhgfytf} For $v^\dagger$ and $v^s$ defined as in \eqref{eqjehgdgd} and \eqref{vsigm}, we have \begin{equation}\label{eqkjhedjhdg} \|v^\dagger-v^s\|^2=y^T A y-y^T \tilde{A} y\,. \end{equation} \end{Proposition} \begin{proof} Proposition \ref{propjhgfytf} is particular case of \cite[Prop.~13.29]{OwhScobook2018}. The proof follows simply from $\|v^\dagger\|^2=y^T A y$, $\|v^s\|^2=\bar{y}^T \bar{A} \bar{y}=y^T \tilde{A} y$ and the orthogonal decomposition $\|v^\dagger\|^2=\|v^s\|^2+\|v^\dagger-v^s\|^2$ implied by the fact that $v^s$ is the minimizer of $\|\psi\|^2$ subject to the constraints $[\phi_{s(i)},\psi]=y_{s(i)}$ and that $v^\dagger$ satisfies those constraints. \end{proof} Let $\rho$ be the ratio \begin{equation}\label{eqkedhkdh} \rho:=\frac{\|v^\dagger-v^s\|^2}{\|v^\dagger\|^2}\,. \end{equation} Note that a value of $\rho$ close to zero indicates that $v^s$ is a good approximation of $v^\dagger$ (and that most of the energy of $v^\dagger$ is contained in $v^s$) which is a desirable condition for the kernel $K$ to achieve generalization. Furthermore, Prop.~\ref{propjhgfytf} implies that $\rho\in [0,1]$ and \begin{equation} \rho=1-\frac{y^T \tilde{A} y}{y^T A y}\,. \end{equation} Fixing $y$ and $\pi$, $\rho$ can be seen as a function of $A$ which we will write $\rho(A)$. Since $A=\Theta^{-1}$, $\rho$ can also be viewed as a function of $\Theta$ which, abusing notations, we will write $\rho(\Theta)$. Motivating by the application of $\rho$ to the ordering of space of kernels (a small $\rho$ being indicative of a good kernel) we will, in the following proposition, compute its Fr\'echet derivative with respect to small perturbations of $A$ or of $\Theta$. \begin{Proposition}\label{propekjdhgud} Write $z:=A^{-1}\tilde{A} y$ with $\tilde{A}:=\pi^T (\pi A^{-1} \pi^T)^{-1}\pi$ defined as above.\footnote{The operator $P:=\tilde{A}A^{-1}$ is a projection with $\operatorname{Im}(P)=\operatorname{Im}(\pi^T)$ and $\operatorname{Ker}(P)=A \operatorname{Ker}(\pi)$ and from the perspective of numerical homogenization $\tilde{A}$ can be interpreted as the homogenized version of $A$ \cite[Sec.~13.10.3]{OwhScobook2018}, see \cite[Chap.~13.10]{OwhScobook2018} for further geometric properties.} It holds true that \begin{equation}\label{eqkejdkddjdj} \rho(A+\epsilon S)=\rho(A)+\epsilon \frac{(1-\rho(A)) y^T S y - z^T S z }{y^T A y} +\mathcal{O}(\epsilon^2)\,, \end{equation} and, writing\footnote{Note that $\hat{z}=\Theta^{-1}z=\tilde{A} y$.} $\hat{y}:=\Theta^{-1} y$ and $\hat{z}:=\pi^T (\pi \Theta \pi^T)^{-1}\pi y$, \begin{equation}\label{eqlkejdhkdhjkdh} \rho(\Theta+\epsilon T)=\rho(\Theta)-\epsilon \frac{(1-\rho(\Theta)) \hat{y}^T T \hat{y} - \hat{z}^T T \hat{z} }{\hat{y}^T \Theta \hat{y}}+\mathcal{O}(\epsilon^2)\,. \end{equation} \end{Proposition} \begin{proof} Observe that \begin{equation} \rho(A+\epsilon S)=1-\frac{y^T \pi^T (\pi (A+\epsilon S)^{-1}\pi^T)^{-1}\pi y}{y^T (A+\epsilon S) y} \end{equation} and recall the approximation \begin{equation}\label{eqhgjhgjh} (A+\epsilon S)^{-1}=A^{-1}-\epsilon A^{-1}S A^{-1}+\mathcal{O}(\epsilon^2)\,. \end{equation} \eqref{eqkejdkddjdj} then follows from straightforward calculus. The proof of \eqref{eqlkejdhkdhjkdh} is identical and can also be obtained from \eqref{eqkejdkddjdj} and the first order approximation $(\Theta+\epsilon T)^{-1}=\Theta^{-1}-\epsilon \Theta^{-1}T \Theta^{-1}+\mathcal{O}(\epsilon^2)$. \end{proof} \section{The algorithm with a parametric family of kernels}\label{secfamker} Let $\mathcal{W}$ be a finite dimensional linear space and let $K(x,x',W)$ be a family of kernels parameterized by $W\in \mathcal{W}$. Let $N_f\leq N$ and $N_c=\operatorname{round}(N_f/2)$. Let $s_f(1),\ldots,s_f(N_f)$ be a selection of $N_f$ distinct elements of $\{1,\ldots,N\}$. Let $s_{c}(1),\ldots,s_c(N_c)$ be a selection of $N_c$ distinct elements of $\{1,\ldots,N_f\}$. Let $\pi$ be the corresponding $N_c\times N_f$ sub-sampling matrix defined by $ \pi_{i,j}=\delta_{s_c(i), j}$. Let $y_f\in \mathbb{R}^{N_f}$ and $y_c\in \mathbb{R}^{N_c}$ be the corresponding subvectors of $y$ defined by $y_{f,i}=y_{s_f(i)}$ and $y_{c,i}=y_{f,s_c(i)}$. Using the notations of sections \ref{sec2} and \ref{sec3} write $\Theta(W)$ for the $N_f\times N_f$ matrix with entries $\Theta_{i,j}=K(x_{s_f(i)},x_{s_f(j)},W)$ and let \begin{equation}\label{eqjhgjgyuyguy0} \rho(W,s_f,s_c):=1-\frac{ y_c^T(\pi\Theta \pi^T)^{-1} y_c}{y_f^T \Theta^{-1} y_f}\,. \end{equation} The following corollary derived from Prop.~\ref{propekjdhgud} allows us to compute the gradient of $\rho$ respect to $W$. \begin{Corollary}\label{corpropekjdhgud} Write $\Theta:=\Theta(W)$, $\hat{y}:=\Theta^{-1} y_f$ and $\hat{z}:=\pi^T (\pi \Theta \pi^T)^{-1}\pi y_f$. Write $W_i$ for the entries of the vector $W$. It holds true that \begin{equation}\label{eqlkejdhkdhjkdh2} \partial_{W_i} \rho(W)=-\frac{(1-\rho(W)) \hat{y}^T (\partial_{W_i} \Theta(W)) \hat{y} - \hat{z}^T (\partial_{W_i} \Theta(W)) \hat{z} }{y_f^T \Theta^{-1} y_f}\,. \end{equation} \end{Corollary} \begin{proof} Prop.~\ref{propekjdhgud} implies that \begin{equation}\label{eqlkejdhkdhjkdh3} \rho(W+\epsilon W')=\rho(W)-\epsilon \frac{(1-\rho(W)) \hat{y}^T T \hat{y} - \hat{z}^T T \hat{z} }{y_f^T \Theta^{-1} y_f}+\mathcal{O}(\epsilon^2)\,, \end{equation} with $T=(W')^T \nabla_W \Theta(W)$, which proves the result. \end{proof} The purpose of Algorithm \ref{alglearnkernel} is to learn the parameters $W$ (of the kernel $K$) from the data. The value of $N_f$ (and hence $N_c$) corresponds to the size of a batch. The initialization of $W$ in step \ref{step1} may be problem dependent or at random. \begin{algorithm}[h] \caption{Learning $W$ in the $K(\cdot,\cdot,W)$.}\label{alglearnkernel} \begin{algorithmic}[1] \STATE\label{step1} Initialize $W$ \REPEAT \STATE Select $s_f(1),\ldots,s_f(N_f)$ out of $\{1,\ldots,N\}$. \STATE Select $s_c(1),\ldots,s_c(N_c)$ out of $\{1,\ldots,N_f\}$. \STATE $W'=-\nabla_W \rho(W,s_f,s_c)$ \STATE $W=W +\epsilon W'$ \UNTIL End criterion \end{algorithmic} \end{algorithm} \section{A simple PDE model}\label{secjhdkhj33} To motivate, illustrate and study the proposed approach, it is useful to start with an application to the following simple PDE model amenable to detailed analysis \cite{OwhScobook2018}. Let $u$ be the solution of \begin{equation}\label{eqnscalarhgyprotgtoa} \begin{cases} -\operatorname{div} \big(a(x) \nabla u(x)\big)=f(x) \quad x \in \Omega; \\ u=0 \quad \text{on}\quad \partial \Omega\,, \end{cases} \end{equation} where $\Omega\subset \mathbb{R}^d$, is a regular subset and $a$ is a uniformly elliptic symmetric matrix with entries in $L^\infty(\Omega)$. Write $\mathcal{L}:=-\operatorname{div}(a\nabla\cdot)$ for the corresponding linear bijection from $\mathcal{H}^1_0(\Omega)$ to $\mathcal{H}^{-1}(\Omega)$. In this proposed simple application we seek to recover the solution of \eqref{eqnscalarhgyprotgtoa} from the data $(x_i,y_i)_{1\leq i \leq N}$ and the information $u(x_i)=y_i$. If the conductivity $a$ is known then \cite{OwhScobook2018, gamblet17} interpolating the data with the kernel (1) $\mathcal{L}^{-1}$ leads to a recovery that is minimax optimal in the (energy) norm $\|u\|^2=\int_{\Omega}(\nabla u)a \nabla u$ ($d=1$ is required to ensure the continuity of the kernel). (2) $(\mathcal{L}^T \mathcal{L} )^{-1}$ leads to a recovery that is minimax optimal in the norm $\|u\|=\|\operatorname{div}(a\nabla u)\|_{L^2(\Omega)}$ ($d\leq 3$, the recovery is equivalent to interpolating with Rough Polyharmonic Splines \cite{OwhadiZhangBerlyand:2014}). (3) $(\mathcal{L}^T \Delta \mathcal{L} )^{-1}$ leads to a recovery that is minimax optimal in the norm $\|u\|=\|\operatorname{div}(a\nabla u)\|_{\mathcal{H}^1_0(\Omega)}$ ($d\leq 5$). \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/a} \caption{(1) $a$ (2) $f$ (3) $u$ (4) $\rho(a)$ and $\rho(b)$ vs $k$, geometric (5) $e(a)$ and $e(b)$ vs $k$, geometric (6) $\rho(a)$ and $\rho(b)$ vs $k$, random (5) $e(a)$ and $e(b)$ vs random realization.} \label{figa} \end{center} \end{figure} Which kernel should be used for the recovery of $u$ when the conductivity $a$ is unknown? Consider the case when $d=1$ and $\Omega$ is the interval $(0,1)$. For $b\in \mathcal{L}^\infty(\Omega)$ with $\operatorname{essinf}_{\Omega}(b)>0$ write $G_b$ for the Green's function of the operator $-\operatorname{div}(b\nabla \cdot)$ mapping $\mathcal{H}^1_0(\Omega)$ to $\mathcal{H}^{-1}(\Omega)$. Observe that the $\{G_b|b\}$ is a set of kernels parameterized $b$ and any kernel in that set could be used to interpolate the data. Which one should we pick? The answer proposed in Sec. \ref{sec3} and \ref{secfamker} is to use the ordering induced by $\rho$ to select the kernel. \paragraph{Fig.~\ref{figa}} provides a numerical illustration of that ordering. In that example $\Omega$ is discretized over $2^8$ equally spaced interior points (and piecewise linear tent finite elements) and Fig.~\ref{figa}.1-3 shows $a$, $f$ and $u$. For $k\in \{1,\ldots,8\}$ and $i\in \mathcal{I}^{(k)}:=\{1,\ldots, 2^{k}-1\}$ let $x_i^{(k)}=i/2^k$ and write $v^{(k)}_b$ for the interpolation of the data $(x_i^{(k)},u(x_i^{(k)}))_{i\in \mathcal{I}^{(k)}}$ using the kernel $G_b$ (note that $v^{(8)}_b=u$). Let $\|v\|_b$ be the energy norm $\|v\|^2_b=\int_{\Omega}(\nabla v)^Tb \nabla v$. Take $b\equiv 1$. Fig.~\ref{figa}.4 shows (in semilog scale) the values of $\rho(a)=\frac{\|v^{(k)}_a-v^{(8)}_a\|_a^2}{\|v^{(8)}_a\|_a^2}$ and $\rho(b)=\frac{\|v^{(k)}_b-v^{(8)}_b\|_b^2}{\|v^{(8)}_b\|_b^2}$ vs $k$. Note that the value of ratio $\rho$ is much smaller when the kernel $G_a$ is used for the interpolation of the data. The geometric decay $\rho(a)\leq C 2^{-2k} \frac{\|f\|_{L^2(\Omega)}}{\|u\|_a^2}$ is well known and has been extensively studied in Numerical Homogenization \cite{OwhScobook2018}. Fig.~\ref{figa}.5 shows (in semilog scale) the values of the average prediction errors $e(a)$ and $e(b)$ (vs $k$) defined (after normalization) to be proportional to $\|v^{(k)}_a(x)-u(x)\|_{L^2(\Omega)}$ and $\|v^{(k)}_b(x)-u(x)\|_{L^2(\Omega)}$. Note again that the prediction error is much smaller when the kernel $G_a$ is used for the interpolation. Now let us consider the case where the interpolation points form a random subset of the discretization points. Take $N_f=2^7$ and $N_c=2^6$. Let $X=\{x_1,\ldots,x_{N_f}\}$ be a subset $N_f$ distinct points of (the discretization points) $\{i/2^{8}|i\in \mathcal{I}^{(8)}\}$ sampled with uniform distribution. Let $Z=\{z_1,\ldots,z_{N_c}\}$ be a subset of $N_c$ distinct points of $X$ sampled with uniform distribution. Write $v^f_b$ for the interpolation of the data $(x_i,u(x_i))$ using the kernel $G_b$ and write $v^c_b$ for the interpolation of the data $(z_i,u(z_i))$ using the kernel $G_b$. Fig.~\ref{figa}.6 shows in (semilog scale) $20$ independent random realizations of the values of $\rho(a)=\|v^f_a-v^c_a\|_a^2/\|v^f_a\|_a^2$ and $\rho(b)=\|v^f_b-v^c_b\|_b^2/\|v^f_b\|_b^2$. Fig.~\ref{figa}.7 shows in (semilog scale) $20$ independent random realizations of the values of the prediction errors $e(a)\propto\|u-v^c_a\|_{L^2(\Omega)}$ and $e(b)\propto\|u-v^c_b\|_{L^2(\Omega)}$. Note again that the values of $\rho(a), e(a)$ are consistently and significantly lower than those of $\rho(b), e(b)$. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/aguess} \caption{(1) $a$ and $b$ for $n=1$ (2) $a$ and $b$ for $n=350$ (2) $\rho(b)$ vs $n$ (4) $e(b)$ vs $n$.} \label{figaguess} \end{center} \end{figure} \paragraph{Fig.~\ref{figaguess}} provides a numerical illustration of an implementation of Alg.~\ref{alglearnkernel} with $N_f=N=2^7$, $N_c=2^6$ and $n_c=1$. In this implementation $a, f$ and $u$ are as in Fig.~\ref{figa}.1-3. The training data corresponds to $N_f$ points $X=\{x_1,\ldots,x_{N_f}\}$ uniformly sampled (without replacement) from $\{i/2^{8}|i\in \mathcal{I}^{(8)}\}$ (Since $N=N_f$ these points remain fixed during the execution the of the algorithm). $n$. The purpose of the algorithm is to learn the kernel $G_a$ in the set of kernels $\{G_{b(W)}|W\}$ parameterized by the vector $W$ via \begin{equation} \log b(W)=\sum_{i=1}^{2^6} (W^c_i \cos(2\pi i x )+ W^s_i \sin(2\pi i x))\,. \end{equation} Using $n$ to label its progression, Alg.~\ref{alglearnkernel} is initialized at $n=1$ with the guess $b\equiv 1$ (i.e. $W\equiv 0$) (Fig.~\ref{figaguess}.1). At each step ($n\rightarrow n+1$) the algorithm performs the following operations: \begin{enumerate} \item Select $N_c$ points $Z=\{z_1,\ldots,z_{N_c}\}$ uniformly sampled (without replacement) from $X$. \item Write $v^f_b$ and $v^c_f$ for the interpolation of the data $(x_i,u(x_i))$ and $(z_i,u(z_i))$ using the kernel $G_b$, and $\rho(W)=\|v^f_b-v^c_b\|_b^2/\|v^f_b\|_b^2$. Compute the gradient $\nabla_W \rho(W)$ using Cor.~\ref{corpropekjdhgud} (and the identity $\partial_{W_i}\Theta(W)= -\pi_0 (A_0(W))^{-1} \partial_{W_i} A_0(W) (A_0(W))^{-1} \pi_0^T $ for $\Theta(W)= \pi_0 (A_0(W))^{-1} \pi_0^T $). \item Update $W\rightarrow W-\lambda \nabla_W \rho(W)$ (with $\lambda\propto 0.01/\|\nabla_W \rho(W)\|_{L^2}$). \end{enumerate} Fig.~\ref{figaguess}.2 shows the value of $b$ for $n=350$. Fig.~\ref{figaguess}.3 shows the value of $\rho(b)$ vs $n$. Fig.~\ref{figaguess}.4 shows the value of the prediction error $e(b)\propto\|u-v^c_b\|_{L^2(\Omega)}$ vs $n$. The lack of smoothness of the plots of $\rho(b), e(b)$ vs $n$ originate from the re-sampling of the set $Z$ at each step $n$. \begin{comment} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/u7full} \caption{Multiresolution decomposition of the solution $u$ of \eqref{eqnscalarhgyprotgtoa}} \label{figu7full} \end{center} \end{figure} \end{comment} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/u7} \caption{$u$ and $u^{(k)}-u^{(k-1)}$. Number below sub-figures show relative energy content $\|u^{(k)}-u^{(k-1)}\|^2/\|u\|^2$. Used from forthcoming book \cite{OwhScobook2018} with permission from Cambridge University Press.} \label{figu7} \end{center} \end{figure} \begin{Remark} For $d\geq 1$, let $\Omega=(0,1)^d$ and for $k\geq 1$, let $\tau_i^{(k)}$ be a nested (in $k$) hierarchy of sub-cubes of $(0,1)^d$ with locations indexed by $i$. For $\mathcal{L}=-\operatorname{div}(a\nabla)$ let $\xi\sim \mathcal{N}(0,\mathcal{L}^{-1})$ and let $u^{(k)}:=\mathbb{E}[\xi\mid \int_{\tau_i^{(x)}}\xi = \int_{\tau_i^{(x)}}\xi u \text{ for all }i]$. Fig.~\ref{figu7} shows (for $d=2$) the corresponding increments $u^{(k)}-u^{(k-1)}$ and the relative energy content $\|u^{(k)}-u^{(k-1)}\|^2/\|u\|^2$ of each increment for a solution of \eqref{eqnscalarhgyprotgtoa} with $f\in L^2(\Omega)$. The quick decay of $\|u^{(k)}-u^{(k-1)}\|^2/\|u\|^2 $ with respect to $k$ illustrates the accuracy of the Green's function of \eqref{eqnscalarhgyprotgtoa} used as a kernel for interpolating partial linear measurements made on solutions of \eqref{eqnscalarhgyprotgtoa}. This numerical homogenization phenomenon \cite{OwhScobook2018, OwhadiMultigrid:2015} is one motivation for minimizing $\rho$ in the kernel identification problem described above ($\|u^{(k)}-u^{(k-1)}\|^2/\|u\|^2 \approx \rho_k$ with $\rho_k:=\|u^{(k)}-u^{(k-1)}\|^2/\|u^{(k)}\|^2$). \end{Remark} \section{Kernel Flows (KF)}\label{secKernelFlow} \subsection{Non parametric family of kernels and bottomless networks without guesswork} Composing a symmetric positive kernel with a function produces a symmetric positive kernel \cite{cristianini2000introduction}. We will now use this property to learn a kernel from the data within a non-parametric family of kernels constructed by composing layers of functions. For $n\geq 2$ let $G_n\,:\,{\bf\mathcal{X}}\rightarrow {\bf\mathcal{X}}$ (${\bf\mathcal{X}}$ is the input space mentioned Pb.~\ref{pb1}) be a sequence of functions determining the layers of this network. Let $\epsilon>0$ be a small parameter, let $F_1:=I_d$ be the identity function and for $n\geq 2$, let $F_n$ be the sequence of functions inductively defined by \begin{equation}\label{eqklejdhkdj} F_{n+1}=(I_d+\epsilon G_{n+1})\circ F_n\,. \end{equation} Let $K_n$ be the sequence of symmetric positive kernels obtained by composing a kernel $K_1$ with this sequence of functions, i.e. $K_n(x,x')=K_1(F_n(x),F_n(x'))$ and \begin{equation}\label{eqlkedjdldh} K_{n+1}(x,x')=K_n\big(x+\epsilon G_{n+1}(x),x'+\epsilon G_{n+1}(x')\big)\,. \end{equation} Our purpose is to use the training data $(x_1,y_1),\ldots,(x_N,y_N)\in {\bf\mathcal{X}} \times {\bf\mathcal{Y}}$ to learn the functions $G_1,\ldots,G_{n^*}$ and then approximate $u^\dagger$ with $u_{n^*}$ obtained by interpolating a subset of the training data with $K_{n^*}$. When applied to a classification problem with $n=1$ the proposed algorithm is a support-vector network (in the sense of \cite{cortes1995support}) with kernel $K_1$. As $n$ progresses the algorithm incrementally modifies the kernel via small perturbations of the identity operator ($\epsilon G_{n+1}$ is reminiscent of the residual term of deep residual networks \cite{he2016deep}). Since the training does not require any back propagation, achieving profound depths (with $10000$ layers or more) is not difficult (since training is akin to simulating a stochastic dynamical system the network is essentially bottomless) and one purpose of this section is to explore properties of such bottomless networks (see \cite{huang2017densely} for a review of the motivations/challenges associated with the exploration of very deep networks). \subsection{The algorithm}\label{refdklejdhhdkj} We will adapt Algorithm \ref{alglearnkernel} to learn the functions $G_1,\ldots,G_{n},\ldots$ by induction over $n$. As in Sec.~\ref{secfamker} let $N_f\leq N$ and $N_c=\operatorname{round}(N_f/2)$. \paragraph{ For $n=1$} let $x^{(n)}_i:=x_i$ for $i\in \{1,\ldots,N\}$. \paragraph{Let $n\geq 1$.} Assume $x^{(n)}_1,\ldots,x^{(n)}_N$ to be known. Let $s_{f,n}(1),\ldots,s_{f,n}(N_f)$ be $N_f$ distinct elements of $\{1,\ldots,N\}$ obtained through random sampling (with uniform distribution) without replacement. Let $s_{c,n}(1),\ldots,s_{c,n}(N_c)$ be $N_c$ distinct elements of $\{1,\ldots,N_f\}$ also obtained through random sampling (with uniform distribution) without replacement. Let $\pi$ be the corresponding $N_c\times N_f$ sub-sampling matrix defined by $ \pi_{i,j}^{(n)}=\delta_{s_{c,n}(i), j}$. Let $y_f^{(n)}\in \mathbb{R}^{N_f}$ and $y_c^{(n)}\in \mathbb{R}^{N_c}$ be the corresponding subvectors of $y$ defined by $y_{f,i}^{(n)}=y_{s_{f,n}(i)}$ and $y_{c,i}^{(n)}=y_{f,s_{c,n}(i)}$. For $i\in \{1,\ldots,N_f\}$ let $x^{(n)}_{f,i}:=x_{s_{f,n}(i)}^{(n)}$ and write $\Theta^{(n)}$ for the $N_f\times N_f$ matrix with entries \begin{equation} \Theta^{(n)}_{i,j}=K_1(x^{(n)}_{f,i},x^{(n)}_{f,j})\,, \end{equation} and let \begin{equation}\label{eqjhgjgyuyguy} \rho(n):=1-\frac{ (y_c^{(n)})^T(\pi^{(n)}\Theta^{(n)} (\pi^{(n)})^T)^{-1} y_c^{(n)}}{(y_f^{(n)})^T (\Theta^{(n)})^{-1} y_f^{(n)}}\,. \end{equation} Let $\hat{y}^{(n)}_f:=(\Theta^{(n)})^{-1} y_f^{(n)}$, $\hat{z}^{(n)}_f:= (\pi^{(n)})^T (\pi^{(n)}\Theta^{(n)}(\pi^{(n)})^T)^{-1}\pi^{(n)} y_f^{(n)}$ and for $i\in \{1,\ldots,N_f\}$ let \begin{equation}\label{eqkjjdjkhedhd} \begin{split} \hat{g}^{(n)}_{f,i}:=2\frac{(1-\rho(n)) \hat{y}^{(n)}_{f,i} (\nabla_x K_1)(x_{f,i}^{(n)},x_{f,\cdot}^{(n)}) \hat{y}^{(n)}_f - \hat{z}^{(n)}_{f,i} (\nabla_x K_1)(x_{f,i}^{(n)},x_{f,\cdot}^{(n)}) \hat{z}^{(n)}_f}{y_f^T (\Theta^{(n)})^{-1} y_f} \end{split} \end{equation} Let $G_{n+1}$ be the function obtained by interpolating the data $(x^{(n)}_{f,i}, \hat{g}^{(n)}_{f,i})$ with the kernel $K_1$, i.e. \begin{equation}\label{eqjhgyuygygtft} G_{n+1}(x)= (\hat{g}_{f,\cdot}^{(n)})^T \big(K_1(x_{f,\cdot}^{(n)},x_{f,\cdot}^{(n)})\big)^{-1} K_1(x_{f,\cdot}^{(n)},x)\,. \end{equation} Note that $G^{(n+1)}(x_{f,i}^{(n)})=\hat{g}^{(n)}_{f,i}$. For $i\in \{1,\ldots,N\}$, let \begin{equation} x^{(n+1)}_i=x^{(n)}_i+\epsilon G_{n+1}(x^{(n)}_i)\,. \end{equation} \begin{Remark}\label{rmkksjhddg7} In the description above the input space ${\bf\mathcal{X}}$ (of the function $u$ to be interpolated) is assumed to a finite-dimensional vector space and the output space ${\bf\mathcal{Y}}$ (of the function $u$ to be interpolated) is assumed to be contained in the real line $\mathbb{R}$. If the output space ${\bf\mathcal{Y}}$ is a finite-dimensional vector space (e.g. $\mathbb{R}^{d_{\bf\mathcal{Y}}}$) then $y_{f}^{(n)}$ and $y_{c}^{(n)}$ are $N_f\times d_{{\bf\mathcal{Y}}}$ and $N_c\times d_{{\bf\mathcal{Y}}}$ matrices and \eqref{eqjhgjgyuyguy} and \eqref{eqkjjdjkhedhd} must be replaced by \begin{equation}\label{eqjhgjgyuyguymod} \rho(n):=1-\frac{ \operatorname{Tr}\big[(y_c^{(n)})^T(\pi^{(n)}\Theta^{(n)} (\pi^{(n)})^T)^{-1} y_c^{(n)}\big]}{\operatorname{Tr}\big[(y_f^{(n)})^T (\Theta^{(n)})^{-1} y_f^{(n)}\big]}\,. \end{equation} and \begin{equation}\label{eqkjjdjkhedhdmod} \begin{split} \hat{g}^{(n)}_{f,i}:=2\frac{\operatorname{Tr}\big[(1-\rho(n)) \hat{y}^{(n)}_{f,i} (\nabla_x K_1)(x_{f,i}^{(n)},x_{f,\cdot}^{(n)}) \hat{y}^{(n)}_f - \hat{z}^{(n)}_{f,i} (\nabla_x K_1)(x_{f,i}^{(n)},x_{f,\cdot}^{(n)}) \hat{z}^{(n)}_f\big]}{\operatorname{Tr}\big[y_f^T (\Theta^{(n)})^{-1} y_f\big]}\,, \end{split} \end{equation} where, in \eqref{eqkjjdjkhedhdmod}, $\hat{y}^{(n)}_{f,i}\in \mathbb{R}^{d_{{\bf\mathcal{Y}}}}$, $\hat{y}^{(n)}_f\in \mathbb{R}^{N_f\times d_{{\bf\mathcal{Y}}}}$, $(\nabla_x K_1)(x_{f,i}^{(n)},x_{f,\cdot}^{(n)})\in \mathbb{R}^{d_{{\bf\mathcal{X}}}\times N_f}$ (writing $d_{\bf\mathcal{X}}$ for the dimension of the input space, $\nabla_x K_1$ refers to the gradient over the first component of $K_1$). The product results in a $d_{\bf\mathcal{Y}} \times d_{\bf\mathcal{X}} \times d_{{\bf\mathcal{Y}}}$ tensor and the trace (taken with respect to the $d_Y$ dimensions) results in a vector in $\mathbb{R}^{d_{\bf\mathcal{X}}}$, i.e. writing $x_s$ for the $s$th entry of $x$, $ (\hat{g}^{(n)}_{f,i})_s=2\frac{\sum_{l=1}^{d_{\bf\mathcal{Y}}}\sum_{t=1}^{N_f} (1-\rho(n)) (\hat{y}^{(n)}_{f})_{i,l} \partial_{x_s} K_1(x_{f,i}^{(n)},x_{f,t}^{(n)}) (\hat{y}^{(n)}_{f})_{t,l} - (\hat{z}^{(n)}_{f})_{i,l} \partial_{x_s} K_1(x_{f,i}^{(n)},x_{f,t}^{(n)}) (\hat{z}^{(n)}_f)_{t,l}}{\operatorname{Tr}\big[y_f^T (\Theta^{(n)})^{-1} y_f\big]} $. This simple modification (via the trace operator) is equivalent to endowing the space of functions $v=(v_1,\ldots,v_{d_{\bf\mathcal{Y}}})$ mapping ${\bf\mathcal{X}}$ to ${\bf\mathcal{Y}}$ with the RKHS norm $\|v\|^2=\sum_{i=1}^{d_{\bf\mathcal{Y}}} \|v_i\|^2 $ with $\|v_i\|^2= \sup_{\phi} \frac{(\int_{{\bf\mathcal{X}}} \phi(x) v_i(x)\,dx)^2}{\int_{{\bf\mathcal{X}}^2} \phi(x)K_n(x,x') \phi(x')\,dx\,dx' } $ and using that norm to compute $\rho$ and its gradient. \end{Remark} \subsection{Rationale of the algorithm}\label{secrat} Observe that the algorithm is randomized through the random samples $s_{f,n}(i)$ and $s_{c,n}(i)$ (taking values in the training data). Observe also that, given those random samples, the functions $G_n, F_n$ and kernels $K_n$ are entirely determined by the values of the learning parameters $\hat{g}^{(n)}_{f,i}=G^{(n+1)}(x_{f,i}^{(n)})$. As in Alg.~\ref{alglearnkernel}, the $\hat{g}^{(n)}_{f,i}$ are selected in \eqref{eqkjjdjkhedhd} in the direction of the gradient descent of the ratio $\rho$: we apply Prop.~\ref{propekjdhgud} to compute the Frech\'{e}t derivative of $\rho(n)$ \eqref{eqjhgjgyuyguy} with respect to small perturbations $x^{(n)}_{f,i}+\epsilon g^{(n)}_{f,i}$ to the $x^{(n)}_{f,i}$ and select the $g^{(n)}_{f,i}$ in the direction of the gradient descent. More precisely let $g^{(n)}_{f,i}$ be candidates for the values of $G^{(n+1)}(x_{f,i}^{(n)})$ and write $\tilde{x}^{(n+1)}_{f,i}=x^{(n)}_{f,i}+\epsilon g^{(n)}_{f,i}$. Write $\tilde{\Theta}^{(n+1)}$ for the $N_f\times N_f$ matrix with entries \begin{equation} \tilde{\Theta}^{(n+1)}_{i,j}=K_1(\tilde{x}^{(n+1)}_{f,i},\tilde{x}^{(n+1)}_{f,j})\,, \end{equation} and let \begin{equation}\label{eqjhgjgyuyguy2} \tilde{\rho}(n+1):=1-\frac{ (y_c^{(n)})^T(\pi^{(n)} \tilde{\Theta}^{(n+1)} (\pi^{(n)})^T)^{-1} y_c^{(n)}}{(y_f^{(n)})^T (\tilde{\Theta}^{(n+1)})^{-1} y_f^{(n)}}\,. \end{equation} Then the following proposition identifies $\hat{g}^{(n)}_{f,i}$ as the direction of the gradient descent of $\tilde{\rho}(n+1)$ with respect to the parameters $g^{(n)}_{f,i}$. \begin{Proposition}\label{propkjdhejdh} It holds true that \begin{equation} \tilde{\rho}(n+1)=\rho(n)-\epsilon \sum_{i=1}^{N_f} (g^{(n)}_{f,i})^T \hat{g}^{(n)}_{f,i} +\mathcal{O}(\epsilon^2)\,. \end{equation} where the $\hat{g}^{(n)}_{f,i}$ are as in \eqref{eqkjjdjkhedhd}. \end{Proposition} \begin{proof} We deduce from \eqref{eqlkedjdldh} that, to the first order in $\epsilon$, \begin{equation}\label{eqkhjeddgekjdh} \begin{split} K_{n+1}(x,x')\approx& K_n\big(x,x'\big)+\epsilon \big( (G_{n+1}\circ F_n(x))^T (\nabla_x K_1)\big( F_n(x),F_n(x') \\&+ (G_{n+1}\circ F_n(x'))^T (\nabla_{x'} K_1)\big( F_n(x),F_n(x')\big)\,. \end{split} \end{equation} Therefore, using the symmetry of $K_1$, we have \begin{equation} \tilde{\Theta}^{(n+1)}=\Theta^{(n)}+ \epsilon T^{(n)}+\mathcal{O}(\epsilon^2) \end{equation} with \begin{equation} T^{(n)}_{i,j}=(g^{(n)}_{f,i})^T (\nabla_x K_1)(x_{f,i}^{(n)},x_{f,j}^{(n)})+ (g^{(n)}_{f,j})^T (\nabla_{x} K_1)\big(x_{f,j}^{(n)},x_{f,i}^{(n)})\,. \end{equation} We deduce from Proposition \ref{propekjdhgud} that \begin{equation} \rho(\tilde{\Theta}^{(n+1)})=\rho(\Theta^{(n)})-\epsilon \frac{(1-\rho(\Theta^{(n)})) (\hat{y}^{(n)}_f)^T T^{(n)} \hat{y}_f^{(n)} - (\hat{z}_f^{(n)})^T T^{(n)} \hat{z}_f^{(n)} }{(\hat{y}_f^{(n)})^T \Theta^{(n)} \hat{y}_f^{(n)}}+\mathcal{O}(\epsilon^2)\,, \end{equation} which implies the result after simplification. \end{proof} The following corollary is a direct application of Prop.~\ref{propkjdhejdh}. \begin{Corollary}\label{corfkjhfkfhjf} Let $K_1(x,x')=e^{-\gamma |x-x'|^2}$. It holds true that \begin{equation} \rho(\tilde{\Theta}^{(n+1)})=\rho(\Theta^{(n)})-\epsilon \sum_{i=1}^{N_f} (g^{(n)}_i)^T \hat{g}^{(n)}_i +\mathcal{O}(\epsilon^2)\,. \end{equation} with $\hat{g}^{(n)}_i:=\frac{4\gamma}{(y_f^{(n)})^T (\Theta^{(n)})^{-1} y_f^{(n)}} \sum_{j=1}^{N_f} \Gamma^{(n)}_{i,j}x^{(n)}_{f,j} $, \begin{equation} \begin{split} \Gamma^{(n)}_{i,j}=&\delta_{i,j} \hat{z}^{(n)}_{f,i} (\Theta^{(n)} \hat{z}^{(n)})_{f,i} -\hat{z}^{(n)}_{f,i} \Theta^{(n)}_{i,j} \hat{z}^{(n)}_{f,j}\\ &- (1-\rho(\Theta^{(n)})) \delta_{i,j} \hat{y}^{(n)}_{f,i} y_{f,i}^{(n)}+(1-\rho(\Theta^{(n)})) \hat{y}^{(n)}_{f,i} \Theta^{(n)}_{i,j} \hat{y}^{(n)}_{f,j}\,. \end{split} \end{equation} and $\hat{z}^{(n)}_f= (\pi^{(n)})^T (\pi^{(n)}\Theta^{(n)}(\pi^{(n)})^T)^{-1}\pi^{(n)} y_f$, $\hat{y}^{(n)}_f=(\Theta^{(n)})^{-1} y_f^{(n)}$. \end{Corollary} \begin{figure}[h] \begin{center} \includegraphics[width= 0.5\textwidth]{./fig/swissroll1} \caption{Swiss Roll Cheesecake. $N=100$. Red points have label $-1$ and blue points have label $1$.} \label{figswissroll1} \end{center} \end{figure} \section{The Flow of the KF algorithm on the Swiss Roll cheesecake}\label{subseccheesecake} From a numerical analysis perspective, the flow $F_n(x)$ associated with the Sec.~\ref{secKernelFlow} KF algorithm approximates, in the sense of Smoothed Particle Hydrodynamics \cite{gingold1977smoothed}, a flow $F(t,x)$ mapping $\mathbb{R} \times {\bf\mathcal{X}}$ into ${\bf\mathcal{X}}$. Writing $x_i$ for the $N$ training data points in ${\bf\mathcal{X}}$, as $\epsilon\downarrow 0$, $F_n(x_i)$ approximates $X_i(t):=F(t,x_i)$ which (after averaging the effect of the randomized batches) can be identified as the solution of a system of ODEs of the form \begin{equation}\label{eqkjehdghdjh} \frac{d X}{dt} = \mathcal{G}(X, N, N_f, K_1)\,. \end{equation} \subsection{Implementation of the KF algorithm} We will now explore a few properties of this approximation by implementing the KF algorithm for the Swiss Roll Cheesecake illustrated in Fig.~\ref{figswissroll1}. The dataset is composed of $N=100$ points $x_i$ in $\mathbb{R}^2$ in the shape of two concentric spirals. Red points have label $-1$ and blue points have label $1$. Since our purpose is limited to illustrating properties of the discrete flow $F_n(x)$ associated with the Kernel Flow algorithm we will consider all those points as training points (will not introduce a test dataset) and visualise the trajectories $n\rightarrow F_n(x_i)$ of the data points $x_i$. The KF algorithm is implemented with the Gaussian kernel of Corollary \ref{corfkjhfkfhjf} with $\gamma^{-1}=4$. Training is done in random batches of size $N_f$ and we use $N_c=N_f/2$ to compute the ratio $\rho$ and learn the parameters of the network. We start with $N_f=N$ and as training progresses points of the same color start merging. Therefore to avoid near singular matrices caused by batches with points of the same color sharing nearly identical coordinates, once the distance between two points of the same color is smaller than $10^{-4}$ (in Fig.~\ref{figswissroll2}, \ref{figswissroll3} and \ref{figswissroll4}) we drop one of them out of the set of possible candidates for the batch and decrease $N_f$ by $1$ (the point left out remains advected by $\epsilon G_{n+1}$ but is simply no longer available as an interpolation point defining $G_{n+1}$). Fig.~\ref{figswissroll2} shows $F_n(x_i)$ vs $n$ for $1\leq n \leq 7000$. In Fig.~\ref{figswissroll2} the value of $\epsilon$ is chosen at each step $n$ so that the perturbation of each data point $x_i$ of the batch is no greater than $p\%$ with $p=10$ for $1\leq n \leq 1000$ and $p=10/\sqrt{n/1000}$ for $n\geq 1000$. The two spirals quickly unroll into two linearly separable clusters. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/swissroll3} \caption{$F_n(x_i)$ for 8 different values of $n$. $\epsilon$ is chosen at each step $n$ so that the perturbation of each data point $x_i$ of the batch is no greater than $0.5\%$.} \label{figswissroll3} \end{center} \end{figure} Fig.~\ref{figswissroll3} shows $F_n(x_i)$ vs $n$ for $1\leq n \leq 500000$. The value of $\epsilon$ is chosen at each step $n$ so that the perturbation of each data point $x_i$ of the batch is no greater than $0.5\%$. The two intertwined spirals unroll into straight (vibrating) segments. The final unrolled configuration appears to be unstable (some red points are ejected out of the unrolled red segment towards the end of the simulation) and although this instability seems to be alleviated by adjusting $\epsilon$ to a smaller value at the end of the simulation it seems to also be caused by a combination of (1) the stiffness of the flow being simulated (2) the process of permanently removing points from the pool of possible candidates for the batch. Although these points remain advected by the flow and are initially at distance less than $10^{-4}$ of a point of the same color, the stiffness of the flow can quickly increase this distance and separate the point from its group if $\epsilon$ is not small enough. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/swissroll4} \caption{$N=250$. $F_n(x_i)$ for 8 different values of $n$. $\epsilon$ is chosen at each step $n$ so that the absolute perturbation of each data point $x_i$ of the batch is no greater than $0.05$. $K_1(x,x')=e^{-\gamma |x-x'|^2}+\delta(x-x') e^{-\gamma 6^2}$} \label{figswissroll4} \end{center} \end{figure} \subsection{Addition of nuggets} The instabilities observed in Fig.~\ref{figswissroll3} seem to vanish (even with significantly larger values of $\epsilon$) after the addition of a nugget (white noise kernel accounting for measurement noise in kriging) to the kernel $K_1$. In Fig.~\ref{figswissroll4} we consider a longer version of the Swiss Roll Cheesecake ($N=250$). The kernel is $K_1(x,x')=e^{-\gamma |x-x'|^2}+\delta(x-x') e^{-\gamma 6^2}$ ($\gamma^{-1}=4$). $\epsilon$ is chosen at each step $n$ so that the absolute perturbation (maximum translation) of each data point $x_i$ of the batch is no greater than $0.05$. Fig.~\ref{figswissroll4} shows $F_n(x_i)$ vs $n$ for $1\leq n \leq 500000$. The two intertwined spirals unroll into stable clusters slowly drifting away from each other. \begin{figure}[!htb] \begin{center} \includegraphics[width= \textwidth]{./fig/swissroll5} \caption{$F_n(x_i)$ and decision boundary for 8 different values of $n$. } \label{figswissroll5} \end{center} \end{figure} \begin{figure}[!htb] \begin{center} \includegraphics[width= \textwidth]{./fig/swissroll6} \caption{ Instantaneous velocity field $F_{n+1}(x)-F_n(x)$. (1-4) show $4$ successive values. (5) shows the instantaneous velocity field for the final configuration. } \label{figswissroll6} \end{center} \end{figure} \subsection{Instantaneous and average vector fields} With the addition of the nugget, the permanent removal of close points from the pool of candidates is no longer required for avoiding singular matrices. In Fig.~\ref{figswissroll5}, \ref{figswissroll6} and \ref{figswissroll7} (see \cite{youtubevideokf} for videos) we consider the $N=100$ version of the Swiss Roll Cheesecake. The kernel is $K_1(x,x')=e^{-\gamma |x-x'|^2}+\delta(x-x') e^{-\gamma 6^2}$ ($\gamma^{-1}=4$). $\epsilon$ is chosen at each step $n$ so that the absolute perturbation (maximum translation) of each data point $x_i$ of the batch is no greater than $0.2$. Only a nugget is added and close points are not removed from the pool of candidates (which eliminates the instabilities observed in Fig.~\ref{figswissroll3}). Fig.~\ref{figswissroll5} shows $F_n(x_i)$ vs $n$ for $1\leq n \leq 180000$ and the decision boundary between the two classes vs $n$. The two intertwined spirals unroll into stable clusters. Fig.~\ref{figswissroll6} shows the instantaneous velocity field $F_{n+1}(x)-F_n(x)$. Fig.~\ref{figswissroll7} shows the average velocity field $10(F_{n+300}(x)-F_n(x))/300$. The difference between the instantaneous and average velocity fields is and indication of the presence of multiple time scales caused by the randomization process and the stiffness of the underlying flow. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/swissroll7} \caption{Average velocity field $10(F_{n+300}(x)-F_n(x))/300$ for 5 different values of $n$. } \label{figswissroll7} \end{center} \end{figure} \subsection{The continuous flow.} The intriguing behavior of these flows, calls for their investigation from the a numerical integration perspective (note that an ODE perspective emerges as $\epsilon \downarrow 0$, an SDE perspective is relevant when $\epsilon$ is non-null due to the randomization of the batches, a PDE perspective emerges as $\epsilon \downarrow 0$ and $N\rightarrow \infty$, and an SPDE approximation perspective is relevant when $\epsilon$ is non-null and $N$ is finite). Note that the KF flow $F_n(x)$ can be seen (as $\epsilon \downarrow 0$) as the numerical approximation of a continuous flow $F(t,x)$. identified as the solution of the dynamical system \begin{equation}\label{eqkrhuhgtdjh0} \frac{\partial F(t,x)}{\partial t} = - \mathbb{E}_{X, \pi}\Bigg[ \Big(\big(\nabla_Z \rho(X,Z,\pi)\big)^T \big(K_1(Z,Z)\big)^{-1} K_1\big(Z,x\big)\Big) \Bigg\rvert_{Z=F(X,t)}\Bigg]\,, \end{equation} with initial condition $F(0,x)=x$ and where the elements of \eqref{eqkrhuhgtdjh0} are defined as follows. $X$ is a random vector of ${\bf\mathcal{X}}^{N_f}$ representing the random sampling of the training data in a batch size $N_f$. Writing $u(X)\in {\bf\mathcal{Y}}^{N_f}$ for the vector whose entries are the labels of the entries of $X\in {\bf\mathcal{X}}^{N_f}$ and $\pi$ for a random $N_c\times N_f$ matrix corresponding to the selection of $N_c$ elements at out $N_f$ (at random, uniformly, without replacement), $\rho$, in \eqref{eqkrhuhgtdjh0}, is defined as follows \begin{equation}\label{eqkertdjh0} \rho(X,Z,\pi) = 1- \frac{ u( X)^T \pi^T (K_1(\pi Z, \pi Z))^{-1}\pi u(X) }{u(X)^T (K_1(Z,Z))^{-1}u(X)}\,. \end{equation} The average vector field in Fig.~\ref{figswissroll7} is an approximation of the right hand side of \eqref{eqkrhuhgtdjh0} and the convergence of $F_{\textrm{round}(t/\epsilon)}(x)$ towards $F(t,x)$ as $\downarrow 0$ is in the sense of two-scale flow convergence described in \cite{tao2010nonintrusive}. \begin{table}[h] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline $N_I$ & Average error & Min error & Max error & Standard Deviation \\ \hline $6000$ & $0.014$ & $0.0136 $ & $0.0143 $ & $1.44 \times 10^{-4}$\\ \hline $600$ & $0.014$ & $0.0137$ & $0.0142 $ & $9.79\times 10^{-5}$ \\ \hline $60$ & $0.0141$ & $0.0136$ & $0.0146$ & $2.03\times 10^{-4}$ \\ \hline $10$ & $0.015$ & $0.0136$ & $0.0177$ & $7.13\times 10^{-4}$\\ \hline \end{tabular} \caption{MNIST test errors using $N_I$ interpolation points}\label{table1} \end{center} \end{table} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/mnist1} \caption{Results for MNIST. $N=60000$, $N_f=600$ and $N_c=300$. (1) Test error vs depth $n$ with $N_I=6000$ (2) Test error vs depth $n$ with $N_I=600$ (3) Test error vs depth $n$ with $N_I=60$ (4) Test error vs depth $n$ with $N_I=10$ (5,6) Test error vs depth $n$ with $N_I=6000, 600, 60, 10$ (7) $\rho$ vs depth $n$ (8) Mean-squared distances between images $F_n(x_i)$ (all, inter class and in class) vs depth $n$ (9) Mean-squared distances between images (all) vs depth $n$ (10) Mean-squared distances between images (inter class) vs depth $n$ (11) Mean-squared distances between images (in class) vs depth $n$ (12) Ratio $(10)/(11)$. } \label{figmnist1} \end{center} \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/mnist2} \caption{Results for MNIST. $N=60000$, $N_f=600$ and $N_c=300$. (1, 3, 5) Training data $x_i$ (2, 4, 6) $F_n(x_i)$ for $n=12000$ (7) $F_n(x_i)-x_i$ for training data and $n=12000$ (8) Test data $x_i$ (9) $F_n(x_i)$ for test data and $n=12000$ (10) $F_n(x_i)-x_i$ for test data and $n=12000$. } \label{figmnist2} \end{center} \end{figure} \section{Numerical experiments with the MNIST dataset}\label{kfmnist} We will now implement, test and analyze the Sec.~\ref{secKernelFlow} KF algorithm on the MNIST dataset \cite{yann1998mnist}. This training set is composed of $60000$, $28\times 28$ images of handwritten digits (partitioned into $10$ classes) with a corresponding vector of $60000$ labels (with values in $\{1,\ldots,9, 0\}$). The test set is composed of $10000$, $28\times 28$ images of handwritten digits with a corresponding vector of $10000$ labels. \subsection{Learning with small random batches of the full training dataset.}\label{subsecwdgejkhdgjd} We first implement the Sec.~\ref{secKernelFlow} KF algorithm with the full training set, i.e. $N=60000$. Images are normalized to have $L^2$ norm one and we use the Gaussian kernel of Corollary \ref{corfkjhfkfhjf} and set $\gamma^{-1}$ equal to the mean squared distance between training images. Training is performed in random batches of size $N_f=600$ and we use $N_c=300$ to compute the ratio $\rho$ and learn the parameters of the network (we do not use a nugget and we do not exclude points that are too close from those batches). The value of $\epsilon$ is chosen at each step $n$ so that the perturbation of each data point $x_i$ of the batch is no greater than $1\%$ ($\epsilon=0.01\times \max_i \frac{ |x^{(n)}_{f,i}|_{L^2}}{|\hat{g}^{(n)}_{f,i}|_{L^2}}$). Classification of the test data is performed by interpolating a subset of $N_I$ images/labels $(x_i,y_i)$ of the training data with the kernel $K_n$ (the kernel at step/layer $n$ in the Sec.~\ref{refdklejdhhdkj} Kernel Flow algorithm). Here each $x_i$ is a $28\times 28$ image and each $y_i$ is a unit vector $e_j$ in $\mathbb{R}^{10}$ pointing in the direction of the class of the images (e.g. $y_i=(1,0,0,0,0,0,0,0,0,0)=e_1$ if the class of image $x_i$ is $j=1$ and $y_i=(0,0,0,0,0,0,0,0,0,1)=e_{10}$ if the class of image $x_i$ is $j=0$). The interpolant $u_n$ is a function from $\mathbb{R}^{28\times 28}$ to $\mathbb{R}^{10}$ and the class of an image $x$ is simply identified as $\operatorname{argmax}_{j} e_j^T \cdot u_{n}(x)$. The Sec.~\ref{refdklejdhhdkj} Kernel Flow algorithm is implemented (using Remark \ref{rmkksjhddg7}) with $N=60000$, $N_f=600$ and $N_c=300$ and ended for $n=12000$ (resulting in a network with $12000$ layers). Table \ref{table1} shows test errors (with the test data composed of $10000$ images) obtained with $N_I=6000, 600, 60$ and $10$ interpolation points (selected at random uniformly without replacement and conditioned on containing an equal number of example from each class to avoid degeneracy for $N_I=10, 60$). The second column shows errors averaged over the last $100$ layers of the network (i.e. obtained by interpolating the $N_I$ data points with $K_n$ for $n=11901, 11902, \ldots, 12000$). The third, fourth and fifth columns show the min, max and standard deviation of the error over the same last $100$ layers of the network. Surprisingly, around layer $n=12000$, the kernel $K_n$ achieves an average error of about $1.5\%$ with only $10$ data points (by using only 1 random example of each digit as an interpolation point). Multiple runs of the algorithm suggest that those results are stable. Fig.~\ref{figmnist1} shows test errors vs depth $n$ (with $N_I=6000, 600, 60, 10$ interpolation points), the value of the ratio $\rho$ vs $n$ (computed with $N_f=600$ and $N_c=300$) and the mean squared distances between (all, inter class and in class) images $F_n(x_i)$ vs $n$. Observe that all mean-squared distances increase until $n\approx 7000$. After $n\approx 7000$ the in class mean-squared distances decreases with $n$ whereas the inter-class mean-squared distances continue increasing. This suggests that after $n\approx 7000$ the algorithm starts clustering the data per class. Note also that while the test errors, with $N_I=6000,600$ interpolation points, decrease immediately and sharply, the test errors with $N_I=10$ interpolation points increase slightly until $n\approx 3000$ towards $60\%$, after which they drop and seem to stabilize around $1.5\%$ towards $n\approx 10000$. It is known that iterated random functions typically converge because they are contractive on average \cite{diaconis1999iterated,dunlop2017deep}. Here training appears to create iterated functions that are contractive with each class but expansive between classes. Fig.~\ref{figmnist2} shows $10\times x_i$ and $10\times F_n(x_i)$ and $20\times (F_n(x_i)-x_i)$ for $n=12000$, training images and test images. The algorithm appears to introduce small, archetypical, and class dependent, perturbations in those images. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/2and4} \caption{(1) Test error vs $n$ (2) $\rho$ vs $n$ (3) $x_i$ and $F_n(x_i)$ for $n=8000$ and $i$ corresponding to the first 12 training images (4) $x_i$ and $F_n(x_i)$ for $n=8000$ and $i$ corresponding to the first 12 test images. MNIST with classes $2$ and $4$, $600$ training images and $100$ test images.} \label{fig2and4} \end{center} \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/fullmnist} \caption{MNIST with all classes, $1200$ training images and $2000$ test images. (1) Test error vs $n$ (2) $\rho$ vs $n$ (3) Training images $x_i$ (4) $10\times \operatorname{abs}(F_n(x_i)-x_i)$ for $n=900$ } \label{fullmnist} \end{center} \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/2and4modecollapse} \caption{MNIST with classes $2$ and $4$, $600$ training images and $100$ test images. Step sizes are too large, $\rho$ decreases but the modes collapse. (1) $x_i$ and $F_n(x_i)$ for $n=1,100, 1800$ and $i$ corresponding to the first 12 training images (2) $x_i$ and $F_n(x_i)$ for $n=1, 100, 1800$ and $i$ corresponding to the first 12 test images (3) $\rho$ vs $n$ (4) Test error vs $n$} \label{fig2and4modecollapse} \end{center} \end{figure} \subsection{Bootstrapping, Brittleness and Data Archetypes}\label{subsecboot} In Sec.~\ref{subsecwdgejkhdgjd} we used the whole training set of $N=60000$ images to train our network and Fig.~\ref{figmnist1}. Although the accuracy the network increases (between $n=1$ and $n=12000$) when using only $N_I=6000, 600, 60, 10$ interpolation points, the accuracy of the network with $N_I=60000$ (the full training set as interpolation points) does not seem to be significantly impacted by the training (the error with $N_I=60000$ is $0.0128$ at $n=1$ and $n=0.0144$ at $n=12000$). In that sense, all the algorithm seems to do is to transfer the information contained in the $60000$ data-points to the kernel $K_n$. Can the accuracy of the interpolation with the full training set be improved? Can the algorithm extract information that cannot already be extracted by performing a simple interpolation (with a simple Gaussian kernel) with the full training dataset? To answer these questions we will now implement the Sec.~\ref{refdklejdhhdkj} Kernel Flow algorithm with subsets of training and test images and train the network with $N_f=N$ (the size of each batch is equal to the total number of training images), $N_c=N_f/2$ and possibly subsets of the set of all classes. We work with raw images (not normalized to have $L^2$ norm one). We use the Gaussian kernel of Corollary \ref{corfkjhfkfhjf} and identify $\gamma^{-1}$ as the mean squared distance between training images. We first take $N=600$ ($600$ training images) showing only twos and fours and attempt to classify $100$ test images (with only twos and fours). Fig.~\ref{fig2and4} corresponds to a successful outcome (with small adapted step sizes $\epsilon$) and shows the test error vs depth $n$, $\rho$ vs $n$ and $x_i$ and $F_n(x_i)$ for $n=8000$. These illustrations suggest that the network can bootstrap data and improve accuracy by introducing small (nearly imperceptible to the naked eye) perturbations to the dataset. Fig.~\ref{fullmnist} shows another successful run with $N=1200$ training images, $1200$ test images and the full set of $10$ classes. \paragraph{Mode collapse from going too deep, too fast, with $N_f=N$.} Fig.~\ref{fig2and4modecollapse} shows a failed outcome (with very large step sizes $\epsilon$, the other parameters are the same as in Fig.~\ref{fig2and4}). Although the ratio $\rho$ decreases during training the error blows up towards $50\%$ and the $F_n(x_i)$ seem to collapse towards two images: a four and a random blur. We will explain and analyze this mode collapse below. \subsection{Mode collapse, brittleness of deep learning} The mode collapse observed in Fig.~\ref{fig2and4modecollapse} is interesting for several reasons. First it shows that a decreasing $\rho$ is not sufficient to ensure generalization and learning. Indeed writing $w$ for a function exactly interpolating (fitting) the training data the kernel $K_w(x,y)=w(x)w(y)$ would lead to a perfect fit (and hence a value $\rho=0$) of the training set with any number of interpolation points (and in particular one). Although this $K_w$ is positive but degenerate, if the space of kernels explored by the algorithm is large enough, then, unless $N_f\ll N$, it is not clear what would prevent the algorithm from over-fitting and converging towards those pathological kernels. The brittleness of deep learning \cite{szegedy2013intriguing} is a well known phenomenon predicted \cite{MMckerns2013} from the brittleness of doing inference in large dimensional spaces \cite{OSS:2013, OwhadiScovel:2013, owhadiBayesiansirev2013, owhadi2017qualitative}. The mechanisms at play in \cite{owhadiBayesiansirev2013} suggest that those instabilities may be unavoidable if the inference space is too large and could to some degree be alleviated through a compromise between accuracy and robustness \cite{owhadi2017qualitative}. From that perspective the learning of the Green's function in Sec.~\ref{secjhdkhj33} appears to be stable because of strong constraints imposed on the space of kernels (by the structure of the underlying PDE). In Sec.~\ref{subsecwdgejkhdgjd} the difference in size between the training dataset ($N$) and that of the batches ($N_f$) seems to have a stabilizing effect on the algorithm. The pathologies observed in Fig.~\ref{fig2and4modecollapse}, and mechanisms leading to brittleness \cite{OSS:2013, OwhadiScovel:2013, owhadiBayesiansirev2013, owhadi2017qualitative, miller2018robust} seem to suggest that will small data sets and a large space of admissible kernels instabilities may occur and could be alleviated by introducing further constraints on the space of kernels. \subsection{Classification archetypes} The brittleness of deep learning \cite{OSS:2013, szegedy2013intriguing} has lead to the construction of libraries of adversarial examples whose persistence in the physical work \cite{kurakin2016adversarial} be exploited by an adversary \cite{huang2011adversarial}. These adversarial examples are constructed via small (near-undetectable to the naked eye) data-dependent (non-random) perturbations of the original images. The Kernel Flow algorithm seems to exploit the brittleness of deep learning in the opposite direction (towards improved performance), i.e. as suggested in Fig.~\ref{figmnist2} and \ref{fig2and4} the Kernel Flow algorithm seems to improve performance through the construction of residual maps introducing small (data-dependent) perturbations to the original images. The resulting images $F_n(x_i)$ at profound depths could be interpreted as archetypes of the classes being learned. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/mine2} \caption{Minimizing mean squared interpolation error rather than $\rho$ may not lead to generalization for KF. (1) Mean squared interpolation error $e_2(n)$ calculated with random subsets of the training data ($N_f=600$ and $N_c=300$) (2) Mean squared interpolation error $e_2(n)$ calculated with the test data ($N_I=6000$) (3) Classification accuracy (using $N_I=6000$ interpolation points and all $10000$ test data points) vs $n$ (4) Classification accuracy (using $N_I=600$ interpolation points and all $10000$ test data points) vs $n$.} \label{figmine2} \end{center} \end{figure} \subsection{On generalization} Why the KF algorithm does not seem to overfit the data? Why is it capable of generalization? From an initial perspective the KF algorithm appears to promote generalization by grouping data points into clusters according to their classes. However the reason for its generalization properties appears to be more subtle and defining $\rho$ through the RKHS norm seems to also play a role (minimizing $\rho$ by aligning the eigensubpace corresponding to the lowest eigenvalues of the kernel with the training data.). Indeed, using the notations of Sec.~\ref{secKernelFlow}, let $v(x_{f,i}^{(n)})$ be the predicted labels of the $N_f$ points $x_{f,i}^{(n)}$ obtained by interpolating a random subset of $N_c=N_f/2$ points $(x_i,y_i)$ with the kernel $K_1$ and write $e_2:=\sum_{i=1}^{N_f} |y_{f,i}^{(n)}- v(x_{f,i}^{(n)})|^2 $ for the mean squared error between training labels and predicted labels. Then minimizing $e_2$ instead of $\rho$ may lead to a decreasing test classification accuracy rather than an increasing one as shown in Fig.~\ref{figmine2} (using the MNIST dataset with $N=60000$ training points, $10000$ test points, $N_f=600$, $N_c=300$ for the random batches and $N_I=600, 6000$ interpolation points for calculating classification accuracies). Note that although the mean squared interpolation error decreases for the training and the test data, the classification error (on the 10000 test data points of MNIST using 6000 interpolation points) increases. \begin{table}[h] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline $N_I$ & Average error & Min error & Max error & Standard Deviation \\ \hline $6000$ & $0.0969 $&$ 0.0944 $&$ 0.1 $&$ 7.56 \times 10^{-4}$\\ \hline $600$ & $0.0977 $&$ 0.0951 $&$ 0.101 $&$ 8.57 \times 10^{-4}$ \\ \hline $60$ & $0.114 $&$ 0.0958 $&$ 0.22 $&$ 0.0169 $ \\ \hline $10$ & $0.444 $&$ 0.15 $&$ 0.722 $&$ 0.096 $\\ \hline \end{tabular} \caption{Fashion-MNIST test errors (between layers $15000$ and $25000$) using $N_I$ interpolation points}\label{tablef1} \end{center} \end{table} \begin{table}[h] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline $N_I$ & Average error & Min error & Max error & Standard Deviation \\ \hline $6000$ & $0.10023 $ & $ 0.0999 $&$ 0.1006 $&$ 1.6316\times 10^{-4}$\\ \hline $600$ & $0.10013 $&$ 0.0999 $&$ 0.1004 $&$ 1.1671\times 10^{-4}$ \\ \hline $60$ & $0.10018 $&$ 0.0999 $&$ 0.1005 $&$ 1.445 \times 10^{-4}$ \\ \hline $10$ & $0.10018 $&$ 0.0996 $&$ 0.1009 $&$ 2.2941 \times 10^{-4}$\\ \hline \end{tabular} \caption{Fashion-MNIST test errors (between layers $49901$ and $50000$) using $N_I$ interpolation points}\label{tablef2} \end{center} \end{table} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/fmnist0} \caption{Results for Fashion-MNIST. $N=60000$, $N_f=600$ and $N_c=300$. (1) Test error vs depth $n$ with $N_I=6000$ (2) Test error vs depth $n$ with $N_I=600$ (3) Test error vs depth $n$ with $N_I=60$ (4) Test error vs depth $n$ with $N_I=10$ (5,6) Test error vs depth $n$ with $N_I=6000, 600, 60, 10$ (7) $\rho$ vs depth $n$ (8) Mean-squared distances between images $F_n(x_i)$ (all, inter class and in class) vs depth $n$ (9) Mean-squared distances between images (all) vs depth $n$ (10) Mean-squared distances between images (inter class) vs depth $n$ (11) Mean-squared distances between images (in class) vs depth $n$ (12) Ratio $(10)/(11)$. } \label{figfmnist0} \end{center} \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/fmnist1} \caption{Results for Fashion-MNIST. $N=60000$, $N_f=600$ and $N_c=300$. (1) Training data $x_i$ (2) $F_n(x_i)$ training data and $n=50000$ (3) Test data $x_i$ (9) $F_n(x_i)$ for test data and $n=50000$. } \label{figfmnist1} \end{center} \end{figure} \section{Numerical experiments with the Fashion-MNIST dataset} We now implement and test the Sec.~\ref{secKernelFlow} KF algorithm with the Fashion-MNIST dataset \cite{xiao2017fashion}. As with the MNIST dataset \cite{yann1998mnist}, the Fashion-MNIST dataset is composed of $60000$, $28\times 28$ images portioned into $10$ classes (T-shirt/top, trouser, pullover, dress, coat, sandal, shirt, sneaker, bag, ankle boot) with a corresponding vector of $60000$ labels (with values in $\{0,\ldots,9\}$). The test set is composed of $10000$, $28\times 28$ images of handwritten digits with a corresponding vector of $10000$ labels. \subsection{Network trained to depth $n=50000$}\label{subsec82782} The KF algorithm is implemented with the exact same parameters as for the MNIST dataset (Sec.~\ref{subsecwdgejkhdgjd}, in particular it does not require any manual tuning of hyperparameters nor a laborious process of guessing an architecture for the network). In particular, images are normalized to have $L^2$ norm one we use the Gaussian kernel of Corollary \ref{corfkjhfkfhjf} and set $\gamma^{-1}$ equal to the mean squared distance between training images. Training is performed in random batches of size $N_f=600$ and we use $N_c=300$ to compute the ratio $\rho$ and learn the parameters of the network (we do not use a nugget and we do not exclude points that are too close from those batches). The value of $\epsilon$ is chosen at each step $n$ so that the perturbation of each data point $x_i$ of the batch is no greater than $1\%$ ($\epsilon=0.01\times \max_i \frac{ |x^{(n)}_{f,i}|_{L^2}}{|\hat{g}^{(n)}_{f,i}|_{L^2}}$). The network is trained to depth $n=50000$. Table \ref{tablef1} shows test error statistics (on the full test dataset) using the kernel $K_n$ for $15000 \leq n\leq 25000$ and $N_I=6000, 600, 60, 10$ interpolation points. Table \ref{tablef2} shows test error statistics (on the full test dataset) using the kernel $K_n$ for $49901 \leq n\leq 50000$ and $N_I=6000, 600, 60, 10$ interpolation points. Fig.~\ref{figfmnist0} plots test errors vs $n$ using $N_I=6000, 600, 60, 10$ interpolation points and shows average distances between $F_n(x_i)$ vs $n$ (for $x_i$ selected uniformly at random amongst all training images, within the same or in different classes). Note that although the network achieves an average test error of $9.7\%$ between layers $15000$ and $25000$ with $N_I=600$, average test errors for $N_I=60, 10$ interpolation points require a depth of more than $37000$ layers to achieve comparable accuracies. Note that the average error around layer $50000$ with $N_I=10$ interpolation points is $10\%$ and does not seem to significantly depend on $N_I$. The average error ($\approx 9.7\%$) of the classifier with $N_I=600, 6000$ interpolation points between layers $15000$ and $25000$ and the slight increase of average test errors with $N_I=600, 6000$ interpolation points between layers $25000$ and $50000$ (from $\approx 9.7\%$ to $\approx 10\%$) seem to decrease with the value of $\epsilon$. \eqref{eqklejdhkdj} could be interpreted an underlying stochastic differential equation with an explicit scheme with time steps $\epsilon$ and the efficiency of the resulting classifier seems to improve as $\epsilon \downarrow 0$. Note from Fig.~\ref{figfmnist0}.(8-12), \ref{figfmnist1} and \ref{figfmnist2} that $F_n(x_i)$ converges towards an archetype of the class of $x_i$ and that (after layer $n\approx 25000$) the KF algorithm contracts distances within each class while continuing to expand distances between different classes. Interpolation with $K_1$ and all $N_I=N=60000$ training points used as interpolation points results in $12.75\%$ test error and interpolation with $K_n$ with $n=50000$ and all $N_I=N=60000$ training points used as interpolation points results in $10\%$ test error. Therefore the KF algorithm appears to bootstrap information contained in the training data in the sense discussed in Sec.~\ref{subsecboot}. \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/shoes} \caption{Results for Fashion-MNIST. $N=60000$, $N_f=600$ and $N_c=300$. Left: Training data $x_i$ for class $5$. Right: $F_n(x_i)$ training data and $n=11000$. } \label{figshoes} \end{center} \end{figure} \subsection{Sign of unsupervised Learning? }\label{secUL} Fig.~\ref{figshoes} shoes $x_i$ and $F_n(x_i)$ for a group of images in the class 5 (sandal). The network is trained to depth $n=11000$ and the value of $\epsilon$ is chosen at each step $n$ so that the perturbation of each data point $x_i$ of the batch is no greater than $10\%$ ($\epsilon=0.1\times \max_i \frac{ |x^{(n)}_{f,i}|_{L^2}}{|\hat{g}^{(n)}_{f,i}|_{L^2}}$). Note that this value of $\epsilon$ is $10$ times larger than the one of Sec.~\ref{subsec82782}. Surprisingly the flow $F_n$ accurately clusters that class (sandal) into $2$ sub-classes: (1) high heels (2) flat bottom. This is surprising because the training labels contain no information about such sub-classes: KF has created those clusters/sub-classes without supervision. \section{Kernel Flows and Convolutional Neural Network}\label{secCNN} \subsection{MNIST} \label{KFCNN MNIST sec} The proposed approach can also be applied to families of kernels parameterized by the weights of a Convolutional Neural Network (CNN) \cite{lecun1995convolutional}. Such networks are known to achieve superior performance by, to some degree, encoding (i.e. providing prior information about) known invariants (e.g. to translations) and the hierarchical structure of data generating distribution into the architecture of the network. We will first consider an application the MNIST dataset \cite{yann1998mnist} with $L^2$ normalized test and training images. The structure of the CNN is the one presented in \cite{CNNGorner} and its first layers are illustrated in Fig. \ref{MNIST layers}. Given an input/image $x$, the last layer produces a vector $F(x)\in \mathbb{R}^{300}$ used for SVN classification \cite{cortes1995support} with the Gaussian kernel $K(x,x')=K_1(F(x), F(x')) = e^{-\gamma |F(x)-F(x')|^2}$ where $4/\gamma$ is the mean squared distance between the $F(x_i)$ (writing $x_i$ for the training images). \begin{figure}[h] \begin{center} \includegraphics[width= 0.9\textwidth]{./fig/NaCNN_layers.pdf} \caption{Convolutional filters used for MNIST classification \cite{CNNGorner}.}\label{MNIST layers} \end{center} \end{figure} The training of the filters (weights of the network) is done as described in sections \ref{sec3} and \ref{secfamker} using random batches of $N_f = 500$ images (sampled uniformly without replacement out of $N = 60000$ training images) and sub-batches of $N_c = 250$ images (sampled uniformly without replacement out of the batch of $N_f=500$ images). As in Sec.~\ref{sec3}, write $v^\dagger$ and $v^s$ for optimal recoveries using the kernel $K$, and respectively, the batch of $N_f$ and the sub-batch of $N_c$ interpolation points. Writing $y_i\in \mathbb{R}^{10}$ for the label of the image $x_i$, the relative approximation error (in the RKHS norm associated with $K$) caused by halving the number of points is (using, for simplicity, the notations of Sec.~\ref{sec3} to describe the computation of $\rho$ for one batch) \begin{equation}\label{def rho 7} \rho=1-\frac{\operatorname{Tr}{(y^T \tilde{A} y)}}{\operatorname{Tr}{(y^T A y)}}\,. \end{equation} where $y\in \mathbb{R}^{N_f\times 10}$, $\tilde{A}, A\in \mathbb{R}^{N_f\times N_f}$. We will also consider the mean squared error \begin{equation}\label{def e2 7} e_2 = \frac{2}{N_f}\sum_{i = 1}^{N_f} \big|y_{i} - v^s (x_i)\big|^2 \,, \end{equation} where the sum is taken over the $N_f$ elements of the batch (note that $y_{i} - v^s (x_i)=0$ when $i$ is in the sub-batch of $N_c$ elements used as interpolation points for $v^s$). To train the network we simply let the Adam optimizer \cite{AdamOpt} in TensorFlow minimize $\rho$ or $e_2$ (used as cost functions, which does not require the manual identification of their Fr\'{e}chet derivatives with respect to the weights of the network). Table \ref{table3} shows statistics of the corresponding test errors using the kernel $K$ learned above (using all $N=60000$ images in batches of size $N_f=500$) and five randomly selected subsets of $N_I = 12000$ training images as interpolation points. Each run consisted of $10000$ iterations and test errors were calculated on the final iteration. Fig. \ref{rho e plot} shows the values of $\rho$ and $e_2$ evaluated at every $100$ iterations for both algorithms (minimizing $\rho$ and $e_2$). When trained with relative entropy and dropout \cite{srivastava2014dropout} Gorner reports \cite{CNNGorner} a minimum classification error of $0.65\%$ testing every $100$ iterations over $5$ runs. Since we are using the same CNN architecture, this appears to suggest that the proposed approach (of minimizing $\rho$ or $e_2$) might lead to better test accuracies than training with relative entropy and dropout. \begin{table}[h] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline Algorithm & Average error & Min error & Max error & Standard Deviation \\ \hline Minimizing $e_2$ & $0.596 \%$ & $0.55 \%$ & $0.63\%$ & $0.032 \%$\\ \hline Minimizing $\rho$ & $0.640 \%$ & $0.60 \%$ & $0.70\%$ & $0.034 \%$ \\ \hline \end{tabular} \caption{Test error statistics using $N_I = 12000$ interpolation points at iteration $10000$ over $5$ runs.}\label{table3} \end{center} \end{table} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/rho_e_plot2} \caption{$(1)$ and $(2)$ show $\rho$ and $e_2$ respectively evaluated at the $n$-th batch using the $e_2$ minimizing network. $(3)$ and $(4)$ show analogous plots for the $\rho$ minimizing network.} \label{rho e plot} \end{center} \end{figure} \subsubsection{Interpolation with small subsets of the training set} Fig.~\ref{multi_erho} shows test errors using the kernel $K$ learned above (using all $N=60000$ images in batches of size $N_f=500$) and randomly selected subsets of $N_I = 30000, 12000, 6000, 600, 60, 10$ training images as interpolation points. \begin{figure}[h!] \begin{center} \includegraphics[width= \textwidth]{./fig/multi_erho2} \caption{(1) Classification test errors for $N_I = 10, 60, 600, 6000, 12000, 30000$ evaluated at the $n$-th batch for $0\leq n \leq 10000$ using the network minimizing $e_2$. (2) same as (1) with $1000 \leq n \leq 10000$. (3), (4) same as (1), (2) for the network minimizing $\rho$.} \label{multi_erho} \end{center} \end{figure} Tables \ref{table5} and \ref{table7} show test errors statistics using the kernel $K$ (learned above with $N_f=500$) with $N_I=6000, 600, 60, 10$ interpolation points sampled at random (all use the same convolutional filters obtained in a single optimization run). Averages, min, max and STD are computed over iterations between iterations $9900$ to $10000$ using $5$ independent runs of the Adam optimizer \cite{AdamOpt} with $\rho$ and $e_2$ as objective functions. \begin{table}[h!] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline $N_I$ & Average error & Min error & Max error & Standard Deviation \\ \hline $6000$ & $0.575 \%$ & $0.42 \%$ & $0.72\%$ & $0.052 \%$\\ \hline $600$ & $0.628 \%$ & $0.48 \%$ & $0.83\%$ & $0.062 \%$ \\ \hline $60$ & $0.728 \%$ & $0.51 \%$ & $1.23\%$ & $0.103 \%$ \\ \hline $10$ & $1.05 \%$ & $0.58 \%$ & $4.81\%$ & $0.375 \%$\\ \hline \end{tabular} \caption{Test error statistics using $N_I$ interpolation points between iterations $9900$ and $10000$ over $5$ runs of optimizing $e_2$.}\label{table5} \end{center} \end{table} \begin{table}[h!] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline $N_I$ & Average error & Min error & Max error & Standard Deviation \\ \hline $6000$ & $0.646 \%$ & $0.51 \%$ & $0.78\%$ & $0.046 \%$\\ \hline $600$ & $0.676 \%$ & $0.56 \%$ & $0.82\%$ & $0.047 \%$ \\ \hline $60$ & $0.850 \%$ & $0.58 \%$ & $3.98\%$ & $0.357 \%$ \\ \hline $10$ & $4.434 \%$ & $0.97 \%$ & $18.91\%$ & $2.320 \%$\\ \hline \end{tabular} \caption{Test error statistics using $N_I$ interpolation points between iterations $9900$ and $10000$ over $5$ runs of optimizing $\rho$.}\label{table7} \end{center} \end{table} \begin{figure}[h!] \begin{center} \includegraphics[width= 0.6\textwidth]{./fig/good_bad_10} \caption{A ``bad'' (top) and ``good'' (bottom) selection of $10$ interpolation points.} \label{badgood10} \end{center} \end{figure} Observe that, although as with Kernel Flow, using only a small fraction of the training data as interpolation points is sufficient to achieve low classification errors (the minimum error with $10$ interpolation points is $0.58\%$), interpolation with only one image per class appears to be more sensitive to the particular selection of $10$ interpolation points. Fig.~\ref{badgood10} shows an example of a ``good'' and a ``bad'' selection for the interpolation with $10$ points. The clustering of the $F(x_i)$ ($x_i$ are training images and $F(x)\in \mathbb{R}^{300}$ is the output of the last layer of the CNN with input $x$) is a possible explanation for this extreme generalization. Fig.~\ref{dist plot} shows the average mean squared Euclidean distance between $F(x_i)$ in the same class and in distinct classes. Note that the ratio between average square distances between two inter-class and two in-class points approaches $12$ (for the network optimizing $e_2$), suggesting that the map $F$ clusters of images per class. \begin{figure}[h!] \begin{center} \includegraphics[width= \textwidth]{./fig/dist_plots2} \caption{$(1)$ Mean-squared distance between $F(x_i)$ (all, in-class, and inter-class) vs iteration $n$ for the network optimizing $e_2$ $(2)$ Ratio between inter-class and in-class mean-squared distance for the network optimizing $e_2$. $(3)$ and $(4)$ are identical except for the network which optimizes $\rho$.} \label{dist plot} \end{center} \end{figure} \subsection{Fashion MNIST} We now apply the proposed approach to the Fashion-MNIST database. The architecture of the CNN is derived from \cite{FashionCNN} and the first layers of the network are shown in Fig. \ref{Fashion MNIST layers}. \begin{figure}[h] \begin{center} \includegraphics[width= 0.9\textwidth]{./fig/NaCNN_layers_fashion.pdf} \caption{Convolutional filters used for Fashion MNIST classification \cite{FashionCNN}.}\label{Fashion MNIST layers} \end{center} \end{figure} The classification of test images is done as in Sec.~\ref{KFCNN MNIST sec}. Table \ref{rho e error fashion} shows test errors statistics (over $5$ runs) after training (using $10000$ iterations and computing test errors at the final iteration) by minimizing $\rho$ or $e_2$ (as defined in \eqref{def rho 7} and \eqref{def e2 7}) using $N_I = 12000$ interpolation points Mahajan \cite{FashionCNN} reports a testing error of $8.6\%$ when using the validation set to obtain the convolutional filters. As above, this suggests that the proposed approach could lead to better test accuracies than training with relative entropy and dropout. Finally, Fig.~\ref{rho e plot fashion} shows $\rho$ and $e_2$ evaluated at every $100$ iterations for both algorithms. \begin{table}[h] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline Algorithm & Average error & Min error & Max error & Standard Deviation \\ \hline Optimizing $e_2$ & $8.474 \%$ & $8.24 \%$ & $8.70\%$ & $0.147 \%$\\ \hline Optimizing $\rho$ & $8.412 \%$ & $8.29 \%$ & $8.56\%$ & $0.091 \%$ \\ \hline \end{tabular} \caption{Test error statistics using $N_I = 12000$ interpolation points at iteration $10000$ over $5$ runs.}\label{rho e error fashion} \end{center} \end{table} \begin{figure}[h] \begin{center} \includegraphics[width= \textwidth]{./fig/rho_e_plot_fashion} \caption{$(1)$ and $(2)$ show $\rho$ and $e_2$ respectively evaluated at the $n$-th batch using the $e_2$ minimizing network. $(3)$ and $(4)$ show analogous plots for the $\rho$ minimizing network.} \label{rho e plot fashion} \end{center} \end{figure} \subsubsection{Interpolation with small subsets of the training set} Fig.~\ref{multi_erho fashion} shows test errors using the kernel $K$ learned above (using all $N=60000$ images in batches of size $N_f=500$) and randomly selected subsets of $N_I = 30000, 12000, 6000, 600, 60, 10$ training images as interpolation points. Further, the minimum errors in Fig.~\ref{multi_erho fashion}.1, 3 are observed to be $8.02 \%$ and $7.89 \%$ respectively, where both minima used $N_I = 30000$." \begin{figure}[h!] \begin{center} \includegraphics[width= \textwidth]{./fig/multi_erho_fashion} \caption{(1) Classification test errors for $N_I = 10, 60, 600, 6000, 12000, 30000$ evaluated at the $n$-th batch for $0\leq n \leq 10000$ using the network minimizing $e_2$. (2) same as (1) with $1000 \leq n \leq 10000$. (3), (4) same as (1), (2) for the network minimizing $\rho$.} \label{multi_erho fashion} \end{center} \end{figure} Tables \ref{10k e2 fashion} and \ref{10k rho fashion} show test errors statistics using the kernel $K$ (learned above with $N_f=500$) with $N_I=6000, 600, 60, 10$ interpolation points sampled at random (all use the same convolutional filters obtained in a single optimization run). Averages, min, max and STD are computed over iterations between $9900$ and $10000$ using $5$ independent runs of the Adam optimizer \cite{AdamOpt} with $\rho$ and $e_2$ as objective functions. \begin{table}[h!] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline $N_I$ & Average error & Min error & Max error & Standard Deviation \\ \hline $6000$ & $8.561 \%$ & $8.23 \%$ & $8.97\%$ & $0.135 \%$\\ \hline $600$ & $8.724 \%$ & $8.31 \%$ & $9.26\%$ & $0.161 \%$ \\ \hline $60$ & $9.677 \%$ & $8.77 \%$ & $11.48\%$ & $0.486 \%$ \\ \hline $10$ & $15.261 \%$ & $10.00 \%$ & $32.69\%$ & $3.196 \%$\\ \hline \end{tabular} \caption{Test error statistics using $N_I$ interpolation points between iterations $9900$ and $10000$ over $5$ runs of optimizing $e_2$.}\label{10k e2 fashion} \end{center} \end{table} \begin{table}[h!] \begin{center} \begin{tabular}{ | l | l | l | l | l|} \hline $N_I$ & Average error & Min error & Max error & Standard Deviation \\ \hline $6000$ & $8.526 \%$ & $8.17 \%$ & $8.96\%$ & $0.120 \%$\\ \hline $600$ & $8.810 \%$ & $8.36 \%$ & $9.29\%$ & $0.140 \%$ \\ \hline $60$ & $11.677 \%$ & $9.32 \%$ & $18.03\%$ & $1.437 \%$ \\ \hline $10$ & $36.642 \%$ & $23.44 \%$ & $53.56\%$ & $4.900 \%$\\ \hline \end{tabular} \caption{Test error statistics using $N_I$ interpolation points between iterations $9900$ and $10000$ over $5$ runs of optimizing $\rho$.}\label{10k rho fashion} \end{center} \end{table} It can again be observed that using only a small fraction of the training data as interpolation points yields relatively low classification errors. The instability of test errors with $N_I = 10$ interpolation points, compared to the Kernel Flow algorithm proposed in Sec.~\ref{secKernelFlow} seem to suggest that deep architectures might be required to achieve stable results with only one interpolation point per class. The clustering of the $F(x_i)$ ($x_i$ are training images and $F(x)\in \mathbb{R}^{300}$ is the output of the last layer of the CNN with input $x$) using the network optimizing $e_2$ is shown in Fig.~\ref{dist plot fashion}. The figure shows the average mean squared Euclidean distance between $F(x_i)$ in the same class and in distinct classes. Note that the ratio between average square distances between two inter-class and two in-class points approaches $4.5$, suggesting that the map $F$ aggregates images per class. \begin{figure}[h!] \begin{center} \includegraphics[width= \textwidth]{./fig/dist_plots_fashion} \caption{$(1)$ Mean-squared distance between $F(x_i)$ (all, in-class, and inter-class) vs iteration $n$ for the network optimizing $e_2$ $(2)$ Ratio between inter-class and in-class mean-squared distance for the network optimizing $e_2$. $(3)$ and $(4)$ are identical except for the network which optimizes $\rho$.} \label{dist plot fashion} \end{center} \end{figure} \paragraph{Acknowledgments.} The authors gratefully acknowledges this work supported by the Air Force Office of Scientific Research and the DARPA EQUiPS Program under award number FA9550-16-1-0054 (Computational Information Games) and the Air Force Office of Scientific Research under award number FA9550-18-1-0271 (Games for Computation and Learning). \bibliographystyle{plain}
\section{Overview: a ring-theoretic question, culminating in a lattice-theoretic result}\label{S.intro} A standard result of ring theory says that if $I$ is an ideal of a commutative ring $R,$ then the nil radical of $I$ (the ideal of elements having some power in $I)$ is the intersection of the prime ideals of $R$ containing~$I$ \cite[Proposition~10.2.9, p.\,352]{PMC}. Jonathan Gleason\footnote{ Jonathan Gleason, then a graduate student in mathematics at the University of California, Berkeley, raised this question shortly before his unexpected tragic death in January, 2018.} (personal communication) asked the present author about a possible generalization of that result. Namely, suppose $R$ is a topological commutative ring. For any ideal $I$ of $R,$ let $\sqrt I$ denote the least {\em closed} ideal $J\supseteq I$ such that $J$ contains every element $x$ such that $x^n\in J$ for some $n\geq 1.$ Must $\sqrt I$ be the intersection of all closed {\em prime} ideals containing $I$? If not in general, does this become true if $R$ is complete with respect to the given topology? We shall see that the answer is negative: If $R$ is the Boolean ring of measurable subsets of the unit interval modulo sets of measure zero, topologized using the metric given by the measure of the symmetric difference of such sets, then $R$ is complete in that metric, and $\{0\} = \sqrt{\{0\}}$ (defined as above); but $R$ has no closed prime ideals, so $\{0\}$ is not an intersection of such ideals. We give the details in~\S\ref{S.Bool}, and note in~\S\ref{S.nonBool} how to get, from this characteristic-$\!2$ example, examples of arbitrary characteristic. The one not-so-obvious property of our example is the completeness of $B$ as a metric space. In~\S\ref{S.lattice} (which is independent of \S\S\ref{S.Bool}-\ref{S.nonBool}) we note that this can be deduced from a standard result of measure theory, and then prove a general result on when a metrized {\em lattice} is complete, which yields an alternate proof. In~\S\ref{S.ceg} we give a curious counterexample to that general completeness result under a weakened hypothesis. \section{The Boolean example}\label{S.Bool} Most of the desired properties of the example sketched above are straightforward to verify. Recall that for any set $X,$ the subsets of $X$ form a Boolean ring under the operations \begin{equation}\begin{minipage}[c]{35pc}\label{d.Boole} $0=\emptyset,\qquad 1=X,\qquad S+T=S\cup T \setminus (S\cap T),\qquad S\,T=S\cap T.$ \end{minipage}\end{equation} Now let $B_0$ be the set of measurable subsets of the unit interval $[0,1],$ and for $S\in B_0,$ let $\mu(S)\in[0,1]$ be its measure. $B_0$ clearly forms a subring of the Boolean ring of subsets of $[0,1],$ and for any $S,\,T\in B_0,$ we see from the above definition of $S+T$ that \begin{equation}\begin{minipage}[c]{35pc}\label{d.muS+muT} $\mu(S\cup T) \ =\ \mu(S+T)+\mu(S\cap T) \ =\ \mu(S)+\mu(T) - \mu(S\cap T).$ \end{minipage}\end{equation} For $S,\,T\in B_0,$ let \begin{equation}\begin{minipage}[c]{35pc}\label{d.d0} $d_0(S,\,T)\ =\ \mu(S+T).$ \end{minipage}\end{equation} Then $d_0$ is a pseudometric, i.e., for all $S,\,T,\,U\in B_0,$ \begin{equation}\begin{minipage}[c]{35pc}\label{d.d0geq0} $d_0(S,\,T)\ \geq\ 0,$ \end{minipage}\end{equation} \begin{equation}\begin{minipage}[c]{35pc}\label{d.d0SS} $S=T\ \implies\ d_0(S,\,T)=0,$ \end{minipage}\end{equation} \begin{equation}\begin{minipage}[c]{35pc}\label{d.d0TS} $d_0(T,\,S)\ =\ d_0(S,\,T),$ \end{minipage}\end{equation} \begin{equation}\begin{minipage}[c]{35pc}\label{d.d0STU} $d_0(S,\,T)+d_0(T,\,U)\ \geq\ d_0(S,U).$ \end{minipage}\end{equation} Here~\eqref{d.d0geq0}-\eqref{d.d0TS} are immediate. To get~\eqref{d.d0STU}, note that the second equality of~\eqref{d.muS+muT} gives the inequality $\mu(S)+\mu(T) \geq \mu(S+T).$ Putting $S+T$ and $T+U$ in place of $S$ and $T$ in that relation gives~\eqref{d.d0STU}. The definition~\eqref{d.d0}, and the identities of Boolean rings, show that the Boolean operations behave nicely under~$d_0$: \begin{equation}\begin{minipage}[c]{35pc}\label{d.d0_ct} $d_0(S{+}U,\,T{+}U)\ =\ d_0(S,\,T),$ \end{minipage}\end{equation} \begin{equation}\begin{minipage}[c]{35pc}\label{d.d0SU,TU} $d_0(SU,\,TU)\ \leq\ d_0(S,\,T).$ \end{minipage}\end{equation} These relations show in particular that if $S$ and $T$ are close to one another under $d_0,$ then the results of adding $U$ to $S$ and $T$ are also close to one another, as are the results of multiplying $S$ and $T$ by $U,$ in each case in a uniform way, whence addition and multiplication are continuous with respect to $d_0.$ Now let $B$ be the quotient ring \begin{equation}\begin{minipage}[c]{35pc}\label{d.B} $B\ =\ B_0\,/\,\{S\mid\mu(S)=0\}.$ \end{minipage}\end{equation} Let us write $[S]\in B$ for the residue class of an element $S\in B_0,$ and define \begin{equation}\begin{minipage}[c]{35pc}\label{d.d} $d([S],[T])\ =\ d_0(S,\,T)\ =\ \mu(S+T)$ \ for \ $[S],\,[T]\in B.$ \end{minipage}\end{equation} Then~\eqref{d.d0geq0}-\eqref{d.d0SU,TU} clearly carry over to $d,$ with the ``$\!\!\implies\!\!$'' of~\eqref{d.d0SS} strengthened to ``$\!\!\iff\!\!$''. Thus, $d$ is a metric, and \begin{lemma}\label{L.B} The operations of the Boolean ring $B$ of measurable subsets of $[0,1]$ modulo sets of measure zero are continuous in the metric $d$ of~\eqref{d.d}.\qed \end{lemma} Being a Boolean ring, $B$ has no nonzero nilpotent elements, hence the ideal $\{0\}$ of $B$ trivially contains every $x\in B$ such that $x^n\in\{0\}$ for some $n\geq 1;$ and being a singleton, $\{0\}$ is closed in the metric topology. So $\sqrt{\{0\}}=\{0\}$ under the definition of $\sqrt{I}$ suggested by Gleason. Is $\{0\}$ an intersection of closed prime ideals? A negative answer follows from \begin{lemma}\label{L.no_closed_primes} Every prime ideal $P$ of the ring $B$ has for topological closure the whole ring $B.$ Hence $B$ has no closed prime ideals. \end{lemma} \begin{proof} Given a prime ideal $P,$ let us first show that $P$ has elements arbitrarily close to $1,$ i.e., elements $[1+U]$ such that $U$ has arbitrarily small measure. To do this, we shall show that whenever $[1+U]\in P,$ there exists $[1+S]\in P$ with $\mu(S)=\mu(U)/2.$ Indeed, let us write $U$ as the union of two disjoint measurable subsets $S$ and $T,$ each of measure $\mu(U)/2.$ (E.g., one can take $S=U\cap [0,t]$ and $T=U\cap (t,1]$ for appropriate $t\in[0,1].$ Such a $t$ exists by continuity of $\mu(U\cap[0,t])$ in $t.)$ Since $[1+S][1+T]=[1+U]\in P,$ one of $[1+S],\,[1+T]$ belongs to $P.$ So $P$ indeed has elements arbitrarily close to $1.$ Multiplying arbitrary $[V]\in B$ by such elements, we see that $P$ has elements arbitrarily close to $[V];$ so the closure of $P$ contains every $[V]\in B,$ as claimed. Hence no prime ideal $P$ is itself closed, giving the final assertion. \end{proof} So $\{0\} = \sqrt{\{0\}}$ is not an intersection of closed prime ideals. Since $B$ is complete in the metric $\mu$ (to be proved in two ways in \S\ref{S.lattice}), $B$ answers the strongest form of Gleason's question. (To be precise, Gleason's question concerned completeness of a topological ring $R$ in the {\em uniform structure} arising from additive translates of neighborhoods of $0.$ Our metrized ring has additive-translation-invariant metric by~\eqref{d.d0_ct}, so completeness in the uniform structure so arising from the metric topology is equivalent to completeness in the metric.) \section{Non-Boolean algebras}\label{S.nonBool} Is the behavior of above example limited to Boolean rings, or perhaps to rings of finite characteristic? No. We note below how to generalize the construction of the preceding section to algebras in the sense of General Algebra (a.k.a.\ Universal Algebra), and observe that when the algebras in question are rings (of arbitrary characteristic), these give more varied examples of the properties proved for $B.$ We start with the analog of $B_0.$ \begin{definition}\label{D.X'} For $X$ a set, let $X^{[0,1]}$ denote the set of all $\!X\!$-valued functions on the unit interval, and for each $f\in X^{[0,1]}$ and $x\in X,$ let \begin{equation}\begin{minipage}[c]{35pc}\label{d.f_x} $f_x\ =\ \ \{t\in[0,1]\mid f(t)=x\}.$ \end{minipage}\end{equation} Let $X'$ denote the subset of $X^{[0,1]}$ consisting of those $f$ such that \begin{equation}\begin{minipage}[c]{35pc}\label{d.f_x_meas} for all $x\in X,$ the set $f_x\subseteq[0,1]$ is measurable, \end{minipage}\end{equation} and \begin{equation}\begin{minipage}[c]{35pc}\label{d.X'_ctb} the image of $f,$ that is, $\{x\in X\mid f_x\neq\emptyset\},$ is countable \textup{(}i.e., finite or countably infinite\textup{)}. \end{minipage}\end{equation} For $f,g\in X',$ let \begin{equation}\begin{minipage}[c]{35pc}\label{d.d'} $d'(f,\,g)\ =\ \mu(\{t\in[0,1]\mid f(t)\neq g(t)\})\ = \ (\sum_{x\in X}\,d_0(f_x,\,g_x))\,/\,2,$ \end{minipage}\end{equation} where $d_0$ is the pseudometric on measurable subsets of $[0,1]$ defined in~\eqref{d.d0}. \end{definition} The final equality of~\eqref{d.d'} is, intuitively, a consequence of the fact that every $t\in [0,1]$ such that $f(t)\neq g(t)$ contributes twice to the summation in the final term: via the summand with $x=f(t)$ and the summand with $x=g(t).$ That idea is easily formalized to show that that sum is indeed twice the middle term of~\eqref{d.d'}. \begin{lemma}\label{L.X'} For any set $X,$ the function $d'$ defined by~\eqref{d.d'} is a pseudometric on $X'.$ For any finitary operation $u: X^n\to X,$ the induced pointwise operation $u^{[0,1]}: (X^{[0,1]})^n\to X^{[0,1]}$ carries $(X')^n$ to $X',$ and for $f^{(0)},\dots,f^{(n-1)},\,g^{(0)},\dots,g^{(n-1)}\in X'$ we have \begin{equation}\begin{minipage}[c]{35pc}\label{d.d'_and_u} $d'(u^{[0,1]}(f^{(0)},\dots,f^{(n-1)}),\, u^{[0,1]}(g^{(0)},\dots,g^{(n-1)}))\ \leq \ d'(f^{(0)},\,g^{(0)}) + \dots + d'(f^{(n-1)},\,g^{(n-1)}).$ \end{minipage}\end{equation} \end{lemma} \begin{proof} That $d'$ is a pseudometric is straightforward. (The triangle inequality is verified using the rightmost expression of~\eqref{d.d'} and the fact that $d_0$ is a pseudometric.) We need to know next that given $u: X^n\to X,$ and $f^{(0)},\dots,f^{(n-1)}\in X',$ we have $u^{[0,1]}(f^{(0)},\dots,\linebreak[0]f^{(n-1)})\in X'.$ Note that for each $x\in X,$ $u^{[0,1]}(f^{(0)},\dots,f^{(n-1)})_x$ will be the union, over all $\!n\!$-tuples $(x_0,\dots,x_{n-1})$ satisfying $u(x_0,\dots,x_{n-1})=x,$ of the sets \begin{equation}\begin{minipage}[c]{35pc}\label{d.n-fold_cap} $f^{(0)}_{x_0}\cap\dots\cap f^{(n-1)}_{x_{n-1}}.$ \end{minipage}\end{equation} Now for each $i\in n,$ only countably many values of $x_i$ make $f^{(i)}_{x_i}$ nonempty, so only countably many $\!n\!$-tuples $(x_0,\dots,x_{n-1})$ make the intersection~\eqref{d.n-fold_cap} nonempty; and by~\eqref{d.f_x_meas}, each of those $\!n\!$-fold intersections is measurable; so for each $x,$ $u^{[0,1]}(f^{(0)},\dots,f^{(n-1)})_x$ is a countable union of measurable sets, hence measurable; i.e., $u^{[0,1]}(f^{(0)},\dots,f^{(n-1)})$ satisfies the condition of~\eqref{d.f_x_meas}. It also satisfies the condition of~\eqref{d.X'_ctb}, since the countably many cases where~\eqref{d.n-fold_cap} is nonempty lead to only countably many possibilities for the element $u(x_0,\dots,x_{(n-1)}).$ So $u^{[0,1]}$ carries $(X')^n$ to $X'.$ The inequality~\eqref{d.d'_and_u} follows from the fact that $u(f^{(0)},\dots,f^{(n-1)})$ and $u(g^{(0)},\dots,g^{(n-1)})$ can differ only at points $t\in[0,1]$ where $f^{(i)}$ and $g^{(i)}$ differ for at least one~$i.$ \end{proof} We now want to deduce the corresponding results with the set of functions $X'$ replaced by the set of equivalence classes of such functions under the relation of differing on a set of measure zero. We will need the following observation. \begin{lemma}\label{L.parttn} As in {\rm\S\ref{S.Bool}}, let $B_0$ denote the Boolean ring of measurable subsets of $[0,1].$ Let $S_0,$ $S_1,\,\dots$ be a countable {\rm(}i.e., finite or countably infinite{\rm)} family of elements of $B_0$ such that \begin{equation}\begin{minipage}[c]{35pc}\label{d.muSiSj} $\mu(S_i\cap S_j)\ =\ 0$ \ whenever $i\neq j,$ \end{minipage}\end{equation} and \begin{equation}\begin{minipage}[c]{35pc}\label{d.sum_muSi} $\sum_i\,\mu(S_i)\ =\ 1.$ \end{minipage}\end{equation} Then there exist $T_0,$ $T_1,\ldots\in B_0$ such that \begin{equation}\begin{minipage}[c]{35pc}\label{d.muSi+Ti} $d_0(S_i,\,T_i)\ =\ 0\quad (i=0,1,\dots),$ \end{minipage}\end{equation} and the $T_i$ partition $[0,1],$ i.e., satisfy the two conditions \begin{equation}\begin{minipage}[c]{35pc}\label{d.TiTj} $T_i\cap T_j\ =\ \emptyset$ whenever $i\neq j$ {\rm(}cf.~\eqref{d.muSiSj}\rm{)} \end{minipage}\end{equation} and \begin{equation}\begin{minipage}[c]{35pc}\label{d.cupTi} $\bigcup_i\,T_i\ =\ [0,1]$ {\rm(}cf.~\eqref{d.sum_muSi}\rm{)}. \end{minipage}\end{equation} \end{lemma} \begin{proof} Let \begin{equation}\begin{minipage}[c]{35pc}\label{d.Ti} $T_i\ =\ S_i\,\setminus\,\bigcup_{0\leq j<i}\,S_j$ \ for \ $i>0,$ \end{minipage}\end{equation} and \begin{equation}\begin{minipage}[c]{35pc}\label{d.T0} $T_0\ =\ [0,1]\,\setminus\,\bigcup_{i>0}\,T_i.$ \end{minipage}\end{equation} These sets are clearly measurable and partition~$[0,1].$ Since the sets $S_j$ whose members are removed from $S_i$ in~\eqref{d.Ti} have, by~\eqref{d.muSiSj}, only a set of measure zero in common with $S_i,$ we see that for $i>0,$ $T_i$ differs from $S_i$ in a set of measure zero, giving~\eqref{d.muSi+Ti} for such~$i.$ Also by~\eqref{d.Ti}, no $T_i$ with $i>0$ contains elements of $S_0,$ so by~\eqref{d.T0}, $T_0\supseteq S_0;$ hence to prove the $i=0$ case of~\eqref{d.muSi+Ti}, it suffices to show that $\mu(T_0)=\mu(S_0).$ To do this, note that since the $T_i$ partition $[0,1],$ we have $\sum_{i\geq 0}\,\mu(T_i) = \mu([0,1]) = 1 = \sum_{i\geq 0}\,\mu(S_i)$ by~\eqref{d.sum_muSi}. If we subtract from that relation the equations $\mu(T_i)=\mu(S_i)$ for all $i>0,$ which follow from the cases of~\eqref{d.muSi+Ti} already obtained, we get the desired $i=0$ case. \end{proof} Now -- still assuming the completeness of $B,$ to be obtained in the next section -- we can get \begin{proposition}\label{P.X^*} For $X$ a set, let $X^*$ denote the quotient of $X'$ \textup{(}defined in Definition~\ref{D.X'}\textup{)} by the equivalence relation $d'(f,\,g)=0,$ and let $d^*$ be the metric on $X^*$ induced by~$d'.$ Then $X^*$ under the metric $d^*$ is a complete metric space. \end{proposition} \begin{proof} Consider any Cauchy sequence $[f^{(0)}],\,[f^{(1)}],\,\dots\in X^*,$ where $f^{(0)},\,f^{(1)},\,\dots\in X'.$ For each $n,$ the set of elements $x\in X$ such that $f^{(n)}_x$ is nonempty is countable by~\eqref{d.X'_ctb}; hence there exists a countable (possibly finite) list of distinct such elements: \begin{equation}\begin{minipage}[c]{35pc}\label{d.x0x1...} $\{x_0,\,x_1,\dots\}\ = \ \{x\in X\mid(\exists\,n)\,f^{(n)}_x\neq\emptyset\}.$ \end{minipage}\end{equation} Now (writing $d_0$ and $d,$ as in the preceding section, for our pseudometric on $B_0$ and metric on $B),$ we have for all $i,\,m,\,n,$ \begin{equation}\begin{minipage}[c]{35pc}\label{d.df_vs_df_x} $d([f^{(m)}_{x_i}],\,[f^{(n)}_{x_i}])\ = \ d_0(f^{(m)}_{x_i},\,f^{(n)}_{x_i})\ \leq\ d'(f^{(m)},\,f^{(n)}) \ =\ d^*([f^{(m)}],\,[f^{(n)}]);$ \end{minipage}\end{equation} hence the Cauchyness of the sequence of elements $[f^{(n)}]\in X^*$ implies, for each $x_i,$ the Cauchyness of the sequence of $[f^{(n)}_{x_i}]\in B.$ Hence by the completeness of $B,$ for each $i$ the sequence $[f^{(0)}_{x_i}],\,[f^{(1)}_{x_i}],\,\dots$ converges to an element which we shall write $[S_i],$ choosing an arbitrary representative $S_i\in B_0$ of the limit of that sequence in $B.$ I claim that these sets $S_i$ satisfy~\eqref{d.muSiSj} and~\eqref{d.sum_muSi}. To get the first of these equations for given $i\neq j,$ note that for any $\varepsilon>0,$ one can choose $n$ such that $d_0(f^{(n)}_{x_i},\,S_i)<\varepsilon/2$ and $d_0(f^{(n)}_{x_j},\,S_j)<\varepsilon/2.$ Since $f^{(n)}_{x_i}$ and $f^{(n)}_{x_j}$ are disjoint, we see that $S_i$ and $S_j$ intersect in a set of measure at most $\varepsilon.$ Since this holds for all $\varepsilon>0,$ they intersect in a set of measure $0.$ To get~\eqref{d.sum_muSi}, note that for any $\varepsilon>0$ we may choose $m$ such that for all $n\geq m$ we have $d^*([f^{(m)}],\,[f^{(n)}])<\varepsilon/3,$ equivalently, \begin{equation}\begin{minipage}[c]{35pc}\label{d.m} $d'(f^{(m)},\,f^{(n)})\ <\ \varepsilon/3.$ \end{minipage}\end{equation} Since $f_{x_0},\,f_{x_1},\,\dots$ partition $[0,1],$ we can also choose $j$ such that \begin{equation}\begin{minipage}[c]{35pc}\label{d.j} $\mu(f^{(m)}_{x_0})+\dots+\mu(f^{(m)}_{x_j})\ \geq\ 1-\varepsilon/3.$ \end{minipage}\end{equation} For $n\geq m,$~\eqref{d.m} guarantees that $d_0(f^{(m)}_{x_0},\,f^{(n)}_{x_0})+\dots+ d_0(f^{(m)}_{x_j},\,f^{(n)}_{x_j})<2\varepsilon/3$ (see~\eqref{d.d'}), equivalently, $d([f^{(m)}_{x_0}],\,[f^{(n)}_{x_0}])+\dots+ d([f^{(m)}_{x_j}],\,[f^{(n)}_{x_j}])<2\varepsilon/3,$ hence passing to the limit as $n\to\infty,$ $d([f^{(m)}_{x_0}],\,[S_0])+\dots+ d([f^{(m)}_{x_j}],\,[S_j])\leq 2\varepsilon/3;$ and combining with~\eqref{d.j} we get $\mu(S_0)+\dots+\mu(S_j)\geq 1-\varepsilon,$ equivalently, $\mu(S_0\cup\dots\cup S_j)\geq 1-\varepsilon,$ Since this holds for all $\varepsilon,$ we have $\sum_i\mu(S_i)= \mu(\bigcup_i S_i)\geq 1;$ and since a subset of $[0,1]$ cannot have measure larger than~$1,$ we get~\eqref{d.sum_muSi}. Lemma~\ref{L.parttn} now gives us a partition of $[0,1]$ into sets $T_i$ which differ from the $S_i$ by sets of measure zero. If we define $f\in X'$ by \begin{equation}\begin{minipage}[c]{35pc}\label{d.g} $f_{x_i}\ =\ T_i$ \ for all $i$ (whence by~\eqref{d.cupTi}, $f_x=\emptyset$ for all $x$ not of the form $x_i),$ \end{minipage}\end{equation} then $[f]\in X^*$ is a limit of the given Cauchy sequence $[f^{(0)}],\,[f^{(1)}],\,\dots\,,$ proving completeness. \end{proof} Remark: If in~\eqref{d.X'_ctb} we had allowed uncountable cardinalities, we would not have been able to use basic properties of measure, e.g., in concluding that the set in the middle term of~\eqref{d.d'} was measurable, and in proving in Lemma~\ref{L.X'} that $u^{[0,1]}$ carries $(X')^n$ to $X'.$ On the other hand, if we had required the set of $x$ making $f_x$ nonempty to be finite, our $X^*$ would not have been complete, except in the case where $X$ was finite. So countability is the only choice that gives our construction $X^*$ the desired properties. We have not yet called on~\eqref{d.d'_and_u}. It implies that our construction behaves nicely on algebras: \begin{proposition}\label{P.alg} Suppose $A$ is an algebra in the sense of General Algebra, that is, a set given with a \textup{(}finite or infinite\textup{)} family of operations, each of finite arity. Then for each operation $u: A^n\to A$ of $A,$ the operation $u^*$ of $A^*$ described by \begin{equation}\begin{minipage}[c]{35pc}\label{d.u^*} $u^*([f_0],\dots,[f_{n-1}])\ =\ [u^{[0,1]}(f_0,\dots,f_{n-1})]$ \end{minipage}\end{equation} is well-defined, and uniformly continuous in the metric $d^*;$ indeed, it satisfies Lipschitz condition \begin{equation}\begin{minipage}[c]{35pc}\label{d.d^*_and_u} $d^*(u^*([f^{(0)}],\dots,[f^{(n-1)}]),\, u^*([g^{(0)}],\dots,[g^{(n-1)}]))\\[.3em] \hspace*{3em}\leq\ d^*([f^{(0)}],\,[g^{(0)}]) + \dots + d^*([f^{(n-1)}],\,[g^{(n-1)}]).$ \end{minipage}\end{equation} The algebra $A^*$ satisfies all identities satisfied by $A.$ In fact, every finite set of elements of $A^*$ is contained in a subalgebra of $A^*$ isomorphic to a countable direct product of copies of $A.$ \end{proposition} \begin{proof}[Sketch of proof] By the case of~\eqref{d.d'_and_u} where the $d'(f^{(i)},g^{(i)})$ are all zero, the operations $u^{[0,1]}$ of $A'$ respect the equivalence relation used in defining $A^*,$ so~\eqref{d.u^*} gives well-defined operations. The general case of~\eqref{d.d'_and_u} then gives the Lipschitz inequality~\eqref{d.d^*_and_u}, and in particular, continuity. Finally, given any finite family of elements $[f^{(0)}],\dots,[f^{(N-1)}]$ of $A^*,$ the countably many nonempty sets $f^{(i)}_a$ $(0\leq i<\nolinebreak N,$ $a\in A)$ yield a decomposition of $[0,1]$ into countably many intersections as in~\eqref{d.n-fold_cap}, on each of which all of $f^{(0)},\dots,f^{(N-1)}$ are constant. Dropping those intersections that have measure zero, and looking at the algebra of members of $A'$ that are constant on the remaining countably many subsets, we see that this contains $f^{(0)},\dots,f^{(N-1)},$ and has as its image in $A^*$ a subalgebra isomorphic to a countable direct product of copies of $A.$ \end{proof} Finally, some observations specific to rings: \begin{proposition}\label{P.ring} Let $A$ be an associative unital ring. Then in the complete metrized ring $A^*$ arising by the construction of Proposition~\ref{P.alg}, the closure of every prime ideal is all of $A^*;$ hence $A^*$ has no closed prime ideals. On the other hand, if $A$ has no nonzero nilpotent elements, then the topological radical $\sqrt{\{0\}},$ defined as in~{\rm\S\ref{S.intro}}, is $\{0\}.$ \end{proposition} \begin{proof}[Sketch of proof.] Let $P$ be a prime ideal of $A^*.$ Writing $1_S$ for the characteristic function with values in $\{0,1\}\subseteq A$ of a subset $S\subseteq[0,1],$ let us show that $P$ contains elements $[1_{[0,1]\setminus U}]$ for sets $U$ of arbitrarily small positive measure. Clearly, it contains $[1_{[0,1]\setminus U}]$ for $U=[0,1].$ Given any $U$ such that $[1_{[0,1]\setminus U}]\in P,$ let us partition $U$ into two measurable subsets $S$ and $T$ of equal measure. Since $\!\{0,1\}\!$-valued functions are central in $A',$ so are their images in $A^*,$ so we have \begin{equation}\begin{minipage}[c]{35pc}\label{d.charfns} $[1_{[0,1]\setminus S}]\,A^*\,[1_{[0,1]\setminus T}] \,=\,[1_{[0,1]\setminus S}]\,[1_{[0,1]\setminus T}]\,A^* \,=\,[1_{[0,1]\setminus(S\cup T)}]\,A^* \,=\,[1_{[0,1]\setminus U}]\,A^*\,\subseteq P,$ \end{minipage}\end{equation} so as $P$ is prime, one of $[1_{[0,1]\setminus S}],$ $[1_{[0,1]\setminus T}]$ belongs to $P;$ so we have cut in half the measure of our set $U$ with $[1_{[0,1]\setminus U}]\in P.$ Since $d([1_{[0,1]\setminus U}],\,1)=\mu(U),$ we have, as in the proof of Lemma~\ref{L.no_closed_primes}, found elements of $P$ arbitrarily close to $1,$ and can deduce that the closure of $P$ is all of~$A^*.$ The final assertion is straightforward. \end{proof} Thus, for $A$ a commutative ring without nilpotents, the rings $A^*$ generalize the properties of the example $B$ of the preceding section. That $B$ is, of course, the case of this construction with $A=\mathbb{Z}/2\mathbb{Z}.$ Remark: The development of the above results in terms of measurable $\!X\!$-valued functions on $[0,1],$ modulo disagreement on sets of measure zero, feels artificial. Surely one should be able to perform our constructions abstractly in terms of the set $X,$ the Boolean ring $B,$ and the real-valued function on $B$ induced by the measure on $[0,1],$ and then generalize it to get such results with $B$ replaced by any Boolean ring with an appropriate real-valued function. If we were interested in maps $[0,1]\to X$ assuming only {\em finitely many} values, then the analog of $X^*$ could be described as the set of continuous functions from the Stone space of $B$ to the discrete space~$X.$ But for maps allowed to assume countably many values, the function corresponding to the metric seems to be needed in defining $X^*.$ I leave the proper formulation and generalization of that construction to experts in the subject. Cf.~\cite[Chapter~31]{Fremlin}. In contrast, the results of the next section will be obtained in a satisfyingly general context. \section{Completeness}\label{S.lattice} When I first suggested the Boolean ring $B$ of measurable subsets of $[0,1],$ modulo sets of measure zero, as an answer to J.\,Gleason's question, the one property not clear to me was completeness in the natural metric, though it seemed intuitively likely. One might naively hope to prove completeness by showing that every sequence of measurable subsets of $[0,1]$ whose images in $B$ form a Cauchy sequence ``converges almost everywhere'' on $[0,1];$ i.e., that almost every $t\in[0,1]$ belongs either to all but finitely many members of the sequence, or to only finitely many. But this is not so; a counterexample \cite[Exercise 22(6), p.94]{Halmos} is the sequence whose first term is $[0,1],$ whose next two are $[0,\,1/2]$ and $[1/2,\,1],$ whose next three are $[0,\,1/3],$ $[1/3,\,2/3],$ $[2/3,\,1],$ and, generally, whose $\!1{+}2{+}\ldots{+}(n{-}1){+}i\!$-th term for $1\leq i\leq n$ is $[(i-1)/n,\,i/n].$ The measures of these sets approach zero, so the sequence approaches $\emptyset$ in our metric; but clearly every $t\in[0,1]$ occurs in infinitely many of these sets. Looking at this example, one might still hope that given a Cauchy sequence in $B,$ almost every $t\in [0,1]$ has the property that the terms $S_i$ which contain $t$ are either ``eventually scarce'', or have eventually scare complement. But this, too, fails; to see this, take the above example, and ``stretch it out'' by repeating the $\!m\!$-th term $2^m$ times successively, for each~$m.$ However, an online search turned up a proof of the desired completeness statement in a set of exercises~\cite{Mennucci} (in particular point~6 on p.\,2). I cited that in the first draft of this note as the only reference for the result that I could find. David Handelman then pointed out that the desired statement follows immediately from the standard fact that $L^1$ of the unit interval is complete in its natural metric (\cite[Theorem VI.3.4, p.133]{Lang}, \cite[Theorem 22.E, p.93]{Halmos}), on identifying measurable sets with their characteristic functions. (And indeed, in \cite[Exercise~40(1), p.169]{Halmos}, the reader is asked to deduce the result we want from that result about~$L^1.)$ Subsequently, Hannes Thiel pointed me to a result of the desired sort proved for a large class of Boolean rings with measure-like $\![0,1]\!$-valued functions \cite[Theorem 323G(c)]{Fremlin}. (The condition there called {\em localizability} means, roughly, that the Boolean ring has ``enough'' elements of finite measure, and has joins of arbitrary subsets.) In all these sources, the key to the proof of completeness is to pass from an arbitrary Cauchy sequence to a subsequence with the property that the distance between the $\!i\!$-th and $\!i{+}1\!$-st terms is $\leq 2^{-i}.$ Rather magically, a sequence with this property does indeed converge almost everywhere, giving a limit of the original Cauchy sequence. In fact, this trick can be abstracted from the context of measure theory to that of lattices (or even semilattices) as in the next theorem, from which we will recover, as a corollary, the result on measurable sets modulo null sets. Since we no longer need the notation ``$f_x$'' of the preceding section for the point-set at which a function takes on the value $x,$ we will henceforth use subscripts in the conventional way to index terms of sequences. We remark that the condition that a metrized lattice be complete as a metric space, obtained in the theorem, is independent of its completeness as a lattice, i.e., the existence of least upper bounds and greatest lower bounds of not necessarily finite subsets (though the condition that {\em certain} infinite least upper bounds and greatest lower bounds exist will be key to the argument). For instance, any lattice, given with the metric that makes $d(x,y)=1$ whenever $x\neq y,$ is complete as a metric space, and, indeed, satisfies the hypotheses of the next theorem, but need not be complete as a lattice. Inversely, the totally ordered subset of the real numbers $\{-2\}\cup(-1,1)\cup\{2\}$ is complete as a lattice, but not as a metric space. \begin{theorem}\label{T.lat} Let $L$ be a lattice, whose underlying set is given with a metric $d$ which satisfies identically at least one of the inequalities \begin{equation}\begin{minipage}[c]{35pc}\label{d.dv} $d(x\vee y,\,x\vee z)\ \leq\ d(y,\,z)$ $(x,y,z\in L),$ \end{minipage}\end{equation} \begin{equation}\begin{minipage}[c]{35pc}\label{d.dw} $d(x\wedge y,\,x\wedge z)\ \leq\ d(y,\,z)$ $(x,y,z\in L)$ \end{minipage}\end{equation} \textup{(}or, more generally, let $L$ be an upper semilattice satisfying~\eqref{d.dv}, or a lower semilattice satisfying~\eqref{d.dw}\textup{)}. Suppose moreover that in $L$ \begin{equation}\begin{minipage}[c]{35pc}\label{d.incrCauchy} every increasing Cauchy sequence $x_0\leq x_1\leq\ldots\leq x_n\leq\dots$ converges, \end{minipage}\end{equation} and likewise \begin{equation}\begin{minipage}[c]{35pc}\label{d.decrCauchy} every decreasing Cauchy sequence $x_0\geq x_1\geq\ldots\geq x_n\geq\dots$ converges. \end{minipage}\end{equation} Then every Cauchy sequence in $L$ converges; i.e., $L$ is complete as a metric space. \end{theorem} \begin{proof} It suffices to prove the case where $L$ is an upper semilattice satisfying~\eqref{d.dv}, since this includes the case where $L$ is a lattice satisfying~\eqref{d.dv}, while the cases where $L$ is a lower semilattice or lattice satisfying~\eqref{d.dw} follow by duality. So assume $L$ such an upper semilattice. In proving $L$ complete, it suffices to show convergence of sequences $x_0, x_1,\dots$ such that \begin{equation}\begin{minipage}[c]{35pc}\label{d.sum_d()} $\sum_{i\geq 0}\,d(x_i,\,x_{i+1})\ <\ \infty,$ \end{minipage}\end{equation} since every Cauchy sequence has such a subsequence (e.g., one chosen so that $d(x_i,\,x_{i+1})\leq 2^{-i},$ as in \cite{Halmos}, \cite{Lang} and \cite{Mennucci}), and if a subsequence of a Cauchy sequence converges, so does the whole sequence. So let the sequence $x_0, x_1,\dots$ satisfy~\eqref{d.sum_d()}, and let us define \begin{equation}\begin{minipage}[c]{35pc}\label{d.xij} $x_{h,j}\ =\ x_h\vee x_{h+1}\vee\dots\vee x_j$ \ for $h\leq j.$ \end{minipage}\end{equation} Note that if in~\eqref{d.dv} we put $x=x_{h,j},$ $y=x_j,$ $z=x_{j+1},$ we get \begin{equation}\begin{minipage}[c]{35pc}\label{d.dxhjxhj+1} $d(x_{h,j},\,x_{h,j+1})\ \leq\ d(x_j,\,x_{j+1}).$ \end{minipage}\end{equation} Also, for $h\leq j\leq k,$ the triangle inequality (applied $k-j-1$ times) gives $d(x_{h,j},\,x_{h,k})\leq \sum_{j\leq\ell<k}\,d(x_{h,\ell},\,x_{h,\ell+1}).$ Applying~\eqref{d.dxhjxhj+1} to each term of this summation, we get \begin{equation}\begin{minipage}[c]{35pc}\label{d.dxhjxhk} $d(x_{h,j},\,x_{h,k})\ \leq \ \sum_{j\leq\ell<k}\,d(x_{\ell},\,x_{\ell+1}).$ \end{minipage}\end{equation} In particular, for each $j,$ the distance from $x_{h,j}$ to any of the later terms $x_{h,k}$ is $\leq\sum_{j\leq\ell<\infty}\,d(x_\ell,\,x_{\ell+1}).$ As $j\to\infty,$ this sum approaches $0,$ so (still for fixed $h)$ the elements $x_{h,j}$ $(j=h,\,h{+}1,\dots)$ form an increasing Cauchy sequence. By~\eqref{d.incrCauchy} this sequence will converge; let \begin{equation}\begin{minipage}[c]{35pc}\label{d.xhoo} $x_{h,\infty}\ =\ \lim_{j\to\infty}\,x_{h,j}.$ \end{minipage}\end{equation} Note that, by~\eqref{d.dxhjxhk},~\eqref{d.xhoo}, and the continuity of $d$ in the topology it defines, we have \begin{equation}\begin{minipage}[c]{35pc}\label{d.xhjxhoo} $d(x_{h,j},\,x_{h,\infty})\ \leq \ \sum_{j\leq\ell<\infty}\,d(x_{\ell},\,x_{\ell+1})$ \ for $h\leq j.$ \end{minipage}\end{equation} Note next that \begin{equation}\begin{minipage}[c]{35pc}\label{d.xhjxij} $x_{h,j}\ \geq\ x_{i,j}$ \ for $h\leq i\leq j.$ \end{minipage}\end{equation} I claim that this implies that \begin{equation}\begin{minipage}[c]{35pc}\label{d.xhooxioo} $x_{h,\infty}\ \geq\ x_{i,\infty}$ \ for $h\leq i.$ \end{minipage}\end{equation} Indeed,~\eqref{d.xhjxij} and~\eqref{d.xhooxioo} are respectively equivalent to the conditions $d(x_{h,j},\,x_{h,j}{\vee}\,x_{i,j})=0$ and $d(x_{h,\infty},\,x_{h,\infty}{\vee}\nolinebreak\, x_{i,\infty})=0,$ and the latter can be obtained from the former using~\eqref{d.xhoo}. So the elements $x_{h,\infty}$ $(h=0,1,\dots)$ form a decreasing sequence. I claim that this sequence, too, is Cauchy; in fact, that \begin{equation}\begin{minipage}[c]{35pc}\label{d.dxhooxioo} $d(x_{h,\infty},\,x_{i,\infty})\ \leq \ \sum_{h\leq\ell<i}\,d(x_\ell,\,x_{\ell+1})$ \ for $h\leq i.$ \end{minipage}\end{equation} Namely, by essentially the same argument used to prove~\eqref{d.dxhjxhk}, one sees that for every $j\geq i,$ $d(x_{h,j},\,x_{i,j})\leq \sum_{h\leq\ell<i}\,d(x_\ell,\,x_{\ell+1});$ and by continuity of $d,$ this again carries over to the limit as $j\to\infty.$ Hence by~\eqref{d.decrCauchy}, the terms of~\eqref{d.xhooxioo} converge, and we can define \begin{equation}\begin{minipage}[c]{35pc}\label{d.xoo,oo} $x_{\infty,\infty}\ =\ \lim_{h\to\infty}\,x_{h,\infty}.$ \end{minipage}\end{equation} Finally, note that for every $h\geq 0,$ \begin{equation}\begin{minipage}[c]{35pc}\label{d.dxhx00,00} $d(x_h,\,x_{\infty,\infty})\ =\ d(x_{h,h},\,x_{\infty,\infty})\\[.3em] \hspace*{3em}\leq\ d(x_{h,h},\,x_{h,\infty})+ d(x_{h,\infty},\,x_{\infty,\infty})\\[.3em] \hspace*{3em}\leq\ \sum_{h\leq\ell<\infty}\,d(x_\ell,\,x_{\ell+1})\,+ \,\sum_{h\leq\ell<\infty}\,d(x_\ell,\,x_{\ell+1})\\[.3em] \hspace*{3em}=\ 2\,\sum_{h\leq\ell<\infty}\,d(x_\ell,\,x_{\ell+1}),$ \end{minipage}\end{equation} and that this sum approaches $0$ as $h\to\infty.$ Hence the $x_h$ converge, \begin{equation}\begin{minipage}[c]{35pc}\label{d.xh>xoo} $\lim_{h\to\infty}\,x_h\ =\ x_{\infty,\infty},$ \end{minipage}\end{equation} completing the proof of the theorem. \end{proof} The first assertion of the following corollary clearly includes the completeness result called on in~\S\S\ref{S.Bool}-\ref{S.nonBool}. The remaining two assertions are further generalizations. \begin{corollary}\label{C.meas} Let $M$ be a measure space of finite total measure, and $B$ the Boolean ring of measurable subsets of $M$ modulo sets of measure zero. For $S$ a measurable subset of $M,$ let $[S]$ denote its image in~$B.$ Then $B$ is complete with respect to the metric \begin{equation}\begin{minipage}[c]{35pc}\label{d.d_on_M} $d([S],\,[T])\ =\ \mu(S+T),$ \end{minipage}\end{equation} More generally, if $M$ is a measure space not necessarily of finite total measure, and $C$ a positive real constant, and we define \begin{equation}\begin{minipage}[c]{35pc}\label{d.d_C} $d_C([S],\,[T])\ =\ \r{min}(\mu(S+T),\,C),$ \end{minipage}\end{equation} then the Boolean ring $B$ is complete with respect to $d_C.$ Alternatively, if, in the latter situation, we define $B_\r{fin}$ to be the {\em nonunital} Boolean ring of measurable sets of {\em finite} measure modulo sets of measure zero, then $B_\r{fin}$ is again complete with respect to the metric $d$ of~\eqref{d.d_on_M}. In all these cases, the operations of our Boolean ring are continuous in the metric named. \end{corollary} \begin{proof} In each of these cases, the lattice operations on our structure are easily shown to satisfy~\eqref{d.dv}-\eqref{d.decrCauchy} with respect to the indicated metric. (In the case of the metric $d_C$ of~\eqref{d.d_C}, note that in any Cauchy sequence, all but finitely many terms must have the property that their distances from later terms are all $\leq C,$ so that the definition~\eqref{d.d_C}, applied to those distances, reduces to~\eqref{d.d_on_M}.) Hence Theorem~\ref{T.lat} gives completeness. \end{proof} The standard result mentioned earlier, that $L^1$ of the unit interval (indeed, of any measure space) is complete in its natural metric, follows similarly, on regarding $L^1$ as a lattice under pointwise max and min. We remark that in any partially ordered set with a metric, the conjunction of conditions~\eqref{d.incrCauchy} and~\eqref{d.decrCauchy} above is easily shown equivalent to the single condition that every Cauchy sequence whose members form a chain under the partial ordering converges. But the pair of conditions as stated seems easier to work with. In particular, it is easy to see that it holds for measurable sets modulo sets of measure zero in a measure space. Concerning conditions~\eqref{d.dv} and~\eqref{d.dw}, note that these are equivalent to Lipschitz continuity of $\vee,$ respectively $\wedge,$ with Lipschitz constant~$1.$ One could generalize the proof of Theorem~\ref{T.lat} to allow any Lipschitz constant; in fact, I suspect that a version of the theorem could be proved -- at the cost of more complicated arguments -- with these conditions weakened to say that $\vee,$ respectively, $\wedge,$ is uniformly continuous; equivalently, that there exists a function $u$ from the positive reals to the positive reals satisfying \begin{equation}\begin{minipage}[c]{35pc}\label{d.dlimu} $\lim_{t\to 0}\,u(t)\ =\ 0$ \end{minipage}\end{equation} such that \begin{equation}\begin{minipage}[c]{35pc}\label{d.dvu} $d(x\vee y,\,x\vee z)\ \leq\ u(d(y,z))$ $(x,y,z\in L),$ \end{minipage}\end{equation} respectively, \begin{equation}\begin{minipage}[c]{35pc}\label{d.dwu} $d(x\wedge y,\,x\wedge z)\ \leq\ u(d(y,z))$ $(x,y,z\in L).$ \end{minipage}\end{equation} The idea would be to choose from a general Cauchy sequence a subsequence for which the distance between $\!i\!$-th and $\!i{+}1\!$-st terms decreases rapidly enough not only to make these distances have a convergent sum, but to have the corresponding property after taking into account the effect of the $u$ in~\eqref{d.dvu} or~\eqref{d.dwu} under the iterated application of that inequality in the proof. But I don't know whether there are situations where metrics arise that would make it worth trying to prove such a result. \section{Counterexample: a natural lattice under a strange metric}\label{S.ceg} Another pair of conditions weaker than~\eqref{d.dv} and~\eqref{d.dw}, which I at one point thought might be able to replace those two hypotheses in Theorem~\ref{T.lat}, are \begin{equation}\begin{minipage}[c]{35pc}\label{d.dxxvy} $d(x,\,x\vee y)\ \leq\ d(x,y)$ $(x,y\in L),$ \end{minipage}\end{equation} and \begin{equation}\begin{minipage}[c]{35pc}\label{d.dxxwy} $d(x,\,x\wedge y)\ \leq\ d(x,y)$ $(x,y\in L).$ \end{minipage}\end{equation} One can in fact prove from~\eqref{d.dxxvy} that \begin{equation}\begin{minipage}[c]{35pc}\label{d.dx0xdots} $d(x_0,\,x_0\vee\dots\vee x_i)\ \leq \ \sum_{0\leq\ell<i}\,d(x_\ell,\,x_{\ell+1})$\quad $(x_0,\dots,x_i\in L).$ \end{minipage}\end{equation} Indeed,~\eqref{d.dxxvy} gives (if $i>0)$ $d(x_0,\,x_0\vee x_1\vee\dots\vee x_i)\leq d(x_0,\,x_1\vee\dots\vee x_i);$ by the triangle inequality, the right-hand side is $\leq d(x_0,\,x_1)+d(x_1,\,x_1\vee\dots\vee x_i).$ The second of these terms is (if $i>1)$ similarly bounded by $d(x_1,\,x_2)+d(x_2,\,x_2\vee\dots\vee x_i),$ and this procedure, iterated, gives~\eqref{d.dx0xdots}. But one cannot similarly get \begin{equation}\begin{minipage}[c]{35pc}\label{d.0i0j} $d(x_0\vee\dots\vee x_i,\ x_0\vee\dots\vee x_j)\ \leq \ \sum_{i\leq\ell<j}\,d(x_\ell,\,x_{\ell+1})$\quad $(0\leq i\leq j,\ x_0,\dots,x_j\in L)$ \end{minipage}\end{equation} as would be needed to carry out the argument used in the proof of Theorem~\ref{T.lat}. I give below examples showing that that theorem in fact does not hold with~\eqref{d.dxxvy} and~\eqref{d.dxxwy} in place of~\eqref{d.dv} and~\eqref{d.dw}. We will first get an example for upper semilattices and~\eqref{d.dxxvy}, then note how to modify it to make the semilattice into a lattice. Applying duality, one gets examples for the remaining two cases of the theorem. To start the construction, let $M$ be any metric space, with metric $d_M,$ and for any finite nonempty subset $S$ of $M,$ define its diameter, \begin{equation}\begin{minipage}[c]{35pc}\label{d.diam} $\r{diam}(S)\ =\ \max_{x,y\in S}\,(d_M(x,y)).$ \end{minipage}\end{equation} Now let $L$ be the upper semilattice of all finite nonempty subsets of $M,$ under the operation of union; and for $S, T\in L$ define \begin{equation}\begin{minipage}[c]{35pc}\label{d.d_L} $d_L(S,\,T)\ =\ \left\{ \begin{array}{cl} 0 & \mbox{if}\ S=T,\\ \r{diam}(S\cup T) & \mbox{if}\ S\neq T. \end{array}\right.$ \end{minipage}\end{equation} It is straightforward that $d_L$ is a metric on $L;$ the only step requiring thought is the triangle inequality $d_L(S,U)\leq d_L(S,T)+d_L(T,U)$ in the case where the three sets $S,$ $T$ and $U$ are distinct and the maximum defining the left-hand side of the desired inequality is given by distance between some $x\in S$ and some $y\in U.$ In that case, taking {\em any} $z\in T,$ one sees that $d_L(S,U) = d_M(x,y) \leq d_M(x,z)+d_M(z,y)\leq d_L(S,T)+d_L(T,U),$ as required. Under this metric,~\eqref{d.dxxvy} is also immediate: writing that relation as $d(S,\,S\cup T)\leq d(S,T),$ we see that unless $T\subseteq S,$ the two sides both equal $\r{diam}(S\cup T),$ while if $T\subseteq S,$ the left-hand side is zero. I claim next that $L$ has no infinite strictly increasing Cauchy sequences. Indeed, given $S_0\subsetneqq S_1\subsetneqq \dots\in L,$ the set $S_1$ must have more than one element, hence have nonzero diameter; and from~\eqref{d.d_L} we see that for every $i\geq 1,$ $d_L(S_i,S_{i+1})\geq \r{diam}(S_1),$ so the distances between successive terms of the sequence do not approach~$0.$ $L$ also has no infinite strictly decreasing Cauchy sequences, since any strictly decreasing sequence of sets starting with a finite set is finite. So, trivially,~\eqref{d.incrCauchy} and~\eqref{d.decrCauchy} hold. Note also that every non-singleton $S\in L$ has distance at least $\r{diam}(S)$ from every other element of $L,$ so it is an isolated point. It follows that the set of non-singleton elements of $L$ is open in $L,$ so the set of singleton elements is a closed set, which is easily seen to be isometric to $M:$ $d_L(\{x\},\{y\})=d_M(x,y).$ Hence if we take for $M$ a non-complete metric space, then a non-convergent Cauchy sequence in $M$ yields a non-convergent Cauchy sequence in $L.$ So the semilattice $L$ is non-complete, despite satisfying~\eqref{d.dxxvy},~\eqref{d.incrCauchy} and~\eqref{d.decrCauchy}. To get an example which is a lattice, we pass from $L$ as above to~$L'=L\cup\{\emptyset\},$ which is clearly a lattice under union and intersection. The only problem is how to extend the metric $d_L$ to $L'.$ We may in fact use {\em any} extension of this metric to that set that does not sabotage the non-completeness of~$L;$ for~\eqref{d.dxxvy} holds automatically when $x$ and $y$ are comparable, and $\emptyset$ is comparable to every element of $L'.$ So, for instance, we might choose a fixed $P\in L,$ and define \begin{equation}\begin{minipage}[c]{35pc}\label{d.dempty} $d_{L'}(\emptyset,S)\ =\ 1+d_L(P,S)$ \quad for all $S\neq\emptyset.$ \end{minipage}\end{equation} Since this makes $\emptyset$ an isolated point, it leaves the image of $M$ in $L'$ closed, so $L'$ remains non-complete. We remark that the join operation of $L,$ and hence of $L',$ is in general discontinuous; for given any non-eventually-constant sequence $x_0, x_1,\dots$ in $M$ that approaches a limit $y\in M,$ we know that $\{x_0\}, \{x_1\},\dots$ approach $\{y\}$ in $L;$ but for any $z\neq y,$ if we apply $-\vee\{z\}$ we get the sequence $\{x_0,z\}, \{x_1,z\},\dots,$ which cannot approach the isolated point $\{y,z\}.$ So is it plausible that continuity of the meet and join operations, combined with~\eqref{d.dxxvy},~\eqref{d.incrCauchy} and~\eqref{d.decrCauchy}, would imply completeness of a metric lattice? Still no: if we apply the above construction of $L$ with $M$ taken to be a discrete non-complete metric space (e.g., $\{n^{-1}\mid n\geq 1\}\subseteq[0,1]),$ then $L$ is also discrete. (The only elements we don't already know are isolated are the singletons $\{x\}$ for $x\in M;$ but taking $\varepsilon$ such that the ball of radius $\varepsilon$ about $x$ in $M$ contains no other points, we find that the ball of radius $\varepsilon$ about $\{x\}$ in $L$ also contains no other points.) Hence $L',$ metrized as in~\eqref{d.dempty}, is also discrete; and any operation on a discrete space is continuous, though $L'$ is, we have shown, non-complete. \section{Open questions}\label{S.open} I have not examined the question of whether the {\em conjunction} of~\eqref{d.dxxvy} and~\eqref{d.dxxwy} might somehow force a metrized lattice satisfying~\eqref{d.incrCauchy} and~\eqref{d.decrCauchy} to be complete as a metric space. (In the discrete $L'$ constructed above satisfying~\eqref{d.dxxvy}, the inequality~\eqref{d.dxxwy}, i.e., $d_{L'}(S,\,S\cap T)\leq d_{L'}(S,\,T),$ holds when $S\cap T\neq\emptyset,$ but not, in general, when $S\cap T=\emptyset.)$ The referee has asked whether Gleason's original question has the same answer if restricted to the case where $R$ an integral domain. I do not know whether this is so, with or without the assumption that $R$ is complete in the given topology. It seems an interesting question. \section{Acknowledgements}\label{S.ackn} I am indebted to David Handelman and Hannes Thiel for pointing me to results in the literature on completeness of metric spaces arising in measure theory, and to the referee for several useful suggestions.
\section{Introduction} \label{sec:intro} Type Ic supernovae (SNe) arise from the core collapse of a massive star that has lost its hydrogen and helium layers prior to exploding, through either strong stellar winds or interaction with a binary companion \citep[e.g.,][]{1997ARA&A..35..309F, 2017hsn..book..195G}. Their light curves are powered by the radioactive decay of $^{56}$Ni that is produced in the SN explosion. Related to these events, but with luminosities up to 100 times higher, are the Type I superluminous SNe (SLSNe~I; see \citealt{2012Sci...337..927G, 2018ApJ...854..175I, 2018SSRv..214...59M} for reviews of observations and models). SLSNe exhibit spectral similarities to SNe~Ic \citep{2010ApJ...724L..16P}, but their luminosities are such that they cannot be powered solely by radioactive decay \citep{2011Natur.474..487Q}. The nature of the additional energy source remains unknown, with suggestions ranging from a central engine \citep{2010ApJ...717..245K,2010ApJ...719L.204W} to interaction with a massive H and He-free circumstellar medium \citep[CSM;][]{2011ApJ...729L...6C}. Some SNe~Ib/Ic have been observed to develop relatively narrow ($\sim 500-1000$\,km\,s$^{-1}$) emission lines of hydrogen in their spectra; examples include SNe~Ib 2014C and 2004dk \citep{2015ApJ...815..120M, 2018arXiv180307051M} and SNe~Ic 2001em and 2017dio \citep{2017hsn..book..195G, 2018ApJ...854L..14K}. This has been interpreted as evidence that for at least some H-poor SNe, the fast ejecta are colliding with H-rich material relatively far from the star. This late-time interaction has also been observed in some SLSNe~Ic which show H$\alpha$ emission at $+70$ to $+250$\,d after their peak brightness \citep{2015ApJ...814..108Y,2017ApJ...848....6Y}. In this Letter we report on the discovery of an unusual SN with our GREAT ({\bf GR}OND-{\bf e}PESSTO-{\bf AT}LAS; \citealt{2008PASP..120..405G, 2015A&A...579A..40S, 2018PASP..130f4505T}) Survey. We introduce this program here, which is designed to rapidly identify hot, blue transients, with the specific goal of finding very young SLSNe in faint galaxies \citep{2017ATel10510....1C}. SN~2017ens (ATLAS17gqa) was discovered by the ATLAS survey on 2017 June 5 (UT dates are used herein), located at (J2000) $\alpha=12^h04^m09^s.37$, $\delta=-01^\circ55'52.2''$. Prompted by the high blackbody temperature of $21,000\pm3000$\,K that we measured with our GREAT data on 2017 June 8 \citep{2017ATel10478....1C}, we began an intensive spectroscopic and photometric follow-up campaign (Sec.\,\ref{sec:obs}). The adopted redshift of SN~2017ens, $z=0.1086$ (Sec.\,\ref{sec:analysis_result_coronal}), implies an absolute magnitude of $M_{g}=-21.1$ at peak, and thus a luminosity consistent with a SLSN \citep{2012Sci...337..927G}. In Sec.\,\ref{sec:analysis_result} we present the spectral evolution of SN~2017ens, which began to show $\sim2000$\,km\,s$^{-1}$ wide H$\alpha$ and H$\beta$ emission after $+163$\,d (phases are corrected for time dilation and are relative to the GROND $r$-band maximum on MJD = 57,924.011). We compare the spectral properties of SN~2017ens to those of other SLSNe and broadlined SNe~Ic (SNe~Ic-BL), and also present the detections of rarely seen coronal lines. The bolometric light curve and modeling results are described in Sec.\,\ref{sec:LC_model}. Finally, in Sec.\,\ref{sec:dis} we discuss plausible scenarios that may explain the spectral evolution and luminosity of SN~2017ens. We adopt a cosmology of $H_{0}=72~\mathrm{km~s^{-1}~Mpc^{-1}}$, $\Omega_\Lambda=0.73$, and $\Omega_{m}=0.27$. The foreground reddening toward SN~2017ens is $A_{V}=0.058$\,mag \citep{2011ApJ...737..103S}, and we assume that host-galaxy extinction is negligible because no Na~I~D absorption is visible in the SN spectrum. \section{Observations} \label{sec:obs} Our photometric coverage of SN~2017ens spans the ultraviolet (UV) with the Ultraviolet and Optical Telescope (UVOT) on the Neil Gehrels {\it Swift} Observatory, optical wavelengths with GROND, ATLAS, LCO 1\,m\footnotemark[1], and Lulin Super Light Telescope (SLT)\footnotemark[2], and near-infrared (NIR) bands with GROND. We use standard procedures to reduce the data (\citealt{2008MNRAS.383..627P} for UVOT; \citealt{2008ApJ...685..376K} for GROND). Ground-based optical photometry is calibrated against the Sloan Digital Sky Survey (SDSS). For ATLAS magnitudes we apply passband corrections using spectra \citep[prescription from][]{2018MNRAS.475.1046I}; for SLT data we use the conversion of R. Lupton\footnotemark[3]. The NIR magnitudes are calibrated against Two Micron All Sky Survey (2MASS) field stars. All data are reported in the AB system, and errors include the statistical and systematic uncertainties. We do not have host-galaxy templates, but we estimate a $<15\%$ contribution from host light ($r>23$\,mag measured in pre-explosion Panoramic Survey Telescope and Rapid Response System (PanSTARRS) images) to our SN photometry after $+150$\,d. Our photometric results are given in a machine-readable table and shown in Fig.\,\ref{fig:LC} (top panel). \footnotetext[1]{https://lco.global/observatory/sites/} \footnotetext[2]{http://www.lulin.ncu.edu.tw/slt76cm/slt\_introdution.htm} \footnotetext[3]{http://classic.sdss.org/dr4/algorithms/sdssUBVRITransform.html} We obtained a series of spectra of SN~2017ens, following the SN evolution from $+4$\,d to $+265$\,d (log of observations in Table\,\ref{tab:sn_spec}). Spectra are reduced in the standard fashion (ALFOSCGUI pipeline\footnotemark[4] for ALFOSC) or using custom-built pipelines PyWiFeS \citep{2014Ap&SS.349..617C} for WiFeS, LPipe\footnotemark[5] for LRIS, \citet{2015A&A...581A.125K} for X-Shooter, and \citet{2015A&A...579A..40S} for EFOSC2. Finally, we correct the spectral-flux calibration against $r$-band photometry. The resulting calibration error estimated by comparing to $g$-band photometry is generally $<0.10$\,mag, with the exception of the WiFeS (0.15\,mag) and Keck (0.25\,mag) spectra. (Those data were taken at very high airmass, making flux calibration difficult.) All spectra will be available through WISeREP \citep{2012PASP..124..668Y}. \footnotetext[4]{http://sngroup.oapd.inaf.it/foscgui.html} \footnotetext[5]{http://www.astro.caltech.edu/$\sim$dperley/programs/lpipe.html} \section{Analysis and results} \label{sec:analysis_result} \subsection{Light Curves and Comparison} \label{sec:analysis_result_LC} The discovery epoch of SN~2017ens with $M_{r}\approx-19.8$\,mag is at MJD = 57,909.3. ATLAS monitored the field daily for 23\,d before discovery. From a deep image taken 3\,d before discovery ($M_{r}\approx-18.7$\,mag), we constrain the explosion date of SN~2017ens to MJD $=57,907.8\pm1.5$; thus, the rest-frame rise time is $\sim15$\,d. Fig.\,\ref{fig:LC} (middle panel) shows the absolute $g$-band light curve, which we compare to SLSNe, SNe~IIn, and SNe~Ic-BL selected based on the photometric properties and spectral evolution (see Sec.\,\ref{sec:analysis_result_spec}) of SN~2017ens. At peak, SN~2017ens is $\sim10$ times more luminous than the SNe~Ic-BL~1998bw \citep{2001ApJ...555..900P}, 2003jd \citep{2008MNRAS.383.1485V}, and SN~Ic~2017dio \citep{2018ApJ...854L..14K}, which shows narrow H and He emission in its spectra. The early-phase light-curve evolution of SN~2017ens is similar to that of rapidly evolving SLSNe such as LSQ14mo \citep{2017A&A...602A...9C, 2015ApJ...815L..10L} and SN~2010gx \citep{2010ApJ...724L..16P}. SN~2017ens shows no sign of undulations in its light curves, as are often observed in slowly evolving SLSNe as well as SLSNe that exhibit late-time H$\alpha$ such as iPTF13ehe \citep{2015ApJ...814..108Y} and iPTF15esb \citep{2017ApJ...848....6Y}. At late times, the light curves of SN~2017ens remain approximately constant, indicating that strong interaction dominates, as in SN~IIn~2010jl before +300\,d \citep{2014ApJ...797..118F}. \begin{figure}[htbp] \centering \begin{subfigure}{0.50\textwidth} \includegraphics[width=\columnwidth]{SN2017ens_LC_all_correction.pdf} \end{subfigure} \begin{subfigure}{0.50\textwidth} \includegraphics[width=\columnwidth]{SN2017ens_LC_comp_reversion.pdf} \end{subfigure} \begin{subfigure}{0.50\textwidth} \includegraphics[width=\columnwidth]{SN2017ens_bol_lc_model_new.pdf} \end{subfigure} \caption{{\it Top panel:} multiband light curves of SN~2017ens. Note the discontinuous abscissa. {\it Middle panel:} light-curve comparison in absolute $g$ band with the SNe chosen for spectroscopic comparison. {\it Bottom panel:} bolometric light curve of SN~2017ens and model fitting.} \label{fig:LC} \end{figure} \subsection{Spectroscopic Evolution and Comparison} \label{sec:analysis_result_spec} We show the spectral evolution of SN~2017ens in Fig.\,\ref{fig:spec_evolution}. Around maximum light the spectra are blue and featureless. In the first spectrum taken at $+4$\,d after peak, we detect narrow H$\alpha$ and H$\beta$ emission lines (barely resolved width of $\sim100$\,km\,s$^{-1}$). Fitting the dereddened spectra with a blackbody gives a temperature of $T_{\rm BB}\geq10,300$\,K, consistent with our estimate from the GROND analysis ($\geq11,500$\,K). At $\sim1$ month after peak, some broad features emerge, similar to those seen in SNe~Ic-BL after peak brightness \citep[e.g.,][]{2001ApJ...555..900P}. Apart from narrow H$\alpha$ and H$\beta$, we detect a narrow \ion{He}{1} $\lambda5876$ emission line. The commonly observed [\ion{O}{2}], [\ion{O}{3}], and [\ion{N}{2}] host-galaxy emission lines are absent, suggesting that the observed Balmer lines originate from the transient itself, not the underlying host \citep{2017ATel10587....1P}. We also check the WiFeS datacubes and see no [\ion{O}{3}] emission at the SN position. At late times ($>160$\,d) after the SN emerged from solar conjunction, our data reveal dramatic evolution, with the spectra more resembling those of SNe~IIn. The spectra are still blue, but now dominated by prominent, $\sim2000$\,km\,s$^{-1}$ wide Balmer emission lines, indicative of much stronger interaction with H-rich CSM. The luminosity and the velocity of the $\sim2000$\,km\,s$^{-1}$ H$\alpha$ line does not vary significantly between $+163$ and $+264$\,d, staying at $\sim3\times 10^{40}$\,erg\,s$^{-1}$. \begin{figure*} \centering \includegraphics[width=\textwidth]{SN2017ens_spec_evo_ha_reversion2.pdf} \caption{Spectroscopic evolution of SN~2017ens. The right panels show the velocity of the H$\alpha$, H$\beta$, and \ion{He}{1} $\lambda 5876$ lines at selected epochs. Each phase is shown with the same color as in the main panel.} \label{fig:spec_evolution} \end{figure*} The spectral evolution of SN~2017ens is unique, sharing features with several distinct SN subclasses (Fig.\,\ref{fig:spec_comp} top panel). In the earliest phases, the blue and featureless spectra share a similarity with young core-collapse SN spectra. We do not see the \ion{O}{2} absorption features commonly associated with SLSNe. However, we may have missed them in SN~2017ens. For example, SLSN~2010gx \citep{2010ApJ...724L..16P} displayed \ion{O}{2} absorption before it peaked and then became blue and featureless. As the spectra evolve, SN~2017ens is not well matched to other SLSNe such as LSQ14mo \citep{2017A&A...602A...9C} and iPTF15esb \citep{2017ApJ...848....6Y}. Rather, it appears to be more similar to SNe~Ic-BL. The classification tool GELATO \citep{2008A&A...488..383H} applied to the SN~2017ens $+27$\,d spectrum returns the closest similarity with SN~1998bw at $+22$\,d \citep{2001ApJ...555..900P} and SN~2003jd at $-0.3$\,d \citep{2014AJ....147...99M}. These two SNe~Ic-BL still provide a good match to SN~2017ens when we remove the continua assuming a blackbody (Fig.\,\ref{fig:spec_comp}, middle panel). SN~2017ens has a somewhat bluer continuum, perhaps due to CSM interaction, as was the case for SN~2017dio at +6\,d \citep{2018ApJ...854L..14K}. The origin of the broad feature around 6530\,\AA\ is uncertain; it could be attributed to a blend of Si and Fe/Co lines, H$\alpha$ associated with interaction, or the \ion{C}{2} $\lambda$6580 line sometimes seen in SLSNe \citep[e.g., SN~2018bsz;][]{2018arXiv180610609A}. During the late-time strongly interacting phase, the overall spectral features of SN~2017ens are well matched with those of SN~2017dio at +83\,d. Both SNe exhibit a blue pseudocontinuum (below $\sim5000$\,\AA) that is more significant than in iPTF13ehe at +251\,d \citep{2015ApJ...814..108Y}; it is likely produced by \ion{Fe}{2} lines \citep{2009ApJ...695.1334S}. \begin{figure*} \centering \begin{subfigure}{1\linewidth} \centering \includegraphics[width=0.65\linewidth]{SN2017ens_com_slsn_grbsn_Ic_reversion.pdf} \end{subfigure} \begin{subfigure}{1\linewidth} \centering \includegraphics[width=0.65\linewidth]{SN2017ens_roomin_reversion.pdf} \end{subfigure} \begin{subfigure}{1\linewidth} \centering \includegraphics[width=0.65\linewidth]{SN2017ens_com_10jl_reversion.pdf} \end{subfigure} \caption{{\it Top panel:} comparison between SN~2017ens and other SNe at three selected epochs. {\it Middle panel:} comparison between SN~2017ens and the Type Ic-BL SNe~1998bw and 2003jd. The lower spectra have their continuum removed assuming a blackbody. {\it Bottom panel:} comparison between SN~2017ens and the Type IIn SN~2010jl at optical and NIR wavelengths.} \label{fig:spec_comp} \end{figure*} \subsection{Nebular and Coronal Lines} \label{sec:analysis_result_coronal} The VLT/X-Shooter spectra around $+190$\,d (Fig.\,\ref{fig:spec_vlt}) provide higher resolution and wider wavelength coverage than our other spectra, enabling us to detect many narrow emission lines. Interestingly, we find that the flux ratio of the nebular [\ion{O}{3}] $\lambda\lambda4959$, 5007 and auroral [\ion{O}{3}] $\lambda4363$ lines is 0.45, consistent with coronal lines that may arise from X-ray photoionization \citep{2002ApJ...572..350F} of dense gas (see \citealt{1984ApJ...285..458F}, their Fig.\,11). Therefore, we conclude that the [\ion{O}{3}] $\lambda4363$ line comes from the SN, and we use it to constrain the redshift of SN~2017ens to $z=0.1086$, consistent with the average of the [\ion{O}{2}] $\lambda3727$ and [\ion{O}{3}] $\lambda\lambda4959$, 5007 lines. These narrow coronal lines have been seen in only a handful of SNe~IIn and the transitional object SN~2011hw \citep{2015MNRAS.449.1921P}. The ratio [\ion{O}{3}]$\lambda$4363/[\ion{O}{3}]$\lambda\lambda$4959, 5007 for SN~2017ens is similar to that seen in SN~2005ip at +173\,d \citep{2009ApJ...695.1334S}, SN~2006jd at $+1542$\,d \citep{2012ApJ...756..173S}, and SN~2010jl at $+461$\,d and $+573$\,d \citep{2014ApJ...797..118F}. Other coronal lines detected in SN~2017ens are similar to those seen in SN~2010jl (Fig.\,\ref{fig:spec_comp}, bottom panel): [\ion{Fe}{10}] $\lambda6374.5$ is strong, as are [\ion{Fe}{11}] $\lambda7891.8$, [\ion{Ne}{5}] $\lambda\lambda3345.8$, 3425.9, [\ion{Ca}{5}] $\lambda6086.8$, and [\ion{Ar}{10}] $\lambda5533.2$. The presence of these lines is indicative of a highly ionized and dense CSM, although we do not detect the highest-ionization coronal lines such as [\ion{Fe}{14}] $\lambda5302.9$ and [\ion{Ar}{14}] $\lambda4412.3$, which were seen in SN~2005ip. The flux ratio of the [\ion{O}{3}] $\lambda4363$ to $\lambda5007$ lines is a function of the CSM density and temperature. Following \citet[][their Fig.\,26]{2014ApJ...797..118F}, we use our measured flux ratio, log($\lambda4363/\lambda5007)=-0.22$, to constrain the CSM electron density to lie between $10^{6}$ and $10^{8}$\,cm$^{-3}$ for $T_e =50,000$ to 10,000\,K. This density range is consistent with that observed for SN~2010jl. From our mid-resolution X-Shooter data, we resolve narrow P-Cygni profiles on top of the $\sim2000$\,km\,s$^{-1}$ wide Balmer and Paschen lines. We measure the blueshifted wavelength from the absorption component of the H$\gamma$, H$\beta$, and H$\alpha$ P-Cygni profiles, which suggests that the unshocked CSM has a low velocity of $\sim50$\,km\,s$^{-1}$. A similar velocity of $\sim60$\,km\,s$^{-1}$ is obtained from the P-Cygni profile of the \ion{He}{1} $\lambda10,830$ line. Moreover, we measure the full width at half-maximum intensity (FWHM) of the wide components, such as H$\alpha$ ($2500\pm700$\,km\,s$^{-1}$), H$\beta$ ($2300\pm400$\,km\,s$^{-1}$), Pa$\gamma$ ($2000\pm200$\,km\,s$^{-1}$), and \ion{He}{1} $\lambda10,830$ ($2200\pm200$\,km\,s$^{-1}$). We also detect narrow absorption lines from the Balmer series (no clear emission), spanning H$\epsilon$ to H33 (3659\,\AA). In addition, we see emission from the \ion{H}{2} region close to the host-galaxy center (see Fig.\,\ref{fig:spec_vlt}, marked B1), as part of a faint galaxy (SDSS J120409.47--015552.4) with $g = 21.92\pm0.24$\,mag ($M_{g}\approx-16.5$\,mag). These lines have a slightly different redshift ($z=0.1084$) than SN~2017ens. In particular, the (noisy) detection of the weak auroral [\ion{O}{3}] $\lambda4363$ line indicates a low host-galaxy metallicity of $\sim0.04$--$0.4\,Z_{\odot}$ using the direct ${\rm T_{e}}$-based method. If we instead use the empirical N2 metallicity diagnostic \citep{2004MNRAS.348L..59P}, we measure $Z=0.3\pm0.2\,Z_{\odot}$. \begin{figure*} \centering \begin{subfigure}[b]{0.6\textwidth} \includegraphics[width=1\linewidth]{SN2017ens_Xshooter_uvb_vis_reversion.pdf} \end{subfigure} \begin{subfigure}[b]{0.6\textwidth} \includegraphics[width=1\linewidth]{SN2017ens_Xshooter_nir_reversion.pdf} \end{subfigure} \begin{subfigure}[b]{0.45\textwidth} \includegraphics[width=1\linewidth]{colour_SN2017ens_GROND.pdf} \end{subfigure} \caption{VLT/X-Shooter spectra of SN~2017ens at $+190$\,d. {\it Top panel:} UVB and optical (VIS) parts. {\it Middle panel:} NIR part. The main panels use a log scale in order to present details in the continuum (rebinned to 2\,\AA\,pixel$^{-1}$ (UVB+VIS) and 5\,\AA\,pixel$^{-1}$ (NIR)); inset panels use a linear scale without binning. {\it Bottom panel left:} color-combined image from GROND $r'i'z'$ bands. SN~2017ens is associated with host-galaxy B1+B2, and there is a possible tidal tail connecting to the nearby object A (redshift unknown). Source C is a background galaxy at $z=0.30$. The X-Shooter slit position is indicated with two dashed lines. {\it Bottom panel right:} the H$\beta$ position in the two-dimensional raw image.} \label{fig:spec_vlt} \end{figure*} \section{Bolometric Light Curve and Model Fitting} \label{sec:LC_model} Using all of our available UV-through-NIR photometry, we built a pseudobolometric light curve for SN~2017ens using the prescription from \citet{2018MNRAS.475.1046I}. The results are very similar to those derived when using a blackbody fit, as expected as our photometry covers a large wavelength range. From a polynomial fit to the bolometric data we obtain $L_{\rm bol}=(5.86\pm0.20)\times10^{43}$\,erg\,s$^{-1}$ at peak and an integrated energy of $(3.53\pm1.42)\times10^{50}$\,erg. To fit our bolometric light curve, we used a two-component model consisting of a central heating and an interaction component. First, the centrally heated component uses the standard Arnett method \citep{1982ApJ...253..785A,2013ApJ...770..128I}. We tested three possible central power sources: the nuclear decay of $^{56}$Ni, the spindown of a magnetar \citep{2010ApJ...717..245K}, and fallback accretion \citep{2013ApJ...772...30D, 2018arXiv180600090M}. The $^{56}$Ni decay and the magnetar spindown light curves are obtained as by \citet{2013ApJ...770..128I}, but the magnetar model takes the gamma-ray opacity from the magnetar into account as by \citet{2015MNRAS.452.1567C}. The fallback accretion power is obtained by assuming a central energy input of $L_{\mathrm{fallback},1}(t/1\,\mathrm{s})^{-5/3}$, where $L_{\mathrm{fallback},1}$ is a constant \citep{2013ApJ...772...30D}. Second, for the interaction component, we adopted a steady-wind CSM, and the input luminosity from this component goes as $L_{\mathrm{int},1}(t/1\,\mathrm{s})^{-3/5}$, where the outer SN density structure is proportional to $r^{-7}$ \citep{2013MNRAS.435.1520M}. The inner SN density structure is assumed to be constant. We first used the interaction component to fit the bolometric light curve 150\,d after explosion, assuming that interaction is the dominant light source at this time. We then derived the contribution required from a central power source at early times to provide a good light-curve match. Given that the spectra of SN~2017ens and SN~1998bw are similar (Fig.\,\ref{fig:spec_comp}), we used the relation $(E_\mathrm{ej}/10^{51}\,\mathrm{erg})/(M_\mathrm{ej}/M_\odot)\approx3$ found for SN~1998bw \citep{2001ApJ...550..991N} to break the degeneracy between $E_\mathrm{ej}$ and $M_\mathrm{ej}$. Fig.\,\ref{fig:LC} (bottom panel) shows the results of our fits. In all cases, the CSM interaction model that we used has $L_{\mathrm{int},1}=7.7\times10^{46}\,\mathrm{erg\,s^{-1}}$. The inner edge of the CSM is set at $1.2\times10^{15}\,\mathrm{cm}$ to match the early light-curve rise in the model, but this constraint is not strong. We find that all three centrally heated models provide reasonable fits to the bolometric light curve. They all have $E_\mathrm{ej}=1.5\times10^{52}\,\mathrm{erg}$ and an ejecta mass of $5\,M_\odot$. However, the $^{56}$Ni-powered light curve requires a very high $^{56}$Ni mass of $3.5\,M_\odot$. This is close to the ejecta mass, and we therefore find the $^{56}$Ni-powered model to be unlikely. Alternatively, a magnetar central engine with an initial spin of 3.8\,ms and a magnetic field of $8\times10^{13}\,\mathrm{G}$, and fallback accretion with $L_{\mathrm{fallback},1}=6\times10^{53}\,\mathrm{erg\,s^{-1}}$, provide good qualitative fits to the light curve. It is of course possible that the entire light curve is driven by different degrees of interaction. The contribution of the interaction component at early times (0--70\,d after explosion) is $\sim20$\%, while it is $\gtrsim90$\% at late times (200\,d). Assuming the above best-fit results and a kinetic energy to radiation conversion efficiency at the shock of 0.1 \citep{2013MNRAS.435.1520M}, we estimate the mass-loss rate of the progenitor to be $5\times10^{-4}\,M_\odot\,\mathrm{yr^{-1}}$, with a constant wind velocity of $50\,\mathrm{km\,s^{-1}}$. The CSM density estimate is similar to those of SNe~IIn showing similar coronal lines \citep{2013A&A...555A..10T}. \section{Discussion} \label{sec:dis} One important clue to interpreting the possible powering mechanisms behind SN~2017ens is that we measured the H-rich material to have a velocity of $\sim50$--60\,km\,s$^{-1}$\ from the blueshifted absorption of the narrow P-Cygni profiles. This wind velocity is far slower than those present in Wolf-Rayet star winds. If this wind is from the progenitor, it could come from a massive H-rich progenitor (such as a luminous blue variable) that explosively ejected its H envelope shortly before the SN explosion. Alternatively, this wind could come from a pulsational pair-instability SN with a slow and long-term stable wind \citep{2017ApJ...836..244W}. It is also possible that SN~2017ens exploded as a SN~Ic-BL inside a patchy, H-rich CSM from a binary companion; the expanding ejecta interact with the bulk of the CSM at later times, as has been suggested for SN~2017dio \citep{2018ApJ...854L..14K}. Alternatively, as proposed for ASASSN-15no \citep{2018MNRAS.476..261B}, a dense inner CSM may have hidden the SN features at early times, before they become briefly visible as the CSM was swept up by the ejecta. At late times they could have again been masked by an increasingly strong interaction component. A special CSM geometry (e.g., doughnut shape) is also probable, and we see the SN~Ic-BL along a certain viewing angle. In the case of a binary companion, the wind of $\sim50$--60\,km\,s$^{-1}$\ and mass-loss rate of $5\times10^{-4}\,M_\odot\,\mathrm{yr^{-1}}$ are consistent with a red supergiant \citep{2017MNRAS.465..403G}, albeit at the more extreme end, which can be explained by the companion having gained mass from the SN progenitor during an earlier accretion phase. If so, this may suggest that the progenitor of SN~2017ens lost its H and He layers through interaction with a binary companion. We must also consider the apparent $\sim2000$\,km\,s$^{-1}$\ material given its high luminosity. If this is associated with mass loss from the progenitor, and the line width is not from electron scattering as seen in many SNe~IIn, then the material is moving much faster than the winds of H-rich stars (or the CSM of SNe~IIn). It is difficult to imagine how this could be produced by anything other than a sudden ejection of the H envelope, shortly before the SN explosion. In fact, the luminosity of the $\sim2000$\,km\,s$^{-1}$ wide component of H$\alpha$ is comparable to that seen in SN~1995N \citep{2002ApJ...572..350F} ($\sim2.3\times10^{40}$\,erg\,s$^{-1}$), and it may be too large to be coming solely from swept-up material. A pulsational pair-instability explosion is at least qualitatively consistent with an outburst that can unbind the H envelope shortly before an SN explosion. This scenario is also consistent with the measured low-metallicity environment. The unique spectroscopic evolution of SN~2017ens together with its high luminosity poses challenges to all currently known SN scenarios. While detailed modeling can help elucidate the nature of this transient, ongoing surveys for SLSNe such as GREAT will find more such peculiar transients. With a larger sample and high-cadence follow-up spectroscopy, we will be able to further understand the nature of SN 2017ens-like objects and the role of interaction in SLSNe. \acknowledgments T.W.C. acknowledges Thomas~Kr\"uhler for the X-Shooter data reduction, Lin Yan and Claes Fransson for providing comparison spectra, Jason Spyromilio for useful discussions, Chien-Hsiu~Lee and You-Hua~Chu for coordinating observational resources, and funding from the Alexander von Humboldt Foundation. M.F. acknowledges the support of a Royal Society -- Science Foundation Ireland University Research Fellowship. P.S. acknowledges support through the Sofia Kovalevskaja Award (Alexander von Humboldt Foundation). A.V.F. is grateful for the support of the TABASGO Foundation, the Christopher R. Redlich fund, and the Miller Institute for Basic Research in Science (U.C. Berkeley). A.J.R. and I.R.S. are supported by the Australian Research Council through grants FT170100243 and FT160100028, respectively. F.T. and J.S. acknowledge support from the KAW Foundation. S.J.S. acknowledges funding from the European Research Council Grant agreement \#291222 and STFC grant ST/P000312/1. M.G. is supported by Polish National Science Centre grant OPUS 2015/17/B/ST9/03167. K.M. acknowledges support from the UK STFC through an Ernest Rutherford Fellowship and from a Horizon 2020 ERC Starting Grant (\#758638). L.G. was supported in part by US NSF grant AST-1311862. C.P.G. acknowledges support from EU/FP7-ERC grant \#615929. Z.Y.L., C.C.N., and P.C.Y. are grateful for funding from MoST (Taiwan) under grants 105-2112-M-008-002-MY3, 104-2923-M-008-004-MY5, and 106-2112-M-008-007. A.P. and S.B. are partially supported by PRIN-INAF 2017 ``Toward the SKA and CTA era: discovery, localization, and physics of transient sources'' (P.I.: Giroletti). A.G.-Y. is supported by the EU via ERC grant No. 725161, the Quantum Universe I-Core program, the ISF, the BSF Transformative program, and a Kimmel award. Part of the funding for GROND was generously granted from the Leibniz Prize to Prof. G. Hasinger (DFG grant HA 1850/28-1). Partly observations made with the Nordic Optical Telescope using ALFOSC. This publication has made use of data collected at Lulin Observatory, partly supported by MoST grant 105-2112-M-008-024-MY3. Some of the data presented herein were obtained at the W. M. Keck Observatory, which is operated as a scientific partnership among the California Institute of Technology, the University of California, and NASA; the observatory was made possible by the generous financial support of the W. M. Keck Foundation. \begin{sidewaystable} \begin{minipage}{190mm} \centering \caption{Log of spectroscopic observations of SN~2017ens and its host galaxy.} \label{tab:sn_spec} \begin{tabular}[t]{llllllllll} \hline UT Date & MJD & Phase & Telescope & Instrument & Grating/Grism & Exp. Time & Slit & Resolution & Range \\ & & (day) & & & /Arm & (s) & (\arcsec) & (\AA) & (\AA) \\ \hline 2017 Jun. 24 & 57928.392& 3.95 & ANU 2.3\,m & WiFeS$^a$ & B3000/R3000 & 1200/1200 & IFU & 1.6/2.5 & 3500--5700/5400--9500 \\ 2017 Jun. 26 & 57930.356 & 5.72 & NOT & ALFOSC & Gr\#4 & 1800 & 1.0 & 16 & 3300--9700\\ 2017 Jul. 20 & 57954.264 & 27.29 & Keck I & LRIS & B600/R400 & 1125 & 0.7 & 5/6 & 3200--10,000\\ 2017 Jul. 26 & 57960.356 &32.78 & ANU 2.3\,m & WiFeS$^a$ & B3000/R3000 & 1200/1200 & IFU & 1.6/2.5 & 3500--5700/5400--9500 \\ 2017 Dec. 17 & 58104.325 & 162.65 & NTT & EFOSC2 & Gr\#13 & 2700 & 1.0 & 18.2 & 3700-9200 \\ 2017 Dec. 27 & 58114.301 & 171.65 & NTT & EFOSC2 & Gr\#11/Gr\#16 & 2700/2700 & 1.0/1.0 & 13.8/13.4 & 3400--7400/6000--9900\\ 2018 Jan. 14 & 58132.275 & 187.86 & VLT & X-Shooter & UVB/VIS/NIR & 3600/3400/3680 & 0.9/0.9/1.0 & 1/1.1/3.3 & 3000--5560/5450--10,200/10,000--20,600\\ 2018 Jan. 14 & 58132.312 & 187.90 & NTT & EFOSC2 & Gr\#11 & 3600 & 1.0 & 13.8 & 3400--7400\\ 2018 Jan. 15 & 58133.263& 188.75 & VLT & X-Shooter & UVB/VIS/NIR & 7200/6800/7360 & 0.9/0.9/1.0 & 1/1.1/3.3 & 3000--5560/5450--10,200/10,000--20,600\\ 2018 Jan. 15 & 58133.273 & 188.76 & NTT & EFOSC2 & Gr\#16 & 2700 & 1.0 & 13.4 & 6000--9900\\ 2018 Jan. 16 & 58134.268 & 189.66 & VLT & X-Shooter & UVB/VIS/NIR & 3600/3400/3680 & 0.9/0.9/1.0 & 1/1.1/3.3 & 3000--5560/5450--10,200/10,000--20,600\\ 2018 Jan. 19 & 58137.305 & 192.40 & VLT & X-Shooter & UVB/VIS/NIR & 3600/3400/3680 & 0.9/0.9/1.0 & 1/1.1/3.3 & 3000--5560/5450--10,200/10,000--20,600\\ 2018 Feb. 14 & 58163.277 & 215.83 & NTT & EFOSC2 & Gr\#11 & 8100 & 1.0 & 13.8 & 3400--7400\\ 2018 Feb. 18 & 58167.245 & 219.41 & NTT & EFOSC2 & Gr\#16 & 5400 & 1.0 & 13.4 & 6000--9900\\ 2018 Apr. 9 & 58217.065 & 264.35 & NTT & EFOSC2 & Gr\#13 & 2700 & 1.0 & 18.2 & 3650--9200\\ \hline \end{tabular} $^a$WiFeS is an integral field unit (IFU) with 25 slitlets that are $1''$ wide and $38''$ long. Resolution is measured from the night-sky lines. \end{minipage} \end{sidewaystable} \clearpage
\section{Introduction} Anomaly detection is such a widely studied topic, and has found numerous applications in various contexts, that it defies easy generalization. Nonetheless, the vast majority of applications that have embraced anomaly detection methods have characteristics that may not be representative of scientific data. Chandola {\it et al.} \cite{ChandolaBK2009} emphasize that the key aspects of anomaly detection include the nature of input data, type(s) of anomaly and output of anomaly detection. In all these aspects, scientific data have distinctly different attributes compared to all other domains. As the scale of scientific investigations keeps ever increasing, robust anomaly detection is becoming increasingly critical. One of the key findings of a Department of Energy Workshop on mathematics of data \cite{MAPD} is ``\emph{near real-time identification of anomalies in streaming and evolving data is needed in order to detect and respond to phenomena that are either short-lived or urgent}''. Some of the challenges of anomaly detection in scientific data stem from the following attributes: \begin{itemize} \item Multi-variate, multi-physics phenomena: the observations are of numerous variables (tens to hundreds) that represent coupled non-linear physics and hence elude easy assumptions about statistical (in)dependence. \item Multi-scale dynamics: the different observed variables span vastly different orders of magnitude since they are active at different scales in space and time. \item The observed data are not discrete but rather continuous and smoothly varying over multiple decades. With computational power ever increasing, the numerical resolution of investigations, e.g. scientific computing, is increasingly finer over a broader range of scales. \item In most cases the field variables are not Gaussian. Examples of non-Gaussian distributions include beta or bi-modal shape distributions for reacting scalars in turbulent combustion and log-normal shape for dissipation in turbulence. \item We are focusing on data rich, not data-sparse, scenarios like extreme-scale computational simulations or extremely well resolved measurements/observations. \end{itemize} There are many scenarios where detecting scientific anomalies may be critically important. Many scientific investigations involve large quantities of rapidly streaming data: massively parallel computational fluid dynamics (CFD) simulations, large-scale particle accelerator data, real-time climate and meteorological simulations, etc. Identifying anomalies as they occur can help judicious steering of these investigations (e.g. trigger analyses, data check pointing, mesh/time-step refinement, model parameter refinements, etc.). Across these vast and varied scientific domains a general definition of an ``anomaly'' may be elusive and even within one domain it could be problem or regime dependent. Yet physics-driven anomalies, as opposed to investigative/measurement anomalies, occur in these settings and are important to detect. A semi-supervised method based on for random forests has been investigated in \cite{ling2017}. We clarify that our focus is on identifying anomalous events in scientific investigations, if and when they occur in streaming scientific data, and not whether a specific observation is anomalous relative to the rest. To this end, we want to develop an unsupervised methodology for detecting \emph{statistically identifiable but anomalous scientific phenomena e.g. ignition events in turbulent combustion and cyclones in climate simulations.} Our intuition is that these phenomena have a statistical signature measurable in the higher statistical joint moments. Accordingly, we propose a methodology that is centered on analyzing high-order joint moments in multi-variate scientific datasets. The anomalous event may occur at any time on some subset(s) of the spatial domain. The central hypothesis of the approach we propose is as follows: \begin{itemize} \item In data rich settings like scientific computing, anomalies have a discernible statistical signature since the data samples are usually large in number. \item Higher statistical moments, in particular kurtosis, are good indicators of outliers. \item For multi-variate data, by analogy to principal component analysis (PCA), principal vectors of the fourth order joint moment tensor -- principal kurtosis vectors -- signify directions along which outliers lie. \item The occurrence of a anomalous event manifests as a \emph{sudden detectable change in the principal kurtosis vectors}. \end{itemize} We also note that, in choosing to analyze statistical joint moments, we assume that the large data sizes ensure that higher moments are reasonably converged. Moreover, joint moments can be computed in a computationally efficient manner and fast, single-pass algorithms for computing arbitrary order joint moments over distributed datasets are readily available in literature \cite{PebayTKB2016}. From a scientific computing perspective these algorithms have a high compute intensity and have regular, contiguous memory access patterns. They are scalable and likely to be efficient compared to algorithms that may be based on, say, decision trees. \section{Background} An anomaly can be loosely defined as an occurrence of something that is ``abnormal", ``atypical" or ``unexpected" \cite{Grubbs1969}. This is predicated on the assumption that what may be normal/typical/expected is well known and well defined, which may not always be the case. Accordingly, a wide variety of methods across various domains have come to be considered as anomaly detection methods. We first present a brief summary of anomaly detection methods from recent review papers that survey the literature on this topic. We will then discuss the applicability of existing methods, or lack thereof, for our domain of interest, anomalous events in scientific investigations. \subsection{Previous work} Recent review papers by Chandola {\it et al.} \cite{ChandolaBK2009}, Campos {\it et al.} \cite{CamposZSCMSAH2016} and Goldstein and Uchida \cite{GoldsteinU2016} provide a useful survey and overview of various anomaly detection methods. They all conclude that it may be difficult to generalise, and compare, the various methods which stems from the inherent difficulty in defining, across domains, reasonable measures of what may be deemed as ``normal" and ``anomalous". Nonetheless, a broad categorization may be discerned. The types of anomalies usually sought are broadly three: \begin{itemize} \item {\it point anomalies}: whether a given individual sample or observation is anomalous, \item {\it collective anomalies}: whether a collection of samples/observations when considered together is anomalous, even if individual samples are not, \item {\it contextual anomalies}: whether a point or collection of samples is otherwise normal, but anomalous given a specific context. \end{itemize} The vast majority of existing methods deal with the first kind, {\it point anomalies}. Accordingly the methods result in the identification of an anomaly at the individual sample level. Far fewer methods are devoted specifically to {\it collective} and {\it contextual anomalies}, and sometimes these problems are transformed to or posed as a {\it point} anomaly detection problem. The methods can also be distinguished based on whether the result is an anomaly score or a binary label. Furthermore, the methods span the full spectrum of {\it supervised}, {\it semi-supervised} and {\it unsupervised} paradigm. While we will not attempt an overview here, suffice it to say that the most commonly used {\it unsupervised} methods (see \cite{CamposZSCMSAH2016,GoldsteinU2016}) are clustering or nearest-neighbour based and involve measures of distance (with respect to nearest neighbours, global/local clusters), or density, the intuition being outlier samples have a large distance from normal samples or occur in regions of low density. The more comprehensive survey of Chandola {\it et al.} establishes other prominent categories such as classification-based, statistical (parametric and non-parametric), information theoretic and spectral anomaly detection methods. The specific setting of interest to us, as detailed in the next subsection, is {\it unsupervised} detection of {\it anomalous events} in scientific data, which may be considered closest to the {\it collective} anomaly detection class of methods. Such methods have been developed in the context of sequential anomaly detection, spatial anomaly detection and graph anomaly detection \cite{ChandolaBK2009}. However, none of these methods appear to be readily applicable for detecting anomalous scientific events, as described below, motivating the need for a new method. \subsection{Anomalous or extreme events in scientific data} Our interest is specifically in identifying anomalous events in scientific data which are sometimes also referred to as extreme events. These events represent genuine scientific phenomena that may be rare and/or extreme but are not necessarily spurious, as the interpretation may be for {\it point} anomalies. Some examples are ignition/extinction events in combustion data, tornadoes in climate data, crack propagation in fracture mechanics, etc. In a scientific investigation such extreme events are, by definition, not indicated by any individual sample observation, but by a group of observations, rendering {\it point} anomaly detection methods ineffective. Of the {\it collective} anomaly detection methods described by Chandola {\it et al.} \cite{ChandolaBK2009}, graph based techniques are not obviously applicable since few scientific data sets are represented using graphs. Continuum mechanics (e.g. solid/fluid mechanics) scientific data, which are representative of a broad class of scientific applications, consider joint spatio-temporal domains (discretized spatial mesh and discrete time instances) and hence a purely sequence-based (time domain) or spatial-anomaly based techniques will not capture a joint spatio-temporal anomaly. This is the very setting for our work. For a vast majority of statistical learning applications the assumption of normally distributed data is reasonable and hence all the statistical information is encapsulated in the covariance matrix. However, for scientific data the distributions are not often Gaussian and there is relevant statistical information in moments higher than the second (variance). Furthermore, scientific data often represent tightly coupled physical processes and hence the observed variables are, more often than not, statistically dependent. Both aspects suggest that joint distributions, and joint moments higher than second order (covariance), are relevant, as opposed to marginal distributions and moments. For the specific case of anomaly detection, then, it is a matter of analyzing the appropriate higher joint moment. By definition, the outlier samples have an increasingly greater contribution the higher the moment. However, from a practical perspective, we suggest that the fourth moment -- kurtosis -- is appropriate. While kurtosis has been often held as a measure of ``peakiness'' or ``flatness'', we refer to the paper by Westfall \cite{Westfall2014} that establishes kurtosis as an unambiguous measure of ``either existing outliers (for the sample kurtosis) or propensity to produce outliers (for the kurtosis of a probability distribution).'' Westfall illustrates \cite{Westfall2014} that as kurtosis increases, the contribution to it from the portion of data centered around the mean becomes vanishingly small, no matter how the center is defined (i.e. no matter how many multiples of standard deviation). In the limit of infinite kurtosis the contribution from any finite portion centered around the mean is zero no matter how large this portion. These results suggest that kurtosis is a reliable enough measure of outliers. Accordingly, our approach is centered around analyzing the joint fourth moments -- the co-kurtosis -- which is a fourth order tensor (co-variance is a second order tensor i.e. a matrix). To reiterate, \emph{we seek, by analogy to PCA, principal vectors of the co-kurtosis tensor which can be interpreted as principal directions along which outliers lie.} This effectively becomes a symmetric tensor decomposition problem. \subsection{Joint moment tensor decomposition} Joint moment tensors have been analyzed in different settings, but are usually considered expensive due to the curse of dimensionality e.g. the size of the fourth moment tensor is $N_f^4$, where $N_f$ is the number of random variables or features. By definition, the tensor is symmetric which means that the number of unique entries is smaller than $N_f^4$, but to leading order the scaling is still a fourth power of $N_f$. Jondeau {\it et al.}, \cite{JondeauJR2015}, recognizing that non-normality is important in analyzing financial market data, consider decompositions of the co-skewness and co-kurtosis tensors for analysis of stock market data, and conclude that the first few factors of the decomposition of these tensors contain useful information about market returns. The fourth moment tensor is also at the heart of mathematical underpinnings of Independent Component Analysis (ICA), which we will review shortly. Since most of the properties of matrix factorizations do not extend in general to higher order tensors \cite{KoldaB2009}, the appropriate decomposition technique, and its associated interpretation, needs to be chosen carefully. We briefly present an overview of major classes of tensor decompositions, that may be applicable to the present problem, before explaining the particular method chosen in this study. We use third order tensors, only for illustration purposes, in the following discussion. \subsubsection{Symmetric CP decomposition} Canonical polyadic (CP) decomposition seeks a factorization of a tensor as a sum of outer products of real-valued vectors. Mathematically, for a third order tensor $\mathcal{T}$, this can be expressed as \begin{equation} \mathcal{T} = \sum_{i=1}^r \lambda_i ~ x_i \otimes y_i \otimes z_i, \end{equation} where $\otimes$ denotes the outer product between the sets of vectors $x_i, y_i, z_i$ and the number of such sets sought, $r$, is the rank of the decomposition. Even when the tensor $\mathcal{T}$ is symmetric, it is possible to seek a decomposition which is asymmetric, that is, $x_i$, $y_i$ and $z_i$ are not equal. However, a symmetric decomposition always exists for a symmetric tensor \cite{ComonGLM2008} such that \begin{equation} \mathcal{T} = \sum_{i=1}^r \lambda_i ~ x_i \otimes x_i \otimes x_i, \end{equation} as illustrated in Fig. \ref{f:sym_CP_decomp}, and $r$ in this case is referred to as the \emph{symmetric rank}. \begin{figure}[htb] \centering \includegraphics[trim=3cm 12cm 3cm 11cm,clip,width=9cm]{sym_tensor_decomp.pdf} \caption{Symmetric CP decomposition of a third order symmetric tensor $\mathcal{T}$.} \label{f:sym_CP_decomp} \end{figure} While seemingly analogous to eigenvalue decomposition of a symmetric matrix (PCA can be interpreted as the eigenvalue decomposition of the co-variance matrix), a few key differences remain. The rank $r$ in the above decomposition is not a unique number, but lies within certain bounds \cite{ComonGLM2008}. Moreover, it is not necessary that the decomposition be orthogonal, which is the case for eigenvalue decomposition of a matrix. Orthogonal decompositions of symmetric tensor do not exist in general \cite{Kolda2015}, but if it is known to exist for a specific tensor the decomposition problem can be reduced to a matrix factorization problem \cite{Kolda2015,AnandkumarGHKT2014}. \subsubsection{Higher order Singular Value Decomposition (HOSVD)} An alternate decomposition, which extends the matrix singular value decomposition (SVD) concept to higher order tensors is Higher-Order Singular Value Decomposition (HOSVD) \cite{DeLathauwerDMV2000}. For a general third order tensor, this is written mathematically as \begin{equation} \mathcal{T} = \mathcal{S} \times_1 {\rm U}^{(1)} \times_2 {\rm U}^{(2)} \times_3 {\rm U}^{(3)} \end{equation} where the core tensor, $\mathcal{S}$, has the same dimensions as $\mathcal{T}$. The factor matrices ${\rm U}^{(1)}$, ${\rm U}^{(2)}$ and ${\rm U}^{(3)}$ are orthogonal matrices that result from ``unfolding'' (matricizing) $\mathcal{T}$ along modes 1, 2 and 3, respectively, and performing SVD over the resulting matrix. The symbol $\times_k$ denotes a ``mode-k'' tensor-matrix product (see \cite{DeLathauwerDMV2000} for details). For a symmetric tensor the result of ``unfolding'' is the same along any mode and hence the factor matrices become identical. This special case is illustrated in Fig. \ref{f:sym_HOSVD}. For more details on the mathematical properties and conventions of HOSVD, the analogies to and differences with matrix SVD, the reader is referred to De Lathauwer {\it et al.} \cite{DeLathauwerDMV2000}. The column vectors of the (identical) factor matrices may be interpreted by analogy to principal vectors in PCA. However, one key departure between HOSVD and matrix SVD is that the core tensor $\mathcal{S}$ is not purely diagonal but dense. This makes the interpretation of the column vectors of factor matrices, by analogy, not straightforward. \begin{figure}[htb] \centering \includegraphics[trim=5cm 11cm 5cm 11cm,clip,width=9cm]{sym_tensor_HOSVD.pdf} \caption{HOSVD of a third order symmetric tensor $\mathcal{T}$.} \label{f:sym_HOSVD} \end{figure} \subsection{Independent Component Analysis} In the present study the most useful approach for the fourth moment tensor decomposition appeared to be by way of analogy to Independent Component Analysis (ICA). ICA specifically deals with non-Gaussian random variables and considers a scenario where a set of statistically independent non-Gaussian random variables ${\rm s} = [s_1 ~s_2 ~...~s_q]^T$ are linearly mixed, superimposed with independent white noise, and observed as the set of random variables ${\rm y} = [y_1 ~y_2 ~...~y_p]^T$. Mathematically, \begin{equation} y = As + n \label{eq:ICA_model} \end{equation} where $A \in \mathbb{R}^{p\times q}$ is the mixing matrix and $n \in \mathbb{R}^p$ is independent white noise, and ICA aims to identify the source set $\rm s$ given the observed set $\rm y$. The connection between ICA and higher moment tensor decomposition is explained in many papers (see De Lathauwer and Moore \cite{DeLathauwerM2001} or Anandkumar {\it et al.} \cite{AnandkumarGHKT2014}). Formally, given the statistical model in Eq. \ref{eq:ICA_model}, the fourth order cumulant tensor of $y$ (observed variables) is related to the outer product of column vectors, $a_i$, of the mixing matrix $A$ and the excess kurtosis, $\kappa_i$, of the individual sources $s_i$ \cite{Comon2002}: \begin{equation} C_4^y = \sum_{i=1}^q \kappa_i ~~a_i \otimes a_i \otimes a_i \otimes a_i. \label{eq:ICA_tensor_decomp} \end{equation} The cumulant tensor is related to the fourth and second moment tensors as \begin{eqnarray} \left[C_4^y \right]_{i_1 i_2 i_3 i_4} = \mathbb{E}[y \otimes y \otimes y \otimes y ] - \mathbb{E}[y_{i_1} y_{i_2}] \mathbb{E}[y_{i_3} y_{i_4}] \nonumber \\ - \mathbb{E}[y_{i_1} y_{i_3}] \mathbb{E}[y_{i_2} y_{i_4}] - \mathbb{E}[y_{i_1} y_{i_4}] \mathbb{E}[y_{i_2} y_{i_3}],~~1 \leq i_1...i_4 \leq k \label{eq:cumulant_tensor_def} \end{eqnarray} where $\mathbb{E}$ is the expectation operator. These authors have also proposed algorithms for performing the tensor decomposition in the form of Eq. \ref{eq:ICA_tensor_decomp}. De Lathauwer and Moore \cite{DeLathauwerM2001} propose a method based on ``simultaneous third-order tensor diagonalization'', Anandkumar {\it et al.} \cite{AnandkumarGHKT2014} propose a robust variant of a tensor power method, while Kolda \cite{Kolda2015} proposes a method involving eigen value decomposition of a matrix that is linear combination of slices of the tensor. However, De Lathauwer and Moore \cite{DeLathauwerM2001} and Anandkumar {\it et al.} \cite{AnandkumarGHKT2014} also observe the connections to a much simpler matrix SVD problem. Specifically, in a discussion on computational complexity, Anandkumar {\it et al.} \cite{AnandkumarGHKT2014} note that if the cumulant tensor $C_4^y$ is unfolded into a matrix $M^y$ (the unfolding is invariant to choice of mode since $C_4^y$ is symmetric), then Eq. \ref{eq:ICA_tensor_decomp} can be transformed to \begin{equation} mat(C_4^y) \coloneqq M^y = \sum_{i=1}^q \kappa_i ~~a_i \otimes vec(a_i \otimes a_i \otimes a_i) \end{equation} and hence the vectors $a_i$ can be determined from an SVD of $M^y$ ($mat$ and $vec$ denote operations that convert a tensor to a matrix and a vector, respectively). For its simplicity, ease of interpretation and computational cost considerations, we adopt this approach to decomposing the fourth moment tensor in this study. \subsection{Tests with synthetic data} The method chosen to identify principal directions of joint moment tensor has three simple steps: (a) construct the joint fourth cumulant tensor ($C_4^y$ in Eq. \ref{eq:cumulant_tensor_def}), (b) matricize the tensor ($M^y$) along any of the modes, and (c) perform SVD of the matrix $M^y$. The resulting singular vectors of the SVD (whether left or right singular vectors depends on how the tensor is matricized) are the desired principal vectors. We present tests of this method on synthetic datasets. All tests were conducted in Matlab and the tensor operations were performed using tensor toolbox \cite{TTB_Software}. Two bi-variate datasets are chosen and the main purpose is to illustrate that: \begin{itemize} \item the method recovers the principal vectors for datasets when they are known, by construction, \item compare the principal kurtosis vectors with PCA vectors to show that they need not be equal even for simple datasets. \end{itemize} \begin{figure}[htb] \centering \includegraphics[trim=1.5cm 7.5cm 3.5cm 8cm,clip,width=8cm]{beta_beta.pdf} \includegraphics[trim=1.5cm 7.5cm 3.5cm 8cm,clip,width=8cm]{beta_beta_kurtvecs.pdf} \caption{(Left) Synthetic bi-variate statistically independent dataset with beta marginal distributions. (Right) The independent bi-variate is ``mixed'' (i.e. rotated by $30^o$ to transform to a dataset with non-zero higher joint moments. The first (solid blue line) and second (dashed blue line) principal kurtosis vectors of this dataset are also shown.} \label{f:syn_beta_beta} \end{figure} For the first test a bi-variate dataset with known statistical joint moments is constructed in two steps. In the first step a bi-variate Gaussian copula with zero cross-correlation is sampled to ensure a statistically independent dataset. The inverse beta cumulative distribution function is applied over each copula generated vector such that the resulting dataset has beta marginal distributions, with known moments, and all the joint moments are approximately zero within sampling error. More importantly, the dataset is non-Gaussian and has non-zero higher order moments. The resulting dataset is shown in the left panel of Fig. \ref{f:syn_beta_beta}. The [$\alpha$, $\beta$] parameters of the beta distributions are chosen to be [1.0, 0.1] for the first variable $V_1$ (x-axis) and [1.0, 0.2] for the second variable $V_2$ (y-axis). These parameters were chosen carefully such that the excess kurtosis of $V_1$ is greater than that of $V_2$, whereas the variance of $V_2$ is greater than that of $V_1$. In the second step this independent dataset is ``mixed'' by performing an Euler rotation, and the resulting dataset now has non-zero joint moments. The first and second principal kurtosis vectors for this dataset are extracted using the described methodology and are verified to be equal to the vectors of the rotation matrix. These are shown in blue in the right panel of Fig. \ref{f:syn_beta_beta}. Crucially, the parameters of this dataset were so chosen such that the principal directions of variance (PCA vectors) are different from that of the kurtosis i.e. the first PCA vector and the first kurtosis vector are orthogonal to each other, as are the second. This is illustrated in Fig. \ref{f:syn_beta_beta_kurt_pca}. \begin{figure}[htb] \centering \includegraphics[trim=1.5cm 7.5cm 3.5cm 8cm,clip,width=8cm]{beta_beta_kurtvecs.pdf} \includegraphics[trim=1.5cm 7.5cm 3.5cm 8cm,clip,width=8cm]{beta_beta_pcavecs.pdf} \caption{Comparison between the principal kurtosis vectors shown in blue (left) and the PCA vectors shown in red (right) for the synthetic dataset from Fig. \ref{f:syn_beta_beta}.} \label{f:syn_beta_beta_kurt_pca} \end{figure} \begin{figure}[htb] \centering \includegraphics[width=6cm]{syn_f1.eps} \bp \put(-90,0){$V_1$} \put(-175,95){\rotatebox{90}{$V_2$}} \ep \hspace{0.6cm} \includegraphics[width=6cm]{syn_f2.eps} \bp \put(-90,0){$V_1$} \put(-175,95){\rotatebox{90}{$V_2$}} \ep \caption{(Left) An uncorrelated bi-variate Gaussian dataset with zero means and variances [1.0, 0.25] is mixed by rotation. The first (solid red) and second (dashed red) PCA vectors are shown. (Right) Gaussian dataset with a few samples converted to outliers. The principal kurtosis vectors (blue) are shown along with the PCA vectors (red).} \label{f:syn_data} \end{figure} For the second test a dataset with a more visually obvious set of outliers is constructed. An uncorrelated bi-variate Gaussian dataset, with zero means and variances [1.0, 0.25] is generated, and then mixed by rotation. The left panel in Fig. \ref{f:syn_data} shows the dataset, along with the PCA vectors shown in red. Since the data has Guassian structure, the higher moments and their principal directions are ill-defined. Then, a small subset of samples in this dataset are chosen at random and placed far away from the rest, to mimic outliers, as shown on the right panel of Fig. \ref{f:syn_data}. The PCA vectors (red) and principal kurtosis vectors (blue) for the data with outliers are also shown. In comparison to the left panel, it is evident that the PCA vectors remain nearly unchanged. However, the principal kurtosis vectors are different from the PCA vectors, and clearly align with the direction the outliers lie. The results from both test datasets illustrate that principal kurtosis vectors need not be the same as PCA vectors, and are better at identifying directions of outliers. \section{Anomaly detection algorithm} In the previous section, we have shown that the variance or the kurtosis in data can be characterized in terms of the principal values and vectors of the joint moment tensors. Anomalies, as they occur, result in a change in the distribution of the data reflecting a change in the magnitude of the principal values and the orientation of the principal vectors. We base our anomaly detection algorithm for smoothly varying scientific data on this concept, as explained in this section. As mentioned earlier, anomalous events in scientific phenomena can appear locally in space and/or time. We choose to decompose the data into several spatial sub-domains and time steps to explicitly flag the locality of these events. For distributed streaming data, e.g. data from massively parallel simulations, such a decomposition is inherently present by way of domain decomposition. Let $N_d$ and $N_t$ be the number of spatial sub-domains and the number of time steps, respectively. In regard to the feature space, depending on the nature of anomaly and guidance from the scientific domain, not all the features may be relevant to identify its occurrence. Let $N_f$ be the number of relevant features to be used in the anomaly detection algorithm. The first step in the algorithm involves a data preprocessing stage, where we scale the data from each feature by subtracting its mean and dividing by the absolute spatial maximum. It is quite common in multi-scale simulations that value ranges of different features are decades apart. Hence, scaling the data ensures an equitable contribution to the joint moments from all the features. Once the data is preprocessed, for each sub-domain $j$ at a given time step $n$, the joint moment tensor $\mathcal{T}^{j,n}$ is constructed. This symmetric tensor is decomposed using the two-step (matricize and perform SVD) method described in section 2.3, to obtain the principal values $\lambda_j$ and the principal vectors $\hat{v}_j$. For a given phenomena, in the absence of anomalous events, the principal values and vectors would remain nearly the same in all the sub-domains. As mentioned above, the occurrence of an anomalous event will result in a significant change in the magnitude of the principal values and the orientation of the principal vectors. We, now, define a feature moment metric $\F{i}{j}{n}$ for each feature $i$ in a given sub-domain $j$ and time step $n$, which can be used to quantify the changes in the principal values and vectors. \begin{equation} \F{i}{j}{n} = \frac{\sum\limits_{k=1}^{N_f} \lambda_k \left(\hat{e}_i \cdot \hat{v}_k\right)^2}{\sum\limits_{k=1}^{N_f} \lambda_k} \end{equation} It should be noted that $\hat{e}_i \cdot \hat{v}_k$ is effectively the $i$-th entry in the $k$-th vector $\hat{v}_k$. Since the set of vectors $\hat{v}_k$ are all unit vectors, by construction, the set of feature moment metrics in every spatial ($j$) and temporal ($n$) sub-domain sum to unity, i.e. $\sum\nolimits_{i=1}^{N_f} \F{i}{j}{n} = 1,~ \forall ~ j, n$. Accordingly, the moment metric for a given $i$ can be interpreted as a measure of the fraction of the overall moment (variance or excess-kurtosis as case may be) contained in feature $i$, in other words a distribution of the moment in the feature space. This distribution interpretation allows comparing the feature moment metrics between different sub-domains in space and different steps in time, and flag the occurrence of anomalous events in space and/or time. If, as hypothesized, the statistical signature of anomalies is such that the distribution of feature moment metrics measurably changes, then distribution divergence metrics, such as $f$-divergence, can be used to quantify the change. We use the Hellinger distance, a symmetric measure of difference between two discrete distributions $P$ and $Q$: \begin{equation} D_{PQ} = \frac{1}{\sqrt{2}} \sqrt{ \sum_i (\sqrt{p_i} - \sqrt{q_i})^2} ~. \end{equation} The Hellinger distance lies between 0 and 1, and for a discrete distribution the distance is 1 when the two distributions being compared are exact complements of each other i.e. if $\forall~i$ when $p_i \neq 0$ and $q_i = 0$, and vice--versa. Intuitively, for the anomaly containing spatial/temporal sub-domain, the Hellinger distance of the $p_i \equiv \F{i}{j}{n}$ from a nominal distribution $q_i$ would be large, and a suitable threshold of this distance can be used as an anomaly metric. The nominal set, $q_i$, can be chosen to be the spatial average such that the distance quantifies a spatial anomaly (at every time instance), whereas, setting $q_i$ to be the previous time distribution quantifies a temporal anomaly (in each spatial sub-domain). Accordingly, we define a spatial anomaly metric \begin{equation} M_1^n(j) = \frac{1}{\sqrt{2}} \sqrt{ \sum_{i=1}^{N_f} \left(\sqrt{\F{i}{j}{n} } - \sqrt{ \overline{F}_i^n } \right)^2}, \label{eq:M1} \end{equation} where $\overline{F}_i^n$ denotes the spatial (over $j$) average of $\F{i}{j}{n}$. A corresponding temporal anomaly metric can be defined as \begin{equation} M_2^j(n) = \frac{1}{\sqrt{2}} \sqrt{ \sum_{i=1}^{N_f} \left(\sqrt{\F{i}{j}{n} } - \sqrt{ F_i^{j,n-1} } \right)^2}. \label{eq:M2} \end{equation} We, now, proceed to describe the implementation of the anomaly detection algorithm, which is outline in Algorithm 1. The line 1 decomposes the data into different sub-domains and time steps. The relevant features for the algorithm are selected in line 2. Once these initialization steps are complete, the computations enter the time step loop in line 3. For each time step, the data is accessed with a sub-domain loop which begins in line 4. For a given time step and sub-domain, the data is scales in line 5 before computing the joint moment tensor in line 6. The tensor is then matricized in line 7 to perform SVD in line 8 to obtain the principal values $\lambda_j$ and principal vectors $\hat{v}_j$. The feature moment metrics and the anomaly metrics are computed in line 9 and 10, respectively. After these computations are performed over all the sub-domains, the anomaly metrics are compared with a threshold value in line 12 to flag the occurrence of any anomalous event. \begin{algorithm2e} \tcp{initialization} $N_t$, $N_d$ $\leftarrow$ decompose data\; $N_f$ $\leftarrow$ select features\; \tcp{time step loop} \For{$n \leftarrow 1$ \KwTo $N_t$}{ \tcp{sub-domain loop} \For{$j \leftarrow 1$ \KwTo $N_d$}{ scale data\; $\mathcal{T}^{j,n}$ $\leftarrow$ compute joint moment tensor\; matricize tensor $\mathcal{T}^{j,n}$ \; $\lambda_j$, $v_j$ $\leftarrow$ perform SVD\; $\F{i}{j}{n}$ $\leftarrow$ compute feature importance\; $M_1^n(j)$, $M_2^j(n)$ $\leftarrow$ compute anomaly metrics\; } flag anomalous sub-domains; } \caption{Anomaly detection algorithm} \label{alg:ADA} \end{algorithm2e} \section{Autoignition test case} Autoignition is a spontaneous combustion process where a small temperature rise due to exothermic reactions results in the self-ignition of a fuel in the presence of an oxidizer. This phenomenon plays a critical role in the operation of devices such as the compression ignition engines and gas turbines \cite{Dec09,Guethe09}. The characteristics of autoignition strongly depend on the fuel-oxidizer composition, thermodynamic and flow conditions, among others. Hence, several experimental and simulation studies are devoted to understand the autoignition phenomena at conditions relevant to practical devices. As the chemical phenomena resulting in autoignition possess an exponential behavior, the inception of ignition kernels (parcels of burning mixtures) is very sensitive to the initial conditions. Also, the ignition events are short-lived in time. In practical devices, where spatial inhomogeneities persist, e.g. due to turbulence and mixing, these events are often highly localized in space. This makes it challenging to detect and analyze the phenomena \cite{Bennett2016}. In the combustion community, researchers often use simple threshold based metrics which are ad hoc in nature, or mathematically rigorous formulations such as chemical mode explosive analysis (CEMA) \cite{lu10} which are computationally expensive, to detect the autoignition events in complex turbulent reacting flows. We will use the anomaly detection algorithm described in section 3 to identify the occurrence of auto-ignition events in a representative combustion simulation. A spatially one-dimensional time-varying simulation of an auto-ignitive mixture is performed using a direct numerical simulation solver, S3D \cite{CHEN+2009}, which solves the reacting compressible flow governing equations. The governing partial differential equations are discretized using explicit eight-order central difference schemes for spatial derivatives and six-stage fourth-order Runge-Kutta method for time integration. Explicit tenth-order filters are used to remove spurious numerical oscillations. A 12-species 29-reactions syngas mechanism \cite{hawkes2007scalar} is used for the combustion chemistry. The one-dimensional domain is 1cm long and is discretized using 1024 grid points. The domain is initialized with premixed fuel-oxidizer mixture comprised of species concentrations $0.6CO + 0.4H_2 + 0.5(O_2 + 3.76N_2)$. The initial pressure is set to 4 atm and the flow is quiescent. A spatially inhomogeneous temperature field with a mean of 1200K is imposed using a linear combination of sinusoidal waves with random phases. In addition, a spike in the temperature is superimposed in the first quarter of the domain, which ensures that this portion ignites first, resulting in a spatially anomalous ignition event. The initial temperature profile is shown in Fig. \ref{f:temp_ic}. A periodic boundary condition is imposed for solving the equations. The simulation is time advanced up to $20 \mu s$, using fixed time-steps of $0.001 \mu s$. The data from the simulation is stored at equal intervals of $1 \mu s$, which is one-tenth of the ignition delay time based on a homogeneous mixture at a temperature of 1200K. \begin{figure}[htb] \centering \includegraphics[width=9cm]{temp_ic.eps} \bp \put(-160,-8){$x-position$ $(cm)$} \put(-265,45){\rotatebox{90}{$Temperature$ $(K)$}} \put(-217,110){\colr Region 1} \put(-168,110){\colr Region 2} \put(-119,110){\colr Region 3} \put(-70,110){\colr Region 4} \ep \caption{Profile of the temperature initial condition. Dashed lines represent the sub-domain boundaries of the decomposed spatial domain.} \label{f:temp_ic} \end{figure} The time evolution of the temperature profiles are shown in Fig. \ref{f:temp}. Initially, the temperature gradients reduce as a consequence of the diffusion process, resulting in a decrease in the peak value. The diffusion process dominates until a thermal runaway is set off due to a minor consumption of the fuel in exothermic reactions. This is first observed in the higher temperature regions which have greater propensity to trigger reactions. The thermal runaway then leads to an inception of an ignition kernel where oxidation of the fuel occurs with a rapid temperature rise and heat release. Several intermediate species are produced and consumed during the oxidation process. Eventually, regions with lower initial temperature also ignite and the combustion process completes in the entire domain. \begin{figure}[htb] \centering \includegraphics[width=9cm]{temp_prof.eps} \bp \put(-160,-8){$x-position$ $(cm)$} \put(-265,45){\rotatebox{90}{$Temperature$ $(K)$}} \put(-95,120){\textbf{$Time$ $(\mu s)$}} \ep \caption{Time evolution of the temperature profiles. Dashed lines represent the sub-domain boundaries of the decomposed spatial domain.} \label{f:temp} \end{figure} To apply the anomaly detection algorithm, outlined in Algorithm 1, we decompose the spatial domain into four sub-domains ($N_d=4$), which are labeled Regions 1-4, as shown in Fig.~\ref{f:temp_ic}. In time, the dataset consists of 21 save files, which makes the number of time steps $N_t=21$. A total of 17 feature are stored in the datasets, of which 13 are the relevant features for the algorithm (12 species mass fractions and temperature). The data are pre-processed according to the scaling described in section 3. \section{Results} Figure~\ref{f:data_cloud} shows scatter plots of scaled mass fraction of $H_2$ and temperature for Region 1 at four different times. The solid and dashed lines in the plots represent the first and second principal kurtosis vectors, respectively. Note that for this illustration, the joint moment tensor is constructed only for these two features, which results only in two principal vectors. At initial condition the inhomogeneity in the data is present in temperature alone. Hence, the first principal vector is aligned along the temperature axis. As time advances, an ignition kernel appears in the peak temperature region, which leads to the consumption of the $H_2$-fuel and an increase in the temperature. This is depicted by some points migrating along the negative x-axis and positive y-axis. Clearly, the orientation of the principal vectors has also changed with time and the first principal vector aligns along the extreme points which represent the ignition event. \begin{figure}[htb] \centering \includegraphics[trim=3cm 0cm 3.5cm 0cm,clip,width=3.6cm]{dc1.eps} \bp \put(-75,-3){\small Mass fraction of $H_2$} \put(-105,60){\small \rotatebox{90}{Temperature}} \put(-77,135){\small (a) Time = 0 $\mu s$} \ep \hspace{0.2cm} \includegraphics[trim=3cm 0cm 3.5cm 0cm,clip,width=3.6cm]{dc2.eps} \bp \put(-75,-3){\small Mass fraction of $H_2$} \put(-105,60){\small \rotatebox{90}{Temperature}} \put(-77,135){\small (b) Time = 4 $\mu s$} \ep \hspace{0.2cm} \includegraphics[trim=3cm 0cm 3.5cm 0cm,clip,width=3.6cm]{dc3.eps} \bp \put(-75,-3){\small Mass fraction of $H_2$} \put(-105,60){\small \rotatebox{90}{Temperature}} \put(-77,135){\small (c) Time = 6 $\mu s$} \ep \hspace{0.2cm} \includegraphics[trim=3cm 0cm 3.5cm 0cm,clip,width=3.6cm]{dc4.eps} \bp \put(-75,-3){\small Mass fraction of $H_2$} \put(-105,60){\small \rotatebox{90}{Temperature}} \put(-77,135){\small (d) Time = 8 $\mu s$} \ep \caption{Scatter plots of scaled mass fraction of $H_2$ and temperature in Region 1 at different times. Solid line: first principal vector, dashed line: second principal vector.} \label{f:data_cloud} \end{figure} The feature moment metrics (FMMs), $\F{i}{j}{n}$, which quantify the relative importance of each feature towards the kurtosis in the data, are plotted at different times in Fig.~\ref{f:fmm}. The histograms are colored separately for the different spatial sub-domains. The x-axis consists the labels of the 13 relevant features, which include the 12 chemical species and temperature (T). At the initial time, as temperature is the only feature that consists any spread in the data in all sub-domains, the temperature-FMM is equal to 1 for all of them. As time advances to $2\mu s$ (part (b)), the FMM in temperature disappears in Region 1, and spreads to the other features, signifying a change in the FMM distribution. This is attributed to an early autoignition in the Region 1 due to the significantly greater peak temperature, which leads to locally active chemical reactions and an inhomogeneity in the mass fractions of species in the sub-domain. At the later time, ($8\mu s$), ignition also begins in the other three sub-domains accompanied by a similar decrease in temperature-FMM. A careful look at the temperature profiles in Fig.~\ref{f:temp} will indicate that, relatively, Region 4 has the second highest temperature, followed by Region 2 and Region 3. Hence, ignition events as well as the corresponding decrease in the temperature-FMM, in the these three sub-domains will also appear in the same order in time. Eventually, ignition occurs in all the sub-domains, leading to the non-zero FMMs appearing across different features, as seen at time $19\mu s$. The FMM distributions in Fig.~\ref{f:fmm} confirm the hypothesis that at the inception of autoignition event the FMMs, which were initially significant only for temperature, begin to spread among other features, which is the change in the statistical signature anticipated. \begin{figure}[htb] \centering \includegraphics[width=8cm]{fmm1.eps} \bp \put(-230,45){\rotatebox{90}{$\F{i}{j}{n}$}} \put(-190,70){(a) Time = 0 $\mu s$} \put(-90,70){\small \colorbox{red}{\makebox(0.5,0.5){}}} \put(-80,69){\small Region 1} \put(-90,60){\small \colorbox{green}{\makebox(0.5,0.5){}}} \put(-80,59){\small Region 2} \put(-90,50){\small \colorbox{blue}{\makebox(0.5,0.5){}}} \put(-80,49){\small Region 3} \put(-90,40){\small \colorbox{magenta}{\makebox(0.5,0.5){}}} \put(-80,39){\small Region 4} \ep \includegraphics[width=8cm]{fmm2.eps} \bp \put(-230,45){\small \rotatebox{90}{$\F{i}{j}{n}$}} \put(-190,70){\small (b) Time = 2 $\mu s$} \ep \includegraphics[width=8cm]{fmm4.eps} \bp \put(-230,45){\small \rotatebox{90}{$\F{i}{j}{n}$}} \put(-190,70){\small (c) Time = 8 $\mu s$} \ep \includegraphics[width=8cm]{fmm6.eps} \bp \put(-230,45){\small \rotatebox{90}{$\F{i}{j}{n}$}} \put(-190,70){\small (d) Time = 19 $\mu s$} \ep \caption{Distribution of feature moment metric (FMM) in feature space. Different colors correspond to different sub-domains.} \label{f:fmm} \end{figure} An anomalous autoignition event, which results in a significant change in the FMM distribution, can be detected based on the Hellinger distance, as described in section 3. The spatial and temporal anomalies are measured in terms of the distance metrics $M_1^n(j)$ and $M_2^j(n)$, respectively. Since the metrics lie between 0 and 1 we choose a threshold of $0.5$ for these metrics to identify an anomalous event. A sub-domain $j$ at a given time step $n$ can be flagged to contain an anomaly if maximum of $M_1^n(j)$ and $M_2^j(n)$ is greater than 0.5. Fig.~\ref{f:am} shows the evolution of the $M_1^n(j)$ and $M_2^j(n)$ anomaly metrics, as well the greater of the two, with time. At earlier times ($<5\mu s$), an ignition kernel appears in the Region 1, as mentioned earlier, due to a significantly larger value of temperature. This is an anomaly both in space as well as time, because the distribution of FMMs is distinctively different from (compare parts (a) and (b) in Fig.~\ref{f:fmm}) other sub-domains and also varies quickly in time. Hence, both $M_1^n(j)$ and $M_2^j(n)$ shoot up above the threshold value. In this time period, the metrics are nearly the same and below the threshold in other sub-domains. As time progresses, beyond $5\mu s$, the temporal anomaly metric goes above the threshold in other sub-domains. For these sub-domains, the occurrence of ignition event is an anomaly in time, but not in space, and hence $M_1^n(j)$ is observed to be consistently lower than $M_2^j(n)$ in Fig~\ref{f:am}. The order in which the events appear i.e. earliest in Region 1, then in Region 4 and then in Regions 2 and 3, is also in agreement with the observed change in the FMM distribution in Fig.~\ref{f:fmm}. It appears that the metrics, and the suggested threshold, are consistent with the expected evolution of the auto-ignitive system, and are able to flag the occurrence of auto-ignition in the right sub-domains and at the right times. \begin{figure}[htb] \centering \includegraphics[width=5.2cm]{m1.eps} \bp \put(-155,50){\rotatebox{90}{$M_1^n(j)$}} \put(-90,-3){Time $(\mu s)$} \put(-120,90){(a)} \put(-70,100){\color{red} \circle*{4}} \put(-65,98){\small Region 1} \put(-70,92){\color{green} \circle*{4}} \put(-65,90){\small Region 2} \put(-70,84){\color{blue} \circle*{4}} \put(-65,82){\small Region 3} \put(-70,76){\color{magenta} \circle*{4}} \put(-65,74){\small Region 4} \ep \includegraphics[width=5.2cm]{m2.eps} \bp \put(-155,50){\small \rotatebox{90}{$M_2^j(n)$}} \put(-90,-3){\small Time ($\mu s$)} \put(-120,90){\small (b)} \ep \includegraphics[width=5.2cm]{m3.eps} \bp \put(-155,25){\small \rotatebox{90}{$Max(M_1^n(j),M_2^j(n))$}} \put(-90,-3){\small Time ($\mu s$)} \put(-120,90){\small (c)} \ep \caption{Time evolution of (a) spatial anomaly metric, (b) temporal anomaly metric, and (c) their maximum anomaly metrics. Different colors correspond to different sub-domains. Dashed line represents a constant threshold value of 0.5.} \label{f:am} \end{figure} \section{Conclusions} Detection of anomalous events in scientific phenomena remains a key challenge, particularly, due to the availability of increasingly high resolution data which is enabled by the advances in measurement techniques and computing power. Scientific datasets are characterized by smoothly varying multi-variate data which represent complex non-linear multi-physics processes. Hence, commonly used anomaly detection algorithms developed for the use in other domains may not be readily applicable for scientific data. It is well known that occurrence of anomalies manifest as extreme values in the distribution of at least some of the features, and significantly affect their higher order joint statistical moments. In this paper, we have used this idea to develop a robust anomaly detection algorithm for scientific data. For normally distributed data, the statistical information is fully encapsulated in the second order co-variance matrix. However, scientific data are often non-Gaussian and need further higher order joint moment tensors to characterize the anomalous events. By analogy to principal component analysis, a general joint moment tensor can be analyzed in terms of its principal values and vectors which can be computed using symmetric tensor decomposition methods. We have reviewed commonly used methods and identified that a simple singular value decomposition of the matricized tensor works best for our purpose. Using synthetic data, we have shown that vectors computed from the decomposition of cumulant fourth moment tensor, also referred to as excess-kurtosis, capture the outlier data perfectly. In general, anomalous events in scientific phenomena appear in space and/or time. To identify the locality of an anomaly, the proposed algorithm decomposes the data into spatial sub-domains and time steps. Feature moment metrics are computed for each sub-domain and time step to quantify the magnitude and alignment of principal values and vectors, respectively. With an inception of an anomaly the distribution feature moment metrics significantly change. The algorithm, then, uses Hellinger distance to compare the feature moment metrics between different sub-domains and successive time steps to flag anomalies in space and time, respectively. The algorithm has been tested using a turbulent combustion test case to detect autoignition events. The unsupervised anomaly detection algorithm presented in this paper has been shown to robustly identify the spatial and temporal anomalies. The statistical approach in the algorithm uses a decomposed layout of the data which is inherent to large streaming distributed scientific datasets. Our future work includes two aspects. First, an in-situ implementation of the algorithm into the massively parallel direct numerical simulation solver (S3D) and evaluate its scalability. Second, to apply the algorithm to detect anomalies in other scientific phenomena. \\ \section{Acknowledgments} This work was funded through U.S. Department of Energy Advanced Scientific Computing Research (ASCR) grant FWP16-019471. Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC.,a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-NA-0003525. The views expressed in the article do not necessarily represent the views of the U.S. Department of Energy or the United States Government. \bibliographystyle{model1-num-names}
\section{Introduction} In recent literature, there has been considerable interest in models where the degrees of freedom transform as tensors of rank $3$ or higher. Such models with appropriately chosen interactions admit new kinds of large $N$ limits, which are not of 't Hooft type and are dominated by the so-called melonic Feynman diagrams \cite{Gurau:2009tw,Bonzom:2011zz,Carrozza:2015adg,Witten:2016iux, Klebanov:2016xxf}. Much of the recent activity (for a review see \cite{Klebanov:2018fzb}) has been on the quantum mechanical models of fermionic tensors \cite{Witten:2016iux, Klebanov:2016xxf}, which have large $N$ limits similar to that in the Sachdev-Ye-Kitaev (SYK) model \cite{Sachdev:1992fk,Kitaev:2015,Polchinski:2016xgd,Maldacena:2016hyu,Jevicki:2016bwu, Gross:2016kjj,Kitaev:2017awl,Rosenhaus:2018dtp}. It is also of interest to explore similar quantum theories of bosonic tensors \cite{Klebanov:2016xxf,Giombi:2017dtl,Murugan:2017eto}. In \cite{Klebanov:2016xxf,Giombi:2017dtl} an $O(N)^3$ invariant theory of the scalar fields $\phi^{abc}$ was studied: \begin{align} S_4= \int d^d x \left ( \frac {1} {2} (\partial_\mu \phi^{abc})^2 + {g \over 4!} O_{\rm tetra} \right )\ , \notag \\ O_{\rm tetra}= \phi^{a_1 b_1 c_1} \phi^{a_1 b_2 c_2} \phi^{a_2 b_1 c_2} \phi^{a_2 b_2 c_1} \ . \label{tetra} \end{align} This QFT is super-renormalizable in $d<4$ and is formally solvable using the Schwinger-Dyson equations in the large $N$ limit where $g N^{3/2}$ is held fixed. However, this model has some instabilities. One problem is that the ``tetrahedral" operator $O_{\rm tetra}$ is not positive definite. Even if we ignore this and consider the large $N$ limit formally, we find that in $d<4$ the $O(N)^3$ invariant operator $\phi^{abc} \phi^{abc}$ has a complex dimension of the form $\frac{d}{2}+ i\alpha(d)$ \cite{Giombi:2017dtl}.\footnote{Such complex dimensions appear in various other large $N$ theories; see, for example, \cite{Dymarsky:2005uh,Pomoni:2008de,Grabner:2017pgm,Prakash:2017hwq}.} From the dual AdS point of view, such a complex dimension corresponds to a scalar field whose $m^2$ is below the Breitenlohner-Freedman stability bound \cite{Breitenlohner:1982jf,Klebanov:1999tb}. The origin of the complex dimensions was elucidated using perturbation theory in $4-\epsilon$ dimensions: the fixed point was found to be at complex values of the couplings for the additional $O(N)^3$ invariant operators required by the renormalizability \cite{Giombi:2017dtl}. In \cite{Giombi:2017dtl} a $O(N)^5$ symmetric theory for tensor $\phi^{abcde}$ and sextic interactions was also considered. It was found that the dimension of operator $\phi^{abcde}\phi^{abcde}$ is real in the narrow range $d_{\rm crit}< d< 3$, where $d_{\rm crit}\approx 2.97$. However, the scalar potential of this theory is again unstable, so the theory may be defined only formally. In spite of these problems, some interesting formal results on melonic scalar theories of this type were found recently \cite{Liu:2018jhs}. \begin{figure}[h!] \begin{center} \includegraphics[width=15.5cm]{phi6vert.pdf} \caption{Diagrammatic representation of the eight possible $O(N)^3$ invariant sextic interaction terms. } \label{8inter} \end{center} \end{figure} In this paper, we continue the search for stable bosonic large $N$ tensor models with multiple $O(N)$ symmetry groups. Specifically, we study the $O(N)^3$ symmetric theory of scalar fields $\phi^{abc}$ with a sixth-order interaction, whose Euclidean action is \begin{equation} S_6= \int d^d x \left ( \frac {1} {2} (\partial_\mu \phi^{abc})^2 + {g_1\over 6!} \phi^{a_1 b_1 c_1} \phi^{a_1 b_2 c_2} \phi^{a_2 b_1 c_2} \phi^{a_3 b_3 c_1} \phi^{a_3 b_2 c_3} \phi^{a_2 b_3 c_3} \right ) \ . \label{prism} \end{equation} This QFT is super-renormalizable in $d<3$. When the fields $\phi^{abc}$ are represented by vertices and index contractions by edges, this interaction term looks like a prism (see figure 11 in \cite{Klebanov:2016xxf}); it is the leftmost diagram in figure \ref{8inter}. Unlike with the tetrahedral quartic interaction (\ref{tetra}), the action (\ref{prism}) is positive for $g_1>0$. In sections \ref{LargeN} and \ref{bilinears}, we will show that there is a smooth large $N$ limit where $g_1 N^{3}$ is held fixed and derive formulae for various operator dimensions in continuous $d$. We will call this large $N$ limit the ``prismatic" limit: the leading Feynman diagrams are not the same as the melonic diagrams, which appear in the $O(N)^5$ symmetric $\phi^6$ QFT for a tensor $\phi^{abcde}$ \cite{Giombi:2017dtl}. However, as we discuss in section \ref{LargeN}, the prismatic interaction may be reduced to a tetrahedral one, (\ref{prismaux}), by introducing an auxiliary tensor field $\chi^{abc}$. The theory (\ref{prism}) may be viewed as a tensor counterpart of the bosonic theory with random couplings, which was introduced in section 6.2 of \cite{Murugan:2017eto}. Since both theories are dominated by the same class of diagrams in the large $N$ limit, they have the same Schwinger-Dyson equations for the 2-point and 4-point functions. We will confirm the conclusion of \cite{Murugan:2017eto} that the $d=2$ theory does not have a stable IR limit; this is due to the appearance of a complex scaling dimension. However, we find that in the ranges $2.81 < d < 3$ and $d<1.68$, the large $N$ prismatic theory does not have any complex dimensions for the bilinear operators. In section \ref{threeminuseps} we use renormalized perturbation theory to develop the $3-\epsilon$ expansion of the prismatic QFT. We have to include all eight operators invariant under the $O(N)^3$ symmetry and the $S_3$ symmetry permuting the $O(N)$ groups; they are shown in figure \ref{8inter} and written down in (\ref{allinter}). For $N> N_{\rm crit}$, where $N_{\rm crit}\approx 53.65$, we find a prismatic RG fixed point where all eight coupling constants are real. At this fixed point, $\epsilon$ expansions of various operator dimensions agree in the large $N$ limit with those obtained using the Schwinger-Dyson equations. Futhermore, the $3-\epsilon$ expansion provides us with a method to calculate the $1/N$ corrections to operator dimensions, as shown in (\ref{deltaphi}), (\ref{deltaphisquared}). At $N = N_{\rm crit}$ the prismatic fixed point merges with another fixed point, and for $N < N_{\rm crit}$ both become complex. In section \ref{BosonicQM} we discuss the $d=1$ version of the model (\ref{prism}). Our large $N$ solution gives a slightly negative scaling dimension, $\Delta_\phi\approx -0.09$, while the spectrum of bilinear operators is free of complex scaling dimensions. \section{Large $N$ Limit} \label{LargeN} To study the large $N$ limit of this theory, we will find it helpful to introduce an auxiliary field $\chi^{abc}$ so that\footnote{If we added fermions to make the tensor model supersymmetric \cite{Klebanov:2016xxf, Murugan:2017eto, Bulycheva:2018qcp, Chang:2018sve} then $\chi^{abc}$ would be interpreted as the highest component of the superfield $\Phi^{abc}$.} \begin{equation} S= \int d^d x \left ( \frac {1} {2} (\partial_\mu \phi^{abc})^2 + {g\over 3!} \phi^{a_1 b_1 c_1} \phi^{a_1 b_2 c_2} \phi^{a_2 b_1 c_2} \chi^{a_2 b_2 c_1}-\\\frac{1}{2}\chi^{abc}\chi^{abc}\right )\ . \label{prismaux} \end{equation} where $g\sim \sqrt g_1$. Integrating out $\chi^{abc}$ gives rise to the action (\ref{prism}). The advantage of keeping $\chi^{abc}$ explicitly is that the theory is then a theory with $O(N)^3$ symmetry dominated by the tetrahedral interactions, except it now involves two rank-3 fields; this shows that it has a smooth large $N$ limit. Thus, a prismatic large $N$ limit for the theory with one 3-tensor $\phi^{abc}$ may be viewed as a tetrahedral limit for two 3-tensors. Let us define the following propagators: \begin{align} \langle \phi(p)\phi(q) \rangle = (2\pi)^d \delta^d(p+q) G(p), \quad \langle \chi(p)\chi(q) \rangle =(2\pi)^d\delta^d(p+q) F(p). \end{align} In the free theory $G(p)=G_0(p)=\frac{1}{p^2}$, and $F(p)=F_0=1$. In the strong coupling limit the self-energies of the fields are given by the inverse propagators: $G(p)^{-1} = \Sigma_\phi$ and $F(p)^{-1}=\Sigma_\chi$. The Schwinger-Dyson equations for the exact two-point functions can be written as: \begin{eqnarray} F(p) & = & F_0 + g^2N^3 F_0 \int \frac{d^dq d^d k}{(2\pi)^{2d}} G(p-q-k)G(q)G(k) F(p)\,, \notag \\ G(p) & = & G_0(p) + 3 g^2N^3 G_0(p) \int \frac{d^dq d^d k}{(2\pi)^{2d}} G(p-q-k)F(q)G(k) G(p)\,, \end{eqnarray} and represented in figure \ref{SD}. \begin{figure}[h] \begin{center} \includegraphics[width=10cm]{SD.pdf} \caption{Diagramatic representation of the Schwinger-Dyson equations. Solid lines denote $\phi$ propagators, and dashed lines denote $\chi$ propagators. \label{SD}} \end{center} \end{figure} Multiplying the first equation by $F_0^{-1}$ on the left and $F(p)^{-1}$ on the right, and likewise for the second equation we obtain: \begin{eqnarray} F(p)^{-1} & = & F_0^{-1} - \lambda^2 \int \frac{d^dq d^d k}{(2\pi)^{2d}} G(p-q-k)G(q)G(k)\,, \notag \\ G(p)^{-1} & = & G_0(p)^{-1} - 3 \lambda^2 \int \frac{d^dq d^d k}{(2\pi)^{2d}} G(p-q-k)F(q)G(k)\,, \end{eqnarray} where $\lambda^2=N^3g^2\sim N^3 g_1$. We have to take the large $N$ limit keeping $\lambda^2$ fixed. In the IR limit, let us assume $$G(p)=\frac{A}{p^{2a}},~F(p)=\frac{B}{p^{2b}}.$$ $a$ is related to the scaling dimension of $\phi$, $\Delta_\phi$ via $a=d/2-\Delta_\phi.$ For what range of $a$ and $b$ can we drop the free terms in the gap equations above? In the strong coupling limit we require $b<0$ and $a<1$. Since $b=-3a+d$, we have $ d/3<a<1 $. In terms of $\Delta_\phi$, we then find \begin{equation} 3 \Delta_\phi+ \Delta_\chi=d\ , \qquad d/2-1<\Delta_\phi<d/6. \label{allowedrange} \end{equation} Notice that, if we had the usual kinetic term for the $\chi$ field, the allowed range for $\Delta_\phi$ would be larger. Therefore, our solution may also apply to a model with two dynamical scalar fields interacting via the particular interaction given above. The gap equation is finally: \begin{eqnarray} F(p)^{-1} & = & - \lambda^2 \int \frac{d^dq d^d k}{(2\pi)^{2d}} G(p-q-k)G(q)G(k)\,, \notag \\ G(p)^{-1} & = & - 3 \lambda^2 \int \frac{d^dq d^d k}{(2\pi)^{2d}} G(p-q-k)F(q)G(k)\,. \end{eqnarray} Dimensional analysis of the strong coupling fixed point actually does not fix $a$: we get $b=-3a+d$ from the first equation and $a = -2a-b+d$ from the second equation. Let us try to solve the above equations, in the hope that numerical factors arising from the Feynman integrals may determine $a$. The overall constant $A$ is not determined from this procedure, but note that $[\lambda]=3-d$, and therefore $A \sim \lambda^{\frac{2(a-1)}{3-d}}$. This procedure is analogous to solving an eigenvalue equation, and perhaps it is not surprising that we have to do this, since a solution for $a$ also determines the anomalous dimension of a composite operator $\phi^3$. We then find \begin{equation} F(p)=\frac{-1}{A^3\lambda^2} \frac{(2\pi)^{2d}}{L_d(a,a)L_d(2a-d/2,a)} \frac{1}{p^{2b}}, \end{equation} where \begin{equation} L_{d}(a,b) = \pi^{d/2}\frac{\Gamma(d/2-a)\Gamma(d/2-b)\Gamma(a+b-d/2)}{\Gamma(a)\Gamma(b)\Gamma(d-a-b)}. \end{equation} The condition that must be satisfied by $a$ is then: \begin{equation} 3 \frac{L_{d}(2a-d/2,d-3a)}{L_{d}(2a-d/2,a)}=1\ . \label{eigenvalue} \end{equation} In position space, the IR two-point functions take the form \begin{eqnarray} G(x) & = & \frac{\Gamma(d/2-a)}{\pi^{d/2}2^{2a}\Gamma(a)} \frac{A}{(x^2)^{\Delta_\phi}},\\ F(x) & = & \frac{\Gamma(d/2-b)}{\pi^{d/2}2^{2b}\Gamma(b)} \frac{(2\pi)^{2d}}{A^3\lambda^2L_d(a,a)L_d(2a-d/2,a)} \frac{1}{(x^2)^{d-3\Delta_\phi}}. \end{eqnarray} In terms of $\Delta_\phi$, (\ref{eigenvalue}) may be written as \begin{equation} f(d,\Delta_\phi) \equiv \frac{1}{3}{\Gamma (\frac{d}{2} - 3 \Delta_\phi) \Gamma (-\frac{d}{2} + 3\Delta_\phi) \Gamma (\Delta_\phi) \Gamma (d-\Delta_\phi)\over \Gamma (\frac{d}{2} - \Delta_\phi) \Gamma (-\frac{d}{2} + \Delta_\phi) \Gamma (3 \Delta_\phi) \Gamma (d- 3\Delta_\phi)} =1 \,. \label{eigenvaluenew} \end{equation} \subsection{The scaling dimension of $\phi$} It can be verified numerically that that solutions to \eqref{eigenvaluenew} within the allowed range (\ref{allowedrange}) do exist in $d<3$. For example, for $d=2.9$ we have the solution shown in Figure \ref{2.9d}: \begin{align} \Delta_\phi \approx 0.456\ ,\qquad \Delta_\chi \approx 1.531\ . \end{align} For $d=2.99$, we find $\Delta_\phi=0.495$, and $d=2.999$, $\Delta_\phi=0.4995$, consistent with the $3-\epsilon$ expansion (\ref{SDdim}). For $d=2$, \eqref{eigenvalue} simplifies to \begin{equation} 3 (3\Delta_\phi-1)^2 = (\Delta_\phi-1)^2\ . \end{equation} The solution $\Delta_\phi = \frac{1}{13} \left(4-\sqrt{3}\right)$ lies within the allowed range (\ref{allowedrange}), while the one with the other branch of the square root is outside it. \begin{figure}[h] \begin{center} \includegraphics[width=10cm]{2_9dphi} \caption{Solving \eqref{eigenvaluenew} for $d=2.9$. \label{2.9d}} \end{center} \end{figure} For $d<2$ we find multiple solutions within the allowed range (\ref{allowedrange}), as shown for $d=1$ in figure \ref{1d}. One of the solutions gives $\Delta_\phi=0$; this produces singularities in the large $N$ dimensions of scalar bilinears, and we will not use it. The other solution, \begin{equation} \Delta_\phi\approx -0.09055\ , \qquad \Delta_\chi \approx 1.2717\ , \label{QMsol} \end{equation} appears to be acceptable. Although $\Delta_\phi$ is negative, it lies above the unitarity bound. We note that there is also a positive solution $\Delta_\phi \approx 0.225$, which lies outside of the allowed range (although it would be allowed if the $\chi$ field was dynamical). \begin{figure}[h!] \begin{center} \includegraphics[width=10cm]{1dphi} \caption{Solving \eqref{eigenvaluenew} for $d=1$. \label{1d}} \end{center} \end{figure} There is an interesting transition in behavior which happens at $d=d_c$ where there is a double root at $\Delta_\phi=0$. The critical dimension $d_c$ is the solution of \begin{equation} 2+d_c \pi \cot(d_c \pi/2)+d_c (\gamma+\psi(d_c)) = 0\ . \end{equation} Its numerical value is $d_c = 1.35287$. For $d$ slightly above $d_c$ one of the solutions for $\Delta_\phi$ is zero, while the other is positive; we have to pick the positive one. However, for $d$ slightly below $d_c$ one of the solutions for $\Delta_\phi$ is zero, while the other is negative. Special care may be needed for continuation to $d< d_c$; in particular, for studying the $d=1$ case. \section{Bilinear Operators} \label{bilinears} There are three types of scalar bilinears one can consider, which are of the schematic form: $A=\phi (\xi \cdot \partial)^s (\partial^{2})^n \phi$, $B=\phi (\xi \cdot \partial)^s (\partial^{2})^n \chi$ and $C=\chi (\xi \cdot \partial)^s (\partial^{2})^n \chi$, where $\xi^\mu$ is an auxiliary null vector introduced to encode the spin of the operators, $ \xi \cdot \partial= \xi^\mu \partial_\mu$, and $\partial^2= \partial^\mu \partial_\mu$. We note that there is mixing of operators of type $A$ and $C$. It is easy to convince oneself that there is no mixing with the $B$ operators by drawing a few diagrams. \subsection{Bilinears of type B} Let us consider a bilinear of type $B$, of spin $s$ and scaling dimension $\Delta$, for which there is no mixing. The three-point functions take the form \cite{Osborn:1993cr,Giombi:2011rz}: \begin{equation} \begin{split} \langle \phi^{abc}(x_1)\chi^{abc}(x_2) B_s (x_3;\xi)\rangle & = v^{(B)}(x_1,x_2,x_3) = \frac{Q_3^s}{x_{31}^{\tau+\Delta_\phi-\Delta_\chi} x_{32}^{\tau+\Delta_\chi-\Delta_\phi}x_{12}^{\Delta_\phi+\Delta_\chi-\tau}} \\ & \rightarrow v^{(B)}_{s,\tau}(x_1,x_2) = (x_{12}\cdot \xi)^s x_{12}^{\tau-\Delta_\phi-\Delta_\chi}\,, \end{split} \end{equation} where $\tau=\Delta-s$ is the twist of the bilinear, $\xi$ is the null polarization vector, $Q_3$ is the conformally invariant tensor structure defined in \cite{Osborn:1993cr,Giombi:2011rz} and we took the limit ${x_3\rightarrow \infty}$ in the second line. The eigenvalue equation, obtained using the integration kernel depicted schematically in figure \ref{kernelB}, is \begin{equation} v_{s,\tau}(x_1,x_2) = 3\lambda^2 \int d^d y d^d z F(x_2,y)G(y,z)^2G(z,x_1)v_{s,\tau}(y,z) \end{equation} \begin{figure} \begin{center} \includegraphics[width=3cm]{typeBkernel.pdf} \caption{The integration kernel for type B bilinears. \label{kernelB}} \end{center} \end{figure} When $s=0$, we have: \begin{equation} |x_1-x_2|^{-\Delta_\phi-\Delta_\chi+\Delta}=3\tilde{A}^3 \tilde{B}\lambda^2 \int d^d y d^d z \frac{1}{|x_2-y|^{2\Delta_\chi}|y-z|^{5\Delta_\phi+\Delta_\chi-\Delta}|z-x_1|^{2\Delta_\phi}} \end{equation} which translates into \begin{eqnarray} \!\!\!\!\!\!\!\!\!\!\!\!\!\! g^{(B)}(d,\Delta) &\equiv& -3\frac{\Gamma (3 \Delta_\phi ) \sin \left(\frac{1}{2} \pi (d-6 \Delta_\phi )\right) \Gamma \left(\frac{d}{2}-\Delta_\phi \right) \Gamma \left(-\frac{d}{2}+3 \Delta_\phi +1\right) \Gamma \left(\frac{\Delta}{2}-\Delta_\phi \right) \Gamma \left(\frac{1}{2} (d-\Delta-2 \Delta_\phi )\right)}{\pi \Gamma (\Delta_\phi ) \Gamma \left(\frac{\Delta}{2}+\Delta_\phi \right) \Gamma \left(\frac{d-\Delta}{2}+\Delta_\phi \right)}\cr &=&1 \ . \label{typeBscalars} \end{eqnarray} \begin{figure}[h!] \begin{center} \includegraphics[width=10cm]{typeBspectrum2_9} \caption{The spectrum of type B bilinears in $d=2.9$. The red lines correspond to asympotes at $2n+\Delta_\phi+\Delta_\chi=2n+1.98747$. \label{typeB} } \end{center} \end{figure} We can solve equation (\ref{typeBscalars}) numerically to find the allowed scaling dimensions for type B operators in various dimensions. In $d=2.9$ the type B scaling dimensions are \begin{equation} \Delta_B=2.30120;~4.00173;~5.99214;~7.98983; ~9.98891;~\ldots, \end{equation} as shown in figure \ref{typeB}. In the pure $\phi$ language, the first one can be identified with the tetrahedral operator. The type B scaling approach the asymptotic formula \begin{align} \Delta_B\rightarrow 2n+\Delta_\phi+ \Delta_\chi= 2n+ 1.98747\ . \label{asympd29} \end{align} For example, for $n=54$ we numerically find $\Delta= 109.98749$, which is very close to (\ref{asympd29}). For spin $s>0$ the eigenvalue equation is: \begin{equation} (x_{12}\cdot \xi)^s|x_1-x_2|^{-\Delta_\phi-\Delta_\chi+\Delta}=3\tilde{A}^3 \tilde{B}\lambda^2 \int d^d y d^d z \frac{((y-z)\cdot \xi)^s}{|x_2-y|^{2\Delta_\chi}|y-z|^{5\Delta_\phi+\Delta_\chi-\Delta}|z-x_1|^{2\Delta_\phi}} \end{equation} Note that the spectrum of type $B$ bilinears does not contain the stress tensor, which is of type $A/C$. Processing the equation we have the following condition for the allowed twists of higher spin bilinears: \begin{eqnarray} \!\!\!\!\!\!\!\!\!\!\!\!\!\! && g^{(B)}(d,\tau,s) \equiv \nonumber \\ & & -3\frac{\Gamma (3 \Delta_\phi) \sin \left(\frac{1}{2} \pi (d-6 \Delta_\phi)\right) \Gamma \left(\frac{d}{2}-\Delta_\phi\right) \Gamma \left(-\frac{d}{2}+3 \Delta_\phi+1\right) \Gamma \left(\frac{1}{2} (d-2 \Delta_\phi -\tau )\right) \Gamma \left(s-\Delta_\phi+\frac{\tau }{2}\right)}{\pi \Gamma (\Delta_\phi ) \Gamma \left(\frac{d}{2}+\Delta_\phi -\frac{\tau }{2}\right) \Gamma \left(s+\Delta_\phi+\frac{\tau }{2}\right)} \nonumber \\ & & = 1 \ .\label{hsBeq}\ \end{eqnarray} Using this equation one can find the allowed twists of spin-$s$ type B bilinears. For example, the spectrum when $s=2$ and $d=2.9$ is found from figure \ref{hsB} to be $\tau=2.08,~3.99,~5.99,~7.99, \ldots$, which approach $\Delta_\chi+\Delta_\phi +2n=1.99+2n$ from above. \begin{figure}[h] \begin{center} \includegraphics[width=10cm]{typeBspin2d2_9} \caption{Solving equation \eqref{hsBeq} in $d=2.9$ for the allowed twists of spin-$2$ type $B$ bilinears. \label{hsB}} \end{center} \end{figure} We find that the spectrum of type B bilinear appears to be real for all $d<3$. However, there are ranges of $d$ where the spectrum of type A/C operators do contain complex eigenvalues, as we discuss in the next section. \subsection{Mixing of bilinears of type A and C} Let us now study the spectrum of bilinear operators of type $A$ and $C$. As mentioned earlier, by drawing a few diagrams (see figure \ref{kernelA}) one can see that these operators mix, in the sense that the two-point function $\langle A_s C_s \rangle \neq 0$. Let $\tau=\Delta-s$ be the twist of mixture of $A$ and $C$ operators, which we denote as $\tilde{A}_s$. As in the previous subsection, from the three-point functions $\langle \phi^{abc}(x_1)\phi^{abc}(x_2) \tilde{A}_s (x_3;\xi)\rangle $ and $\langle \chi^{abc}(x_1)\chi^{abc}(x_2) \tilde{A}_s (x_3;\xi)\rangle$, we define \begin{align} v^{(A)}_{s,\tau}(x,y) = \frac{((x-y)\cdot \xi)^s}{(x-y)^{2\Delta_\phi-\tau}}, \quad v^{(C)}_{s,\tau}(x,y) = \frac{((x-y)\cdot \xi)^s}{(x-y)^{2\Delta_\chi-\tau}}. \end{align} We now define the following kernels, depicted schematically in figure \ref{kernelA}: \begin{eqnarray} K_{AA}[v^{(A)}] & = & 3 \int d^d x d^d y G(x_1,x)G(x_2,y) G(x,y)F(x,y) v^{(A)}_{s,\tau}(x,y) \\ K_{CA}[v^{(A)}] & = & 3 \int d^d x d^d y F(x_1,x)F(x_2,y)G(x,y)^2 v^{(A)}_{s,\tau}(x,y) \\ K_{AC}[v^{(C)}] & = & 3 \int d^d x d^d y G(x_1,x)G(x_2,y)G(x,y)^2 v^{(C)}_{s,\tau}(x,y) \end{eqnarray} Note the factor of $3$, which appears from a careful counting of the Wick contractions. \begin{figure} \begin{center} \includegraphics[width=3cm]{typeAAkernel.pdf} $~~~$ \includegraphics[width=3cm]{typeBAkernel.pdf} $~~~$ \includegraphics[width=3.1cm]{typeABkernel.pdf} \caption{The integration kernels $K_{AA}$, $K_{CA}$ and $K_{AC}$ respectively for mixtures of type $A$ and $C$ bilinears. \label{kernelA}} \end{center} \end{figure} The integration kernel gives rise to the following matrix \begin{equation} \begin{pmatrix} 2 K_{AA}[v^{(A)}]/v^{(A)} & K_{AC}[v^{(C)}]/v^{(A)} \\ K_{CA}[v^{(A)}]/v^{(C)} & 0 \end{pmatrix} \equiv \begin{pmatrix} 2 K_1 & K_3 \\ K_2 & 0 \end{pmatrix}\ . \end{equation} The condition for it to have eigenvalue 1, which determines the allowed values of $\tau$, is \begin{equation} g^{(A)}(d,\tau,s)\equiv 2K_1+K_3K_2=1 \ .\end{equation} Luckily, this condition is independent of the constant $A$, as one can see from the following expressions, \begin{eqnarray} K_1 & = & \frac{3 (d-6 \Delta_\phi ) \Gamma (3 \Delta_\phi ) \sin \left(\frac{1}{2} \pi (d-6 \Delta_\phi )\right) \Gamma (d-3 \Delta_\phi ) \Gamma \left(\frac{d}{2}-\Delta_\phi \right)^2 \Gamma \left(\Delta_\phi -\frac{\tau }{2}\right) \Gamma \left(-\frac{d}{2}+s+\Delta_\phi +\frac{\tau }{2}\right)}{2 \pi \Gamma (\Delta_\phi )^2 \Gamma \left(d-\Delta_\phi -\frac{\tau }{2}\right) \Gamma \left(\frac{1}{2} (d+2 s-2 \Delta_\phi +\tau )\right)} \ ,\nonumber \\ K_2 & = & \frac{3 \pi ^d 2^{4 (d-2 \Delta_\phi )} \Gamma (3 \Delta_\phi )^2 \Gamma \left(\frac{d}{2}-\Delta_\phi \right)^4 \Gamma \left(d-3 \Delta_\phi -\frac{\tau }{2}\right) \Gamma \left(\frac{1}{2} (d+2 s-6 \Delta_\phi +\tau )\right)}{A^4 \lambda ^2 \Gamma (\Delta_\phi )^4 \Gamma \left(\frac{d}{2}-3 \Delta_\phi \right)^2 \Gamma \left(3 \Delta_\phi -\frac{\tau }{2}\right) \Gamma \left(-\frac{d}{2}+s+3 \Delta_\phi +\frac{\tau }{2}\right)} ,\nonumber \\ K_3 & = & \frac{3 A^4 \pi ^{-d} \lambda ^2 2^{8 \Delta_\phi -4 d} \Gamma (\Delta_\phi )^2 \Gamma \left(\Delta_\phi -\frac{\tau }{2}\right) \Gamma \left(-\frac{d}{2}+s+\Delta_\phi +\frac{\tau }{2}\right)}{\Gamma \left(\frac{d}{2}-\Delta_\phi \right)^2 \Gamma \left(d-\Delta_\phi -\frac{\tau }{2}\right) \Gamma \left(\frac{1}{2} (d+2 s-2 \Delta_\phi +\tau )\right)} \ . \end{eqnarray} Thus, the equation we need to solve is: \makeatletter \def\@eqnnum{{\normalsize \normalcolor (\theequation)}} \makeatother { \small \begin{equation} \begin{split} & \frac{\Gamma (\Delta_\phi)^2 \Gamma \left(\frac{d}{2}-3 \Delta_\phi\right)^2 \Gamma \left(3 \Delta_\phi-\frac{d}{2}\right) \Gamma \left(3 \Delta_\phi-\frac{\tau }{2}\right) \Gamma \left(d-\Delta_\phi-\frac{\tau }{2}\right) \Gamma \left(-\frac{d}{2}+s+3 \Delta_\phi+\frac{\tau }{2}\right) \Gamma \left(\frac{1}{2} (d+2 s-2 \Delta_\phi+\tau )\right)}{3 \Gamma (3 \Delta_\phi) \Gamma \left(\frac{d}{2}-\Delta_\phi\right)^2 \Gamma \left(\Delta_\phi-\frac{\tau }{2}\right) \Gamma \left(-\frac{d}{2}+s+\Delta_\phi+\frac{\tau }{2}\right)} \\ &= 3 \Gamma (3 \Delta_\phi) \Gamma \left(3 \Delta_\phi-\frac{d}{2}\right) \Gamma \left(d-3 \Delta_\phi-\frac{\tau }{2}\right) \Gamma \left(\frac{1}{2} (d+2 s-6 \Delta_\phi+\tau )\right)- \\ &-2 \Gamma \left(\frac{d}{2}-3 \Delta_\phi \right) \Gamma (d-3 \Delta_\phi) \Gamma \left(3 \Delta_\phi-\frac{\tau }{2}\right) \Gamma \left(-\frac{d}{2}+s+3 \Delta_\phi+\frac{\tau }{2}\right)\ . \end{split} \end{equation}} One can check that the stress-tensor, which has $s=2$ and $\tau=d-2$, appears in this spectrum for any $d$. \begin{figure}[h!] \begin{center} \includegraphics[width=10cm]{typeAspectrum2_9} \caption{The spectrum of type A/C scalar bilinears in $d=2.9$. The green lines correspond to the $2\Delta_\chi+2n$ asymptotics and the red ones to $2\Delta_\phi+2n$ asymptotics. We see that the solutions are real, and approach the expected values as $n \rightarrow \infty$. \label{typeA2_9} } \end{center} \end{figure} \begin{figure}[h!] \begin{center} \includegraphics[width=10cm]{typeAspectrum2_75} \caption{The spectrum of type A/C scalar bilinears in $d=2.75$. The green lines correspond to the $2\Delta_\chi+2n$ asymptotics and the red ones to $2\Delta_\phi+2n$ asymptotics. We see that two real solutions are no longer present; they are now complex. \label{typeA2_75} } \end{center} \end{figure} The Schwinger-Dyson equations have a symmetry under $\Delta \rightarrow d-\Delta$. In a given CFT, only one of this pair of solutions corresponds to a primary operator dimension, while the other one is its ``shadow." The $s=0$ spectrum contains complex modes for $1.6799<d<2.8056$. In $d=2.9$ the graphical solution for the scaling dimensions in the type A/C sector is shown in figure \ref{typeA2_9}. The lowest few are \begin{equation} \Delta=1.064,~1.836,~2.9,~3.114,~4.912,~5.063,~6.913, ~7.063, \ldots \end{equation} The eigenvalue at $\Delta=2.9$ is exact, and in general $\Delta=d$ is an eigenvalue for any $d$. The solution $1.836$ corresponds to the shadow of $1.064$. As $d$ is further lowered, the part of the graph between $1$ and $2$ moves up so that the two solutions become closer. In $d=d_{\rm crit}$, where $d_{\rm crit} \approx 2.8056$, the two solutions merge into a single one at $d/2$ (for discussions of mergers of fixed points, see \cite{Kaplan:2009kr,Giombi:2015haa,Gorbenko:2018ncu}). For $d< d_{\rm crit}$, the solutions become complex $\frac{d}{2} \pm i \alpha(d)$ and the prismatic model becomes unstable. The plot for $d=2.75$ is shown in figure \ref{typeA2_75}. \begin{figure}[h!] \begin{center} \includegraphics[width=10cm]{typeAspectrum168} \caption{The spectrum of type A/C scalar bilinears in $d=1.68$. The green vertical lines correspond to the $2\Delta_\chi+2n$ asymptotics; the red ones to the $2\Delta_\phi+2n$ asymptotics. \label{typeA1_6} } \end{center} \end{figure} For $d\leq 1.68$, the spectrum of bilinears is again real. The plot for $d=1.68$, where $\Delta_\phi\approx 0.0867$, is shown in figure \ref{typeA1_6}. At this critical value of $d$ there are two solutions at $d/2$; one is the shadow of the other. \section{Large $N$ results in $3-\epsilon$ dimensions} \label{threeeps} Let us solve the Schwinger-Dyson equations in $d=3-\epsilon$. The results will be compared with renormalized perturbation theory in the following section. The scaling dimension of $\phi^{abc}$ is found to be \begin{equation} \Delta_\phi=\frac{1}{2}-\frac{\epsilon }{2}+\epsilon ^2-\frac{20 \epsilon ^3}{3}+\left(\frac{472}{9}+\frac{\pi ^2}{3}\right) \epsilon ^4+\left(7 \zeta (3)-\frac{12692}{27}-\frac{56 \pi ^2}{9}\right) \epsilon ^5+\mathcal{O}\left(\epsilon ^6\right)\ . \label{SDdim} \end{equation} This is within the allowed range (\ref{allowedrange}) and is close to its upper boundary. The scaling dimension of $\chi^{abc}$ is \begin{equation} \Delta_\chi=d- 3 \Delta_\phi= \frac{3}{2}+ \frac{\epsilon }{2}- 3\epsilon ^2 + 20 \epsilon ^3- \left(\frac{472}{3}+\pi^2 \right) \epsilon ^4 - 3\left(7 \zeta (3)-\frac{12692}{27}-\frac{56 \pi ^2}{9}\right) \epsilon ^5+\mathcal{O}\left(\epsilon ^6\right)\ . \label{SDchidim} \end{equation} Let us consider the $s=0$ type A/C bilinears. For the first eigenvalue we find, \begin{equation} \Delta_{\phi^2} = 1-\epsilon +32 \epsilon ^2-\frac{976 \epsilon ^3}{3}+\left(\frac{30320}{9}+\frac{32 \pi ^2}{3}\right) \epsilon ^4+ \mathcal{O}\left(\epsilon ^5\right)\ . \label{SDphi2dim} \end{equation} It corresponds to the scaling dimension of operator $\phi^{abc} \phi^{abc}$, as we will show in the next section. The next eigenvalue is the shadow dimension $d- \Delta_{\phi^2}$. The next solution of the S-D equation is $\Delta=d=3-\epsilon$ for all $d$. While this seems to correspond to an exactly marginal operator, we believe that the corresponding operator is redundant: it is a linear combination of $\phi^{abc}\partial^2 \phi^{abc}$ and $\chi^{abc} \chi^{abc}$. Similar redundant operators with $h=1$ showed up in the Schwinger-Dyson analysis of multi-flavor models \cite{Gross:2016kjj, Bulycheva:2017ilt}. They decouple in correlation functions \cite{Gross:2016kjj} and were shown to vanish by the equations of motion \cite{Bulycheva:2017ilt}. The next eigenvalue is \begin{equation} \Delta_{\rm prism}=3+\epsilon +6\epsilon^2-84 \epsilon^3+\left(\frac{1532}{3}+10 \pi ^2\right) \epsilon^4+\left(18 \zeta (3)-\frac{6392}{3}-\frac{452 \pi^2}{3}\right) \epsilon^5+ \mathcal{O}\left(\epsilon^6\right)\ . \label{SDprismdim} \end{equation} It should correspond to the sextic prism operator (\ref{prism}), which is related by the equations of motion to a linear combination of $\phi^{abc}\partial^2 \phi^{abc}$ and $\chi^{abc} \chi^{abc}$. The subsequent eigenvalues may be separated into two sets. One of them has the form, for integer $n\geq 0$, \begin{align} \Delta_n^- =& 5+2n-\epsilon +2 \epsilon ^2-\frac{40 \epsilon ^3}{3}+\notag \\ &+\frac{\left(2 \left(472+3 \pi ^2\right) n (2 n+7) (n (2 n+7)+11)+180 \pi ^2+28212\right) \epsilon ^4}{9 (n+1) (n+2) (2 n+3) (2 n+5)}+\mathcal{O}\left(\epsilon ^5\right). \end{align} For large $n$ this approaches $4+ 2n + 2\Delta_\phi$, as expected for an operator of the form $\phi^{abc}(\partial^2)^{2+n} \phi^{abc}$. The other set of eigenvalues has the form, for integer $n\geq 0$, \begin{equation} \Delta_n^+= 5+2n +\epsilon - 6 \epsilon ^2 +4 \left(\frac{9}{n+2}-\frac{18}{2 n+3}-\frac{6}{2 n+5}+\frac{3}{n+1}+10\right) \epsilon ^3+\mathcal{O}\left(\epsilon ^4\right)\ . \end{equation} For large $n$ this approaches $2+ 2n + 2\Delta_\chi$, as expected for an operator of the form $\chi^{abc}(\partial^2)^{1+n} \chi^{abc}$. These simple asymptotic forms suggest that for large $n$ the mixing between operators $\phi^{abc}(\partial^2)^{2+n} \phi^{abc}$ and $\chi^{abc}(\partial^2)^{1+n} \chi^{abc}$ approaches zero. We can also use (\ref{typeBscalars}) to derive the $3-\epsilon$ expansions of the dimensions of type B operators, \begin{equation} O_{B,n}= \chi^{abc} (\partial_\mu \partial^\mu)^n \phi^{abc}+ \ldots \ , \end{equation} where the additional terms are there to make them conformal primaries. For $n=0$ we find \begin{equation} \Delta_{B,0}= 2 + 6\epsilon -68 \epsilon ^2+ \frac{2848 + 24\pi^2}{3} \epsilon^3 +\mathcal{O}\left(\epsilon^4\right)\ . \label{SDtetra} \end{equation} This scaling dimension corresponds to the operator $\phi^{abc}\chi^{abc}$, which in the original $\phi$ language is the tetrahedron operator $O_{\rm tetra}$. For the higher operators we get \begin{align} & \Delta_{B,1}=4+ 4 \epsilon^3 - 44\epsilon^4 +\mathcal{O}\left(\epsilon^5\right)\ ,\\ & \Delta_{B,2}=6-\frac{7}{5} \epsilon^2+ \frac{331}{30} \epsilon^3 -\left(\frac{199547}{2250}+\frac{7 \pi ^2}{15}\right) \epsilon^4 +\mathcal{O}\left(\epsilon^5\right)\ , \\ & \Delta_{B,3}=8 -\frac{12}{7}\epsilon^2+ \frac{9139}{735} \epsilon^3 -\left(\frac{7581556}{77175}+\frac{4 \pi ^2}{7}\right) \epsilon^4 +\mathcal{O}\left(\epsilon^5\right)\ , \ {\rm etc.} \label{SDtetrahigher} \end{align} Using the equations of motion, we can write $O_{B,1}$, up to a total derivative, as a sum of the three $8$-particle operators shown in the leftmost column of figure 9 in \cite{Bulycheva:2017ilt}. In general, for $n>0$, \begin{align} \Delta_{B,n}=2n+2 -2 \left (1- \frac{3}{n(2n+1)} \right )\epsilon^2 + \mathcal{O}\left(\epsilon^3\right)\ , \end{align} which agrees for large $n$ with the expected asymptotic behavior \begin{align} \Delta_{B,n}\rightarrow 2n+\Delta_\phi+ \Delta_\chi= 2n+ 2 -2 \epsilon^2 + \mathcal{O}\left(\epsilon^3\right)\ . \end{align} \subsection{Higher Spin Spectrum} Let us also present the $\epsilon$ expansions for the higher spin bilinear operators which are mixtures of type $A$ and $C$. The lowest eigenvalue of twist $\tau=\Delta-s$ for spin $s$ is \begin{align} \tau_0 =&1 -\epsilon +\frac{8 \left(s^2-4\right) \epsilon ^2}{4 s^2-1}\notag \\ &+\frac{4 \epsilon ^3 \left(27 \left(1-4 s^2\right) H_{s-\frac{1}{2}}-2 s \left(80 s^3+s (54 \log (4)-508)+45\right)-244+27 \log (4)\right)}{3 \left(1-4 s^2\right)^2}+\mathcal{O}\left(\epsilon ^4\right) \end{align} where $H_{n}$ is the harmonic number and the last two terms (as well as all higher-order terms) vanish when $s=2$ as expected. In the large $s$ limit, this becomes: \begin{equation} \begin{aligned} \tau_0&\rightarrow 1-\epsilon +\epsilon ^2 \left(2-\frac{15}{2 s^2}+ \mathcal{O}(s^{-3}) \right)+ \epsilon ^3 \left(-\frac{40}{3}+\frac{-9 \log (4 s)-9 \gamma +78}{s^2}+ \mathcal{O}(s^{-3}) \right) +\mathcal{O}\left(\epsilon ^4\right)\,. \end{aligned} \end{equation} Comparing with (\ref{deltaphi}), we see that \begin{equation} \tau_0 = 2\Delta_{\phi}+O(\frac{1}{s^2})\, \end{equation} This is the expected large spin limit \cite{Parisi:1973xn, Callan:1973pu, Fitzpatrick:2012yx, Komargodski:2012ek} for an operator bilinear in $\phi$, indicating that for large spin the mixing with $\chi$ bilinears is suppressed. The next two twists are \begin{align} \tau_1=& 3-\epsilon +\frac{8 s (s+2) \epsilon ^2}{4 s (s+2)+3} \notag \\ & +\frac{4 \epsilon ^3}{3 (4 s (s+2)+3)^2} \bigg(-4 (40 s (s+4)+157) s^2+6 (s+27)-27 \gamma (4 s (s+2)+3) \notag \\ &-27 (4 s (s+2)+3) \log (4)-27 (4 s (s+2)+3) \psi (s+\frac{3}{2})\bigg) +\mathcal{O}\left(\epsilon ^4\right)\ , \end{align} and \begin{align} \tau_2 =&3+\epsilon +\left(\frac{36}{4 s (s+2)+3}-6\right) \epsilon ^2 \notag \\ &+\frac{4 \epsilon ^3}{(4 s (s+2)+3)^2} \bigg(4 s (2 s (20 s (s+4)+56+9 \log 4)-105+36 \log 4)\notag \\ &+18 \gamma (4 s (s+2)+3)+18 (4 s (s+2)+3) \psi (s+\frac{3}{2})-297+54 \log 4\bigg) +\mathcal{O}\left(\epsilon^4\right)\,, \end{align} where $\psi(x)$ is the digamma function. In the large $s$ limit, these take the form, \begin{equation} \begin{aligned} \tau_1&\rightarrow 3-\epsilon +\epsilon ^2 \left(2-\frac{3}{2 s^2}+ O(s^{-3}) \right)+ \epsilon ^3 \left(-\frac{40}{3}-\frac{3 (3 \log (s)+\log (64)+3 \gamma -7)}{s^2}+ O(s^{-3}) \right)+O\left(\epsilon ^4\right)\\ &=2\Delta_{\phi}+2+O(\frac{1}{s^2})\,, \end{aligned} \end{equation} and \begin{equation} \begin{aligned} \tau_2&\rightarrow 3+\epsilon +\epsilon ^2 \left(-6+\frac{9}{s^2}+ O(s^{-3}) \right)+\epsilon ^3 \left(40+\frac{18 (\log (s)+\log (4)+\gamma -6)}{s^2}+ O(s^{-3}) \right)+O\left(\epsilon ^4\right)\\ &=2\Delta_{\chi}+O(\frac{1}{s^2})\,, \end{aligned} \end{equation} In general, for large spin we find the two towers of twists labelled by an integer $n$ \begin{equation} \begin{aligned} &\tau_{n}^A = 2 n+1-\epsilon +2 \epsilon ^2-\frac{40 \epsilon ^3}{3}+\mathcal{O}(\epsilon ^4) = 2\Delta_{\phi}+2n+\ldots \\ &\tau_{n}^C = 2 n+3+\epsilon -6 \epsilon ^2+\mathcal{O}(\epsilon ^3) = 2\Delta_{\chi}+2n+\ldots \end{aligned} \end{equation} again in agreement with the expected asymptotics and suppression of mixing at large spin. We can similarly derive explicit results for spinning operators in the type B sector using (\ref{hsBeq}). For the lowest two twists, we find \begin{equation} \begin{aligned} \tau_0 &=2+\frac{6 \epsilon }{2 s+1}+\frac{2 \epsilon ^2 \left(3 (2 s+1)^2 \left(H_{s-\frac{1}{2}}+\log (4)\right)-8 s^3-84 s^2-72 s-34\right)}{(2 s+1)^3}+O(\epsilon^3) \\ &=\left(2-2\epsilon^2+O(\epsilon^3)\right)+O(\frac{1}{s})\,,\\ \tau_1 &= 4-\frac{4 s \epsilon ^2}{2 s+3} + \frac{2 \epsilon ^3 \left(9 (2 s+3) H_{s+\frac{1}{2}}+80 s^2+12 s (8+\log (8))+54 \log (2)\right)}{3 (2 s+3)^2}+O(\epsilon^4)\\ &=\left(4-2 \epsilon ^2+\frac{40 \epsilon ^3}{3}+O(\epsilon^4)\right)+O(\frac{1}{s})\,, \end{aligned} \end{equation} and higher twists may be analyzed similarly. One can see that these results are also in agreement with the expected large spin limit $\tau_n \rightarrow \Delta_{\phi}+\Delta_{\chi}+2n$ for fixed $n$. \section{Renormalized perturbation theory} \label{threeminuseps} In this section we use the renormalized perturbation theory to carry out the $3-\epsilon$ expansion for finite $N$. We will find a fixed point with real couplings, whose large $N$ limit reproduces the results found using the $3-\epsilon$ expansion of the Schwinger-Dyson solution in the previous section. This is an excellent check of the Schwinger-Dyson approach to the prismatic theory. To carry out the beta function calculation at finite $N$ we need to include all the $O(N)^3$ invariant sextic terms in the action (as usual in such calculations, we ignore the quartic and quadratic operators which are relevant in $d=3$). The 11 such single-sum terms are shown diagrammatically in figure 5 of \cite{Bulycheva:2017ilt}. We will impose the additional constraint that the action is invariant under the permutation group $S_3$ which acts on the three $O(N)$ symmetry groups. This leaves us with 8 operators: 5 single-sum, 2 double-sum and 1 triple-sum. They are written down explicitly in (\ref{allinter}) and shown schematically in figure \ref{8inter}. The first one and the most essential one for achieving the solvable large $N$ limit is the ``prism" term (\ref{prism}); it is positive definite and symmetric under the interchanges of the three $O(N)$ groups. Our action is a special case of a general multi-field $\phi^6$ tensor theory: \begin{align} S = \int d^{d}x \left(\frac{1}{2}\partial_{\mu}\phi^{abc}\partial^{\mu}\phi^{abc}+\frac{1}{6!}g_{\kappa_{1}\kappa_{2}\kappa_{3}\kappa_{4}\kappa_{5}\kappa_{6}}\phi^{\kappa_{1}}\phi^{\kappa_{2}}\phi^{\kappa_{3}}\phi^{\kappa_{4}}\phi^{\kappa_{5}}\phi^{\kappa_{6}}\right)\, . \end{align} The beta-functions and anomalous dimensions for such a general sextic coupling were calculated in \cite{Gracey:2015fia,Osborn:2017ucf}; see also \cite{Pisarski:1982vz,Hager:2002uq} for earlier results on the $O(n)$ invariant sextic theory. The diagram topology contributing to the leading two-loop beta function is shown in figure \ref{fig:2loopdig}. \begin{figure} \centering \includegraphics[scale=0.8]{2loop.pdf} \caption{\label{fig:2loopdig} The two-loop contribution to the beta-function.} \end{figure} In our case each index $\kappa_{1}, \kappa_{2}\dots, \kappa_{6}$ has three sub indices $\kappa_{i}=(a_{i}b_{i}c_{i})$. The coupling $g_{\kappa_{1}\kappa_{2}\kappa_{3}\kappa_{4}\kappa_{5}\kappa_{6}}$ contains $8$ different types of interactions \begin{align} g_{\kappa_{1}\kappa_{2}\kappa_{3}\kappa_{4}\kappa_{5}\kappa_{6}} = g_{1}T^{(1)}_{\kappa_{1}\kappa_{2}\kappa_{3}\kappa_{4}\kappa_{5}\kappa_{6}}+g_{2}T^{(2)}_{\kappa_{1}\kappa_{2}\kappa_{3}\kappa_{4}\kappa_{5}\kappa_{6}}+\dots +g_{8}T^{(8)}_{\kappa_{1}\kappa_{2}\kappa_{3}\kappa_{4}\kappa_{5}\kappa_{6}}\,, \end{align} which can be graphically represented as in figure \ref{8inter}. Each tensor structure $T^{(k)}_{\kappa_{1}\kappa_{2}\kappa_{3}\kappa_{4}\kappa_{5}\kappa_{6}}$ consists of a sum of product of $\delta$ functions, which are symmetrized over the colors $(abc)$ and over the indices $\kappa_{1},\dots, \kappa_{6}$. The two-loop beta functions and anomalous dimensions for general $N$ are given in the Appendix. Let us use the large $N$ scaling \begin{align} &g_{1}= 180 \cdot (8\pi)^{2}\epsilon\frac{\tilde{g}_{1}}{N^{3}}\ , \qquad g_{2,4,6,7}= 180\cdot (8\pi)^{2}\epsilon\frac{\tilde{g}_{2,4,6,7}}{N^{5}}\ , \notag \\ & g_{3,5}= 180\cdot (8\pi)^{2}\epsilon\frac{\tilde{g}_{3,5}}{N^{4}}\ , \qquad g_{8}= 180\cdot (8\pi)^{2}\epsilon\frac{\tilde{g}_{8}}{N^{7}}\ , \label{scalings} \end{align} which is chosen in such a way that all beta functions retain non-vanishing quadratic terms in the large $N$ limit: \begin{align} &\tilde{\beta}_{1}= -2 \tilde{g}_1+2 \tilde{g}_1^2\ , \quad\tilde{\beta}_{2}= -2 \tilde{g}_2+ 4 \tilde{g}_1 \left(3 \tilde{g}_1+2 \tilde{g}_5\right)\ , \quad \tilde{\beta}_{3}= -2 \tilde{g}_3+12 \tilde{g}_1^2\ , \notag\\ &\tilde{\beta}_{4}=-2 \tilde{g}_4+\frac{2}{3} \left(2 \left(3 \tilde{g}_1+\tilde{g}_3\right)^2+\tilde{g}_5^2+12 \tilde{g}_1 \tilde{g}_5\right)\ , \quad \tilde{\beta}_{5}=-2 \tilde{g}_5+4\tilde{g}_1 \left(6 \tilde{g}_1+\tilde{g}_5\right)\ , \notag\\ &\tilde{\beta}_{6}=-2 \tilde{g}_6+4\tilde{g}_1 \left(3 \tilde{g}_1+\tilde{g}_5+2 \tilde{g}_6\right), \quad \tilde{\beta}_{7}= -2 \tilde{g}_7+6\tilde{g}_1^2\ , \notag\\ &\tilde{\beta}_{8}=-2 \tilde{g}_8+\frac{4}{3} \left(\tilde{g}_3^2+4 \tilde{g}_7 \tilde{g}_3+\tilde{g}_5^2+6 \tilde{g}_6^2+2 \tilde{g}_7^2+6 \tilde{g}_5 \tilde{g}_6+3 \tilde{g}_1 \left(\tilde{g}_5+6 \tilde{g}_6\right)\right)\ . \end{align} The unique non-trivial fixed point of these scaled beta functions is at \begin{align} & \tilde{g}_1^* = 1 , \quad \tilde{g}_2^* = -42 , \quad \tilde{g}_3^* = 6 , \quad \tilde{g}_4^* = 54 , \notag \\ & \tilde{g}_5^* = -12 , \quad \tilde{g}_6^* = 6 , \quad \tilde{g}_7^* = 3 , \quad \tilde{g}_8^* = 84 . \label{uniquefixed} \end{align} For this fixed point, the eigenvalues of the matrix $\frac{\partial \tilde{\beta}_i}{\partial \tilde{g}_j}$ are \begin{align} \lambda_{i}=6,~2,~2,~-2,~-2,~-2,~-2,~-2\ . \end{align} That there are unstable directions at the ``prismatic" fixed point also follows from the solution of the Schwinger-Dyson equations.\footnote{ At finite $N$, using the beta functions given in the Appendix, we are able to find and study additional fixed points numerically. The analysis of behavior of the beta-functions shows that they are all saddle points and, therefore, neither stable in the IR nor in the UV.} Using (\ref{SDphi2dim}) we see that the large $N$ dimension of the triple-trace operator $(\phi^{abc}\phi^{abc})^3$ is $3(1-\epsilon)+ \mathcal{O}(\epsilon^2)$, which means that it is relevant in $d=3-\epsilon$ and is one of the operators corresponding to eigenvalue $-2$. On the other hand, the prism operator is irrelevant and corresponds to eigenvalue $2$. Another irrelevant operator is $O_{\rm tetra} \phi^{abc}\phi^{abc}$; from (\ref{SDtetra}) it follows that its large $N$ dimension is $3+5\epsilon + \mathcal{O}(\epsilon^2)$, so it corresponds to eigenvalue $6$. We have also calculated the $1/N$ corrections to the fixed point (\ref{uniquefixed}): \begin{align} & \tilde{g}_1^* = 1- \frac{6}{N} + \frac{18}{N^2} +\ldots , \notag \\ &\tilde{g}_2^* = -42 + \frac{384}{N} + \frac{8592}{N^2} +\ldots , \notag \\ &\tilde{g}_3^* = 6+ \frac{1848}{N^2} +\ldots , \notag \\ &\tilde{g}_4^* = 54 - \frac{132}{N} + \frac{16392}{N^2} +\ldots , \notag \\ & \tilde{g}_5^* = -12+ \frac{30}{N} + \frac{2340}{N^2} +\ldots , \notag \\ &\tilde{g}_6^* = 6+ \frac{36}{N} -\frac{1320}{N^2} +\ldots , \notag \\ &\tilde{g}_7^* = 3 + \frac{174}{N} + \frac{7080}{N^2} +\ldots , \notag \\ &\tilde{g}_8^* = 84 + \frac{6732}{N} + \frac{309204}{N^2} +\ldots \label{uniqcorr} \end{align} For the scaling dimension of $\phi$, we find from (\ref{gammaphi}): \begin{align} \Delta_\phi= \frac{d-2}{2}+ \gamma_\phi = \frac{1}{2}-\frac{\epsilon }{2}+ \epsilon^2 \left ( 1- \frac{12}{N} + \frac{75}{N^2}+ \ldots \right )+ \mathcal{O}(\epsilon^3)\, . \label{deltaphi} \end{align} In the large $N$ limit, (\ref{deltaphi}) is in agreement with the solution of the S-D equation (\ref{SDdim}). For the scaling dimension of $\phi^{abc} \phi^{abc}$, we find \begin{align} \Delta_{\phi^2} = d-2+ \gamma_{\phi^2} =1-\epsilon + 32 \epsilon^2 \left ( 1- \frac{12}{N} + \frac{75}{N^2}+ \ldots \right ) + \mathcal{O}(\epsilon^3)\,. \label{deltaphisquared} \end{align} In the large $N$ limit this is in agreement with (\ref{SDphi2dim}). In general, calculating the $1/N$ corrections in tensor models seems to be quite difficult \cite{Gurau:2016lzk}, but it is nice to see that in the prismatic QFT the $3-\epsilon$ expansion provides us with explicit results for the $1/N$ corrections to scaling dimensions of various operators. The scaling dimension of the marginal prism operator is \begin{equation} \Delta_{\rm prism} = d+ {d\tilde \beta_1\over d\tilde g_1}= 3-\epsilon - 2\epsilon+ 4\epsilon \tilde g_1^*+ \ldots= 3+ \epsilon + \mathcal{O}(\epsilon^2)\ , \end{equation} which is in agreement with (\ref{SDprismdim}). We have also performed two-loop calculations of the scaling dimensions of the tetrahedron and pillow operators; see the appendix for the anomalous dimension matrix. In the large $N$ limit, we find \begin{align} & \Delta_{\rm tetra} = 2(d-2) + \gamma_{\rm tetra}= 2+ 6\epsilon + \mathcal{O}(\epsilon^2)\ , \notag \\ & \Delta_{\rm pillow} = 2(d-2) + \gamma_{\rm pillow}= 2- 2\epsilon + \mathcal{O}(\epsilon^2)\ , \label{tetrapillow} \end{align} which is in agreement with the S-D result (\ref{SDtetra}). Thus, we see that the large $N$ $3-\epsilon$ expansions from the Schwinger-Dyson approach have passed a number of 2-loop consistency checks. We have also solved the equations for the fixed points of two-loop beta functions numerically for finite $N$. The results for the prismatic fixed point are shown in table \ref{NumSol}. These results are in good agreement with the analytic $1/N$ expansions (\ref{uniqcorr}) for $N\geq 200$. \begin{table}[!h!] \begin{center} \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|} \hline $N$ & $\tilde{g}_1^{*}$ & $\tilde{g}_2^*$ & $\tilde{g}_3^*$ & $\tilde{g}_4^*$ & $\tilde{g}_5^*$& $\tilde{g}_6^*$ & $\tilde{g}_7^*$& $\tilde{g}_8^*$ & $\gamma_\phi/\epsilon^2$ \\ \hline 54 & 0.89 & -33.06 & 7.87 & 83.69 & -11.13 & 6.86 & 27.37 & 2047.16 & 0.80\\ \hline 100 & 0.94 & -37.56 & 6.23 & 55.35 & -11.53 & 6.28 & 5.98 & 212.08 & 0.89\\ \hline 200 & 0.97 & -39.90 & 6.05 & 53.8 & -11.80 & 6.15 & 4.09 & 127.90 & 0.94\\ \hline 400 & 0.99 & -40.99 & 6.01 & 53.78 & -11.91 & 6.08 & 3.48 & 103.03 & 0.97\\ \hline 2000 & 1.00 & -41.81 & 6.00 & 53.94 & -11.98 & 6.02 & 3.09 & 87.45 & 0.99\\ \hline 5000 & 1.00 & -41.92 & 6.00 & 53.97 & -11.99 & 6.01& 3.04 & 85.36 & 0.998\\ \hline 10000 & 1.00 & -41.96 & 6.00 & 53.99 & -12.00 & 6.00 & 3.02 & 84.68 & 0.999\\ \hline 100000 & 1.00 & -42.00 & 6.00 & 54.00 & -12.00 & 6.00 & 3.00 & 84.07 & 1.00 \\ \hline \end{tabular} \caption{\label{NumSol} The numerical solutions for the coupling constants defined in \eqref{scalings}} \end{center} \end{table} At $N=N_{\rm crit}$, where $N_{\rm crit}\approx 53.65$, the prismatic fixed point in $3-\epsilon$ dimensions merges with another fixed point;\footnote{ This is similar, for example, to the situation in the $O(N)$ invariant cubic theory in $6-\epsilon$ dimensions \cite{Fei:2014yja,Fei:2014xta}, where $N_{\rm crit}\approx 1038.266$. For general discussions of mergers of fixed points, see \cite{Kaplan:2009kr,Gorbenko:2018ncu}.} they are located at \begin{align} &\tilde{g}_1^* = 0.89 , \quad \tilde{g}_2^* = -32.90, \quad \tilde{g}_3^* = 8.24 , \quad \tilde{g}_4^* = 92.01 , \notag \\ &\tilde{g}_5^* = -11.15, \quad \tilde{g}_6^* = 7.00 , \quad \tilde{g}_7^* = 35.33 , \quad \tilde{g}_8^* = 3155.29\ . \end{align} For $N<N_{\rm crit}$ both of them become complex. For example, for $N=53.6$ the two complex fixed points are at \begin{gather} \tilde{g}_1^* = 0.89 - 0.0002 i , \quad \tilde{g}_2^* = -32.89+0.04 i , \quad \tilde{g}_3^* = 8.24 +0.15 i, \quad \tilde{g}_4^* = 91.98 +3.51 i , \quad\notag\\ \tilde{g}_5^* = -11.15-0.01 i , \quad \tilde{g}_6^* = 7.00 +0.06 i, \quad \tilde{g}_7^* = 35.19 +3.61 i , \quad \tilde{g}_8^* = 3107.77 +554.01 i \end{gather} and at the complex conjugate values. \section{Bosonic Quantum Mechanics} \label{BosonicQM} The action (\ref{prism}) for $d=1$ describes the quantum mechanics of a particle moving in $N^3$ dimensions with a non-negative sextic potential which vanishes at the origin.\footnote{ A very similar $d=1$ model with a stable sextic potential was studied in \cite{Azeyanagi:2017drg,Azeyanagi:2017mre} using the formulation \cite{Ferrari:2017ryl} where a rank-3 tensor is viewed as $D$ matrices. It was argued \cite{Azeyanagi:2017drg,Azeyanagi:2017mre} that the sextic bosonic model does not have a good IR limit. We, however, don't find an obvious problem with the prismatic $d=1$ model because the complex scaling dimensions are absent for the bilinear operators. We note that the negative scaling dimension (\ref{QMsol}), which we find for $\phi$, is quite far from the $1/6$ mentioned in \cite{Azeyanagi:2017drg,Azeyanagi:2017mre}.} Such a problem should exhibit a discrete spectrum with positive energy levels, and it is conceivable that in the large $N$ limit the gaps become exponentially small, leading to a nearly conformal behavior. For moderate values of $N$, this quantum mechanics problem may even be accessible to numerical studies. Solving for the scaling dimensions of type A/C bilinears in $d=1$, we find that the low-lying eigenvalues are \begin{equation} \Delta=1,\; 1.57, \; 2, \; 3.29, \; 4.12, \; 5.36, \; 6.14, \; 7.38,\; 8.15, \; 9.39, \; 10.15, \; 11.40, \ldots \end{equation} The plot for the eigenvalues is shown in figure \ref{1deigen}. \begin{figure}[h!] \begin{center} \includegraphics[width=10cm]{phi-phi-1d-spectrum} \caption{The spectrum of scalar type A/C bilinears in 1d. Red vertical lines are asymptotes corresponding to $-2\Delta_\phi+2n$ and green vertical lines are asymptotes corresponding to $-2\Delta_\chi+2n$. \label{1deigen} } \end{center} \end{figure} The smallest positive eigenvalue, $\Delta=1$, is the continuation of the solution $\Delta=d$ present for any $d$. As discussed in section (\ref{threeeps}), it may correspond to a redundant operator. The next scaling dimension, $\Delta=1.57317$, may correspond to a mixture involving $\phi^{abc} \phi^{abc}$. The appearance of scaling dimension $2$, which was also seen for the fermionic SYK and tensor models, means that the its dual\footnote{Of course, as observed in \cite{Choudhury:2017tax,Bulycheva:2017ilt}, there are important differences between the holographic duals of tensor models and SYK models.} should involve dilaton gravity in AdS$_2$ \cite{Almheiri:2014cka,Maldacena:2016upp,Engelsoy:2016xyb,Jensen:2016pah}. Let us also list the type B scaling dimensions, i.e. the ones corresponding to operators $\phi^{abc} \partial_t^{2n} \chi^{abc}$. Here we find real solutions $\Delta= 1.01,~2.96,~4.94,~6.93,~ \ldots$. For large excitation numbers $n$, the type A/C scaling dimensions appear to (slowly) approach $-2\Delta_\phi +2n$ and $-2\Delta_\chi+2n$ rather than $2\Delta_\phi +2n$ and $2\Delta_\chi+2n$, as shown in figure \ref{1d}. The type B scaling dimensions also appear to slowly approach $-\Delta_\phi - \Delta_\chi + 2n$ rather than $\Delta_\phi + \Delta_\chi + 2n$. This is likely due to the fact that $\Delta_\phi$ is negative. Further work is needed to understand better the new features of the large $N$ solution in the regime where $d< 1.35$ and $\Delta_\phi < 0$. \section{Discussion} In this paper we presented exact results for the $O(N)^3$ invariant theory (\ref{prism}) in the prismatic large $N$ limit where $g_1 N^3$ is held fixed. This approach may be generalized to an $O(N)^p$ invariant theory of a rank-$p$ bosonic tensor $\phi^{a_1 \ldots a_p}$, with odd $p\geq 3$. It has a positive potential of order $2p$: \begin{equation} S_{2p}= \int d^d x \left ( \frac {1} {2} (\partial_\mu \phi^{abc})^2 + {g_1\over (2p)!} (\phi^p)^{a_1 \ldots a_p} (\phi^p)^{a_1 \ldots a_p} \right ) \ . \label{prismnew} \end{equation} To solve these models in the large $N$ limit where $g_1 N^p$ is held fixed, we may rewrite the action with the help of an additional tensor field $\chi$: \begin{equation} S= \int d^d x \left ( \frac {1} {2} (\partial_\mu \phi^{abc})^2 + {g\over p!} (\phi^p)^{a_1 \ldots a_p} \chi^{a_1 \ldots a_p} -\\\frac{1}{2}\chi^{a_1 \ldots a_p}\chi^{a_1 \ldots a_p}\right )\ . \label{prismauxp} \end{equation} For discussions of the structure of the interaction vertex with odd $p>3$, see \cite{Klebanov:2016xxf,Ferrari:2017jgw,Gubser:2018yec}. The models (\ref{prismnew}) are tensor counter-parts of the SYK-like models introduced in \cite{Murugan:2017eto}; therefore, the Schwinger-Dyson equations derived there should be applicable to the tensor models. It would be interesting to study the large $N$ solution of theories with $p>3$ in more detail using methods analogous to the ones used for $p=3$. In this paper we analyzed the renormalization of the prismatic theory at the two-loop order, using the beta functions in \cite{Gracey:2015fia,Osborn:2017ucf}. The general four-loop terms are also given there, and it would be interesting to study the effects they produce. It should be possible to extend the calculations to even higher loops by modifying the calculations in \cite{Hager:2002uq} to an arbitrary tensorial interaction, which we leave as a possible avenue for future work. In this context, it would also be interesting to study the possibility of fixed points with other large $N$ scalings, perhaps dominated by the ``wheel" interaction ($g_2$) of figure \ref{8inter}, in addition to the large $N$ fixed point dominated by the prism interaction ($g_1$) studied in this paper.\footnote{A $d=0$ theory with wheel interactions was studied in \cite{Lionni:2017xvn}.} Another interesting extension of the $O(N)^3$ symmetric model (\ref{prism}) is to add a 2-component Majorana fermion $\psi^{abc}$, so that the fields can be assembled into a $d=3$ ${\cal N}=1$ superfield \begin{equation} \Phi^{abc} = \phi^{abc} + \bar \theta \psi^{abc} + \bar \theta \theta \chi^{abc} \end{equation} Then the prismatic scalar potential follows if we assume a tetrahedral superpotential for $\Phi^{abc}$ \cite{Klebanov:2016xxf}. Large $N$ treatments of supersymmetric tensor and SYK-like models with two supercharges have been given in \cite{Murugan:2017eto,Chang:2018sve}, and we expect the solution of the ${\cal N}=1$ super-tensor model in $d<3$ to work analogously. An advantage of the tensor QFT approach is that one can also develop the $3-\epsilon$ expansion using the standard renormalized perturbation theory. In the supersymmetric case, it is sufficient to introduce only three coupling constants: \begin{align} W& = g_1 \Phi^{a_1 b_1 c_1} \Phi^{a_1 b_2 c_2} \Phi^{a_2 b_1 c_2} \Phi^{a_2 b_2 c_1}\notag \\ & + g_2 \big(\Phi^{a_{1}b_{1}c_{1}}\Phi^{a_{1}b_{1}c_{2}}\Phi^{a_{2}b_{2}c_{1}}\Phi^{a_{2}b_{2}c_{2}} + \Phi^{a_{1}b_{1}c_{1}}\Phi^{a_{2}b_{1}c_{1}}\Phi^{a_{1}b_{2}c_{2}}\Phi^{a_{2}b_{2}c_{2}} +\Phi^{a_{1}b_{1}c_{1}}\Phi^{a_{1}b_{2}c_{1}}\Phi^{a_{2}b_{1}c_{2}}\Phi^{a_{2}b_{2}c_{2}}\big) \notag \\ & + g_3 \Phi^{a_{1}b_{1}c_{1}}\Phi^{a_{1}b_{1}c_{1}}\Phi^{a_{2}b_{2}c_{2}}\Phi^{a_{2}b_{2}c_{2}}\ , \end{align} and it is possible to find explicit expressions for the beta functions and operator scaling dimensions \cite{PT:2018}. Also, directly in $d=3$ it is possible to couple the ${\cal N}=1$ theory with the above superpotential to $O(N)_{k_1} \times O(N)_{k_2}\times O(N)_{k_3}$ supersymmetric Chern-Simons gauge theory with levels $k_1, k_2, k_3$, and derive the corresponding beta functions for couplings $g_i$ \cite{PT:2018}. \section*{Acknowledgments} We are grateful to C.-M. Chang, M. Rangamani, D. Stanford, E. Witten and J. Yoon for useful discussions. IRK thanks the Yukawa Institute for Theoretical Physics where some of his work on this paper was carried out during the workshop YITP-T-18-04 ``New Frontiers in String Theory 2018". SP thanks the Princeton Center for Theoretical Science for hospitality as well as the International Centre for Theoretical Sciences, Bengaluru where some of his work on this paper was carried out during the program - ``AdS/CFT at 20 and Beyond" (ICTS/adscft20/2018/05). The work of SG was supported in part by the US NSF under Grant No.~PHY-1620542. The work of IRK and FP was supported in part by the US NSF under Grant No.~PHY-1620059. The work of SP was supported in part by a DST-SERB Early Career Research Award (ECR/2017/001023) and a DST INSPIRE Faculty Award. The work of GT was supported in part by the MURI grant W911NF-14-1-0003 from ARO and by DOE grant de-sc0007870.
\section{Introduction}\label{s:intro} Kostant and Wallach studied the Gelfand-Zeitlin system of functions for the Lie algebra of complex $n$ by $n$ matrices in two fundamental papers \cite{KW1, KW2}, and found a number of new features that did not appear in the Gelfand-Zeitlin system of functions on Hermitian matrices \cite{GS}. The Gelfand-Zeitlin functions generate a Poisson commutative family of functions and in \cite{KW1}, Kostant and Wallach show they generate an integral system on each regular conjugacy class of matrices. To show this, they introduced and studied the set of {\it strongly regular} matrices, which is the set where the Gelfand-Zeitlin functions have linearly independent differentials. There is also a Gelfand-Zeitlin system on the complex orthogonal Lie algebra $\mathfrak{so}(n,\mbox{${\mathbb C}$})$. Many fundamental and incisive linear algebra constructions used to study matrices in \cite{KW1,Col1} do not carry over to the orthogonal case, and as a consequence, much less is known about the complex orthogonal Gelfand-Zeitlin system. The purpose of this paper and its sequel is to remedy this situation. We establish the complete integrability of the orthogonal Gelfand-Zeitlin system on regular adjoint orbits in $\mathfrak{so}(n,\mbox{${\mathbb C}$})$ and extend a number of basic results on the strongly regular set to $\mathfrak{so}(n,\mbox{${\mathbb C}$})$, which were established in the general linear case in \cite{KW1, Col1, CEKorbs, CEeigen}. In particular, we describe the generic leaves of the foliation given by the integrable system as well as aspects of the geometry of the nilfibre of the moment map of the system. The key idea is to use results from the theory of algebraic group actions due to Knop, Panyushev, and Luna to extend the general linear results to the orthogonal setting. As a consequence, we understand the general linear and orthogonal complex Gelfand-Zeitlin systems using a unified approach, and avoid some of the subtle linear algebra calculations from previous approaches. In more detail, we let $\mbox{${\mathfrak g}$} = \mbox{${\mathfrak g}$}_n = \mathfrak{so}(n,\mbox{${\mathbb C}$})$, and fix a sequence of embeddings $\mbox{${\mathfrak g}$}_2 \subset \mbox{${\mathfrak g}$}_3 \subset \dots \subset \mbox{${\mathfrak g}$}_n = \mbox{${\mathfrak g}$}$, and let $G_n = SO(n,\mbox{${\mathbb C}$})$. Using an invariant form, we embed a choice of polynomial generators of $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}_{i}]^{G_{i}}$ into $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]$, the regular functions on $\mbox{${\mathfrak g}$}$, and we let $J_{GZ}$ be the collection of functions consisting of the polynomial generators of $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}_{i}]^{G_{i}}$ for $i=2,\dots, n$. Letting $r_i$ be the rank of $\mbox{${\mathfrak g}$}_i$, we obtain a Kostant-Wallach (or KW) morphism $\Phi: \mbox{${\mathfrak g}$} \to \mbox{${\mathbb C}$}^{r_2} \times \dots\times \mbox{${\mathbb C}$}^{r_n}$ with coordinates given by the above polynomial generators. We also use extensively the partial KW morphism $\Phi_n:\mbox{${\mathfrak g}$} \to \mbox{${\mathbb C}$}^{r_{n-1}} \times \mbox{${\mathbb C}$}^{r_n}$ defined using the polynomial generators from $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}_{n-1}]^{G_{n-1}}$ and $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}_n]^{G_n}$. We note that $\Phi_n$ may be identified with a geometric invariant theory quotient $\mbox{${\mathfrak g}$} \to \mbox{${\mathfrak g}$}//G_{n-1}$, and combine this with an interlacing argument and a basic flatness result of Knop \cite{Kn} for spherical varieties to prove our first main theorem. \begin{thm}\label{thm:surjintro} (see Theorem \ref{thm:surj}) The morphism $\Phi$ is surjective, and every fibre contains a regular element of $\mbox{${\mathfrak g}$}$. \end{thm} An element $x \in \mbox{${\mathfrak g}$}$ is called {\it strongly regular} if the set $\{ df(x) : f \in J_{GZ} \}$ is linearly independent. In the case of $\mathfrak{gl}(n,\mbox{${\mathbb C}$})$, Kostant and Wallach consider the sequence of subalgebras $\mbox{${\mathfrak g}$}_1\subset \mbox{${\mathfrak g}$}_2 \subset \dots \subset \mbox{${\mathfrak g}$}_n = \mathfrak{gl}(n,\mbox{${\mathbb C}$})$ by letting $\mbox{${\mathfrak g}$}_i \cong \mathfrak{gl}(i,\mbox{${\mathbb C}$})$ be the upper left $i$ by $i$ corner, and given $x\in \mathfrak{gl}(n,\mbox{${\mathbb C}$})$, define $x_i \in \mbox{${\mathfrak g}$}_i$ by orthogonal projection. They define Gelfand-Zeitlin functions and the strongly regular set as above, and prove that $x\in \mathfrak{gl}(n,\mbox{${\mathbb C}$})$ is strongly regular if and only if (i) $x_i$ is regular in $\mbox{${\mathfrak g}$}_i$ for each $i$ and (ii) the centralizers $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_i}(x_i) \cap \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i+1}}(x_{i+1}) = 0$ for $i=1, \dots, n-1$. We use results on spherical varieties due to Panyushev \cite{Pancoiso} to prove that we may omit condition (i), and extend this result to the case of $\mathfrak{so}(n,\mbox{${\mathbb C}$})$ (Proposition \ref{prop:fullsreg}). Here, given $x \in \mbox{${\mathfrak g}$} = \mathfrak{so}(n,\mbox{${\mathbb C}$})$, we also define $x_i \in \mbox{${\mathfrak g}$}_i \cong \mathfrak{so}(i,\mbox{${\mathbb C}$})$ by orthogonal projection. Using this simplified criterion for strong regularity, we can construct a large collection of strongly regular elements. In particular, we consider the set $\mbox{${\mathfrak g}$}_{\Theta}$ in $\mathfrak{so}(n,\mbox{${\mathbb C}$})$ given by the property that the (suitably defined) spectra of $x_i$ and $x_{i+1}$ do not intersect for $i=2, \dots, n-1$ (see Notation \ref{nota:spectrum} and Equation \ref{eq:fgtheta}). In Proposition \ref{prop:orthofgtheta}, we prove that elements of $\mbox{${\mathfrak g}$}_{\Theta}$ are strongly regular. We then use this result, together with Theorem \ref{thm:surjintro}, to prove one of our main results. \begin{thm}\label{thm:intsystemintro} (see Theorem \ref{thm:intsystem}) The restriction of the Gelfand-Zeitlin functions $J_{GZ}$ to a regular adjoint orbit in $\mbox{${\mathfrak g}$}$ forms a completely integrable system on the orbit. \end{thm} We further show that for $x\in \mbox{${\mathfrak g}$}_{\Theta}$, the fibre $\Phi^{-1}(\Phi(x))$ has a free action by an abelian linear algebraic group, and thereby extend a result of Kostant and Wallach and the first author \cite{KW1, Col1} from the general linear case to the orthogonal case (Theorem \ref{thm:GZgroup}). In the final section, we study the nilfibre $\Phi^{-1}(0)$. We begin by studying the partial nilfibre $\Phi_{n}^{-1}(0)$. We show that its irreducible components can be described in terms of closed $G_{n-1}=SO(n-1,\mbox{${\mathbb C}$})$-orbits on the flag variety $\mathcal{B}$ of $\mbox{${\mathfrak g}$}$ (Theorem \ref{thm:partialnil}). We accomplish this by using the Luna slice theorem to describe the generic fibres of $\Phi_{n}$ and then degenerate a generic fibre to $\Phi_{n}^{-1}(0)$ using Knop's flatness result. Using another interlacing argument and well-known facts about the closed $G_{n-1}$-orbits on $\mathcal{B}$, we prove: \begin{prop}\label{p:intronil} (see Proposition \ref{p:nosreg}) The nilfibre of $\Phi$ contains no strongly regular elements. \end{prop} This stands in contrast to the case of $\mathfrak{gl}(n,\mbox{${\mathbb C}$})$ studied extensively in \cite{CEKorbs}. As a consequence of Proposition \ref{p:intronil}, we prove that there is no analogue of the Hessenberg matrices, which play a fundamental role in \cite{KW1} (Corollary \ref{c:noHess}). In the sequel, we plan to further develop these methods to completely understand the strongly regular set, and describe in full detail each partial KW fiber $\Phi_n^{-1}(\Phi_n(x))$. This paper is organized as follows. In Section \ref{s:realization}, we introduce notation and results for later use. In Section \ref{s:surjectivity}, we identify the partial KW map $\Phi_n$ as an invariant theory quotient and show that $\Phi$ is surjective. In Section \ref{s:spherical}, we study the strongly regular set, and prove that $\mbox{${\mathfrak g}$}_{\Theta}$ consists of strongly regular elements. We further prove complete integrability of regular orbits, and study the KW fibers for elements in $\mbox{${\mathfrak g}$}_{\Theta}$. In Section \ref{s:KWnilfibre}, we study the nilfibres of $\Phi_{n}$ and $\Phi$ and prove that the nilfibre of $\Phi$ contains no strongly regular elements. In the body of the paper, all Lie algebras are complex, as are all algebraic groups. In particular, we will write $\mathfrak{so}(n)$ and $SO(n)$ to denote $\mathfrak{so}(n,\mbox{${\mathbb C}$})$ and $SO(n,\mbox{${\mathbb C}$})$, and similarly with $\mathfrak{gl}(n)$. The first author was supported in part by NSA grant number H98230-16-1-0002 and the second author was supported in part by Simons Foundation Travel Grant 359424. We would like to thank Nolan Wallach and Jeb Willenbring for useful discussions relevant to the subject of this paper. \section{Preliminaries}\label{s:realization} In this section, we recall basic facts about the orthogonal Lie algebras (Section \ref{ss:orthoreal}). After introducing some notation, we review basic properties of the orthogonal Gelfand-Zeitlin systems (hereafter referred to as GZ systems) and its moment map (orthogonal Kostant-Wallach map) and summarize known results (Section \ref{ss:GZsystems}). We begin by describing the realization of $\mathfrak{so}(n)$ that we will use throughout the paper. \subsection{Realization of Orthogonal Lie algebras}\label{ss:orthoreal} We give explicit descriptions of standard Cartan subalgebras and corresponding root systems of $\mathfrak{so}(n)$. Our exposition follows Chapters 1 and 2 of \cite{GW}. Let $\beta$ be the non-degenerate, symmetric bilinear form on $\mbox{${\mathbb C}$}^{n}$ given by \begin{equation}\label{eq:beta} \beta(x,y)=x^{T} S_{n} y, \end{equation} where $x, y$ are $n\times 1$ column vectors and $S_{n}$ is the $n\times n$ matrix: \begin{equation}\label{eq:Sn} S_{n}=\left[\begin{array}{ccccc} 0& \dots &\dots & 0 & 1\\ \vdots & & & 1 & 0\\ \vdots & &\iddots & & \vdots\\ 0& 1& \dots & 0 & \vdots\\ 1 & 0& \dots & \dots & 0\end{array}\right] \end{equation} with ones down the skew diagonal and zeroes elsewhere. The special orthogonal group, $SO(n)$, consists of the $g\in SL(n)$ such that $\beta(gx, gy)=\beta(x,y)$ for all $x,\, y \in \mbox{${\mathbb C}$}^{n}$. Its Lie algebra, $\mathfrak{so}(n)$, consists of the $Z\in\mbox{${\fs\fl}$}(n)$ such that $\beta(Zx, y)=-\beta(x,Zy)$ for all $x, \, y\in\mbox{${\mathbb C}$}^{n}$. We consider the cases where $n$ is odd and even separately. Throughout, we denote the standard basis of $\mbox{${\mathbb C}$}^{n}$ by $\{e_{1},\dots, e_{n}\}$. \subsubsection{Realization of $\mathfrak{so}(2l)$} \label{ss:soevenreal} Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$ be of type $D$. The subalgebra of diagonal matrices $\mbox{${\mathfrak h}$}:=\{\mbox{diag}[a_{1},\dots, a_{l}, -a_{l},\dots, -a_{1}],\, a_{i}\in\mbox{${\mathbb C}$}\}$ is a Cartan subalgebra of $\mbox{${\mathfrak g}$}$. We refer to $\mbox{${\mathfrak h}$}$ as the \emph{standard Cartan subalgebra}. Let $\epsilon_{i}\in\mbox{${\mathfrak h}$}^{*}$ be the linear functional $\epsilon_{i}(\mbox{diag}[a_{1},\dots, a_{l}, -a_{l},\dots, -a_{1}])=a_{i}$, and let $\Phi(\mbox{${\mathfrak g}$}, \mbox{${\mathfrak h}$})$ be the roots of $\mbox{${\mathfrak g}$}$ with respect to $\mbox{${\mathfrak h}$}$. Then $\Phi(\mbox{${\mathfrak g}$},\mbox{${\mathfrak h}$})=\{\epsilon_{i}-\epsilon_{j},\, \pm(\epsilon_{i}+\epsilon_{j}):\; 1\leq i\neq j\leq l\}$, and we take as our \emph{standard positive roots} the set $\Phi^{+}(\mbox{${\mathfrak g}$},\mbox{${\mathfrak h}$}):=\{\epsilon_{i}-\epsilon_{j},\, \epsilon_{i}+\epsilon_{j}:\; 1\leq i< j\leq l\}$ with corresponding simple roots $\Pi:=\{\alpha_{1},\dots, \alpha_{l-1}, \alpha_{l}\}$ where $\alpha_{i}=\epsilon_{i}-\epsilon_{i+1}$ for $i=1, \dots, l-1$, and $\alpha_{l}=\epsilon_{l-1}+\epsilon_{l}$. The Borel subalgebra $\mbox{${\mathfrak b}$}_{+}:=\mbox{${\mathfrak h}$}\oplus\displaystyle\bigoplus_{\alpha\in\Phi^{+}(\mbox{${\mathfrak g}$},\mbox{${\mathfrak h}$})} \mbox{${\mathfrak g}$}_{\alpha}$ is easily seen to be the set of upper triangular matrices in $\mbox{${\mathfrak g}$}$. For the purposes of computations with $\mathfrak{so}(2l)$, it is convenient to relabel part of the standard basis of $\mbox{${\mathbb C}$}^{2l}$ as $e_{-j}:=e_{2l+1-j}$ for $j=1, \dots, l$. \subsubsection{Realization of $\mathfrak{so}(2l+1)$} \label{ss:sooddreal} Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$ be of type $B$. The subalgebra of diagonal matrices $\mbox{${\mathfrak h}$}:=\{\mbox{diag}[a_{1},\dots, a_{l}, 0, -a_{l},\dots, -a_{1}],\, a_{i}\in\mbox{${\mathbb C}$}\}$ is a Cartan subalgebra of $\mbox{${\mathfrak g}$}$. We again refer to $\mbox{${\mathfrak h}$}$ as the \emph{standard Cartan subalgebra}. Let $\epsilon_{i}\in\mbox{${\mathfrak h}$}^{*}$ be the linear functional $\epsilon_{i}(\mbox{diag}[a_{1},\dots, a_{l},0, -a_{l},\dots, -a_{1}])=a_{i}$. In this case, the roots are $\Phi(\mbox{${\mathfrak g}$},\mbox{${\mathfrak h}$})=\{\epsilon_{i}-\epsilon_{j},\, \pm(\epsilon_{i}+\epsilon_{j}):\; 1\leq i\neq j\leq l\} \cup \{\pm \epsilon_{k} :\, 1\leq k\leq l\}$. We take as our \emph{standard positive roots} the set $\Phi^{+}(\mbox{${\mathfrak g}$},\mbox{${\mathfrak h}$}):=\{\epsilon_{i}-\epsilon_{j},\, \epsilon_{i}+\epsilon_{j}:\; 1\leq i< j\leq l\}\cup \{ \epsilon_{k} :\, 1\leq k\leq l\}$ with corresponding simple roots $\Pi:=\{\alpha_{1},\dots, \alpha_{l-1}, \alpha_{l}\}$ where $\alpha_{i}=\epsilon_{i}-\epsilon_{i+1}, \, i=1, \dots, l-1, \, \alpha_{l}=\epsilon_{l}$. The Borel subalgebra $\mbox{${\mathfrak b}$}_{+}:=\mbox{${\mathfrak h}$}\oplus\displaystyle\bigoplus_{\alpha\in\Phi^{+}(\mbox{${\mathfrak g}$},\mbox{${\mathfrak h}$})} \mbox{${\mathfrak g}$}_{\alpha}$ is easily seen to be the set of upper triangular matrices in $\mbox{${\mathfrak g}$}$. We relabel part of the standard basis of $\mbox{${\mathbb C}$}^{2l+1}$ by letting $e_{-j}:=e_{2l+2-j}$ for $j=1, \dots, l$ and $e_{0}:=e_{l+1}$. \subsection{Split Rank $1$ symmetric subalgebras}\label{ss:symmetricreal} For later use, recall the realization of $\mathfrak{so}(n-1)$ as a symmetric subalgebra of $\mathfrak{so}(n)$. For $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$, let $t$ be an element of the Cartan subgroup with Lie algebra $\mbox{${\mathfrak h}$}$ with the property that ${\rm Ad}(t)|_{\mbox{${\mathfrak g}$}_{\alpha_i}}=\mbox{${\rm id}$}$ for $i=1, \dots, l-1$ and ${\rm Ad}(t)|_{\mbox{${\mathfrak g}$}_{\alpha_l}}=-\mbox{${\rm id}$}$. Consider the involution $\theta_{2l+1}:={\rm Ad}(t)$. Then $\mbox{${\mathfrak k}$}=\mathfrak{so}(2l)=\mbox{${\mathfrak g}$}^{\theta_{2l+1}}$ (see \cite{Knapp02}, p. 700). Note that $\mbox{${\mathfrak h}$} \subset \mbox{${\mathfrak k}$}$. In the case $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$, $\mbox{${\mathfrak k}$}=\mathfrak{so}(2l-1)=\mbox{${\mathfrak g}$}^{\theta_{2l}}$, where $\theta_{2l}$ is the involution induced by the diagram automorphism interchanging the simple roots $\alpha_{l-1}$ and $\alpha_l$ relative to a fixed choice of simple root vectors (see \cite{Knapp02}, p. 703). Note that in this case, $\theta_{2l}(\epsilon_l)=-\epsilon_l$ and $\theta_{2l}(\epsilon_i)=\epsilon_i$ for $i=1, \dots, l-1$. We will omit the subscripts $2l+1$ and $2l$ from $\theta$ when $\mbox{${\mathfrak g}$}$ is understood. We also denote the corresponding involution of $G=SO(n)$ by $\theta$. The fixed subgroup $G^{\theta}=S(O(n-1)\times O(1))$ is disconnected. We let $K:=(G^{\theta})^{0}$ be the identity component of $G^{\theta}$. Then $K=SO(n-1)$, and $\mbox{Lie}(K)=\mbox{${\mathfrak k}$}=\mbox{${\mathfrak g}$}^{\theta}$. In both cases, $\theta$ preserves the standard Cartan subalgebra $\mbox{${\mathfrak h}$}$, and hence acts on the roots $\Phi(\mbox{${\mathfrak g}$},\mbox{${\mathfrak h}$})$. A root $\alpha$ is called {\it real} if $\theta(\alpha)=-\alpha$, {\it imaginary} if $\theta(\alpha)=\alpha$, and {\it complex } if $\theta(\alpha)\not= \pm \alpha.$ If $\alpha$ is imaginary, then $\alpha$ is called {\it compact} if $\theta|_{\mbox{${\mathfrak g}$}_\alpha}=\mbox{${\rm id}$}$ and {\it noncompact} if $\theta|_{\mbox{${\mathfrak g}$}_\alpha}=-\mbox{${\rm id}$}.$ If $\alpha$ is complex, then $\alpha$ is called \emph{complex} $\theta$-{\it stable} if $\theta(\alpha)$ is positive, and otherwise is called \emph{complex} $\theta$-{\it unstable}. \begin{exam}\label{ex:roottypes} Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$ and $\mbox{${\mathfrak k}$}=\mathfrak{so}(2l)$, and let $\theta={\rm Ad}(t)$ be as above. The roots $\{\pm(\epsilon_{i}-\epsilon_{j}),\, \pm(\epsilon_{i}+\epsilon_{j}), \;1\leq i < j\leq l\}$ are compact imaginary, and the roots $\{ \pm \epsilon_{i}\; i=1,\dots, l\}$ are non-compact imaginary. As noted above $\mbox{${\mathfrak h}$}\subset\mbox{${\mathfrak k}$}$, so that $\mbox{${\mathfrak h}$}$ is a Cartan subalgebra of $\mbox{${\mathfrak k}$}$, and it is easy to see that the set of roots $\{\alpha_{1},\,\alpha_{2},\,\dots,\, \alpha_{l-1},\, \epsilon_{l-1}+\epsilon_{l}\}$ may be identified with the standard set of simple roots $\Pi$ of $\mathfrak{so}(2l)$ given in Section \ref{ss:soevenreal}. Now let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$ and $\mbox{${\mathfrak k}$}=\mathfrak{so}(2l-1)$ and $\theta=\theta_{2l}$ be as above. Then the simple roots $\alpha_{l-1}=\epsilon_{l-1}-\epsilon_{l}$ and $\alpha_{l}=\epsilon_{l-1}+\epsilon_{l}$ are complex $\theta$-stable with $\theta(\alpha_{l-1})=\alpha_{l}$. Note that we can choose $\theta$ to be the involution which acts on the basis of $\mbox{${\mathbb C}$}^{2l}$ as $\theta(e_{l})=e_{-l}$ and $\theta(e_{\pm i})=e_{\pm i}$ for $i\neq l$. Therefore, the roots $\{\pm(\epsilon_{i}+\epsilon_{j}),\,\pm (\epsilon_{i}-\epsilon_{j}),\, 1\leq i<j\leq l-1\}$ are compact imaginary, whereas the roots $\{\pm(\epsilon_{i}+\epsilon_{l}), \pm(\epsilon_{i}-\epsilon_{l}),\, 1\leq i\leq l-1\}$ are complex $\theta$-stable with $\theta(\epsilon_{i}\pm\epsilon_{l})=\epsilon_{i}\mp\epsilon_{l}.$ The $\theta$-stable subspace $\mbox{${\mathfrak g}$}_{\alpha}\oplus\mbox{${\mathfrak g}$}_{\theta(\alpha)}$ decomposes as $\mbox{${\mathfrak g}$}_{\alpha}\oplus\mbox{${\mathfrak g}$}_{\theta(\alpha)}=((\mbox{${\mathfrak g}$}_{\alpha}\oplus\mbox{${\mathfrak g}$}_{\theta(\alpha)})\cap \mbox{${\mathfrak k}$})\oplus((\mbox{${\mathfrak g}$}_{\alpha}\oplus\mbox{${\mathfrak g}$}_{\theta(\alpha)})\cap\mbox{${\mathfrak g}$}^{-\theta}).$ In this case, $\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$}$ can be identified with the standard diagonal Cartan subalgebra of $\mbox{${\mathfrak k}$}$. Under this identification, the set $\{\alpha_{1},\,\dots, \, \alpha_{l-2},\, \frac{1}{2}(\alpha_{l-1}+\theta(\alpha_{l-1}))\}$ is identified with the standard simple roots $\Pi$ of $\mathfrak{so}(2l-1)$ given in Section \ref{ss:sooddreal}. \end{exam} \subsection{Notation}\label{s:thenotation} We lay out some of the notation that we will use throughout the paper. Recall that all Lie algebras and algebraic groups are assumed to be complex \begin{nota}\label{nota:thenotation} \begin{enumerate} \item We let $\mbox{${\mathfrak g}$}= \mathfrak{so}(n)$ unless otherwise specified. We let $\mbox{${\mathfrak k}$}=\mathfrak{so}(n-1)$ be the symmetric subalgebra given in Section \ref{ss:symmetricreal}. We denote the corresponding connected algebraic subgroup by $K$. It will also be convenient at times to denote the Lie algebras $\mathfrak{so}(i)$ by $\mbox{${\mathfrak g}$}_{i}$, and the algebraic group $SO(i)$ by $G_{i}$ for $i=2,\dots, n$. In particular, $\mbox{${\mathfrak g}$}_{n-1} = \mbox{${\mathfrak k}$}$. \item We let $r_{i}$ be the rank of $\mbox{${\mathfrak g}$}_{i}$. \item Let $\langle \langle x, \, y\rangle\rangle =\mbox{Tr}(xy)$, for $x,\, y\in\mbox{${\mathfrak g}$}$ be the (nondegenerate) trace form on $\mbox{${\mathfrak g}$}$. \item In the Cartan decomposition, $\mbox{${\mathfrak g}$}=\mbox{${\mathfrak k}$} + \mbox{${\mathfrak p}$}$ is direct, where $\mbox{${\mathfrak p}$} = \mbox{${\mathfrak g}$}^{-\theta}$. For $x\in\mbox{${\mathfrak g}$}$, we let $x_{\mbox{${\mathfrak k}$}}$ and $x_{\mbox{${\mathfrak p}$}}$ be the $\mbox{${\mathfrak k}$}$ and $\mbox{${\mathfrak p}$}$ components. We recall that $\mbox{${\mathfrak p}$} = \mbox{${\mathfrak k}$}^{\perp}$, where for $U \subset \mbox{${\mathfrak g}$}$, $U^{\perp}$ is the perpindicular subspace relative to the trace form. \item Let $G$ be an algebraic group with Lie algebra $\mbox{${\mathfrak g}$}$. Suppose $\mbox{${\mathfrak c}$}\subset\mbox{${\mathfrak g}$}$ is an algebraic subalgebra, and $S\subset \mbox{${\mathfrak g}$}$ is a subset. We denote by $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak c}$}}(S)$ the centralizer of $S$ in $\mbox{${\mathfrak c}$}$, i.e., $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak c}$}}(S):=\{Y\in\mbox{${\mathfrak c}$}:\, [Y, s]=0 \mbox{ for all } s\in S\}$. If $C\subset G$ is an algebraic subgroup, then we denote the centralizer of $S$ in $C$ by $Z_{C}(S)=\{g\in C:\, gsg^{-1}=s\mbox{ for all } s\in S$\}. Of course $\mbox{Lie}(Z_{C}(S))=\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak c}$}}(S)$ if $C$ is connected with Lie algebra $\mbox{${\mathfrak c}$}$. \item For any complex variety $X$, we denote by $\mbox{${\mathbb C}$}[X]$ its ring of regular functions. If $X$ is a $G$-variety, we let $\mbox{${\mathbb C}$}[X]^G$ be the $G$-invariant regular functions. We call an element $x\in X$ regular (or $G$-regular if $G$ is ambiguous) if $x$ lies in the open dense set consisting of $G$-orbits of maximal dimension, and let $X_{reg}$ be the regular elements. If $G$ is a reductive algebraic group acting on its Lie algebra $\mbox{${\mathfrak g}$}$ via the adjoint action, we let $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]^{G}$ be the ring of adjoint invariant polynomial functions on $\mbox{${\mathfrak g}$}$, and recall that $x\in \mbox{${\mathfrak g}$}$ is regular if and only if $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)$ has dimension equal to the rank of $\mbox{${\mathfrak g}$}$. \item We let $\mathcal{B}=\mathcal{B}_{\mbox{${\mathfrak r}$}}$ denote the flag variety of a Lie algebra $\mbox{${\mathfrak r}$}$, which we identify with the Borel subalgebras of $\mbox{${\mathfrak r}$}$. \end{enumerate} \end{nota} \begin{dfn}\label{dfn:std} We shall call a Borel subalgebra $\mbox{${\mathfrak b}$}\in \mathcal{B}$ \emph{standard} if $\mbox{${\mathfrak h}$}\subset\mbox{${\mathfrak b}$}$, where $\mbox{${\mathfrak h}$}\subset\mbox{${\mathfrak g}$}$ is the standard Cartan subalgebra of diagonal matrices of $\mbox{${\mathfrak g}$}$. \end{dfn} \subsection{Numerical identities}\label{ss:numerical} We record several numerical identities which are used in the remainder of the paper. Let $\mbox{${\mathfrak g}$} = \mathfrak{so}(n)$ and $\mbox{${\mathfrak k}$} = \mathfrak{so}(n-1)$. \begin{equation}\label{eq:sumri} \displaystyle\sum_{i=2}^{n-1} r_{i} = \frac{1}{2}(\dim\mbox{${\mathfrak g}$}-r_{n}). \end{equation} \begin{equation}\label{eq:dimbigflag} \dim(\mathcal{B}_{\mbox{${\mathfrak g}$}}) + \dim(\mathcal{B}_{\mbox{${\mathfrak k}$}})=\dim(\mbox{${\mathfrak g}$})-r_{n}-r_{n-1}. \end{equation} \begin{equation}\label{eq:quotdim} \dim(\mbox{${\mathfrak g}$})-r_{n}-r_{n-1}=\dim \mbox{${\mathfrak k}$}. \end{equation} These assertions are routine and are left to the reader. We note that they are also true for $\mathfrak{gl}(n)$, provided the sum in the first equation goes from $1$ to $n-1$. \subsection{The Gelfand-Zeitlin Integrable Systems}\label{ss:GZsystems} The complex general linear GZ system was first introduced by Kostant and Wallach in \cite{KW1}, and the orthogonal GZ system was introduced by the first author in \cite{Col2}. We briefly recall the construction of the orthogonal GZ systems here, especially since we are using a different realization of the orthogonal Lie algebra than was used in \cite{Col2}. To construct the GZ system, let $\mbox{${\mathfrak g}$}_{i} \cong \mathfrak{so}(i)$ be defined by downward induction, by taking $\mbox{${\mathfrak g}$}_{n}=\mbox{${\mathfrak g}$}$, and letting $\mbox{${\mathfrak g}$}_{i}=\mbox{${\mathfrak g}$}_{i+1}^{\theta_{i+1}}$, where $\theta_{i+1}$ is the involution from Section \ref{ss:symmetricreal}. Thus, we have a chain of Lie subalgebras \begin{equation}\label{eq:GZchain} \mbox{${\mathfrak g}$}_{2}\subset\mbox{${\mathfrak g}$}_{3}\subset\dots\subset\mbox{${\mathfrak g}$}_{i}\subset\dots\subset \mbox{${\mathfrak g}$}_{n}. \end{equation} The Lie algebra $\mbox{${\mathfrak g}$}$ has nondegenerate, invariant, symmetric bilinear form $\langle\langle x, y\rangle\rangle$ given by the trace form from Notation \ref{nota:thenotation} (3). The form is nondegenerate on each $\mbox{${\mathfrak g}$}_{i}$, so we may identify $\mbox{${\mathfrak g}$}_{i}$ with its dual, and regard it as a Poisson variety using the Lie-Poisson structure. For $i=2, \dots, n$, the inclusion $\mbox{${\mathfrak g}$}_{i}\subset\mbox{${\mathfrak g}$}$ then dualizes to give us a map: $\pi_{i}:\mbox{${\mathfrak g}$}\to\mbox{${\mathfrak g}$}_{i}$, which projects an element $x\in\mbox{${\mathfrak g}$}$ to its projection $x_{i}$ in $\mbox{${\mathfrak g}$}_{i}$ off of $\mbox{${\mathfrak g}$}_{i}^{\perp}$. Define functions $\psi_{i,j}$ on $\mbox{${\mathfrak g}$}_{i}$ for $i=2, \dots, n$ as follows. \begin{equation}\label{eq:generators} \begin{split} &\mbox{ If } i \mbox{ is odd, then}\, \psi_{i,j}(y):=\mbox{Tr}(y^{2j}), \, y\in\mbox{${\mathfrak g}$}_{i},\, j=1,\dots, r_{i}.\\ &\mbox{ If } i\mbox{ is even, then}\, \psi_{i,j}(y):=\mbox{Tr}(y^{2j}),\, y\in\mbox{${\mathfrak g}$}_{i},\,\mbox{for } j=1,\dots, r_{i}-1,\mbox{ and } \psi_{i,r_{i}}(y):=\mbox{Pfaff}(y), \\ &\mbox{ where } \mbox{Pfaff}(y) \mbox{ denotes the Pfaffian of } y.\\ \end{split} \end{equation} Then it is well-known that for each $i$, $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}_{i}]^{G_{i}}$ is a polynomial algebra with free generators $\psi_{i,j}, j=1, \dots, r_{i}$, and $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}_{i}]^{G_{i}}$ Poisson commutes with $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}_{i}]$. Since $\mbox{${\mathfrak g}$}_{i}\subset\mbox{${\mathfrak g}$}$ is an inclusion of Lie algberas, the transpose $\pi_{i}:\mbox{${\mathfrak g}$}\to\mbox{${\mathfrak g}$}_{i}$ is easily seen to be a map of Poisson varieties. For $i=2,\dots, n$ and $j=1,\dots, r_{i}$, let $f_{i,j}=\pi_{i}^{*}\psi_{i,j}$. We define the Gelfand-Zeitlin functions: \begin{equation}\label{eq:GZfuns} J_{GZ}=\{f_{i,j}:\; i=2,\dots, n,\, j=1,\dots, r_{i}\}, \end{equation} and let $J(\mbox{${\mathfrak g}$})$ be the subalgebra of $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]$ generated by the functions in $J_{GZ}$. \begin{rem}\label{r:generallinear} The Gelfand-Zeitlin functions $J_{GZ}$ and the associated subalgebra $J(\mbox{${\mathfrak g}$})$ were first considered for the $n\times n$ complex general linear Lie algebra $\mbox{${\mathfrak g}$}=\mathfrak{gl}(n)$ by Kostant and Wallach in \cite{KW1}. In that setting, there is also a chain of subalgebras as in (\ref{eq:GZchain}), where $\mbox{${\mathfrak g}$}_{i}=\mathfrak{gl}(i)\subset\mbox{${\mathfrak g}$}$ is identified with the top lefthand $i\times i$ corner of $\mbox{${\mathfrak g}$}$. See \cite{KW1} or \cite{CEexp} for more details. \end{rem} The following routine proposition may be proved by the same method as for the general linear case in Proposition 2.5 of \cite{CEexp}. \begin{prop}\label{p:Poissoncommute} The algebra $J(\mbox{${\mathfrak g}$})$ is a Poisson commutative subalgebra of $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]$. \end{prop} Our main goals in this paper are to show that the restriction of the functions $J_{GZ}$ to any regular ${\rm Ad}(G)$-orbit in $\mbox{${\mathfrak g}$}$ forms a completely integrable system and to understand the generic leaves of the foliation given by the integrable system. For both of these issues, we need to study the moment map for the system, which we call the (orthogonal) \emph{Kostant-Wallach map} or KW map for short. This is the morphism $\Phi:\mbox{${\mathfrak g}$}\to\mbox{${\mathbb C}$}^{r_{2}}\times\dots\times\mbox{${\mathbb C}$}^{r_{n}}$ given by: \begin{equation}\label{eq:KWmap} \Phi:\mbox{${\mathfrak g}$}\to\mbox{${\mathbb C}$}^{r_{2}}\times\dots\times\mbox{${\mathbb C}$}^{r_{n}};\; \Phi(x):=(f_{2,1}(x), \dots, f_{i,1}(x),\dots, f_{i, r_{i}}(x),\dots, f_{n,1}(x),\dots, f_{n, r_{n}}(x)). \end{equation} \begin{nota}\label{nota:spectrum} For $x\in\mbox{${\mathfrak g}$}$, let $\sigma(x)$ denote the spectrum of $x$. If $\mbox{${\mathfrak g}$}$ is type $B$, then zero occurs as an eigenvalue of $x$ with multiplicity at least one. In this case, we only consider $0\in\sigma(x)$, if it occurs as an eigenvalue of $x$ with multiplicity strictly greater than one. \end{nota} \begin{rem}\label{r:spectrum} We observe that if $y\in\Phi^{-1}(\Phi(x))$, then $\sigma(x_{i})=\sigma(y_{i})$ for all $i=2,\dots, n$. This follows from the well-known fact that the values of $x_{i}$ on the basic adjoint invariants $\psi_{i,1},\dots, \psi_{i,r_{i}}$ in (\ref{eq:generators}) determine the characteristic polynomial of $x_{i}$. \end{rem} Elements of $x\in\mbox{${\mathfrak g}$}$ which lie in a regular level set of $\Phi$ play a very important role in the study of the GZ systems. \begin{dfn-nota}\label{dfnote:sreg} An element $x\in\mbox{${\mathfrak g}$}$ is said to be \emph{strongly regular }if the differentials \begin{equation}\label{eq:GZdiffs} \{df(x): f\in J_{GZ}\}\subset T_{x}^{*}(\mbox{${\mathfrak g}$}) \end{equation} are linearly independent elements of the cotangent space $T_{x}^{*}(\mbox{${\mathfrak g}$})$. We denote the set of strongly regular elements as $\mbox{${\mathfrak g}$}_{sreg}$ and note that $\mbox{${\mathfrak g}$}_{sreg}\subset\mbox{${\mathfrak g}$}$ is Zariski open. For $x\in \mbox{${\mathfrak g}$}$, we set $\Phi^{-1}(\Phi(x))_{sreg}:=\Phi^{-1}(\Phi(x))\cap\mbox{${\mathfrak g}$}_{sreg}.$ \end{dfn-nota} The term strongly regular is suggested by the following classical result of Kostant. Let $\mbox{${\mathfrak g}$}$ be a complex reductive Lie algebra with adjoint action, and let $\phi_1, \dots, \phi_r$ be generators of the polynomial algebra $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]^G$. Then (Theorem 9, \cite{Kostant63}) \begin{equation}\label{eq:regdiffs1} x\in\mbox{${\mathfrak g}$}_{reg} \mbox{ if and only if } d\phi_{1}(x)\wedge\dots\wedge d\phi_{\ell}(x)\neq 0. \end{equation} Hence, by Equation (\ref{eq:GZfuns}), we see that \begin{equation}\label{eq:totreg} \mbox{If } x\in\mbox{${\mathfrak g}$}_{sreg},\mbox{ then }\, x_{i}\in\mbox{${\mathfrak g}$}_{i} \mbox{ is regular for all } i=2,\dots, n. \end{equation} We briefly recall the notion of an integrable system from symplectic geometry. Recall that if $M$ is a complex manifold then the holomorphic functions $\{F_{1},\dots, F_{r}\}$ are said to be independent on $m$ if the open subset $$ U=\{m\in M: \; dF_{1}(m)\wedge\dots\wedge dF_{r}(m)\neq 0\} $$ is dense in $M$. \begin{dfn}\label{dfn:integrable} Let $(M,\omega)$ be a complex symplectic manifold of dimension $2r$. An \emph{integrable system} on $M$ is a collection of $r$ independent, holomorphic functions $\{F_{1},\dots, F_{r}\}$ which Poisson commute with respect to the natural Poisson bracket on the space of holomorphic functions defined by the symplectic form $\omega$. \end{dfn} We recall that for any $x\in\mbox{${\mathfrak g}$}$, the adjoint orbit through $x$, ${\rm Ad}(G)\cdot x$ is a symplectic manifold with Kostant-Kirillov-Souriau symplectic structure. The connection between the complete integrability of the GZ system on regular adjoint orbits and strongly regular elements is given by the following proposition. \begin{prop}\label{prop:sregintegrable} Let $x\in\mbox{${\mathfrak g}$}_{reg}$, and let ${\rm Ad}(G)\cdot x$ be the adjoint orbit of $G$ through $x$. Then the restriction of the GZ functions $J_{GZ}$ in (\ref{eq:GZfuns}) form a completely integrable system on ${\rm Ad}(G)\cdot x$ if and only if \begin{equation}\label{eq:sregintersect} {\rm Ad}(G)\cdot x\cap\mbox{${\mathfrak g}$}_{sreg}\neq\emptyset. \end{equation} \end{prop} \begin{proof} Consider the GZ functions $J_{GZ}$ and let $$ T = \{ f_{i,j} \mbox{ for } i=2,\dots,n -1, j=1,\dots, r_{i}\}, $$ and let $S = \{ f|_{{\rm Ad}(G)\cdot x} : f \in T \}$. Since the functions $f_{n,j}$, $j=1,\dots, r_{n}$, restrict to constant functions on ${\rm Ad}(G)\cdot x$, we do not include them in $T$. Let $x\in\mbox{${\mathfrak g}$}_{reg}$ and let $z\in {\rm Ad}(G)\cdot x\cap \mbox{${\mathfrak g}$}_{sreg}\neq\emptyset.$ Let $\tilde{R}$ be the span of the differentials $\{ df(z) : f\in T \} \subset T_z^*(\mbox{${\mathfrak g}$})$, and let $R$ be the restriction of $\tilde{R}$ to $T_z({\rm Ad}(G)\cdot x)$. If $\dim(R) < |S|$, there is a non-zero linear functional $\lambda \in \tilde{R} \cap T_z({\rm Ad}(G)\cdot x)^{\perp}$. But this contradicts the fact that $z\in\mbox{${\mathfrak g}$}_{sreg}$, since the trace form identifies $T_z({\rm Ad}(G)\cdot z)^{\perp}$ with the span of $df_{n,j}(z), j=1, \dots, r_n$, and hence $\dim(R) = |S|$. The complete integrability of $S$ on ${\rm Ad}(G) \cdot x$ now follows from standard assertions, Proposition \ref{p:Poissoncommute}, and Equation (\ref{eq:sumri}). We leave the converse assertion to the reader. \end{proof} For $\mbox{${\mathfrak g}$}=\mathfrak{gl}(n)$, Kostant and Wallach introduced the GZ integrable system using a chain of subalgebras analogous to the one we used in (\ref{eq:GZchain}) (Remark \ref{r:generallinear}). The definitions of the Kostant-Wallach map and strong regularity are the same. Abusing notation, we will also refer to Kostant-Wallach map for $\mathfrak{gl}(n)$ as $\Phi$. In the general linear case, Kostant and Wallach show that Equation (\ref{eq:sregintersect}) is satisfied for every $x\in \mathfrak{gl}(n)_{reg}$ (see Theorem 3.36 of \cite{KW1}). Their proof makes use of the fact that in this case $\Phi$ possesses a natural cross-section given by the so-called upper Hessenberg matrices. These are matrices of the form: \begin{equation}\label{eq:Hessenberg} Hess:=\left [\begin{array}{ccccc} a_{11} & a_{12} &\cdots & a_{1n-1} & a_{1n}\\ 1 & a_{22} &\cdots & a_{2n-1} & a_{2n}\\ 0 & 1 & \cdots & a_{3n-1}& a_{3n}\\ \vdots &\vdots &\ddots &\vdots &\vdots\\ 0 & 0 &\cdots & 1 &a_{nn}\end{array}\right ]_{,} \end{equation} with $a_{ij}\in\mbox{${\mathbb C}$}$. In Theorem 2.3 of \cite{KW1}, the authors prove that the restriction of $\Phi$ to $Hess$ is an isomorphism of varieties from which it follows that \begin{equation}\label{eq:sregfibre} \Phi^{-1}(\Phi(x))_{sreg}\neq\emptyset\mbox{ for any } x\in\mathfrak{gl}(n), \end{equation} and (\ref{eq:sregintersect}) follows easily. It is not clear in the orthogonal case whether $\Phi$ is even surjective nor that every non-empty fibre contains strongly regular elements. \section{The Partial Kostant-Wallach Map and Surjectivity of $\Phi$}\label{s:surjectivity} Rather than considering all of the Lie algebras in the chain in (\ref{eq:GZchain}) simultaneously and working directly with the KW map, it is easier to consider one step in the chain at a time: $\mbox{${\mathfrak g}$}_{n-1}\subset\mbox{${\mathfrak g}$}$. Accordingly, we define the \emph{partial Kostant-Wallach map} to be \begin{equation}\label{eq:partial} \begin{array}{c} \Phi_{n}:\mbox{${\mathfrak g}$}\to \mbox{${\mathbb C}$}^{r_{n-1}}\oplus \mbox{${\mathbb C}$}^{r_{n}}, \\ \\ \; \Phi_n(x)=(f_{n-1, 1}(x),\dots, f_{n-1, r_{n-1}}(x), f_{n,1}(x),\dots, f_{n, r_{n}}(x)). \end{array} \end{equation} The map $\Phi_{n}$ has the advantage that it is a geometric invariant theory quotient (GIT quotient) as well as having other remarkable properties. To see these properties of $\Phi_{n}$, we will need the theory of spherical pairs. \subsection{Spherical pairs and their coisotropy representations}\label{ss:sphercoisotropy} In this section, we consider pairs $(M, H)$ where $M$ is a reductive algebraic group and $H\subset M$ is an algebraic subgroup. Let $\mbox{${\mathfrak m}$}$ and $\mbox{${\mathfrak h}$}$ be the Lie algebras of $M$ and $H$ respectively. \begin{dfn}\label{dfn:spherical} (1) The pair $(M, H)$ is called spherical if $H$ acts on the flag variety $\mathcal{B} = \mathcal{B}_{\mbox{${\mathfrak m}$}}$ with finitely many orbits. \noindent (2) The pair $(M,H)$ is called reductive if $H\subset M$ is a reductive algebraic subgroup. \end{dfn} \begin{dfn}\label{dfn:multfree} For a reductive pair $(M,H)$ we say the branching law from $M$ to $H$ is multiplicity free if for all irreducible rational representations $V$ and $U$ of $M$ and $H$ respectively, $\dim(\mbox{${\rm Hom}$}_H(U,V)) \le 1$. \end{dfn} For a pair $(M_{1}, R)$, we define a new pair $(M, H)$ by taking $M={\tilde{M}}_1 := M_1 \times R$ and taking $H = R_{\Delta} = \{ (g, g): g\in R\} \subset {\tilde{M}}_1$. Let ${\tilde{\mbox{${\mathfrak m}$}}}_1 = \mbox{${\mathfrak m}$}_1 \oplus \mbox{${\mathfrak r}$}$ and $\mbox{${\mathfrak r}$}_{\Delta}$ be the corresponding Lie algebras. The following result is well-known. \begin{prop}\label{prop:isspherical} \begin{enumerate} \item Let $(M_1, R)$ be a reductive pair. The pair $(\tilde{M_1}, R_{\Delta})$ is spherical if and only if the branching rule from $M_1$ to $R$ is multiplicity free. \item For the pair $(M_1,R)=(SO(n), SO(n-1))$, the pair $(\tilde{M_{1}}, R_{\Delta})=(SO(n)\times SO(n-1), SO(n-1)_{\Delta})$ is spherical. \end{enumerate} \end{prop} \begin{proof} The first statement follows by Theorem B of \cite{brundanspher}, together with the easy observaton that a Borel subgroup $B_R$ of $R$ has finitely many orbits on the flag variety $\mathcal{B}_{\mbox{${\mathfrak m}$}_{1}}$ of $\mbox{${\mathfrak m}$}_{1}$ if and only if $R_{\Delta}$ has finitely many orbits on $\mathcal{B}_{\mbox{${\mathfrak m}$}_{1}} \times \mathcal{B}_{\mbox{${\mathfrak r}$}}$. The second statement follows from the first statement and well-known branching laws (see \cite{Johnson}). \end{proof} For a reductive spherical pair $(M, H)$, let $\langle\langle\cdot, \cdot\rangle\rangle$ be a non-degenerate symmetric $M$-invariant bilinear form on $\mbox{${\mathfrak m}$}$, and let $\mbox{${\mathfrak h}$}^{\perp}$ be the annihilator of $\mbox{${\mathfrak h}$}$ with respect to $\langle\langle\cdot, \cdot\rangle\rangle$. Then the adjoint action of $M$ on $\mbox{${\mathfrak m}$}$ restricts to an action of $H$ on $\mbox{${\mathfrak h}$}^{\perp}$, which is referred to in the literature as the coisotropy representation of $H$ (see \cite{Pancoiso}). Then it is well-known that $\mbox{${\mathbb C}$}[\mbox{${\mathfrak h}$}^{\perp}]^{H}$ is a polynomial algebra (Kor 7.2 of \cite{Kn} or Corollary 5 of \cite{Pancoiso}). \subsection{Surjectivity of $\Phi_n$ and $\Phi$}\label{ss:partialtotalsurj} We now return to our convention with $G=SO(n)$ and $K=SO(n-1)$, and similarly with Lie algebras. We consider the bilinear form on $\tilde{\mbox{${\mathfrak g}$}} = \mbox{${\mathfrak g}$} + \mbox{${\mathfrak k}$}$ given by taking the trace form on each factor, and note that by an easy calculation, \begin{equation}\label{e:productperp} \mbox{${\mathfrak k}$}_{\Delta}^{\perp}=\{(x, -x_{\mbox{${\mathfrak k}$}}): x\in\mbox{${\mathfrak g}$}, \, x_{\mbox{${\mathfrak k}$}}\in \mbox{${\mathfrak k}$}\} \cong \mbox{${\mathfrak g}$} \end{equation} as a $K \cong K_{\Delta}$-representation. \begin{prop}\label{prop:flat} \begin{enumerate} \item $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]^K=\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]^G \otimes \mbox{${\mathbb C}$}[\mbox{${\mathfrak k}$}]^K$. \item $\Phi_n$ coincides with the invariant theory quotient morphism $\mbox{${\mathfrak g}$} \to \mbox{${\mathfrak g}$}//K.$ In particular, $\Phi_n$ is surjective. \item The morphism $\Phi_{n}$ is flat. In particular, its fibres are equidimensional varieties of dimension $\dim \mbox{${\mathfrak g}$}- r_{n}-r_{n-1}$. \end{enumerate} \end{prop} \begin{proof} Recall the well-known fact that the fixed point algebra $U(\mbox{${\mathfrak g}$})^K$ of $K$ in the enveloping algebra $U(\mbox{${\mathfrak g}$})$ is commutative \cite{Johnson}. Hence, $U(\mbox{${\mathfrak g}$})^K$ coincides with its centre, $Z(U(\mbox{${\mathfrak g}$})^K)$. In Theorem 10.1 of \cite{Knhc}, Knop shows that $Z(U(\mbox{${\mathfrak g}$})^K) \cong U(\mbox{${\mathfrak g}$})^G \otimes_{\mbox{${\mathbb C}$}} U(\mbox{${\mathfrak g}$})^K$. The first assertion now follows by taking the associated graded algebra with respect to the usual filtration of $U(\mbox{${\mathfrak g}$})$. By the first assertion, $\Phi_n$ coincides with the invariant theory quotient $\mbox{${\mathfrak g}$} \to \mbox{${\mathfrak g}$}//K$, which gives the second assertion. By Equation (\ref{e:productperp}), we identify $\mbox{${\mathfrak k}$}_{\Delta}^{\perp} \cong \mbox{${\mathfrak g}$}$ $K$-equivariantly. Then the flatness of $\Phi_n$ follows by Korollar 7.2 of \cite{Kn}, which gives a criterion for flatness of invariant theory quotients in the setting of spherical homogeneous spaces (see also \cite{Pancoiso}). \end{proof} \begin{nota}\label{nota:partialnil} For ease of notation, we denote the nilfibre $\Phi_{n}^{-1}(0,0),\, (0,0)\in\mbox{${\mathbb C}$}^{r_{n-1}}\times\mbox{${\mathbb C}$}^{r_{n}}$ of $\Phi_{n}$ by $\Phi_{n}^{-1}(0)$. \end{nota} Using the flatness of the partial KW map $\Phi_{n}$, we can now show that the orthogonal KW map $\Phi$ is surjective. \begin{thm}\label{thm:surj} Let $\Phi:\mbox{${\mathfrak g}$}\to \mbox{${\mathbb C}$}^{r_{2}}\times\dots\times \mbox{${\mathbb C}$}^{r_{n}}$ be the the Kostant-Wallach map. The morphism $\Phi$ is surjective and every fibre of $\Phi$ contains a regular element of $\mbox{${\mathfrak g}$}$. \end{thm} To prove Theorem \ref{thm:surj}, we need some preparation. Consider the nonempty Zariski open set: \begin{equation}\label{eq:bothopenU} U_{r,\mbox{${\mathfrak k}$}}:=\{x\in \mbox{${\mathfrak g}$}_{reg}:\, x_{\mbox{${\mathfrak k}$}} \in\mbox{${\mathfrak k}$}_{reg}\}. \end{equation} \begin{lem}\label{l:bothreg} Let $\Phi_{n}:\mbox{${\mathfrak g}$}\to \mbox{${\mathbb C}$}^{r_{n-1}}\times \mbox{${\mathbb C}$}^{r_{n}}$ be the \emph{partial} KW map. The restriction $\Phi_{n}|_{U_{r,\mbox{${\mathfrak k}$}}}: U_{r,\mbox{${\mathfrak k}$}}\to \mbox{${\mathbb C}$}^{r_{n-1}}\times\mbox{${\mathbb C}$}^{r_{n}}$ is surjective. \end{lem} \begin{proof} Since $\Phi_{n}$ is a flat morphism, it is an open morphism by Exercise III.9.1 of \cite{Ha}. Thus, $\Phi_{n}(U_{r,\mbox{${\mathfrak k}$}})\subseteq \mbox{${\mathbb C}$}^{r_{n-1}}\times \mbox{${\mathbb C}$}^{r_{n}}$ is Zariski open. We suppose that $\Phi_{n}(U_{r,\mbox{${\mathfrak k}$}})\neq \mbox{${\mathbb C}$}^{r_{n-1}}\times \mbox{${\mathbb C}$}^{r_{n}}.$ Then $\mathcal{C}:=\mbox{${\mathbb C}$}^{r_{n-1}}\times\mbox{${\mathbb C}$}^{r_{n}}\setminus \Phi_{n}(U_{r,\mbox{${\mathfrak k}$}})$ is a non-empty, closed subset of $\mbox{${\mathbb C}$}^{r_{n-1}}\times \mbox{${\mathbb C}$}^{r_{n}}$. Since $\Phi_{n}$ is surjective, it follows that $\Phi_{n}^{-1}(\mathcal{C})$ is a non-empty, closed subset of $\mbox{${\mathfrak g}$}$. Now it follows from definitions that \begin{equation}\label{eq:Cdfn} x\in\Phi_{n}^{-1}(\mathcal{C})\mbox{ if and only if } \Phi_{n}^{-1}(\Phi_{n}(x))\cap U_{r,\mbox{${\mathfrak k}$}}=\emptyset. \end{equation} Since the functions defining $\Phi_{n}$ are homogeneous (Equation (\ref{eq:partial})), scalar multiplication by $\lambda \in \mbox{${\mathbb C}$}^{\times}$ induces an isomorphism: $\Phi_{n}^{-1}(\Phi_{n}(x))\to \Phi_{n}^{-1}(\Phi_{n}(\lambda x))$. Note that $U_{r,\mbox{${\mathfrak k}$}}$ is also preserved by scalar multiplication by elements of $\mbox{${\mathbb C}$}^{\times}$. Thus, (\ref{eq:Cdfn}) implies that $\Phi_{n}^{-1}(\mathcal{C})$ is preserved by scalar multiplication by elements of $\mbox{${\mathbb C}$}^{\times}$. Since $\Phi_{n}^{-1}(\mathcal{C})$ is closed, it follows that $0\in \Phi_{n}^{-1}(\mathcal{C})$, whence \begin{equation}\label{eq:empty} \Phi_{n}^{-1}(0)\cap U_{r,\mbox{${\mathfrak k}$}}=\emptyset. \end{equation} But we claim that $\Phi_{n}^{-1}(0)\cap U_{r,\mbox{${\mathfrak k}$}}\neq \emptyset$, contradicting the initial assumption that $\Phi_{n}(U_{r,\mbox{${\mathfrak k}$}})\neq \mbox{${\mathbb C}$}^{r_{n-1}}\times\mbox{${\mathbb C}$}^{r_{n}}$. For this, let $\mbox{${\mathfrak b}$}_{+}\subset \mbox{${\mathfrak g}$}$ be the Borel subalgebra of upper triangular matrices in $\mbox{${\mathfrak g}$}$, and let $\mbox{${\mathfrak n}$}_{+}=[\mbox{${\mathfrak b}$}_{+},\mbox{${\mathfrak b}$}_{+}]$. We consider the cases where $\mbox{${\mathfrak g}$}$ is type $B$ and $D$ separately. If $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$ is type $B$, we let $e:=e_{\alpha_{1}}+\dots +e_{\alpha_{l}}+e_{\epsilon_{l-1}+\epsilon_{l}}$, where $e_{\alpha_{i}}\in \mbox{${\mathfrak g}$}_{\alpha_{i}}, \, i=1,\dots, l$ and $e_{\epsilon_{l-1}+\epsilon_{l}}\in\mbox{${\mathfrak g}$}_{\epsilon_{l-1}+\epsilon_{l}}$ are nonzero root vectors. Then by Kostant's criterion for an element to be regular nilpotent (Theorem 5.3 of \cite{Kostanttds}), $e\in\mbox{${\mathfrak n}$}_{+}$ is regular nilpotent and $\pi_{\mbox{${\mathfrak k}$}}(e)=e_{\alpha_{1}}+\dots+e_{\alpha_{l-1}}+e_{\epsilon_{l-1}+\epsilon_{l}}$ by Example \ref{ex:roottypes}. By Kostant's criterion, the element $\pi_{\mbox{${\mathfrak k}$}}(e)$ is a regular nilpotent element of $\mbox{${\mathfrak k}$}$. Thus, $e\in\Phi_{n}^{-1}(0)\cap U_{r,\mbox{${\mathfrak k}$}}$. Now let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$ be type $D$. Let $e=e_{\alpha_{1}}+\dots +e_{\alpha_{l-2}}+ \frac{1}{2}(e_{\alpha_{l-1}}+\theta(e_{\alpha_{l-1}}))$. By Example \ref{ex:roottypes}, we have $\theta(\alpha_{l-1})=\alpha_{l}$, so $e$ is regular nilpotent by Kostant's criterion. Example \ref{ex:roottypes} also implies that $e\in\mbox{${\mathfrak k}$}$, and that in terms of the simple roots for $\mbox{${\mathfrak k}$}=\mathfrak{so}(2l-1)$, we have $e=e_{\alpha_{1}}+\dots +e_{\alpha_{l-2}}+e_{\alpha_{l-1}}$. Therefore, again by Kostant's criterion, $e$ is also regular nilpotent when viewed as an element of $\mbox{${\mathfrak k}$}$. Thus, $e\in \Phi_{n}^{-1}(0)\cap U_{r,\mbox{${\mathfrak k}$}}$. We conclude that $\Phi_{n}^{-1}(0)\cap U_{r,\mbox{${\mathfrak k}$}}\neq \emptyset$, contradicting (\ref{eq:empty}) and the initial assumption that $\Phi_{n}|_{U_{r,\mbox{${\mathfrak k}$}}}$ is not surjective. \end{proof} \begin{proof}[Proof of Theorem \ref{thm:surj}] The proof proceeds by induction on $n$. The case $n=3$, follows from the fact that $\mathfrak{so}(3)\cong\mbox{${\fs\fl}$}(2)$, and the theorem is known to hold for $\mbox{${\fs\fl}$}(2)$. We now assume that the result is true for $\mbox{${\mathfrak k}$}$. Let $(c_{2},\dots, c_{n-1}, c_{n})\in \mbox{${\mathbb C}$}^{r_{2}}\times \dots \times \mbox{${\mathbb C}$}^{r_{n-1}}\times \mbox{${\mathbb C}$}^{r_{n}}$ be arbitrary. Consider $\Phi^{-1}(c_{2},\dots, c_{n-1}, c_{n})$. Let $\Phi_{\mbox{${\mathfrak k}$}}: \mbox{${\mathfrak k}$}\to \mbox{${\mathbb C}$}^{r_{2}}\times \dots\times \mbox{${\mathbb C}$}^{r_{n-1}}$ be the KW map for $\mbox{${\mathfrak k}$}$. By the inductive hypothesis, there exists an element $y\in \Phi_{\mbox{${\mathfrak k}$}}^{-1}(c_{2},\dots, c_{n-1})$ with $y\in\mbox{${\mathfrak k}$}_{reg}$. By Lemma \ref{l:bothreg}, there exists $x\in\Phi_{n}^{-1}(c_{n-1},c_{n})$ with $x\in\mbox{${\mathfrak g}$}_{reg}$ and $x_{\mbox{${\mathfrak k}$}}\in\mbox{${\mathfrak k}$}_{reg}$. It follows that $x_{\mbox{${\mathfrak k}$}},\, y\in \chi_{\mbox{${\mathfrak k}$}}^{-1}(c_{n-1})\cap\mbox{${\mathfrak k}$}_{reg}$, where $\chi_{\mbox{${\mathfrak k}$}}:\mbox{${\mathfrak k}$}\to \mbox{${\mathfrak k}$}//K$ is the adjoint quotient, so that $y={\rm Ad}(k)\cdot x_{\mbox{${\mathfrak k}$}}$ for some $k\in K$ by Theorem 3 of \cite{Kostant63}. Let $z:={\rm Ad}(k)\cdot x$. Then $z\in\Phi_{n}^{-1}(c_{n-1},c_{n})$ is regular, and $z_{\mbox{${\mathfrak k}$}}={\rm Ad}(k)\cdot x_{\mbox{${\mathfrak k}$}}=y$. It follows from definitions that $z\in \Phi^{-1}(c_{2},\dots, c_{n-1}, c_{n})$. This completes the proof of the theorem. \end{proof} \section{Spherical Pairs and strongly regular elements}\label{s:spherical} In this section, we use the geometry of spherical varieties to study the set of strongly regular elements of $\mbox{${\mathfrak g}$}_{sreg}$ of $\mbox{${\mathfrak g}$}$ introduced in Definition-Notation \ref{dfnote:sreg}. We simplify the criterion of Kostant and Wallach for an element $x\in \mbox{${\mathfrak g}$}$ to be strongly regular and use our new characterization of strongly regular elements to construct a new set of strongly regular elements $\mbox{${\mathfrak g}$}_{\Theta}$ for $\mbox{${\mathfrak g}$}$. As a consequence, we obtain the complete integrability of the GZ system on regular adjoint orbits on $\mbox{${\mathfrak g}$}$ and determine the structure of the KW fibres $\Phi^{-1}(\Phi(x))$ for $x\in\mbox{${\mathfrak g}$}_{\Theta}$. We show that each such fibre has a free action of an abelian algebraic group thereby obtaining ``angle coordinates" for the GZ system on these fibres. \subsection{Further results on the coisotropy representation of a spherical pair}\label{ss:morecoisotropy} Recall the reductive spherical pair $(M,H)$ from Definition \ref{dfn:spherical}. We consider reductive spherical pairs satisfying: \begin{equation}\label{eq:numerology} \dim\mathcal{B}=\dim \mbox{${\mathfrak h}$}^{\perp}-\dim \mbox{${\mathfrak h}$}^{\perp}// H. \end{equation} \begin{rem}\label{r:appendix} If we let $G=GL(n)$, and $K=GL(n-1)$, where $K$ is embedded in $G$ in the top lefthand corner (Remark \ref{r:generallinear}), then the pair $(\tilde{G}, K_{\Delta})$ is spherical by Part (1) of Proposition \ref{prop:isspherical}. Further, this pair satisfies Equation (\ref{eq:numerology}). In Theorem 2.3, \cite{CEeigen} we gave a different proof of Knop's flatness result (Korollar 7.2, \cite{Kn}) for the spherical pair $(GL(n)\times GL(n-1), GL(n-1)_{\Delta})$ using a variant of the Steinberg variety along with a dimension estimate obtained from (\ref{eq:numerology}). Our proof can be generalized to any reductive spherical pair $(M,H)$ satisfying Equation (\ref{eq:numerology}). See the appendix of \cite{CEspherical} for details. \end{rem} We now analyze further the meaning of the condition in Equation (\ref{eq:numerology}) for the coisotropy representation. We study the set of $H$-regular elements $\mbox{${\mathfrak h}$}_{reg}^{\perp}$ in $\mbox{${\mathfrak h}$}^{\perp}$ consisting of $H$-orbits of maximal dimension, and recall the regular set $\mbox{${\mathfrak m}$}_{reg}$ of $\mbox{${\mathfrak m}$}$ (Notation \ref{nota:thenotation} (6)). \begin{thm}\label{thm:regelts} Let $(M, H)$ be a reductive spherical pair. Then the following conditions are equivalent. \begin{enumerate} \item Equation (\ref{eq:numerology}) holds. \item We have $\mbox{${\mathfrak h}$}^{\perp}_{reg}\subset \mbox{${\mathfrak m}$}_{reg}$. \end{enumerate} \end{thm} \begin{proof} By Theorems 3 and 6 and Equation (15) of \cite{Pancoiso}, there is an open dense set $U$ of $\mbox{${\mathfrak h}$}^{\perp}_{reg}$ such that for $y\in U$, \begin{equation}\label{eq:general1} \mbox{codim}_{\mbox{${\mathfrak h}$}^{\perp}} ({\rm Ad}(H)\cdot y)=\dim (\mbox{${\mathfrak h}$}^{\perp}//H), \end{equation} and \begin{equation}\label{eq:general2} \dim({\rm Ad}(M)\cdot y)=2\dim({\rm Ad}(H)\cdot y). \end{equation} We consider $x\in\mbox{${\mathfrak h}$}_{reg}^{\perp}$. By (\ref{eq:general1}), we have $\mbox{codim}_{\mbox{${\mathfrak h}$}^{\perp}} ({\rm Ad}(H)\cdot x)=\dim (\mbox{${\mathfrak h}$}^{\perp}//H)$. Assuming (1), we see that \begin{equation}\label{eq:firstdimension} \dim ({\rm Ad}(H)\cdot x)=\dim \mathcal{B}. \end{equation} By Proposition (1) of \cite{Pancoiso}, $2\dim({\rm Ad}(H)\cdot x) \le \dim({\rm Ad}(M)\cdot x)$ so that $\dim({\rm Ad}(M)\cdot x) \ge 2 \dim(\mathcal{B})$, and thus $x \in \mbox{${\mathfrak m}$}_{reg}$, which proves one direction of the assertion. Conversely, for any element $x$ in the open set $U\subset \mbox{${\mathfrak h}$}_{reg}^{\perp}$, then $x\in\mbox{${\mathfrak m}$}_{reg}$ by assumption. Hence by (\ref{eq:general2}), $\dim({\rm Ad}(H)\cdot x)=\frac{1}{2}\dim({\rm Ad}(M)\cdot x)=\dim(\mathcal{B})$. The assertion of (1) now follows from Equation (\ref{eq:general1}). \end{proof} \begin{rem}\label{r:symmnumerical} If $\theta$ is an involution of $\mbox{${\mathfrak m}$}$ with fixed subalgebra $\mbox{${\mathfrak h}$}=\mbox{${\mathfrak m}$}^{\theta}$, the involution is called quasi-split if $\mbox{${\mathfrak m}$}$ has a Borel subalgebra $\mbox{${\mathfrak b}$}$ such that $\mbox{${\mathfrak b}$} \cap \theta(\mbox{${\mathfrak b}$})$ is a Cartan subalgebra of $\mbox{${\mathfrak m}$}$. In Proposition 4.4 of \cite{CEspherical}, we show that for $M$ and $H$ the corresponding connected groups, $(M,H)$ satisfies Equation (\ref{eq:numerology}) if and only if $\theta$ is quasi-split. \end{rem} \subsection{A new criterion for strong regularity} We now apply Theorem \ref{thm:regelts} to study the $K$-action on $\mbox{${\mathfrak g}$}$ in the case where $(K, \mbox{${\mathfrak g}$})=(SO(n-1), \mathfrak{so}(n))$ and prove an analogue of Kostant's Theorem (\ref{eq:regdiffs1}) for the action of $K$ on $\mbox{${\mathfrak g}$}$ by restricting the adjoint action of $G$ to $K$ (Theorem \ref{thm:Kostant}). For this, we consider the reductive spherical pair $(\tilde{G}, K_{\Delta})$ with $\tilde{G}=G\times K$. Recall that we identify $\mbox{${\mathfrak k}$}_{\Delta}^{\perp}\cong\mbox{${\mathfrak g}$}$ as a $K_{\Delta}\cong K$-module (Equation (\ref{e:productperp})). \begin{lem} \label{lem:dimest} Consider the reductive spherical pair $(\tilde{G}, K_{\Delta})$. \begin{enumerate} \item Equation (\ref{eq:numerology}) holds. \item $(\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}\cong\{x\in\mbox{${\mathfrak g}$}:\, \dim({\rm Ad}(K)\cdot x)=\dim K\}. $ \item \begin{equation}\label{eq:Kreg} (\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}\cong\{x\in\mbox{${\mathfrak g}$}: \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)=0\}. \end{equation} \end{enumerate} \end{lem} \begin{proof} Equation (\ref{eq:numerology}) is equivalent to the identity \begin{equation}\label{eq:flagvarieties} \dim(\mathcal{B}_{\mbox{${\mathfrak g}$}}) + \dim(\mathcal{B}_{\mbox{${\mathfrak k}$}})=\dim(\mbox{${\mathfrak g}$})-r_{n}-r_{n-1} =\dim(\mbox{${\mathfrak g}$})-\dim(\mbox{${\mathfrak g}$}//K), \end{equation} which follows by Equation (\ref{eq:dimbigflag}) and Proposition \ref{prop:flat} (2). To prove the second assertion, let $x\in (\mbox{${\mathfrak k}$}_{\Delta})^{\perp}_{reg}$. By (1), we can apply Equation (\ref{eq:firstdimension}) to conclude that $\dim ({\rm Ad}(K)\cdot x)=\dim (\mathcal{B}_{\mbox{${\mathfrak g}$}})+\dim (\mathcal{B}_{\mbox{${\mathfrak k}$}}).$ The assertion now follows from (\ref{eq:flagvarieties}) and Equation (\ref{eq:quotdim}). The second assertion implies that $x\in (\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}$ if and only if $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)=0$. The third assertion follows since $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)=\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)$. \end{proof} We now describe the regular elements of the coisotropy representation of the reductive spherical pair $(\tilde{G}, K_{\Delta})$, which establishes an analogue of Kostant's theorem. Recall that an element $x\in\mbox{${\mathfrak g}$}_{reg}$ if $\dim\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)=\mbox{rank}(\mbox{${\mathfrak g}$})$. If we identify $T_{x}^{*}(\mbox{${\mathfrak g}$})$ with $\mbox{${\mathfrak g}$}$ using the non-degenerate form on $\mbox{${\mathfrak g}$}$, then Kostant's basic result in (\ref{eq:regdiffs1}) implies that \begin{equation}\label{eq:centralizer} \mbox{span}\{ df_{n,i}(x):\, i=1,\,\dots, r_{n}\}=\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x), \end{equation} Recall also that $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]^{K}=\mbox{${\mathbb C}$}[f_{n-1,1},\dots, f_{n-1, r_{n-1}}, f_{n,1},\dots, f_{n,r_{n}}]$ (see Proposition \ref{prop:flat}). Let $$ \omega_{\mbox{${\mathfrak g}$}//K}:=df_{n-1,1} \wedge \dots \wedge df_{n-1, r_{n-1}} \wedge df_{n, 1} \wedge \dots \wedge df_{n, r_n} \in \Omega^{r_{n-1} + r_n}(\mbox{${\mathfrak g}$}). $$ \begin{thm}\label{thm:Kostant} $x\in(\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}\mbox{ if and only if } \omega_{\mbox{${\mathfrak g}$}//K}(x)\neq 0,$ and if so, then $x\in\mbox{${\mathfrak g}$}_{reg}$ and $x_{\mbox{${\mathfrak k}$}}\in\mbox{${\mathfrak k}$}_{reg}$. \end{thm} \begin{proof} We first suppose that $\omega_{\mbox{${\mathfrak g}$}//K}(x)\neq 0$. By Equation (\ref{eq:regdiffs1}), it follows that $x\in\mbox{${\mathfrak g}$}_{reg}$ and $x_{\mbox{${\mathfrak k}$}}\in\mbox{${\mathfrak k}$}_{reg}$. Equation (\ref{eq:centralizer}) then implies that $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)=0$, so $x\in (\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}$ by Equation (\ref{eq:Kreg}). Conversely, suppose $x\in(\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}$. Then by Theorem \ref{thm:regelts}, Equation (\ref{e:productperp}), and part (1) of Lemma \ref{lem:dimest}, $(x, -x_{\mbox{${\mathfrak k}$}})\in\tilde{\mbox{${\mathfrak g}$}}_{reg}$. Thus, both $x\in\mbox{${\mathfrak g}$}_{reg}$ and $x_{\mbox{${\mathfrak k}$}}\in\mbox{${\mathfrak k}$}_{reg}$. Hence by Equation (\ref{eq:regdiffs1}), \begin{equation}\label{eq:twoindep} df_{n-1, 1}(x_{\mbox{${\mathfrak k}$}})\wedge\dots\wedge df_{n-1, r_{n-1}}(x_{\mbox{${\mathfrak k}$}})\neq 0\mbox{ and } df_{n,1}(x)\wedge\dots\wedge df_{n, r_{n}}(x)\neq 0. \end{equation} Since $x\in(\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}$, $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)=0$ by Equation (\ref{eq:Kreg}). It now follows from (\ref{eq:twoindep}) and (\ref{eq:centralizer}) that $\omega_{\mbox{${\mathfrak g}$}//K}(x)\neq 0$. \end{proof} Theorem \ref{thm:Kostant} can be obtained as a special case of a more general result proven by Knop, \cite{Knopsmooth}. We include our proof here because of its simplicity. Theorem \ref{thm:Kostant} has an immediate corollary which is of interest in linear algebra. \begin{cor}\label{c:linearalgebra} Let $x\in\mbox{${\mathfrak g}$}$ and suppose that $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)=0$. Then $x\in\mbox{${\mathfrak g}$}_{reg}$ and $x_{\mbox{${\mathfrak k}$}}\in\mbox{${\mathfrak k}$}_{reg}$. \end{cor} \begin{proof} This follows by Equation (\ref{eq:Kreg}) and Theorem \ref{thm:Kostant}. \end{proof} We observed in the proof of Lemma \ref{lem:dimest} that for $x\in\mbox{${\mathfrak g}$}$, $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)=\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}}) \cap \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x)$. Elements of $(\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}$ can be used to inductively construct strongly regular elements of $\mbox{${\mathfrak g}$}$, so we give them a special name. \begin{dfn}\label{dfn:nsreg} An element $x\in\mbox{${\mathfrak g}$}$ such that $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)=0$ is said to be $n$-strongly regular. We denote the set of $n$-strongly regular elements by $\mbox{${\mathfrak g}$}_{nsreg}$. \end{dfn} We can use Corollary \ref{c:linearalgebra} to simplify the characterization of strongly regular elements originally given by Kostant and Wallach for the general linear case in Theorem 2.14 of \cite{KW1} and generalized by the first author to the orthogonal case in Proposition 2.11 of \cite{Col2}. \begin{prop}\label{prop:fullsreg} An element $x\in\mbox{${\mathfrak g}$}$ is strongly regular if and only if $$ \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i}}(x_{i})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i+1}}(x_{i+1})=0 \mbox { for } i=2,\dots, n-1. $$ \end{prop} \begin{proof} By Proposition 2.11 of \cite{Col2}, an element $x\in\mbox{${\mathfrak g}$}$ is strongly regular if and only if the following two conditions hold: \begin{equation*} \begin{split} &(1)\; x_{i}\in\mbox{${\mathfrak g}$}_{i} \mbox{ are regular for all } i=2,\dots, n. \\ &(2)\; \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i}}(x_{i})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i+1}}(x_{i+1})=0 \mbox { for } i=2,\dots, n-1. \end{split} \end{equation*} It follows from Corollary \ref{c:linearalgebra} that if $x_{i+1}\in\mbox{${\mathfrak g}$}_{i+1}$ satisfies $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i}}(x_{i})\cap \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i+1}}(x_{i+1})=0$, then $x_{i+1}\in\mbox{${\mathfrak g}$}_{i+1}$ is regular. \end{proof} \begin{rem}\label{r:generallin2} We note that arguments given above also apply to the general linear case. Indeed, we observed in Remark \ref{r:appendix} that if we let $G=GL(n)$, $K=GL(n-1)$, then the pair $(\tilde{G}, K_{\Delta})$ is spherical and satisfies Equation (\ref{eq:numerology}). Further, Lemma \ref{lem:dimest} also holds for this spherical pair, and we obtain Theorem \ref{thm:Kostant} by the same proof. Corollary \ref{c:linearalgebra} follows, and we obtain a simplification of Kostant and Wallach's characterization of strongly regular elements in Theorem 2.14 of \cite{KW1}. In \cite{CEeigen}, we defined the set of $n$-strongly regular elements for $\mbox{${\mathfrak g}$}=\mathfrak{gl}(n)$ to be the set of elements $x\in\mbox{${\mathfrak g}$}$ for which $\omega_{\mbox{${\mathfrak g}$}//K}(x)\neq 0$. It follows from Theorem \ref{thm:Kostant} and Equation (\ref{eq:Kreg}) that our definition in Definition \ref{dfn:nsreg} is consistent with the previous one and $\mbox{${\mathfrak g}$}_{nsreg} \cong (\mbox{${\mathfrak k}$}_{\Delta}^{\perp})_{reg}.$ \end{rem} The following technical result will be useful in the next section in our description of the geometry of generic fibres of the KW map (see Theorem \ref{thm:genericfibre}). \begin{lem}\label{l:centralizers} For $x\in\mbox{${\mathfrak g}$}_{nsreg}$, the group $Z_{K}(x)=Z_{K}(x_{\mbox{${\mathfrak k}$}})\cap Z_{G}(x)=\{ e \}$ is the trivial group. \end{lem} \begin{proof} Since $x\in \mbox{${\mathfrak g}$}_{nsreg}$, $\mbox{Lie}(Z_{K}(x))=\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)=0,$ so that $Z_K(x)$ is a finite group. Decompose $x=x_{\mbox{${\mathfrak k}$}} + x_{\mbox{${\mathfrak p}$}}$ with respect to the Cartan decomposition, so that $Z_K(x)=Z_K(x_{\mbox{${\mathfrak k}$}}) \cap Z_K(x_{\mbox{${\mathfrak p}$}})$. Consider the Jordan decomposition of $x_{\mbox{${\mathfrak k}$}}$ in $\mbox{${\mathfrak k}$}$, $x_{\mbox{${\mathfrak k}$}}=s+n$, with $s$ semisimple and $n$ nilpotent. Consider the Levi subgroup $L:= Z_K(s)$ of $K$, let $\mbox{${\mathfrak l}$}=\mbox{Lie}(L)$, and let $Z$ be the centre of $L$. We claim that \begin{equation}\label{eq:Kcentralizer} Z_K(x)=Z_{x_{\mbox{${\mathfrak p}$}}}:=\{ z\in Z : {\rm Ad}(z)\cdot x_{\mbox{${\mathfrak p}$}}=x_{\mbox{${\mathfrak p}$}} \}. \end{equation} Indeed, if $z\in Z_{x_{\mbox{${\mathfrak p}$}}}$, then since $s, n \in \mbox{${\mathfrak l}$}$ and $z\in Z$, it follows that $z\in Z_K(x_{\mbox{${\mathfrak k}$}})$, and hence $z\in Z_K(x_{\mbox{${\mathfrak k}$}}) \cap Z_K(x_{\mbox{${\mathfrak p}$}})=Z_K(x)$. Conversely, by standard properties of the Jordan decomposition, $Z_K(x_{\mbox{${\mathfrak k}$}})=Z_K(s) \cap Z_K(n) = Z_L(n)$. Since $x\in \mbox{${\mathfrak g}$}_{nsreg}$, $x_{\mbox{${\mathfrak k}$}}\in\mbox{${\mathfrak k}$}_{reg}$ by Corollary \ref{c:linearalgebra}, so $n$ is regular nilpotent in $\mbox{${\mathfrak l}$}$, and hence $Z_L(n)=Z \cdot U$, where $U$ is a unipotent subgroup of $L$. It follows that the finite subgroup $Z_K(x)$ of $Z_L(n)$ is in $Z$, and hence that $Z_K(x)\subset Z_{x_{\mbox{${\mathfrak p}$}}}$, and this establishes (\ref{eq:Kcentralizer}). For later use, we let $Z^{0}$ denote the identity component of $Z$. From the classification of Levi subgroups of $K=SO(n-1)$, it follows that up to $K$-conjugacy, \begin{equation}\label{eq:Levis} L=GL(s_1) \times \dots \times GL(s_d) \times SO(r), \end{equation} where $r\equiv n-1 \pmod{2}$, and $r\not= 2$, or \begin{equation}\label{eq:Levis2} L=GL(m_1) \times \dots \times GL(m_d). \end{equation} If $n-1$ is even and $L$ is as in (\ref{eq:Levis}), then the centre $Z$ of $L$ is $GL(1)^d \times <\epsilon>$, where $\epsilon$ is the negative of the identity in $SO(r)$. Otherwise, $Z=Z^{0}=GL(1)^d$. Recall also that the $K$-module $\mbox{${\mathfrak p}$} \cong V$, where $V$ is the standard representation of $K$. It follows that the $Z^{0}$-weights of $\mbox{${\mathfrak p}$}$ consist of $\Gamma = \{ \pm \mu_i : i=1, \dots, d \}$, where $\mu_1, \dots, \mu_d$ is a basis of the character group $X^*(Z^{0})$ of $Z^{0}$, along with the trivial character when $L$ is given by (\ref{eq:Levis}). Let $x_{\mbox{${\mathfrak p}$}} = \displaystyle\bigoplus_{\lambda\in \Gamma} x_{\lambda}$ be the decomposition of $x_{\mbox{${\mathfrak p}$}}$ into $Z^{0}$-weight vectors, and let $\Gamma_0$ consist of the $\mu_i$ such $x_{\mu_i}$ or $x_{-\mu_i}$ is nonzero. Let $Z_{\Gamma_0}^{0}:=Z^{0} \cap Z_{x_{\mbox{${\mathfrak p}$}}}$ and note that $$Z_{\Gamma_0}^{0}= \{ z\in Z^{0} : \mu_i(z)=1 \mbox{ for all} \, \mu_i \in \Gamma_0 \}.$$ If $|\Gamma_0| < d$, then $\dim(Z_{\Gamma_0}^{0}) \ge 1$, which contradicts the finiteness of $Z_K(x)$ (\ref{eq:Kcentralizer}). Hence $|\Gamma_0|=d$, so that $\Gamma_0$ is a basis of $X^*(Z^{0})$, and it follows that $Z_{\Gamma_0}^{0}=\{ e \}$. When $Z=Z^{0}$, we have $$\{e\}=Z_{\Gamma_0}^{0}=Z_{x_{\mbox{${\mathfrak p}$}}}=Z_{K}(x)$$ by (\ref{eq:Kcentralizer}), and the lemma is proven. If, on the other hand, $Z\not= Z^{0}$, then by our remarks above, $n-1$ must be even and $L$ is given by (\ref{eq:Levis}). In this case, we can decompose $\mbox{${\mathfrak p}$} = \oplus_{i=1}^d \mbox{${\mathfrak p}$}_{\pm \mu_i} \oplus \mbox{${\mathfrak p}$}_0$, where $\mbox{${\mathfrak p}$}_{\mu_{i}}$ is the standard representation of $GL(s_{i})$, $\mbox{${\mathfrak p}$}_{-\mu_{i}}$ is its contragradient, and $\mbox{${\mathfrak p}$}_{0}$ is the standard representation of $SO(r)$. Thus, $\epsilon$ acts as the negative of the identity on $\mbox{${\mathfrak p}$}_{0}$ while $Z^{0}$ acts trivially on $\mbox{${\mathfrak p}$}_0$, and $\epsilon$ acts trivially on $\oplus_{i=1}^d \mbox{${\mathfrak p}$}_{\pm \mu_i}$. If $g\in Z_K(x) \setminus \{ e \}$, then since $Z_{\Gamma_{0}}^{0}=\{e\}$, we would have $g=z\cdot \epsilon$ with $z\in Z^{0}$. If this were the case, then $x_{\mbox{${\mathfrak p}$}_0}=0$. It follows that if $x_{\mbox{${\mathfrak k}$}}=\oplus_{i=1}^d x_i \oplus y$, with $x_i \in \mathfrak{gl}(s_i)$ and $y\in \mathfrak{so}(r)$, is the decomposition of $x_{\mbox{${\mathfrak k}$}}$ in $\mbox{${\mathfrak l}$}$, then $y\in \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}}) \cap \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}} (x)=0$, so $y=0.$ But then $x_{\mbox{${\mathfrak k}$}}$ is not regular, which is a contradiction. Thus, $Z_K(x)= \{ e \}$. \end{proof} \subsection{Generic Elements for GZ integrable systems} \label{ss:generic} We use Proposition \ref{prop:fullsreg} to construct a new set $\mbox{${\mathfrak g}$}_{\Theta}\subset\mbox{${\mathfrak g}$}$ of strongly regular elements. We then use the set $\mbox{${\mathfrak g}$}_{\Theta}$ to show that the GZ system is completely integrable on regular adjoint orbits of $\mbox{${\mathfrak g}$}$. We begin by studying the relation between the spectra of $x$ and $x_{\mbox{${\mathfrak k}$}}$. For $x\in\mbox{${\mathfrak g}$}$, recall that $\sigma(x)$ denotes the spectrum of $x$ (see Notation \ref{nota:spectrum}). We show the Zariski open subset: $$ \mbox{${\mathfrak g}$}(0)=\{x\in\mbox{${\mathfrak g}$}: \sigma(x_{\mbox{${\mathfrak k}$}})\cap\sigma(x)= \emptyset\}. $$ consists of $n$-strongly regular elements in the sense of Definition \ref{dfn:nsreg}. We require a result from linear algebra. \begin{lem}\label{lem:linearalgebra} Let $V=V_{1}\oplus V_{2}$ be a direct sum decomposition of a finite dimensional complex vector space. Let $X, Y \in \mbox{End}(V)$ with $Y\not= 0$. Suppose that $Y(V_1) \subset V_1$, $Y(V_2)=0$, and $[X,Y]=0$. Define $X_1:= \pi_{V_1} \circ X|_{V_{1}} \in \mbox{End}(V_{1})$ where $\pi_{V_1}$ is projection off $V_2$. Let $V(\lambda)$ be the generalized eigenspace of $X$ of eigenvalue $\lambda$ and let $V_{1}(\lambda)$ be the generalized eigenspace of $X_{1}$ of eigenvalue $\lambda$. Then $Y(V(\lambda))\subset V_{1}(\lambda)$. \end{lem} \begin{proof} Let $v\in V(\lambda)$. Then there is $j\in\mathbb{Z}^{\geq 0}$ such that $(X-\lambda {\mbox{${\rm Id}$}}_{V})^{j} v=0$ where ${\mbox{${\rm Id}$}}_{V}$ is the identity operator on $V$. For $k\ge 0$, let $v_k=(X-\lambda {\mbox{${\rm Id}$}}_{V})^{k} Yv$. Since $[X,Y]=0$, then $v_k \in \mbox{Im}(Y) \subset V_{1}$. We show that $v_k=(X_1-\lambda {\mbox{${\rm Id}$}}_{V_1})^{k} Yv$ by induction on $k$. The case $k=0$ is clear, and note that if $u\in V_1$ and $(X-\lambda {\mbox{${\rm Id}$}}_{V})u \in V_1$, then $(X-\lambda {\mbox{${\rm Id}$}}_{V})u = (X_1 - \lambda {\mbox{${\rm Id}$}}_{V_1})u$. The inductive step follows easily from this observation since each $v_k \in V_{1}$. By the choice of $j$, \begin{equation*} (X_1 - \lambda {\mbox{${\rm Id}$}}_{V_1})^jYv = (X-\lambda {\mbox{${\rm Id}$}}_{V})^{j}Yv = Y(X-\lambda {\mbox{${\rm Id}$}}_{V})^{j}v = 0, \end{equation*} and this establishes the lemma. \end{proof} \begin{thm}\label{thm:gzero} Let $x\in\mbox{${\mathfrak g}$}(0)$. Then $x\in\mbox{${\mathfrak g}$}_{nsreg}$. \end{thm} \begin{proof} Suppose $x\not\in\mbox{${\mathfrak g}$}_{nsreg}$ so that $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)\neq 0$. We show that $\sigma(x)\cap\sigma(x_{\mbox{${\mathfrak k}$}})\neq \emptyset$ by considering the types $ B, D$ separately. Suppose that $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$. We apply Lemma \ref{lem:linearalgebra} to the vector space $V=\mbox{${\mathbb C}$}^{2l}=V_{1}\oplus V_{2}$, where $V_{1}=\mbox{span} \{ e_{\pm 1}, \dots, e_{\pm (l-1)}, e_{l}+e_{-l}\}$, and $V_{2}=\mbox{span} \{e_{l}-e_{-l}\}$ (see Section \ref{ss:soevenreal}). We take $X=x$ and $Y$ any nonzero element of $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)$, so that $[X,Y]=0$. The reader can check that $\mbox{${\mathfrak k}$}$ annihilates $V_{2}$, so $Y(V_2)=0$. The involution $\theta$ acts on $e_{\pm i}$ via $\theta(e_{\pm i})=e_{\pm i}$ for $i\neq l$ and $\theta(e_{l})=e_{-l}$ (see Example \ref{ex:roottypes}). Since $\theta(Z\cdot \theta(v))=\theta(Z)\cdot v$ for any $Z\in \mbox{${\mathfrak g}$}$ and $v\in V$, it follows that $\mbox{${\mathfrak k}$}(V_1)\subset V_1$ and $\mbox{${\mathfrak p}$}(V_1)\subset V_2$. Hence, $Y(V_1) \subset V_1$, $x_{\mbox{${\mathfrak k}$}}(V_1) \subset V_1$ and $x_{\mbox{${\mathfrak p}$}}(V_1)\subset V_2$. Thus, $x_{\mbox{${\mathfrak k}$}}$ is the element $X_1$ from Lemma \ref{lem:linearalgebra}. Let $V=\bigoplus_{\mu\in\sigma(x)} V(\mu)$ be the decomposition of $V$ into generalized eigenspaces of $x$. Since $Y\neq 0$, there exists $\mu\in\sigma(x)$ such that $Y(V(\mu))\neq 0$, so by Lemma \ref{lem:linearalgebra}, $V_{1}(\mu)\neq 0$. We show by contradiction that if $Y(V(0))\not= 0$, then $\dim(V_1(0))>1$. Indeed, otherwise, $V_1(0)=\mbox{${\mathbb C}$} Yv$ for some nonzero $v\in V(0)$. Recall the nondegenerate bilinear form $\beta(\cdot, \cdot)$ on $\mbox{${\mathbb C}$}^{2l}$ given in Equation (\ref{eq:beta}) and note that $\beta|_{V_{1}\times V_{1}}$ is the bilinear form on $V_{1}\cong \mbox{${\mathbb C}$}^{2l-1}$ defining $K=SO(2l-1)$ (see Section \ref{ss:orthoreal}). Since $\beta(v_1,v_2)=0$ unless $v_1\in V(\mu_1)$ and $v_2\in V(-\mu_1)$, we may assume that $\beta(Yv, Yv)=1$. Since $Y\in\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)\subset \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}})$, $Y$ stabilizes the subspace $V_1(0)$. Since $Y\in \mbox{${\mathfrak k}$}$, $\beta(Y^{2}v, Yv)=-\beta(Yv,Y^{2}v)=-\beta(Y^{2}v, Yv)$, and $\beta(Y^{2}v,Yv)=0$. Then $\dim(V_1(0))=1$ implies that $Y^{2}v=0$, so that $1=\beta(Yv, Yv)=-\beta(v, Y^{2}v)=0$. This contradiction establishes the claim. Hence there is $\mu \in \mbox{${\mathbb C}$}$ such that $V(\mu)$ and $V_1(\mu)$ are nonzero, and if $\mu=0$, $\dim(V_1(\mu)) > 1$. It follows that $\mu \in \sigma(x) \cap \sigma(x_{\mbox{${\mathfrak k}$}})$ (Notation \ref{nota:spectrum}), so $x\not\in \mbox{${\mathfrak g}$}(0)$, completing the proof for type $D$. If $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$, we let $V=\mbox{${\mathbb C}$}^{2l+1}$ and $V_1 = \mbox{span} \{ e_{\pm 1}, \dots, e_{\pm l} \}$, $V_2=\mbox{span} \{ e_0 \}$ (see Section \ref{ss:sooddreal}). As above, we take $Y$ to be any nonzero element of $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x)$, and verify that $x$ and $Y$ satisfy the hypotheses of Lemma \ref{lem:linearalgebra} and $x_{\mbox{${\mathfrak k}$}}$ is the element $X_{1}$ from the lemma. Let $\beta(\cdot, \cdot)$ be the bilinear form from Equation (\ref{eq:beta}). Then by Lemma \ref{lem:linearalgebra}, there is a generalized eigenspace $V(\mu)$ such that $Y(V(\mu))$ is a nonzero subspace of $V_1(\mu)$. We claim that if $\dim(V(0))=1$, then $Y(V(0))=0$. Indeed, if $\dim(V(0))=1$, then $V(0)$ is spanned by a nonzero vector $v$ and as above $Y(V(0))\subset V(0)$. Then $\beta(Yv,v)=-\beta(v, Yv)=-\beta(Yv,v)$, so that $Yv=0$ since $\beta$ is nondegenerate on $V(0)$. Hence, there is $\mu$ such that $Y(V(\mu))$ is a nonzero subspace of $V_1(\mu)$ and either $\mu\not=0$ or $\mu=0$ and $\dim(V(0))\ge 2$. As above, we conclude that $x\not\in \mbox{${\mathfrak g}$}(0)$. \end{proof} Let $c=(c_{r_{n-1}}, c_{r_{n}})\in \mbox{${\mathbb C}$}^{r_{n-1}}\times\mbox{${\mathbb C}$}^{r_{n}}$ and write $c_{r_{i}}=(c_{i, 1},\dots, c_{i, r_{i}})\in \mbox{${\mathbb C}$}^{r_{i}}$ for $i=n-1,\, n$. Let $I_{n, c}$ be the ideal of $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]$ generated by the functions $f_{i, j}-c_{i,j}$ for $i=n-1, \, n$ and $j=1,\dots, r_{i}$, and note that the zero set of $I_{n,c}$ is $\Phi_n^{-1}(c)$. \begin{cor}\label{c:isgenericallyrad} Let $x\in \mbox{${\mathfrak g}$}(0)$, and let $c=\Phi_n(x)$. \begin{enumerate} \item The ideal $I_{n,c}$ is the ideal of functions vanishing on $\Phi_n^{-1}(c)$, and the variety $\Phi_{n}^{-1}(c)$ is smooth. \item The fibre $\Phi_{n}^{-1}(c)$ is a single closed $K$-orbit. \end{enumerate}\end{cor} \begin{proof} As in Remark \ref{r:spectrum}, the fibre $\Phi_n^{-1}(c) \subset \mbox{${\mathfrak g}$}(0)$. By Theorem \ref{thm:gzero} every element of the fibre $\Phi_{n}^{-1}(c)$ is $n$-strongly regular. Hence Theorem \ref{thm:Kostant} implies that the differentials $\{df_{i,j}(x):\, i=n-1,\, n; \; j=1,\dots, r_{i}\}$ are independent for all $x\in \Phi_{n}^{-1}(c)$. By Theorem 18.15 (a) of \cite{Eis}, the ideal $I_{n,c}$ is radical, so $I_{n,c}$ is the ideal of $\Phi^{-1}_{n}(c)$. The smoothness of $\Phi^{-1}_{n}(c)$ now follows since the differentials of the generators of $I_{n,c}$ are independent at every point of $\Phi_{n}^{-1}(c)$. For the second assertion, note first that $$\dim(K)=\dim(\mbox{${\mathfrak g}$})-\dim (\mbox{${\mathfrak g}$}//K)=\dim( \Phi_{n}^{-1}(c)),$$ where the first equality follows from Equations (\ref{eq:flagvarieties}) and (\ref{eq:quotdim}), and the second equality follows from Proposition \ref{prop:flat} (3). By Lemma \ref{lem:dimest}, $\dim({\rm Ad}(K)\cdot x)=\dim(K)$ for all $x\in \Phi_{n}^{-1}(c)$. By Proposition \ref{prop:flat} (2), each fibre $\Phi_{n}^{-1}(c)$ has a unique closed $K$-orbit, which implies the assertion. \end{proof} Consider the Zariski open subvariety of $\mbox{${\mathfrak g}$}$: \begin{equation}\label{eq:fgtheta} \mbox{${\mathfrak g}$}_{\Theta}:=\{x\in\mbox{${\mathfrak g}$}:\, \sigma(x_{i})\cap \sigma(x_{i+1})=\emptyset \mbox{ for } i=2,\dots, n-1\}. \end{equation} \begin{prop}\label{prop:orthofgtheta} The elements of $\mbox{${\mathfrak g}$}_{\Theta}$ are strongly regular. \end{prop} \begin{proof} If $x\in \mbox{${\mathfrak g}$}_{\Theta}$, then $x_{i}\in\mbox{${\mathfrak g}$}_{i}(0)$ for $i=3,\dots, n$. By Theorem \ref{thm:gzero}, $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i-1}}(x_{i-1})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}_{i}}(x_{i})=0$. The result now follows from Proposition \ref{prop:fullsreg}. \end{proof} \begin{cor}\label{c:thetafibre} Let $x\in\mbox{${\mathfrak g}$}_{\Theta}$. Then $\Phi^{-1}(\Phi(x))=\Phi^{-1}(\Phi(x))_{sreg}$. \end{cor} \begin{proof} By Remark \ref{r:spectrum}, $\Phi^{-1}(\Phi(x))\subset\mbox{${\mathfrak g}$}_{\Theta}$ for $x\in\mbox{${\mathfrak g}$}_{\Theta}$. The result then follows from Proposition \ref{prop:orthofgtheta}. \end{proof} \begin{rem}\label{r:generallin3} Let $\mbox{${\mathfrak g}$}=\mathfrak{gl}(n)$. In Theorem 5.15 of \cite{Col1}, the first author proved that $\mbox{${\mathfrak g}$}_{\Theta}\subset\mbox{${\mathfrak g}$}_{sreg}$ for the analogously defined set $\mbox{${\mathfrak g}$}_{\Theta}$. The methods of this section also prove that $\mbox{${\mathfrak g}$}_{\Theta}\subset\mbox{${\mathfrak g}$}_{sreg}$, and our proof is significantly simpler than the proof in \cite{Col1}. To prove Theorem \ref{thm:gzero} for $\mathfrak{gl}(n)$ we simply apply Lemma \ref{lem:linearalgebra} with $\mbox{${\mathfrak g}$}=\mathfrak{gl}(n)$, $\mbox{${\mathfrak k}$}=\mathfrak{gl}(n-1)$, $V=\mbox{${\mathbb C}$}^{n}$, with $V_{1}=\mbox{span}\{e_{1},\dots, e_{n-1}\}$ and $V_{2}=\mbox{span}\{e_{n}\}$. Proposition \ref{prop:orthofgtheta} follows, since the analogue of Proposition \ref{prop:fullsreg} also holds in this case as we observed in Remark \ref{r:generallin2}. Thus, we can construct the strongly regular elements $\mbox{${\mathfrak g}$}_{\Theta}$ of $\mbox{${\mathfrak g}$}$ in both orthogonal and general linear cases using the same framework. \end{rem} We can now prove one of our main results. \begin{thm}\label{thm:intsystem} The restriction of the GZ functions $J_{GZ}$ to a regular adjoint orbit in $\mbox{${\mathfrak g}$}$ forms a completely integrable system on the orbit. \end{thm} \begin{proof} Let $x\in\mbox{${\mathfrak g}$}_{reg}$ and let ${\rm Ad}(G)\cdot x$ be the adjoint orbit containing $x$. By Proposition \ref{prop:sregintegrable}, it suffices to show that Equation (\ref{eq:sregintersect}) holds. Let $\chi:\mbox{${\mathfrak g}$}\to \mbox{${\mathfrak g}$}//G$ be the adjoint quotient. Since the Kostant-Wallach map $\Phi$ is surjective (Theorem \ref{thm:surj}), there exists $y\in \mbox{${\mathfrak g}$}_{\Theta}$ such that $\chi(y)=\chi(x)$. It follows from Proposition \ref{prop:orthofgtheta} that $y\in\mbox{${\mathfrak g}$}_{sreg}$, whence $y\in\mbox{${\mathfrak g}$}_{reg}$ by (\ref{eq:totreg}). Therefore $y\in \chi^{-1}(\chi(x))\cap\mbox{${\mathfrak g}$}_{reg}={\rm Ad}(G)\cdot x$, and ${\rm Ad}(G)\cdot x\cap\mbox{${\mathfrak g}$}_{sreg}\neq\emptyset$. \end{proof} We end this section by describing the KW fibre $\Phi^{-1}(\Phi(x))$ for $x\in\mbox{${\mathfrak g}$}_{\Theta}$. In particular, we generalize Corollary 5.18 of \cite{Col1} to the orthogonal setting using Proposition \ref{prop:orthofgtheta} and Corollary \ref{c:isgenericallyrad}. Our argument below can also be used to give an easier proof of Corollary 5.18 of \cite{Col1} in the general linear case. In the proof of the following theorem, we use repeatedly the easy fact that the projection $\pi_{i}: \mbox{${\mathfrak g}$}\to\mbox{${\mathfrak g}$}_{i}, \, \pi_{i}(x)=x_{i},$ is ${\rm Ad}(G_{i})$-equivariant. \begin{thm} \label{thm:genericfibre} Let $x\in\mbox{${\mathfrak g}$}_{\Theta}$, and let $Z_{G_{i}}(x_{i})$ be the centralizer of $x_{i}\in\mbox{${\mathfrak g}$}_{i}$ in $G_{i}$ viewed as a subgroup of $G$. Then the morphism: \begin{equation}\label{eq:Psidefn} \Psi:\displaystyle\prod_{i=2}^{n-1} Z_{G_{i}}(x_{i})\rightarrow \Phi^{-1}(\Phi(x)) \mbox{ given by } \Psi(z_{2}, \dots, z_{n-1})={\rm Ad}(z_{2})\dots{\rm Ad}(z_{n-1})\cdot x, \end{equation} $z_{i}\in Z_{G_{i}}(x_{i})$, is an isomorphism of non-singular algebraic varieties. \end{thm} \begin{proof} We first note that the image of $\Psi$ is contained in the fibre $\Phi^{-1}(\Phi(x))$. Indeed, observe that ${\rm Ad}(z_{n-1})\cdot x\in\Phi^{-1}(\Phi(x)),$ since $({\rm Ad}(z_{n-1})\cdot x)_{i}=x_{i}$ for all $i\leq n-1$. In fact, for any $i=2,\dots, n-1$ we have: \begin{equation}\label{eq:icutoff} ({\rm Ad}(z_{i}\dots z_{n-1})\cdot x)_{i}=x_{i}. \end{equation} We prove Equation (\ref{eq:icutoff}) by downward induction on $i$, with the base case $i=n-1$ following from our discussion above. Suppose for any $j$ with $i<j\leq n-1$, we have $({\rm Ad}(z_{j}\dots z_{n-1})\cdot x)_{j}=x_{j}$. Now \begin{equation}\label{eq:cutoffs1} ({\rm Ad}(z_{i}\dots z_{n-1})\cdot x)_{i}=[({\rm Ad}(z_{i}\dots z_{n-1})\cdot x)_{i+1}]_{i}. \end{equation} Since $z_{i}\in G_{i}\subset G_{i+1}$, we have $$ ({\rm Ad}(z_{i}\dots z_{n-1})\cdot x)_{i+1}={\rm Ad}(z_{i})\cdot( {\rm Ad}(z_{i+1}\dots z_{n-1})\cdot x)_{i+1}={\rm Ad}(z_{i})\cdot x_{i+1} $$ by the induction hypothesis. But then it follows from (\ref{eq:cutoffs1}) that $$ ({\rm Ad}(z_{i}\dots z_{n-1})\cdot x)_{i}=({\rm Ad}(z_{i})\cdot x_{i+1})_{i}={\rm Ad}(z_{i})\cdot x_{i}=x_{i}, $$ since $z_{i}\in Z_{G_{i}}(x_{i})$, yielding (\ref{eq:icutoff}). Using Equation (\ref{eq:icutoff}), we now show that for any $i=2,\dots, n$, \begin{equation}\label{eq:adjoint} \chi_{i}(({\rm Ad}(z_{2}\dots z_{n-1})\cdot x)_{i})=\chi_{i}(x_{i}), \end{equation} where $\chi_{i}:\mbox{${\mathfrak g}$}_{i}\to \mbox{${\mathfrak g}$}_{i}//G_{i}$ is the adjoint quotient for $\mbox{${\mathfrak g}$}_{i}$, and thus ${\rm Ad}(z_{2}\dots z_{n-1})\cdot x\in \Phi^{-1}(\Phi(x))$ by the definition of the KW map in (\ref{eq:KWmap}). We first note that (\ref{eq:adjoint}) is easily seen to be true for $i=n$, since $z_{2}\dots z_{n-1}\in G_{n-1}\subset G$. For $i<n$, \begin{equation}\label{eq:something} ({\rm Ad}(z_{2}\dots z_{i-1} z_{i}\dots z_{n-1})\cdot x)_{i}={\rm Ad}(z_{2}\dots z_{i-1})\cdot ({\rm Ad}(z_{i}\dots z_{n-1})\cdot x)_{i}={\rm Ad}(z_{2}\dots z_{i-1})\cdot x_{i} \end{equation} by Equation (\ref{eq:icutoff}). Since $z_{2}\dots z_{i-1}\in G_{i-1}\subset G_{i}$, Equation (\ref{eq:something}) implies $$ \chi_{i}(({\rm Ad}(z_{2}\dots z_{n-1})\cdot x)_{i})=\chi_{i}({\rm Ad}(z_{2}\dots z_{i-1})\cdot x_{i})=\chi_{i}(x_{i}), $$ yielding (\ref{eq:adjoint}) in this case. We now claim $\Psi$ is surjective. Suppose $y\in\Phi^{-1}(\Phi(x))$. Let $\Phi(x)=(c_{2},\dots, c_{n})\in \mbox{${\mathbb C}$}^{r_{2}}\times\dots\times \mbox{${\mathbb C}$}^{r_{n}}$. Since $\chi_2$ is bijective, we see that $x_{2}=y_{2}$. Further, $y_{3}, \, x_{3}\in \Phi_{3}^{-1}(c_{2}, c_{3})$, where $\Phi_{3}$ is the partial KW map for $\mbox{${\mathfrak g}$}_{3}$. Since $x\in \mbox{${\mathfrak g}$}_{\Theta}$, it follows from definitions that $\Phi_{3}^{-1}(c_{2}, c_{3})\subset \mbox{${\mathfrak g}$}_{3}(0)$. By part (2) of Corollary \ref{c:isgenericallyrad}, $y_{3}$, $x_{3}$ are $G_{2}=Z_{G_{2}}(x_{2})$-conjugate. Let $z_{2}\in Z_{G_{2}}(x_{2})$ be such that ${\rm Ad}(z_{2})\cdot y_{3}=x_{3}$. Let $y^{\prime}:={\rm Ad}(z_{2})\cdot y$, so that $y^{\prime}_{3}=x_{3}$. Now observe that $y^{\prime}_{4},\, x_{4}\in \Phi_{4}^{-1}(c_{3}, c_{4})\subset \mbox{${\mathfrak g}$}_{4}(0)$. Again, by part (2) of Corollary \ref{c:isgenericallyrad}, $y_{4}^{\prime}$, $x_{4}$ are $G_{3}$-conjugate. But since $y^{\prime}_{3}=x_{3}$, we see that $y_{4}^{\prime}$, $x_{4}$ are $Z_{G_{3}}(x_{3})$-conjugate. Let $z_{3}\in Z_{G_{3}}(x_{3})$ be such that ${\rm Ad}(z_{3})\cdot y^{\prime}_{4}=x_{4}$. Let $y^{\prime\prime}:={\rm Ad}(z_{3} z_{2})\cdot y$. Then we claim $y^{\prime\prime}_{4}=x_{4}$. Indeed, $$ y_{4}^{\prime\prime}=({\rm Ad}(z_{3}z_{2})\cdot y)_{4}=({\rm Ad}(z_{3})\cdot y^{\prime})_{4}={\rm Ad}(z_{3})\cdot y_{4}^{\prime}=x_{4}. $$ Continuing, in this fashion we can find $z_{2},\dots, z_{n-1}\in Z_{G_{2}}(x_{2}),\, \dots, Z_{G_{n-1}}(x_{n-1})$ respectively such that $x={\rm Ad}(z_{n-1}\dots z_{2})\cdot y$. It follows immediately that $\Psi(z_{2}^{-1},\dots, z_{n-1}^{-1})=y$ We now show that $\Psi$ is injective. Our main tool will be Lemma \ref{l:centralizers}. Suppose we have $z_{i},\, \widetilde{z_{i}}\in Z_{G_{i}}(x_{i})$, for $i=2,\dots, n-1$ such that \begin{equation}\label{eq:firsteq} {\rm Ad}(z_{2}\dots z_{n-1})\cdot x={\rm Ad}(\widetilde{z_{2}}\dots \widetilde{z_{n-1}})\cdot x. \end{equation} Then $({\rm Ad}(z_{2}\dots z_{n-1})\cdot x)_{3}=({\rm Ad}(\widetilde{z_{2}}\dots\widetilde{z_{n-1}})\cdot x)_{3}$, which is equivalent to ${\rm Ad}(z_{2})\cdot x_{3}={\rm Ad}(\widetilde{z_{2}})\cdot x_{3}$ by (\ref{eq:icutoff}). It follows that $z_{2}^{-1}\widetilde{z_{2}}\in Z_{G_{2}}(x_{2})\cap Z_{G_{3}}(x_{3})$. Since $x\in\mbox{${\mathfrak g}$}_{\Theta}$, $x\in\mbox{${\mathfrak g}$}_{sreg}$ by Proposition \ref{prop:orthofgtheta}, so that $x_{3}\in(\mbox{${\mathfrak g}$}_{3})_{3-sreg}$ by Proposition \ref{prop:fullsreg}. Lemma \ref{l:centralizers} now implies that $z_{2}=\widetilde{z_{2}}$. By induction, we may assume that $z_{3}=\widetilde{z_{3}}, \, z_{4}=\widetilde{z_{4}}, \dots, z_{i-1}=\widetilde{z_{i-1}}$, so that Equation (\ref{eq:firsteq}) becomes $$ {\rm Ad}(z_{i}\dots z_{n-1})\cdot x={\rm Ad}(\widetilde{z_{i}}\dots \widetilde{z_{n-1}})\cdot x. $$ Using (\ref{eq:icutoff}) again, we have ${\rm Ad}(z_{i})\cdot x_{i+1}={\rm Ad}(\widetilde{z_{i}})\cdot x_{i+1}$, yielding $z_{i}^{-1}\widetilde{z_{i}}\in Z_{G_{i}}(x_{i})\cap Z_{G_{i+1}}(x_{i+1})$. Lemma \ref{l:centralizers} again gives that $z_{i}=\widetilde{z_{i}}$. By induction $\Psi$ is injective. Finally, we show that $\Phi^{-1}(\Phi(x))$ is a nonsingular variety. Let $\Phi(x)=(c_{i,j})_{i=2,\dots, n}^{j=1,\dots ,r_{i}} \in \mbox{${\mathbb C}$}^{r_{2}}\times \dots\times \mbox{${\mathbb C}$}^{r_{n}}.$ Let $I_{c}\subset\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]$ be the ideal generated by the functions $g_{i,j}=f_{i,j}-c_{i,j}$ for $i=2,\dots, n$ and $j=1,\dots, r_{i}$. By Corollary \ref{c:thetafibre}, $\Phi^{-1}(\Phi(x))\subset\mbox{${\mathfrak g}$}_{sreg}$. It follows from the definition of strong regularity in Notation-Definition \ref{dfnote:sreg} that the differentials of the functions $g_{i,j}$ are independent at any point $y\in \Phi^{-1}(\Phi(x))$. Again using Theorem 18.15 of \cite{Eis}, we see that $y$ is a smooth point of $\Phi^{-1}(\Phi(x))$. Thus, $\Psi: Z_{G_{2}}(x_{2}) \times \dots \times Z_{G_{n-1}}(x_{n-1})\to \Phi^{-1}(\Phi(x))$ is a bijective morphism of non-singular varieties. It follows from Zariski's main theorem that $\Psi$ is a isomorphism. \end{proof} \subsection{Generic orbits of the GZ group $A$ on $\mbox{${\mathfrak g}$}$} The GZ integrable system in Equation (\ref{eq:GZfuns}) integrates to a global, holomorphic action of $A:=\mbox{${\mathbb C}$}^{d}$ on $\mbox{${\mathfrak g}$}$ where $$d=\frac{\dim \mbox{${\mathfrak g}$}-r_{n}}{2}$$ is half the dimension of a regular ${\rm Ad}(G)$-orbit on $\mbox{${\mathfrak g}$}$. To see this, one considers the Lie algebra of Hamiltonian GZ vector fields on $\mbox{${\mathfrak g}$}$: \begin{equation}\label{eq:GZvecfields} \mbox{${\mathfrak a}$}_{GZ}=\mbox{span}\{\xi_{f}:\, f\in J_{GZ}\}. \end{equation} For $f\in J_{GZ}$, the Hamiltonian vector field $\xi_{f}$ is complete and integrates to a global action of $\mbox{${\mathbb C}$}$ on $\mbox{${\mathfrak g}$}$ (see Theorem 2.4,\cite{Col2}). Since the functions $J_{GZ}$ Poisson commute, the Lie algebra $\mbox{${\mathfrak a}$}_{GZ}$ is abelian, and therefore the global flows of the vector fields $\xi_{f}$ simultaneously integrate to give a holomorphic action of $A$ on $\mbox{${\mathfrak g}$}$ (see Section 2.3, \cite{Col2} for details). We refer to the group $A$ as the Gelfand-Zeitlin group (or GZ) group (see \cite{Col1},\cite{CEexp}). Since the Lie algebra $\mbox{${\mathfrak a}$}_{GZ}$ is commutative, the GZ functions $f_{i,j}\in J_{GZ}$, $i=2,\dots, n,\, j=1,\dots, r_{i}$ are invariant under one another's Hamiltonian flows, whence the action of $A$ preserves the fibres of the KW map $\Phi$. In fact, Theorem 2.14 of \cite{Col2} implies that the irreducible components of the strongly regular fibre $\Phi^{-1}(\Phi(x))_{sreg}$ are precisely the orbits of $A$ on the fibre $\Phi^{-1}(\Phi(x))$. Theorem \ref{thm:genericfibre} can be now be used to describe the action of the GZ group $A$ on the fibres $\Phi^{-1}(\Phi(x))$ for $x\in\mbox{${\mathfrak g}$}_{\Theta}$. \begin{thm}\label{thm:GZgroup} Let $x\in\mbox{${\mathfrak g}$}_{\Theta}$, and let $Z_{G_{i}}(x_{i})^{0}$ be the identity component of the group $Z_{G_{i}}(x_{i})$. Let $$\mathcal{Z}:=\displaystyle\prod_{i=2}^{n-1} Z_{G_{i}}(x_{i})^{0}.$$ Then the $A$-orbits on $\Phi^{-1}(\Phi(x))$ coincide with orbits of a free, algebraic action of the connected, abelian algebraic group $\mathcal{Z}$ on $\Phi^{-1}(\Phi(x))$. In particular, the Lie algebra of GZ vector fields in (\ref{eq:GZvecfields}) is algebraically integrable on the fibre $\Phi^{-1}(\Phi(x))$. \end{thm} \begin{proof} By Theorem \ref{thm:genericfibre}, the morphism $$ \Psi: \displaystyle\prod_{i=2}^{n-1} Z_{G_{i}}(x_{i})\to \Phi^{-1}(\Phi(x)) \mbox{ given by } \Psi(z_{2},\dots, z_{n})={\rm Ad}(z_{2})\cdots {\rm Ad}(z_{n-1})\cdot x. $$ is an isomorphism of varieties (cf. Equation (\ref{eq:Psidefn})). Therefore, we can use $\Psi$ to define an action of $\mathcal{Z}$ on $\Phi^{-1}(\Phi(x))$ via \begin{equation}\label{eq:actdefn} (z_{2},\dots, z_{n})\cdot y:=\Psi((z_{2},\dots, z_{n})\circ \Psi^{-1}(y)), \end{equation} where $\circ$ in the above equation represents multiplication in the group $\prod_{i=2}^{n-1} Z_{G_{i}}(x_{i})$. The action of $\mathcal{Z}$ in (\ref{eq:actdefn}) is clearly algebraic and free and its orbits are the irreducible components of $\Phi^{-1}(\Phi(x))$, since $\Psi$ is an isomorphism of varieties. Since $\Phi^{-1}(\Phi(x))=\Phi^{-1}(\Phi(x))_{sreg}$ by Corollary \ref{c:thetafibre}, the orbits of $\mathcal{Z}$ are then precisely the orbits of the GZ group $A$ on $\Phi^{-1}(\Phi(x))$ by our remarks above. \end{proof} Using Theorem \ref{thm:genericfibre}, we can count the number of irreducible components (and hence the number of $A$-orbits) in $\Phi^{-1}(\Phi(x))$ for $x\in\mbox{${\mathfrak g}$}_{\Theta}$. \begin{cor}\label{c:counting} Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(n)$ with $n> 3$, and let $x\in\mbox{${\mathfrak g}$}_{\Theta}$. Let $m$ be the number of indices $i$, $i=4,\dots, n-1$, satisfying the following two conditions: \begin{enumerate} \item $i$ is even. \item zero occurs as an eigenvalue of $x_{i}$ with multiplicity at least 4. \end{enumerate} Then $m\in \{0,\dots, r_{n-1} - 1\}$ and the number of irreducible components of $\Phi^{-1}(\Phi(x))$ is $2^{m}$. Further, for any $m\in\{0,\dots, r_{n-1} - 1\}$, there exists an $x\in\mbox{${\mathfrak g}$}_{\Theta}$ with the property that $\Phi^{-1}(\Phi(x))$ contains $2^{m}$ irreducible components. \end{cor} \begin{proof} It follows immediately from the isomorphism in Theorem \ref{thm:genericfibre} that the number of irreducible components of $\Phi^{-1}(\Phi(x))$ for $x\in\mbox{${\mathfrak g}$}_{\Theta}$ coincides with the number of irreducible (i.e. connected) components of the product of algebraic groups $Z_{G_{2}}(x_{2})\times\dots\times Z_{G_{n-1}}(x_{n-1})$. We compute the number of components of $Z_{G_{i}}(x_{i})$ by considering the Jordan decomposition of $x_{i}\in\mbox{${\mathfrak g}$}_{i}$, $x_{i}=s_{i}+n_{i}$ with $s_{i}$ semisimple and $n_{i}$ nilpotent. Then $Z_{G_{i}}(x_{i})=Z_{L_{i}}(n_{i})$, where $L_{i}:=Z_{G_{i}}(s_{i})$ is a Levi subgroup of $G_{i}$. Since $x\in\mbox{${\mathfrak g}$}_{\Theta}\subset \mbox{${\mathfrak g}$}_{sreg}$ by Proposition \ref{prop:orthofgtheta}, $x_{i}$ is regular for all $i=2,\dots, n$ by (\ref{eq:totreg}), so that $n_{i}\in \mbox{${\mathfrak l}$}_{i}=\mbox{Lie}(L_{i})$ is regular nilpotent. Thus, $Z_{L_{i}}(n_{i})\cong Z_{i}\times U_{i}$, where $Z_{i}$ is the centre of $L_{i}$ and $U_{i}$ is a unipotent subgroup of $L_{i}$. Suppose $i>2$ is even. As we observed in the proof of Lemma \ref{l:centralizers}, up to $G_{i}$-conjugacy the Levi subgroup $L_{i}$ is either a product of subgroups $GL(m_{j})$ in which case $Z_{i}$ is connected, or $L$ is a product of $GL(s_{j})$ and precisely one factor of the form $SO(2k)$ with $k>1$, in which case $Z_{i}$ has exactly two components (see Equations (\ref{eq:Levis}) and (\ref{eq:Levis2})). The latter case occurs if and only if zero occurs as an eigenvalue of $s_{i}$ of multiplicity at least $4$. On the other hand, if $i$ is odd, a similar argument shows that $Z_{G_{i}}(x_{i})$ is always a connected, algebraic group. Lastly, if $i=2$, the group $Z_{G_{2}}(x_{2})=G_{2}$ is connected. The upper bound on the value of $m$ follows from an easy calculation that there are precisely $r_{n-1}-1$ subalgebras of type $D$ in the chain $\mbox{${\mathfrak g}$}_{3}\subset \dots\subset\mbox{${\mathfrak g}$}_{n-1}$. To prove the second statement of the theorem, suppose we are given $m\in\{0,\dots, r_{n-1}-1\}$. Then we can find $m$ subalgebras $\mbox{${\mathfrak g}$}_{i_{1}}\subset\mbox{${\mathfrak g}$}_{i_{2}}\subset\dots\subset\mbox{${\mathfrak g}$}_{i_{m}}$ of type $D$ in the chain $\mbox{${\mathfrak g}$}_{3}\subset\dots\subset\mbox{${\mathfrak g}$}_{n-1}$. It follows from the surjectivity of the KW map (Theorem 3.6) that we can find $x\in\mbox{${\mathfrak g}$}_{\Theta}$ with $x_{i_{j}}$ regular nilpotent in $\mbox{${\mathfrak g}$}_{i_{j}}$ for all $j=1,\dots, m$. It follows that $\Phi^{-1}(\Phi(x))$ contains $2^{m}$ irreducible components from the first statement of the theorem. \end{proof} \begin{rem}\label{r:fgomega} Theorems \ref{thm:genericfibre} and \ref{thm:GZgroup} improve on results from \cite{Col2} and \cite{Col1}. In \cite{Col2}, the first author proved Theorem \ref{thm:genericfibre} for the elements $x$ of $\mbox{${\mathfrak g}$}$ such that $x_i$ is regular semisimple for $i=2, \dots, n$ and $x_i$ and $x_{i+1}$ have disjoint spectra for $i=2, \dots, n-1$. In this case, the fibres $\Phi^{-1}(\Phi(x))$ are isomorphic to a product of tori. Our result here is more general and has a simpler proof. In \cite{Col1}, the first author proved the analogue of Theorem \ref{thm:GZgroup} for $\mbox{${\mathfrak g}$} = \mathfrak{gl}(n)$. Our proof here carries over to $\mathfrak{gl}(n)$ with minor modifications, and is simpler than the proof in \cite{Col1}. \end{rem} \section{The orthogonal KW nilfibre and strongly regular elements}\label{s:KWnilfibre} In this section, we show that $\Phi^{-1}(0)_{sreg}=\emptyset$ (see Proposition \ref{p:nosreg}). This stands in stark contrast to the situation in the general linear setting where the rich structure of $\Phi^{-1}(0)_{sreg}$ is studied extensively in \cite{CEKorbs}. As with the generic fibres of $\Phi$ studied in the previous sections, our study of $\Phi^{-1}(0)$ begins with studying the nilfibre of the partial KW map $\Phi_{n}^{-1}(0)$. \subsection{Structure of Partial KW nilfibre}\label{ss:partialKWnilfibre} Our goal in this section is to describe the structure of the nilfibre $\Phi_{n}^{-1}(0)$ of the partial KW map (see Notation \ref{nota:partialnil}). This will be achieved by degenerating a generic fibre $\Phi_{n}^{-1}(\Phi_{n}(x))$ to $\Phi_{n}^{-1}(0)$ together with the Luna slice theorem. We recall the basic ingredients of Luna's slice theorem. Let $M$ be a complex reductive algebraic group acting linearly on a finite dimensional vector space $V$. Let $M\cdot v$ be a closed $M$-orbit in $V$ and note that the stabilizer $M_{v}$ is reductive. Hence, we may find a representation $\mbox{${\mathfrak s}$}$ of $M_{v}$ such that $V \cong T_{v}(M\cdot v)\oplus \mbox{${\mathfrak s}$}$ as $M_{v}$-modules. The representation $\mbox{${\mathfrak s}$}$ is called the slice representation at $v$. Let $q:\mbox{${\mathfrak s}$}\to \mbox{${\mathfrak s}$}// M_{v}$ be the GIT quotient for the slice representation, and let $\mathfrak{N}_{\mbox{${\mathfrak s}$}}:=q^{-1}(0) = \{ y \in \mbox{${\mathfrak s}$} : 0 \in \overline{M\cdot y}\}$ be the nullcone of the slice representation. Consider the GIT quotient $\pi: V\to V//M$ for the $M$-action on $V$. The Luna slice theorem asserts that the $M$-equivariant morphism \begin{equation}\label{eq:Lunaiso} M\times_{M_{v}}(v+\mathfrak{N}_{\mbox{${\mathfrak s}$}})\stackrel{\cong}{\to} \pi^{-1}(\pi(v))\mbox{ given by } (g, v+n)\mapsto g\cdot (v+n) \end{equation} is an isomorphism, where $g \in M$ and $n\in\mathfrak{N}_{\mbox{${\mathfrak s}$}}$ (Theorem 6.6 of \cite{VP}, \cite{Luna}). In particular, the $M$-orbits on $\pi^{-1}(\pi(v))$ are in one-to-one correspondence with the $M_{v}$-orbits in $\mathfrak{N}_{\mbox{${\mathfrak s}$}}$. To apply this construction to the $K=SO(n-1)$-action on $\mbox{${\mathfrak g}$}=\mathfrak{so}(n)$, we recall some facts about the involution $\theta$ in Section \ref{ss:symmetricreal}. Suppose that $\mbox{${\mathfrak b}$}\in\mathcal{B}$ is $\theta$-stable, i.e., $\theta(\mbox{${\mathfrak b}$})=\mbox{${\mathfrak b}$}$, and let $\mbox{${\mathfrak t}$}\subset\mbox{${\mathfrak b}$}$ be a $\theta$-stable Cartan subalgebra of $\mbox{${\mathfrak g}$}$. Then the corresponding Borel subgroup $B\subset G$ with $\mbox{Lie}(B)=\mbox{${\mathfrak b}$}$ is also $\theta$-stable and contains the $\theta$-stable Cartan subgroup $T\subset G$ with $\mbox{Lie}(T)=\mbox{${\mathfrak t}$}$. It follows from Lemma 5.1 of \cite{Rich} that $B\cap K$ is a Borel subgroup of $K$ and $T\cap K$ is a Cartan subgroup of $K$. Hence, $\mbox{${\mathfrak b}$}\cap\mbox{${\mathfrak k}$}$ is a Borel subalgebra of $\mbox{${\mathfrak k}$}$ with nilradical $\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$}=[\mbox{${\mathfrak b}$}\cap\mbox{${\mathfrak k}$},\mbox{${\mathfrak b}$}\cap\mbox{${\mathfrak k}$}]$, and $\mbox{${\mathfrak b}$}\cap\mbox{${\mathfrak k}$}$ contains the Cartan subalgebra $\mbox{${\mathfrak t}$}\cap\mbox{${\mathfrak k}$}$ of $\mbox{${\mathfrak k}$}$. Recall the notion of a standard Borel subalgebra in Definition \ref{dfn:std}. We will make use of the following notation throughout this section. \begin{nota}\label{nota:thetastable} Let $\mathcal{B}^{\theta}\subset\mathcal{B}$ denote the set of $\theta$-stable Borel subalgebras of $\mbox{${\mathfrak g}$}$. We denote by $\mathcal{B}^{\theta}_{std}\subset \mathcal{B}^{\theta}$ the subset of standard $\theta$-stable Borel subalgebras of $\mbox{${\mathfrak g}$}$. Similarly, we let \begin{equation*} \mathcal{N}^{\theta}:=\{\mbox{${\mathfrak n}$}=[\mbox{${\mathfrak b}$},\mbox{${\mathfrak b}$}]\mbox{ with } \mbox{${\mathfrak b}$}\in\mathcal{B}^{\theta}\}, \end{equation*} and $$\mathcal{N}^{\theta}_{std}:=\{ \mbox{${\mathfrak n}$}=[\mbox{${\mathfrak b}$},\mbox{${\mathfrak b}$}]\mbox{ with } \mbox{${\mathfrak b}$}\in\mathcal{B}^{\theta}_{std}\}$$ be the collections of the $\theta$-stable nilradicals and $\theta$-stable, standard nilradicals respectively. Note that the standard Borel subalgebra of upper triangular matrices $\mbox{${\mathfrak b}$}_{+}$ in $\mbox{${\mathfrak g}$}$ belongs to the set $\mathcal{B}^{\theta}_{std}$. \end{nota} Recall that $\mbox{${\mathfrak h}$}\subset\mbox{${\mathfrak g}$}$ denotes the standard Cartan subalgebra of diagonal matrices and that $\mbox{${\mathfrak h}$}$ is preserved by $\theta$. Since $\mbox{${\mathfrak b}$}_{+}\in \mathcal{B}^{\theta}_{std}$, it follows that $\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$}$ is a Cartan subalgebra of $\mbox{${\mathfrak k}$}$ with corresponding Cartan subgroup $H\cap K$ of $K$. Let $(\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$ denote the regular semisimple elements of $\mbox{${\mathfrak k}$}$ in $\mbox{${\mathfrak h}$} \cap \mbox{${\mathfrak k}$}$. Then for $x\in (\mbox{${\mathfrak h}$} \cap \mbox{${\mathfrak k}$})_{reg}$, the orbit ${\rm Ad}(K)\cdot x$ is closed in $\mbox{${\mathfrak k}$}$, and thus in $\mbox{${\mathfrak g}$}$, and the isotropy group of $x$ is the Cartan subgroup $H\cap K$ of $K$. Let $\Phi_{\mbox{${\mathfrak k}$}}$ be the $\mbox{${\mathfrak h}$} \cap \mbox{${\mathfrak k}$}$-roots in $\mbox{${\mathfrak k}$}$. Then we may identify $T_{x}({\rm Ad}(K)\cdot x)=[\mbox{${\mathfrak k}$},x] = \oplus_{\alpha \in \Phi_{\mbox{${\mathfrak k}$}}} \mbox{${\mathfrak k}$}_{\alpha}$. Let $\mbox{${\mathfrak s}$}=\mbox{${\mathfrak h}$} + \mbox{${\mathfrak g}$}^{-\theta}$, so that $\mbox{${\mathfrak s}$}$ is a $H\cap K$-slice to ${\rm Ad}(K)\cdot x$ in $\mbox{${\mathfrak g}$}$. Note that the $H\cap K$-nullcone $\mathfrak{N}_{\mbox{${\mathfrak s}$}}=\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$, since $H\cap K$ acts trivially on $\mbox{${\mathfrak h}$}$. We compute $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$ by considering type $B$ and type $D$ separately. Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$ and recall from Example \ref{ex:roottypes} that $H\cap K = H$ and $\mbox{${\mathfrak g}$}^{-\theta}=\oplus_{i=1}^{l} \mbox{${\mathfrak g}$}_{\pm \epsilon_{i}}$. An element of $H\cap K$ is $h=\mbox{diag}[h_{1},\dots, h_{l} ,1, h_{l}^{-1}, \dots, h_{1}^{-1}]$ with $h_{i}\in\mbox{${\mathbb C}$}^{\times}$, and note that if $e_{\pm\epsilon_{i}}$ a root vector of $\mbox{${\mathfrak g}$}_{\pm\epsilon_{i}}$, then ${\rm Ad}(h)\cdot e_{\pm\epsilon_{i}} = h_i^{\pm 1} e_{\pm \epsilon_{i}}$. Hence, if $x=\sum_{i=1}^{l} \lambda_{i} e_{\epsilon_{i}} + \mu_{i} e_{-\epsilon_{i}}$ with $\lambda_i, \mu_i \in \mbox{${\mathbb C}$}$, then \begin{equation*} {\rm Ad}(h)\cdot x=\displaystyle \sum_{i=1}^{l} \lambda_{i} h_{i} e_{\epsilon_{i}}+ \mu_{i} h_{i}^{-1} e_{-\epsilon_{i}}. \end{equation*} It follows that \begin{equation*} 0\in \overline{{\rm Ad}(H)\cdot x} \mbox{ if and only if } \mu_{i}\lambda_{i}=0 \mbox{ for all } i=1,\dots, l. \end{equation*} Now let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$, and note that since $\theta(\epsilon_{l})=-\epsilon_{l}$ by Example \ref{ex:roottypes}, $$ \mbox{${\mathfrak g}$}^{-\theta}= \mbox{${\mathfrak h}$}^{-\theta} \oplus \displaystyle \bigoplus_{i=1}^{l-1} (\mbox{${\mathfrak g}$}_{\epsilon_{i}-\epsilon_{l}}\oplus \mbox{${\mathfrak g}$}_{\epsilon_{i}+ \epsilon_{l}})^{-\theta}\oplus \displaystyle\bigoplus_{i=1}^{l-1}(\mbox{${\mathfrak g}$}_{-(\epsilon_{i}-\epsilon_{l})}\oplus \mbox{${\mathfrak g}$}_{-(\epsilon_{i}+\epsilon_{l})})^{-\theta}. $$ Let $f_{\pm i}$ be a root vector of $\mbox{${\mathfrak g}$}_{\pm(\epsilon_{i}-\epsilon_{l})}$ for $i=1,\dots, l-1$, so that $\mbox{${\mathfrak g}$}^{-\theta} = \mbox{${\mathfrak h}$}^{-\theta} + \sum_{i=1}^{l-1} \mbox{${\mathbb C}$} (f_{\pm i} -\theta(f_{\pm i}))$. Elements of $H\cap K$ are of the form $h=\mbox{diag}[h_{1},\dots, h_{l-1}, 1,1, h_{l-1}^{-1},\dots, h_{1}^{-1}]\subset H$ with $h_{i}\in \mbox{${\mathbb C}$}^{\times}.$ Then ${\rm Ad}(h)\cdot (f_{\pm i} - \theta(f_{\pm i}))=h_i^{\pm 1} (f_{\pm i} - \theta(f_{\pm i}))$. Thus, if $$x=x_{\mbox{${\mathfrak h}$}^{-\theta}}+\sum_{i=1}^{l-1} \lambda_{i}(f_{i}-\theta(f_{i}))+ \mu_{i}(f_{-i}-\theta(f_{-i})),$$ with $x_{\mbox{${\mathfrak h}$}^{-\theta}}\in\mbox{${\mathfrak h}$}^{-\theta}$, then \begin{equation}\label{eq:typeDact} {\rm Ad}(h)\cdot x=x_{\mbox{${\mathfrak h}$}^{-\theta}}+\displaystyle\sum h_{i}\lambda_{i}(f_{i}-\theta(f_{i}))+h_{i}^{-1} \mu_{i}(f_{-i}-\theta(f_{-i})), \end{equation} since $H\cap K$ acts trivially on $\mbox{${\mathfrak h}$}^{-\theta}$. It follows that \begin{equation*} 0\in \overline{{\rm Ad}(H\cap K)\cdot x} \mbox{ if and only if } \mu_{i}\lambda_{i}=0 \mbox{ for all } i=1,\dots, l-1, \mbox{ and } x_{\mbox{${\mathfrak h}$}^{-\theta}}=0. \end{equation*} To describe the irreducible components of $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$, introduce symbols $U$ and $L$ for upper and lower. For a $r_{n-1}$-tuple of symbols $(i_{1},\dots, i_{r_{n-1}})$ where $i_{j}=U$ or $i_{j}=L$ for $j=1,\dots, r_{n-1}$, define \begin{equation}\label{eq:Cdefn} \mathcal{C}_{i_{1},\dots, i_{r_{n-1}}}:=\{x\in \mbox{${\mathfrak g}$}^{-\theta}: \mu_{j}=0\mbox { if } i_{j}=U,\, \lambda_{j}=0 \mbox{ if } i_{j}=L,\mbox{ and } x_{\mbox{${\mathfrak h}$}^{-\theta}}=0 \mbox{ if }\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)\}. \end{equation} We have proved: \begin{lem}\label{lem:nullconeirredcomponets} The irreducible components of $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$ are the $2^{r_{n-1}}$ varieties $\mathcal{C}_{i_{1},\dots, i_{r_{n-1}}} \cong \mbox{${\mathbb C}$}^{r_{n-1}}$. They are indexed by the choices of $r_{n-1}$-tuples $(i_{1}, \dots, i_{r_{n-1}})$, with $i_{j}=U$ or $i_{j}=L$ for $j=1,\dots, r_{n-1}$. \end{lem} We now give a Lie-theoretic description of the components $\mathcal{C}_{i_{1},\dots, i_{r_{n-1}}}$. \begin{lem}\label{l:dim} Let $\mbox{${\mathfrak b}$}\in \mathcal{B}^{\theta}$ with nilradical $\mbox{${\mathfrak n}$}$. Then $\dim \mbox{${\mathfrak n}$}^{-\theta}=r_{n-1}=\mbox{\emph{rank}}(\mbox{${\mathfrak k}$})$. \end{lem} \begin{proof} Since $\mbox{${\mathfrak b}$}\in\mathcal{B}^{\theta}$, $\mbox{${\mathfrak n}$}\in\mathcal{N}^{\theta}$, and therefore \begin{equation}\label{eq:ndim} \dim\mbox{${\mathfrak n}$}=\dim \mbox{${\mathfrak n}$}^{-\theta}+\dim(\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$}). \end{equation} By our discussion above, $\mbox{${\mathfrak n}$} \cap \mbox{${\mathfrak k}$}$ is the nilradical of the Borel subalgebra $\mbox{${\mathfrak b}$}\cap\mbox{${\mathfrak k}$}$ of $\mbox{${\mathfrak k}$}$, so by Equation (\ref{eq:sumri}), $$\dim \mbox{${\mathfrak n}$}=\frac{1}{2}(\dim\mbox{${\mathfrak g}$}-r_{n})=\sum_{i=2}^{n-1} r_{i}, \ \mbox{and} \dim(\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$})=\sum_{i=2}^{n-2} r_{i}.$$ Thus, Equation (\ref{eq:ndim}) becomes $$ \dim \mbox{${\mathfrak n}$}^{-\theta}=\dim \mbox{${\mathfrak n}$}-\dim \mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$}=\displaystyle \sum_{i=2}^{n-1} r_{i}-\displaystyle\sum_{i=2}^{n-2} r_{i}=r_{n-1}. $$ \end{proof} \begin{prop}\label{p:nullconeslice} Let $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$ be the nullcone for the $H\cap K$-action on $\mbox{${\mathfrak g}$}^{-\theta}$, and let $\mathcal{C}_{i_{1},\dots, i_{r_{n-1}}}$ be an irreducible component of $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$. Then there exists $\mbox{${\mathfrak n}$}\in\mathcal{N}^{\theta}_{std}$ such that $\mathcal{C}_{i_{1},\dots, i_{r_{n-1}}}=\mbox{${\mathfrak n}$}^{-\theta}.$ Conversely, if $\mbox{${\mathfrak n}$}\in\mathcal{N}_{std}^{\theta}$, then $\mbox{${\mathfrak n}$}^{-\theta}$ is an irreducible component of $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$ and therefore $\mbox{${\mathfrak n}$}^{-\theta}=\mathcal{C}_{i_{1},\dots, i_{r_{n-1}}}$ for some choice of indices $i_{j}=U,\, L$ as in (\ref{eq:Cdefn}). \end{prop} \begin{proof} We prove the proposition when $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$ is type $D$. The case where $\mbox{${\mathfrak g}$}$ is type $B$ is similar and left to the reader. Suppose $\mathcal{C}_{i_{1},\dots, i_{l-1}}\subset \mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$ is an irreducible component. Then there exists an $x\in (\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$ with $x\in\mbox{${\mathfrak h}$}_{reg}$ such that $\operatorname{ad}(x)$ acts on $\mathcal{C}_{i_{1},\dots, i_{l-1}}$ with positive weights. Indeed, using Equation (\ref{eq:typeDact}), we let $x$ be the element $\mbox{diag}[x_{1},\dots, x_{l-1}, 0,0, -x_{l-1},\dots, -x_{1}]$ with $x_{j}\in \mathbb{Z}$ for $j=1,\dots, l-1$, and satisfying $x_{j}>0$ if $i_{j}=U$, $x_{j}<0$ if $i_{j}=L$, and $x_{j}\neq \pm x_{i}$ for $j\neq i$, and note that $x$ has the desired properties. For $k\in \mathbb{Z}^{+}$, let $\mbox{${\mathfrak g}$}(k)$ be the $k$-eigenspace for the action of $\operatorname{ad}(x)$. Since $x\in\mbox{${\mathfrak k}$}$, the Lie subalgebra $\mbox{${\mathfrak b}$}:=\mbox{${\mathfrak h}$}\oplus \oplus_{k\in\mathbb{Z}^{+}} \mbox{${\mathfrak g}$}(k)$ is $\theta$-stable. Further, since $x$ is regular semisimple in $\mbox{${\mathfrak g}$}$, $\mbox{${\mathfrak b}$}$ is a Borel subalgebra, with nilradical $\mbox{${\mathfrak n}$}=\bigoplus_{k\in\mathbb{Z}^{+}} \mbox{${\mathfrak g}$}(k)$ (Lemma 3.84 of \cite{CoM}). By construction $\mathcal{C}_{i_{1},\dots, i_{l-1}}\subset \mbox{${\mathfrak n}$}^{-\theta}$, and $\mbox{${\mathfrak n}$}\in\mathcal{N}^{\theta}_{std}$. By Lemmas \ref{lem:nullconeirredcomponets} and \ref{l:dim}, $\dim \mathcal{C}_{i_{1},\dots, i_{l-1}} =\dim \mbox{${\mathfrak n}$}^{-\theta}=r_{n-1}$, so that $\mathcal{C}_{i_{1},\dots, i_{l-1}}=\mbox{${\mathfrak n}$}^{-\theta}$. For the converse, let $\mbox{${\mathfrak n}$}\in\mathcal{N}^{\theta}_{std}$ with $\mbox{${\mathfrak n}$}=[\mbox{${\mathfrak b}$},\mbox{${\mathfrak b}$}]$, $\mbox{${\mathfrak b}$}\in\mathcal{B}^{\theta}_{std}$. Then the Cartan subgroup $H\cap K$ of the Borel subgroup $B\cap K$ acts on $\mbox{${\mathfrak n}$}$ and on $\mbox{${\mathfrak n}$}^{-\theta}$ with positive weights. Hence, $\mbox{${\mathfrak n}$}^{-\theta}\subset \mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$. Further, $\mbox{${\mathfrak n}$}^{-\theta}$ is a closed, irreducible subvariety of $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$ of dimension $\dim \mbox{${\mathfrak n}$}^{-\theta}=r_{n-1}$ by Lemma \ref{l:dim}. It follows that $\mbox{${\mathfrak n}$}^{-\theta}$ is an irreducible component of $\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$ and hence $\mbox{${\mathfrak n}$}^{-\theta}$ is of the form $\mathcal{C}_{i_{1},\dots, i_{l-1}}$ by Lemma \ref{lem:nullconeirredcomponets}. \end{proof} Given Proposition \ref{p:nullconeslice}, we define an equivalence relation on $\mathcal{N}_{std}^{\theta}$ by: \begin{equation}\label{eq:equivrelation} \mbox{${\mathfrak n}$}\equiv\mbox{${\mathfrak n}$}^{\prime} \Leftrightarrow \mbox{${\mathfrak n}$}^{-\theta}=(\mbox{${\mathfrak n}$}^{\prime})^{-\theta}. \end{equation} Let $\mathfrak{S}^{-\theta}:=\mathcal{N}_{std}^{\theta}/\equiv$ be the set of equivalence classes of $\mathcal{N}_{std}^{\theta}$ modulo the relation in (\ref{eq:equivrelation}). We shall denote the equivalence class of $\mbox{${\mathfrak n}$}\in\mathcal{N}^{\theta}_{std}$ by $[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}$. \begin{cor}\label{c:countfn} The cardinality of the set of equivalence classes $\mathfrak{S}^{-\theta}$ is $2^{r_{n-1}}$. \end{cor} \begin{proof} The result follows by combining Lemma \ref{lem:nullconeirredcomponets} with Proposition \ref{p:nullconeslice}. \end{proof} We now use the Luna slice theorem and Proposition \ref{p:nullconeslice} to completely describe the fibres $\Phi_{n}^{-1}(\Phi_{n}(x))$ for $x\in (\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$. \begin{thm}\label{thm:genericfibres} Let $x\in (\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$. The irreducible component decomposition of the fibre $\partialfibre$ is \begin{equation}\label{eq:partialfibredecomp} \partialfibre=\displaystyle\bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}^{-\theta}), \end{equation} Further, each irreducible component ${\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}^{-\theta})$ is smooth, and there are exactly $2^{r_{n-1}}$ irreducible components in $\partialfibre$. \end{thm} \begin{proof} By Part (2) of Proposition \ref{prop:flat}, the partial KW map $\Phi_{n}$ is a GIT quotient for $K$-action on $\mbox{${\mathfrak g}$}$. Therefore Equation (\ref{eq:Lunaiso}) implies that we have a $K$-equivariant isomorphism \begin{equation}\label{eq:Kiso} K\times_{H\cap K} (x+\mathfrak{N}_{\fg^{-\theta}})\stackrel{\cong}{\to}\partialfibre\mbox{ given by } (k, x+n)\mapsto {\rm Ad}(k)\cdot (x+n), \end{equation} where $k\in K$ and $n\in\mathfrak{N}_{\mbox{${\mathfrak g}$}^{-\theta}}$. Proposition \ref{p:nullconeslice} implies that the irreducible component decomposition of the fibre bundle $K\times_{H\cap K} (x+\mathfrak{N}_{\fg^{-\theta}})$ is: \begin{equation}\label{eq:bundlecpts} K\times_{H\cap K} (x+\mathfrak{N}_{\fg^{-\theta}})=\displaystyle\bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} K\times_{H\cap K} (x+\mbox{${\mathfrak n}$}^{-\theta}). \end{equation} Equation (\ref{eq:partialfibredecomp}) now follows from (\ref{eq:Kiso}) and (\ref{eq:bundlecpts}). The smoothness of the varieties ${\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}^{-\theta})$ with $\mbox{${\mathfrak n}$}\in\mathcal{N}^{\theta}_{std}$ follows from (\ref{eq:Kiso}) and the fact that the fibre bundles $K\times_{H\cap K} (x+\mbox{${\mathfrak n}$}^{-\theta})$ are smooth. The final statement of the theorem follows from (\ref{eq:Kiso}), (\ref{eq:bundlecpts}), and Corollary \ref{c:countfn}. \end{proof} \begin{lem}\label{l:cpts} Let $x\in(\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$ and $\mbox{${\mathfrak n}$}\in \mathcal{N}_{std}^{\theta}$. Then \begin{equation}\label{eq:cpts} {\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}^{-\theta})={\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}). \end{equation} \end{lem} \begin{proof} Let $\mbox{${\mathfrak b}$}\in\mathcal{B}^{\theta}_{std}$ with $\mbox{${\mathfrak n}$}=[\mbox{${\mathfrak b}$},\mbox{${\mathfrak b}$}]$. Since $\mbox{${\mathfrak b}$}\in\mathcal{B}^{\theta}_{std}$, $\mbox{${\mathfrak b}$}\cap\mbox{${\mathfrak k}$}$ is a Borel subalgebra of $\mbox{${\mathfrak k}$}$ with nilradical $\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$}$ and corresponding Borel subgroup $B\cap K$ of $K$. Since $x\in(\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$, then ${\rm Ad}(B\cap K)\cdot x = x + \mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$}$ by Lemma 3.1.44 of \cite{CG}. Hence, since $\mbox{${\mathfrak n}$}^{-\theta}$ is $B\cap K$-stable, $$ {\rm Ad}(K)\cdot (x+\mbox{${\mathfrak n}$})={\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$}+\mbox{${\mathfrak n}$}^{-\theta})={\rm Ad}(K)\cdot({\rm Ad}(B\cap K)\cdot x+\mbox{${\mathfrak n}$}^{-\theta})={\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}^{-\theta}). $$ \end{proof} Combining Lemma \ref{l:cpts} with Equations (\ref{eq:partialfibredecomp}) and (\ref{eq:cpts}), we can decompose the fibre $\partialfibre$, $x\in(\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$ into irreducible subvarieties as: \begin{equation}\label{eq:genericdecomp} \partialfibre=\displaystyle\bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot (x+\mbox{${\mathfrak n}$}). \end{equation} The following result on closed $K$-orbits in $\mathcal{B} = \mathcal{B}_{\mbox{${\mathfrak g}$}}$ is well-known (figure 4.3 of \cite{Collingwood}). The reader can find a proof in Section 2.7 of \cite{CEspherical}. \begin{prop}\label{p:closedKorbs} (1) Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$, let $\mbox{${\mathfrak b}$}_+$ be the upper triangular matrices in $\mbox{${\mathfrak g}$}$, let $\mbox{${\mathfrak b}$}_{-}:={\rm Ad}(\dot{s}_{\alpha_{l}})\cdot \mbox{${\mathfrak b}$}_{+}$, where $\dot{s}_{\alpha_{l}}$ is a representative of the simple reflection $s_{\alpha_{l}}$, and let $Q_{\mbox{${\mathfrak b}$}_{+}}$ and $Q_{\mbox{${\mathfrak b}$}_{-}}$ be the $K$-orbits on $\mathcal{B}$ containing $\mbox{${\mathfrak b}$}_{+}$ and $\mbox{${\mathfrak b}$}_{-}$ respectively. Then the flag variety $\mathcal{B}$ has two closed $K$-orbits which are $Q_{\mbox{${\mathfrak b}$}_{+}}$ and $Q_{\mbox{${\mathfrak b}$}_{-}}$.\\ (2) Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$, and let $\mbox{${\mathfrak b}$}_+$ be the set of upper triangular matrices in $\mbox{${\mathfrak g}$}$. Then $Q_{\mbox{${\mathfrak b}$}_{+}}$ is the only closed $K$-orbit. \end{prop} \begin{rem}\label{r:thetastableclosed} It is well-known that $\mbox{${\mathfrak b}$}\in\mathcal{B}^{\theta}$ if and only if the $K$-orbit $Q_{\mbox{${\mathfrak b}$}}$ of $\mbox{${\mathfrak b}$}$ in $\mathcal{B}$ is closed in $\mathcal{B}$ (see Proposition 4.12 of \cite{CEexp}). \end{rem} \begin{lem}\label{l:Ksaturation} Let $\mbox{${\mathfrak n}$},\,\mbox{${\mathfrak n}$}^{\prime}\in \mathcal{N}^{\theta}_{std}$, and let $\mbox{${\mathfrak b}$},\, \mbox{${\mathfrak b}$}^{\prime}\in \mathcal{B}^{\theta}_{std}$, with $\mbox{${\mathfrak n}$}=[\mbox{${\mathfrak b}$},\mbox{${\mathfrak b}$}]$ and $\mbox{${\mathfrak n}$}^{\prime}=[\mbox{${\mathfrak b}$}^{\prime},\mbox{${\mathfrak b}$}^{\prime}]$. \begin{enumerate} \item Then ${\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}={\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}^{\prime}$ if and only if $Q_{\mbox{${\mathfrak b}$}}=Q_{\mbox{${\mathfrak b}$}^{\prime}}$. \item If $Q_{\mbox{${\mathfrak b}$}}\neq Q_{\mbox{${\mathfrak b}$}^{\prime}}$, then $[\mbox{${\mathfrak n}$}]\neq [\mbox{${\mathfrak n}$}^{\prime}]$ in $\mathfrak{S}^{-\theta}$. \end{enumerate} \end{lem} \begin{proof} The sufficiency of (1) is clear. For the necessity, suppose that ${\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}={\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}^{\prime}$, and let $e\in\mbox{${\mathfrak n}$}$ be principal nilpotent. Then $e={\rm Ad}(k)\cdot e^{\prime}$ for some $k\in K$, and $e^{\prime}\in\mbox{${\mathfrak n}$}^{\prime}$ principal nilpotent. Thus, $e\in \mbox{${\mathfrak b}$}\cap{\rm Ad}(k)\cdot \mbox{${\mathfrak b}$}^{\prime}$. But since $e$ is principal nilpotent, it is contained in a unique Borel subalgebra (Proposition 3.2.14 of \cite{CG}), forcing $\mbox{${\mathfrak b}$}={\rm Ad}(k)\cdot \mbox{${\mathfrak b}$}^{\prime}.$ Thus, $Q_{\mbox{${\mathfrak b}$}}=Q_{\mbox{${\mathfrak b}$}^{\prime}}$. To prove (2), suppose that $[\mbox{${\mathfrak n}$}]=[\mbox{${\mathfrak n}$}^{\prime}]\in\mathfrak{S}^{-\theta}$. Then by Lemma \ref{l:cpts}, we have ${\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$})={\rm Ad}(K)\cdot(x+\mbox{${\mathfrak n}$}^{\prime})$ for any $x\in (\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$. In particular, ${\rm Ad}(K)\cdot(\lambda x+\mbox{${\mathfrak n}$})={\rm Ad}(K)\cdot(\lambda x+\mbox{${\mathfrak n}$}^{\prime})$ for any $\lambda\in\mbox{${\mathbb C}$}^{\times}$. Taking the limit as $\lambda\to 0$, we obtain ${\rm Ad}(K)\cdot \mbox{${\mathfrak n}$}={\rm Ad}(K)\cdot \mbox{${\mathfrak n}$}^{\prime}$, and the assertion in (2) now follows from (1). \end{proof} The following theorem determines the nilfibre. \begin{thm}\label{thm:partialnil} Let $\Phi_{n}:\mbox{${\mathfrak g}$}\to \mbox{${\mathbb C}$}^{r_{n-1}}\times \mbox{${\mathbb C}$}^{r_{n}}$ be the partial KW map (Equation (\ref{eq:partial})). \noindent If $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$, then $\Phi_{n}^{-1}(0)={\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}_{+}$ is irreducible, where $\mbox{${\mathfrak n}$}_{+}=[\mbox{${\mathfrak b}$}_{+},\mbox{${\mathfrak b}$}_{+}]$. \noindent If $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$, then $\Phi_{n}^{-1}(0)={\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}_{+} \cup {\rm Ad}(K)\cdot \mbox{${\mathfrak n}$}_{-}$ has two irreducible components, where $\mbox{${\mathfrak n}$}_{\pm}=[\mbox{${\mathfrak b}$}_{\pm},\mbox{${\mathfrak b}$}_{\pm}]$. \end{thm} \begin{proof} We first prove that $\Phi_{n}^{-1}(0)=\cup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot \mbox{${\mathfrak n}$}$. Let $x\in(\mbox{${\mathfrak h}$}\cap\mbox{${\mathfrak k}$})_{reg}$, and $\lambda\in\mbox{${\mathbb C}$}^{\times}$. Then by Equation (\ref{eq:genericdecomp}), \begin{equation}\label{eq:predeform} \Phi_{n}^{-1}(\Phi_{n}(\lambda x))=\displaystyle\bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot (\lambda x+\mbox{${\mathfrak n}$}). \end{equation} Now consider $\displaystyle\lim_{\lambda\to 0} \Phi_{n}^{-1}(\Phi_{n}(\lambda x))$. Since $\Phi_{n}$ is flat by Part (3) of Proposition \ref{prop:flat}, it follows from Theorem VIII.4.1 of \cite{SGA1} that $\displaystyle\lim_{\lambda\to 0} \Phi_{n}^{-1}(\Phi_{n}(\lambda x))=\Phi_{n}^{-1}\left (\displaystyle\lim_{\lambda\to 0} \Phi_{n}(\lambda x)\right ).$ Therefore, \begin{equation}\label{eq:limit1} \displaystyle\lim_{\lambda\to 0} \Phi_{n}^{-1}(\Phi_{n}(\lambda x)) =\Phi_{n}^{-1}\left (\displaystyle\lim_{\lambda\to 0} \Phi_{n}(\lambda x)\right )= \Phi_{n}^{-1}(\Phi_{n}(0))=\Phi_{n}^{-1}(0). \end{equation} On the other hand, \begin{equation}\label{eq:limit2} \displaystyle\lim_{\lambda\to 0} \displaystyle\bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot (\lambda x+\mbox{${\mathfrak n}$})= \displaystyle \bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot (\displaystyle\lim_{\lambda\to 0} \lambda x+\mbox{${\mathfrak n}$})= \bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot \mbox{${\mathfrak n}$}. \end{equation} By (\ref{eq:limit1}) and (\ref{eq:limit2}), we obtain \begin{equation}\label{eq:gotit} \Phi_{n}^{-1}(0)=\bigcup_{[\mbox{${\mathfrak n}$}]\in\mathfrak{S}^{-\theta}} {\rm Ad}(K)\cdot \mbox{${\mathfrak n}$}, \end{equation} Since each $\mbox{${\mathfrak n}$}\in\mathcal{N}_{std}^{\theta}$ is stabilized by a Borel subgroup $B\cap K$ of $K$, the set ${\rm Ad}(K)\cdot \mbox{${\mathfrak n}$}$ is closed by Lemma 39.2.1 of \cite{TY}. Since each ${\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}$ is evidently irreducible, the distinct ${\rm Ad}(K)\cdot\mbox{${\mathfrak n}$}$ form the irreducible components of $\Phi_{n}^{-1}(0)$. The theorem now follows from Remark \ref{r:thetastableclosed}, Lemma \ref{l:Ksaturation}, and the classification of the closed $K$-orbits on $\mathcal{B}$ given in Proposition \ref{p:closedKorbs}. \end{proof} \begin{rem}\label{r:glncase} For $\mbox{${\mathfrak g}$}=\mathfrak{gl}(n)$ an analogous description of the nilfibre is proven in Proposition 3.10 of \cite{CEeigen}. The reasoning used here gives a simpler determination of the nilfibre than in \cite{CEeigen}. \end{rem} \begin{rem} In upcoming work, we use the Luna slice theorem and Theorem \ref{thm:partialnil} to describe arbitrary fibres of the partial KW map in terms of closed $K$-orbits on $\mathcal{B}$ and closed $K$-orbits on certain partial flag varieties. We determine the $x\in \mbox{${\mathfrak g}$}$ such that $\Phi^{-1}(\Phi(x))_{sreg}\neq \emptyset$ and develop geometric descriptions of $\Phi^{-1}(\Phi(x))_{sreg}$ using the theory of $K$-orbits on $\mathcal{B}$. This is in the same spirit as the main results of \cite{CEKorbs}. \end{rem} \subsection{The orthogonal KW nilfibre} We now use Theorem \ref{thm:partialnil} to show that $\Phi^{-1}(0)_{sreg}$ is empty. \begin{prop}\label{p:nosreg} Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(n)$, with $n>3$, and let $\Phi: \mbox{${\mathfrak g}$}\to \mbox{${\mathbb C}$}^{r_{2}}\times \dots\times \mbox{${\mathbb C}$}^{r_{n}}$ be the KW map. Then $\Phi^{-1}(0)_{sreg}=\emptyset.$ \end{prop} To show Proposition \ref{p:nosreg}, we first observe that the nilfibre of the partial KW map $\Phi_{n}^{-1}(0)$ has no $n$-strongly regular elements. The key observation is the following proposition, which can be viewed as an extension of Proposition 3.8 in \cite{CEKorbs}. \begin{prop}\label{prop:overlaps} Let $n>3$, let $\mbox{${\mathfrak g}$}=\mathfrak{so}(n)$, and let $K=SO(n-1)$. Let $Q\subset \mathcal{B}$ be a closed $K$-orbit, and let $\mbox{${\mathfrak b}$}\in Q$, with nilradical $\mbox{${\mathfrak n}$}$. Then \begin{equation}\label{eq:fncentralizers} \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(\mbox{${\mathfrak n}$})\neq 0. \end{equation} \end{prop} \begin{proof} By $K$-equivariance, it suffices to show (\ref{eq:fncentralizers}) for a representative $\mbox{${\mathfrak b}$}$ of the closed $K$-orbit $Q$. By Proposition \ref{p:closedKorbs}, we can assume that the standard diagonal Cartan subalgebra $\mbox{${\mathfrak h}$}$ is in $\mbox{${\mathfrak b}$}$. Let $\phi \in \Phi^{+}(\mbox{${\mathfrak g}$}, \mbox{${\mathfrak h}$})$ be the highest root of $\mbox{${\mathfrak b}$}$. We claim for $n>4$ that $\phi$ is compact imaginary. It then follows that the root space $$ \mbox{${\mathfrak g}$}_{\phi}\subset \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$})\cap\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(\mbox{${\mathfrak n}$}), $$ and the result follows. For the claim, suppose first that $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l)$. By Part (2) of Proposition \ref{p:closedKorbs}, we can assume that $\mbox{${\mathfrak b}$}=\mbox{${\mathfrak b}$}_{+}$. The highest root is then $\epsilon_{1}+\epsilon_{2}$, which is compact imaginary for $l>2$ (Example \ref{ex:roottypes}). If $\mbox{${\mathfrak g}$}=\mathfrak{so}(2l+1)$, then by Part (1) of Proposition \ref{p:closedKorbs}, we can assume that $\mbox{${\mathfrak b}$}=\mbox{${\mathfrak b}$}_{+}$ or $\mbox{${\mathfrak b}$}=\mbox{${\mathfrak b}$}_{-}={\rm Ad}(\dot{s}_{\alpha_{l}})\cdot \mbox{${\mathfrak b}$}_{+}$. For both $\mbox{${\mathfrak b}$}_{+}$ and $\mbox{${\mathfrak b}$}_{-}$, the highest root is $\epsilon_{1}+\epsilon_{2}$, which is compact imaginary (Example \ref{ex:roottypes}). If $\mbox{${\mathfrak g}$}=\mathfrak{so}(4)$, then $\phi=\epsilon_{1}+\epsilon_{2}$ is complex $\theta$-stable. Since $\mbox{${\mathfrak n}$}$ is abelian in this case, and $\mbox{${\mathfrak n}$}$ is $\theta$-stable by Remark \ref{r:thetastableclosed}, $(\mbox{${\mathfrak g}$}_{\phi} \oplus \mbox{${\mathfrak g}$}_{\theta(\phi)})^{\theta}\subset \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$})\cap \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(\mbox{${\mathfrak n}$})$. \end{proof} \begin{cor}\label{c:nonsreg} Let $n>3$, and let $\Phi_{n}:\mbox{${\mathfrak g}$}\to \mbox{${\mathbb C}$}^{r_{n-1}}\oplus \mbox{${\mathbb C}$}^{r_{n}}$ be the partial Kostant-Wallach map. Then $\Phi_{n}^{-1}(0)$ contains no $n$-strongly regular elements. \end{cor} \begin{proof} Suppose $x \in \Phi_{n}^{-1}(0)$, so by Theorem \ref{thm:partialnil}, $x$ is contained in $\mbox{${\mathfrak n}$}$, the nilradical of a Borel subalgebra $\mbox{${\mathfrak b}$}$ with $Q_{\mbox{${\mathfrak b}$}}\subset\mathcal{B}$ closed. By Proposition \ref{prop:overlaps}, there is a nonzero element $y$ of $\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(\mbox{${\mathfrak n}$}\cap \mbox{${\mathfrak k}$}) \cap \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(\mbox{${\mathfrak n}$})$. By Remark \ref{r:thetastableclosed}, $x_{\mbox{${\mathfrak k}$}}\in\mbox{${\mathfrak n}$}\cap\mbox{${\mathfrak k}$}$, so that $y\in\mbox{${\mathfrak z}$}_{\mbox{${\mathfrak k}$}}(x_{\mbox{${\mathfrak k}$}})\cap \mbox{${\mathfrak z}$}_{\mbox{${\mathfrak g}$}}(x) $, and therefore $x$ is not $n$-strongly regular. \end{proof} \begin{rem}\label{r:lowdim} The assertion of the corollary is false for $n=3$. In this case, $\mathfrak{so}(3)\cong \mbox{${\fs\fl}$}(2)$ and $\mbox{${\mathfrak k}$}=\mbox{${\mathfrak h}$}\subset \mbox{${\fs\fl}$}(2)$, where $\mbox{${\mathfrak h}$}$ is the standard Cartan subalgebra of $\mbox{${\fs\fl}$}(2)$. Further, the KW map for $\mathfrak{so}(3)\cong\mbox{${\fs\fl}$}(2)$ coincides with the partial KW map for $\mathfrak{so}(3)\cong \mbox{${\fs\fl}$}(2)$. In this case, it follows by Proposition 3.11 from \cite{CEeigen} that each irreducible component of $\Phi_{n}^{-1}(0)$ contains strongly regular elements. \end{rem} \begin{proof}[Proof of Proposition \ref{p:nosreg}] It follows from Proposition \ref{prop:fullsreg} that $x\in\mbox{${\mathfrak g}$}_{sreg}$ if and only if $x_{i}\in(\mbox{${\mathfrak g}$}_{i})_{i-sreg}$ for all $i$. Thus, if $x\in \Phi^{-1}(0)_{sreg}$, then $x_{i}\in \Phi_{i}^{-1}(0)_{i-sreg}$, for all $i=3,\dots, n$ where $\Phi_{i}:\mbox{${\mathfrak g}$}_{i}\to\mbox{${\mathbb C}$}^{r_{i-1}}\times \mbox{${\mathbb C}$}^{r_{i}}$ is the partial KW map for $\mbox{${\mathfrak g}$}_{i}$. But Corollary \ref{c:nonsreg} implies that $\Phi_{i}^{-1}(0)_{i-sreg}=\emptyset$ for all $i=4,\dots, n$, and therefore $\Phi^{-1}(0)_{sreg}=\emptyset$. \end{proof} Let $I_{GZ}$ be the ideal of $\mbox{${\mathbb C}$}[\mbox{${\mathfrak g}$}]$ generated by the GZ functions $J_{GZ}$ in Equation (\ref{eq:GZfuns}). We can use Proposition \ref{p:nosreg} to determine when the ideal $I_{GZ}$ is radical. \begin{cor}\label{c:notrad} Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(n)$. Then the ideal $I_{GZ}$ is radical if and only if $n=3$. \end{cor} \begin{proof} By Theorem 18.15(a) of \cite{Eis}, the ideal $I_{GZ}$ is radical if and only if the set of differentials $\{df(x): f \in J_{GZ} \}$ is linearly independent on an open, dense subset of each irreducible component of $\Phi^{-1}(0)$. It follows from Definition-Notation \ref{dfnote:sreg} that $I_{GZ}$ is radical if and only if each irreducible component of $\Phi^{-1}(0)$ contains strongly regular elements. But it follows from Proposition \ref{p:nosreg} and the case of $\mathfrak{so}(3)$ in Remark \ref{r:lowdim} that each irreducible component of $\Phi^{-1}(0)$ contains strongly regular elements if and only if $n=3$. \end{proof} Using Proposition \ref{p:nosreg}, we can see that there is no orthogonal analogue of the Hessenberg matrices, which play an important role for $\mathfrak{gl}(n)$ (Equation (\ref{eq:Hessenberg})). \begin{cor}\label{c:noHess} Let $\mbox{${\mathfrak g}$}=\mathfrak{so}(n)$ with $n>3$. There is no subvariety $\mathfrak{X}\subset\mbox{${\mathfrak g}$}$ such that the restriction of the KW map to $\mathfrak{X}$ is an isomorphism: $$ \Phi:\mathfrak{X}\to \mbox{${\mathbb C}$}^{r_{2}}\times\dots \times \mbox{${\mathbb C}$}^{r_{n}}. $$ \end{cor} \begin{proof} The existence of such a subvariety $\mathfrak{X}$ would imply that every fibre of the KW map contained strongly regular elements, contradicting Proposition \ref{p:nosreg}. \end{proof} \begin{rem} In upcoming work, we show that the KW map $\Phi$ is flat in both the general linear and orthogonal cases, so that $\Phi^{-1}(0)$ is an equidimensional variety of dimension $$ \dim \Phi^{-1}(0)=\dim\mbox{${\mathfrak g}$}-\displaystyle\sum_{i=2}^{n} r_{i} =\frac{\dim \mbox{${\mathfrak g}$}-r_{n}}{2}=\dim\mbox{${\mathfrak n}$} $$ using Equation (\ref{eq:sumri}). This was previously known only for $\mathfrak{gl}(n)$ by work of Ovsienko \cite{Ov, Futfilt}. We use this result to study the category of Gelfand-Zeitlin modules for the enveloping algebra $U(\mbox{${\mathfrak g}$})$ of $\mbox{${\mathfrak g}$}$ studied by Futorny, Ovsienko, and others \cite{DFO, Futfibres}. This enables us to extend known results for Gelfand-Zeitlin modules for $\mathfrak{gl}(n)$ to the orthogonal case. \end{rem} \bibliographystyle{amsalpha.bst}
\section{Introduction} Cardiovascular diseases (CVDs) continue to be the leading cause of morbidity and mortality worldwide. An estimated 17.5 million people died from CVDs in 2012, representing 31\% of all global deaths (WHO 2015). Cardiac auscultation using stethoscope has been a classic procedure for screening heart abnormalities. Heart sound (Phonocardiogram i.e. PCG) auscultation though being noninvasive and inexpensive to capture, has limitations: dependency on hearing sense to judge unbiasedly, and precise skill which takes years of experience to gain, therefore, are not fully reliable. However, digital signal processing on PCG has shown a high correlation with the evaluation of primary healthcare and cardiac defects, which makes it a popular choice. Therefore, intelligent agent over auscultation would assist medical practitioners with decision support abilities. Heart sounds consist of two fundamental / primary beats, called S1 \& S2 (sounds like `lub' \& `dub'), occurring sequentially in time domain. A single mechanical cycle of heart, or cardiac cycle, produces an S1 sound when the closing of the mitral \& tricuspid valves occur followed by Systole then an S2 sound by the closing of the pulmonary \& aortic valves followed by Diastole. This ideal blood flow in the heart is streamlined; thus interbeat sounds are minimal; however, turbulence in the blood flow due to structural defects and other diseases in the heart creates vibration in the surrounding tissue, thus creating audible noise, called pathologic murmur. Murmurs have diverse and wider frequency ranges of sound compared to primary heart sound (S1 \& S2) and depending on their nature they can be as high as 600 Hz. Murmurs are one of the pathological indicators of abnormalities in the heart, which needs medical attention. Functional, or innocent murmurs are caused due to physiologic conditions outside the heart, which are benign and not included in this study. Murmurs, depending upon the position in the cardiac cycle can be further classified into systolic and diastolic murmurs; however, they quickly get mixed up with cardiac beats which makes it difficult to identify by our hearing sense. Therefore, we need an automatic classifier which perceives inherent features of PCG to discriminate normal and murmur heart sound. In recent times, PCG murmur detection has been an active area of research, with various studies centering on the determination of a multitude of features extraction which correlates to murmur, mostly related to time, frequency, morphological, parametric modeling and spectral properties of heart sounds. In \cite{liang1998feature}, Liang et al. have extracted features based on coefficients of wavelet packet decomposition to classify heart sound into physiological and pathological murmurs. Features were introduced to a neural network to get 85\% accuracy. However, it does not provide information about the normal class or noisy recordings which might have a similar pattern in wavelet space, thus difficult to segregate. In \cite{sharif2000analysis}, Sharif et al. have taken instantaneous energy and frequency estimation (central finite difference frequency estimation and zero crossing frequency estimation) of heart sound for the classification. In \cite{ari2010detection}, Ari et al. have extracted wavelet-based features to discriminate normal and abnormal heart sound using modified Support Vector Machine (Least Square SVM) - which introduces Lagrange multiplier based on Least Mean Square algorithm. In \cite{delgado2009digital}, Delgado et al. have used perceptual \& fractal features to understand the temporal patterns of the heart sound murmur, in which fractals have shown significant performance boost over other. Yoshida et al. \cite{yoshida1997instantaneous} have analyzed the systolic duration of heart sound using instantaneous frequency from averaged Wigner-Ville distribution for the characterization of PCG. In \cite{rubin2017recognizing}, Rubin et al. have used deep learning approach to classify the time-frequency heat maps using a convolutional neural network (CNN) which resulted into 0.73 sensitivity and 0.95 specificity on Physionet Challenge 2016 \footnote{\url{https://www.physionet.org/challenge/2016/}} dataset. Previous studies have mostly focused on the feature extraction based method for classification. However, handcrafted features mostly fail in the on-field test environment, as these features are highly biased towards training dataset. Moreover, number of the prior studies for heart sound classification is flawed because of utilization of carefully-selected data, failure to use a variety of PCG recordings from different demographics and pathological conditions, training and evaluation on clean recordings, etc. Few studies have also used heart sound segmentation to extract features, which is a difficult task on recordings having murmur even with the current state-of-the-art technique \cite{springer2016logistic}. Segmentation can fail miserably due to the presence of noise, artifacts and other sounds including third heart sound `S3', fourth heart sound `S4', and murmur. Heart sounds are inherently prone to interfering noise (ambient, speech, etc.) and motion artifact, which can overlap time location \& frequency spectra of murmur in heart sound. Mumur being mostly pseudo-periodic in nature (assuming noises are random and varying), spectral and temporal sequence analysis best suits the attempt for classification which adapts and tracks the statistical property of the signal over a time-frequency space. Recent advancements in deep learning have shown a promising result; therefore we utilize Convolutional \& Recurrent Neural Network to solve the classification problem. The rest of the paper is organized as follows: Section 2 describes the datasets, pre-processing and feature engineering, the architecture of the proposed network is detailed in Section 3. Section 4 describes the training procedure. Results and observation are explained in section 5, and finally, section 6 concludes the article. \section{Dataset Description} We have used three publicly available heart sound datasets including \begin{enumerate} \item D1 : `Heart Sound \& Murmur Library' \footnote{\url{http://www.med.umich.edu/lrc/psb_open/html/repo/primer_heartsound/primer_heartsound.html}} by University of Michigan \item D2 : `Classifying Heart Sounds Challenge' \footnote{\url{http://www.peterjbentley.com/heartchallenge/}} by Pattern Analysis, Statistical Modelling and Computational Learning (PASCAL). \item D3 : `Physionet Challenge' 2016 dataset\footnote{\url{https://www.physionet.org/challenge/2016/}} by Computing in Cardiology \end{enumerate} Dataset D1 contains in total 23 recordings having various abnormal heart sound out of which 14 were murmur recordings while remaining 9 were the normal category. D2 have in total 585 annotated recordings, out of which 129 are labeled as murmurs (which includes 29 noisy data). Remaining 456 recordings (with 120 noisy data) are labeled normal heart sound which includes recording with artifacts, extrasystole, extra heart sound (S3, S4, and Clicks) and normal. To further enhance the dataset, we have considered D3 with 3240 data (normal and abnormal) collected from patients around the world having various pathological conditions. However, we have considered only normal class 2575 data (including 186 noisy) and have discarded abnormal (665 recordings) heart sound from D3. As an abnormal class in this dataset includes patients recordings having both heart valve defects (including murmur sound) and coronary artery disease (CAD), and Physionet does not provide sub-classification for these recordings. Therefore, combining above datasets, we create a single pool of data having 143 murmur recordings (14 from D1 \& 129 from D2) \& 3040 normal recordings (9 from D1, 456 from D2 \& 2575 from D3). The sampling frequency of dataset was maintained at 2000 Hz. The data length of recordings ranges from less than a second to just above 123 seconds as shown in the figure \ref{fig:length}. \begin{figure}[h] \centering \includegraphics[width=0.5\textwidth]{Histogram.pdf} \caption{Histogram of length of recordings of Normal and Murmur class} \label{fig:length} \end{figure} We have created a challenging dataset in terms of sensor diversity, different demographics, various location of recordings, different pathological conditions (Physionet data were collected from ICU/CCU), the variation of age \& BMI of subjects, variety of noises (ambiance, motion artifacts), varying sampling frequencies, and class imbalance. Therefore, we pursue a generalized classifier learner over the dataset, where deep filters and long-term dependency aggregated by our Deep Neural Network (DNN) architecture learns the highly correlated features with class and are sensor and noise independent. \subsection{Data Segmentation} Due to variation in the length of recordings, sequences are segmented into non-overlapping chunks of 4 sec length each. The analogy behind this duration is to focus on the minute and deep feature to understand murmur rather than learning very long-term dependency which is independent of our study (e.g., Heart Rate Variability and breathing effect). Residual sequences of very short length (< 2 sec) are not guaranteed to provide sufficient murmur information and are thus removed from the data pool, whereas others are padded with trailing zero. After segmentation, we have 10,892 instances of data out of which 272 belongs to murmur class (class ratio nearly equals 39:1 normal:murmur). \subsection{Feature Engineering} Deep learning has provided many tools for automatic feature extraction based on raw data and its annotation, for example, Autoencoder, and Convolutional Neural Network kernels on raw signals to learn important filters. However, these work best for the spatial feature extraction of significantly high-resolution signal compared to our single dimension heart sound. Therefore, in this study, we extract features for the classification of signals. Murmur, being a pseudo-periodic non-stationary high-frequency signal, we need both temporal and spatial trend to discriminate the disease from normal class. This will also reduce biases towards noises (ambiance and motion artifact) which are relatively aperiodic and of varying frequency spectra. Before feature extraction, we apply low pass followed by high pass filters with cutoff frequencies 500Hz and 25Hz respectively. We have also removed noisy spike in the signal using \cite{schmidt2010segmentation} method. We utilize acoustic features: Mel filter based Mel-Frequency Cepstral Coefficients (MFCC), a well-known technique in speech processing, and short-term Fourier transform based spectrogram to find the time-dependent and visual signature of the signal respectively. We use the following method to compute these features : \subsubsection{Spectrogram} \begin{enumerate} \item Signals are divided into small windows of length 128ms and step size of 64ms. \item On each window, Fast Fourier Transform (FFT) is applied with a Hamming window of the length of 128. \item This resulted to spectrogram image of dimension [65 x 61] for a 4 sec heart sound. \end{enumerate} \subsubsection{Cepstrogram (MFCC)} \begin{enumerate} \item Signals are divided into small windows (with window index \begin{math}i\end{math}) of length 25ms and step size of 10ms. \item On each window Discrete Fourier Transform (DFT) \begin{math}D_{i}(k)\end{math} (\begin{math}k \in [1,K]\end{math}, K is length of DFT) are applied with Hamming window of length of 50. \item Spectral power estimate \begin{math}P_{i}(k)\end{math} is computed on the DFT signal for every window. \item 26 Filterbanks channels of triangular band-pass filters (with cutoff frequency range \begin{math}[70,500]\end{math}) followed by log transformation is applied to \begin{math}P_{i}(k)\end{math}. \item Discrete Cosine Transform is finally applied to compute MFCCs with 13 coefficients for each window \begin{math}i\end{math}. \item Cepstral feature of each window are combined to get Cepstrogram sequence of dimension [13 x 398] for a 4 sec heart sound. \end{enumerate} \section{Architecture} In this study, we propose two parallel deep neural networks: Recurrent Neural Network based Bidirectional Long Short-Term Memory (\begin{math}BiLSTM\end{math}) and Convolutional Neural Network (\begin{math}CNN\end{math}) which merges by flattening and concatenating their respective output following fully connected layers with common loss back-propagation path. The LSTM layers utilize the sequence of acoustic MFCCs feature, while the CNN layers use spectral images as input. The schema of the proposed neural network is shown in figure \ref{fig:Architecture}. \begin{figure}[h] \centering \includegraphics[width=0.4\textwidth]{diag.png} \caption{Deep Neural Network Architecture} \label{fig:Architecture} \end{figure} \subsection{CNN} Convolutional layer performs 2-dimensional convolution between the spectral image and the trained filters. To learn the different aspect of the features, numbers of filter channels are used. Thus, when we apply N different filters to the spectrogram, N output filtered images \begin{math}F_{i}\end{math} (\begin{math}i \in [1,N]\end{math}) are computed in the convolutional layer. The filtered images \begin{math}F_{i}\end{math} are forwarded to the pooling layer which evaluates the sub-segments of \begin{math}F_{i}\end{math} and compute maximum value which downsamples the image. This spatial downsampling ensures the most dominant feature in the sub-region is extracted. In the final pooling layer, the resized outputs are flattened in order to connect with the subsequent fully connected layers. \subsection{BiLSTM} LSTM (or RNN) contains hidden layers with self-recurrent weights which enables the cell (nodes) in the memory block to retain past information. This inference of prior information is used for future estimation; thus LSTM is famous for extracting the temporal pattern of the sequence. Bidirectional LSTM (\begin{math}BiLSTM\end{math}) is the modified LSTM which has a bidirectional flow to process the sequence in both forward and backward direction and fed forward to the output layer. Two hidden layers present in \begin{math}BiLSTM\end{math} computes hidden sequences both in forward and backward direction and updates the output layer by using backward layer (from last time step to the first) and forward layer (from first to last time step). In our system, \begin{math}BiLSTM\end{math} learns the temporal trend of MFCC's sequences of the heart sound. \section{Training} To train our network, we need to feed two sets of features (Spectrogram \& MFCC sequence) of every instance simultaneously in the same order in every iteration of the epoch. Therefore, we maintain two ordered datasets for each corresponding features accordingly. For robust performance evaluation, we do 5-fold cross-validation over 10,892 data. However, due to the predominance of class imbalance (nearly 39:1 normal:murmur as quoted earlier), training would be bias towards majority class. Therefore, we augment the minor class in training data in each fold independently by upsampling (repeating minor class) to create balance class training set, however, we have left test data in every fold as it is. Moreover, we also made sure that data segments of the same patient (or subject) are not present in both train and test in any of the folds. This insures non over-optimistic result. \subsection{CNN} Proposed CNN architecture comprises three convolutional layers, two max-pooling layers, and a fully connected layer to flatten the output of \begin{math}CNN\end{math}. The input to this \begin{math}CNN\end{math} is 65x61 spectrogram. In the first convolutional layer, the input is convolved with 4 filters of size 3x3. Batch normalization followed by ReLU activation function was applied on the output of the convolutional filter. First max-pooling layer summarizes and reduces the size of filters using 2x2 kernel. Similarly, two subsequent convolutional layers convolve output of max-pooling layers using 3x3 filter followed by batch normalization and ReLU activations. Final activation output is then flattened and feed to fully connected layer with 128 units. To reduce over-fitting, we used L2-Regularization over all the layers in CNN. \subsection{BiLSTM} In the \begin{math}BiLSTM\end{math} architecture, input sample consist 398 frames with 13-dimensional MFCC features. The network have two \begin{math}BiLSTM\end{math} layers with 128 \begin{math}BiLSTM\end{math} units each and one feed-forward layer with 128 ReLU units similar to CNN output. Dropout was applied to all the layers with keeping probability of 80\%. We built parallel \begin{math}BiLSTM\end{math} and \begin{math}CNN\end{math} structure and combine their outputs (128 each) to form a single fully connected layer with 256 units. Second fully connected layer has 128 units which is connected to output layer containing two softmax nodes identical to the number of class (Normal \& Murmur). The network structure and flow of \begin{math}BiLSTM\end{math} and \begin{math}CNN\end{math} part is portrait in above sub-sections. This combined structure was then trained over the dataset explained above. All the networks were trained using cross-entropy error as the loss function. In each epoch, we set 128 mini-batches in random order (however with same seed over two feature sets to maintain uniformity in order). Learning rate was kept 1E-3 throughout training. \section{Results and Observations} We present a set of performances measures (Sensitivity (the portion of normal class predicted normal), Specificity (the portion of murmur class predicted murmur), \& F1 Score of Normal class) over 5-fold cross-validation as shown in Table \ref{result}. We have provided performance of our network (\begin{math}BiLSTM + CNN\end{math}) and individual \begin{math}CNN\end{math} \& \begin{math}BiLSTM\end{math} networks too which were trained \& tested independently. As we can see \begin{math}CNN\end{math} \& \begin{math}BiLSTM\end{math} networks are bit biased towards Murmur and Normal class respectively. This is because \begin{math}CNN\end{math} network learns visual filters for discrimination; however, it faces difficulties differentiating noisy data of Normal class and Murmur. On the other hand, \begin{math}BiLSTM\end{math} learns the long-term repetitive patterns of the principle heart sound (S1, \& S2) of Normal class but fails to discriminate few instances of Murmur sound which are dominant in periodicity. Therefore, when both networks are combined (\begin{math}BiLSTM + CNN\end{math}) in parallel, we observe the network learns visual as well as the time-dependent aspect of the signal and are a better place to discriminate the classes. \renewcommand{\tabcolsep}{4pt} \begin{table}[h] \centering \caption{5-fold cross-validation results} \label{result} \begin{tabular}{|l|l|l|l|} \hline & \textbf{Sensitivity} & \textbf{Specificity} & \textbf{F1 Score} \\ \hline \begin{math}CNN\end{math} & 0.8704 $\mathbin{\mathpalette\@mypm\relax}$ 0.0137 & 1 $\mathbin{\mathpalette\@mypm\relax}$ 0 & 0.9307 $\mathbin{\mathpalette\@mypm\relax}$ 0.0079 \\ \hline \begin{math}BiLSTM\end{math} & 0.9714 $\mathbin{\mathpalette\@mypm\relax}$ 0.0079 & 0.8549 $\mathbin{\mathpalette\@mypm\relax}$ 0.0636 & 0.9835 $\mathbin{\mathpalette\@mypm\relax}$ 0.0042 \\ \hline \begin{tabular}{@{}c@{}}\begin{math}CNN\end{math} \\ \begin{math}+\end{math} \\ \begin{math}BiLSTM\end{math}\end{tabular} & \textbf{0.9609 $\mathbin{\mathpalette\@mypm\relax}$ 0.0061} & \textbf{1 $\mathbin{\mathpalette\@mypm\relax}$ 0} & \textbf{0.9801 $\mathbin{\mathpalette\@mypm\relax}$ 0.0032} \\ \hline \end{tabular} \end{table} The result shows we are achieving 100\% Specificity \& 96\% Sensitivity, a significant boost from prior arts \cite{sharif2000analysis} \cite{delgado2009digital}. The major positive point of our proposed system lies behind the fact that it does not depends on beat (heart cycle from an S1 to next occurring S1) segmentation algorithm, which has its own sensitivity and specificity, and is independent of onset estimation. \section{Conclusions} In this study, we propose a deep neural network solution to classify Normal and Murmur heart sound signals automatically. The proposed method is trained \& tested using internal 5-fold cross-validation on a large corpus of a diverse dataset comprising of multiple sensor PCG signals with varying degrees of noise, motion artifacts \& pathological conditions. Our system learns the visual and time-dependent properties of the heart sound signal using parallel networks of \begin{math}BiLSTM\end{math} \& \begin{math}CNN\end{math}. The results demonstrate that automated Murmur detection of PCG signal using acoustic MFCC features and Spectrogram trained on our proposed network leads to high performance. \bibliographystyle{ACM-Reference-Format}
\section{Introduction} \IEEEPARstart{H}{igh} impedance fault (HIF) normally exists in distribution power systems with voltages ranging from $4$ kV to $34.5$ kV. Upon the occurrence of HIF, its immediate vicinity is imposed with potential danger, which is hazardous to public safety. Unfortunately, HIFs cannot always be recorded in the fault report to relay engineers and the reported cases are therefore less than what line crews observe from the field. It was revealed in \cite{ref:tengdin1996high} that conventional protection cleared only $17.5\%$ of staged HIFs. With renewable integration into the distribution grids, the importance of HIF detection increases dramatically. Therefore, an effective HIF detection method is required to avoid false tripping and maintain the continuity of power supply. Specifically, an HIF is usually associated with an undowned or downed conductor. The undowned conductor scenario involves the contacts between overhead lines and tree limbs that have large impedance. Similarly, if a downed conductor falls on a poorly conductive surface such as sand, asphalt, grass, soil, and concrete, the fault current might be too low to reach the pickups of traditional ground overcurrent relays. Typical fault currents are reported ranging from $10$ to $50$ amps, with an erratic waveform \cite{ref:tengdin1996high}. It has been decades for researchers and engineers to seek for a universally effective solution to HIF detection. At the early stage, enhancements of conventional relays are proposed, leading to a proportional relaying algorithm \cite{ref:carr1981detection}, impedance-based method \cite{ref:choi2004new}, and PC-based fault locating and diagnosis algorithm \cite{ref:zhu1997automated}. However, these methods are ineffective in detecting HIFs with a low fault current. For this problem, harmonics patterns are utilized to capture HIF characteristics, such as magnitudes and angles of $3^{rd}$ and $5^{th}$ harmonics \cite{ref:yu1994adaptive}, even order harmonic power \cite{ref:kwon1991high}, and interharnomic currents \cite{ref:macedo2015proposition}. Besides, \cite{ref:girgis1990analysis} proposes a Kalman-filter-based method to monitor harmonics in HIF detection. This type of methods actively injects higher than fundamental frequency signals like positive/zero voltage signals \cite{ref:sagastabeitia2012low} into the grid to detect HIFs. Moreover, wavelet transform \cite{ref:elkalashy2008dwt}, genetic algorithm \cite{ref:haghifam2006development} and mathematical morphology \cite{ref:gautam2013detection} are proposed to detect HIFs. Unfortunately, most of these attempts at addressing HIF detection issues rely on simple thresholds and logic, which lacks a systematical procedure that determines the most effective features for various distribution systems and scenarios during HIFs. Therefore, it is getting necessary to introduce a systematic design for a learning framework so that information gain in high-dimensional correlation can be quantified for better HIF detections. For learning, artificial intelligence such as expert system is proposed in the early 90's \cite{ref:kim1990parameter}. After this work, methods using neural networks \cite{ref:kim1991learning}, decision trees \cite{ref:sheng2004decision} and fuzzy inferences \cite{ref:haghifam2006development} are discussed in the subsequent years. In recent years, some data processing techniques including wavelet transform and mathematical morphology are gaining popularity in HIF detection. These techniques supply historical data to several machine learning algorithms (Bayes, nearest neighborhood rule, support vector machine (SVM), etc.) to differentiate fault cases \cite{ref:sedighi2005high,ref:lai2005high,ref:sarlak2013high}. Although the work above reveals the importance of machine learning in HIF detection, they only utilize a certain type of detection features on general HIFs. However, it is unlikely for a certain category to capture all characteristics of HIFs. Actually, various physical features from multiple types of signal processing techniques should be generated to explore the HIF pattern. In addition, the important step of feature selection should not be omitted before applying any learning algorithm. Otherwise, the historical data is not utilized enough for efficient learning in HIF. This paper contributes to use variable-importance-based feature selection method to identify an effective feature set out from a large feature pool. Specifically, we conduct a systematic design of HIF feature pool by looking into when the fault happens, how long it lasts, and what the magnitude of the fault is. For when, we first calculate different quantities such as active power and reactive power based on voltage and current time series. Then, we use the derivative of these quantities to tell when there is a potential change due to HIF. For how long, we use discrete Fourier transform (DFT) to quantify the harmonics so those suspicious ones can be recorded for later inspection. For what magnitude, we employ Kalman Filter (KF) based harmonics coefficient estimation. Finally, power expert information is integrated into the pool, e.g., the angle difference between zero and negative sequence voltage. Finally, we focus on the power of feature extraction, information ranking, and detection logic, the merits of which keep unchanged under different HIF models. In addition to the feature pool establishment, we also provide a framework for learning: feature ranking for maximizing information gain, HIF detection logic, and performance analysis. Comparing to the signal processing techniques in \cite{ref:elkalashy2008dwt,ref:haghifam2006development,ref:gautam2013detection}, the applications of DFT and KF in this paper are mature, simple, cheap and reliable, which are widely deployed in present digital relays \cite{ref:sel2013421relay} and PMUs \cite{ref:visimax2015pmu}. This paper is organized as follows: Section \ref{sec:HIFmodel} introduces three types of HIF models. Section \ref{sec:proposedfeatures}, \ref{sec:HIFlogic} and \ref{sec:DTLearning} elaborate on the proposed systematical method of detecting HIFs, from the feature selection method to the generation of detection logic, and the suggested performance analysis. The conclusions are presented in the last section. \section{High Impedance Fault Modeling} \label{sec:HIFmodel} \begin{comment} HIF simulation model. Two inverse-connected DC plus variable resistors. Diagram 1) HIF model; 2) HIF waveforms. 3) V-I characteristics. Arcing Model. Math equations of arcing model. \end{comment} Although HIF phenomena are difficult to model in general, there are mainly three ways to model HIFs including both downed and undowned types for analysis. Each way provides acceptable similarity with real HIFs from its own perspective. In the following, we briefly explain each of them and the motivation behind the chosen model. \begin{itemize} \item The first one is called the transient analysis of control systems (TACS) controlled switch, as proposed in \cite{ref:wai1998novel}. This model emulates arc conduction, re-ignition and extinction. The advantage of this model is the adjustable phase difference between the applied voltage and fault current. \item The second way originates from the Kizilcay model \cite{ref:kizilcay1991digital}, which utilizes a dynamic arc model derived from the viewpoint of control theory based on the energy balance in the arc column \cite{ref:zhang2016modelbased}. \item The third way of modeling HIF is the employment of two anti-parallel DC-sources connected via two diodes, plus two variable resistors. The nonlinear impedances was included to add the non-linearity of fault current \cite{ref:yu1994adaptive}. Later on, the model is extended with two anti-parallel DC-sources connected via two diodes \cite{ref:emanuel1990high}, which modeled the asymmetric nature, as well as the intermediate arc extinction around current zero. The above model was then modified by adding one \cite{ref:sheng2004decision} or two \cite{ref:lai2005high} variable resistances in series with the DC sources. This kind of model is able to model the effective impedance and thus the randomness of the resulting fault current. \end{itemize} In this paper, we employ the third model (see Appendix \ref{sec:Journal2017AppHIFmodel} for details) due to its easiness of implementation in Matlab Simulink for multiple simulations to realize the proposed machine learning-based method. In addition, this model is further improved here by replacing the two variable resistors with two controlled resistors. Each controlled resistor has an integrator to represent the moisture changing process in the vicinity of the point of contact of the conductor with the ground, a randomizer to introduce more randomness during HIF and a first-order transfer function to tune the response to the introduced randomness. This model therefore becomes more accurate than the one in \cite{ref:lai2005high} since the moisture change and system dynamic response are incorporated. The obtained HIF current waveforms are presented in Fig. \ref{fig:hifcurrentmodel}, which clearly displays the irregular, random, asymmetric and decreasing current waveforms upon the HIF. Meanwhile, the course of arc extinction is depicted as well around small current in this figure. It not only highlights the capability of the employed model on arc extinction modeling but also the moisture changing process. Test results of this HIF model reveal a good modeling performance and are validated in the simulation \cite{ref:gautam2013detection} and field test results \cite{ref:elkalashy2007modeling}. \begin{figure}[!htb] \centering \includegraphics[width=3.9in]{Figures/plot_HIF_moisture_current_voltage_waveform2.pdf} \centering \caption{The current waveforms upon HIF. The upper waveform shows the instantaneous and RMS HIF currents during $1$ sec. The lower waveform is zoomed in from the upper waveform from $0.5$ to $0.6$ sec.} \label{fig:hifcurrentmodel} \end{figure} \vspace{-4mm} \section{Feature Selection Method for High Impedance Fault} \label{sec:proposedfeatures} Feature selection helps HIF detection identify key feature set and reduce data amount/layers, which increases the applicability of the method. Therefore, we elaborate on the way of selecting the proposed key features in this section. The variable-importance in feature evaluation is firstly explained, followed by the pool of features and selected features. The way of obtaining the feature pool data is highlighted in the end. \vspace{-4mm} \subsection{Variable-importance in Feature Evaluation} \label{sec:variableimportance} \begin{comment} Theory and equations. source: C:\Users\Install\Dropbox\Research\University\Papers\HighImpedanceFault\Relevant papers\variable-importance.pdf \end{comment} The decision-tree-based algorithm in machine learning provides protection engineers with optimal relay logic and settings in distribution network protection \cite{ref:cui2017islanding}. However, it is of significant challenge to locate the key features of HIF given its randomness and irregularity. In other words, an effective and unbiased feature evaluator is required to calculate the merit of each tested feature before the classification between HIF event and non-HIF event. Here, we take advantages of the information gain and minimum description length (MDL)-based discretization algorithm to select important features during HIF. For the convenience of power background readers, we call MDL score the variable of importance in this paper. The MDL-based method relies on the information gain (also known as entropy). Once the information gain of each feature is calculated for the classification variable, those features that contribute more information will have a higher information gain value over others, whereas those that do not add much information will have a lower score and can be removed. The score of variable-importance is one type of selection measures in machine learning. The problem of selecting the best attribute can be stated as the problem of selecting the most compressive attribute \cite{ref:ming1997introduction}. Assuming that all features are discrete, the objective is to find the best features that maximize the selection measure. ``$n..$" denotes the number of training instances and ``$n_{i.}$" is the number of training instances from class $C_i$, $n_{.j}$ is the number of instances with the $j$-th value of the given attribute, and $n_{ij}$ is the number of instances from class $C_i$ and with the $j$-th value of the given attribute. Given $C$ classes, the $MDL$ can be defined as follows using the logarithm of all possible combinations of class labels: \begin{equation}\label{eq:paretomle2} \begin{aligned} \text{MDL}=\frac{1}{n..}\Big(\tbinom{n..}{n_{1.},...,n_{C.}}-\sum_{j} \log \tbinom{n_{.j}}{n_{1j},...,n_{Cj}} \\ +\log \tbinom{n..+C-1}{C-1}-\sum_{j} \log \tbinom{n_{.j}+C-1}{C-1}\Big) \end{aligned} \end{equation} In this paper, we use the $MDL$ value to differentiate the merit of each detection feature for the classification between HIFs and non-HIFs. More details regarding the derivation of (\ref{eq:paretomle2}) can be found in Appendix \ref{sec:variableimportanceappendix}. \subsection{The Pool of Candidate Features} \label{sec:candidatafeature} In this study, $245$ features are investigated as candidate features. For example, the feature pool in Table \ref{tab:featuretype} is designed in four steps. Firstly, the time series data of voltage and current is obtained through with the DFT-based technique. Upon the aforementioned data, the feature pool is greatly expanded with multiple physical quantities through calculation in the second step. These calculated measurements range from the basic value (e.x. $df$, frequency) to the first order derivative (e.x. $df/dt$, the rate of change of frequency), considering both the absolute value and its changing rate. Thirdly, the harmonic coefficients are estimated through the KF-based technique, presenting the in-phase and in-quadrature components, i.e. $KF\_I\_sin\_H1$. Lastly, in order to capture some unconventional phenomena, some features are invented in the category of "other feature". For example, $\theta_{V_{2}}-\theta_{V_{0}}$, the angle difference between the negative and zero sequence voltage, is a good indicator of the unbalance level in distribution grids. Note that harmonic phase angles are in harmonic degrees and are the phase difference between the zero crossing of the fundamental frequency reference and the next zero crossing in the same direction of the harmonic. \begin{remark} These features are extracted mainly through two techniques: discrete Fourier transform (DFT) and Kalman filter (KF). Both techniques are simple, reliable and implementable in engineering fields. The DFT is used to capture the majority of physical quantities in fault detection as is widely used in microprocessor-based relays. On the other hand, the utilization of the KF-based algorithm is motivated by the fact that it can accurately track the harmonics and inter-harmonics coefficients at given frequency components embedded in the input signals. \end{remark} \vspace{-5mm} \begin{table}[!hbt] \renewcommand{\arraystretch}{1.3} \caption{Feature Pool.} \label{tab:featuretype} \centering \begin{tabular}{ccc} \hline \hline Feature Type & Designed Feature & Other Feature\\ \hline \multirow{7}{*}{DFT-based} & $df, df/dt, P, dP/dt, pf, $ & $df/dP, df/dQ,$ \\ & $dpf/dt, Q, dQ/dt, \phi, d\phi/dt, $ & $dV/dP, dV/dQ,$ \\ & $H_{V1}\sim H_{V6}, H_{I1}\sim H_{I6},$ & $dH_{V1}/dt\sim dH_{V6}/dt,$\\ & $V_{abc}, V_{012}, I_{abc}, I_{012}, dI/dt, $ & $\theta_{V_{2}}-\theta_{V_{0}},\theta_{I_{2}}-\theta_{I_{0}} $ \\ & $dV/dt, V_{ph}, V_{ll}, \theta_{V_{012}}, \theta_{I_{012}}, $ & \\ & $\theta_{H_{V1\_012}}, \theta_{H_{I1\_012}}$ & \\ \hline \multirow{4}{*}{KF-based} & $KF\_I\_cos\_H1\sim H6, $ & $KF\_V\_DC$\\ & $KF\_I\_sin\_H1\sim H6, $ & \\ & $KF\_V\_cos\_H1\sim H6, $ & \\ & $KF\_V\_sin\_H1\sim H6 $ & \\ \hline \hline \end{tabular} \vspace{-3mm} \end{table} \vspace{-2mm} \subsection{Systems and Events for Feature Selection} \label{sec:syseveanalysis} \subsubsection{Benchmark System} \label{sec:benchmarksys} The benchmark system utilized can be found form Appendix \ref{sec:appbenchmarksys}. The system configuration under different DER Technologies is presented in Table \ref{tab:sysconfig}. \begin{table}[!hbt] \renewcommand{\arraystretch}{1.3} \caption{System Configuration under Different DER Technologies. } \label{tab:sysconfig} \centering \begin{tabular}{ccc} \hline \hline System Type & Location A & Location B\\ \hline Synchronous-machine-based system & SG & N/A\\ \hline Inverter-based system & WF & N/A\\ \hline Hybrid system & SG & WF\\ \hline \hline \end{tabular} \begin{tablenotes} \small \item SG, WF and N/A stand for the synchronous generator, wind farm and ``not available`` respectively. \end{tablenotes} \end{table} \subsubsection{Events Under Study} \label{sec:syseve} The technique is transferable on different feeders because the event category and event type in Table \ref{tab:eventcategory} are suitable for most of distribution feeders during the training. Moreover, the event category is flexible and can be tailored for other special systems by adding or deleting some of the event categories/types. In this case study, comprehensive scenarios are considered in the event category (refer to Table \ref{tab:eventcategory}). A loading condition ranging from $30\%$ to $100\%$, in a step of $10\%$, is simulated. Furthermore, eight loading conditions and three DG technologies are examined respectively on top of the base case scenario. Therefore, the number of fault and non-fault events are calculated as follows: \begin{itemize} \item Fault event: since two types of fault, summing up to $13$ cases, are included, the number of fault events with one fault impedance, one fault location and one fault impedance is $(10+3)\times8\times3=312$. Given $6$ simulated fault impedances, $4$ fault inception angles and $3$ fault locations, the total number of fault events add up to $312\times6\times4\times3=22464$. \item Non-fault event: it comprises normal state, load switching (adding and shedding) and capacitor switching events. Therefore the total number of non-fault events equals to $(1+6+2)\times8\times3=216$. \end{itemize} The above event number results in an imbalanced dataset, where the number of data points belonging to the minority class (``non-fault``) is far smaller than the number of the data points belonging to the majority class (``fault``). Under this circumstance, an algorithm get insufficient information about the minority class to make an accurate prediction. Therefore, the synthetic minority over-sampling technique (SMOTE) is employed to generate synthetic samples and shift the classifier learning bias towards minority class \cite{ref:chawla2002smote}. \begin{table}[!hbt] \renewcommand{\arraystretch}{1.3} \caption{Event Category of System Under Study.} \label{tab:eventcategory} \centering \begin{tabular}{p{2.2cm}p{4.2cm}p{1.1cm}} \hline \hline Event Category & Event Type & Number of Events\\ \hline System Operating & Loading Condition (30\%-100\%) & 8\\ Condition & DER Tech. (SG, inverter, hybrid) & 3\\ \hline \multirow{5}{*}{Fault Event} & Type 1: SLG, LLG, LL, LLLG & 10\\ & Type 2: Downed conductor & 3\\ & Fault impedance & 6\\ & Inception Angle ($\SI{0}{\degree}$, $\SI{30}{\degree}$, $\SI{60}{\degree}$, $\SI{90}{\degree}$) & 4\\ & Fault location & 3\\ \hline \multirow{3}{*}{Non-fault Event} & Normal State & 1\\ & Load Switching & 6\\ & Capacitor Switching & 2\\ \hline \hline \end{tabular} \end{table} \subsubsection{Spatial data extraction} The HIF detection method should include spatial data by implementing current and voltage transformers and measurement devices at a substation and the downstream of the feeder. Knowledge extracted from these measurements is able to serve data from the spatial dimension for better detection coverage. Moreover, the proposed HIF detector installed along the distribution feeder is supplementary to the devices installed near the substation. Since the further the HIF is to the substation, the lower the signal magnitude becomes if the HIF detector is installed near the substation. The signal sensitivity and accuracy issues are therefore addressed. \subsection{Effective Feature Set (EFS)} \label{sec:effectiveFS} Finally, we propose an EFS in Table \ref{tab:effectivefeatures} after mining the collected data, applying the feature ranking algorithm and selecting the effective feature set (EFS) by considering the comprehensive performance in different distribution systems in Table \ref{tab:sysconfig}. According to the mathematical formulation and physical interpretation in Section \ref{sec:variableimportance} and \ref{sec:candidatafeature}, the reasons that enhance these features to be used for the fault detection are (1) some physical quantities are statistically more relative to the classification results than others, and (2) based on the merit of each feature, the features in Table IV contribute more information gain than others. For example, $\theta_{V_{2}}-\theta_{V_{0}}$, the angle difference between the negative and zero sequence voltage, is selected since it captures the incremental of the unbalance level contributed from HIFs to distribution grids. The using of the angle difference between zero and negative sequence voltage is inspired by the work in \cite{ref:yu1994adaptive},\cite{ref:huang2014novel}, and the practical engineering experience of the authors. To the best of our knowledge, this feature is utilized in some other fault detection application such as \cite{ref:huang2014novel}, but not in HIF detection before. Table \ref{tab:EFSreference} shows the reference to the unbalanced fault detection features in EFS. \begin{table}[!hbt] \renewcommand{\arraystretch}{1.3} \caption{Effective Feature Set of HIF Detection in Three Types of Distribution Systems.} \label{tab:effectivefeatures} \centering \begin{tabular}{cc} \hline \hline Fault Type & Proposed Feature \\ \hline \multirow{2}{*}{SLG, LL, LLG} & $V_2, I_2, \theta_{V_{2}}-\theta_{V_{0}},\theta_{I_{2}}-\theta_{I_{0}}$ \\ & $KF\_V\_cos\_H3, KF\_V\_sin\_H3$ \\ \hline \multirow{2}{*}{LLLG} & $V_{ll}, V_{ph}, H_{V1}, \theta_{H_{V1\_1}}$\\ & $KF\_I\_cos\_H1, KF\_I\_sin\_H1$ \\ \hline \hline \end{tabular} \end{table} \begin{table}[hbt] \renewcommand{\arraystretch}{1.2} \caption{Reference to the Unbalanced Fault Detection Features in EFS.} \label{tab:EFSreference} \centering \begin{tabular}{cc} \hline \hline Feature in EFS & Reference\\ \hline $V_2$ & \multirow{2}{*}{\cite{ref:yu1994adaptive}, \cite{ref:Laaksonen2017method}} \\ $I_2$ & \\ \hline $\theta_{V_2}-\theta_{V_0}$ & \multirow{2}{*}{\cite{ref:huang2014novel}, \cite{ref:yu1994adaptive}}\\ $\theta_{I_2}-\theta_{I_0}$ & \\ \hline $KF\_V_a\_cos\_H3$ & \cite{ref:yu1994adaptive} (3rd haromnic), \cite{ref:girgis1990analysis} (KF and low-order odd\\ $KF\_V_a\_sin\_H3$ & harmonic), \cite{ref:kamwa20123compliance} (KF harmonic decomposition)\\ \hline \hline \end{tabular} \end{table} \section{High Impedance Fault Detection Logic} \label{sec:HIFlogic} Inspired by the tree structure of the machine learning classifier model, the authors further explore the possibility of relating the EFS and the detection logic using simple thresholds as most of the commercial products \cite{ref:sel2016arc} and patents do \cite{ref:russell1984high}. Statistically, since three-phase faults take up only $2\%-3\%$ of the fault occurrences \cite{ref:blackburn2006protective}, an HIF detection logic is designed in this regard for unbalanced HIF only. The HIF detection logic is targeted to be implemented in a microprocessor-based digital relay, as guaranteed by the selected feature selection techniques discussed in Section \ref{sec:candidatafeature}. Similar to conventional digital relays, the proposed relay logic takes the voltage and current signals as its input. In addition, DFT and KF are required for corresponding feature extraction. Before the explanation of the HIF detection logic, the logic circuit is presented first in Fig. \ref{fig:HIFlogic_general}. Generally, the proposed HIF detection scheme updates its comparison and decision logic according to the obtained decision tree structure. \begin{figure}[!htb] \centering \includegraphics[width=3.6in]{Figures/HIFlogic_general.pdf} \caption{The proposed HIF detection logic scheme.} \label{fig:HIFlogic_general} \vspace{-3mm} \end{figure} As indicated in the detection logic, three-phase voltage and current signals are sent to DFT and KF for feature extraction. This section takes the obtained EFS in Section \ref{sec:proposedfeatures} as an example. (\ref{eq:sdft}) and (\ref{eq:skf}) show the extracted instantaneous signals after the DFT and KF blocks: \vspace{-2mm} \begin{equation} \bar{S}_{DFT}=\{s_1,s_2\,s_3,s_4\}=\{V_2,I_2,\theta_{V_2}-\theta_{V_0},\theta_{I_2}-\theta_{I_0}\} \label{eq:sdft} \vspace{-1mm} \end{equation} \begin{equation} \vspace{-2mm} \begin{aligned} \bar{S}_{KF} & =\{s_5,s_6,s_7,s_8,s_9,s_{10}\}= \{KF\_V_a\_cos\_H3, \\ & KF\_V_b\_cos\_H3, KF\_V_c\_cos\_H3,KF\_V_a\_sin\_H3, \\ & KF\_V_b\_sin\_H3,KF\_V_c\_sin\_H3\} \end{aligned} \label{eq:skf} \end{equation} \vspace{-5mm} \subsection{System Characteristic Averager} The System Characteristic Averager has a memory that stores the signals for a predefined duration of $\bar{T}=\{t_1,t_2,t_3,t_4,t_5,t_6$, $t_7,t_8,t_9,t_{10}\}$. In other words, $\bar{T}$ is the time constant that is a vector of ten elements associated with $\bar{S}_{DFT}$ and $\bar{S}_{KF}$. The signal is firstly calculated and stored at 5 minutes interval \cite{ref:yu1994adaptive}. Simulation or experimental results are then provided to validate the effectiveness of this time constant over a large time scale. In the end, each time constant is either increased or decreased depending on the signal's slow or fast dynamic process. To avoid signal spikes, a limiter is implemented for each signal channel. Meanwhile, the time constant $\bar{T}$ is set according to the system characteristics of each individual signal. A small $t_i$ ($i=1,2,\dotsi,10$) can avoid severe step change of signal but a large $t_i$ costs more data storage and computational efforts. The output of the System Characteristic Averager block provides the reference value $s_{i\_ref}$ ($i=1,2,\dotsi,10$) for the Comparison Logic. A reliable average value is a prerequisite to successful detection. \subsection{Comparison Logic} The block of Comparison Logic is depicted in Fig. \ref{fig:comp_logic}. Based on the feature extraction technique discussed in Section \ref{sec:proposedfeatures}, the extracted instantaneous signal $s_i$ can be understood as the system background signal superimposed by the extra signal contributed from the HIF behavior. The comparison is therefore made between the extracted instantaneous signal $s_i$ and its reference value $s_{i\_ref}$ \cite{ref:yu1994adaptive}. \begin{figure}[!htb] \centering \includegraphics[width=2.4in]{Figures/comp_logic.pdf} \caption{Comparison Logic in the proposed HIF detection logic.} \label{fig:comp_logic} \end{figure} The sensitivity gain of $k_i$ is incorporated in order to 1) set the margin of detection and 2) add a handle to the detection sensitivity. Where the undefined parameter of $\bar{K}$ stands for: \begin{equation} \bar{K}=\{k_1,k_2,k_3,k_4,k_5,k_6,k_7,k_8,k_9,k_{10}\} \end{equation} The sensitivity gain $\bar{K}$ is set at $1.2$ (adjustable for each element). The 20\% above and below margin is adjustable and is taken as typical blackout region where the HIF tripping is not required \cite{ref:yu1994adaptive}. This $k_i$ value can be set to close to $1.0$ after getting more confidence in HIF fault detection scheme. After the summation block in Fig. \ref{fig:comp_logic}, a Sign function is employed to provide the following decision making: \begin{itemize} \item When $x>0$, $y=1$; \item When $x \leqslant 0$, $y=0$. \end{itemize} The output of the comparison logic is the comparison assertion bit of $b_i$ ($i=1,2,\dotsi,10$), the $\bar{B}$, which is the input to the decision logic. \subsection{Decision Logic} As mentioned in the previous subsection, the comparison assertion bit of $b_i$ ($i=1,2,\dotsi,10$) is the output of the comparison logic in Fig. \ref{fig:comp_logic}. The decision logic in Fig. \ref{fig:decisionlogicHIF}, is the execution part of the HIF detection logic. There are four groups of signal bits: \begin{figure}[!htb] \centering \includegraphics[width=2.7in]{Figures/decisionlogicHIF.pdf} \caption{Decision Logic in the proposed HIF detection logic.} \label{fig:decisionlogicHIF} \vspace{-2mm} \end{figure} \begin{enumerate} \item DFT-based assertion bits. The four bits go through an AND gate. If any of the four signals are not asserted, the decision logic will not be set high. \item KF-estimated in-phase components of third harmonic voltage. If none of the three-phase in-phase components of third harmonic estimated from the KF gets asserted, the decision logic will not be set high. \item KF-estimated in-quadrature components of harmonic voltage. If none of the three-phase in-quadrature components of third harmonic estimated from the KF gets asserted, the decision logic will not be set high. \item The blocking bit $b_{block}$. If this bit is $1$, the detection logic is blocked and none of HIF events can be detected; if this bit is $0$, HIF detection is enabled. \end{enumerate} A time delay of $T_D$ is implemented because an appropriate selection of $T_D$ can effectively avoid the false operation resulting from normal switching, which sometimes contributes to third harmonics. The output of the HIF logic is either alarming or tripping signal. \vspace{-2mm} \subsection{Performance Test of the Proposed HIF Detection Logic} \label{sec:performanceHIFlogic} The proposed HIF detection logic is tested under $7884$ new scenarios: $7776$ unbalanced faults and $108$ non-faults. The fault locations under testing include faults near B-$3$, B-$11$, and B-$19$. The detailed analysis regarding fault locations can be found in Section \ref{sec:faultlocationHIFtest}. Similar to the work in \cite{ref:yu1994adaptive} and \cite{ref:gautam2013detection}, the measurement point is at the substation. Its sampling frequency is $2000$ Hz. The time delay in Fig. \ref{fig:decisionlogicHIF} is set to $100$ ms. The average fault detection time is $0.126$ sec using OPAL-RT real-time simulator. The signals measured are the three-phase voltage and current. The features used are derived from the measured signals and can be found in the EFS in the unbalanced fault row of Table IV. Performance comparison with the HIF detection logic in \cite{ref:yu1994adaptive}, as well as the combined conventional relay elements (frequency, over/under voltage, over current) is shown in Table \ref{tab:HIFperformancecomp}. \begin{table}[!hbt] \renewcommand{\arraystretch}{1.3} \caption{HIF Detection Logic Performance comparison.} \label{tab:HIFperformancecomp} \centering \begin{tabular}{ccc} \hline \hline Solution under test & DI (\%) & SI (\%) \\ \hline The proposed EFS and HIF detection logic &98.3&95.7 \\ \hline The HIF detection logic in \cite{ref:yu1994adaptive}& 69.0&90.7 \\ \hline Combined conventional relay elements & \multirow{2}{*}{0} & \multirow{2}{*}{98.2} \\ (frequency, over/under voltage, over current)& & \\ \hline \hline \end{tabular} \end{table} \section{Performance Analysis} \label{sec:DTLearning} Performance analysis includes the most commonly occurring single-line-to-ground-fault, the fault scenario analysis, and the testing results. \vspace{-2mm} \subsection{Single-line-to-ground Fault Analysis} Typical waveforms of the proposed EFS upon single-line-to-ground fault are shown in this subsection. A single-line-to-ground HIF is applied in a hybrid distributed generation system (refer to Fig. \ref{fig:feeder_HIF}) when $t=0.3$ second. Fig. \ref{fig:v20} to \ref{fig:kfh3} shows the EFS' waveforms. \begin{figure}[!htb] \centering \includegraphics[width=3in]{Figures/V2_PES2017_XR22p5.pdf} \caption{Typical negative sequence voltage waveforms under HIF.} \label{fig:v20} \end{figure} \begin{figure}[!htb] \centering \includegraphics[width=3in]{Figures/I2_PES2017_XR22p5.pdf} \caption{Typical negative sequence current waveforms under HIF.} \label{fig:i20} \end{figure} \begin{figure}[!htb] \centering \includegraphics[width=3.2in]{Figures/ang_diff_XR22p5.pdf} \caption{Typical waveforms angle difference between zero and negative sequence voltage and current under HIF.} \label{fig:anglediff} \end{figure} \begin{figure}[!htb] \centering \includegraphics[width=3in]{Figures/KF_H3_XR22p5.pdf} \caption{Typical waveforms of 3rd order in-phase and in-quadrature components under HIF.} \label{fig:kfh3} \end{figure} \subsection{Fault Scenario Analysis} \begin{comment} \end{comment} We evaluate the Effective Feature Set (EFS) in terms of different fault impedances, fault inception angles, and fault locations. The quantifier for evaluation is the variable of importance explained in Section \ref{sec:variableimportance}. \subsubsection{Fault Impedance} \label{sec:faultimpedance} To be practical, this paper investigates the fault impedance up to \SI{500}{\Omega} to cover typical HIFs whose fault currents are as low as $10$ amps. The variable-importance performances of each feature in EFS upon single-line-to-ground (SLG) fault, line-to-line (LL) fault, line-to-line-to-ground (LLG) fault and three-line-to-ground (LLLG) fault are all depicted in Fig. \ref{fig:Rf_slgllg}. It is concluded that: \begin{figure*}[htb!] \centering \subfloat[SLG fault.]{\label{fig:rfslg}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_allangle_diffRf_SLG.pdf}} \subfloat[LL fault.]{\label{fig:rfll}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_allangle_diffRf_LL.pdf}} \\ \subfloat[LLG fault.]{\label{fig:rfllg}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_allangle_diffRf_LLG.pdf}} \subfloat[LLLG fault.]{\label{fig:rflllg}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_allangle_diffRf_LLLG.pdf}} \caption{Variable-importance of all features under faults in a grounded system.} \label{fig:Rf_slgllg} \vspace{-4mm} \end{figure*} \begin{itemize} \item The negative sequence of voltage and current are most reliable features that can keep unaffected during any unbalanced fault upon a varying fault impedance (Fig. \ref{fig:Rf_slgllg}(a), to be noticed that the dark blue line for $V_2$ is covered by other lines with the value of $1$). \item The feature of the angle difference between negative sequence voltage and zero sequence voltage is reliable under LL faults but vulnerable to high fault impedance under SLG and LLG faults (Fig. \ref{fig:Rf_slgllg}(a)-(d)). \item The third harmonic components estimated from KF gets deteriorated when the fault impedance increases under SLG and LL faults (Fig. \ref{fig:Rf_slgllg}(a) and (b)). \item The proposed three-phase HIF detection features are all performing very well except for the fundamental in-quadrature component of current estimated from KF under LLLG faults (Fig. \ref{fig:Rf_slgllg} (d)). \end{itemize} Furthermore, the proposed algorithm is applicable to unbalanced power systems. Since the employed feature selection method is based on the information gain, what is captured by the information gain is the incremental or variation of the negative sequence signal. Only when the variation pattern of the negative sequence feature contributes to the information gain given the output label belongs to the HIF, does this feature get selected by the proposed algorithm. As a result, the proposed method is applicable to an already unbalanced system. \subsubsection{Fault Inception Angle} \label{sec:faultinceptionangle} The affect of fault inception angle is examined as well in this study. The results of unbalanced faults and three phase faults are selectively shown in Fig. \ref{fig:variableimportance}(a)-(c) respectively. The results in these figures include a varying impedance from $30$ $\Omega$ to $500$ $\Omega$. \begin{figure*}[htb!] \centering \subfloat[Feature $\theta_{I_{2}}-\theta_{I_{0}}$ at different fault inception angles.]{\label{fig:inceptionangle_theta_i2_i0}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_faulttype_change_allRf_diffang_angdiffI2I0.pdf}} \subfloat[Feature $KF\_V\_cos\_H3$ at different fault inception angles.]{\label{fig:inceptionangle_KF_V_cos_H3}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_faulttype_change_allRf_diffang_KFVaH3cos.pdf}} \\ \subfloat[LLLG fault features at different fault inception angles.]{\label{fig:inceptionangle_LLLG}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_faulttype_change_allRf_diffang_LLLGfeatures.pdf}} \subfloat[All $R_f$ at different fault locations.]{\label{fig:location_allRf}\includegraphics[width=3.0in]{Figures/vi_1sg1wfgnd_location_change_allinclude.pdf}} \caption{Variable-importance at different fault inception angles and locations.} \label{fig:variableimportance} \vspace{-4mm} \end{figure*} The fault inception angle is an insignificant factor that can perturb variable importance. The angles of $30$\textdegree \space and $60$\textdegree \space result in a subtle decrease in the variable of importance of the KF estimated third harmonic, but the change is limited. For an LLLG fault, the first order harmonic components of current estimated by KF have a performance drop in non-zero angles. \subsubsection{Fault Location} \label{sec:faultlocationHIFtest} The variable-importance of the features in EFS is presented at three fault locations (bus numbers refer to Appendix \ref{sec:appbenchmarksys}): \begin{itemize} \item Location $1$: Fault near Bus B-$3$; \item Location $2$: Fault near Bus B-$11$; \item Location $3$: Fault near Bus B-$19$; \end{itemize} The result is demonstrated in Fig. \ref{fig:variableimportance}(d), including all fault impedance and all fault inception angles in Table \ref{tab:eventcategory}. The feature of negative sequence current keeps being unaffected at each location. However, the negative sequence of voltage is so low at location $1$ and $2$ that the variable of importance becomes almost zero. As the strong voltage source from the substation is ideally balanced, the negative sequence voltage deviation contributed from the HIF is weak. Location $3$ is far from the substation, so the negative sequence voltage becomes a good HIF indicator again. To a negligible extent, it is similar for the variable of importance performance of other features: the further the fault is, the less compromised the features are. \vspace{-3mm} \subsection{Testing Results of the Effective Feature Set (EFS)} The proposed EFS is tested under the aforementioned conditions in Table \ref{tab:eventcategory}, but with data set on different events. $1944$ HIF events and another $1944$ non-HIF events (they are unnecessary to be the same number) are simulated for the training of the HIF detector. The types of testing events are similar to those of training events, but at different locations or with different parameter values. There are totally $972$ HIF and $972$ non-HIF events in the testing. In addition, five classical classifiers (Naive Bayes, Support Vector Machine, k-nearest neighbour, J48 and random forest) from Weka are compared in order to find the best classifier. The results with proposed EFS are shown in Table \ref{tab:classifiers77}, where the accuracy is the ratio of correctly classified event number to the total number of events, dependability index (DI) is the ratio of the detected HIF events to the total number of HIF events and security index (SI) is the ratio of the of detected non-HIF events to the total number of non-HIF events. To limit problems such as over-fitting and inaccuracy in prediction, each classifier model is acquired through the $10$-folder cross-validation. \begin{table}[!hbt] \renewcommand{\arraystretch}{1.3} \caption{Performance of HIF detection with the EFS.} \label{tab:classifiers77} \centering \begin{tabular}{cccc} \hline \hline Classifier & Accuracy (\%) & DI (\%)& SI (\%)\\ \hline NaiveBayes & 78.0 & 73.0 & 82.9\\ \hline LibSVM (Gaussian kernel) & 91.9 & 89.6 & 94.1 \\ \hline k-nearest neighbour & 98.0 & 97.7 & 98.3 \\ \hline J48 & 99.4 & 99.5 & 99.3 \\ \hline RandomForest & 99.7 & 99.7 & 99.8 \\ \hline \hline \end{tabular} \end{table} The EFS is tested in the benchmark system under two typical $X/R$ ratios: $10$ and $22.5$. Both scenarios result in the same EFS. The $X/R$ ratio is not an important factor that affects the proposed method since it does not affect the system unbalance level. \section{Conclusions} \label{sec:concludeHIF} This paper proposes a new framework for HIF detection and classification. By introducing the MDL-based algorithm to rank a pool of systematically designed features, an effective feature set is generated. The detection capability of such a ranked feature set is evaluated through a comprehensive fault analysis on different scenarios. Furthermore, an applicable logic is recommended based on the extensively used techniques of DFT and KF as well as easily implementable logic gates. It is shown that the proposed method achieves significantly enhanced performance in HIF detection with the effective feature set and tree-based classifier such as the random forest. \ifCLASSOPTIONcaptionsoff \newpage \fi \appendices \section{HIF model} \label{sec:Journal2017AppHIFmodel} Fig. \ref{fig:hifantidcmodel} shows the HIF model used in this paper. This model connects one phase of the power line to the ground. Two variable resistors are both changing randomly and model the dynamic arcing resistance. Two sets of diodes and DC sources are connected in an anti-parallel configuration. The two DC sources are randomly varying as well, which model the asymmetric nature of HIF. The positive half cycle of HIF current is achieved when $V_{ph}>V_p$, while negative half cycle when $V_{ph}<V_n$. When $V_n<V_{ph}<V_p$, the current equals to zero, which represents the period of arc extinction. In order to generate a fault current between $10$ and $100$ A in the benchmark system, we adopt the model settings in Table \ref{tab:HIFmodelSetting}. \begin{figure}[h] \centering \includegraphics[width=1.6in]{Figures/HIF_twoDC_R_model.pdf} \caption{HIF two anti-parallel dc-source model.} \label{fig:hifantidcmodel} \vspace{-5mm} \end{figure} \begin{table}[hbt] \renewcommand{\arraystretch}{1.3} \caption{HIF model settings.} \label{tab:HIFmodelSetting} \centering \begin{tabular}{ccc} \hline \hline Component & Value range & Values change every\\ \hline $V_p$ & $5 \sim 6$ kV & 0.1 ms\\ \hline $V_n$ & $7 \sim 8$ kV & 0.1 ms\\ \hline $R_p$ & $200 \sim 1500$ $\Omega$ & 0.1 ms\\ \hline $R_n$ & $200 \sim 1500$ $\Omega$ & 0.1 ms\\ \hline \hline \end{tabular} \vspace{-5mm} \end{table} \section{Derivation of the Minimum Description Length} \label{sec:variableimportanceappendix} \begin{comment} Theory and equations. source: C:\Users\Install\Dropbox\Research\University\Papers\HighImpedanceFault\Relevant papers\variable-importance.pdf \end{comment} Assuming that all features are discrete, the objective is to find the best features that maximize the selection measure. Let C, A and V denote the number of classes, the number of features, and the number of values of the given feature. With this notation, we show in the following the entropy of the classes ($H_C$), the values of the given feature ($H_A$), the joint events class-feature value ($H_{CA}$), and the classes given the value of the attribute ($H_{C|A}$). \begin{align} H_C&=-\sum_{i} p_{i.} \log p_{i.}, &H_A=-\sum_{j} p_{.j} \log p_{.j},\nonumber\\ H_{CA}&=-\sum_{i} \sum_{j} p_{ij} \log p_{ij}, &H_{C|A}=H_{CA}-H_A,\nonumber \end{align} \vspace{-5mm} where $p_{ij}=n_{ij}/n_{..}$, $p_{i.}=n_{i.}/n_{..}$, $p_{.j}=n_{.j}/n_{..}$ and $p_{i|j}=n_{ij}/n_{.j}$. ``$n..$" denotes the number of training instances and ``$n_{i.}$" is the number of training instances from class $C_i$, $n_{.j}$ is the number of instances with the $j$-th value of the given attribute, and $n_{ij}$ is the number of instances from class $C_i$ and with the $j$-th value of the given attribute. The approximation of the total number of bits that are needed to encode the classes of $n_{..}$ is: \begin{equation} \text{Prior MDL}'=n..H_C+\log \tbinom{n..+C-1}{C-1}, \end{equation} and the approximation of the number of bits to encode the classes of examples in all subsets corresponding to all values of the selected attribute is: \begin{equation} \text{Post MDL}'=\sum_{j} n_{.j}H_{C|j}+\sum_{j} \log \tbinom{n_{.j}+C-1}{C-1}+\log A.\nonumber \end{equation} The last term ($\log A$) is needed to encode the selection of an attribute among $A$ attributes. However, this term is constant for a given selection problem and can be ignored. The first term equals $n_{..}H_{C|A}$. Therefore, the MDL$'$ measure evaluates the average compression (per instance) of the message by an attribute. The measure is defined by the following difference, Prior MDL$'$ $-$ Post MDL$'$, normalized with $n_{..}$: \begin{align}\label{eq:paretomle1} \text{MDL}'=\text{Gain}+\frac{1}{n..} \Big( \log \tbinom{n..+C-1}{C-1} \\ -\sum_{j} \log \tbinom{n_{.j}+C-1}{C-1}\Big). \end{align} However, entropy $H_C$ can be used to derive MDL$'$ if the messages are of arbitrary length. If the length of the message is known, the more optimal coding uses the logarithm of all possible combinations of class labels for given probability distribution: \vspace{-4mm} \begin{equation} \text{Prior MDL}=\tbinom{n..}{n_{1.},...,n_{C.}}+\log \tbinom{n..+C-1}{C-1} \end{equation} \vspace{-4mm} Similarly, if we use the priori minus the posterior of the $MDL$, equation (\ref{eq:paretomle2}) is obtained. \section{Benchmark System} \label{sec:appbenchmarksys} The benchmark system is presented in Fig. \ref{fig:feeder_HIF}, the details of which can be found in \cite{ref:DavyZhuang}. \begin{figure*}[!htb] \centering \includegraphics[width=6.5in]{Figures/feeder1.pdf} \centering \caption{Single line diagram of distribution feeder under study.} \label{fig:feeder_HIF} \end{figure*} \bibliographystyle{IEEEtran}
\section{Introduction} \label{section: introduction} We propose a novel convex relaxation framework for solving multimarginal-transport type problems, in the context of density functional theory for strictly correlated electrons. More precisely, we consider the type problems that takes the form \begin{gather} \label{general MM} \underset{\lambda_1,\ldots,\lambda_N,\mu \in \Pi(\lambda_1,\ldots,\lambda_N)}{\inf} \sum_{i=1}^N g_i(\lambda_i) + \int_{X_1\times\cdots \times X_N} f(x_1,\ldots,x_N) d\mu(x_1,\ldots,x_N),\quad \mathcal{A}_i(\lambda_i) = b_i,\ i=1,\ldots,N \end{gather} where $g_i(\cdot),i=1,\ldots,N$ are convex functionals, $\mathcal{A}_i, i=1,\ldots,N$ are some linear operators, $ \Pi(\lambda_1,\ldots,\lambda_N)$ denotes the space of probability measures on $X_1\times\cdots\times X_N$ with marginals $\lambda_1,\ldots,\lambda_N$. In this paper, the domain of the cost $X_1\times \cdots \times X_N$ is discrete and the cost function $f$ has the form \begin{equation} \label{general cost} f(x_1,\ldots,x_N) = \sum_{i,j=1, i> j}^N C_{ij}(x_i,x_j). \end{equation} A particular situation that we are interested in is when $f(x_1,\ldots,x_N)$ and $\mu(x_1,\ldots,x_N)$ are symmetric when any $x_i$ and $x_j$ are swapped, i.e., $g_i := g$, and $C_{ij} := C$ for $i,j = 1,\ldots,N$. In such a situation, the task is to solve \begin{equation} \label{symmetric MM} \underset{\lambda, \mu \in \Pi_{N,\text{sym}}(\lambda)}{\inf} g(\lambda) + \int_{X^N} f(x_1,\ldots,x_N) d\mu(x_1,\ldots,x_N),\quad \mathcal{A}(\lambda) = b \end{equation} where $ \Pi_{N,\text{sym}}(\lambda)$ denotes the space of symmetric probability measures on $X^N$ with the marginals being $\lambda$. Solving this problem is particularly useful in the context of density functional theory (DFT), where the density for many-electrons is indeed symmetric. A brief introduction to how such a problem can arise in DFT when the electrons are strictly correlated is given in Section \ref{section: DFT}. Although Problem \eqref{symmetric MM} is a linear programming problem for discrete $X$, the domain of optimization is exponentially large for any practical computation. \subsection{Background on DFT for strictly correlated electrons}\label{section: DFT} A key task in density functional theory is to determine the minimum of an energy functional $E(\rho)$ of the 1-marginal \begin{equation} \rho(x) = \int_{X^{N-1}} \vert \psi(x,\ldots,x_N)\vert^2 dx_2 dx_3\ldots dx_N, \end{equation} where $\psi(x_1,\ldots,x_N)$ is a many-body wavefunction for $N$ electrons (due to the properties of electrons $\vert \psi(x_1,\ldots,x_N) \vert^2$ is symmetric). In this paper, we consider an energy functional introduced in \cite{gori2009density} \begin{equation} \label{total energy} E(\rho) = V_\text{ee}^\text{SCE}(\rho) + E_\text{kd}(\rho) + \int_{X} v_\text{ext}(x) \rho(x)dx, \end{equation} which is suitable for studying strongly correlated electrons. The functional $E_\text{kd}(\rho)$ corresponds to kinetic energy with some correction terms, $v_\text{ext}$ is some external potential (for example potential exerted by nuclei), and the central object of the study is the strictly correlated density functional $V_\text{ee}^\text{SCE}(\rho)$ defined as \begin{equation} \label{SCE OT} V_\text{ee}^\text{SCE}(\rho):=\inf_{\lambda, \mu\in \Pi_{\text{N,sym}}(\lambda)} \int_{X^2} \sum_{i,j=1,i> j}^N \frac{1}{\| x_i - x_j \|} d\mu(x_1,\ldots,x_N),\quad \lambda = \rho. \end{equation} This framework of DFT gives rise to two following problems: \begin{itemize} \item Solving for the strictly correlated density functional $V^\text{SCE}_\text{ee}(\rho)$ via the optimization problem \eqref{SCE OT}. This is in fact the well known multi-marginal optimal transport problem.\newline \item Direct minimization of the total energy functional $E(\cdot)$ in \eqref{total energy}, when the kinetic energy $E_\text{kd}(\rho)$ is either convex or negligible (thus can be dropped). In this case, the minimization problem takes the form \begin{eqnarray} &\ &\underset{\rho}{\inf}\quad V_\text{ee}^\text{SCE}(\rho) + E_\text{kd}(\rho) + \int_X v_\text{ext}(x)\rho(x) dx\cr &\Leftrightarrow & \underset{\rho}{\inf}\quad E_\text{kd}(\rho) + \int_X v_\text{ext}(x)\rho(x) dx + \inf_{\lambda, \mu\in \Pi_{\text{N,sym}}(\lambda),\lambda=\rho} \int_{X^2} \sum_{i,j=1,i> j}^N \frac{1}{\| x_i - x_j \|} d\mu(x_1,\ldots,x_N) \label{indirect total minimization}\\ &\Leftrightarrow & \underset{\lambda, \mu\in \Pi_{\text{N,sym}}(\lambda)}\inf E_\text{kd}(\lambda) + \int_X v_\text{ext}(x)\lambda(x) dx + \int_{X^2} \frac{1}{\| x_i - x_j \|} d\mu(x_1,\ldots,x_N) \label{total minimization} \end{eqnarray} \end{itemize} Notice that the first problem, i.e. \eqref{SCE OT}, takes the form of \eqref{symmetric MM} when $\mathcal{A}$ is the identity and $b=\rho$, while the second problem, presented in \eqref{total minimization}, takes the form of \eqref{symmetric MM} when the constraint $\mathcal{A}(\lambda)=b$ is absent. \subsection{Our contributions} In this paper, we work with an equivalent formulation of \eqref{symmetric MM} in terms of the 2-marginals. Although this seems to break the aforementioned complexity barrier for solving \eqref{symmetric MM}, enforcing that the 2-marginals being the marginalization of a probability measure on $X^N$, is non-trivial. Leveraging the results of \cite{friesecke2018breaking} concerning the extreme points of the $N$-representable 2-marginals, we propose a semidefinite programming (SDP) relaxation, SDP-Coulomb, to provide an outer approximation to the set of $N$-representable 2-marginals, therefore breaking the complexity barrier in optimizing the high-dimensional measure in \eqref{symmetric MM}. The property of the proposed SDP is discussed in light of the results in \cite{friesecke2018breaking}. We further propose a tighter convex relaxation SDP-Coulomb2 based on a formulation of \eqref{symmetric MM} in terms of the 3-marginals. As the proposed convex relaxations only provide lower bounds to the energy, we further propose rounding schemes to give upper bounds. Numerical simulations show that the proposed approaches give a relative gap between the upper and lower bounds of size $10^{-3}$ to $10^{-2}$, which in turn sets an upper bound on the approximation accuracy. Before delving into the details, in Fig. \ref{figure: largescale}, we show an example where we solve the multi-marginal transport problem \eqref{SCE OT} with $N=8$, $\rho(x)\propto \exp(-x^2/\sqrt{\pi})$, and the discrete domain $X$ has size $\vert X \vert = 1600$. The running time is 2560s. Such problem size would be impossible to be solved by traditional methods such as linear programming since it requires the storage of a tensor with $10^{25}$ entries. Moreover, in this example, we obtain an estimate of ${ V}^\text{SCE}_\text{ee}(\rho)$ with 3.6e-04 error. \begin{figure}[!ht] \centering \includegraphics[width=0.47\columnwidth]{figures/gaussian1_1000.pdf} \caption{Approximate solution using SDP-Coulomb to the multimarginal transport problem \eqref{SCE OT} with $\rho(x)\propto \exp(-x^2/\sqrt{\pi})$ being the marginal. Here $N=8$, $\vert X \vert = 1600$, $d=1$. The error of the energy is 3.6e-04.}\label{figure: largescale} \end{figure} \subsection{Prior works} The consideration of numerically solving an optimal transport problem with a Coulomb cost is a relatively new field. In \cite{mendl2013kantorovich}, the dual problem to Problem \eqref{symmetric MM} is solved, via a parameterization of the dual function. In \cite{chen2014numerical}, linear programming is applied to solve the problem involving 2-electrons in 3D as part of a self-consistent DFT iterations. In \cite{benamou2016numerical}, Sinkhorn scaling algorithm is applied to an entropic regularized problem of \eqref{symmetric MM}. Although these methods have shown various levels of success in practice, the constraints or variables involved grow exponentially in the number of electrons. \subsection{Organization} In Section \ref{section: method}, we detail the proposed SDP relaxation for Problem \eqref{symmetric MM} in terms of the 2-marginal. In Section \ref{section: properties}, we characterize the property of the SDP relaxation. In Section \ref{section: 3mar}, a further tightening of the SDP relaxation is proposed by formulating Problem \eqref{symmetric MM} in terms of the 3-marginal. In Section \ref{section: implementation}, rounding schemes are provided to obtain an upper bound of the energy. In Section \ref{section: numerical}, we demonstrate the effectiveness of the proposed method through numerical examples. \subsection{Notation} In what follows, $I$ is used to denote the identity matrix as usual and we use $A^T$ to denote the matrix transpose. For a $p$-dimensional tensor $T$, $T(j_1,j_2,\ldots,j_p)$ denotes its $(i_1,\ldots,i_p)$-th entry. MATLAB notation ``$:$'' is used to extract a slice of a tensor. For example for a matrix $A$, $A(:,i)$ gives the $i$-th column of the matrix. $\mathbf{1}$ is used to denote an all-one vectors of appropriate size. For a matrix $A \in \mathbb{R}^{L\times L}$, the operator $\diag(A)\in \mathbb{R}^L$ extracts the diagonal of $A$ and $\diag^*$ denotes the adjoint of $\diag$. The notations $\odot$ and $\otimes$ are used to denote the Hadamard and tensor products respectively. For a $p$-dimensional tensor $T$, $\| T \|_F^2$ is defined as \begin{equation} \| T \|_F^2 := \sum_{i_1,\ldots,i_p} \vert T(i_1,\ldots,i_p) \vert^2 \end{equation} \section{Proposed method} \label{section: method} In this section, we proposed an SDP relaxation to solve the equivalent problem of \eqref{symmetric MM} in terms of the 2-marginals. In terms of the 2-marginals $\gamma_{ij}$, the cost of \eqref{symmetric MM} is \begin{equation} \label{2mar MM con} g(\lambda) + \sum_{i,j=1, i<j}^N \int_{X^N} C_{ij}(x_i,x_j) d\gamma_{ij}(x_i,x_j) = g(\lambda) + \frac{N(N-1)}{2} \int_{X^2} C(x,y) d\gamma(x,y), \end{equation} where $\gamma_{ij}(x_i,x_j) = \gamma(x_i,x_j)$ due to the symmetry of $\mu$. The 2-marginal $\gamma$ is called an $N$-representable measure, since it comes from the marginalization of a symmetric probability measure on $X^N$. A more general definition for $k$-marginal is given below. \begin{definition} A $k$-marginal on $X^N$ is called $N$-representable if it results from the marginalization of a symmetric probability distribution on $X^N$. \end{definition} As we consider a discrete state space $X$, Problem \eqref{2mar MM con} in terms of the discrete 2-marginals takes the form \begin{eqnarray} \label{2mar MM} \min_{\gamma\in \mathbb{R}^{L\times L}} &\ & g(\gamma\mathbf{1})+ \frac{N(N-1)}{2} \mathrm{Tr}\big(C \gamma) \\ \text{s.t.}&\ & \gamma\ \text{is $N$-representable}\cr &\ & \diag(\gamma) = 0\cr &\ & (\gamma \mathbf{1}) = b.\nonumber \end{eqnarray} Here we added a problem-dependent constraint $\diag(\gamma) = 0$, due to the fact the Coulomb cost $C(\cdot,\cdot)$ is infinity when two arguments coincide. To derive an SDP relaxation to \eqref{2mar MM}, one first needs a characterization of the $N$-representable 2-marginals. For this, we leverage the following result from \cite{friesecke2018breaking}, where $\conv(S)$ denotes the convex hull of a set $S$. \begin{theorem} The set of discrete $N$-representable 2-marginals is $\conv(\Gamma_2)$ where \begin{equation} \Gamma_2 = \left\{ \frac{N}{N-1} \lambda \lambda^T - \frac{1}{N-1} \diag^*(\lambda) \ \vert\ \lambda \in \{0,\nicefrac{1}{N},\nicefrac{2}{N},\ldots,1\}^{\vert X \vert },\quad \lambda^T \mathbf{1} = 1 \right\}. \end{equation} Moreover $\Gamma_2$ is the set of extreme points of $\conv(\Gamma_2)$. \end{theorem} Since we are interested in the 2-marginals $\gamma$ where the diagonal element is zero, we characterize the subset $\tilde \Gamma_2\subset \Gamma_2$ with this extra zero constraint in the following corollary. Let \begin{equation} \label{binary dist} \mathcal{B}_N(X) = \{\lambda\in \mathbb{R}^{\vert X \vert}\ \vert\ \lambda^T\mathbf{1} = 1,\ \lambda(i) \in \{0,1/N\},\ i=1,\ldots,\vert X \vert \} \end{equation} which denotes the set of binarized probability vector on a discrete domain $X$. \begin{corollary} \label{corollary: extreme point} Let \begin{equation} \tilde \Gamma_2 = \left\{ \frac{N}{N-1} \lambda \lambda^T - \frac{1}{N-1} \diag^*(\lambda) \ \vert\ \lambda \in \mathcal{B}_N(X) \right\}, \end{equation} then \begin{equation} \label{extreme point} \conv(\tilde \Gamma_2) = \{\gamma\in \mathbb{R}^{\vert X\vert\times \vert X \vert} \ \vert \ \gamma\ \text{is $N$-representable},\ \diag(\gamma) = 0 \}. \end{equation} Moreover, $\tilde \Gamma_2$ is the extreme points of $\conv(\tilde \Gamma_2)$. \end{corollary} For completeness, a short proof of Corollary \ref{corollary: extreme point} is presented in Section \ref{section: properties}. With this characterization, an equivalent formulation of \eqref{2mar MM} is obtained as \begin{eqnarray} \min_{\gamma\in \mathbb{R}^{\vert X \vert \times \vert X \vert }} &\ & g(\gamma\mathbf{1})+ \frac{N(N-1)}{2} \mathrm{Tr}\big(C \gamma) \\ \text{s.t.} &\ & \gamma\in \conv(\tilde\Gamma_2)\cr &\ & \mathcal{A}(\gamma \mathbf{1}) = b.\nonumber \end{eqnarray} We claim that this is also equivalent to the following minimization problem: \begin{eqnarray} \label{2mar MM2} \min_{\gamma,\lambda,a} &\ & g(\gamma \mathbf{1})+ \frac{N(N-1)}{2} \mathrm{Tr}(C \gamma) \quad \\ \text{s.t.} &\ & \gamma = \frac{N}{N-1} \sum_{i=1}^m a(i) \lambda_i \lambda_i^T- \frac{1}{N-1} \diag^*(\sum_{i=1}^m a(i)\lambda_i)\cr &\ & \sum_{i=1}^m a(i) =1,\ a(i)\geq 0,\ i=1,\ldots,m\cr &\ & \lambda_i^T \mathbf{1} = 1,\ i=1,\ldots,m\cr &\ & \lambda_i\in \{0,1/N\}^{\vert X \vert },\ i=1,\ldots,m\cr &\ & \mathcal{A}(\gamma \mathbf{1}) = b.\nonumber \end{eqnarray} Here, the first four constraints are equivalent to $\gamma$ being an element in $\conv(\tilde \Gamma_2)$. The integer $m$ specifies the number of elements in $\tilde \Gamma_2$ needed for representing $\gamma$, which depends on the number of linear constraints $\mathcal{A}(\gamma \mathbf{1}) = b$. For the purpose of this section it is not important to know what $m$ is, and we can just treat it as an arbitrary integer. A detail discussion on what $m$ is for the problem considered is provided in Section \ref{section: rounding 2}. \subsection{Convex relaxation} Problem \eqref{2mar MM2} involves optimizating over the set $\mathcal{B}_N(X)$, which has a combinatorial complexity in the worst case. To cope with this issue, we propose the following convex relaxation to Problem \eqref{2mar MM} and Problem \eqref{2mar MM2}: \begin{eqnarray} \label{2mar SDPCoulomb} \min_{\gamma,\Lambda \in \mathbb{R}^{\vert X \vert \times \vert X \vert }} &\ & g(\gamma \mathbf{1})+ \frac{N(N-1)}{2} \mathrm{Tr}(C \gamma) \quad \text{(SDP-Coulomb)} \\ \text{s.t.} &\ & \gamma = \frac{N}{N-1} \Lambda - \frac{1}{N-1} \diag^*(\Lambda \mathbf{1})\cr &\ & \mathcal{A}(\Lambda \mathbf{1}) = b\cr &\ &\Lambda \succeq 0\cr &\ &\Lambda \geq 0 \cr &\ & \mathbf{1}^T \Lambda \mathbf{1} = 1\cr &\ & \diag(\Lambda) =\frac{1}{N} \Lambda \mathbf{1}.\nonumber \end{eqnarray} The details of going from \eqref{2mar MM2} to \eqref{2mar SDPCoulomb} are presented in the subsequent sections. \subsubsection{Changing the variables to $\Lambda$} We start to derive SDP-Coulomb from Problem \eqref{2mar MM2}. Instead of working with both sets of variables $\{\lambda_i\}_{i=1}^{m}$ and $a$ as in Problem \eqref{2mar MM2}, we will only work with a single matrix variable $\Lambda$. First let \begin{equation} \label{Lambda def} \Lambda := \sum_{i=1}^m a(i) \lambda_i \lambda_i^T,\quad \lambda_i\in\mathcal{B}_N(X),\ i=1,\ldots,m. \end{equation} Since \begin{equation} \Lambda \mathbf{1} = \sum_{i=1}^m a(i) \lambda_i \lambda_i^T \mathbf{1} = \sum_{i=1}^m a(i) \lambda_i, \end{equation} in terms of $\Lambda$ the 2-marginal $\gamma$ in \eqref{2mar MM2} becomes \begin{equation} \gamma = \frac{N}{N-1} \Lambda - \frac{1}{N-1} \diag^*(\Lambda \mathbf{1}). \end{equation} Notice that with such a change of variable, \begin{equation} \gamma \mathbf{1} = \Lambda \mathbf{1}. \end{equation} \subsubsection{Constraints on $\Lambda$} The variable $\Lambda$ defined in \eqref{Lambda def} belongs to a non-convex set as it is a quadratic form of the binarized vectors $\lambda_1,\ldots,\lambda_m$. In order to obtain the convex program SDP-Coulomb, we only enforce certain necessary conditions of $\Lambda$ having the form in \eqref{Lambda def}. First \begin{equation} \label{C1} \Lambda\succeq 0 \end{equation} due to the fact that $a\geq 0$ in \eqref{Lambda def}. Then \begin{equation} \label{C2} \Lambda \geq 0 \end{equation} since $a,\lambda_1,\ldots,\lambda_m \geq 0$ in \eqref{Lambda def}. Since $\sum_{i=1}^m a(i)=1,\lambda_i^T \mathbf{1} = 1, i=1,\ldots,m$, \begin{equation} \label{C3} \mathbf{1}^T \Lambda \mathbf{1}= 1. \end{equation} As each $\lambda_i \in B_N(X)$, therefore \begin{equation} \lambda_i \odot \lambda_i = \lambda_i/N,\quad i=1,\ldots,m \end{equation} implying \begin{equation} \label{C4} \diag(\Lambda) = \frac{1}{N} \Lambda \mathbf{1}. \end{equation} Together, the constraints \eqref{C1}, \eqref{C2}, \eqref{C3} and \eqref{C4} give the last four constraints in SDP-Coulomb. \subsection{Duality and the Kantorovich potential} In \cite{mendl2013kantorovich}, the dual problem to \eqref{SCE OT}: \begin{eqnarray} \label{vsce} V^\text{SCE}_\text{ee}(\rho) = \min_{v \in \mathbb{R}^{\vert X \vert }} &\ & v^T \rho \\ \text{s.t.} &\ & \sum_{\substack{k,l=1 \\ k\leq l}}^N C(i_k,i_l) - \frac{1}{N}\sum_{k=1}^N v(i_k) \geq 0,\ \forall (i_1,\ldots,i_N)\cr \end{eqnarray} is used to solve for $V^\text{SCE}_\text{ee}(\rho)$. This is called the Kantorovich problem and the dual variable $v$ is called the Kantorovich potential. Although the size of the optimization variable is reduced to $\vert X \vert$ when comparing to \eqref{SCE OT}, the dual formulation has number of constraints being exponential in $N$. We can also use SDP-Coulomb to provide an approximation to the Kantorovich potential. Let \begin{equation} \mathcal{A}(\Lambda \mathbf{1})=b \rightarrow \Lambda\mathbf{1} = \rho \end{equation} and $g=0$ in the cost, we have \begin{eqnarray} \label{vsce approx} \hat V^\text{SCE}_\text{ee}(\rho) := \min_{\Lambda \in \mathbb{R}^{\vert X \vert \times \vert X \vert }} &\ & \frac{N^2}{2} \mathrm{Tr}[\left(C- \text{diag}^*(\text{diag}(C))\right) \Lambda] \\ \text{s.t.} &\ & w:\Lambda \mathbf{1} = \rho\cr &\ & Y:\Lambda \succeq 0\cr &\ & Z:\Lambda \geq 0 \cr &\ & u:\diag(\Lambda) =\frac{1}{N} \Lambda \mathbf{1}\nonumber, \end{eqnarray} where the variables in front of the colon are the dual variables corresponding to the constraints. $\hat V^\text{SCE}_\text{ee}(\rho)$ can be seen as an approximation to $V^\text{SCE}_\text{ee}(\rho)$ in \eqref{vsce}. The dual to \eqref{vsce approx} is then \begin{eqnarray} \label{vsce dual} \hat V^\text{SCE}_\text{ee}(\rho) = \max_{\substack{w \in \mathbb{R}^{\vert X \vert }, \\ Y,Z \in \mathbb{R}^{\vert X \vert \times \vert X \vert }}} &\ & w^T \rho\\ \text{s.t.} &\ & \frac{N^2}{2} [C- \text{diag}^*(\text{diag}(C))] - \frac{1}{2}(\mathbf{1}w^T+ w \mathbf{1}^T)\cr &\ &\quad-\text{diag}^*(u)+\frac{1}{2N}(\mathbf{1}u^T+ u \mathbf{1}^T) = Y+Z, \cr &\ & Y\succeq 0,\ Z\geq 0.\cr \end{eqnarray} The dual variable $w$ can be seen as an approximation to the Kantorovich potential $v$ in $\eqref{vsce}$. As pointed out in the literatures of DFT \cite{malet2012strong, mendl2013kantorovich, chen2014numerical}, the Kantorovich potential allows the functional derivative of $V^\text{SCE}_\text{ee}(\cdot)$ to be taken. From \eqref{vsce dual}, we make the following identification: \begin{equation} \frac{d V^\text{SCE}_\text{ee}(\rho) }{d \rho} \approx \frac{d \hat V^\text{SCE}_\text{ee}(\rho) }{d \rho} = w^*, \end{equation} where $w^*$ is the optimizer of \eqref{vsce dual}. The equality follows from the fact that for \begin{equation} g(x) = \sup_{\alpha\in \Omega} f_\alpha(x),\quad \alpha^* =\text{argsup}_{\alpha\in \Omega} f_\alpha(x), \end{equation} where $ f_\alpha(x), \alpha\in \Omega$ are convex functions, a subgradient of $f_{\alpha^*}(x)$ is a subgradient of $g(x)$ \cite{boyd2004convex}. Obtaining the approximate functional derivative of $\hat V^\text{SCE}_\text{ee}(\cdot)$ can provide a mean to optimize \eqref{indirect total minimization} via self-consistent field iterations (for example in \cite{chen2014numerical}), when the dependence of $E_{kd}(\cdot)$ on $\rho$ is not analytically given. \section{Properties of SDP-Coulomb} \label{section: properties} The convex program SDP-Coulomb in Section \ref{section: method} intends to provide an outer approximation to the 2-marginals. In this section, we show that the extreme points of the $N$-representable 2-marginals are contained in the set of the extreme points of the domain of SDP-Coulomb. We first give the proof of Corollary \ref{corollary: extreme point}: \begin{proof} It is clear in \eqref{extreme point} that the left hand side belongs to the right hand side. Now if $\gamma$ is $N$-representable, then \begin{equation} \gamma = \sum_{i=1}^m a(i) \bigg(\frac{N}{N-1}\lambda_i \lambda_i^T - \frac{1}{N-1}\diag^*(\lambda_i )\bigg), \ a \geq 0,\ a^T \mathbf{1} = 1,\ \lambda_i\in \{0,1/N\ldots,N/N\}^{\vert X \vert}. \end{equation} for $a\in \mathbb{R}^m$. The constraint $\diag(\gamma) = 0$ gives \begin{equation} \label{sum = 0} \sum_{i=1}^m a(i) (N \lambda_i\odot \lambda_i - \lambda_i )= 0 \end{equation} where $\odot$ denotes pointwise product. Due to the domain of $\lambda_i$, $N \lambda_i\odot \lambda_i - \lambda_i \geq 0$. Then together with $a(i)\geq0$, the equation \eqref{sum = 0} implies $a(i)=0$ or $N \lambda_i\odot \lambda_i = \lambda_i$ for each $i$. This shows that $\lambda_i \in \{0,1/N\}^{\vert X \vert}$, implying in \eqref{extreme point} the right hand side belongs to the left hand side. Finally, it is clear that $\tilde \Gamma_2$ is the set of extreme points of $\conv(\tilde \Gamma_2)$, since $\tilde \Gamma_2$ is a subset of the extreme points $\conv(\Gamma_2)$ and $\conv(\tilde \Gamma_2)\subseteq \conv(\Gamma_2)$. \end{proof} In the following theorem, we show that $\tilde \Gamma_2$ also belongs to the set of the extreme points for the feasible set of $\gamma$ used in Problem SDP-Coulomb in \eqref{2mar SDPCoulomb}, when the constraint $\mathcal{A}(\Lambda \mathbf{1}) = b$ is absent. This shows that our convex relaxation is rather tight. \begin{theorem} \label{theorem: extreme} $\tilde \Gamma_2$ is a subset of the extreme points of the domain \begin{equation} \label{SDP domain} D = \left\{ \frac{N}{N-1} \Lambda - \frac{1}{N-1} \diag^*(\Lambda \mathbf{1}) \ \bigg\vert\ \Lambda\succeq 0,\ \Lambda\geq 0,\ \mathbf{1}^T \Lambda \mathbf{1}= 1,\ \diag(\Lambda) = \frac{1}{N} \Lambda \mathbf{1} \right\}, \end{equation} which is the feasible set of $\gamma$ in \eqref{2mar SDPCoulomb} when the constraint $\mathcal{A}(\Lambda \mathbf{1}) = b$ is absent. \end{theorem} \begin{proof} First $\tilde \Gamma_2$ is a subset of $D$. We further need to show that each \begin{equation} \label{gamma ext} \gamma_\text{ext} = \frac{N}{N-1} \lambda_\text{ext} \lambda_\text{ext}^T- \frac{1}{N-1} \diag^*(\lambda_\text{ext}), \quad \lambda_\text{ext}\in\mathcal{B}_N(X) \end{equation} in $\tilde \Gamma_2$ is also an extreme point in $D$. To this end, we simply show for every $\gamma_\text{ext}$, there exists some cost $B$ such that the unique maximizer to \begin{equation} \label{extreme pt max} \max_\gamma \mathrm{Tr}(B\gamma),\quad \text{s.t.}\ \gamma \in D \end{equation} is $\gamma_\text{ext}$. If $\gamma_\text{ext}$ is the unique maximizer to \eqref{extreme pt max}, then $\gamma_\text{ext}\neq \sum_i a(i) \gamma_i$, where $\forall i\ \gamma_i\in D, a(i)> 0$, and $\sum_i a(i) = 1$. Otherwise, $\mathrm{Tr}(B\gamma_\text{ext}) = \sum_i a(i)\mathrm{Tr}(B \gamma_i)<\sum_i a(i) \mathrm{Tr}(B\gamma_\text{ext}) = \mathrm{Tr}(B\gamma_\text{ext})$ where the inequality is due to the fact that $\gamma_\text{ext}$ uniquely minimizes $\mathrm{Tr}(B\gamma)$. Let \begin{equation} B := \lambda_\text{ext} \lambda_\text{ext} ^T+ \frac{1}{N-1}\mathbf{1}\diag( \lambda_\text{ext} \lambda_\text{ext} ^T)^T. \end{equation} Then \begin{eqnarray} \mathrm{Tr}(B\gamma) &=& \mathrm{Tr}( \lambda_\text{ext} \lambda_\text{ext} ^T\gamma ) + \mathrm{Tr}(\frac{1}{N-1}\mathbf{1}\diag( \lambda_\text{ext} \lambda_\text{ext} ^T)^T\gamma)\cr &=& \mathrm{Tr}( \lambda_\text{ext} \lambda_\text{ext} ^T\gamma ) + \mathrm{Tr}\bigg(\frac{1}{N-1} \lambda_\text{ext} \lambda_\text{ext} ^T \diag^*(\gamma\mathbf{1})\bigg) \cr &=& \mathrm{Tr}\bigg( \lambda_\text{ext} \lambda_\text{ext} ^T \big(\gamma + \frac{1}{N-1} \diag^*(\gamma\mathbf{1})\big)\bigg) \end{eqnarray} Plugging in $\gamma = \frac{N}{N-1} \Lambda - \frac{1}{N-1} \diag^*(\Lambda \mathbf{1})\in D$, \eqref{extreme pt max} is therefore \begin{eqnarray} \label{ext pt max1} \min_{\gamma,\Lambda} &\ &\frac{N}{N-1}\mathrm{Tr}(\lambda_\text{ext} \lambda_\text{ext} ^T\Lambda ) \\ \text{s.t.} &\ & \gamma = \frac{N}{N-1} \Lambda - \frac{1}{N-1} \diag^*(\Lambda \mathbf{1})\cr &\ &\Lambda \succeq 0,\ \Lambda \geq 0, \ \mathbf{1}^T \Lambda \mathbf{1} = 1,\ \diag(\Lambda) =\frac{1}{N} \Lambda \mathbf{1}.\nonumber \end{eqnarray} To show $\gamma_\text{ext}$ in \eqref{gamma ext} is the unique minimizer of \eqref{ext pt max1}, it suffices to show $\gamma_\text{ext}$ is the unique minimizer for \begin{eqnarray} \label{ext pt max2} \min_{\gamma,\Lambda} &\ &\frac{N}{N-1}\mathrm{Tr}(\lambda_\text{ext} \lambda_\text{ext} ^T\Lambda ) \\ \text{s.t.} &\ & \gamma = \frac{N}{N-1} \Lambda - \frac{1}{N-1} \diag^*(\Lambda \mathbf{1}),\ \Lambda \succeq 0,\ \mathrm{Tr}(\Lambda) = 1/N,\nonumber \end{eqnarray} since the domain of \eqref{ext pt max1} is contained within \eqref{ext pt max2}. It is clear that the unique minimizer to \eqref{ext pt max2} is $\Lambda = \lambda_\text{ext} \lambda_\text{ext}^T$, implying that $\gamma_\text{ext}$ is the unique minimizer. \end{proof} \section{Tightening the convex relaxation}\label{section: 3mar} Though Theorem \ref{theorem: extreme} shows that our convex relaxation with the $2$-marginals also contains $\tilde \Gamma_2$ as the extreme points, it may contain orther extreme points that do not come $\tilde \Gamma_2$. To further restrict the domain of optimization in SDP-Coulomb, one can consider applying convex relaxation to the $k$-marginals. In this section, we focus on the case of the 3-marginals. Let \begin{equation} \bar C(i,j,k) = C(i,j)+C(j,k)+C(k,i),\quad i,j,k=1,\ldots,\vert X \vert. \end{equation} Let the $N$-representable 3-marginal of $\mu$ be $\kappa$. In terms of $\bar C$ and $\kappa$, the cost of \eqref{symmetric MM} becomes \begin{equation} \label{3mar MM} g(\lambda)+ \frac{N(N-1)(N-2)}{6} \sum_{i,j,k=1}^{\vert X \vert} \bar C(i,j,k)\kappa(i,j,k). \end{equation} In the following sections, we work out the domain of $\kappa$ in order to perform minimization. We follow the derivation in \cite{friesecke2018breaking} in which the set $\Gamma_2$ is derived. \subsection{The extreme points of the symmetric discrete distribution on $X^N$} Let the set of symmetric discrete $N$-marginal be defined as \begin{equation} \Pi_{N,\text{sym}} = \left\{ \mu\in ({\mathbb{R}^{\vert X \vert}})^N \ \vert\ \mu\ \text{is symmetric}, \mu\geq 0, \sum_{i_1,\ldots,i_N = 1}^{\vert X \vert} \mu(i_1,\ldots,i_N) = 1\right\}. \end{equation} Let $e_l \in \mathbb{R}^{\vert X \vert}$ be defined as $e_l(j)=\delta_{lj}$. For the set of probability measures on $X^N$, an extreme point is \begin{equation} \label{extreme Nd} e_{c_1}\otimes \ldots \otimes e_{c_N}, \end{equation} for some $c_1,\ldots,c_N \in \{1,\ldots, \vert X \vert \}$. Therefore for the set of symmetric measure $\Pi_{N,\text{sym}}$, an extreme point can be obtained from symmetrizing \eqref{extreme Nd}, giving rise to the set \begin{equation} \Gamma_N = \left\{\frac{1}{N!} \sum_{\sigma\in S(N)} e_{c_{\sigma(1)}} \otimes \ldots \otimes e_{c_{\sigma(N)}} \ \vert \ c_1,\ldots, c_N \in \{1,\ldots,\vert X \vert \}\right\} \end{equation} where $S(N)$ is the symmetric group over $N$ numbers. For physical measure of the electrons, we look at a restricted set \begin{equation} \tilde \Pi_{N,\text{sym}} =\left\{ \mu\in \Pi_{N,\text{sym}} \ \vert\ \mu(i_1,\ldots,i_N) = 0, \ \text{if}\ i_k = i_l\ \forall k,l = 1,\ldots,N\right \} \end{equation} which ensures two electrons cannot be in the same state. A derivation similar to Corollary \ref{corollary: extreme point} reveals that \begin{equation} \conv(\tilde \Gamma_N) = \tilde \Pi_{N,\text{sym}} \end{equation} where \begin{equation} \tilde \Gamma_N = \left\{\frac{1}{N!} \sum_{\sigma\in S(N)} e_{c_{\sigma(1)}} \otimes \ldots \otimes e_{c_{\sigma(N)}} \ \vert \ c_1,\ldots, c_N \in \{1,\ldots,\vert X \vert \},\ c_i\neq c_j \ \forall\ i,j\in N,\ i\neq j\right\}. \end{equation} \subsection{Convex hull of the set of $N$-representable 3-marginals} To get a description to the set of $N$-representable 3-marginals in order to restrict $\kappa$ in \eqref{3mar MM}, we marginalize the measures in $\tilde \Pi_{N,\text{sym}}$. Since $ \tilde \Pi_{N,\text{sym}} = \conv(\tilde \Gamma_N)$, it suffices to marginalize the elements in $\tilde \Gamma_N$. Picking an arbitrary element in $\tilde \Gamma_N$, then its 3-marginal is \begin{eqnarray} \label{3mar ext1} &\ & \frac{1}{N!} \sum_{\sigma\in S(N) } \sum_{l_4,\ldots,l_N=1}^{\vert X \vert}e_{c_{\sigma(1)}}\otimes \ldots \otimes e_{c_{\sigma(N-1)}}(l_{N-1}) \otimes e_{c_{\sigma(N)}}(l_N) \cr &=& \frac{1}{N!} \sum_{\sigma\in S(N) } e_{c_{\sigma(1)}} \otimes e_{c_{\sigma(2)}} \otimes e_{c_{\sigma(3)}} \cr &=& \frac{(N-3)!}{N!} \sum_{\substack{i,j,k=1\\ i>j>k}}^N e_{c_i} \otimes e_{c_j}\otimes e_{c_k}\cr &=& \frac{1}{N(N-1)(N-2)} \bigg(\sum_{i,j,k=1}^N e_{c_i} \otimes e_{c_j}\otimes e_{c_k}+ 2 \sum_{k=1}^N e_{c_k} \otimes e_{c_k} \otimes e_{c_k} \cr &\ & -\sum_{i,j=1}^N e_{c_i}\otimes e_{c_j} \otimes e_{c_j} -\sum_{i,j=1}^N e_{c_j}\otimes e_{c_i} \otimes e_{c_j} -\sum_{i,j=1}^N e_{c_i}\otimes e_{c_i} \otimes e_{c_j} \bigg). \end{eqnarray} The second equality follows from the fact that there are $(N-3)!$ $\sigma\in S(N)$ such that $e_{c_i}\otimes e_{c_j} \otimes e_{c_k} = e_{c_{\sigma(1)}} \otimes e_{c_{\sigma(2)}} \otimes e_{c_{\sigma(3)}}$ for a fixed $e_{c_i}\otimes e_{c_j} \otimes e_{c_k} $. Letting \begin{equation} \label{lambda def2} \lambda := \frac{1}{N}\sum_{i=1}^N e_{c_i}, \end{equation} it follows that $\lambda\in \{0,1/N\}^{\vert X \vert}$, and $\lambda^T \mathbf{1}=1$, since each $e_{c_i}$ has only an entry with value 1 and is 0 everywhere else, and $c_i\neq c_j$ for all $i\neq j$. Moreover, \begin{equation} \label{3mar ext2} \frac{1}{N}\sum_{i=1}^{N} e_{c_i}(l)e_{c_i}(l)e_{c_i}(l) = \frac{1}{N}\sum_{i=1}^{N}e_{c_i}(l)e_{c_i}(l) = \frac{1}{N}\sum_{i=1}^{N}e_{c_i}(l)= \lambda(l),\quad l=1,\ldots,\vert X \vert, \end{equation} and \begin{equation} \label{3mar ext3} \frac{1}{N}\sum_{i=1}^{N} e_{c_i}(l)e_{c_i}(j) = 0,\quad \frac{1}{N}\sum_{i=1}^{N} e_{c_i}(l)e_{c_i}(j)e_{c_i}(k) = 0\quad \text{if}\ l\neq j, \text{or}\ j\neq k,\ \text{or}\ k\neq l . \end{equation} Writing \eqref{3mar ext1} in terms of $\lambda$ using \eqref{3mar ext2} and \eqref{3mar ext3}, one can marginalize $\tilde \Gamma_N$ to obtain \begin{eqnarray} \tilde \Gamma_3 &=& \bigg \{ \frac{1}{N(N-1)(N-2)} \big( N^3 \lambda\otimes \lambda \otimes\lambda + 2N \sum_{l=1}^{\vert X \vert} \lambda(l) e_l \otimes e_l \otimes e_l - N^2 \sum_{l=1}^{\vert X \vert} \lambda(l) \lambda \otimes e_l \otimes e_l \cr &\ & - N^2 \sum_{l=1}^{\vert X \vert} \lambda(l) e_l \otimes \lambda \otimes e_l - N^2 \sum_{l=1}^{\vert X \vert} \lambda(l) e_l \otimes e_l\otimes \lambda \big )\ \vert \ \lambda\in \mathcal{B}_N(X) \bigg \}. \end{eqnarray} Since every physical $N$-representable 3-marginal comes from the marginalization of an element in $\tilde \Pi_{N,\text{sym}}=\conv(\tilde \Gamma_N)$, the following statement holds. \begin{proposition} The set of $N$-representable 3-marginals coming from the marginalization of $\tilde \Pi_{N,\text{sym}}$ is $\conv(\tilde \Gamma_3)$. \end{proposition} With this proposition, in order to minimize \eqref{3mar MM} one can solve \begin{eqnarray} \label{3mar MM2} \min_{\substack{\kappa \in \mathbb{R}^{\vert X \vert \times \vert X \vert \times \vert X \vert },\\ \lambda\in \mathbb{R}^{\vert X \vert }} } &\ & g(\lambda)+ \frac{N(N-1)(N-2)}{6} \sum_{i,j,k=1}^{\vert X \vert} \bar C(i,j,k)\kappa(i,j,k)\\ \text{s.t.}&\ & \kappa\in \conv(\tilde \Gamma_3)\cr &\ & \lambda(i) = \sum_{j,k=1}^{\vert X \vert} \kappa(i,j,k),\quad i=1,\ldots,\vert X \vert\cr &\ & \mathcal{A}(\lambda) = b.\nonumber \end{eqnarray} \subsection{Convex relaxation to the 3-marginal problem} The variable $\kappa$ in \eqref{3mar MM2} takes the form $\kappa = \sum_{i=1}^{m} a(i) \kappa_i,\kappa_i \in \tilde \Gamma_3$ with $a \geq 0$ and $a^T \mathbf{1} =1$. Therefore, in order to derive a convex relaxation to \eqref{3mar MM2}, one seeks a convex set that contains all the elements in $\tilde \Gamma_3$. Such a set will certainly contain $\kappa = \sum_{i=1}^{m} a(i)\kappa_i$, which is a convex combination of $\kappa_i \in \tilde \Gamma_3,i=1,\ldots,m$. For this purpose, let \begin{equation} \Theta := \lambda \otimes \lambda \otimes \lambda,\quad \lambda \in \mathcal{B}_N(X). \end{equation} Since $\lambda^T \mathbf{1} = 1$, \begin{equation} \lambda \lambda^T = \sum_{k=1}^{\vert X \vert } \Theta(:,:,k),\quad \lambda = \sum_{j,k=1}^{\vert X \vert } \Theta(:,j,k). \end{equation} Then in terms of $\Theta$, an extreme point $\kappa\in\tilde \Gamma_3$ is \begin{multline} \kappa = \phi(\Theta):=\frac{1}{N(N-1)(N-2)} \bigg(N^3\Theta + 2N \sum_{l=1}^{\vert X \vert }\big(\sum_{j,k=1}^{\vert X \vert } \Theta(l,j,k)\big) e_l \otimes e_l \otimes e_l\cr -N^2 \sum_{l=1}^{\vert X \vert } \big(\sum_{k=1}^{\vert X \vert } \Theta(l,:,k)\big)\otimes e_l \otimes e_l -N^2 \sum_{l=1}^{\vert X \vert }e_l \otimes \big(\sum_{k=1}^{\vert X \vert } \Theta(l,:,k)\big)\otimes e_l \cr -N^2 \sum_{l=1}^{\vert X \vert }e_l \otimes e_l \otimes \big(\sum_{k=1}^{\vert X \vert } \Theta(l,:,k)\big) \bigg). \end{multline} Next, we impose some necessary conditions on $\Theta$ in a convex manner so that $\Theta$ comes from the tensor product of the quantized marginals $\lambda$. Clearly, the symmetry property implies \begin{equation} \label{symm con} \Theta(i,j,k) = \Theta(k,i,j) = \Theta(j,k,i) = \Theta(j,i,k) = \Theta(k,j,i) = \Theta(i,k,j) \end{equation} Since $\lambda\in \{0,1/N\}^{\vert X \vert}$, \begin{equation} \label{quantized 2} \lambda(i) \lambda(i) \lambda(j) = \lambda(i)\lambda(j)/N \Rightarrow \Theta(i,i,j) = \frac{1}{N}\sum_{k=1}^{\vert X \vert } \Theta(i,j,k), \quad \forall i,j = 1,\ldots,\vert X \vert. \end{equation} Then the constraint that $\lambda^T \mathbf{1} = 1$ gives \begin{equation} \label{normalize} \sum_{i=1}^{\vert X \vert } \lambda(i) = 1 \Rightarrow \sum_{i,j,k=1}^{\vert X \vert } \Theta(i,j,k) = 1. \end{equation} We also have the conic constraints \begin{equation} \label{slice psd} \Theta(:,:,i) = \lambda\lambda^T \lambda(i) \succeq 0,\quad \forall i=1,\ldots,\vert X \vert. \end{equation} and \begin{equation} \label{positivity} \Theta\geq 0. \end{equation} Combining \eqref{symm con},\eqref{quantized 2},\eqref{normalize},\eqref{slice psd} and \eqref{positivity} leads to the following optimization problem over $\Theta$. \begin{eqnarray} \label{SDPCoulomb2} \min_{\Theta,\kappa \in \mathbb{R}^{\vert X \vert \times \vert X \vert \times \vert X \vert }} &\ & g(\sum_{j,k=1}^{\vert X \vert} \Theta(:,j,k))+ \frac{N(N-1)(N-2)}{6} \sum_{i,j,k=1}^{\vert X \vert} \bar C(i,j,k)\kappa(i,j,k)\quad (\text{SDP-Coulomb2})\\ \text{s.t.}&\ & \kappa = \phi(\Theta)\cr &\ &\Theta\ \text{is symmetric}\cr &\ & \Theta(i,i,j) = \frac{1}{N}\sum_{k=1}^{\vert X \vert } \Theta(i,j,k), \quad \forall i,j = 1,\ldots,\vert X \vert\cr &\ & \sum_{i,j,k=1}^{\vert X \vert } \Theta(i,j,k) = 1\cr &\ & \Theta(:,:,i) \succeq 0\ \forall i=1,\ldots,\vert X\vert, \Theta \geq 0 \cr &\ & \mathcal{A}(\sum_{j,k=1}^{\vert X \vert} \Theta(:,j,k)) = b.\nonumber \end{eqnarray} \subsection{A remark on Lassere's hierarchy} It is possible to use the Lassere hierarchy (or sum-of-squares hierarchy) \cite{anjos2012introduction, blekherman2012semidefinite} to further tighten the convex relaxation. When applying this method to our problem, the task of determining some power of the quantized 1-marginal $\lambda\in \mathcal{B}_N(X)$ (for example the problem of determining the 2 and 3-marginals), is reformulated as a moment determination problem. More precisely, instead of working with the monomials $\{\lambda^\alpha\}_\alpha$ where $\alpha \in \mathbb{N}^{\vert X \vert}$ is a multi-index and $\mathbb{N}$ is the set of natural numbers, one performs a change of variables according to \begin{equation} [\lambda^\alpha \lambda^\beta]_{\alpha,\beta} \Rightarrow [\mathbb{E}(\lambda^\alpha \lambda^\beta)]_{\alpha,\beta}. \end{equation} The optimization variable, the matrix $[\mathbb{E}(\lambda^\alpha \lambda^\beta)]_{\alpha,\beta}$, has size ${\ p+\vert X \vert \choose p}$ for each dimension if we consider the monomials $\lambda^\alpha$'s and $\lambda^\beta$'s up to degree $p$. Then, an equality constraint $h(\lambda)=0$ ($h$ is a polynomial) is changed according to \begin{equation} h(\lambda) = 0 \Rightarrow \mathbb{E}(h(\lambda) \lambda^\alpha) = 0\ \forall \alpha, \end{equation} and an inequality constraint $q(\lambda)=0$ ($q$ is a polynomial) is changed according to \begin{equation} q(\lambda) \geq 0 \Rightarrow \mathbb{E}(q(\lambda) s(\lambda)^2) \geq 0 \ \forall s(\lambda) \end{equation} where $s$ is some polynomial. The inequality constraints leads to a positive semidefinite constraint. For example the constraint $\lambda \geq 0$ simply gives \begin{equation} v^T \left( [\mathbb{E}(\lambda^\alpha \lambda^\beta)]_{\alpha,\beta} \right) v \geq 0, \quad \forall v \ \text{with size}\ {\ p+\vert X \vert \choose p}, \end{equation} if we consider the monomials $\lambda^\alpha$'s and $\lambda^\beta$'s up to degree $p$. As can be seen, when choosing $p\geq2$, we already face with $\vert X \vert^4$ variables. Therefore, we pursue a cheaper alternative. \section{Rounding} \label{section: implementation} The previous sections describe several convex relaxation approaches for solving the multi-marginal transport problem. The general philosophy is to enlarge the domain of optimization, therefore obtaining a lower bound for the global minimum. To obtain an upper bound for the global minimum, we need to project the solution back into the unrelaxed domain ($\conv(\tilde \Gamma_2$) or $\conv(\tilde \Gamma_3$)). We consider two cases of practical importance: \begin{enumerate} \item When the linear constraint $\mathcal{A}(\lambda) = b$ is not present in \eqref{symmetric MM}. \item When $\mathcal{A}(\lambda) = b \rightarrow \lambda = \rho$, for example when solving the multimarginal-optimal transport problem \eqref{SCE OT}. \end{enumerate} Section \ref{section: rounding 1} addresses the first case. Here, we devise a scheme to round the solution from SDP-Coulomb to the set of extreme points $\tilde \Gamma_2$ for the set of $N$-representable 2-marginals. In Section \ref{section: rounding 2}, we deal with the second case with the marginal constraint. For this case, it is difficult to work with SDP-Coulomb to obtain a rounded solution in $\tilde \Gamma_2$. Therefore, we discuss how we can use SDP-Coulomb2 for such a purpose. \subsection{Without the linear constraint $\mathcal{A}(\lambda) = b$} \label{section: rounding 1} In the special case where the constraint $\mathcal{A}(\Lambda \mathbf{1}) = b$ is absent and $g(\cdot)$ is a linear functional, we simply minimize a linear functional of $\Lambda$ in SDP-Coulomb. In principle, if the domain of SDP-Coulomb (without $\mathcal{A}(\Lambda \mathbf{1}) = b$) is close to the set of $N$-representable 2-marginals with zero diagonal ($\conv(\tilde \Gamma_2)$) in Corollary \ref{corollary: extreme point}), then SDP-Coulomb should return a solution $\Lambda^* \approx \lambda^* {\lambda^*}^T $ where $\lambda^*\in \mathcal{B}_N(X)$. This is because the extreme points of $\conv(\tilde \Gamma_2)$ is $\tilde \Gamma_2$ (Corollary \ref{corollary: extreme point}), and generically, the optimizer of a linear functional over a convex set is an extreme point of the set. We therefore propose a rounding procedure in Alg. \ref{algorithm: rounding}. If SDP-Coulomb returns a solution $\Lambda^*$ where the entries on the diagonal of $\Lambda^*$ are not exactly $1/N^2$ or $0$, letting the index of the largest entry of $\diag(\Lambda^*)$ be $i_\text{max}$, we add a linear constraint $\diag(\Lambda)(i_\text{max}) = 1/N^2$ to SDP-Coulomb. This step is repeated until a rank-1 $\Lambda^*$ is obtained. This is summarized in Alg. \ref{algorithm: rounding}. \begin{algorithm} \caption{Rounding in the absence of the linear constraint $\mathcal{A}(\lambda)=b$}\label{algorithm: rounding} \begin{algorithmic}[1] \Procedure{Rounding}{} \State $\Lambda^*\gets$ Solution to SDP-Coulomb. \State $\mathcal{I} \gets \{\emptyset\}$, $R\gets I$ \While {$\text{rank}(\Lambda^*)>1$} \State $i_\text{max} \leftarrow$ index of the largest element in $R\diag(\Lambda^*)$. \State $\mathcal{I} \gets \mathcal{I}\cup i_\text{max}$, $\mathcal{I}^c \gets \{1,\ldots,\vert X \vert\}\setminus \mathcal{I}$. \State $R\gets$ $I(\mathcal{I}^c,:)$. \State $\Lambda^* \gets$ Solution to SDP-Coulomb with the extra constraint $\diag(\Lambda)_\mathcal{I} = 1/N^2$. \EndWhile \State \Return $\Lambda^*$. \EndProcedure \end{algorithmic} \end{algorithm} We remark that this procedure is crucial when there are degenerate solutions, giving a high rank solution in SDP-Coulomb. \subsection{With the marginal constraint $\lambda = \rho$} \label{section: rounding 2} When having the constraint $\Lambda \mathbf{1} = \rho$ in SDP-Coulomb, we cannot pursue the same strategy as in Section \ref{section: rounding 1} to round the solution. When there exists a marginal constraint, we expect the solution to \eqref{2mar MM} to be a convex combination of the extreme points from $\tilde \Gamma_2$, implying SDP-Coulomb returns solution as $\Lambda^* \approx \sum_{i=1}^{m} a^*(i)\lambda^*_i {\lambda^*_i}^T, {a^*}^T \mathbf{1} = 1, a^*\geq 0$. However, in order to round, one has to first disentangle each $\lambda_i^*$ from such a convex combination. Since $\lambda_i^*$'s are not orthogonal to each other, it is not obvious how one can use matrix factorization techniques such as an eigendecomposition to obtain the $\lambda_i^*$'s from $\Lambda^*$. To this end, we resort to using SDP-Coulomb2 to obtain each $\lambda_i^*$. Since in SDP-Coulomb2, we expect to have the solution $\Theta^* \approx \sum_{i=1}^{m} a^*(i) \lambda_i^* \otimes \lambda_i^* \otimes \lambda_i^*, \lambda_i^*\in \mathcal{B}_N(X)$ (as we expect the solution to approximately lie in $\conv(\tilde \Gamma_3)$), we resort to using a CP-tensor decomposition \cite{kolda2009tensor} to obtain each individual $\lambda_i^*$ approximately. In order to use a CP-decomposition, one needs to have an idea of what $m$ is. The following discussion demonstrates that $m=|X|$. We first look at the set of the physical symmetric probability measures on $X^N$ that have the marginal being $\rho$: \begin{eqnarray} \tilde \Pi_{N,\text{sym}}(\rho) &=& \{ \mu\in \tilde \Pi_{N,\text{sym}} \ \vert\ \sum_{i_2,\ldots,i_N=1}^{\vert X \vert}\mu(:,i_2\ldots,i_N) = \rho\}\cr &=& \conv(\tilde \Gamma_N)\cap \bigg\{ \mu\in ({\mathbb{R}^{\vert X \vert}})^N \ \vert \sum_{i_2,\ldots,i_N=1}^{\vert X \vert} \mu(i_1,i_2\ldots,i_N) = \rho(i_1),\ i_1 = 1,\ldots,\vert X \vert -1 \bigg\}.\label{Nmar ext} \end{eqnarray} Notice that the marginal constraint in \eqref{Nmar ext} is only enforced for $\vert X \vert -1$ sites. This is because for $\mu \in \conv(\tilde \Gamma_N)$, \begin{equation} \sum_{i_2,\ldots,i_N=1}^{\vert X \vert} \mu(\vert X \vert,i_2\ldots,i_N) \end{equation} is completely determined by \begin{equation} \sum_{i_2,\ldots,i_N=1}^{\vert X \vert} \mu(i_1,i_2\ldots,i_N),\quad i_1 = 1,\ldots,\vert X \vert-1 \end{equation} via \begin{equation} \sum_{i_2,\ldots,i_N=1}^{\vert X \vert} \mu(\vert X \vert,i_2\ldots,i_N) = 1 - \sum_{i_1=1}^{\vert X \vert -1} \sum_{i_2,\ldots,i_N=1}^{\vert X \vert} \mu(i_1,i_2\ldots,i_N). \end{equation} We now appeal to the results in \cite{dubins1962extreme} to see what $m$ is. The theorem in \cite{dubins1962extreme} implies that for a closed and bounded convex set $\mathcal{K}$, an extreme point of $\mathcal{K}\cap H_1 \cap \cdots H_n$ where $H_1,\ldots,H_n$ are $n$ hyperplanes can be represented as $n+1$ convex combination of the extreme points of $\mathcal{K}$. Since $\tilde \Pi_{N,\text{sym}}(\rho)$ in \eqref{Nmar ext} is the intersection of $\conv(\tilde \Gamma_N)$ with $\vert X \vert -1$ hyperplanes, it follows that for an extreme point $\mu \in \tilde \Pi_{N,\text{sym}}(\rho)$, $\mu$ is the convex combination of $\vert X \vert$ elements in $\tilde \Gamma_N$. After a marginalization, it follows that a physical $N$-representable 3-marginal that satisfies the marginal constraint is a convex combination of $\vert X \vert$ elements of $\tilde \Gamma_3$, therefore $m=\vert X \vert$. As $\Theta^* \approx \sum_{i=1}^{\vert X\vert} a^*(i) \lambda_i^* \otimes \lambda_i^* \otimes \lambda_i^*$, if the approximation $\approx$ holds with an $=$ sign, and if $\lambda_1^*,\ldots,\lambda^*_{\vert X \vert}$ are linearly independent, then $\Theta^*$ has a unique CP tensor decomposition, up to ordering and magnitude of $\lambda^*_i$'s. This can be seen in Section \ref{section: jenrich} where Jenrich's algorithm provides an explicit construction of the $\lambda_i^*$'s. We note that although the assumption of linearly independent $\lambda_1^*,\ldots,\lambda^*_{\vert X \vert}$ is required for the success of Jenrich's algorithm, it is not a necessary condition to ensure the uniqueness of the CP-decomposition (see for example the theorem of Kruskal \cite{kruskal1977three}). In the situation where the linearly independence assumption is violated, one may use a different algorithm such as the alternating least-squares (ALS) for recovering the tensor components. Therefore, our rounding algorithm has three phases. We first use Jenrich's algorithm to obtain an initialization for $\lambda_i^*,i=1,\ldots,\vert X \vert$. Then a procedure based on ALS is used to refine the solution from Jenrich's algorithm and also enlarge the set $\{\lambda_i^*\}_{i=1}^{\vert X \vert }$ to $\{\lambda_i^*\}_{i=1}^p$. Lastly, we solve a regression problem to determine the convex combination of $\{\lambda_i^*\}_{i=1}^p$ that approximate $\Theta^*$ while satisfying the marginal constraint. The algorithm is summarized in Alg. \ref{algorithm: round2}. \begin{algorithm} \caption{Algorithm for rounding in the presence of the marginal constraint}\label{algorithm: round2} \begin{algorithmic}[1] \Procedure{Rounding2}{$\delta,\rho$} \State $\Theta^* \gets$ Solution to SDP-Coulomb2. \State $\{\lambda_i^*\}_{i=1}^{\vert X \vert} \gets$ JENRICH($\Theta^*$) (Section \ref{section: jenrich}). \State $\{\lambda_i^*\}_{i=1}^p \gets$ ALS($\Theta^*,\{\lambda_i^*\}_{i=1}^{\vert X \vert},\delta$) (Section \ref{section: als}). \State $a^* \gets \underset{a\in\mathbb{R}^p}{\text{argmin}} \|\Theta^*- \sum_{i=1}^p a(i) \lambda_i^* \otimes \lambda_i^* \otimes \lambda_i^* \|_F^2$ \ \ s.t. $a\geq 0$, $a^T \mathbf{1} =1 , \sum_{i=1}^p a(i) \lambda_i^* =\rho$. \State $\Theta^* \gets \sum_{i=1}^p a^*(i) \lambda_i^* \otimes \lambda_i^* \otimes \lambda_i^*$, \State \Return $\Theta^*$ \EndProcedure \end{algorithmic} \end{algorithm} \subsubsection{Jenrich's algorithm} \label{section: jenrich} In this section, we provide the details for Jenrich's algorithm in Alg. \ref{algorithm: jenrich} for the sake of completeness. \begin{algorithm} \caption{Jenrich algorithm}\label{algorithm: jenrich} \begin{algorithmic}[1] \Procedure{Jenrich}{$\Theta$} \State Get $w_1,w_2 \in \mathbb{R}^{\vert X \vert}$, $w_1(i),w_2(i) \sim \text{uniform}[0,1],i = 1,\ldots \vert X \vert$. \State $W_1 \gets \sum_{k=1}^{\vert X \vert} w_1(k) \Theta(:,:,k)$, $W_2 \gets \sum_{k=1}^{\vert X \vert} w_2(k) \Theta(:,:,k)$. \State Eigendecompose $W_1 W_2^{\dagger} = U \Sigma U^\dagger$, where $\Sigma$ is a diagonal matrix. \State $\lambda_i \gets U(:,i), i=1,\ldots,\vert X \vert$. \State $\lambda_i \gets \frac{\lambda_i}{\sqrt{N}\| \lambda_i\|_2}, i=1,\ldots,\vert X \vert$. \State \Return $\{\lambda\}_{i=1}^{\vert X \vert}$. \EndProcedure \end{algorithmic} \end{algorithm} The key idea of Alg. \ref{algorithm: jenrich} is that, if $\Theta = \sum_{i=1}^{\vert X \vert} a(i) \lambda_i \otimes \lambda_i \otimes \lambda_i$, then \begin{equation} W_1 = \sum_{i=1}^{\vert X \vert} (a(i) w_1^T \lambda_i) \lambda_i \lambda_i^T,\quad W_2 = \sum_{i=1}^{\vert X \vert} (a(i) w_2^T \lambda_i) \lambda_i \lambda_i^T. \end{equation} Thus \begin{equation} \label{Jenrich eig} W_1 W_2^\dagger = U S U^\dagger,\quad U =[ \lambda_1 \cdots \lambda_{\vert X \vert} ],\quad \Sigma = \diag^*\bigg(\bigg[\frac{a(1) w_1^T \lambda_1}{a(1) w_2^T \lambda_1},\ldots,\frac{a(\vert X \vert) w_1^T \lambda_{\vert X \vert}}{a(\vert X \vert) w_2^T \lambda_{\vert X \vert}}\bigg]\bigg). \end{equation} So the eigenvectors of $W_1 W_2^\dagger$ give $\lambda_1\ldots,\lambda_{\vert X \vert}$. The last step in Alg. \ref{algorithm: jenrich} is a normalization step to ensure $\|\lambda_i\|=1/\sqrt{N}$ for all $i$, since in principle $\lambda_i\in \mathcal{B}_N(X)$. As we see, if in \eqref{Jenrich eig} $\lambda_1,\ldots,\lambda_{\vert X \vert}$ are linearly independent, Jenrich's algorithm gives a unique decomposition since $\text{diag}(\Sigma)$ is non-degenerate generically (except for the entries correspond to $a(i)=0$). \subsubsection{Alternating least-squares} \label{section: als} To further refine the solution from Jenrich's algorithm to approximate a given tensor $\Theta$, we propose to use a variant of the ALS that is similar to a projected gradient descent. Ideally, if $\Theta = \sum_{i=1}^{\vert X \vert} a(i) \lambda_i\otimes \lambda_i \otimes \lambda_i$, one can try to solve \begin{eqnarray} \label{ALS} \min_{\substack{a\in \mathbb{R}^{\vert X \vert},\\ P,Q,R\in \mathbb{R}^{\vert X \vert\times \vert X \vert}}}&\ & \| \sum_{i=1}^{\vert X \vert} P(:,i) \otimes Q(:,i) \otimes R(:,i) - \Theta \|_F^2\\ \text{s.t.}&\ & Q=R, P =R\diag^*(a)\cr &\ &a\geq 0,\ a^T\mathbf{1} = 1\cr &\ & R(:,i) \in \mathcal{B}_N(X).\nonumber \end{eqnarray} using a local optimization algorithm and identify the $\lambda_i$'s with the $R(:,i)$'s, provided Jenrich's algorithm gives a good initialization. There is however a caveat. Although $\sum_{i=1}^{\vert X \vert} P(:,i) \otimes Q(:,i) \otimes R(:,i)$ provides an approximation to the 3-marginal $\Theta$, $\sum_{k,j=1}^{\vert X \vert}\sum_{i=1}^{\vert X \vert} P(:,i) \otimes Q(k,i) \otimes R(j,i) \neq \rho$ in general, hence the marginal constraint can be violated. To deal with such an issue, we want to identify a set of $\lambda_i$'s in $\mathcal{B}_N(X)$, $\{\lambda_i\}_{i=1}^p$, where $p>\vert X \vert$. With a more generous selection of the $\lambda_i$'s, some convex combination of $\{\lambda_i\}_{i=1}^p$ should give the correct marginal while approximating $\Theta$ from SDP-Coulomb2 \eqref{SDPCoulomb2}. To this end, the following problem with a less stringent constraint is solved instead: \begin{eqnarray} \label{nonsymmetric ALS} \min_{P,Q,R\in \mathbb{R}^{\vert X \vert\times \vert X \vert}}&\ & \| \sum_{i=1}^{\vert X \vert} P(:,i) \otimes Q(:,i) \otimes R(:,i) - \Theta \|_F^2\\ \text{s.t.}&\ & \|Q(:,i)\|_2 = 1/\sqrt{N}\cr &\ &N\ \text{entries of}\ \vert R(:,i) \vert \ \text{are}\ 1/N\ i=1,\ldots,\vert X \vert\nonumber. \end{eqnarray} Notice that each of the $R(:,i)$'s is not required to have only $N$ nonzero entries, unlike in \eqref{ALS} where $R(:,i)$'s belong to $\mathcal{B}_N(X)$. To solve \eqref{nonsymmetric ALS}, we use an ALS procedure detailed in Alg. \ref{algorithm: als}. The outer-loop of this procedure controls the number of the entries of $R(:,i)$ that have magnitude $1/N$. At every step of Alg. \ref{algorithm: als}, each column of $Q$ is normalized to $1/ \sqrt{N}$ after solving the least-squares concerning $Q$. To enforce the constraint on $R(:,i)$ in \eqref{nonsymmetric ALS}, after solving the least-squares concerning $R$, for each $R(:,i)$, $k$ entries with the largest magnitude are picked out and have their magnitude being set to $1/N$. When the iteration converges, we then enforce $k+1$ entries of each $R(:,i), i=1,\ldots,\vert X \vert$ to have magnitude $1/N$ in the ALS. These steps are repeated until $k=N$. We expect each $R(:,i), i=1,\ldots,\vert X \vert$ to have $N$ or slightly greater than $N$ entries that are large in magnitude. Using the large magnitude entries in each column of $R$, we exhaustively enumerate the candidate $\{\lambda_i\}_{i=1}^p$ where $\lambda_i \in \mathcal{B}_N(X)$. The number $p$ is controlled via the parameter $\delta$. \begin{algorithm} \caption{Modified alternating least-squares}\label{algorithm: als} \begin{algorithmic}[1] \Procedure{ALS}{$\Theta,\{\lambda_i\}_{i=1}^{\vert X \vert}$,$\delta$} \State Initialize $Q= [\lambda_1,\ldots,\lambda_{\vert X \vert}]$, $R = [\lambda_1,\ldots,\lambda_{\vert X \vert}]$. \For{$k$ from 1 to $N$} \While{not converge} \State $P \gets \arg\min_{\tilde P\in \mathbb{R}^{\vert X \vert\times \vert X \vert}} \| \sum_{i=1}^{\vert X \vert} \tilde P(:,i) \otimes Q(:,i) \otimes R(:,i) - \Theta \|_F^2 $. \State $Q \gets \arg\min_{\tilde Q\in \mathbb{R}^{\vert X \vert\times \vert X \vert}} \| \sum_{i=1}^{\vert X \vert} P(:,i) \otimes \tilde Q(:,i) \otimes R(:,i) - \Theta \|_F^2 $. \State $Q(:,i) \gets \frac{Q(:,i)}{\sqrt{N} \|Q(:,i)\|_2},\ i=1,\ldots,N$. \State $R \gets \arg\min_{\tilde R\in \mathbb{R}^{\vert X \vert\times \vert X \vert}} \| \sum_{i=1}^{\vert X \vert} P(:,i) \otimes Q(:,i) \otimes\tilde R(:,i) - \Theta \|_F^2 $. \State Set $k$ entries of $R(:,i), i=1,\ldots,\vert X \vert$ with the largest magnitude to have magnitude $1/N$. \EndWhile \EndFor \For{$i$ from 1 to $\vert X \vert$} \State $\mathcal{I}_i \gets \{j\ \vert \ \vert C(j,i)\vert > \delta/N \}$. \State Form $\xi_l^{(i)} \in \mathcal{B}_N(X), l=1,\ldots, {\vert \mathcal{I}_i \vert \choose N}$. The non-zero entries of $\xi_l^{(i)}$ for each $l$ are indexed by \State a subset of $\mathcal{I}_i $ with $N$ elements. \State $p_i\gets {\vert \mathcal{I}_i \vert \choose N}$. \EndFor \State $\{\lambda_i\}_{i=1}^p \gets \cup_{i=1}^{\vert X \vert} \{\xi_l^{(i)}\}_{l=1}^{p_i} $ \State \Return $\{\lambda_i\}_{i=1}^p$. \EndProcedure \end{algorithmic} \end{algorithm} \section{Numerical simulations}\label{section: numerical} In this section, we demonstrate the effectiveness of our approach using a few numerical examples. The energy is computed using \begin{equation} E(\gamma) = \sum_{i,j=1}^{\vert X \vert} \mathrm{Tr}( C(i,j) \gamma(i,j)), \end{equation} where $\gamma$ is the 2-marginal, obtained either via SDP-Coulomb or SDP-Coulomb2 (or their rounded versions). We denote the solution to SDP-Coulomb and SDP-Coulomb2 $\gamma_1^{-},\gamma_2^{-}$, and their rounded solutions $\gamma_1^{+},\gamma_2^{+}$. The superscripts are used to indicate whether we are using the solutions for the purpose of obtaining a lower bound or an upper bound for the energy. We always choose $C$ such that $C(x,y) = \frac{1}{\| x - y \|_2}, x,y\in X$,. In all cases, we choose a box $[-2,2]^d$ where $d$ is the dimension of the space where the electrons reside. A uniform discretization is then applied to $[-2,2]^d$ to get the discrete domain $X$. We use \begin{equation} {E_\text{gap}}_i = \frac{E(\gamma_i^+) - E(\gamma_i^-) }{E(\gamma_i^-)},\quad i=1,2 \end{equation} to provide an idea on how close we are to the true energy. SDP-Coulomb and SDP-Coulomb2 are implemented using the large scale SDP solver SDPNAL+\cite{yang2015sdpnal}. \subsection{Optimizing a linear functional over the 2-marginal} In this section, we let $g(\lambda)$ in \eqref{symmetric MM} be an arbitrary linear functional $c^T \lambda$. This can be seen as an external potential $v_\text{ext}$ in \eqref{total minimization}. Then SDP-Coulomb is solved to obtain the 2-marginals. Since one can already devise a rounding scheme (Section \ref{section: rounding 1}) based on the solution of SDP-Coulomb, we only present the energy gap derived from $\gamma_1^{-}$ and $\gamma_1^{+}$. Unlike SDP-Coulomb2, SDP-Coulomb only involves a matrix with size $\vert X \vert \times \vert X \vert$, therefore we can apply it to grids with larger size. The model for the vector $c$ considered is \begin{equation} c =\sigma (\min_{i,j}C(i,j)) \mathcal{N}(0,1). \end{equation} In Table \ref{table: egap2D} and \ref{table: egap3D}, we present ${E_\text{gap}}_1$ for $d=2,3$, with $N=5,9,13$. When $d=2$, we use a grid with size $\vert X \vert =20^2$. When $d=3$, we let $\vert X \vert = 9^3$. \begin{table}[ht] \centering \begin{tabular}{c c c c } \hline\hline & $\sigma=0$ &$\sigma=0.25$ & $\sigma=0.5$\\ [0.5ex] % \hline\hline $n=5$ & 3.3e-03 & 7.6e-03 & 1.3e-02 \\ $n=9$ & 3.8e-03 & 3.0e-03 & 3.6e-03\\ $n=13$ & -2.0e-05 & 3.1e-03 & 3.4e-03 \\[1ex] \hline \end{tabular} \caption{${E_\text{gap}}_1$ for electrons in 2D. Here $\vert X \vert = 20^d$, $d=2$. The energy gap is averaged over 12 realizations of $c$. The negative gap between the upper and lower bounds when $\sigma=0, N=13$ is due to the accuracy limitation of the optimization package. }\label{table: egap2D} \end{table} \begin{table}[ht] \centering \begin{tabular}{c c c c } \hline\hline & $\sigma=0$ &$\sigma=0.25$ & $\sigma=0.5$\\ [0.5ex] % \hline\hline $n=5$ & 3.7e-02&8.1e-03 & 5e-03 \\ $n=9$ & 7.9e-03&5.1e-03 & 3.5e-03 \\ $n=13$ & 3.2e-03&2.8e-03 & 3.1e-03 \\[1ex] \hline \end{tabular} \caption{${E_\text{gap}}_1$ for electrons in 3D. Here $\vert X \vert = 9^d$, $d=3$. The energy gap is averaged over 12 realizations of $c$. }\label{table: egap3D} \end{table} \subsection{Multimarginal Optimal Transport} In this section, we present numerical results for different instances of Problem \eqref{SCE OT}. Both SDP-Coulomb and SDP-Coulomb2 are tested. Due to the size of the variable in SDP-Coulomb2, we can only afford a smaller grid size. The point of the simulation is to demonstrate how an upper bound of the energy can be extracted using SDP-Coulomb2, through method presented in Section \ref{section: rounding 2}. In the case of 1D, we use three different marginals \begin{equation} \rho_1(x) \propto 1,\ \quad \rho_2(x) \propto \exp(-x^2/\sqrt{\pi}),\quad \rho_3(x) \propto \sin(4x)+1.5. \end{equation} where $\rho_1,\rho_2,\rho_3$ are appropriately normalized. Using the combination of SDP-Coulomb2 and Alg. \ref{algorithm: round2}, an upper-bound can be obtained. We present the results with $\vert X \vert = 64$ and $N=8$ in Fig. \ref{figure: unif64}, \ref{figure: gaussian64} and \ref{figure: sine64}. In all examples, we obtained an energy gap from the order of 1e-04 to 1e-02. The running times for SDP-Coulomb and SDP-Coulomb2 are about 7s and 249s on average. In general, we observe a fuzzier 2-marginal in SDP-Coulomb, especially when the marginal is $\rho_3$. We note that the marginals chosen are bounded away from 0. This is because if there are sites where the marginal is close to zero, due to the approximation error of SDP-Coulomb2, $\Theta^*$ may be inaccurate on these sites, making rounding difficult. For the 2D case, we tested it on a Gaussian distribution \begin{equation} \rho_4(x,y) \propto \exp(-(x^2+y^2)/\sqrt{12\pi}) \end{equation} with $\vert X\vert =10^2$ and $N=6$. The running time for SDP-Coulomb and SDP-Coulomb2 are 4.7s and 731s respectively. Again, the difference between the quality of the solutions from SDP-Coulomb and SDP-Coulomb2 is rather small. \begin{figure}[!ht] \centering \subfloat[SDP-Coulomb.]{\includegraphics[width=0.47\columnwidth]{figures/unif1_64.pdf}} \qquad \subfloat[SDP-Coulomb2.]{\includegraphics[width=0.47\columnwidth]{figures/unif2_64.pdf}} \qquad \caption{2-marginal from solving the multimarginal transport problem with the marginal $\rho_1(x)$ where $N=8$, $\vert X \vert = 64$, $d=1$. (a): Solution from SDP-Coulomb. ${E_\text{gap}}_1=$ 4.9e-04. (b): Solution from SDP-Coulomb2. ${E_\text{gap}}_2=$ -1.0e-06. The negative sign for the energy gap is due to the limitation of numerical accuracy. }\label{figure: unif64} \end{figure} \begin{figure}[!ht] \centering \subfloat[SDP-Coulomb.]{\includegraphics[width=0.47\columnwidth]{figures/gaussian1_64.pdf}} \qquad \subfloat[SDP-Coulomb2.]{\includegraphics[width=0.47\columnwidth]{figures/gaussian2_64.pdf}} \qquad \caption{2-marginal from solving the multimarginal transport problem with the marginal $\rho_2(x)$ where $N=8$, $\vert X \vert = 64$, $d=1$. (a): Solution from SDP-Coulomb. ${E_\text{gap}}_1=$ 1.8e-03. (b): Solution from SDP-Coulomb2. ${E_\text{gap}}_2=$ 1.5e-03.}\label{figure: gaussian64} \end{figure} \begin{figure}[!ht] \centering \subfloat[SDP-Coulomb.]{\includegraphics[width=0.47\columnwidth]{figures/sine1d1_64.pdf}} \qquad \subfloat[SDP-Coulomb2.]{\includegraphics[width=0.47\columnwidth]{figures/sine1d2_64.pdf}} \qquad \caption{2-marginal from solving the multimarginal transport problem with the marginal $\rho_3(x)$ where $N=8$, $\vert X \vert = 64$, $d=1$. (a): Solution from SDP-Coulomb. ${E_\text{gap}}_1=$ 4.2e-02. (b): Solution from SDP-Coulomb2. ${E_\text{gap}}_2=$ 3.9e-02.}\label{figure: sine64} \end{figure} \begin{figure}[!ht] \centering \subfloat[SDP-Coulomb.]{\includegraphics[width=0.47\columnwidth]{figures/gaussian2d2_100.pdf}} \qquad \subfloat[SDP-Coulomb2.]{\includegraphics[width=0.47\columnwidth]{figures/gaussian2d2_100.pdf}} \qquad \caption{Solution to the multimarginal transport problem with the marginal $\rho_4(x)$ where $N=6$, $\vert X \vert = 10^2$, $d=2$. The 2D domain $X$ is vectorized in order to present the 2-marginal. (a): Solution from SDP-Coulomb. ${E_\text{gap}}_1=$ 3.8e-02. (b): Solution from SDP-Coulomb2. ${E_\text{gap}}_2=$ 3.5e-02.}\label{figure: gaussian2d} \end{figure} \subsection{Approximating the Kantorovich potential} As mentioned previously, the dual problem \eqref{vsce dual} can also be used to approximate the Kantorovich problem \eqref{vsce}. The 1D cases admit semi-analytic solutions for the dual potential \cite{seidl1999strong}. First, the \emph{comotion function} is defined as \begin{equation} f_i(x)=\begin{cases} N_e^{-1}(N_e(x)+i-1), & x\leq N_e^{-1}(N+1-i), \\ N_e^{-1}(N_e(x)+i-1-N), & x > N_e^{-1}(N+1-i), \end{cases} \end{equation} for $i=1,\ldots,N$, where \begin{equation} N_e := N \int_{-\infty}^x \rho(x) dx. \end{equation} Then the Kantorovich potential $v^*(x)$ is defined via \begin{equation} \label{gt kanto} \nabla v^*(x) = -N\sum_{i=1}^N \frac{x- f_i(x)}{\| x-f_i(x) \|_2^3}. \end{equation} We compare the dual potential $w^*$ obtained from solving \eqref{vsce dual} to the ground truth Kantorovich potential \eqref{gt kanto}. We let $\vert X \vert = 200$ and the marginals being $\rho_1(x),\rho_2(x)$ and $\rho_3(x)$. The error is reported using the metric \begin{equation} \text{Error}_v = \frac{\| v^*-w^*\|_2}{\|v^*\|_2}. \end{equation} In these cases, we obtain errors of the order of $10^{-3}$ to $10^{-2}$. The results are presented in Fig. \ref{figure: kantorovich}. \begin{figure}[!ht] \centering \subfloat[$\rho_1(x)$.]{\includegraphics[width=0.4\columnwidth]{figures/kanto1.pdf}} \qquad \subfloat[$\rho_2(x)$.]{\includegraphics[width=0.4\columnwidth]{figures/kanto2.pdf}} \qquad \subfloat[$\rho_3(x)$.]{\includegraphics[width=0.4\columnwidth]{figures/kanto3.pdf}} \caption{Solution to the dual problem \eqref{vsce} where $N=8$, $\vert X \vert = 200$, $d=1$. The ground truth is given by \eqref{gt kanto}, and the approximation is given by the solution to the dual problem of SDP-Coulomb \eqref{vsce dual}. (a): With marginal $\rho_1(x)$. $\text{Error}_v$=4.5e-03. (b): With marginal $\rho_2(x)$. $\text{Error}_v$=1.4e-03. (c): With marginal $\rho_3(x)$. $\text{Error}_v$=1.2e-02. }\label{figure: kantorovich} \end{figure} \section{Conclusion} We propose methods based on convex relaxation for solving the multi-marginal transport type problems in the context of DFT. By convexly relaxing the domain of 2 and 3-marginals, the resulting convex optimization problems have computational complexities independent of the number of electrons. For the numerical simulations presented here, directly applying linear programming or Sinkhorn scaling based algorithm \cite{benamou2016numerical} to Problem \eqref{symmetric MM} would have led to a tensor with number of entries between $10^{14}$ to $10^{25}$, for the choice of $N$ and $\vert{X}\vert$ used here. Furthermore, a key feature of the proposed methods is that they provide both upper and lower bounds on the energy. From an algorithmic point of view, it is crucial to develop faster customized optimizer in order to address large-scale applications in the future. From a theoretical point of view, it is important to study theoretically how well SDP-Coulomb and SDP-Coulomb2 approximate Problem \eqref{symmetric MM}. \section*{Acknowledgments} The authors thank Prof. Lin Lin for introducing the problem. Y.K. thanks Prof. Emmanuel Cand\`es for the partial support from a Math+X postdoctoral fellowship. The work of Y.K. and L.Y. is partially supported by the U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research, Scientific Discovery through Advanced Computing (SciDAC) program and the National Science Foundation under award DMS-1818449. \bibliographystyle{abbrv}
\subsection{Related Work} {\bf Milling with Turn Costs.} Arkin et al.~\cite{arkin2001optimal,arkin2005optimal} introduce the problem of milling (i.e., ``carving out'') with turn costs. They show hardness of finding an optimal tour, even in {\em thin} 2-dimensional grid graphs (which do not contain an induced $2\times 2$ subgraph) with a given optimal cycle cover. They give a $2.5$-approximation algorithm for obtaining a cycle cover, resulting in a $3.75$-approximation algorithm for tours. The complexity of finding an optimal cycle cover in a 2-dimensional grid graph was established as \emph{Problem~{53}} in \emph{The Open Problems Project}~\cite{openproblemproject}. Maurer~\cite{maurer2009diploma} proves that a cycle {\em partition} with a minimum number of turns in grid graphs can be computed in polynomial time and performs practical experiments for optimal cycle covers. De Assis and de Souza~\cite{de2011experimental} computed a provably optimal solution for an instance with 76 vertices. For the abstract version on graphs, Fellows et al.~\cite{fellows2009abstract} show that the problem is fixed-parameter tractable by the number of turns, tree-width, and maximum degree. Benbernou~\cite{benbernou2011diss} considered milling with turn costs on the surface of polyhedrons in the 3-dimensional grid. She gives a corresponding 8/3-approximation algorithm for tours. Note that the theoretical work presented in this paper has significant practical implications. As described in our forthcoming conference paper~\cite{ALENEX19}, the IP/LP-characterization presented in Section~\ref{sec:approx} can be modified and combined with additional algorithm engineering techniques to allow solving instances with more than 1000 pixels to provable optimality (thereby expanding the range of de Assis and de Souza~\cite{de2011experimental} by a factor of 15), and computing solutions for instances with up to 300,000 pixels within a few percentage points (thereby showing that the practical performance of our approximation techniques is dramatically better than the established worst-case bounds). For mowing problems, i.e., covering a given area with a moving object that may leave the region, Stein and Wagner~\cite{wagner2001approximation} give a 2-approximation algorithm on the number of turns for the case of orthogonal movement. If only the traveled distance is considered, Arkin et al.~\cite{arkin2000approximation} provide approximation algorithms for milling and mowing. \old{ \subsection{Milling/covering in practice} An extensive survey on (mostly heuristic) covering paths/tours methods for robots has been made by Galceran and Carreras \cite{galceran2013survey}. A possible technique is to partition the area by a grid as, e.g., done by Zelinsky et al.~\cite{zelinsky1993planning}, or Gabriely and Rimon~\cite{gabriely2002spiral}. The grid graphs considered in this thesis are assumed to origin from such a discretization. A different approach is to partition the area into simpler geometric areas (e.g. trapezoidal map) and then use simple patterns to cover the simple areas. For example, Huang~\cite{huang2001optimal} does such a partition and then calculates the optimal orientation for a zig-zag coverage of these simple areas. This correlates to the number of turns needed for the zig-zag coverage. Covering tour optimization is also important for cutter. Yao et al.~\cite{yao2002hybrid} analyze different cutter path generation methods and propose a greedy and a branch and bound algorithm for generating so-called hybrid cutter paths that use different path types for different parts. They also mention the increase of the costs due to sharp turns. Covering path planning is also important on larger scales, such as for autonomous agricultural machines on pixels, whose high precision GPS allow them to follow previously optimized tours. Corresponding work has been done by, e.g., Ta{\"\i}x et al.~\cite{taix2003path} and Ali et al.~\cite{ali2009infield}. Ali et al. ~\cite{ali2009infield} consider tour planning for tractors for crop harvesting operations including turn penalties. Covering is also done by UAVs for area observation. Some UAVs have strong restrictions on the turn radius that usually cannot be ignored for covering tour planning. Such optimizations have been considered by, e.g., Ahmadzadeh et al.~\cite{ahmadzadeh2008optimization} and Agarwal et al.~\cite{agarwal2005aco}. } \old{ \subsection{Quadratic TSP} Chapter~\ref{chapter:geo} generalizes the problem from grid graphs to points in the $\mathbb{R}^2$ plane with polygonal obstacles and a limited discrete set of orientations a point can be passed through. The cost consists of the weighted sum of turning angles and the length. While in the grid graph only orthogonal movement ($90\degree$ and $180\degree$ turns) were allowed, now all turns ($0\degree$ - $180\degree$ clockwise or counterclockwise) are allowed and weighted linearly. This is related to the \emph{quadratic traveling salesman problem (QTSP)} where the cost of an edge depends on the previous edge (the costs are not induced by geometry but can be arbitrarily selected). J{\"a}ger and Molitor~\cite{jager2008algorithms} give two exact solution methods and seven heuristics for the asymmetric version. They were only able to give exact solutions for instances with 24 points and heuristic solutions for 44 points. They also noted that random instances seem to be simpler than real instances. Fischer et al.~\cite{fischer2014exact} give similar but more advanced results on the symmetric version. Their branch and cut integer programming approach (with problem specific cutting planes) is able to calculate optimal solutions for real-world instances (from bioinformatics) of the size of up to 100 vertices in less than 10 minutes. An extensive study of the QTSP polytope has been made by Fischer in her dissertation~\cite{fischer2013diss} (see also \cite{fischer2013symmetric}). More computational results with integer programming containing also more variants (e.g., the maximization instead of minimization) follow in Aichholzer et al.~\cite{aichholzerminimization}. The tested instances have sizes of less than 100 points. Rostami et al.~\cite{rostami2013quadratic} also consider optimal solver and lower bounding procedures for the Q(A)TSP but the experiments only consider very small instances (less than 25 points). In this thesis, we are able to obtain an $O(\omega)$-approximation if the ways to pass a point are discretized to $\omega$ orientations (e.g. horizontally and vertically). They also show that optimal angular metric cycle covers and tours are NP-hard to calculate. The NP-hardness proof in Section~\ref{sec:gg:hard:subset} for subset cycle cover in thin 2-dimensional grid graphs is adapted from this proof. } {\bf Angle and curvature-constrained tours and paths.} If the instances are in the $\mathbb{R}^2$ plane and only the turning angles are measured, the problem is called the \emph{Angular Metric Traveling Salesman Problem}. Aggarwal et al.~\cite{aggarwal2000angular} prove hardness and provide an $O(\log n)$ approximation algorithm for cycle covers and tours that works even for distance costs and higher dimensions. As shown by Aichholzer et al.~\cite{oswin2017minimization}, this problem seems to be very hard to solve optimally with integer programming. Fekete and Woeginger~\cite{fekete1997angle} consider the problem of connecting a point set with a tour for which the angles between the two successive edges are constrained. Finding a curvature-constrained shortest {\em path} with obstacles has been shown to be NP-hard by Lazard et al.~\cite{lazard1998complexity}. Without obstacles, the problem is known as the \emph{Dubins path}~\cite{dubins1957curves} that can be computed efficiently. For different types of obstacles, Boissonnat and Lazard~\cite{boissonnat1996polynomial}, Agarwal et al.~\cite{agarwal2002curvature} and Agarwal and Wang~\cite{agarwal2001approximation} provide polynomial-time algorithms or $1+\epsilon$ approximation algorithms, respectively. Takei et al.~\cite{takei2010practical} consider the solution of the problem from a practical perspective. The \emph{Dubins Traveling Salesman Problem} is considered by Le Ny et al.\cite{le2012dubins} {\bf Related combinatorial problems.} Goemans and Williamson~\cite{goemans1995general} provide an approximation technique for constrained forest problems and similar problems that deal with penalties. In particular, they provide a 2-approximation algorithm for \emph{Prize-Collecting Steiner Trees} in general symmetric graphs and the \emph{Penalty Traveling Salesman Problem} in graphs that satisfy the triangle inequality. An introduction into approximation algorithms for prize-collecting/penalty problems, k-MST/TSP, and minimum latency problems is given by Ausiello et al.~\cite{ausiello2007prize}. \subsection{Preliminaries} \label{sec:prelim} The angular metric traveling salesman problem resp.\ cycle cover problem ask for a cycle resp.\ set of cycles such that a given set $P$ of $n$ points in $\mathbb{R}^d$ is covered and the sum of turn angles in minimized. A cycle is a closed chain of segments and covers the points of the segments' joints (at least two of $P$). The turn angle of a joint is the angle difference to $180^\circ$. In the presence of polygonal obstacles, cycles are not allowed to cross them. We consider three coverage variants: Full, subset, and penalty. In full coverage, every point has to be covered. In subset coverage, only points in a subset $S\subseteq P$ have to be covered (which is only interesting for grid graphs). In penalty coverage, no point has to be covered but every uncovered point $p\in P$ induces a penalty $c(p)\in \mathbb{Q}^+_0$ on the objective value. Optionally, the objective function can be a linear combination of distance and turn costs. In the following, we introduce the \emph{discretized angular metric}, by considering for every point $p\in P$ a set of $\omega$ possible orientations (and thus, $2\omega$ possible directions) for a trajectory through $p$. We model this by considering for each $p\in P$ a set $O_p$ of $\omega$ infinitely short segments, which we call \emph{atomic strips}; a point is covered if one of its segments is part of the cycle, see Fig.~\ref{fig:angtsp_to_atomic_strips}. The corresponding selection of atomic strips is called \emph{Atomic Strip Cover}, i.e., a selection of one $o\in O_p$ for every $p\in P$. \begin{figure}[h] \vspace*{-3mm} \centering \includegraphics[width=0.9\textwidth]{./figures/angular_tsp_to_atomic_strips} \caption{Transforming an angular metric TSP instance and solution to an instance based on atomic strips, which can be considered infinitely small segments.} \label{fig:angtsp_to_atomic_strips} \vspace*{-3mm} \end{figure} The atomic strips induce a weighted graph $G_O(V_O, E_O)$ with the endpoints of the atomic strips as vertices and the connections between the endpoints as edges. The weight of an edge in $G_O$ equals the connection costs, in particular the turn costs on the two endpoints. Thus, the cycle cover problem turns into finding an Atomic Strip Cover with the minimum-weight perfect matching on its induced subgraph. As the cost of connections in it depends on {\em two} edges in the original graph, we call this generalized problem (in which the edge weights do not have to be induced by geometry) the \emph{semi-quadratic cycle cover problem}. It is important to note that the weights do not satisfy the triangle inequality; however, a direct connection is not more expensive than a connection that includes another atomic strip, giving rise to the following {\em pseudo-triangle inequalities}. \begin{equation} \forall v_1, v_2\in V_O, w_1w_2\in O_p, p\in P: \begin{matrix} \text{cost}(v_1v_2)\leq \text{cost}(v_1w_1)+\text{cost}(w_2v_2) \\ \text{cost}(v_1v_2)\leq \text{cost}(v_1w_2)+\text{cost}(w_1v_2) \end{matrix} \label{eq:triang} \end{equation} Our model allows the original objective function to be a linear combination of turn and distance costs, as it does not influence Eq.~(\ref{eq:triang}). Instances with polygonal obstacles for 2-dimensional geometric instances are also possible (however, for 3D, the corresponding edge weights can no longer be computed efficiently). A notable special case are {\em grid graphs} that arise as vertex-induced subgraph of the infinite integer orthogonal grid. In this case, a point can only be covered straight, by a simple $90^\circ$ turn, or by a $180^\circ$ u-turn. We show grid graphs as polyominoes in which vertices are shown as {\em pixels}. We also speak of the number of {\em simple turns} (u-turns counting as two) instead of turn angles. More general grid graphs can be based on other grids, such as 3-dimensional integral or hexagonal grids. Minimum turn cycle covers in grid graphs can be modelled as a semi-quadratic cycle cover problem with $\omega=2$ and edge weights satisfying Eq.~(\ref{eq:triang}). One of the atomic strips represents being in a horizontal orientation (with an east and a west heading vertex) and the other being in a vertical orientation (with a north and a south heading vertex). The cost of an edge is as follows: Every vertex is connected to a position and a direction. The cost is the cheapest transition from the position and direction of the first vertex to the position and opposite heading of the second vertex (this is symmetric and can be computed efficiently). We can easily transform a cycle cover in a grid graph into one based on atomic strips and vice versa, see Fig.~\ref{fig:convert} (left). \begin{figure}[t] \vspace*{-3mm} \centering \includegraphics[width=0.5\columnwidth]{./figures/atomtic_strip_cover_matching_equivalent} \hspace*{0.04\columnwidth} \includegraphics[width=0.25\columnwidth]{./figures/orientation_for_turns_doesnt_matter} \caption{{\bf (Left)} From an optimal cycle cover (dotted) we can extract an Atomic Strip Cover (thick black), such that the matching (orange) induces an optimal solution. {\bf (Right)} For turns it does not matter if we choose the horizontal or vertical atomic strip.} \label{fig:strip_orientation_turns} \label{fig:convert} \vspace*{-3mm} \end{figure} For each pixel we choose one of its transitions. If it is straight, we select the equally oriented strip; otherwise it does not matter, see Fig.~\ref{fig:strip_orientation_turns}~(right). With more atomic strips we can also model more general grid graphs such as hexagonal or 3-dimensional grid graphs with three atomic strips. \subsection{Our Contribution} We provide the following results. \begin{itemize} \item We resolve \emph{Problem~{53}} in \emph{The Open Problems Project}~\cite{openproblemproject} by proving that finding a cycle cover of minimum turn cost is NP-hard, even in the restricted case of grid graphs. We also prove that finding a subset cycle cover of minimum turn cost is NP-hard, even in the restricted case of {\em thin} grid graphs, in which no induced $2\times 2$ subgraph exists. This differs from the case of full coverage in thin grid graphs, which is known to be polynomially solvable~\cite{arkin2005optimal}. \item We provide a general IP/LP-based technique for obtaining $2*\omega$ approximations for the semi-quadratic (penalty) cycle cover problem if Eq.~(\ref{eq:triang}) is satisfied, where $\omega$ is the maximum number of atomic strips per vertex. \item We show how to connect the cycle covers to minimum turn tours to obtain a $6$ approximation for full coverage in regular grid graphs, $4\omega$ approximations for full tours in general grid graphs, $4\omega+2$ approximations for (subset) tours, and $4\omega+4$ for penalty tours. \end{itemize} To the best of our knowledge, this is the first approximation algorithm for the subset and penalty variant with turn costs. For general grid graphs our techniques yields better guarantees than than the techniques of Arkin et al.\ who give a factor of $6*\omega$ for cycle covers and $6*\omega+2$ for tours. In practice, our approach also yields better solutions for regular grid graphs, see~\cite{ALENEX19}. \section{Introduction} Finding roundtrips of minimum cost is one of the classic problems of theoretical computer science. In its most basic form, the objective of the \emph{Traveling Salesman Problem (TSP)} is to minimize the total length of a single tour that covers all of a given set of locations. If the tour is not required to be connected, the result may be a {\em cycle cover}: a set of closed subtours that together cover the whole set. This distinction makes a tremendous difference for the computational complexity: while the TSP is NP-hard, computing a cycle cover of minimum total length can be achieved in polynomial time, based on matching techniques. Evaluating the cost for a tour or a cycle cover by only considering its length may not always be the right measure. Fig.~\ref{fig:drone} shows an example application, in which a drone has to sweep a given region to fight mosquitoes that may transmit dangerous diseases. As can be seen in the right-hand part of the figure, by far the dominant part of the overall travel cost occurs when the drone has to change its direction. (See our related video and abstract~\cite{drone_vid} for more details, and the resulting tour optimization.) There is an abundance of other related applied work, e.g., mowing lawns or moving huge wind turbines~\cite{wind}. \vspace*{-3mm} \begin{figure}[h] \includegraphics[width=.30\textwidth]{./figures/DroneAndNet_v2} \includegraphics[width=.31\textwidth]{./figures/DroneConfigs} \includegraphics[width=.35\textwidth]{./figures/turncost} \caption[Mosquito hunting drone]{{\bf (Left)} A drone equipped with an electrical grid for killing mosquitoes. {\bf (Middle)} Physical aspects of the flying drone. {\bf (Right)} Making turns is expensive. See our related video at \url{https://www.youtube.com/watch?v=SFyOMDgdNao} for details, and \cite{drone_vid} for an accompanying abstract.} \label{fig:drone} \vspace*{-6mm} \end{figure} For many purposes, two other variants are also practically important: for \emph{subset coverage}, only a prespecified subset of locations needs to be visited, while for \emph{penalty coverage}, locations may be skipped at the expense of an individual penalty. From the theoretical side, Arkin et al.~\cite{arkin2005optimal} showed that finding minimum-turn tours in grid graphs is NP-hard, even if a minimum-turn cycle cover is given. The question whether a minimum-turn cycle cover can be computed in polynomial time (just like a minimum-length cycle cover) has been open for at least 17 years, dating back to the conference paper~\cite{arkin2001optimal}; it has been listed for 15 years as \emph{Problem~{53}} in \emph{The Open Problems Project} edited by Demaine, Mitchell, and O'Rourke~\cite{openproblemproject}. In Section~\ref{sec:gg:hardness} we resolve this problem by showing that computing a minimum-turn cycle cover in planar grid graphs is indeed NP-hard. This makes it important to develop approximation algorithms. In Section~\ref{sec:approx}, we present a general technique based on Integer Programming (IP) formulations and their Linear Programming (LP) relaxations. By the use of polyhedral results and combinatorial modifications, we can establish constant approximation factors of this technique for all problem variants. \section{Complexity} \label{sec:gg:hardness} \emph{Problem~{53}} in \emph{The Open Problems Project} asks for the complexity of finding a minimum-turn (full) cycle cover in a 2-dimensional grid graph. This is by no means obvious: large parts of a solution can usually be deduced by local information and matching techniques. In fact, it was shown by Arkin et al.~\cite{arkin2001optimal,arkin2005optimal} that the full coverage variant in {\em thin} grid graphs (which do not contain a $2\times 2$ square, so every pixel is a boundary pixel) is solvable in polynomial time. In this section, we prove that finding a {\em full} cycle cover in 2-dimensional grid graphs with minimum turn cost is NP-hard, resolving \emph{Problem~{53}}. We also show that {\em subset} coverage is NP-hard even for {\em thin} grid graphs, so the boundary techniques by Arkin et al.~\cite{arkin2001optimal,arkin2005optimal} do not provide a polynomial-time algorithm. \subsection{Full Coverage in Grid Graphs} \begin{theorem} \label{th:gg:hard:nphard} It is NP-hard to find a cycle cover with a minimum number of $90^\circ$ turns ($180^\circ$ turns counting as two) in a grid graph. \end{theorem} The proof is based on a reduction from~\emph{One-in-three 3SAT} (1-in-3SAT), which was shown to be NP-hard by Schaefer~\cite{schaefer1978complexity}: for a Boolean formula in conjunctive normal form with only three literals per clause, decide whether there is a truth assignment that makes exactly one literal per clause {\tt true} (and exactly two literals {\tt false}). For example, $(x_1\vee x_2 \vee x_3) \wedge (\overline{x_1}\vee \overline{x_2} \vee \overline{x_3})$ is not (1-in-3) satisfiable, whereas $(x_1\vee x_2 \vee x_3) \wedge (\overline{x_1}\vee \overline{x_2} \vee \overline{x_4})$ is satisfiable. \ifx\undefined \begin{figure} \centering \includegraphics[width=1.0\columnwidth]{./figures/nphard_simple_large} \caption{Representing the \emph{1-in-3SAT}-formula $x_1+x_2+x_3=1\wedge \overline{x_1}+\overline{x_2}+\overline{x_4}=1 \wedge \overline{x_1}+x_2+\overline{x_3}=1$.} \label{fig:nphard:simple:multiclause} \vspace*{-6mm} \end{figure} \else \input{./auxiliary/hardness_construction_symbols.tex} \begin{figure} \centering \includegraphics[width=0.32\columnwidth]{./figures/nphard_simple_clause_x1} \includegraphics[width=0.32\columnwidth]{./figures/nphard_simple_clause_x3} \includegraphics[width=0.32\columnwidth]{./figures/nphard_simple_clause_x2} \caption{Construction for the one-clause formula $x_1+x_2+x_3=1$ and three possible solutions. Every variable has a cycle traversing a zig-zagging path of blue pixels. A variable is {\tt true} if its cycle uses the upper path (\variabletruesymbol) through green/red pixels, {\tt false} if it takes the lower path (\variablefalsesymbol). For covering the red pixels, we may use two additional turns. This results in three classes of optimal cycle covers, shown above. If we use the blue 4-turn cycle to cover the upper two red pixels, we are forced to cover the lower red pixel by the $x_3$ variable cycle, setting $x_3$ to {\tt false}. The variable cycles of $x_1$ and $x_2$ take the cheapest paths, setting them to {\tt true} or {\tt false}, respectively. The alternative to a blue cycle is to cover all three red pixel by the variable cycles, as in the right solution.} \vspace*{-3mm} \label{fig:nphard:simple:singleclause} \end{figure} \fi \input{./auxiliary/hardness_construction_symbols.tex} \input{./figures/nphard_simple_clause.tex An example is given in Fig.~\ref{fig:nphard:simple:multiclause} for the instance $x_1+x_2+x_3=1\wedge \overline{x_1}+\overline{x_2}+\overline{x_4}=1 \wedge \overline{x_1}+x_2+\overline{x_3}=1$. For every variable we have a \variableconstrsymbol~gadget consisting of a gray \variablepoundsymbol~gadget and a zig-zagging, high-cost path of blue pixels. A cheap solution traverses a blue path once and connect the ends through the remaining construction of gray and red pixels. Such {\em variable cycles} (highlighted in red) must either go through the upper (\variabletruesymbol) or lower (\variablefalsesymbol) lane of the variable gadget; the former corresponds to a {\tt true}, the later to a {\tt false} assignment of the corresponding variable. A {\em clause gadget} modifies a lane of all three involved variable gadgets. This involves the gray pixels that are covered by the green cycles; we can show that they do not interfere with the cycles for covering the blue and red pixels, and cannot be modified to cover them. Thus, we only have to cover red and blue pixels, but can pass over gray pixels, too. To this end, we must connect the ends of the blue paths; as it turns out, the formula is satisfiable if and only if we can perform this connection in a manner that also covers one corresponding red pixel with at most two extra turns. \definecolor{ipe-red}{rgb}{1 0 0} \newcommand{\fillfieldred}[0]{red!80} \definecolor{ipe-gray}{gray}{0.745} \newcommand{\fillfieldgray}[0]{ipe-gray} \definecolor{ipe-blue}{rgb}{0,0,1} \newcommand{\fillfieldblue}[0]{ipe-blue} \ifx\undefined \input{./figures/nphard_simple_clause.tex \else \begin{figure} \centering \includegraphics[width=\columnwidth]{./figures/nphard_simple_large} \caption{Representing the \emph{1-in-3SAT}-formula $x_1+x_2+x_3=1\wedge \overline{x_1}+\overline{x_2}+\overline{x_4}=1 \wedge \overline{x_1}+x_2+\overline{x_3}=1$.} \label{fig:nphard:simple:multiclause} \end{figure} \fi There are three important conclusions. \begin{enumerate} \item The gray pixels are always covered by the green cycles or the solution can be modified without extra turns. Thus, we only need to focus on the logic of covering the blue and red pixels. This is based on the observation that for keeping tight local upper bounds on the number of turns, we are only allowed to make turns at very specific locations. \item There are only the red variable cycles that cover exactly the red pixels on the {\tt true} or {\tt false} lane and the simple 4-turn blue cycles for covering two vertically adjacent red pixels available for covering the red and blue pixels within the upper bounds of turns for satisfiable constructions. \item A coverage with only two turns per red pixel is possible if and only if the underlying formula is satisfiable. \end{enumerate} The first item is the most challenging, but also most crucial part. \subsubsection{Basic Construction} We use a reduction from \emph{One-in-three 3SAT}. Refer to Fig.~\ref{fig:nphard:simple:multiclause} for the overall construction. Fig.~\ref{fig:rawvariable} shows the building block for a variable gadget, formed by a zig-zagging path, marked in blue; this path enforces its covering cycle to go through the box (gray) of the variable, because a double coverage of itself would be too expensive because of the zig-zagging part. It can be seen that this covering cycle takes the upper path if the corresponding variable is set to {\tt true} and takes the lower path if the variable is set to {\tt false}. \begin{figure}[h!] \centering \newcommand{\tikzsquare}[3]{\draw[#3] (#1-0.5,#2-0.5)--(#1+0.5,#2-0.5)--(#1+0.5,#2+0.5)--(#1-0.5,#2+0.5)--(#1-0.5,#2-0.5);} \newcommand{\tikzsquares}[5]{ \foreach \a in {#1,...,#3}{ \foreach \b in {#2,...,#4}{ \tikzsquare{\a}{\b}{#5} } } } \centering \resizebox{0.5\textwidth}{!}{% \begin{tikzpicture} \tikzsquares{1}{1}{1}{10}{fill=\fillfieldblue} \tikzsquares{2}{10}{4}{10}{fill=\fillfieldblue} \tikzsquares{2}{1}{4}{1}{fill=\fillfieldblue} \tikzsquares{4}{2}{7}{2}{fill=\fillfieldblue}; \tikzsquares{7}{1}{10}{1}{fill=\fillfieldblue} \tikzsquares{10}{2}{11}{2}{fill=\fillfieldblue} \tikzsquares{5}{4}{6}{16}{fill=\fillfieldgray} \tikzsquares{3}{13}{11}{14}{fill=\fillfieldgray} \tikzsquares{3}{6}{11}{7}{fill=\fillfieldgray} \tikzsquares{31}{1}{31}{10}{fill=\fillfieldblue} \tikzsquares{30}{10}{28}{10}{fill=\fillfieldblue} \tikzsquares{30}{1}{28}{1}{fill=\fillfieldblue} \tikzsquares{28}{2}{25}{2}{fill=\fillfieldblue}; \tikzsquares{25}{1}{22}{1}{fill=\fillfieldblue} \tikzsquares{22}{2}{21}{2}{fill=\fillfieldblue} \tikzsquares{27}{4}{26}{16}{fill=\fillfieldgray} \tikzsquares{29}{13}{21}{14}{fill=\fillfieldgray} \tikzsquares{29}{6}{21}{7}{fill=\fillfieldgray} \draw[dashed, very thick] (11.5, 14.5) -- (20.5, 14.5); \draw[dashed, very thick] (11.5, 12.5) -- (20.5, 12.5); \draw[dashed, very thick] (11.5, 7.5) -- (20.5, 7.5); \draw[dashed, very thick] (11.5, 5.5) -- (20.5, 5.5); \draw[dashed, very thick] (11.5, 2.5) -- (20.5, 2.5); \draw[dashed, very thick] (11.5, 1.5) -- (20.5, 1.5); \end{tikzpicture} }% \caption[Raw variable]{The construction of a variable gadget. The blue part has to be covered by letting the cycle corresponding to this variable go through the gray part. If the path takes the upper path, the variable is set to {\tt true}; if it takes the lower path, the variable is set to {\tt false}.} \label{fig:rawvariable} \end{figure} The basic idea for representing literals in clauses is shown in Fig.~\ref{fig:gg:nphard:basic}; this basic element is employed in sets of three for each clause, arranged in a horizontal vector of ``connectors'' to the corresponding variable paths, making use of appropriate geometric extensions to account for (logical) parity, which are described and motivated in the following subsection; of critical importance is the central ``crucial'' pixel marked in red in all figures. \begin{figure}[h] \newcommand{\tikzsquare}[3]{ \draw[#3] (#1-0.5,#2-0.5) -- (#1+0.5,#2-0.5) -- (#1+0.5,#2+0.5) -- (#1-0.5, #2+0.5) -- (#1-0.5,#2-0.5); } \newcommand{\tikzsquares}[5]{ \foreach \a in {#1,...,#3}{ \foreach \b in {#2,...,#4}{ \tikzsquare{\a}{\b}{#5} } } } \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \tikzsquares{1}{6}{2}{7}{fill=\fillfieldgray} \draw[dashed] (2.5,5.5) -- (4.5, 5.5); \node at (3.5, 6.5) {\Huge{$F$}}; \draw[dashed] (2.5,7.5) -- (4.5, 7.5); \tikzsquares{5}{6}{11}{7}{fill=\fillfieldgray} \draw[dashed] (11.5,5.5) -- (13.5, 5.5); \node at (12.5, 6.5) {\Huge{$A$}}; \draw[dashed] (11.5,7.5) -- (13.5, 7.5); \tikzsquares{14}{6}{15}{7}{fill=\fillfieldgray} \tikzsquares{1}{9}{2}{10}{fill=\fillfieldgray} \draw[dashed] (2.5,8.5) -- (4.5, 8.5); \node at (3.5, 9.5) {\Huge{$E$}}; \draw[dashed] (2.5,10.5) -- (4.5, 10.5); \tikzsquares{5}{9}{11}{10}{fill=\fillfieldgray} \draw[dashed] (11.5,8.5) -- (13.5, 8.5); \node at (12.5, 9.5) {\Huge{$B$}}; \draw[dashed] (11.5,10.5) -- (13.5, 10.5); \tikzsquares{14}{9}{15}{10}{fill=\fillfieldgray} \tikzsquares{6}{1}{7}{2}{fill=\fillfieldgray} \draw[dashed] (5.5,2.5) -- (5.5, 4.5); \node at (6.5, 3.5) {\Huge{$G$}}; \draw[dashed] (7.5,2.5) -- (7.5, 4.5); \tikzsquares{6}{5}{7}{11}{fill=\fillfieldgray} \draw[dashed] (5.5,11.5) -- (5.5, 13.5); \node at (6.5, 12.5) {\Huge{$D$}}; \draw[dashed] (7.5,11.5) -- (7.5, 13.5); \tikzsquares{6}{14}{7}{15}{fill=\fillfieldgray} \tikzsquares{9}{1}{10}{2}{fill=\fillfieldgray} \draw[dashed] (8.5,2.5) -- (8.5, 4.5); \node at (9.5, 3.5) {\Huge{$H$}}; \draw[dashed] (10.5,2.5) -- (10.5, 4.5); \tikzsquares{9}{5}{10}{11}{fill=\fillfieldgray} \draw[dashed] (8.5,11.5) -- (8.5, 13.5); \node at (9.5, 12.5) {\Huge{$C$}}; \draw[dashed] (10.5,11.5) -- (10.5, 13.5); \tikzsquares{9}{14}{10}{15}{fill=\fillfieldgray} \tikzsquare{8}{8}{fill=\fillfieldred} \draw[green, ultra thick, dashed] (1,6) -- (15,6) -- (15,7) -- (1,7) -- cycle; \draw[green, ultra thick, dashed] (1,9) -- (15,9) -- (15,10) -- (1,10) -- cycle; \draw[green, ultra thick, dashed] (6,1) -- (7,1) -- (7,15) -- (6,15) -- cycle; \draw[green, ultra thick, dashed] (9,1) -- (10,1) -- (10, 15) -- (9, 15) -- cycle; \end{tikzpicture} }% \caption[Basic logic element]{Basic block for the hardness proof. Only the red ``crucial'' pixel is of algorithmic interest, as described in the text.} \label{fig:gg:nphard:basic} \end{figure} \subsubsection{Logical Ideas and Details of the Construction} The key idea of the reduction is that information can only be encoded in pixels for which we do not know in which orientation they are crossed without turning (otherwise matching techniques can be used, as utilized by our approximation algorithm). This means that, e.g., pixels on the boundary are easy to deal with. Also, pixels for which we know that there is a turn or that are crossed straight in both orientations are not critical: in a solution, they may only be used indirectly for information propagation. Based on these observations, we consider variants of the construction in Fig.~\ref{fig:gg:nphard:basic} as fundamental information elements. The optimality of the green cycles is argued in the next section, and thus the corresponding pixels are trivially covered. Covering a crucial pixel is more difficult. Covering it by an additional cycle or modifying the green cycles costs always at least $4$ turns. Assume we create a path from one entry ($A,B,C,D,E,F,G,H$) to another and cover the crucial pixel by this path. For example, a path entering at $A$ and leaving at $E$ would allow us to cover the crucial pixel at a cost of $2$ while a path entering at $A$ and leaving at $D$ has at least $3$ turns if also covering the crucial pixel, see Fig.~\ref{fig:gg:hard:coverred}. Actually, we can cover the crucial pixel with a cost of $2$ exactly with S- and U-turns, i.e., paths that do not change the orientation. \begin{figure} \newcommand{\tikzsquare}[3]{ \draw[#3] (#1-0.5,#2-0.5) -- (#1+0.5,#2-0.5) -- (#1+0.5,#2+0.5) -- (#1-0.5, #2+0.5) -- (#1-0.5,#2-0.5); } \newcommand{\tikzsquares}[5]{ \foreach \a in {#1,...,#3}{ \foreach \b in {#2,...,#4}{ \tikzsquare{\a}{\b}{#5} } } } \centering \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \draw[dashed] (3.5,5.5) -- (4.5, 5.5); \node at (3.5, 6.5) {\Large{$F$}}; \draw[dashed] (3.5,7.5) -- (4.5, 7.5); \tikzsquares{5}{6}{11}{7}{fill=\fillfieldgray} \draw[dashed] (11.5,5.5) -- (12.5, 5.5); \node at (12.5, 6.5) {\Large{$A$}}; \draw[dashed] (11.5,7.5) -- (12.5, 7.5); \draw[dashed] (3.5,8.5) -- (4.5, 8.5); \node at (3.5, 9.5) {\Large{$E$}}; \draw[dashed] (3.5,10.5) -- (4.5, 10.5); \tikzsquares{5}{9}{11}{10}{fill=\fillfieldgray} \draw[dashed] (11.5,8.5) -- (12.5, 8.5); \node at (12.5, 9.5) {\Large{$B$}}; \draw[dashed] (11.5,10.5) -- (12.5, 10.5); \draw[dashed] (5.5,3.5) -- (5.5, 4.5); \node at (6.5, 3.5) {\Large{$G$}}; \draw[dashed] (7.5,3.5) -- (7.5, 4.5); \tikzsquares{6}{5}{7}{11}{fill=\fillfieldgray} \draw[dashed] (5.5,11.5) -- (5.5, 12.5); \node at (6.5, 12.5) {\Large{$D$}}; \draw[dashed] (7.5,11.5) -- (7.5, 12.5); \draw[dashed] (8.5,3.5) -- (8.5, 4.5); \node at (9.5, 3.5) {\Large{$H$}}; \draw[dashed] (10.5,3.5) -- (10.5, 4.5); \tikzsquares{9}{5}{10}{11}{fill=\fillfieldgray} \draw[dashed] (8.5,11.5) -- (8.5, 12.5); \node at (9.5, 12.5) {\Large{$C$}}; \draw[dashed] (10.5,11.5) -- (10.5, 12.5); \tikzsquare{8}{8}{fill=\fillfieldred} \draw[green, ultra thick, dashed] (3,6) -- (13,6) -- (13,7) -- (3,7) -- cycle; \draw[green, ultra thick, dashed] (3,9) -- (13,9) -- (13,10) -- (3,10) -- cycle; \draw[green, ultra thick, dashed] (6,3) -- (7,3) -- (7,13) -- (6,13) -- cycle; \draw[green, ultra thick, dashed] (9,3) -- (10,3) -- (10, 13) -- (9, 13) -- cycle; \draw[red, ultra thick] (4,10) -- (8,10) -- (8,6) -- (12,6); \end{tikzpicture} }% ~% \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \draw[dashed] (3.5,5.5) -- (4.5, 5.5); \node at (3.5, 6.5) {\Large{$F$}}; \draw[dashed] (3.5,7.5) -- (4.5, 7.5); \tikzsquares{5}{6}{11}{7}{fill=\fillfieldgray} \draw[dashed] (11.5,5.5) -- (12.5, 5.5); \node at (12.5, 6.5) {\Large{$A$}}; \draw[dashed] (11.5,7.5) -- (12.5, 7.5); \draw[dashed] (3.5,8.5) -- (4.5, 8.5); \node at (3.5, 9.5) {\Large{$E$}}; \draw[dashed] (3.5,10.5) -- (4.5, 10.5); \tikzsquares{5}{9}{11}{10}{fill=\fillfieldgray} \draw[dashed] (11.5,8.5) -- (12.5, 8.5); \node at (12.5, 9.5) {\Large{$B$}}; \draw[dashed] (11.5,10.5) -- (12.5, 10.5); \draw[dashed] (5.5,3.5) -- (5.5, 4.5); \node at (6.5, 3.5) {\Large{$G$}}; \draw[dashed] (7.5,3.5) -- (7.5, 4.5); \tikzsquares{6}{5}{7}{11}{fill=\fillfieldgray} \draw[dashed] (5.5,11.5) -- (5.5, 12.5); \node at (6.5, 12.5) {\Large{$D$}}; \draw[dashed] (7.5,11.5) -- (7.5, 12.5); \draw[dashed] (8.5,3.5) -- (8.5, 4.5); \node at (9.5, 3.5) {\Large{$H$}}; \draw[dashed] (10.5,3.5) -- (10.5, 4.5); \tikzsquares{9}{5}{10}{11}{fill=\fillfieldgray} \draw[dashed] (8.5,11.5) -- (8.5, 12.5); \node at (9.5, 12.5) {\Large{$C$}}; \draw[dashed] (10.5,11.5) -- (10.5, 12.5); \tikzsquare{8}{8}{fill=\fillfieldred} \draw[green, ultra thick, dashed] (3,6) -- (13,6) -- (13,7) -- (3,7) -- cycle; \draw[green, ultra thick, dashed] (3,9) -- (13,9) -- (13,10) -- (3,10) -- cycle; \draw[green, ultra thick, dashed] (6,3) -- (7,3) -- (7,13) -- (6,13) -- cycle; \draw[green, ultra thick, dashed] (9,3) -- (10,3) -- (10, 13) -- (9, 13) -- cycle; \draw[red, ultra thick] (12,10) -- (8,10) -- (8,6) -- (12,6); \end{tikzpicture} }% ~% \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \draw[dashed] (3.5,5.5) -- (4.5, 5.5); \node at (3.5, 6.5) {\Large{$F$}}; \draw[dashed] (3.5,7.5) -- (4.5, 7.5); \tikzsquares{5}{6}{11}{7}{fill=\fillfieldgray} \draw[dashed] (11.5,5.5) -- (12.5, 5.5); \node at (12.5, 6.5) {\Large{$A$}}; \draw[dashed] (11.5,7.5) -- (12.5, 7.5); \draw[dashed] (3.5,8.5) -- (4.5, 8.5); \node at (3.5, 9.5) {\Large{$E$}}; \draw[dashed] (3.5,10.5) -- (4.5, 10.5); \tikzsquares{5}{9}{11}{10}{fill=\fillfieldgray} \draw[dashed] (11.5,8.5) -- (12.5, 8.5); \node at (12.5, 9.5) {\Large{$B$}}; \draw[dashed] (11.5,10.5) -- (12.5, 10.5); \draw[dashed] (5.5,3.5) -- (5.5, 4.5); \node at (6.5, 3.5) {\Large{$G$}}; \draw[dashed] (7.5,3.5) -- (7.5, 4.5); \tikzsquares{6}{5}{7}{11}{fill=\fillfieldgray} \draw[dashed] (5.5,11.5) -- (5.5, 12.5); \node at (6.5, 12.5) {\Large{$D$}}; \draw[dashed] (7.5,11.5) -- (7.5, 12.5); \draw[dashed] (8.5,3.5) -- (8.5, 4.5); \node at (9.5, 3.5) {\Large{$H$}}; \draw[dashed] (10.5,3.5) -- (10.5, 4.5); \tikzsquares{9}{5}{10}{11}{fill=\fillfieldgray} \draw[dashed] (8.5,11.5) -- (8.5, 12.5); \node at (9.5, 12.5) {\Large{$C$}}; \draw[dashed] (10.5,11.5) -- (10.5, 12.5); \tikzsquare{8}{8}{fill=\fillfieldred} \draw[green, ultra thick, dashed] (3,6) -- (13,6) -- (13,7) -- (3,7) -- cycle; \draw[green, ultra thick, dashed] (3,9) -- (13,9) -- (13,10) -- (3,10) -- cycle; \draw[green, ultra thick, dashed] (6,3) -- (7,3) -- (7,13) -- (6,13) -- cycle; \draw[green, ultra thick, dashed] (9,3) -- (10,3) -- (10, 13) -- (9, 13) -- cycle; \draw[red, ultra thick] (4,10) -- (8,10) -- (8,6) -- (9,6) -- (9,4); \end{tikzpicture} }% \caption[Coverage properties of basic logic element]{Three ways of covering the crucial pixel. The first two keep the orientation and have a cost of $2$. The third one changes the orientation, and thus has a cost of at least $3$.} \label{fig:gg:hard:coverred} \end{figure} In addition, it can be seen that the crucial pixel always needs at least two turns within this construction. Now consider the construction shown in Fig.~\ref{fig:gg:hard:triple} that uses a combination of elements as described above. Assume all turns made outside the construction are free and all six ``exits'' $A,B,C,D,E,F$ are connected from outside. This means that every red highlighted pixel can be covered by a cycle of cost two that traverses the exits above and below (see blue paths in Fig.~\ref{fig:gg:hard:triple}). The green cycles are still necessary; employing them for covering the crucial pixel is too expensive, so we can concentrate on how to cover the red highlighted pixels by additional cycles. It can be seen that there are only five potential cycles that involve not more than a cost of two turns per crucial pixel: these are the three mentioned red cycles that use the exterior and the two interior cycles marked in blue in Fig.~\ref{fig:gg:hard:triple} (the cycles can be slightly shifted without changing them in a useful manner). This results in only three potential optimal solutions (refer to Fig.~\ref{fig:nphard:simple:singleclause}): \begin{enumerate} \item Using the upper red cycle to cover the upper crucial pixel and the lower blue cycle to cover the middle crucial pixel and lower crucial pixel. \item Using the lower red cycle to cover the lower crucial pixel and the upper blue cycle to cover the middle crucial pixel and the upper crucial pixel. \item Using all three red cycles to cover each crucial pixel separately. \end{enumerate} For constructing a clause $x_1+x_2+x_3=1$ with $x_1$ being above $x_2$ and $x_3$ being below $x_2$ we now place the upper crucial pixel of Fig.~\ref{fig:gg:hard:triple} on the {\tt false} path of $x_1$, the middle pixel on the {\tt true} path of $x_2$ and the lower crucial pixel on the {\tt false} path of $x_3$ as illustrated in Fig.~\ref{fig:nphard:simple:singleclause}. If we take the {\tt true} path of $x_2$, we now have to take the {\tt false} paths of $x_1$ and $x_3$. If we take the {\tt false} path of $x_2$ we need to block the {\tt false} path of either $x_1$ or $x_3$ (but not both) by a red cycle. The other variable paths (without the crucial pixel) do not need any turns and are hence always preferred if the red pixel does not have to be covered. Note that any external cycle that enters the construction (e.g., through $A$) needs at least two turns to leave it again through another exit. Hence, passing through this construction should always be combined with covering an uncovered red pixel, for which we have only one choice with two turns, in order to account for the two necessary turns. By concatenating these clauses, we can form any \emph{One-in-three 3SAT} formula, see Fig.~\ref{fig:nphard:simple:multiclause}. \begin{figure}[h!] \centering \includegraphics[width=0.35\textwidth]{./figures/clause_gadget_vertical} \caption[Building a formula]{ Assuming that all turns made outside are free, there are only five potential cycles to cover the crucial pixels: the three exterior red cycles and the two interior blue cycles. Assigning the usage of the upper red cycle the Boolean variable $x_1$ (and analogous for the middle and the lower $x_2$ and $x_3$, resp.) leads to the Boolean formula $(x_1 \vee x_3) \wedge (x_2 \leftrightarrow x_1 \wedge x_3)$ or $\overline{x_1}+x_2+\overline{x_3}=1$. } \label{fig:gg:hard:triple} \end{figure} \subsubsection{A Tight Lower Bound} We now give a tight lower bound on the number of turns in a cycle cover. In order to achieve it, the turns have to be made at very specific positions. For this purpose it is sufficient to limit our view onto local components and state that in each of these disjunct components a specific number of turns has to be made. The global lower bound is then the sum of all local lower bounds. Later we show that these turns are only sufficient if the corresponding formula is satisfiable. \begin{lemma} \label{lemma:gg:hard:stripeven} On every \emph{full strip} (i.e., a maximal connected collinear set of pixels) in the grid graph, a cycle cover has to have an even number of turns (u-turns counting twice). \end{lemma} \begin{proof} For every turn that enters the strip, there needs to be a turn for leaving it. Turns that do not enter/leave the strip are u-turns. \end{proof} \begin{lemma} \label{lemma:gg:hard:guard} Given any pixel $p$ of a grid graph and a corresponding cycle cover $\mathcal{C}$. If there is no turn on $p$, then there has to be a turn left of $p$ and another turn right of $p$ (on the horizontal full strip through $p$), or there has to be a turn above $p$ and another below $p$ (on the vertical full strip through $p$). If there is a turn at $p$, there are at least three turns on the star consisting of the horizontal and vertical full strip through $p$. \end{lemma} \begin{proof} If there is no turn on $p$, there is a straight part of a cycle going through it. At either end of this straight part, it needs to turn in order to close the cycle. If there is a turn at $p$, the claim follows by Lemma~\ref{lemma:gg:hard:stripeven}. \end{proof} Now we can deduce the turn positions for all essential parts of the construction, as stated in the next lemma. \begin{lemma} \label{lemma:gg:hard:green} In Fig.\ref{fig:gg:hard:partslb}, the essential parts of the construction are displayed (possibly reflected). For these parts we can give the following lower bounds on the necessary number of interior turns and constraints on the positions of turns if this bound is tight: In a part as shown in Fig.~\ref{fig:gg:hard:partslb:2}/\ref{fig:gg:hard:partslb:4}/\ref{fig:gg:hard:partslb:5}/\ref{fig:gg:hard:partslb:6} (excluding the blue area), we need at least 10/18/14/10 interior turns. To achieve exactly this lower bound, there has to be exactly one turn at every black dot and the remaining two turns have to be in the green area. \begin{figure} \newcommand{\tikzsquare}[3]{ \draw[#3] (#1-0.5,#2-0.5) -- (#1+0.5,#2-0.5) -- (#1+0.5,#2+0.5) -- (#1-0.5, #2+0.5) -- (#1-0.5,#2-0.5); } \newcommand{\tikzsquares}[5]{ \foreach \a in {#1,...,#3}{ \foreach \b in {#2,...,#4}{ \tikzsquare{\a}{\b}{#5} } } } \newcommand{\tikzforcedturn}[2]{ \draw[fill=black] (#1, #2) circle (0.3);} \centering ~% \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \tikzsquares{1}{6}{11}{7}{fill=\fillfieldgray} \draw[dashed, ultra thick] (0.5, 5.5) -- (-1, 5.5); \draw[dashed, ultra thick] (0.5, 7.5) -- (-1, 7.5); \tikzsquares{3}{3}{13}{4}{fill=\fillfieldgray} \draw[dashed, ultra thick] (13.5, 4.5) -- (15, 4.5); \draw[dashed, ultra thick] (13.5, 2.5) -- (15, 2.5); \tikzsquares{5}{1}{6}{11}{fill=\fillfieldgray} \draw[dashed, ultra thick](4.5, 11.5) -- (4.5, 13); \draw[dashed, ultra thick] (6.5, 11.5) -- (6.5, 13); \tikzsquares{8}{1}{9}{11}{fill=\fillfieldgray} \draw[dashed, ultra thick](7.5, 11.5) -- (7.5, 13); \draw[dashed, ultra thick] (9.5, 11.5) -- (9.5, 13); \tikzsquares{7}{3}{7}{7}{fill=green!80} \tikzsquares{5}{5}{9}{5}{fill=green!80} \tikzsquare{7}{5}{fill=\fillfieldred}; \tikzforcedturn{5}{1} \tikzforcedturn{6}{1} \tikzforcedturn{8}{1} \tikzforcedturn{9}{1} \tikzforcedturn{3}{3} \tikzforcedturn{3}{4} \tikzforcedturn{11}{6} \tikzforcedturn{11}{7} \end{tikzpicture} }% \caption{\num{8} unique turns and \num{2} turns in green area} \label{fig:gg:hard:partslb:2} ~% \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \tikzsquares{1}{5}{15}{6}{fill=\fillfieldgray} \draw[dashed, ultra thick] (0.5, 4.5) -- (-1, 4.5); \draw[dashed, ultra thick] (0.5, 6.5) -- (-1, 6.5); \tikzsquares{3}{8}{17}{9}{fill=\fillfieldgray} \draw[dashed, ultra thick] (17.5, 7.5) -- (19, 7.5); \draw[dashed, ultra thick] (17.5, 9.5) -- (19, 9.5); \tikzsquares{5}{3}{6}{13}{fill=\fillfieldgray} \draw[dashed, ultra thick] (4.5, 13.5) -- (4.5, 16); \draw[dashed, ultra thick] (6.5, 13.5) -- (6.5, 16); \tikzsquares{7}{1}{8}{11}{fill=\fillfieldgray} \tikzsquares{10}{1}{11}{11}{fill=\fillfieldgray} \tikzsquares{12}{3}{13}{13}{fill=\fillfieldgray} \draw[dashed, ultra thick] (11.5, 13.5) -- (11.5, 16); \draw[dashed, ultra thick] (13.5, 13.5) -- (13.5, 16); \tikzsquares{9}{5}{9}{9}{fill=green!80} \tikzsquares{5}{7}{6}{7}{fill=green!80} \tikzsquares{12}{7}{13}{7}{fill=green!80} \tikzsquare{9}{7}{fill=\fillfieldred} \tikzforcedturn{15}{6} \tikzforcedturn{15}{5} \tikzforcedturn{3}{8} \tikzforcedturn{3}{9} \tikzforcedturn{5}{3} \tikzforcedturn{6}{3} \tikzforcedturn{7}{1} \tikzforcedturn{7}{11} \tikzforcedturn{8}{11} \tikzforcedturn{8}{1} \tikzforcedturn{10}{1} \tikzforcedturn{10}{11} \tikzforcedturn{11}{11} \tikzforcedturn{11}{1} \tikzforcedturn{12}{3} \tikzforcedturn{13}{3} \end{tikzpicture} }% \caption{\num{16} unique turns and \num{2} turns in green area} \label{fig:gg:hard:partslb:4} ~% \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \tikzsquares{5}{1}{6}{12}{fill=\fillfieldgray} \draw[dashed, ultra thick] (4.5, 0.5) -- (4.5, -1); \draw[dashed, ultra thick] (6.5, 0.5) -- (6.5, -1); \tikzsquares{12}{1}{13}{12}{fill=\fillfieldgray} \draw[dashed, ultra thick] (11.5, 0.5) -- (11.5, -1); \draw[dashed, ultra thick] (13.5, 0.5) -- (13.5, -1); \tikzsquares{7}{4}{8}{15}{fill=\fillfieldgray} \draw[dashed, ultra thick] (6.5, 15.5) -- (6.5, 17); \draw[dashed, ultra thick] (8.5, 15.5) -- (8.5, 17); \tikzsquares{10}{4}{11}{15}{fill=\fillfieldgray} \draw[dashed, ultra thick] (9.5, 15.5) -- (9.5, 17); \draw[dashed, ultra thick] (11.5, 15.5) -- (11.5, 17); \tikzsquares{3}{6}{17}{7}{fill=\fillfieldgray} \draw[dashed, ultra thick] (17.5, 5.5) -- (19, 5.5); \draw[dashed, ultra thick] (17.5, 7.5) -- (19, 7.5); \tikzsquares{1}{9}{15}{10}{fill=\fillfieldgray} \draw[dashed, ultra thick] (0.5, 8.5) -- (-1, 8.5); \draw[dashed, ultra thick] (0.5, 10.5) -- (-1, 10.5); \tikzsquares{9}{6}{9}{10}{fill=green!80} \tikzsquares{5}{8}{13}{8}{fill=green!80} \tikzsquare{9}{8}{fill=\fillfieldred} \tikzforcedturn{6}{12} \tikzforcedturn{5}{12} \tikzforcedturn{13}{12} \tikzforcedturn{12}{12} \tikzforcedturn{7}{4} \tikzforcedturn{8}{4} \tikzforcedturn{10}{4} \tikzforcedturn{11}{4} \tikzforcedturn{3}{6} \tikzforcedturn{3}{7} \tikzforcedturn{15}{10} \tikzforcedturn{15}{9} \end{tikzpicture} }% \caption{\num{12} unique turns and \num{2} turns in green area} \label{fig:gg:hard:partslb:5} ~% \centering \resizebox{0.3\textwidth}{!}{% \begin{tikzpicture} \tikzsquares{1}{1}{1}{10}{fill=\fillfieldblue} \tikzsquares{2}{10}{4}{10}{fill=\fillfieldblue} \tikzsquares{2}{1}{4}{1}{fill=\fillfieldblue} \tikzsquares{4}{2}{7}{2}{fill=\fillfieldblue}; \tikzsquares{7}{1}{10}{1}{fill=\fillfieldblue} \tikzsquares{10}{2}{11}{2}{fill=\fillfieldblue} \tikzsquares{5}{4}{6}{16}{fill=\fillfieldgray} \tikzsquares{3}{13}{11}{14}{fill=\fillfieldgray} \tikzsquares{3}{6}{11}{7}{fill=\fillfieldgray} \draw[dashed, ultra thick] (11.5, 14.5) -- (13, 14.5); \draw[dashed, ultra thick] (11.5, 12.5) -- (13, 12.5); \draw[dashed, ultra thick] (11.5, 7.5) -- (13, 7.5); \draw[dashed, ultra thick] (11.5, 5.5) -- (13, 5.5); \draw[dashed, ultra thick] (11.5, 2.5) -- (13, 2.5); \draw[dashed, ultra thick] (11.5, 1.5) -- (13, 1.5); \tikzsquares{5}{13}{6}{14}{fill=green!80} \tikzsquares{5}{10}{6}{10}{fill=green!80} \tikzsquares{5}{6}{6}{7}{fill=green!80} \tikzforcedturn{5}{4} \tikzforcedturn{5}{16} \tikzforcedturn{6}{16} \tikzforcedturn{6}{4} \tikzforcedturn{3}{13} \tikzforcedturn{3}{14} \tikzforcedturn{3}{6} \tikzforcedturn{3}{7} \end{tikzpicture} }% \caption{\num{8} unique turns and \num{2} turns in green area.} \label{fig:gg:hard:partslb:6} \caption[Necessary turns]{Lower bounds on the number of turns in the different parts of the construction (possibly reflected). The black dots represent turn position necessary to meet the lower bound.} \label{fig:gg:hard:partslb} \end{figure} \end{lemma} \begin{proof} There needs to be at least one turn in every corner pixel, making Fig.~\ref{fig:gg:hard:partslb:2} and \ref{fig:gg:hard:partslb:6} trivial. In Fig.~\ref{fig:gg:hard:partslb:4} and \ref{fig:gg:hard:partslb:5} we have some additional non-corner pixels for which we need easy additional arguments based on Lemma~\ref{lemma:gg:hard:stripeven} and~\ref{lemma:gg:hard:guard}. We give the details for the part in Fig.~\ref{fig:gg:hard:partslb:4}; the adaption to Fig.~\ref{fig:gg:hard:partslb:5} is straightforward. The used arguments are highlighted in Fig.~\ref{fig:gg:hard:green}. First, there are already \num{12} corner pixels, so we have only \num{6} turns left to cover this local part. Note that we assume that we can appropriately place turns outside this local part, so we are using only local arguments and the turn constraints remain feasible in the global construction. We need at least 6 additional turns: one on each yellow area due to Lemma~\ref{lemma:gg:hard:stripeven} and two on the green area due to Lemma~\ref{lemma:gg:hard:guard}. There can be no turn on the red pixel; otherwise we would need three of the six turns on the green and red pixels, contradicting the fact that we already need at least four in the yellow locations. In order to remain locally optimal, turns on the gray and red pixel thus are impossible; however, these pixels still need to be covered, in particular the pixels marked by hollow circles. Lemma~\ref{lemma:gg:hard:guard} applied on these pixel forces us to place a turn on the adjacent yellow pixel above or below them, leaving only two further turns for covering the red pixel. Lemma~\ref{lemma:gg:hard:stripeven} additionally forbids turns on two pixels to the left and right of the red pixel: We need the ability to make turns outside in order to fulfill it. \begin{figure}[h] \centering \resizebox{0.4\textwidth}{!}{% \begin{tikzpicture} \newcommand{\tikzsquare}[3]{ \draw[#3] (#1-0.5,#2-0.5) -- (#1+0.5,#2-0.5) -- (#1+0.5,#2+0.5) -- (#1-0.5, #2+0.5) -- (#1-0.5,#2-0.5); } \newcommand{\tikzsquares}[5]{ \foreach \a in {#1,...,#3}{ \foreach \b in {#2,...,#4}{ \tikzsquare{\a}{\b}{#5} } } } \newcommand{\tikzforcedturn}[2]{ \draw[fill=black] (#1, #2) circle (0.3);} \tikzsquares{1}{5}{15}{6}{fill=\fillfieldgray} \draw[dashed, ultra thick] (0.5, 4.5) -- (-1, 4.5); \draw[dashed, ultra thick] (0.5, 6.5) -- (-1, 6.5); \tikzsquares{3}{8}{17}{9}{fill=\fillfieldgray} \draw[dashed, ultra thick] (17.5, 7.5) -- (19, 7.5); \draw[dashed, ultra thick] (17.5, 9.5) -- (19, 9.5); \tikzsquares{5}{3}{6}{13}{fill=\fillfieldgray} \draw[dashed, ultra thick] (4.5, 13.5) -- (4.5, 16); \draw[dashed, ultra thick] (6.5, 13.5) -- (6.5, 16); \tikzsquares{7}{1}{8}{11}{fill=\fillfieldgray} \tikzsquares{10}{1}{11}{11}{fill=\fillfieldgray} \tikzsquares{12}{3}{13}{13}{fill=\fillfieldgray} \draw[dashed, ultra thick] (11.5, 13.5) -- (11.5, 16); \draw[dashed, ultra thick] (13.5, 13.5) -- (13.5, 16); \tikzsquares{9}{5}{9}{9}{fill=green!80} \tikzsquares{5}{7}{13}{7}{fill=green!80} \tikzsquare{9}{7}{fill=\fillfieldred} \tikzsquares{5}{3}{8}{3}{fill=yellow} \tikzsquares{5}{11}{8}{11}{fill=yellow} \tikzsquares{10}{3}{13}{3}{fill=yellow} \tikzsquares{10}{11}{13}{11}{fill=yellow} \tikzforcedturn{15}{6} \tikzforcedturn{15}{5} \tikzforcedturn{3}{8} \tikzforcedturn{3}{9} \tikzforcedturn{5}{3} \tikzforcedturn{7}{1} \tikzforcedturn{8}{11} \tikzforcedturn{8}{1} \tikzforcedturn{10}{1} \tikzforcedturn{10}{11} \tikzforcedturn{11}{1} \tikzforcedturn{13}{3} \newcommand{\tikzguard}[2]{\draw[very thick] (#1, #2) circle (0.3);} \tikzguard{12}{4} \tikzguard{6}{4} \tikzguard{11}{10} \tikzguard{7}{10} \end{tikzpicture} }% \caption[Necessary turns proof example]{Auxiliary figure for the proof of Lemma~\ref{lemma:gg:hard:green}.} \label{fig:gg:hard:green} \end{figure} \end{proof} \begin{lemma} \label{th:gg:hard:lb} Given a construction, as described above, for an arbitrary formula with $v$ variables and $c$ clauses. Let $k$ be the number of corner pixels in the zig-zagging paths of the variable gadgets (highlighted in blue). Then every cycle cover has to have at least $20v+42c+k$ turns. \end{lemma} \begin{proof} There is no interference between these local bounds, because in the proof we did not charge for exterior (not inside considered local part) turns made by possible cycles. Thus, the claim follows by summing over the local bounds for all local parts using Lemma~\ref{lemma:gg:hard:green}. \end{proof} \subsubsection{An Upper Bound for Satisfiable Formulas} We can construct a solution that matches the lower bound given in Lemma~\ref{th:gg:hard:lb} if the corresponding formula of the grid-graph construction is satisfiable. \begin{lemma} \label{th:gg:hard:satub} Given a construction for an arbitrary formula with $v$ variables and $c$ clauses, as described above. Let $k$ be the number of corner pixels in the zig-zagging paths of the variable gadgets (highlighted in blue). If the formula is satisfiable, there exists a cycle cover with $20v+42c+k$ turns. \end{lemma} \begin{proof} It is straightforward to deduce this from the description of the construction and Fig.~\ref{fig:nphard:simple:multiclause}, so we only sketch the details. Cover the gray pixels using only simple green 4-turn cycles on the explicit turns (black dots), as shown in Fig.~\ref{fig:gg:hard:partslb}. Select an arbitrary but fixed satisfiable solution for the formula. If a variable assignment is {\tt true}, add a cycle that traverses all blue pixels of the variable and all upper crucial pixels of the variable with a minimum number of turns. This cycle has a turn at every blue corner pixel belonging to the variable, two turns per crucial pixel, and two further turns at each end to connect to the blue pixels. If a variable assignment is {\tt false}, proceed analogously, but for the lower row of crucial pixels belonging to this variable. As the assignment is feasible, there are either none or exactly two remaining crucial red pixels per clause gadget. If there are two, they are vertically adjacent and we can cover them by a simple blue 4-turn cycle. As Lemma~\ref{lemma:gg:hard:green} leaves us with exactly $2$ turns to select per crucial pixel, this matches the lower bound. \end{proof} \subsubsection{Lower Bound for Unsatisfiable Formulas} If the formula corresponding to the grid graph construction is not satisfiable, we can deduce that the number of turns given by Lemma~\ref{th:gg:hard:lb} is not sufficient for a full coverage. We first show that in a cycle cover that matches the lower bound, we can separate a cycle cover for the gray pixels from the rest. \begin{lemma} \label{lemma:gg:hard:separategray} Given an optimal cycle cover that matches the lower bound of Lemma~\ref{th:gg:hard:lb}, then we can modify the solution (without increasing the cost) such that it contains a cycle cover of exactly the gray pixel (the green cycles in Fig.~\ref{fig:nphard:simple:multiclause}). \end{lemma} \begin{proof} The cycle cover matches the lower bound of Lemma~\ref{th:gg:hard:lb} and hence has to fulfill the restriction on the position of turns as in Lemma~\ref{lemma:gg:hard:green}. We not only know that there has to be a turn at the exact same locations as the green cycles in Fig.~\ref{fig:nphard:simple:multiclause}, marked by black dots in Fig.~\ref{fig:gg:hard:partslb}, but also that these turns have to be exactly the same simply due to a lack of alternatives: if there are only potential partner turns in two directions, we can only make a turn between these two (u-turns are already prohibited by Lemma~\ref{th:gg:hard:lb}). If two such partnered turns are not directly connected, we known that there are exactly two turns on pixel that are highlighted in green in Fig.~\ref{fig:gg:hard:partslb} in between them. We can simply connect these two turns on green pixels directly as well as the two turns on black dots, as shown in Fig.~\ref{fig:gg:hard:unmerge}. If the lower bound is matched, we can therefore always separate the green cycles as in Fig.~\ref{fig:nphard:simple:multiclause}. \begin{figure}[!ht] \centering \resizebox{0.9\textwidth}{!}{% \begin{tikzpicture} \newcommand{\tikzsquare}[3]{ \draw[#3] (#1-0.5,#2-0.5) -- (#1+0.5,#2-0.5) -- (#1+0.5,#2+0.5) -- (#1-0.5, #2+0.5) -- (#1-0.5,#2-0.5); } \newcommand{\tikzsquares}[5]{ \foreach \a in {#1,...,#3}{ \foreach \b in {#2,...,#4}{ \tikzsquare{\a}{\b}{#5} } } } \tikzsquares{0}{1}{5}{2}{fill=\fillfieldgray} \tikzsquares{8}{1}{13}{2}{fill=\fillfieldgray} \draw[dashed] (5.5, 2.5) -- (7.5, 2.5); \draw[dashed] (5.5, 0.5) -- (7.5, 0.5); \draw[dashed] (5.5, 1.5) -- (7.5, 1.5); \tikzsquares{3}{1}{3}{2}{fill=green!40} \tikzsquares{10}{1}{10}{2}{fill=green!40} \draw[dashed] (1.5, 2.5) -- (1.5, 3.5); \draw[dashed] (2.5, 2.5) -- (2.5, 3.5); \draw[dashed] (3.5, 2.5) -- (3.5, 3.5); \draw[dashed] (4.5, 2.5) -- (4.5, 3.5); \draw[dashed] (1.5, 0.5) -- (1.5, -0.5); \draw[dashed] (2.5, 0.5) -- (2.5, -0.5); \draw[dashed] (3.5, 0.5) -- (3.5, -0.5); \draw[dashed] (4.5, 0.5) -- (4.5, -0.5); \draw[dashed] (8.5, 2.5) -- (8.5, 3.5); \draw[dashed] (9.5, 2.5) -- (9.5, 3.5); \draw[dashed] (10.5, 2.5) -- (10.5, 3.5); \draw[dashed] (11.5, 2.5) -- (11.5, 3.5); \draw[dashed] (8.5, 0.5) -- (8.5, -0.5); \draw[dashed] (9.5, 0.5) -- (9.5, -0.5); \draw[dashed] (10.5, 0.5) -- (10.5, -0.5); \draw[dashed] (11.5, 0.5) -- (11.5, -0.5); \draw[fill=black] (0, 1) circle (0.3); \draw[fill=black] (0, 2) circle (0.3); \draw[fill=black] (13, 1) circle (0.3); \draw[fill=black] (13, 2) circle (0.3); \draw[red, very thick] (3, 3) -- (3,2.1) -- (13, 2.1) -- (13, 1) -- (0, 1) -- (0, 1.9) -- (10, 1.9) -- (10, 3); \draw[thick] (14, 1.5) -- (16,1.5); \draw[thick] (15, 2) -- (16,1.5) -- (15, 1); \tikzsquares{17}{1}{22}{2}{fill=\fillfieldgray} \tikzsquares{25}{1}{30}{2}{fill=\fillfieldgray} \draw[dashed] (22.5, 2.5) -- (24.5, 2.5); \draw[dashed] (22.5, 0.5) -- (24.5, 0.5); \draw[dashed] (22.5, 1.5) -- (24.5, 1.5); \tikzsquares{20}{1}{20}{2}{fill=green!40} \tikzsquares{27}{1}{27}{2}{fill=green!40} \draw[dashed] (18.5, 2.5) -- (18.5, 3.5); \draw[dashed] (19.5, 2.5) -- (19.5, 3.5); \draw[dashed] (20.5, 2.5) -- (20.5, 3.5); \draw[dashed] (21.5, 2.5) -- (21.5, 3.5); \draw[dashed] (18.5, 0.5) -- (18.5, -0.5); \draw[dashed] (19.5, 0.5) -- (19.5, -0.5); \draw[dashed] (20.5, 0.5) -- (20.5, -0.5); \draw[dashed] (21.5, 0.5) -- (21.5, -0.5); \draw[dashed] (25.5, 2.5) -- (25.5, 3.5); \draw[dashed] (26.5, 2.5) -- (26.5, 3.5); \draw[dashed] (27.5, 2.5) -- (27.5, 3.5); \draw[dashed] (28.5, 2.5) -- (28.5, 3.5); \draw[dashed] (25.5, 0.5) -- (25.5, -0.5); \draw[dashed] (26.5, 0.5) -- (26.5, -0.5); \draw[dashed] (27.5, 0.5) -- (27.5, -0.5); \draw[dashed] (28.5, 0.5) -- (28.5, -0.5); \draw[fill=black] (17, 1) circle (0.3); \draw[fill=black] (17, 2) circle (0.3); \draw[fill=black] (30, 1) circle (0.3); \draw[fill=black] (30, 2) circle (0.3); \draw[green, ultra thick] (17,1) -- (17,1.9) -- (30, 1.9) -- (30, 1) -- cycle; \draw[blue, ultra thick] (20,3) -- (20, 2.1) -- (27, 2.1) -- (27, 3); \end{tikzpicture} }% \caption[Separating cycles]{Lemma~\ref{lemma:gg:hard:stripeven} enforces the turns on the green pixels to be at the same $y$-coordinates. The cycle part can easily be separated to a cycle that covers the gray pixels and a connection between the turns in the green pixels.} \label{fig:gg:hard:unmerge} \end{figure} \end{proof} This allows us to only concentrate on covering the crucial and the blue pixels, because all gray pixels are already covered by the ``black dot'' cycles. We now show that every cycle cover that matches the lower bound results in a variable assignment (the cycle that covers the blue pixels either selects the {\tt true} line or the {\tt false} line and does not switch in between). \begin{lemma} \label{lemma:gg:hard:variableline} In a cycle cover that matches the lower bound of Lemma~\ref{th:gg:hard:lb}, the cycle that covers the blue pixels of a variable also covers either all crucial pixels belonging to a {\tt true} assignment of this variable and no other crucial pixel or all crucial pixels belonging to a {\tt false} assignment of this variable and no other crucial pixel. \end{lemma} \begin{proof} It is impossible to cover a blue pixel twice without exceeding the lower bound, because we only have free turns in the green pixels. Therefore, the ``variable'' cycle has to go through the gray and crucial pixels. We are only allowed to make turns in the green pixels as marked in Fig.~\ref{fig:gg:hard:partslb} and only at most one in every connected green area. The variable cycle can take the upper or the lower path (Fig.~\ref{fig:gg:hard:partslb:6}), but cannot switch between them, as there is only one possible ``partner'' turn to achieve an even number of turns on every strip. The only possible choice for a partner turn is the next turn of the cycle after applying Lemma~\ref{lemma:gg:hard:separategray}. This forces the path to continue until it closes the cycle. See Fig.~\ref{fig:gg:hard:sticktovariableline} for an illustration. \begin{figure}[h] \newcommand{\tikzsquare}[3]{ \draw[#3] (#1-0.5,#2-0.5) -- (#1+0.5,#2-0.5) -- (#1+0.5,#2+0.5) -- (#1-0.5, #2+0.5) -- (#1-0.5,#2-0.5); } \newcommand{\tikzsquares}[5]{ \foreach \a in {#1,...,#3}{ \foreach \b in {#2,...,#4}{ \tikzsquare{\a}{\b}{#5} } } } \centering \resizebox{0.7\textwidth}{!}{% \begin{tikzpicture} \tikzsquares{1}{1}{1}{10}{fill=\fillfieldblue} \tikzsquares{2}{10}{4}{10}{fill=\fillfieldblue} \tikzsquares{2}{1}{4}{1}{fill=\fillfieldblue} \tikzsquares{4}{2}{7}{2}{fill=\fillfieldblue}; \tikzsquares{7}{1}{10}{1}{fill=\fillfieldblue} \tikzsquares{10}{2}{11}{2}{fill=\fillfieldblue} \tikzsquares{5}{4}{6}{16}{fill=\fillfieldgray} \tikzsquares{3}{13}{24}{14}{fill=\fillfieldgray} \tikzsquares{3}{6}{11}{7}{fill=\fillfieldgray} \tikzsquares{16}{16}{39}{17}{fill=\fillfieldgray} \tikzsquares{18}{11}{19}{19}{fill=\fillfieldgray} \tikzsquares{21}{11}{22}{19}{fill=\fillfieldgray} \tikzsquares{31}{13}{50}{14}{fill=\fillfieldgray} \tikzsquares{37}{11}{36}{19}{fill=\fillfieldgray} \tikzsquares{34}{11}{33}{19}{fill=\fillfieldgray} \tikzsquares{22}{15}{18}{15}{fill=green!60} \tikzsquares{20}{13}{20}{17}{fill=green!60} \tikzsquares{33}{15}{37}{15}{fill=green!60} \tikzsquares{35}{13}{35}{17}{fill=green!60} \tikzsquare{20}{15}{fill=\fillfieldred} \tikzsquare{35}{15}{fill=\fillfieldred} \draw[dashed] (50.5, 12.5) -- (52, 12.5); \draw[dashed] (50.5, 14.5) -- (52, 14.5); \draw[dashed] (11.5, 7.5) -- (13, 7.5); \draw[dashed] (11.5, 5.5) -- (13, 5.5); \draw[dashed] (11.5, 2.5) -- (13, 2.5); \draw[dashed] (11.5, 1.5) -- (13, 1.5); \tikzsquares{5}{13}{6}{14}{fill=green!60} \tikzsquares{5}{10}{6}{10}{fill=green!60} \tikzsquares{5}{6}{6}{7}{fill=green!60} \end{tikzpicture} }% \caption[Covering crucial pixels 1]{If the cycle uses the upper path, Lemma~\ref{lemma:gg:hard:stripeven} forces us to cover exactly all crucial pixels along this way, as we have only one choice for the position of the ``partner'' turn.} \label{fig:gg:hard:sticktovariableline} \end{figure} \end{proof} Now only the crucial pixels not covered by the variable assignment cycles are left. We have only two turns for each of them, hence we need at least two still uncovered crucial pixels in any additional cycle; this cycle must have at most twice the number of turns than the number of its newly covered crucial pixels. This, however, is impossible for unsatisfied clauses, so we must exceed the lower bound. \begin{lemma} \label{th:gg:hard:unsatub} Given a 2-dimensional grid graph produced by the above procedure for an arbitrary \emph{One-in-three 3SAT} formula. Let $\mathcal{C}$ be a set of cycles with minimum turn costs. Let $v$ be the number of variables in the corresponding formula, $c$ the number of clauses, and $k$ be the number of blue corner pixels. If the formula is not satisfiable, the cycle cover has to have at least $20v+42c+k+1$ turns. \end{lemma} \begin{proof} Assume there exists a cycle cover with only $20v+42c+k$ turns (matching the lower bound of Lemma~\ref{th:gg:hard:lb}). We now show that this number of turns cannot suffice to cover all pixels. By separating the cycles on the black dotted pixels using Lemma~\ref{lemma:gg:hard:separategray}, only $4v+18c+k$ turns remain for the red and blue pixels. Due to Lemma~\ref{lemma:gg:hard:variableline} we have to cover one line of crucial pixels per variable by a blue variable assignment cycle. The remaining crucial pixels can only be covered by the red cycles known from the construction. However, the use of red cycles in a way that no crucial pixel is covered multiple times (which would exceed the budget) enforces the logic described in the construction. A valid selection of red cycles is therefore only possible if the corresponding variable assignment is feasible. Because this is not the case, $20v+42c+k$ turns cannot be sufficient. \end{proof} \subsubsection{NP-Hardness} Finally, we can state the main theorem: the bound on the number of turns can only be met if the formula is satisfiable. \begin{theorem} Given a construction, as described above, for an arbitrary formula with $v$ variables and $c$ clauses. Let $k$ be the number of blue highlighted corner pixels. Then the formula is satisfiable if and only if there exists a cycle cover with $20v+42c+k$ turns. \end{theorem} \begin{proof} This follows from Lemma~\ref{th:gg:hard:satub} and Lemma~\ref{th:gg:hard:unsatub}. \end{proof} This concludes the proof of the NP-hardness of full coverage cycle cover (Theorem~\ref{th:gg:hard:nphard}). \subsection{Subset Coverage in Thin Grid Graphs} For subset cover we can also show hardness for {\em thin} grid graphs. Arkin et al.~\cite{arkin2001optimal,arkin2005optimal} exploits the structure of these graphs to compute an optimal minimum-turn cycle cover in polynomial time. If we only have to cover a subset of the vertices, the problem becomes NP-hard again. The proof is inspired by the construction of Aggarwal et al.~\cite{aggarwal2000angular} for the angular-metric cycle cover problem and significantly simpler than the one for full coverage. \begin{theorem} \label{th:gg:hard:nphardsubset} The minimum-turn subset cycle cover problem is NP-hard, even in thin grid graphs. \end{theorem} \begin{proof} \begin{figure}[h] \centering \input{./figures/subset_nphard_construction.tikz.tex} \caption[NP-hardness construction for subset coverage]{Example for the NP-hardness reduction using the \emph{One-in-three 3SAT} formula $(x_1\vee x_2 \vee x_3)\wedge(\overline{x_1}\vee \overline{x_2} \vee \overline{x_3})\wedge(x_2\vee\overline{x_3}\vee x_4)\wedge(\overline{x_1}\vee x_2 \vee \overline{x_4})$.} \label{fig:gg:cc:mtsccp:reductionexample} \end{figure} The proof is inspired by the construction of Aggarwal et al.~\cite{aggarwal2000angular} for the angular-metric cycle cover. See Fig.~\ref{fig:gg:cc:mtsccp:reductionexample} for an overview of the construction; due to its relative simplicity, we only sketch the details. Every variable consists of a U-shape, with two rows connecting the ends of the U. The bottom of the U has to be covered in any case, so we are free to either cover the upper or the lower row without additional turn cost. Covering the upper row means setting the variable to {\tt true}, covering the lower row to {\tt false}. These two rows intersect with the constructions for the clauses. Every clause construction consists of three vertical columns (intersecting with the variable constructions) and a horizontal connection at each end. At the top and the bottom of each is a pixel that has to be covered. The cheapest way to cover these two pixels is by a cycle that goes through the columns. Thus, we are able to cover two of three columns per clause construction for free. The two covered columns represent the two literals of the clause that have to be {\tt false}. We mark additional pixels at the intersections of the variable constructions and the clause constructions, so that these pixels must also be covered. This is done in a such way that if we set a variable to a specific value for all clauses that now become {\tt true}, the two columns to be covered are automatically enforced. In the example, if we set $x_1$ to {\tt true} and cover the upper row, we have to use the two lines on the right in clause $x_1\vee x_2 \vee x_3$, because otherwise the two lower pixels in the intersection are not covered. On the other hand, this enforces $x_2$ and $x_3$ to be {\tt false}, as the corresponding two left pixels to be covered can no longer be covered by the clause's cycle. The cycle cover represents a valid solution for the \emph{One-in-three 3SAT} formula, if and only if we do not need any additional cycles. \end{proof} Arkin et al.~\cite{arkin2001optimal,arkin2005optimal} showed how the structure of thin grid graphs can be exploited for computing an optimal minimum-turn cycle cover in polynomial time. If we only have to cover a subset of the vertices, the problem is NP-complete. \section{Approximation Algorithms} \label{sec:approx} \subsection{Cycle Cover} Now we describe a $2\omega$-approximation algorithm for the semi-quadratic (penalty) cycle cover problem with $\omega$ atomic strips per point if the edge weights satisfy Eq.~(\ref{eq:triang}). We focus on the full coverage version, as the penalty variant can be modelled in full coverage (with equal $\omega$ and while still satisfying Eq.~(\ref{eq:triang})), by adding for every point $p\in P$ two further points that have a zero cost cycle only including themselves and a cycle that also includes $p$ with the cost of the penalty. \input{./figures/approximation_example.tex Our approximation algorithm proceeds as follows. We first determine an {atomic strip cover} via linear programming. Computing an optimal {atomic strip cover} is NP-hard; we can show that choosing the \emph{dominant} strips for each pixel in the fractional solution, i.e., those with the highest value, suffices to obtain provable good solutions. As a next step, we connect the {atomic strips} to a {cycle cover}, using a minimum-weight perfect matching. See Fig.~\ref{fig:apx:example} for an illustration. We now describe the integer program whose linear programming relaxation is solved to select the dominant atomic strips. It searches for an optimal atomic strip cover that yields a perfect matching of minimum weight. To satisfy Eq.~(\ref{eq:triang}), transitive edges may need to be added, especially loop-edges (which are not used in the final solution). The IP does not explicitly enforce cycles to contain at least two points: all small cycles consist only of transitive edges that implicitly contain at least one further atomic strip/point. For the usage of a matching edge $e=vw\in E_O$, we use the Boolean variable $x_e=x_{vw}$. For the usage of an {atomic strip} $o=vw\in O_p, p\in P$, we use the Boolean variable $y_o=y_{vw}$. \begin{eqnarray} \min & \displaystyle \sum_{e\in E_O} \text{cost}(e)x_e & \label{eq:ip:obj}\\ \text{s.t.} & \displaystyle \sum_{vw\in O_p} y_{vw} = 1 & p\in P\label{eq:ip:cover}\\ & \displaystyle 2x_{vv} + \sum_{\substack{e\in E_O(v)\\ e\not= vv}} x_e =2x_{ww} + \sum_{\substack{e\in E_O(w)\\ e\not= ww}} x_e = y_{vw} & p\in P, vw\in O_p \label{eq:ip:inout \end{eqnarray} We minimize the cost of the used edges, with Eq.~(\ref{eq:ip:cover}) forcing the selection of one {atomic strip} per pixel (atomic strip cover) and Eq.~(\ref{eq:ip:inout}) ensuring that exactly the vertices (endpoints) of the selected {atomic strips} are matched, with loop edges counting double due to their two ends. \begin{theorem} \label{th:ccapx} Assuming edge weights that satisfy Eq.~(\ref{eq:triang}), there is a $2\omega$-approxima\-tion for semi-quadratic (penalty) cycle cover. \end{theorem} \begin{proof} We prove this theorem by showing that there exists a matching on the dominant {atomic strips} of the fractional solution with at most $2\omega$ the cost of the fractional solution. This implies that the minimum weight perfect matching on these strips has to be at least that good. Due to the constraints of type Eq.~(\ref{eq:ip:cover}), the dominant strip $o\in O_p$ for every $p\in P$ has a value of $y_o\geq 1/\omega$ in any feasible solution of the LP-relaxation. Let $o_p$ be this dominant strip for $p\in P$ and $V'_O\subseteq V_O$ the set of the endpoints of all of them. There may also be further $p \in P, o\in O_p$ with $y_o > 0$. We can set these to zero using the operations of Fig.~\ref{fig:reduceusages} without increasing the objective value and without changing any $y_{o_p}$ while also satisfying Eq.~(\ref{eq:ip:inout}), because of the constraint in Eq.~(\ref{eq:triang}). \begin{figure} \centering \includegraphics[width=1\textwidth]{./figures/apx_proof_reduce_edges} \caption{Operations for reducing the usage of a strip $vw$. Strips are shown by thick lines, while edges are indicated by dashed lines. These costs do not increase (for $\gamma>=0$), due to Ineq.~\ref{eq:triang}. For some cases as a) one needs a repetitive application of this inequality: first replace the $\gamma/2*vv$ loop-edge by $\gamma/2 * vu$ while reducing $uw$ by $\gamma/2$ and then replace the $\gamma/2*wu$ and the $\gamma/2*vu$ by $\gamma/2*uu$. As long as the usage is greater than zero, at least one of the operations is possible.} \label{fig:reduceusages} \end{figure} The resulting solution only violates Eq.~(\ref{eq:ip:cover}) by relaxing it to $\sum_{vw\in O_p} y_{vw} \geq 1/\omega$, but we fix this later by a simple multiplication. Now we only have edges from $E'_O=E_O\cap (V'_O\times V'_O)$ in our fractional solution. The corresponding objective value is still a lower bound on the optimal solution of the integer program. We can multiply the solution by $\omega$ resulting in $y_{o_p} \geq 1$ for all $p\in P$. We can apply the same procedure to reduce all $y_{o_p} > 1$ to $=1$. The new solution has a cost of at most $\omega$ times the optimal solution and all variables $y_o, o\in O_p, p\in P$ are now Boolean; however, the edge usages can still be fractional. If we now fix the values for $y_o, o\in O_p, p\in P$ and remove all vertices (and their incident edges) that are not in $V'_O$, we have a minimum perfect matching polytope with loop-edges as stated below. \begin{eqnarray} \min & \sum_{e\in E'_O} c(e)*x_e & \\ \text{s.t.} &\sum_{e=vw\in E'_O} x_e + 2*x_{vv} = 1 & \forall v\in V'_O\\ & 0\leq x_e \leq 1 & \forall e\in E'_O \end{eqnarray} Because the previous solution is still feasible in this formulation, the optimal solution of this formulation is also at most $\omega$ the costs of the optimal solution of the problem. We can show that the new polytope contains a half-integral optimal solution. The proof works analogously to the proof of the half-integrality of the classic matching polytope (see, e.g., Theorem~{$6.13$} in the book of Cook et al.~\cite{cook1997combinatorial}). We create a bipartite graph $G'_{\text{bip}}(V'_O\times 2, E'_{\text{bip}})$ in which for every $v\in V'_O$ there are two vertices $v,v'\in V'_O\times 2$ and for every edge $e=vw\in E'_O$ there are the edges $vw'$ and $v'w$ in $E'_{\text{bip}}$, see Fig.~\ref{fig:gg:aa:bipartdouble}. \begin{figure} \centering \includegraphics[width=0.7\textwidth]{./figures/apx_convert_to_bipartite} \caption{Converting a graph to a bipartite graph. Every edge is doubled except the loop-edges which become regular edges. The matching $vw'$,$wu'$ $uv'$ would be converted to the matching $0.5vw, 0.5wu, 0.5uv$. There always exists a perfect matching in the original graph for our problem.} \label{fig:gg:aa:bipartdouble} \end{figure} A loop-edge $vv\in E'_O$ is simply replaced by a single edge $vv'\in E'_{\text{bip}}$. Because there are no edges within the individual copies of $V'_O$ in $G'_\text{bip}$, the graph is bipartite; the bipartite matching polytope is known to be integral. By assigning the edges in $G'_{\text{bip}}$ the same values as for the solution on $G'_O(V'_O, E'_O)$ (doubling for loop-edges), we obtain a feasible solution with twice the costs on $G'_{\text{bip}}$. The optimal solution in $G'_{\text{bip}}$, hence, at most twice as expensive as the optimal solution in $G'_O$. The optimal solution in $G'_{\text{bip}}$ (which is integral) can be transformed to a solution of half the costs for $G'_O$ by assigning each edge half the sum of the corresponding two edges (or one edge for loop-edges) in the solution for $G'_{\text{bip}}$. This solution is half-integral and optimal. Hence, we have an optimal solution where regular edges are selected by $0$, $0.5$, or $1$ and loop-edges are selected by $0$ or $0.5$. If we double such a solution, we obtain an integral solution with at most $2*\omega$ the costs of the original linear program. Every vertex has either two regular edges selected with $1$ each, a single regular edge selected twice, or a loop-edge selected with $1$. We can remove the loop-edges without cost increase as shown in Fig.~\ref{fig:removeloopedges} by also reducing the strip usage to one (a loop-edge always implies a double usage). For removing other double usages we can use nearly the same technique as for fractional in Fig.~\ref{fig:reduceusages}. We only have to make sure never to create fractional loop-edges (we do not need the cases in which this can happen because these cases all have loop-edges in the beginning which we removed before). Integral loop-edges can immediately be removed as in Fig.~\ref{fig:removeloopedges}. \begin{figure} \centering \includegraphics[width=0.9\textwidth]{./figures/apx_proof_remove_interal_loops} \caption{Removing integral loop-edges. A loop-edge always implies a double usage of the corresponding strip. The costs do not increase due to Ineq~\ref{eq:triang}. A `$+1$' indicates a new edge, a `$-1$' the removal of an edge.} \label{fig:removeloopedges} \end{figure} In the end, we have a solution that is a matching for $G'_O$ and has at most $2\omega$ the cost of the objective value of the linear relaxation. As the linear relaxation provides a natural lower bound, this concludes the proof. \end{proof} \input{./figures/approximation_example.tex} \begin{figure} \centering \includegraphics[width=0.4\textwidth]{./figures/transformation} \caption{We can easily compute the shortest path with turn costs in grid graphs by replacing every point (that only encodes a position) by vertices for all headings of interest (four for grid graphs). The turn costs ($\tau$) then are encoded in the costs of switching between these vertices. A vertex heading north allows only to go north such that the rotation edges have to be used to make a rotation. $\gamma$ denotes the distance cost. } \label{fig:apx:directedshortestpath} \end{figure} \subsection{Tours} A given cycle cover approximation can be turned into a tour approximation at the expense of an additional constant factor. Because every cycle involves at least two points and a full rotation, we can use classic tree techniques known for TSP variants to connect the cycles and charge the necessary turns to the involved cycles. We sketch the basic ideas and elaborate the details for the most difficult case afterwards in Theorem~\ref{th:gg:aa:penalty:tour2d} (the other cases are analogous). For the classic Traveling Salesman Problem with triangle inequality, minimum spanning trees are trivial lower bounds, as any tour must contain a spanning tree. This is also true for the penalty TSP and the prize-collecting Steiner tree; note that ``penalty'' and ``prize-collecting'' variants are completely equivalent. Doubling optimal trees yields trivial 2-approximations. (The prize-collecting Steiner tree is NP-hard, but there is a 2-approximation~\cite{goemans1995general}.) This is not directly possible with turn costs, because it matters from where a vertex is entered. However, if we already have a cycle cover and we aim to connect them, this gets significantly easier. If there is a path between two cycles, we can double it and merge the cycles, requiring not more than an additional $180^\circ$ turns at the ends of the paths, regardless of the direction from which the path hits the cycle. Thus we can merge two cycles with a cost of two times the cheapest path between them, plus $360^\circ$ for connecting the elements. The costs of the paths can be charged to the optimal tour, analogous to the classic TSP. On the other hand, the $360^\circ$ can be charged to one of the cycles, because every cycle needs to do at least a full rotation, and there are fewer such merge processes than cycles in the initial cycle cover. This directly yields a method for approximating subset tours when a cycle cover approximation is given, see Fig.~\ref{fig:mst_subset_connect}. In order to connect the cycles of a penalty cycle cover to a penalty tour, we cannot simply use the doubled minimum spanning tree technique like we did for subset coverage; e.g., if the penalty cycle cover consists of two distant cycles, it may be cheaper not to connect them, but select the better cycle as a tour and discard the other cycle. Instead, we double a prize-collecting Steiner tree instead of a minimum spanning tree, in which every vertex not in the tree results in a penalty (or every vertex in the tree provides a prize). Without loss of generality, we may assume that all cycles are disjoint: otherwise, we connect two crossing cycles at a cost of at most $360^\circ$, which can be charged to the merged cycle. Then the penalty for not including a cycle is the sum of penalties of all its pixels. As a result, we get a constant-factor approximation for penalty tours. \begin{theorem} Assuming validity of Eq.~\ref{eq:triang} we can establish the following approximation factors for tours. \begin{enumerate} \item Full tours in regular grid graphs: $6$-approximation. \item Full tours in generalized grid graphs: $4\omega$-approximation. \item Subset tours in (generalized) grid graphs: $(4\omega+2)$-approximation. \item Geometric full tours: $(4\omega+2)$-approximation. \item Penalty tours (in grid graphs and geometric): $(4\omega+4)$-approximation. \end{enumerate} These results also hold for objective functions that are linear combinations of length and turn costs. \end{theorem} \begin{proof} Crucial are that (1) a cycle always has a turn cost of at least $360^\circ$, (2) two intersecting cycles can be merged with a cost of at most $360^\circ$, and (3) two cycles intersecting on a $180^\circ$ turn can be merged without additional cost. \begin{enumerate} \item For full tours in grid graphs, greedily connecting cycles provides a tour with at most $1.5$ times the turn cost of the cycle cover, while a local optimization can be exploited to limit the length to $4$ times the optimum, as shown by Arkin et al.~\cite{arkin2001optimal}. \item In a cycle cover for (generalized) grid graphs, there are always at least two cycles with a distance of one, while every cycle has a length of at least $2$; otherwise the cycle cover is already a tour. This allows iteratively merging cycles at cost at most as much as a cheapest cycle; the total number of merges is less than the number of cycles. \item and (iv) For subset coverage in grid graphs or full coverage in the geometric case, we need to compute the cheapest paths between any two cycles, ignoring the orientations at the ends. First connect all intersecting cycles, charging the cost on the vanishing cycles. The minimum spanning tree on these edges is a lower bound on the cost of the tour. Doubling the MST connects all cycles with the cost of twice the MST, the cost of the cycle cover, and the turn costs at the end of the MST edges, which can be charged to the cycles. \addtocounter{enumi}{1} \item Penalty tours can be approximated in a similar manner. Instead of an MST, we use a Price-Collecting Steiner Tree, which is a lower bound on an optimal penalty tour. We use a $2$-approximation for the PCST~\cite{goemans1995general}, as it is NP-hard. We achieve a cost of twice the 2-approximation of the PCST, the cost of the penalty cycle cover, and the cost of its cycles again for charging the connection costs. The penalties of the points not in the cycle cover are already paid by the penalty cycle cover. \end{enumerate} \end{proof} For completeness, we describe the details for 2-dimensional grid graphs; other cases are analogous. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{./figures/mst_subset_connect} \caption{Connecting subset cycles (cycles in black, subset pixel in orange) by a minimum spanning tree (red edges) on the components/cycles.} \label{fig:mst_subset_connect} \end{figure} \begin{theorem} \label{th:gg:aa:penalty:tour2d} There is a $12$-approximation algorithm for penalty tours in grid graphs. \end{theorem} \begin{proof} The factor of 12 results of $4\text{OPT}$ for a penalty cycle cover, $2\cdot 2\text{OPT}$ for a 2-approximation of a prize-collecting Steiner tree, and again the cost of the penalty cycle cover as an upper bound on the necessary additional turns. Just like for full coverage, the prize-collecting Steiner tree is computed on an auxiliary graph based on the cycles. For simplicity, we directly merge all cycles that share a pixel. The cost for this can be charged to one of the cycles from the same budget as for the later connections without any interference, because we reduce the number of cycles used in the later part. In the corresponding graph, every cycle is represented by a vertex. The penalty for points not covered by cycles is already paid for by the penalty cycle cover. There is an edge between any two cycles; its cost is the cheapest transition from one pixel of the first cycle to a pixel of the second cycle, ignoring the orientations at these end pixels. The penalty of each vertex is the sum of the penalties of all of its pixels. Doubling a prize-collecting Steiner tree and removing all cycles not in the tree results in a tour; the turns at the ends can be charged to the cycle cover, just like for full/subset coverage. It remains to be shown that the optimal prize-collecting Steiner tree on the cycle graph is a lower bound on the optimal tour. This can be seen by obtaining such a tree from the optimal penalty tour. Because the turns at the end points are free, as is moving within the cycles, the resulting tree is not more expensive than the tour. Further, visiting a single pixel of a cycle covers also all other pixels of the cycle, so also the penalties are cheaper. Finally, a 2-approximation for the prize-collecting Steiner tree can be provided by the algorithm of Goemans and Williamson~\cite{goemans1995general}. \end{proof} \subsection{Geometric Instances} \label{sec:app:tourgeom} In this section we give some additional information on solving the 2-dimensional geometric instances with polygonal obstacles. We consider an (individual) set of $\omega$ atomic strips per point $p\in P$ and search for a cycle cover/tour that covers all points of $P$ (by integrating one of the atomic strips) with minimal distance and turn angle sum. If there are only at most $\omega$ orientations per point, there are at most $(2\omega|P|)^2$ many possible transitions in the tour. The cheapest transition between two configurations can be computed by considering the visibility graph (this is analogous to the situation for Euclidean shortest paths, see Fig.~\ref{fig:geo:path:turnpoints:circle} and e.g., Chapter~$15$ in de Berg at al.~\cite{debergcg2008}) and a simple graph transformation to integrate the turn costs into edge costs, which requires $O(|E|)$ vertices and $O(|E|)$ edges, see Fig.~\ref{fig:geo:path:transformation}. The visibility graph can be computed in $O(n^2)$, e.g., by the algorithm of Asano et al.~\cite{asano1986visibility}. Skipping an atomic strip does not increase the costs, hence we can use the Atomic Strip Matching technique described before. The connecting strategies remain also the same; the only additional subroutine is the computation of the geometric primitives, which remains polynomial. \begin{figure} \centering \includegraphics[width=0.5\textwidth]{./figures/shortest_path_circle} \caption[Illustration for minimum cost path proof]{If the turning point $p_i$ is not on a vertex of an obstacle, we can build a shorter tour with the same turn costs by replacing $p_i$ by $p'_i$ and $p''_i$ (blue).} \label{fig:geo:path:turnpoints:circle} \end{figure} \begin{figure} \centering \includegraphics[width=0.9\textwidth]{./figures/graph_transformation} \caption[Transforming a graph with turn costs in a normal weighted digraph]{The transformation of the graph to integrate turn costs in the edge costs. The start configuration is in $u$ heading south-east ($s'$) and the goal configuration is in $v$ heading north-east ($g'$). $\angle_a(b,c)$ denotes the counterclockwise angle from segment $(a,b)$ to segment $(a,c)$.} \label{fig:geo:path:transformation} \end{figure} \section{Conclusions} We have presented a number of theoretical results on finding optimal tours and cycle covers with turn costs. In addition to resolving the long-standing open problem of complexity, we provided a generic framework to solve geometric (penalty) cycle cover and tours problems with turn costs. As described in~\cite{drone_vid}, the underlying problem is also of practical relevance. As it turns out, our approach does not only yield polynomial-time approximation algorithms; enhanced by an array of algorithm engineering techniques, they can be employed for actually computing optimal and near-optimal solutions for instances of considerable size in grid graphs. Further details on these algorithm engineering aspects will be provided in our forthcoming paper~\cite{ALENEX19}. \section{Formal Problem Definition} \label{sec:apdx:problems} For easier reference, we provide a full set of formal definitions. I case of acceptance, these will be contained in a full version of the paper, to be posted at the arXiv. \subsection{Grid Graphs} In the followin, we formalize the different problem variants. We focus on 2-dimensional grid graphs; the generalization to other grids is straightforward. \begin{definition}[Cycle] A {\em cycle} in a 2-dimensional grid graph $G(V,E)$ is a sequence of pixel/vertices $v_0, v_1, \ldots, v_n\in V$ with $v_0=v_n$ and $\forall v_i, v_{i+1}: \{v_i, v_{i+1}\}\in E$. It has length $n\geq 2$, which equals the number of transitions. \end{definition} Note that a pixel can be visited multiple times by a cycle. We acquire at least two distinct pixels in a cycle to prevent degeneracies. The {\em cost} of a cycle consists of two parts: costs for each turn and costs for each pixel transition (or its length). We also refer to these costs as {\em turn costs} and {\em distance costs}. There are three different possible turns: $+90\degree$, $-90\degree$, and $180\degree$. We count $+90\degree$ and $-90\degree$ as a single turn. while u-turns of $180\degree$ incur a cost of two simple turns. We get analogous values for a hexagonal grid, with turns of $\pm 60\degree$, $\pm 120\degree$, and $180\degree$ turns and incurring a cost of one turn, two turns, and three turns, respectively. A transition from one pixel to an adjacent pixel adds $1$ to the length of the tour. The cost of a cycle is a linear combination of the number of turns and its length: for a cycle $\gamma$ of length $s$ and $t$ has a cost $c_{\kappa,\tau}(\gamma)=s*\kappa+t*\tau$, with $\kappa\in\mathbb{R}^+_0$ and $\tau\in\mathbb{R}^+_0$ being two appropriate constants. (Thus, a cycle that only covers two adjacent pixels has a turn cost of $4$ and a length of $2$.) We now consider the details of the different variants. \subsubsection{Full Coverage} The simplest problem variants are {\em full coverage cycle cover} and {\em full coverage tour cover}, where it every pixel has to be covered by a cycle cover or a tour, respectively. \begin{problem}[Full cycle cover] \label{prob:2dcc} Given a connected grid graph $G=(V,E)$ and two weights $\kappa,\tau\in \mathbb{R}^+_0$. Find a set of cycles $\mathcal{C}=\{\pi_0,\pi_1, \ldots\}$ such that every vertex $v\in V$ is visited at least once by some cycle of $\mathcal{C}$ and $\sum_{\pi_i \in \mathcal{C}}c_{\kappa,\tau}(\pi_i)$ is minimal. \end{problem} A cycle cover is a tour if it only contains a single cycle. \begin{problem}[Full tour] \label{prob:2dtour} Given a connected grid graph $G=(V,E)$ and two weights $\kappa,\tau\in \mathbb{R}^+_0$. Find a single closed cycle (a {\em tour} $\pi$ in $G$, such that every vertex $v\in V$ is visited at least once, and $c_{\kappa,\tau}(\pi)$ is minimized. \end{problem} \subsubsection{Subset Coverage} If we only need to visit a subset of pixels, we get problem variations similar to the \emph{Steiner tree on graphs} as a variation of the \emph{minimum spanning tree}. \begin{problem}[Subset cycle cover] \label{prob:gg:subsetcc} Given a connected grid graph $G=(V,E)$, a set $S\subseteq V$, and two weights $\kappa,\tau\in \mathbb{R}^+_0$. Find a set of cycles $\mathcal{C}=\{\pi_0,\pi_1, \ldots\}$ such that every vertex $v\in S$ is visited at least once by some cycle of $C$, and $\sum_{\pi_i \in \mathcal{C}}c_{\kappa,\tau}(\pi_i)$ is minimized. \end{problem} And the respective tour version of the problem: \begin{problem}[Subset tour] \label{prob:subsettour} Given a connected grid graph $G=(V,E)$, a set $S\subseteq V$, and two weights $\kappa,\tau\in \mathbb{R}^+_0$. Find a tour/cycle $\pi$ in $G$ such that every vertex $v\in S$ is visited at least once, and $c_{\kappa,\tau}(\pi)$ is minimized. \end{problem} For $V=S$, Problem~\ref{prob:gg:subsetcc} and Problem~\ref{prob:subsettour} are equivalent to Problem~\ref{prob:2dcc} and Problem~\ref{prob:2dtour}, respectively. \subsubsection{Penalty Coverage} Another natural generalization arises from covering pixels with different values or densities. This is similar to the \emph{penalty traveling salesman problem~(PTSP)} variation of the TSP. For the PTSP, a 2-approximation is known for the case that the triangulation inequality holds for the corresponding graph~\cite{goemans1995general}. The PTSP is often also wrongly called the \emph{prize-collecting traveling salesman problem (PCTSP)} but the PCTSP also contains a quota that has to be fulfilled, see~\cite{ausiello2007prize}. The definitions of cycle cover and tour variants can be given as follows. \begin{problem}[Penalty cycle cover] Given a connected grid graph $G=(V,E)$, a penalty function $\rho:V\rightarrow \mathbb{R}^+_0$, and two weights $\kappa,\tau\in \mathbb{R}^+_0$. Find a set of cycles $\mathcal{C}=\{\pi_0,\pi_1, \ldots\}$, such that $\sum_{\pi_i \in \mathcal{C}}c_{\kappa,\tau}(\pi_i)+\sum_{v\in V\setminus V(\mathcal{C})} \rho(v)$ is minimized, where $V(\mathcal{C})$ denotes the pixel covered by $\mathcal{C}$. \end{problem} \begin{problem}[Penalty tour] Given a connected grid graph $G=(V,E)$, a penalty function $\rho:V\rightarrow \mathbb{R}^+_0$, and two weights $\kappa,\tau\in \mathbb{R}^+_0$. Find a tour/cycle $\pi$ in $G$, such that $c_{\kappa,\tau}(\pi)+\sum_{v\in V\setminus V(\pi)}\rho(v)$ is minimized. \end{problem} In some scenarios, the PTSP is defined with a root vertex that has to be covered; this can be modeled in our formulation by setting the penalty for the root pixel sufficiently high. Similarly, the penalty coverage problem can model the subset coverage problem by using a high penalty for the pixels in the subset. \subsection{Geometric Versions} We can generalize the previous definitions to more general geometric versions. We express a cycle as a sequence of configurations (position and heading). A point $p$ with the discretized orientations $\delta(p)$ is covered by a cycle if one of its configurations $\{(p, \alpha), (p,\alpha+\pi) \mid \alpha \in \delta(p)\}$ is in the cycle. The transition between two subsequent such configurations equals the optimal transition and the cost of the cycle is the sum of the cost of these transitions. \begin{definition} A {\em cycle} $C$ for a set of points $P$ with the discrete orientations $\delta: P\rightarrow \mathcal{P}([0,\pi))$ in a polygonal environment with the obstacles $\mathcal{O}$ is a sequence of configurations $\sigma_0=(p_0\in P, \alpha_0\in \{\alpha, \alpha+\pi \mid \alpha \in \delta(p_0)\}), \ldots, \sigma_n=(p_n\in P, \alpha_n\in \{\alpha, \alpha+\pi \mid \alpha \in \delta(p_n)\})$ with $\forall i=0,\ldots, n-1: p_i\not= p_{i+1}$. The cost $c_{\mathcal{O},\kappa, \tau}( C)$ of a cycle is the sum of minimum-cost transitions between any two subsequent configurations \[c_{\mathcal{O}, \kappa, \tau}(C) = \text{SP}_{\mathcal{O}, \kappa, \tau}(c_n, c_0)+\sum_{i=0,\ldots, n-1} \text{SP}_{\mathcal{O}, \kappa, \tau}(c_i, c_{i+1}),\] where $\text{SP}_{\mathcal{O}, \kappa, \tau}(c_a, c_b)$ denotes the minimum-cost transition (shortest path) from configuration $c_a$ to $c_b$ around the obstacles $\mathcal{O}$ with distance cost parameter $\kappa$ and the turn cost parameter $\tau$. If no such transition exists, we assume the cost to be infinite. Moreover, for a point $p\in P$ and a cycle $C$, we denote $p\in C \Longleftrightarrow \exists \beta \in \{\alpha, \alpha+\pi \mid \alpha \in \delta(p)\}: (p, \beta)\in C$ as $p$ being covered by $C$. \qed \end{definition} In the full coverage variant, we want a set of cycles (cycle cover) or a single cycle (tour) such that the sum of distance costs and turn costs are minimal and every point $p\in P$ is covered. \begin{problem}[Full coverage geometric cycle cover] Given a set of polygonal obstacles $\mathcal{O}$ in $\mathbb{R}^2$, a set of points $P$ that do not lie within any obstacle, and a function $\delta: P\rightarrow \mathcal{P}( [0, \pi) )$ with $ \forall p\in P: |\delta(p)|\leq \omega$ for some fixed $\omega\in \mathbb{N}^+$. Further, the distance cost weight $\kappa\in \mathbb{R}_0^+$ and the turn cost weight $\tau\in \mathbb{R}_0^+$. Wanted is a set of cycles $\mathcal{C}=C_0, \ldots, C_m$ that do not intersect $\mathcal{O}$, such that $\sum_{C_i\in \mathcal{C}} c_{\mathcal{O},\kappa, \tau}(C_i)$ is minimal, and every point $p\in P$ is covered by a least on cycle $C_i\in \mathcal{C}$. \end{problem} \begin{problem}[Full coverage geometric tour] Given a set of polygonal obstacles $\mathcal{O}$ in $\mathbb{R}^2$, a set of points $P$ that do not lie within any obstacle, and a function $\delta: P\rightarrow \mathcal{P}( [0, \pi) )$ with $\forall p\in P: |\delta(p)|\leq \omega $ for some fixed $\omega\in \mathbb{N}^+$. Further, the distance cost weight $\kappa\in \mathbb{R}_0^+$ and the turn cost weight $\tau\in \mathbb{R}_0^+$. Wanted is a single polygonal cycle $C$ that does not intersect $\mathcal{O}$, such that $c_{\mathcal{O},\kappa, \tau}(C)$ is minimal and every point $p\in P$ is covered. \end{problem} In the penalty coverage variant, we want a set of cycles (cycle cover) or a single cycle (tour), such that the sum of distance costs, turn costs, and penalty costs are minimal. The penalty $\rho(p)$ is added for every point $p\in P$ that is not covered. \begin{problem}[Penalty geometric cycle cover] Given a set of polygonal obstacles $\mathcal{O}$ in $\mathbb{R}^2$, a set of points $P$ that do not lie within any obstacle, a function $\delta: P\rightarrow \mathcal{P}( [0, \pi) )$ with $\forall p\in P: |\delta(p)|\leq \omega $ for some fixed $\omega\in \mathbb{N}^+$, and a penalty function $\rho: P\rightarrow \mathbb{R}^+_0$. Further, let $\kappa\in \mathbb{R}_0^+$ be the distance cost coefficient and $\tau\in \mathbb{R}_0^+$ be the turn cost coefficient. Wanted is a set of cycles $\mathcal{C}$ for which $\sum_{C_i\in \mathcal{C}} c_{\mathcal{O}, \kappa, \tau}(C)+\sum_{p\in P, \forall C_i \in \mathcal{C}: p\not \in C_i} \rho(p)$ is minimal. \end{problem} \begin{problem}[Penalty geometric tour] Given a set of polygonal obstacles $\mathcal{O}$ in $\mathbb{R}^2$, a set of points $P$ that do not lie within any obstacle, a function $\delta: P\rightarrow \mathcal{P}( [0, \pi) )$ with $\forall p\in P: |\delta(p)|\leq \omega $ for some fixed $\omega\in \mathbb{N}^+$, and a penalty function $\rho: P\rightarrow \mathbb{R}^+_0$. Further, the distance cost weight $\kappa\in \mathbb{R}_0^+$ and the turn cost weight $\tau\in \mathbb{R}_0^+$. Wanted is a single polygonal cycle $C$ for which $c_{\mathcal{O}, \kappa, \tau}(C)+\sum_{p\in P, p\not \in C} \rho(p)$ is minimal. \end{problem} \section{Details on NP-Hardness of Minimum-Turn Cycle Cover} \label{app:A} \section{Details for the Approximation Algorithms} In this part of the appendix we give additional details on the approximation techniques. We provide a detailed proof of Theorem~\ref{th:ccapx} on how to obtain a 12-approximation algorithm for penalty tours in grid graphs (from which the other cases can easily be deduced), and some additional details on the geometric version. \subsection{Cycle Cover} \label{sec:app:ccapx} \statement{Theorem}{th:ccapx}{ \emph{A minimum-weight perfect matching of the endpoints of the dominant {atomic strips} of the fractional solution of the integer program \eqref{eq:ip:obj}-\eqref{eq:ip:inout} yields a $2\omega$-approximation for semi-quadratic (penalty) cycle cover if the edge weights satisfy Eq.~(\ref{eq:triang}).}} \begin{proof} \end{proof} \subsection{Tours} \label{sec:app:tourapx} \section{Details on Integer Programming} \label{sec:app:ip} We provide further details on an integer programming formulation for solving the full coverage tour problem to optimality. The IP in Eq.~(\ref{eq:obj}) to (\ref{eq:ip:constr2}) described in Sec.~\ref{sec:short_strip_cover} already provides a powerful IP formulation for the cycle cover problem. We experimented with different formulations; this turned out to be the best for most cases and variants. It is analogous to the cycle cover formulation used by Maurer~\cite{maurer2009diploma}; in order to make it useful for tours, it only lacks constraints for subtour elimination. These subtour elimination constraints are more complicated than for the classic TSP, because here cycles can intersect without being connected. We describe two different variants: a simple but insufficient one analogous to the one for TSP, and a more complex one that is sufficient. \subsection{A Necessary Family of Simple Subtour Separation Constraints} Let $C$ be a subtour that is not crossed by any other cycle. It is easy to see that there has to be a variable used that allows to leave the set of pixels $P'=\{p_i\in C\}$ covered by $C$. \begin{eqnarray} \displaystyle \sum\limits_{p_j\in P', i,k\in N(p_j), p_i\not\in P'} x_{ijk}\geq 1 & \forall P'\subsetneq P, P'\not=\emptyset \end{eqnarray} This is valid for any real non-empty subset $P'\subsetneq P$ of pixels, independent of any cycle. Therefore, $C$ may also consist of, e.g., two intersecting cycles, as long as $C$ does not fully cover all pixel $P$. This constraint forces cycles to intersect but the turn costs prevent us from assuming that this is sufficient for connecting the cycles. For example the two cycles in Fig.~\ref{fig:gg:ip:fc:form1:cut2} intersect and hence fulfill aboves constraint but connecting them would cost us two extra turns. \subsection{A Sufficient Family of Advanced Subtour Separation Constraints} The following separation constraint is valid for all subtours $C$ that have a pixel $p_f$ only covered by $C$ and another pixel $p_{f'}$ not covered by $C$. For cycle covers that do not already contain a tour, you can argue the existence of such pixels by using the corner pixels which can only be covered by one cycle (as they automatically connect all their cycles). The separation constraint enforces that either $p_f$ is passed differently, or there is a turn in a pixel traversed without a turn by $C$, or a currently unused variable is used in one of the other pixels of $C$. Let $F_s$ be the set of pixels different from $p_f$ that are traversed without a turn by $C$. Other cycles may also pass pixels in $F_s$, but not by a simple turn as otherwise they would be connected with $C$. Let $T(p_i)$ be the simple turn variables for the pixel $p_i\in P$ and let $x'$ denote the value of a variable in the current solution. \begin{equation} \sum_{i,j\in N(p_f), x'_{ifj}=0} x_{ifj} + \sum_{t\in T(p_i), p_i\in F_s} t + \sum_{ p_j\in C\setminus (F_s\cup\{p_f\}), i\not=k\in N(p_j), x'_{ijk}=0} x_{ijk} \geq 1 \end{equation} An example of this separation constraint can be seen in Fig.~\ref{fig:gg:ip:fc:form1:cut2}. While for the previous separation constraint, we could theoretically use any subset of pixels, this separation constraint needs a preliminary solution to be useful for separation. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{./figures/ip_second_constraint_example} \caption[Second subtour separation constraint]{The blue and the green cycle are intersecting and thus the first separation constraint is satisfied even though the two cycles are not connected. We can use the second separation constraint to force the cycles to connect using the black dotted pixel as $p_f$. The constraint forces at least one of the red traversals to be used.} \label{fig:gg:ip:fc:form1:cut2} \end{figure} \section{Benchmark Examples and Runtime} \label{sec:app:exp} \begin{figure}[h] \centering \includegraphics[width=0.6\textwidth]{./figures/gg_op_n138_s3_scale0_5_7684} \caption{An example instance of Type~I with \num{7684} pixels.} \label{fig:instanceexample:ortho} \end{figure} \begin{figure} \centering \includegraphics[width=0.9\textwidth]{./figures/gg_rect_n10000_s10052_scale5_10052} \caption{An example instance of Type~IIa with \num{10052} pixels.} \label{fig:instanceexample:rect5} \end{figure} \begin{figure} \centering \includegraphics[width=0.9\textwidth]{./figures/gg_rect_n10000_s10004_scale1_10004} \caption{An example instance of Type~IIb with \num{10004} pixels.} \label{fig:instanceexample:rect1} \end{figure} \begin{figure} \centering \includegraphics[width=0.9\textwidth]{./figures/experiments/scatterplot_cc_apx_runtime.pdf} \includegraphics[width=0.9\textwidth]{./figures/experiments/scatterplot_cc_apx_runtime_large.pdf} \caption{Runtime of the cycle cover approximation algorithm for Type~I, Type~IIa, Type~IIb and different turn cost coefficients, indicating the relative cost of a simple turn vs.~a pixel transition. {\bf (Top)} Instances with up to \num{100000} pixels for all types. {\bf (Bottom)} Very large instances with more than \num{300000} pixels for Type~I. } \label{plot:runtime} \end{figure}
\section*{Introduction} The ability to walk is crucial for human mobility and enables to predict quality of life, morbidity and mortality \cite{verghese2006epidemiology, verghese2012mobility, soh2011determinants, studenski2003physical, studenski2011gait, hirsch2011predicting, fagerstrom2010mobility, mahlknecht2013prevalence, rubenstein2001quality, forte2015health}. Its importance is underlined by the fear of losing the ability to walk, which is frequently considered to be the first and most significant concern from individuals that sustain diagnoses like stroke \cite{schmid2007improvements, seale2010gait} or Parkinson disease \cite{soh2011determinants, ellis2011measures}. However, gait and balance are no longer regarded as purely motor tasks, but are considered as complex sensorimotor behaviours that are heavily affected by cognitive and affective aspects \cite{giladi2013classification}. This may partially explain the sensitivity to subtle neuronal dysfunction, and why gait and postural control can predict the development of disease such as diabetes, dementia or Parkinson even years before they are diagnosed clinically \cite{giladi2013classification, verghese2002abnormality, baltadjieva2006marked, buracchio2010trajectory, valkanova2017can}. In order to prevent, diagnose, or rehabilitate a loss of independence due to (gait) impairments, gait analysis is common practice to support and standardise researchers’, clinicians’ and therapists’ decisions when assessing gait abnormalities and/or identifying changes due to orthopaedic or physiotherapeutic interventions \cite{baker2013measuring}. But although becoming gradually established over the past decades, most biomechanical gait analyses have examined the influence of single time-discrete gait variables, like gait velocity, step length or range of motion, as risk factor or predictor for (gait) disease in isolation\cite{mills2013biomechanical, wegener2011effect}. While conventional approaches have addressed successfully many important clinical and scientific questions related to human gait (impairments), they exhibit some inherent limitations: When single time-discrete variables (e.g.\ the range of motion in the knee joint) are extracted from time-continuous variables (e.g.\ knee joint angle-gait stride curve), a large amount of data are discarded. In many cases it remains unclear, if and to what degree single pre-selected variables are capable to represent a sufficient description of a whole body movement like human gait \cite{schollhorn2002identification, federolf2012holistic, eskofier2013marker, chau2001review1, chau2001review2}. The a priori selection of single gait variables relies mostly on the experience and/or subjective opinion of the analyst, which may lead to a certain risk of investigator bias. Furthermore, single pre-selected variables might miss potentially meaningful information that are represented by -- or in combination with -- other (not selected) variables. In this context, it seems questionable if the multi-dimensional interactions between gait characteristics and gait disease or disease that impair gait can be entirely represented by a subjective selection of single time-discrete variables \cite{schollhorn2002identification, federolf2012holistic, schollhorn2004applications}. In response to these shortcomings, multivariate statistical analysis \cite{chau2001review1, chau2001review2, wolf2006automated} and machine learning techniques such as artificial neural networks (ANN)\cite{bishop1995neural} and support vector machines (SVM)\cite{boser1992training, cortes1995support, muller2001introduction, scholkopf2002learning} have been used to examine human locomotion based on time-continuous gait patterns \cite{schollhorn2004applications}. Significant advances in motion capture equipment and data analysis techniques have enabled a plethora of studies that have advanced our understanding about human gait. Due to extensive new datasets \cite{mckay20161000}, the application of machine learning techniques is becoming increasingly popular in the area of clinical biomechanics \cite{schollhorn2004applications, phinyomark2018analysis, figueiredo2018automatic} and provided new insights into the nature of human gait control. The application of ANNs and SVMs highlighted for example that gait patterns are unique to an individual person \cite{schollhorn2002identification, horst2017one}, exhibited natural changes within different time-scales \cite{horst2016daily, horst2017intra} and identified that emotional states \cite{janssen2008recognition} and grades of fatigue \cite{janssen2011diagnosing} can be differentiated from human gait patterns. Furthermore, gender and age-specific gait patterns could be differentiated \cite{eskofier2013marker, begg2005machine}. In the context of clinical gait analysis, several approaches based on machine learning have been published in recent years in order to support clinicians in identifying and categorizing specific gait patterns into clinically relevant groups \cite{chau2001review1, chau2001review2, schollhorn2004applications, figueiredo2018automatic}. Previous studies were able to differentiate gait patterns from healthy individuals and individuals with (neurological) disorders like Parkinson’s disease \cite{zeng2016parkinson}, cerebral palsy \cite{alaqtash2011automatic}, multiples scleroses \cite{alaqtash2011automatic} or traumatic brain injuries \cite{williams2015classification} and pathological gait conditions like lower-limb fractures \cite{figueiredo2018automatic} or acute anterior cruciate ligament injury \cite{christian2016computer}. Although machine learning techniques are solving very successfully a variety of classification tasks and provide new insights from complex physical, chemical, biological, or social systems, in most cases they go along with the disadvantage of acting as a black box, rarely providing information about what made them arrive at a particular decision \cite{baehrens2010explain,montavon2018methods}. This non-transparent operating and decision-making of most non-linear machine learning methods leads to the problem that their predictions are not straightforward understandable and interpretable. This black box manner can be problematic especially in applications of machine learning in medical diagnosis like gait analyses and so far strongly hamper their clinical acceptance \cite{wolf2006automated}. The lack of understanding and interpreting the decision process of machine learning techniques is a clear drawback and recently attracted attention in the field of machine learning \cite{baehrens2010explain,montavon2018methods,gevrey2003review,simonyan2013deep,zeiler2014visualizing, BachPLOS15, zintgraf2016new, ribeiro2016should, zhang2016top, selvaraju2017grad, fong2017interpretable, MonPR17}. In this context, the so called Layer-wise Relevance Propagation (LRP) technique has been proposed as general technique for explaining classifier's decisions by decomposition, i.e.\ by measuring the contribution of each input variable to the overall prediction \cite{BachPLOS15}. LRP has been successfully applied to a number of technical and scientific tasks such as image classification \cite{SamTNNLS17, LapAMFG17} and text document classification \cite{arras2017relevant}. Also, interpreting linear and non-linear models have helped to gain interesting insights in neuroscience \cite{haufe2014interpretation, StuJNM16}, bioinformatics \cite{zien2009feature,stegle2012using, vidovic2015svm2motif} and physics \cite{schutt2017quantum}. Due to benefits of machine learning methods in comparison to conventional approaches in gait analysis \cite{schollhorn2004applications, phinyomark2018analysis}, LRP appears highly promising to increase their transparency and therefore make them applicable and reliable for clinical diagnoses \cite{chau2001review1, chau2001review2, wolf2006automated}. In the context of personalised medicine, the aim of the present study was to examine individual gait patterns by: \begin{enumerate} \item demonstrating the uniqueness of gait patterns to the individual by using (deep) artificial neural networks for predicting identities based on gait; \item verifying that non-linear machine learning methods such as (deep) artificial neural networks use comprehensible prediction strategies and learn meaningful gait characteristics by using the Layer-Wise Relevance Propagation; and \item analysing the unique gait signature from an individual by highlighting which variables at what time windows of the gait cycle are used by the model to identify an individual. \end{enumerate} The presented approach investigates the suitability of understanding and interpreting the classification of gait patterns using state-of-the-art machine learning methods. This paper therefore presents a first step towards establishing a powerful tool that can be used as the basis for future application of machine learning in (biomechanical) gait analysis and thus enabling automatic classifications of (neurological) disorders and pathological gait conditions applicable in clinical diagnoses. \section*{Results} \begin{sidewaysfigure} \begin{center} \includegraphics[width=1.\textwidth]{Fig1.pdf} \caption{Overview of data acquisition and data analysis, showing the example of subject 6. \emph{I:} The biomechanical gait analysis compromised the recording of 20 times walking barefoot a distance of 10 m at a self-selected walking speed. Two force plates and ten infrared cameras recorded the three-dimensional full-body joint angles and ground reaction forces during a double step. \emph{II:} Lower-body joint angles in the sagittal plane (flexion-extension) (LBJAX) and ground reaction forces (GRF) compromising the fore-aft shear force (fore-aft), medial-lateral shear force (med-lat) and vertical force (vert) have been used as time-normalised and concatenated input vectors $\mathbf{x}$ for the prediction of subjects $y$ using deep artificial neural networks (DNN). Shaded areas for the LBJAX highlight the time where the respective (left or right) foot is in contact with the ground. \emph{III:} Decomposition of input relevance values using the Layer-Wise Relevance Propagation (LRP). Colour Spectrum for the visualisation of input relevance values of the model predictions. Throughout this manuscript, we use LRP to exclusively analyse the prediction for the true class of a sample. Thereby, black line segments are irrelevant to the model’s prediction. Red and hot colours identify input segments causing a prediction corresponding to the subject label, while blue and cold hues are features contradicting the subject label. For subject 6, the predicting model (CNN-A) achieves true positive rates (TP) of $100\%$ for LBJAX and $95.23\%$ for GRF.} \label{fig:overview} \end{center} \end{sidewaysfigure} The uniqueness of human walking to the individual was examined based on time-continuous kinematic (full-body joint angles) and kinetic (ground reaction forces) gait patterns (see Methods section for a description of the data). From a biomechanical gait analysis (Figure~\ref{fig:overview} \emph{I: Record gait data}), conducted on 57 healthy subjects, lower-body joint angles (LBJA) and ground reaction forces (GRF) have been measured as input vectors $\mathbf{x}$ for the prediction of subjects $y$ using deep artificial neural networks (DNN) (Figure \ref{fig:overview} \emph{II: Predict with DNN}). LRP decomposes the prediction $f(\mathbf{x})$ of a learned function $f$ given an input sample $\mathbf{x}$ into into time-resolved input relevance values $R_i$ for each time-discrete input $x_i$, which enables to explain the prediction of DNNs as partial contributions from individual input components (Figure \ref{fig:overview} \emph{III: Explain prediction using LRP}). LRP indicates based on which information a model predicts and thereby enables to interpret the input relevance values and their dynamics as representation for a certain class (individual). Hence, the input relevance values point out which gait characteristics were most relevant for the identification of a certain individual. In the following, input relevance values are visualised by colour coding, using a diverging and symmetric high contrast colour scheme as shown in Figure \ref{fig:overview} (\emph{III: Explain prediction using LRP}). Here, input elements neutral to the predictor ($R_i \approx 0$) will be shown in black colour, while warm and hot hues indicate input components supporting the prediction ( $R_i \gg 0 $ ) of the analysed class and cold hues identify contradictory inputs ( $R_i \ll 0 $ ). As an example, Figure \ref{fig:overview} illustrates the unique gait signature from subject 6 by decomposing the input relevance values using LRP (see Figure \ref{fig:cnna-subj} and Supplementary Figures SF1 to SF4 for additional subject specific examples). From the gait feature relevance, we can observe that the extension of the ankle during the terminal stance phase of the right and left leg and the flexion of the knee and hip during the initial contact of the right leg is unique to subject 6. The kinetic data supports this finding, showing the highest input relevance values for the prediction of subject 6 for the vertical GRF during the terminal time window of the right and left stance phase. On these grounds, LRP enables to discover the trial-individual gait signature from a certain individual. This individual signature can serve as indicator in clinical diagnoses and starting point for therapeutic interventions. In our example (Figure \ref{fig:overview}), the terminal stance phase is unique to subject 6. While this uniqueness might be interpreted as a reflection of a highly coordinated individual system, it could also indicate first relevant information about (forthcoming) complaints or impairments. Clinicians and researchers are therefore capable to pick up the unique peculiarity during the terminal stance phase for an individualisation of therapeutic interventions, e.g.\ by changing the strength of the responsible muscles for the extension of the ankle joint or reducing forces during the terminal stance phase during walking by shoes or insoles. As discussed earlier, linear classification models have often been used for the classification of gait patterns \cite{schollhorn2004applications, phinyomark2018analysis, figueiredo2018automatic}. However, other domains in machine learning have shown that highly non-linear DNNs are capable to outperform linear and kernel based methods \cite{lecun2015deep, lecun2012efficient, krizhevsky2012imagenet, szegedy2015going, szegedy2017inception, yoon2014convolutional}. In this study, we therefore investigate the applicability of state-of-the-art non-linear machine learning models such as DNNs for gait analysis and additionally compare different linear and non-linear machine learning methods in terms of prediction accuracy, model robustness and decomposition of input relevance values using the LRP technique (see Methods for detailed description). \subsection*{Prediction Accuracy and Model Robustness} The mean prediction accuracy for the subject-classification (on an out of sample set also denoted as test set) are summarised in Table \ref{tab:performance} (and Supplementary Table ST1). The most striking result to emerge from this table is that most of the tested models were able to predict the correct class (subject) with a high accuracy above 95.4\% (ground reaction forces), 99.9\% (full-body joint angles) and 99.9\% (lower-body joint angles). \begin{table} \begin{center} \begin{tabular}{r|rrrrr} \textbf{Model} & \textbf{Ground} & \textbf{Joint Angles} & \textbf{Joint Angles} & \textbf{Joint Angles} & \textbf{Joint Angles} \\ & \textbf{Reaction} & \textbf{Full-Body} & \textbf{Full-Body} & \textbf{Lower-Body} & \textbf{Lower-Body} \\ & \textbf{Forces [\%]} & \textbf{[\%]} & \textbf{(flex.-ext.) [\%]} & \textbf{[\%]} & \textbf{(flex.-ext.) [\%]} \\ \hline Linear (SGD) & 95.4 (1.7) & \textbf{100.0 (0.0)} & 96.3 (1.8) & \textbf{100.0 (0.0)} & 91.5 (2.2) \\ Linear (SVM) & \textbf{100.0 (0.0)} & \textbf{100.0 (0.0)} & \textbf{99.7 (0.4)} & \textbf{100.0 (0.0)} & \textbf{99.8 (0.6)} \\ MLP (3, 64) & 88.3 (3.7) & 99.9 (0.3) & 84.3 (3.3) & 99.9 (0.3) & 68.5 (8.3) \\ MLP (3, 256) & 96.6 (0.8) & \textbf{100.0 (0.0)} & 95.6 (2.6) & \textbf{100.0 (0.0)} & 89.4 (4.3) \\ MLP (3, 1024) & 98.8 (1.3) & \textbf{100.0 (0.0)} & 97.8 (1.0) & \textbf{100.0 (0.0)} & 96.5 (1.2) \\ CNN-A & 99.1 (0.8) & \textbf{100.0 (0.0)} & 95.6 (1.7) & 99.9 (0.3) & 92.0 (3.9) \\ CNN-C3 & 99.2 (0.6) & \textbf{100.0 (0.0)} & 97.7 (1.5) & \textbf{100.0 (0.0)} & 97.0 (1.3) \\ \end{tabular} \end{center} \caption{The prediction accuracy of the subject-classification task, reported as pairs of $mean~(standard~deviation)$ in percent.} \label{tab:performance} \end{table} The results in Table \ref{tab:performance} (and Supplementary Table ST1) are quite revealing in several aspects. First, the highest prediction accuracy can be observed throughout the kinetic and kinematic variables for the linear support vector machines (Linear (SVM)). Second, the linear one-layer fully-connected neural network using Stochastic Gradient Descent (Linear (SGD)), fully-connected neural network (multi layer perceptron (MLP)) using higher number of neurons (MLP (3, 256) and MLP (3, 1024)) and deep (convolutional) neural network architectures (CNN-A and CNN-C3) result in similar and throughout high prediction accuracies, while the prediction accuracy of fully-connected networks using a lower number of neurons (MLP (3, 64)) is decreased. Third, surprisingly, even the linear neural network model architecture (Linear (SGD)) was able to predict the correct individual by quite high mean accuracies of 95.4\% (ground reaction forces), 100.0\% (full-body joint angles) or 100.0\% (lower-body joint angles). While the prediction accuracy of the linear neural network model (Linear (SGD)) is comparable to the fully-connected and convolutional neural network architectures, the robustness of their predictions against noise on the testing data exhibits considerable differences. As an example, Figure \ref{fig:perturbations} shows the progression of the mean prediction accuracy of the subject-classification for the stepwise increase of random noise perturbation on the test data. That is, for a given input, we compute a random order by which the components of said input are perturbed, e.g.\ with the addition of random gaussian noise to the current input component. After each perturbation step (and executing the n-th perturbation for all test samples simultaneously), the prediction performance of a model is re-evaluated. If a model is sensitive to random noise in the data it will react strongly to the ongoing perturbations. Figure \ref{fig:perturbations} shows for each model the average test set prediction accuracy over 50 consecutive perturbation steps, averaged over 10 repetitions of the experiment. It is apparent that the prediction accuracy of the Linear (SGD) model decreases rapidly after only a few perturbation steps, indicating low robustness and reliability of the model. Variability is an inherent feature of human movements that occurs not only between but also within individuals. Therefore robust and reliable model predictions are a mandatory prerequisite for the development of automatic classification tools in clinical gait analysis. \begin{figure} \begin{center} \includegraphics[width=\textwidth]{Fig2.jpg} \caption{ \emph{Left:} Mean Ground Reaction Force as a line plot, colour coded via input relevance values for the actual class for subject 21, 28, 39, 42, 55 and 57 using convolutional neural network CNN-A. The highest input relevance values per body side are highlighted by a red circle. \emph{Right:} Mean Lower-Body Joint Angles in the sagittal plane (flexion-extension) as line plot, colour coded via input relevance values for the actual class for subject 6, 23, 32, 37, 47 and 55 using convolutional neural network CNN-A. The highest input relevance values per body side are highlighted by a red circle. Shaded areas for the LBJAX highlight the time where the respective (left or right) foot is in contact with the ground.} \label{fig:cnna-subj} \end{center} \end{figure} Table \ref{tab:perturbations} (and Supplementary Table ST2) summarises the robustness of the model predictions and presents the mean area over perturbation curve (AOPC)\cite{SamTNNLS17} of the stepwise increase of random noise perturbation over multiple repetitions of the perturbation runs on the test data. High AOPC values computed with above strategy of random perturbations corresponds to high sensitivity to noise. From the results presented in Table \ref{tab:perturbations} (and Supplementary Table ST2) , it is apparent that the stepwise increase of noise on the test data lead to an abrupt decrease in the prediction accuracy of the linear neural network. Furthermore, closer inspection shows that fully-connected models based on a higher number of neurons are more robust against noise perturbations on the test data than models based on lower numbers of neurons. Even though the prediction problem at hand seems simple enough such that linear predictors perform excellently (i.e.\ the relationship between the input variables and the prediction target is linearly separable) and the performance-wise gain from non-linear and networks is minimal, the deeper architectures bring to the table considerably more robust predictors, which is especially valuable in application settings like gait analysis, where variability is an important factor to consider. \begin{table} \begin{center} \begin{tabular}{r|rrrrrrr} \textbf{Model /}& \textbf{Gaussian} & \textbf{Gaussian} & \textbf{Gaussian} & \textbf{Salt$^-$} & \textbf{Pepper} & \textbf{Salt$^+$} & \textbf{Shot} \\ \textbf{Noise }& \textbf{Random} & \textbf{Random} & \textbf{Random} & \textbf{Random} & \textbf{Random} & \textbf{Random} & \textbf{Random} \\ & \textbf{$\sigma=0.5$} & \textbf{$\sigma=1.0$} & \textbf{$\sigma=2.0$} & & \\ \hline Linear (SGD) & 40.5 (6.0) & 45.6 (3.0) & 47.6 (1.8) & 46.1 (2.7) & 37.1 (7.0) & 46.4 (3.1) & 46.5 (2.9) \\ Linear (SVM) & \textbf{4.0 (3.9)} & 18.6 (7.0) & 35.4 (4.7) & 31.3 (7.7) & \textbf{2.5 (2.4)} & \textbf{32.8 (8.7)} & \textbf{32.4 (8.6)} \\ MLP (3, 64) & 16.2 (14.0) & 27.6 (12.6) & 37.8 (9.0) & 43.5 (7.1) & 14.4 (13.6) & 43.3 (7.4) & 43.3 (7.4) \\ MLP (3, 256) & 8.9 (9.7) & 20.8 (10.9) & 34.9 (8.4) & 41.7 (6.8) & 7.7 (9.5) & 41.2 (7.4) & 41.1 (7.5) \\ MLP (3, 1024) & 5.4 (7.0) & \textbf{16.7 (9.4)} & \textbf{32.4 (7.8)} & 40.0 (6.6) & 4.3 (6.1) & 39.4 (7.2) & 39.4 (7.2) \\ CNN-A & 6.1 (6.8) & 18.2 (9.4) & 33.1 (8.0) & 36.9 (6.6) & 8.8 (8.5) & 37.4 (7.5) & 37.4 (7.6) \\ CNN-C3 & 12.2 (8.6) & 27.5 (9.4) & 38.0 (7.0) & \textbf{31.0 (8.5)} & 11.3 (8.6) & 37.9 (8.2) & 38.1 (8.1) \\ \end{tabular} \end{center} \caption{The area over perturbation curve of the subject-classification of ground reaction forces for different noise perturbation runs (AOPC)\cite{SamTNNLS17}. Values are reported as pairs of $mean~(standard~deviation)$. Smaller values correspond to higher robustness.} \label{tab:perturbations} \end{table} \subsection*{Interpreting and Understanding Model Predictions using Layer-Wise Relevance Propagation} As an example Figure \ref{fig:cnna-subj} shows relevance attributions for predictions based on ground reaction force (Figure \ref{fig:cnna-subj} (left)) and the lower-body joint angles (Figure \ref{fig:cnna-subj} (right)) of a certain individual based on his or her gait patterns. \begin{figure} \begin{center} \includegraphics[width=0.6\textwidth]{Fig3.jpg} \caption{Progression of the mean prediction accuracy of the subject-classification of ground reaction forces for stepwise random perturbation using gaussian noise with $\sigma=1$.} \label{fig:perturbations} \end{center} \end{figure} The input relevance contributions point out which gait characteristics were most relevant for the identification of an individual and thereby reveal the unique gait signature of a certain subject. The comparison of input relevance values from different subjects indicates that individuals were classified by both, different gait characteristics and differing magnitudes or shapes of the same gait characteristic. For example, the highest input relevance values for the prediction of subject 21 (Figure \ref{fig:cnna-subj} (left)) can be observed in the medial/lateral ground reaction force at approximately 10 \% of the gait stride and subject 28 (Figure \ref{fig:cnna-subj} (left)) in the vertical ground reaction force at approximately 90 \% of the gait stride. While the highest input relevance values for the prediction of subject 55 (Figure \ref{fig:cnna-subj} (left)) and subject 57 (Figure \ref{fig:cnna-subj} (left)) can be both observed in the vertical ground reaction force at approximately 10 \% of the stance phase. It is further interesting that among all predicted LBJAX curves shown in Figure \ref{fig:cnna-subj} (right), subject 37 is the only one that is identified dominantly by gait characteristics during the swing phase (and not the stance phase). The model has associated the pronounced flexion of the right (left) ankle joint during the swing phase unique to subject 37. In the vast majority of cases, the input relevance values for a certain class (individual) are comparable between the different model architectures (Figure \ref{fig:grf} (left)), i.e.\ all models pick up on similar features, which are characteristic to the individual subject in general. It is rather apparent from the results that most artificial neural networks and the linear SVM are using a number of different gait characteristics for their predictions, albeit the vast majority of the inputs seems to be irrelevant to the model’s decision (see Figure \ref{fig:overview}; the tight interval ($R \approx 0$) projected onto black), which are largely based on individual details in a subject’s movement patterns. This explanatory relevance feedback indicates that (non-linear) machine learning methods such as (deep) artificial neural networks are not arbitrarily picking up single randomly distributed input values, but rather learn certain dynamically meaningful features that can be related to functional gait characteristics and thus making them applicable in clinical gait analysis. \begin{figure} \begin{center} \includegraphics[width=\textwidth]{Fig4.jpg} \caption{ \emph{Left:} Mean Ground Reaction Force as line plot, colour coded via input relevance for the actual class of different models using artificial neural networks and the linear SVM model from subject 57. The highest input relevance values per body side are highlighted by a red circle. \emph{Right:} Input relevance as colour coded line plots for the predicted class of different models using artificial neural networks and linear models of ground reaction force of the 20 gait trials from subject 28.} \label{fig:grf} \end{center} \end{figure} When comparing input relevance values from different architectures of artificial neural networks and the SVM strikingly all model architectures (except the CNN-C3) show that not a single gait characteristic (certain variable at a certain time window of the gait cycle) is relevant for the identification of a certain individual, but rather complex combinations thereof. Even more interesting is the observation that input relevance value attributions appear to be similar between right and the left body side variables (as an example take Figure \ref{fig:grf} (left): Linear (SVM), MLP (3, 1024) and CNN-A). This indicates the importance of symmetries/asymmetries between left and right body side variables for the examination of human gait. Note however that the models all learned without any information about the physiological meaning of the used variables. While the input relevance attributions are throughout comparable for all evaluated architectures -- i.e.\ there is, given a subject, a non-empty set of features recognized as characteristic features to the individual by all models -- some models have learned to ground their predictions on supplementary gait characteristics (e.g.\ Figure \ref{fig:grf} (left): CNN-C3 vs CNN-A). We can further observe that the use of multiple gait characteristics for prediction can be associated with a model’s robustness to random perturbations of the input. The observed robustness of the evaluated models is also reflected by the reliability of the attributed input relevance values: Over the relevance values of each input component and subject (i.e.\ 20 relevance values each), the coefficient of variation\cite{winter1984kinematic} was computed in order to prove their consistency over several trials and cross validation splits. The coefficient of variation represents the (root mean square) normalized band of standard deviation around the relevance signal of an input variable, where low values correspond to high reliability/stability of relevance attributions to a observed feature between samples and data splits, and thus to the model's ability to generalize. A high coefficient of variation indicates that a model overfits on its respective training split population. As an example, Figure \ref{fig:grf} (right) shows the input relevance values for the actual class prediction for the ground reaction forces. Qualitatively, the highest deviations of input relevance values between trials appeared in the prediction of the linear neural network model (Linear (SGD)), which also is most sensitive to even minute noise added to the test data (Figure \ref{fig:perturbations} and Table \ref{tab:perturbations}). It becomes apparent from Figure~\ref{fig:grf}~(right) that the variance of input relevance is decreasing in fully-connected neural network architectures composed of increasing numbers of neurons. However, the lowest variance of the input relevance values can be observed in the relevance decomposition of the predictions from the Linear (SVM) and convolutional neural network architectures, which we attribute for the former to the complexity of the regularised training regime and complexity of the model itself for the latter. Table \ref{tab:coefficientofvariation} (Supplementary Table ST3) summarises the mean coefficient of variation for the input relevance values for the subject-classification over all subjects, expressing that decreasing variance(increasing reliability) goes along with increasing model complexity, and also model robustness when compared to Figure \ref{fig:perturbations} and Table \ref{tab:perturbations}. Hence, the lowest reliability is present for the Linear (SGD) model, while reliability is increasing in fully-connected model architectures composed of increasing numbers of layers and neurons and discloses the highest reliability for the convolutional neural networks (CNN-A and CNN-C3). Interestingly, the reliability of the input relevance values from linear support vector machines (Linear (SVM)) are as well on a high level and comparable to convolutional neural networks. \begin{table} \begin{center} \begin{tabular}{r|rrrrr} \textbf{Model} & \textbf{Ground} & \textbf{Joint Angles} & \textbf{Joint Angles} & \textbf{Joint Angles} & \textbf{Joint Angles} \\ & \textbf{Reaction} & \textbf{Full-Body} & \textbf{Full-Body} & \textbf{Lower-Body} & \textbf{Lower-Body} \\ & \textbf{Forces} & & \textbf{(flex.-ext.)} & & \textbf{(flex.-ext.)} \\ \hline Linear (SGD) & 4.31 (0.25) & 4.27 (0.08) & 3.93 (0.12) & 4.16 (0.10) & 3.86 (0.15) \\ Linear (SVM) & 0.31 (0.08) & 0.56 (0.10) & \textbf{0.31 (0.07)} & \textbf{0.48 (0.09)} & \textbf{0.26 (0.05)} \\ MLP (3, 64) & 1.31 (0.34) & 2.73 (0.15) & 1.58 (0.17) & 2.37 (0.16) & 1.41 (0.23) \\ MLP (3, 256) & 0.84 (0.18) & 2.21 (0.13) & 1.05 (0.10) & 1.86 (0.13) & 0.85 (0.12) \\ MLP (3, 1024) & 0.63 (0.12) & 1.85 (0.10) & 0.77 (0.08) & 1.50 (0.10) & 0.61 (0.09) \\ CNN-A & \textbf{0.30 (0.08)} & 0.56 (0.09) & 0.35 (0.06) & 0.49 (0.08) & 0.32 (0.05) \\ CNN-C3 & 0.35 (0.08) & \textbf{0.50 (0.08)} & 0.43 (0.08) & \textbf{0.48 (0.08)} & 0.44 (0.08) \\ \end{tabular} \end{center} \caption{The coefficient of variation of the input relevance values of the subject-classification, reported in pairs of $mean~(standard~deviation)$ over all subjects.} \label{tab:coefficientofvariation} \end{table} \section*{Discussion} The present results verified the uniqueness of characteristics for individual gait patterns based on kinematic and kinetic variables. By decomposing the prediction of machine learning methods such as (deep) artificial neural networks back to the input variables (time-continuous ground reaction forces and full-body joint angles), the LRP technique demonstrated which gait variables were most relevant for the characterisation of gait patterns from a certain individual. By measuring the contribution of each input variable to the prediction of (deep) artificial neural networks, the present paper describes a procedure that enables to understand and interpret the predictions of non-linear machine learning methods in (biomechanical) gait analysis. LRP thereby outlines the first general framework that facilitates to overcome the inherent black box problem of non-linear machine learning methods and makes them applicable in clinical gait analysis. In the context of personalised medicine, the determination of characteristics that are specific for gait patterns of a certain individual facilitates to support clinicians and researchers in the individualisation of their analyses, diagnoses and interventions. The individual nature of human gait patterns was quantified using different linear and non-linear machine learning methods. The present results support previous studies on the individuality of human movements \cite{schollhorn2002identification, horst2017one, janssen2008recognition, janssen2011diagnosing} and provide evidence for gait characteristics that are unique to an individual and can be clearly differentiated from gait patterns of other individuals. Most of the artificial neural network architectures classified gait patterns almost error-free to the corresponding individual and achieved very high prediction accuracies that are suitable for clinical applications. However, advantages for more sophisticated model architectures (like fully-connected model using a higher numbers of neurons or deep convolutional neural networks) can be observed in higher prediction accuracies (Table \ref{tab:performance} and Supplementary Table ST1) and even more significant in the higher robustness of the model predictions against noise perturbations on the test data (Figure \ref{fig:perturbations}, Table \ref{tab:perturbations} and Supplementary Table ST2). Because variability within individuals \cite{horst2016daily, horst2017intra} as well as variability due to differences between individuals \cite{schollhorn2002identification, horst2017one}, genders \cite{begg2005machine} and ages \cite{eskofier2013marker} is an inherent feature of human motor control, prediction accuracy and model robustness are both essential for the development of reliable clinical applications using machine learning. Consequently, the present results suggest high potential of state-of-the-art non-linear methods such as DNNs compared to linear methods. One of the issues that emerges from the evidence that gait patterns are unique to an individual, is the demand to evaluate clinical approaches for diagnoses and therapy that consider individual needs\cite{schollhorn2002identification, horst2017one}. However, previous studies could not address how an individualisation of diagnoses and therapy could be obtained. By measuring the contribution of each input variable to the prediction of machine learning methods, the LRP method enables one for the first time to describe qualitatively why a certain individual could be identified based on his/her gait patterns. The LRP technique provides the possibility to comprehend what a model has learned and to interpret the input relevance values as representation for a certain class (individual). In the context of personalised gait analysis (medicine) that means, the decomposition of input relevance values and their dynamics describe what input variables are most relevant for the identification of a certain individual and thereby indicate which input variables are the most characteristic ones for the gait patterns of a certain individual (Figure \ref{fig:overview}). On these grounds, the input relevance values enable clinicians and researchers to determine the unique gait signature of a certain individual based on single trials and adjust their analyses, diagnoses and interventions to the specific needs of this individual (Figure~\ref{fig:overview}, Figure~\ref{fig:cnna-subj}). In addition, explaining the model predictions provide interesting insights into the analysis of gait patterns. The input relevance values highlight that in most cases not a single gait characteristic (specific value or shape of a certain variable at a certain time of the gait cycle) is relevant for the identification of a certain individual. It is rather apparent that most artificial neural networks architectures look for the shape of different variables as well as their interaction at the same time window or at different time windows of the gait cycle. Similar results have been found on photographic image data \cite{BachPLOS15,LapAMFG17}. Interestingly, the prediction of most artificial neural network architectures (except CNN-C3) trace to input relevance values that are similar between right and left body side variables at the same time. That means a certain variable at a certain time window of the gait cycle of the right and the left body side is relevant for the prediction of the models (Figure \ref{fig:grf} (left)), indicating importance of symmetries and asymmetries between right and left body movements for the identification of individuals and probably the examination of human gait in general. The input relevance values support that machine learning approaches like artificial neural networks are able to consider several variables at various time points of the gait cycle for their predictions. In comparison to most conventional approaches of gait analysis that are based on single pre-selected variables, machine learning approaches seem to be promising to represent the multi-dimensional associations of human locomotion and their connections to functional and neurological disease \cite{schollhorn2002identification, federolf2012holistic,schollhorn2004applications}. The present results demonstrate in the vast majority of cases that the input relevance values are similar between different model architectures (Figure \ref{fig:grf}). That means all models pick up similar features for the classification of gait patterns, which are characteristic to the individual subject in general. However, the LRP technique enables to identify the strategy of a certain model to classify a class (individual gait patterns) and to compare strategies between different model architectures \cite{LapAMFG17}. For an implementation of machine learning in clinical diagnoses and therapeutic interventions, for example in terms of an automatic classification of gait disorders or (neurological) disease \cite{figueiredo2018automatic, zeng2016parkinson, alaqtash2011automatic}, the understanding about their decisions and decision-making seems to be inevitable. Since the lack of transparency has so far been a major drawback of preceding applications of machine learning, e.g.\ in medical applications (like gait analysis), further research on explaining, understanding and interpreting machine learning predictions should get attention. Here, the decomposition of input variable relevance values using the LRP was consistent over multiple test trials and cross-validation splits. Taken together, the results demonstrate the suitability of the proposed method for the explanation of machine learning predictions in clinical (biomechanical) gait analysis. However, higher reliability of input relevance values between test trials and cross-validation splits indicate advantages for deep (convolutional) neural networks architectures. These findings are in agreement with those observed in earlier studies on text \cite{arras2017relevant} or image \cite{LapCVPR16} classification that indicated more robust and traceable class representations in deep (convolutional) neural networks. In conclusion, the present findings underline that methods enabling to understand and interpret the predictions of machine learning, like the LRP, are highly promising for the application and implementation of machine learning in gait analysis. Due to the above discussed advantages of non-linear machine learning methods such as DNNs for the analysis of human gait \cite{chau2001review1, chau2001review2, schollhorn2004applications, phinyomark2018analysis}, the understanding and interpreting of machine learning predictions is essential in order to overcome one of their major drawbacks (the lack of transparency) \cite{chau2001review1, chau2001review2, wolf2006automated}. Using the testbed of uniqueness of individual gait patterns, the present study proposed a general framework for the understanding and interpretation of non-linear machine learning methods in gait analysis thus providing a solid basis for future studies in biomechanical analysis and clinical diagnosis. \section*{Methods} \label{sec:methods} \subsection*{Subjects and ethics statement} Fifty-seven physically active subjects ($29$ female, $28$ male; $23.1 \pm 2.7$ years; $1.74 \pm 0.10$ m; $67.9 \pm 11.3$ kg) without gait pathology and free of lower extremity injuries participated in the study. The study was carried out according to the Declaration of Helsinki at the Johannes Gutenberg-University in Mainz (Germany). All subjects were informed about the experimental protocol and provided their informed written consent to participate in the study. Subjects appearing in the figures provided informed written consent to the publication of identifying images and videos in an online open-access publication. The approval from the ethical committee of the medical association Rhineland-Palatinate in Mainz (Germany) was received. \subsection*{Experimental protocol and data acquisition} The subjects performed 20 gait trials in a single assessment session, while they did not undergo any intervention. For each trial upper- and lower-body joint angles as well as ground reaction forces were measured, while the subjects walked on a 10 m path. The subjects were instructed to walk barefoot at a self-selected speed. Kinematic data were recorded using a full-body marker set consisting of 62 retro reflective markers placed on anatomical landmarks (Figure \ref{fig:markerplacement}). Ten Oqus 310 infrared cameras (Qualisys AB, Sweden) captured the three-dimensional marker trajectories at a sampling frequency of 250 Hz. \begin{figure} \begin{center} \includegraphics[width=0.5\textwidth]{Fig5.jpg} \caption{Full body marker set in (A) anterior (B) right lateral (C) posterior view. The markers were placed at os frontale glabella, 7th cervical vertebrae, sternum jugular notch, sacrum (mid-point between left and right posterior superior iliac spine) and bilaterally at greater wing of sphenoid bone, acromion, scapula inferior angle, humerus lateral epicondyle, humerus medial epicondyle, forearm, radius styloid process, ulna styloid process, head of 3rd metacarpal, iliac crest tubercle, femur greater trochanter, femur lateral epicondyle, femur medial epicondyle, fibula apex of lateral malleolus, tibia apex of medial malleolus, posterior surface of calcaneus, head of 1st metatarsus, head of 5th metatarsus and clusters with four markers each at the thigh and shank and clusters of three markers each at the humerus.} \label{fig:markerplacement} \end{center} \end{figure} The three-dimensional ground reaction forces were recorded by two Kistler force plates (Type 9287CA) (Kistler, Switzerland) at a frequency of 1000 Hz. The recording was managed in time-synchronization by the Qualisys Track Manager 2.7 (Qualisys AB, Sweden). Two experienced assessors attached the markers and conducted the analysis. Every subject was analysed by the same assessor only. The laboratory environment was kept constant during the investigation. Before the data acquisition, each subject performed 20 test trials to get accustomed to the experimental setup and to assign a starting point for a walk over the force plates. This procedure is described to minimize the impact of targeting on the force plates on the observed gait variables \cite{sanderson1993effects,wearing2000effect}. Additionally, the participants were instructed to watch a neutral symbol (smiley) on the opposing wall of the laboratory to direct their attention away from targeting on the force plates and ensure a natural walk with an upright body position. \subsection*{Data processing} The gait analysis was conducted for one gait stride per trial. The stride was defined from right foot heel strike to left foot toe off and was determined using a vertical ground reaction force threshold of 10 N. The three-dimensional marker trajectories and ground reaction forces were filtered using a second order Butterworth bidirectional low-pass filter at a cut off frequency of 12 Hz and 50 Hz, respectively. The ground reaction force data were normalized to the body weight. The computation of the upper- and lower-body joint angles was conducted by Visual3D Standard v4.86.0 (C-Motion, USA) for elbow, shoulder, spine, hip, knee and ankle in sagittal, transversal and coronal plane. Further data processing was executed by a self-written script within the software Matlab 2016a (MathWorks, USA). Each variable time course was normalized to 101 data points, z-transformed and scaled to a range of -1 to 1\cite{hsu2003practical}. The z-transformation was executed for kinematic variables for each trial separately and for kinetic variables for all trials. The scaling was carried out in order to prevent numerical difficulties during the calculation of the artificial neural networks \cite{hsu2003practical} and to ensure an equal contribution of all variables to the classification rates and thereby avoid that variables in greater numeric ranges dominate those in smaller numeric ranges\cite{hsu2003practical}. Scaling is a common procedure for data processing in advance for the classification of gait data\cite{schollhorn2002identification,figueiredo2018automatic}. \subsection*{Data Analysis} The data analysis was conducted within the software frameworks of Matlab 2016a (MathWorks, USA) and Python 2.7 (Python Software Foundation, USA). The ability to distinguish gait patterns of one subject from gait patterns of other subjects was investigated in a multi-class classification (subject-classification) using the data from 57 subjects. The classification of gait patterns, based on time-continuous kinetic and kinematic data, was carried out by supervised machine learning models using support vector machines (SVM)\cite{boser1992training,cortes1995support,muller2001introduction,scholkopf2002learning} and artificial neural networks (ANN)\cite{wolf2006automated,lecun2015deep,lecun2012efficient}. While fully-connected ANNs such as multi layer perceptions (MLP) and SVM represent established models for the classification of gait patterns based on joined input vectors of time-continuous kinematic and kinetic data\cite{schollhorn2004applications}, convolutional (deep) artificial neural networks (DNN) have not yet been applied for the biomechanical analysis of human movements. Because DNNs showed superior prediction accuracies in domains like image\cite{krizhevsky2012imagenet,szegedy2015going,szegedy2017inception} or speech recognition\cite{yoon2014convolutional}, they seem to be promising for the given classification of human gait patterns. In the present paper, an SVM and different architectures of fully-connected and convolutional artificial neural networks were compared in terms of prediction accuracy, model robustness to noise on the test data and decomposition of input relevance values. As a simple baseline, two linear classification models were implemented. A one-layer fully-connected neural network (Linear (SGD)) and a SVM using a linear kernel function (Linear (SVM)). Among the considered fully-connected artificial neural network architectures were all combinations $L \times H$ with $L \in [2,3]$ describing the number of layers and $H \in [2^6,\dots,2^{10}]$ describing the number of neurons per hidden layer. For the convolutional artificial neural network architectures, the number of convolutional layers is $C \in [1,2,3]$ with the number of hidden neurons depending on the number of channels in the data as well as the stride and shape of the learned convolutional filters. All convolutional neural network architectures are topped off with one linear layer, connecting all neurons of the highest convolutional layer to the number of classes of the prediction problem. Major architectural differences between the evaluated convolutional neural network architectures were the sizes of the input layer filters ( $3 \times 3$ and $6 \times 6$ as well as $C \times 3$ , $C \times 6$ and $C \times C$ ) spanning different amounts of neighbouring channels and time windows in the input samples. All artificial neural networks using hidden layers (i.e. all architectures except the linear classifier Linear (SGD)) have ReLU-nonlinearities after each linear / convolutional layer as activation functions for the hidden neurons and a SoftMax activation function for the output layer. Both linear and the fully-connected classifiers receive as input the channel~$\times$~time samples as row-concatenated channel~$\cdot$~time dimensional vectors. The convolutional models directly operate on the channel~$\times$~time shaped samples. For a detailed description of all evaluated model architectures, see the Supplement (Supplementary Tables ST4-ST9). With the exception of the linear support vector machines predictor, all models have been trained as n-way classifiers using Stochastic Gradient Descent (SGD) Optimization\cite{lecun2012efficient} for up to $3\cdot10^4$ iterations of mini batches of 5 randomly selected training samples and an initial learning rate of $5e^{-3}$. The learning rate is gradually lowered to $1e^{-3}$ and then $5e^{-4}$ after every $10^4$ training iterations. Model weights are initialized with random values drawn from normal distributions with $\mu=0$ and $\sigma=m^{-\frac{1}{2}}$, where $m$ is the number of inputs to each output neuron of the layer\cite{lecun2012efficient}. The linear support vector machine model has been using regularized quadratic optimization. For SVM, the multi-class linear support vector classifier of the scikit learn Toolbox for python~\cite{pedregosa2011scikit} was used with a regularisation parameter $C = 0.1$. Prediction accuracies were reported over a ten-fold cross validation configuration, where eight parts of the data are used for training, one part is used as a validation set and the remaining part is reserved for testing. With on average 912 samples per split being reserved for training, a (neural network) model passes the training set up to 164 (= 30000 iterations $\cdot$ 5 samples per batch / 912 training samples on average) times and each training stage tied to a given learning rate may be terminated prematurely if the model performance has converged on the validation hold out set to avoid overfitting on the training data. For subject-classification, the 20 samples per subject are uniformly distributed across all data partitions at random. \subsection*{Layer-wise Relevance Propagation} One of the main reasons for the wide-spread use of linear models in the (meta) sciences is the inherent transparency of the prediction function. Given a set of learned model parameters $\lbrace \mathbf{w}, \b \rbrace$ where $\mathbf{w}$ is a weight vector matching the dimensionality of the input data and a bias term $\b$, the (multi-class) prediction function for an arbitrary input $\mathbf{x}$ evaluates for class $c$ as \begin{align} f_c(\mathbf{x})~=~\mathbf{w}^T\mathbf{x}~+~b_c~=~\sum_i~w_{ic}x_i~+~b_c~. \end{align} It is apparent, that component $i$ of the given input $\mathbf{x}$ contributes to the evaluation of $f_c$ together with the learned parameters as the quantity $w_{ic}x_i$. Each decision made by a linear model is therefore transparent, while complex non-linear models are generally considered black box classifiers. A technique called Layer-Wise Relevance Propagation (LRP)\cite{BachPLOS15} has generalized the explanation of linear models for non-linear models such as deep (convolutional) artificial neural networks and arbitrary pipelines of pre-processing steps and nonlinear predictions. As a principled and general approach, LRP decomposes the output of a given decision function $f_c$ for an input $\mathbf{x}$ and attributes ``relevance scores'' $R_i$ to all components $i$ of $\mathbf{x}$, such that $f_c(\mathbf{x}) = \sum_i R_i$. Similarly to how the prediction of a linear model can be ``explained'' LRP starts at the model output by selecting a class output $c$ of interest, initiating $f_c(\mathbf{x}) = R_j$ (and selecting 0 for all other model outputs) as the initial output neuron relevance value. Note that for two-class problems, there is often one shared model output, with the predicted class being determined by the sign of the prediction. Here, $f(\mathbf{x})=R_j$ initially. The method can best be described by considering a single output neuron $j$ anywhere within the model. That neuron receives a quantity of relevance $R_j$ from upper layer neurons (or is initiated with that value in case of a model output neuron, and redistributes that quantity to its immediate input neurons $i$ , in proportion to the contribution of the inputs $i$ to the activation of $j$ in the forward pass: \begin{align} R_{i \leftarrow j} = \frac{z_{ij}}{z_j}R_j~. \label{eq:lrpdecomp} \end{align} Here, $z_{ij}$ is a quantity measuring the contribution of the input neuron $i$ to the output neuron $j$ and $z_j$ is the aggregation thereof. This decomposition approach follows the semantic that the output neuron $j$ holds a certain amount of relevance, due to its activation in the forward pass and its influence to consecutive layers and finally the model output. This relevance is then distributed across the neuron’s inputs in proportion of each input’s contribution to the activation of neuron: If a neuron $i$ contributes as $z_{ij}$ towards the overall trend $z_j$ , it shall receive a positively weighted fraction of $R_j$. If fires against the overall trend, e.g.\ the amount or relevance attributed to it will be weighted negatively. Usually, the layers of an ANN model implement an affine transformation function $x_j = \left(\sum_i x_iw_{ij} \right) +~b_j$ or a (component-wise) non-linearity $x_j = \sigma(x_i)$. In the former case, we then have $z_{ij}=x_iw_{ij}$ , for example, and $z_j$ is the output activation $x_j$ . In the latter case, $z_{ij} = \delta_{ij}\sigma(x_i)$ where $\delta_{ij}$ is the Kronecker delta, since there is no mixing between inputs and outputs of different subscripts. The relevance score $R_i$ at input neuron $i$ is then obtained by pooling all incoming relevance values $R_{i \leftarrow j}$ from the output neurons to which $i$ contributes in the forward pass: \begin{align} R_i = \sum_j R_{i \leftarrow j}~. \label{eq:lrppool} \end{align} Together, both above relevance decomposition and pooling steps ensure a local relevance conservation property, i.e.\ $\sum_i R_i = \sum_j R_j$ and thus $\sum_i R_i = f(\mathbf{x})$ for all layers of the model. In case of a component-wise operating non-linear activation, e.g.\ a ReLU ($\forall_{i=j}: \mathbf{x}_j = \max(0,x_i)$) or Tanh ($\forall_{i=j}: x_j = \tanh(x_i)$), then $\forall_{i=j}: R_i = R_j$. since the top layer relevance values $R_j$ only need to be attributed towards one single respective input $i$ for each output neuron $j$. After initiating the algorithm at the model output, it iterates over all the layers of the model towards the input, until relevance scores $R_i$ for all input components $x_i$ are obtained. Assuming a (strong) positive model output represents the predicted presence of a class, then the input level relevance scores can be interpreted as follows: Values $R_i \gg 0$ indicate components $x_i$ of the input which, due to the models’ learned decision function, represent the presence of the ``explained'' class, while conversely $R_i \ll 0$ contradict the prediction of that class. $R_i \approx 0$ identify inputs $x_i$ which have no or only little influence to the model’s decision. Applying above decomposition rules to a linear classifier $f(\mathbf{x}) = \sum_i x_iw_i + b$ with only a single output results in $z_{ij} = x_iw_i$ and $z_{bj} = b$, since the bias $b$ can be considered a constant always-on neuron, and $z_j = \sum_i x_iw_i + b = f(\mathbf{x})$. Initiating the (only) model output relevance as $R_j=f(\mathbf{x})$ and substituting both $z_{ij}$ and $z_j$ in above relevance decomposition and pooling rules in Equations \eqref{eq:lrpdecomp} and \eqref{eq:lrppool} yields: \begin{align} R_{i\leftarrow j} & = \frac{x_iw_i}{f(\mathbf{x})}f(\mathbf{x}) = x_iw_i &~;~\text{for inputs depending on data}~\mathbf{x} \nonumber\\ R_{b\leftarrow j} & = \frac{b}{f(\mathbf{x})}f(\mathbf{x}) = b &~;~\text{for the relevance quantities for the bias}~b~. \end{align} Since the model only has one output, the pooling at each input $x_i$ (or the bias) becomes $R_i = R_{i \leftarrow j}$ (or $R_b = R_{b \leftarrow j}$). In short, the application of LRP to a model consisting of only a single linear layer collapses to $R_i = x_iw_i$, the inherent explanation of the decision of a linear model in terms of input variables and the bias. For further details, please refer to \cite{BachPLOS15}. \subsection*{Data Availability} The datasets generated and analysed during the current study are available in the Mendeley Data Repository~\cite{horst2018public} (\url{http://dx.doi.org/10.17632/svx74xcrjr.1}). The Layer-Wise Relevance Propagation Toolbox~\cite{LapJMLR16} (\url{https://github.com/sebastian-lapuschkin/lrp_toolbox}) and the experimental code derivation thereof is available on GitHub (\url{https://github.com/sebastian-lapuschkin/interpretable-deep-gait}). \bibliographystyle{plain}
\section{Hunting For Dark Matter} \label{sec:model} In this section, we review several prerequisites for understanding the search for DM annihilations from the GC. We discuss the DM density distribution with an emphasis on the variations that will be utilized to explore the dependence of our results on this uncertain quantity, the relevant aspects of ground based observations with IACTs, and the recent work yielding the precision calculation of the photon spectrum used in the results that follow. \subsection{Dark Matter Density Distribution} The integrated photon flux due to the pair annihilation of DM particles from a region of solid angle $\Delta \Omega$ is computed using \begin{equation} \frac{\text{d}\Phi^{\rm DM}_{\gamma}}{\text{d}E}\big(\Delta\Omega,E\big) = \frac{\langle\sigma\, v\rangle}{8\,\pi \, m_{{\scriptscriptstyle \text{DM}}}^2}\frac{\text{d}N_{\gamma}(E)}{\text{d}E}\,J\big(\Delta\Omega\big) \,, \label{eqn:flux} \end{equation} where $\langle\sigma\, v\rangle$ is the total annihilation cross section to all final states with a photon, $\text{d}N_\gamma/\text{d}E$ is the photon spectrum per such annihilation, $m_{\scriptscriptstyle \text{DM}}$ is the DM mass, and $J(\Delta \Omega)$ is the integrated $J$-factor over a given region of interest (ROI) of solid angle size $\Delta \Omega$, defined by\footnote{We define the $J$-factor such that it carries units of [${\rm GeV}^2\cdot {\rm cm}^{-5}$]. Importantly, we do not associate the $\text{d} \Omega$ appearing in the definition with a unit of ${\rm sr}$, as this integral can be immediately identified as originating from a volume integral. Similarly, the $1/(4\, \pi)$ embedded in Eq.~\eqref{eqn:flux}, which originates in the surface area over which the flux from a given DM annihilation is diffused, is taken to be dimensionless. A common alternative to this convention is to associate these quantities with a ${\rm sr}$ and ${\rm sr}^{-1}$ unit, respectively, as explained in detail in App.~A of~\cite{Lisanti:2017qoz}. Note in either convention the units for the flux $\Phi_{\gamma}^{{\scriptscriptstyle \text{DM}}}$ is identical. } \begin{equation} J\big(\Delta \Omega\big) \equiv \int_{\Delta \Omega} \text{d}\Omega \int_0^\infty \text{d}s\, \rho_{\scriptscriptstyle \text{DM}}\big(r(s,\theta)\big)^2 \,, \label{eqn:jfac} \end{equation} where $\rho_{\scriptscriptstyle \text{DM}}$ is the mass density of the DM. We take the standard observer centered coordinate system so that $r = \big(s^2 +r_{\odot}^2-2\,r_{\odot}\,s\, \cos\theta \big)^{1/2}$, where $s$ is the distance along the line of sight from the observer to the annihilation point, $r_{\odot} = 8.5 \text{ kpc}$ is the distance from the Sun to the GC, and $\theta$ is the angle between the direction of observation and the Galactic center. If no significant excess over the background is found, indirect searches for DM annihilation signals can be interpreted as an upper limit on the annihilation cross section into a specific final state and for a given value of the $J$-factor, which parameterizes the DM density in the ROI. If the DM density in that region is not well-known, constraints should be interpreted as a joint limit on the particle physics and the astrophysics; for a particular particle physics model, constraints on the $J$-factor can be set, and if those constraints are inconsistent with the known constraints on the DM density distribution, we can then say that the model is ruled out. The DM density in the region close to the GC has large uncertainties, because the density of visible baryonic matter is expected to dominate that of DM at small Galactocentric radii. On the observational front, this means that going from gravitational measurements of the total mass density to limits on the DM density requires careful modeling of the baryonic component and has associated large systematic uncertainties, see, for instance,~\cite{Iocco:2015xga,2017MNRAS.465.1621P}. Simulation-based predictions including hydrodynamics and feedback physics in addition to the gravitational effects for the expected DM abundance have large uncertainties due to the effects of baryonic physics, and at sufficiently small Galactocentric distances, the resolution limit of simulations also becomes relevant. These issues currently prevent them from making robust predictions for the DM profile at radii smaller than a few kpc. \begin{figure}[t] \begin{center} \includegraphics[width=0.48\textwidth]{Plots/Fig1} \caption{$J$-factors for different DM profiles as a function of the angle $\theta$ from the GC. The DM profiles chosen in this study are the Einasto profile (solid line) and cored profiles with core radii of 0.3 kpc (dashed line), 1 kpc (dotted line), 3 kpc (dotted-dashed line), and 5 kpc (long-dashed-dotted line).} \label{fig:profiles} \end{center} \end{figure} Simulations including only DM particles and neglecting the baryonic physics give rise to cusped density profiles that rise steeply toward the GC; such profiles are often parameterized by the Navarro-Frenk-White (NFW) \cite{Navarro:1995iw} or Einasto \cite{1965TrAlm...5...87E} profiles \begin{equation} \rho_{\scriptscriptstyle \text{DM}}(r) = \rho_0 \begin{cases} \Big[ \Big(\frac{r}{r_s}\Big) \Big(1 + \left(\frac{r}{r_s}\right )^2 \Big)\Big]^{-1} & \text{NFW} \\ \\ \exp\left[-\frac{2}{\alpha} \left( \left(\frac{r}{r_s}\right)^\alpha - 1 \right)\right] & \text{Einasto}\end{cases} \,, \end{equation} where $r$ is the distance from the GC and $r_{\rm s}$ is a scale radius determined from the simulation. In this work we will use the Einasto profile as our baseline for a cusped DM profile, with the same parameters as in~\cite{Abramowski:2011hc}: explicitly, we choose $\alpha = 0.17$, $r_s=20$ kpc \cite{Pieri:2009je}, and $\rho_0$ chosen so that $\rho_{\scriptscriptstyle \text{DM}}(r_{\odot}) = 0.39$ GeV/cm$^3$. This last choice is based on estimates of the DM density at the position of the Earth \cite{Catena:2009mf}. Once baryonic matter is included in simulations, the short-distance cusp can be flattened out, producing a ``cored'' profile. For Milky-Way-sized galaxies, the scale within which the DM density is flattened can be of order 1 kpc~\cite{Chan:2015tna}. Depending on the modeling of baryonic physics within the simulation, DM cores in Milky Way-like galaxies extending to $\sim5$ kpc can be obtained~\cite{Mollitor:2014ara}. On the observational front, the total DM mass in the Galactic Bulge region can be estimated from measurements of Bulge stellar populations \cite{2015MNRAS.448..713P}, and disfavors a NFW profile with a core size exceeding $\sim 2$ kpc \cite{Hooper:2016ggc}. However, a recent analysis using a dynamical modeling of the Galactic bulge, bar, and disk favors a shallow cusp or core in the Bulge region~\cite{2017MNRAS.465.1621P}. In order to account for possible kpc-sized DM cores in the GC, we will empirically parameterize a core of varying sizes by using the Einasto profile described above for $r > r_\text{\rm c}$, and setting $\rho_{\scriptscriptstyle \text{DM}}(r) = \rho_{\scriptscriptstyle \text{DM}}(r_\text{c}) = \rho_{\rm Einasto}(r_\text{\rm c})$ for $r < r_\text{\rm c}$. The normalization of the profile is such that $\rho_{\scriptscriptstyle \text{DM}}(r_{\odot})$ = $\rho_\odot$. We plot the $J$-factor versus the angular distance, $\theta$, between the GC and the observation direction, for the Einasto profile and several choices of the core size, in Fig.~\ref{fig:profiles}. \subsection{Ground-Based Observations with IACTs} \label{sec:GCTeV} The most promising avenue for experimental tests of wino DM lies in indirect detection; since the relevant mass scales are high, IACTs have sensitivity to the annihilation products of thermal winos. Furthermore, the cross section for high-mass weakly-interacting DM annihilation can be strongly enhanced at low velocities by the nonperturbative Sommerfeld enhancement \cite{Hisano:2003ec,Hisano:2004ds}, which also enhances the gamma-ray line signal relative to the continuum emission. The enhancement effect is large for the thermal wino, and so the pure wino DM presents a particularly attractive target for gamma-ray line searches with IACTs \cite{Fan:2013faa,Cohen:2013ama}. Current arrays of IACTs like H.E.S.S., MAGIC, and VERITAS consist of 2-to-5 telescopes on the ground. The differential flux sensitivity achieved is $10^{-12}\text{ TeV}^{-1}\text{ cm}^{-2}\text { s}^{-1}$ at $\sim1\text{ TeV}$, about 1\% of the Crab flux~\cite{Aharonian:2006pe}. Based in Namibia near the tropic of Capricorn, the H.E.S.S. observatory is particularly well located to observe the central region of the Milky Way. Phase I of H.E.S.S. consists of four 12 m-diameter telescopes and reaches an angular resolution of 0.06$^{\circ}$ (68\% containment radius) and an energy resolution $\Delta E/E$ of 10\% above 300 GeV~\cite{2009APh32231D}. The GC region harbors numerous VHE gamma-ray emissions: they include H.E.S.S. J1745-290~\cite{Aharonian:2004wa,Aharonian:2009zk} a strong emission coincident with supermassive black hole Sagittarius A*, the supernova/pulsar wind nebula G0.9+0.1~\cite{Aharonian:2005br}, the supernova remnant H.E.S.S. J1745-303~\cite{Aharonian:2008gw}, and a diffuse emission extending along the Galactic plane~\cite{Aharonian:2006au,HESS2014sla,Abramowski:2016mir}. The H.E.S.S. observatory has carried out a deep observation program of the GC region from 2004 to 2014. The rich observational dataset obtained from H.E.S.S. phase I has been used to look for continuum~\cite{Abramowski:2011hc,Abdallah:2016ygi} and line~\cite{Abramowski:2013ax,Abdallah:2018qtu} signals from DM annihilations. Standard analyses of H.E.S.S.-I observations of the GC region provided $\sim 250$ hours of live time in the inner 1$^{\circ}$ of the GC with a mean zenith angle of about 20$^{\circ}$ that yields an energy threshold of 160 GeV. The energy-dependent gamma-ray acceptance reaches $\sim3\times10^5\text{ m}^2$ above 1 TeV, with a typical hadronic rejection factor of about $10$. A rejection factor of $10$ corresponds to an efficiency of $10\%$, where the efficiency is defined by the number of events passing the overall event selection cuts. In order to face the challenging standard astrophysical backgrounds, a robust approach consists of masking these regions from the data analysis for DM searches, as successfully applied in~\cite{Abdallah:2016ygi,Abdallah:2018qtu}. Once this has been performed, the dominant background in the GC region consists of misidentified CR hadrons (protons and nuclei), electrons,\footnote{The CR electron spatial distribution is assumed isotropic. No significant anisotropy of the VHE CR electrons is found in Fermi-LAT observations on any angular scale~\cite{Abdollahi:2017kyf}.} and Galactic diffuse emission. The dominant flux of CR hadrons interacting in the Earth's atmosphere generates hadronic showers which include electromagnetic sub-showers from neutral pions decaying into photons. Hadronic showers can be efficiently discriminated from the shower initiated by primary gamma-rays, requiring a stereoscopic view of the event and using morphological and timing parameters of the shower image in the camera. The incoming CR hadron flux is much larger than the CR electrons and gamma-ray fluxes, so that a fraction of the hadron flux cannot be rejected due to the finite hadron rejection power of the instrument. \begin{figure*}[t] \begin{center} \raisebox{0.75cm}{ \includegraphics[width=0.45\textwidth]{Plots/Fig2a}} \hfill \includegraphics[width=0.45\textwidth]{Plots/Fig2b.pdf} \caption{{\it Left:} A schematic of the key physical contributions for the precision calculation as relevant for a H.E.S.S. search for heavy wino annihilation. DM particles, $\chi$, annihilate to the detected photon (in red), which recoils against a jet (in blue), \emph{i.e.} a collimated spray of electroweak radiation. Low energy isotropic radiation (in green) also yields important physical effects. The winos collide with non-relativistic velocity, and the exchange of electroweak gauge bosons gives rise to the Sommerfeld enhancement (in purple). {\it Right:} The spectral shape of the endpoint contribution at NLL (orange solid line), as compared to the line which is a pure delta function (black dashed line). The theoretical spectrum is shown for a thermal wino of mass $m_{\rm DM} = 2.9$ TeV. } \label{fig:theory_setup} \end{center} \end{figure*} The measurement of the residual background in the GC region is complex~\cite{Abdallah:2016ygi,Abdallah:2018qtu}. An accurate background determination can be obtained for each observation where the background events are recorded in a region symmetric to the signal region from the pointing position. This allows the signal region and background regions to have the same sky acceptance and solid angle size, and thus does not require further offline normalization. This technique is very well suited in the case where a strong emission gradient is expected between the signal and background regions. However, the technique weakens for diffuse emission that is extended on the scale of the field of view of the instrument. In particular, for dark matter searches, this technique is proven to be very efficient in the case of cuspy DM density distributions, but fails for cored profiles with flattened density within 100 parsec or more of the GC. In order to avoid this limitation, one can extract the residual background energy distribution from extragalactic observations~\cite{Abdallah:2016ygi}. In this case, the residual background is extracted from blank fields at high Galactic latitudes in the same observation conditions as for the GC dataset. Alternatively, Monte Carlo simulations can be used to predict the residual background rate, since they can be performed in the same observational conditions and telescope configurations as for the GC dataset, allowing for reduced systematic uncertainties~\cite{Holler:2017ynz}. \subsection{Precision Signal Spectrum} Due to the large backgrounds, the most striking signal for DM annihilation is a line signal, which in this energy range should not arise from astrophysical backgrounds. However, because of the finite energy resolution of IACTs, it is impossible to measure only the line spectrum; gamma-ray photons from DM annihilation to $\gamma\, \gamma$ or $\gamma\, Z$ will inevitably be accompanied by gamma-ray photons from other annihilation final states, and these cannot be distinguished on an event-by-event basis if the energy of the resulting photon varies by an amount less than the energy resolution of the telescope. Furthermore, if a smooth background model is included in the fit, as in \cite{Abramowski:2013ax}, the unaccounted-for presence of lower-energy signal photons could potentially bias the background model. Thus to obtain precise and accurate constraints, it is important to have a theoretical prediction for the full photon spectrum to compare with the data, rather than simply comparing constraints on an isolated line to a theoretical prediction for the strength of the line signal. Obtaining a reliable prediction for the photon spectrum from wino annihilation is complicated by the presence of the hierarchical scales $m_{\scriptscriptstyle W}$, and $m_{\scriptscriptstyle \text{DM}}$, and in the endpoint region -- where \begin{equation} z\equiv \frac{E}{m_{\scriptscriptstyle \text{DM}}}\,, \label{eq:z} \end{equation} is close to 1 -- by the presence of non-trivial phase space restrictions. By looking for a line signal within the H.E.S.S. resolution of $m_{\scriptscriptstyle \text{DM}}$, the final state must be close to a two-body decay, for which $z=1$. More precisely, it must consist of collimated energetic radiation recoiling against the detected photon (an electroweak jet), as well as additional low energy radiation. Any additional radiation would make the energy of the photon far from $m_{\scriptscriptstyle \text{DM}}$. This configuration is shown on the left of Fig.~\ref{fig:theory_setup}. This restriction introduces perturbative Sudakov double logarithms $\alpha_{\scriptscriptstyle W}\log^2(m_{\scriptscriptstyle \text{DM}}/m_{\scriptscriptstyle W})$~\cite{Hryczuk:2011vi,Baumgart:2014vma,Bauer:2014ula,Ovanesyan:2014fwa,Baumgart:2014saa,Baumgart:2015bpa,Ovanesyan:2016vkk}, and $\alpha_{\scriptscriptstyle W}\log^2(1-z)$ \cite{Baumgart:2014vma,Baumgart:2014saa,Baumgart:2015bpa,Baumgart:2017nsr} , as well as Sommerfeld enhancement terms of the form $\left( \alpha_{\scriptscriptstyle W} m_{\scriptscriptstyle \text{DM}}/m_{\scriptscriptstyle W} \right )^k$ \cite{Hisano:2003ec,Hisano:2004ds,Cirelli:2007xd,ArkaniHamed:2008qn,Blum:2016nrz}. Here $\alpha_{\scriptscriptstyle W}$ is the weak fine structure constant. Reliable predictions for the shape of the distribution in the endpoint region require that all these effects are resummed to all orders in perturbation theory. Once the perturbative series is reorganized in this manner, it again converges rapidly due to the smallness of the electroweak coupling, $\alpha_{\scriptscriptstyle W}$, allowing precise theoretical predictions for the photon spectrum. In \cite{Baumgart:2017nsr}, an effective field theory (EFT) framework was developed for the calculation of the photon spectrum in the endpoint region for heavy DM annihilation. It combines non-relativistic EFTs for the description of the annihilating DM, and soft-collinear effective theory (SCET) \cite{Bauer:2000yr, Bauer:2001ct, Bauer:2001yt}, as well as its multi-scale extensions \cite{Bauer:2011uc,Larkoski:2014tva,Procura:2014cba,Larkoski:2015zka,Pietrulewicz:2016nwo}, and extensions to include massive gauge bosons~\cite{Chiu:2007yn,Chiu:2008vv,Chiu:2007dg}, for the treatment of the final state radiation. This EFT allows the photon energy spectrum to be computed precisely, properly incorporating both the Sommerfeld and Sudakov effects (as well as their interplay) to all orders, and allowing for reliable uncertainty estimates. Using this EFT, an analytic form for the photon energy spectrum in the endpoint region for annihilating pure wino DM was derived in~\cite{Baumgart:2017nsr} at leading logarithmic (LL) accuracy, and this calculation was extended in~\cite{us:NLL} to next-to-leading logarithmic (NLL) accuracy, greatly reducing the theoretical uncertainty. For simplicity, we present the final formula for the LL photon spectrum in this region, as this allows us to illustrate the general features of its shape in the endpoint region with a simple expression. We then briefly comment on how this is modified by additional logarithmic corrections at NLL. We refer the reader to~\cite{Baumgart:2017nsr} for the derivation of the LL result, and \cite{us:NLL} for the analytic form of the spectrum at NLL. In the endpoint region, the photon spectrum at LL accuracy can be written as a function of $z$ and $m_{\scriptscriptstyle \text{DM}}$ as \newpage \begin{widetext} \begin{align} \left(\frac{\text{d} \sigma}{\text{d}z}\right)^{\text{LL}} \!&=\, 4 \,|s_{0\pm}|^2\, \hat \sigma^\text{LL}_{\text{line}}\, \delta(1-z) + \frac{2\,\alpha_{\scriptscriptstyle W}}{\pi} \frac{\hat \sigma^\text{LL}_{\text{line}}}{1-z} \,e^{\frac{4\,\alpha_{\scriptscriptstyle W}}{\pi} \, L_J^2(z)} \bigg\{ F_1 \Big( 3\,L_S(z) - 2\,L_J(z) \Big) e^{\frac{-3\,\alpha_{\scriptscriptstyle W}}{\pi}\, L^2_S(z) } - 2\,F_0\, L_J(z) \bigg\} \,. \label{eq:resummed} \end{align} \end{widetext} This provides a simple analytic expression describing both the line contribution, which is given by the first term in Eq.~(\ref{eq:resummed}) proportional to $\delta(1-z)$, as well as the endpoint contribution which is given by the second term, and is a non-trivial function of $z$, describing the steeply falling spectrum. The line contributions were first calculated with resummation in \cite{Bauer:2014ula,Ovanesyan:2014fwa,Ovanesyan:2016vkk}, while it is the shape of the spectrum away from $z=1$ that is the primary contribution of \cite{Baumgart:2017nsr}. On the right of Fig.~\ref{fig:theory_setup} we show the spectrum of photons associated with the endpoint for the thermal wino. We now describe each of the components of Eq.~(\ref{eq:resummed}) in turn. Both terms are multiplied by the exclusive line cross section (without Sommerfeld effects), which at leading logarithmic accuracy is given by \begin{align} \hspace{-2pt}\hat \sigma^\text{LL}_{\text{line}}= {\pi \,\alpha_{\scriptscriptstyle W}^2\, \sin^2 \theta_{\scriptscriptstyle W} \over 2\,m_{\scriptscriptstyle \text{DM}}^2\, v} \exp\left[- \frac{4\,\alpha_{\scriptscriptstyle W}}{\pi}\, \ln^2 \left( \frac{m_{\scriptscriptstyle W}}{2\,m_{\scriptscriptstyle \text{DM}}} \right) \right] \,, \label{eq:partonicSigmaLine} \end{align} where $\theta_{\scriptscriptstyle W}$ is the Standard Model weak mixing angle. This can be computed within an EFT framework by considering charged wino annihilation into both $\gamma\,\gamma$ and $\gamma\,Z$. The exponential appearing in this formula is the massive Sudakov form factor \cite{Collins:1989bt} and is due to the exchange of virtual electroweak bosons. This process is then mapped onto the neutral wino initial state by non-trivial mixing due to the Sommerfeld enhancement involving the exchange of a ladder of gauge bosons with one or more $W^\pm$ bosons, \emph{i.e.}, $s_{0\pm} \neq 0$. The energy dependence of the photon spectrum in the endpoint region, which is crucial to our analysis, is described by a $1/(1-z)$ power law growth towards the endpoint, modified by the logarithms \begin{align} L_J(z)&= \ln \left({m_{\scriptscriptstyle W}/m_{\scriptscriptstyle \text{DM}} \over 2 \, \sqrt{1-z} }\right) \Theta\!\left(1-\frac{m_{\scriptscriptstyle W}^2}{4\, m_{\scriptscriptstyle \text{DM}}^2}-z \right)\,, \nonumber \\[5pt] L_S(z)&= \ln \left({m_{\scriptscriptstyle W}/m_{\scriptscriptstyle \text{DM}} \over 2 \, (1-z) }\right) \Theta\!\left( 1-\frac{m_{\scriptscriptstyle W}}{2\,m_{\scriptscriptstyle \text{DM}}}-z \right) \,, \label{eq:LJLS} \end{align} associated with additional radiation in the final state. The $\Theta$ functions are set by the kinematics, and cut off the divergence in the $1/(1-z)$ growth before reaching the $z=1$ endpoint. Importantly, this power law form is unmodified beyond LL, with higher order corrections simply dressing this result with additional logarithms. Furthermore, we find that these higher order corrections are of the anticipated size, and that their primary utility is to reduce the theoretical uncertainty. Finally, the non-perturbative Sommerfeld effect is captured by a non-relativistic quantum mechanics calculation of the matrix element of the $S$-wave combination for the annihilating neutral winos $(\chi^0\chi^0)_S$, \begin{align} \label{eq:wavefunction} &\Big\langle 0 \Big|\, \chi^{0\,T}\, i\sigma_2 \,\chi^{0\,\,} \,\Big| \big(\chi^0 \chi^0\big)_S \Big\rangle = 4 \sqrt{2} \, m_{\scriptscriptstyle \text{DM}}\, s_{00} \,, \nonumber \\[5pt] &\Big\langle 0 \Big|\, \chi^{+T}\, i\sigma_2 \,\chi^-\, \Big| \big(\chi^0 \chi^0\big)_S \Big\rangle= 4\, m_{\scriptscriptstyle \text{DM}} \,s_{0\pm} \,, \end{align} where $\sigma_2$ is the second Pauli matrix, and we have used the standard notation $\chi^0 = \chi^3$ and $\chi^\pm = (\chi^1 \mp i \chi^2)/\sqrt{2}$ for the neutral and charged wino states respectively. Then $s_{00}$ ($s_{0\pm}$) provides the enhancement for a neutral wino initial state and a perturbative Feynman diagram involving neutral (charged) wino annihilation. For a detailed discussion, see \emph{e.g.}~\cite{Beneke:2012tg, Cohen:2013ama}. For the LL line contribution, only the $s_{0\pm}$ contributes, since we are only matching the EFT to the full theory at tree level, which implies that the only non-zero diagrams are due to charged wino annihilation to $\gamma\,\gamma$ and $\gamma\,Z$. However, in the endpoint region, the non-trivial combinations \begin{align} F_0 &= \frac43 \,\big|s_{00}\big|^2 + 2 \,\big|s_{0\pm}\big|^2 + {4\, \sqrt{2} \over 3}\, \Re\Big (s_{00} \,s^*_{0\pm} \Big) \,, \nonumber \\[3pt] F_1 &= - \frac43 \,\big|s_{00}\big|^2 + 2\,\big |s_{0\pm}\big|^2 - {4 \sqrt{2} \over 3}\, \Re\Big(s_{00}\, s^*_{0\pm}\Big ) \,, \end{align} also appear, where $\Re(\dots)$ gives the real part of the argument. This occurs because three-body processes yielding $W^+\,W^-\,\gamma$ can now appear, and this channel is non-zero for both charged and neutral wino annihilation. Beyond LL the structure of both the line and endpoint spectrum contributions become more sophisticated, but the basic ingredients discussed here, and type of logarithms that are resummed, remain the same. For our analysis here we will make use of the full NLL results from \cite{us:NLL}. These results for the case of wino DM can in principle be straightforwardly extended to other heavy WIMP DM. The calculation presented here is based on an EFT expansion that requires that the resolution is much greater than $m_{\scriptscriptstyle W}/(2\,m_{\scriptscriptstyle \text{DM}})$. We find that our calculation is not reliable below $\sim 1$ TeV. For masses below this value we would have to match our prediction onto an EFT that is valid in the low mass region. This is beyond the scope of the current paper, and therefore we only consider $m_{\scriptscriptstyle \text{DM}}\gtrsim1$ TeV. However, due to the high quality data in this low mass region, we believe it would be interesting to consider, and we intend to pursue this in future work. For recent EFT work relevant to DM masses below $1$ TeV, see~\cite{Beneke:2018ssm}. \subsection{Interpreting the Signal Prediction} \label{sec:interpretSignal} Given this precise prediction for the gamma-ray spectrum resulting from wino annihilation, it is worth revisiting the procedure for converting this into a flux prediction that can be used to probe wino annihilation. In particular, one of our goals here is to understand the extent to which including the spectral shape -- the \emph{endpoint} spectrum in the results below -- impacts the limits one would set, when compared to the limits derived assuming that only the line contribution is relevant. To this end, we define the \emph{line} annihilation cross section $\sigma_\text{line}$ to be half the coefficient of $\delta\big(E - m_{\scriptscriptstyle \text{DM}}\big)$ in the expression for $\text{d}\sigma/\text{d}E$. For example, in the LL case we take the differential spectrum in Eq.~(\ref{eq:resummed}) and derive that $\sigma_\text{line} = 2 \,|s_{0\pm}|^2\, \hat \sigma_{\text{line}}$, where $\hat \sigma_\text{line}$ is defined in Eq.~(\ref{eq:partonicSigmaLine}), and we have used Eq.~(\ref{eq:z}) to convert $z$ into $E$. We emphasize that the NLL result is used for all numerical analysis in what follows. Our conventions are such that the contribution to $\text{d}\sigma/\text{d}E$ is normalized as $2\, \sigma_\text{line}\, \delta\big(E - m_{\scriptscriptstyle \text{DM}}\big)$, where the factor of 2 accounts for the presence of two photons in exclusive $\chi\, \chi \rightarrow \gamma\, \gamma$ annihilations. For line events, we must also include the branching rate to $\gamma\,Z$ though, giving $\sigma_\text{line} = \sigma(\chi\,\chi \rightarrow \gamma\, \gamma) +(1/2)\,\sigma(\chi\,\chi\rightarrow\gamma\,Z)$. The analysis can then be interpreted as either a constraint on $\langle \sigma\,v \rangle_\text{line}$, or as a constraint on the DM profile using the predicted wino rate. In order to include the endpoint spectrum in the analysis, we take the NLL analog of Eq.~(\ref{eq:resummed}), subtract the contribution proportional to the line $\delta\big(E - m_{\scriptscriptstyle \text{DM}}\big)$, and normalize to $\sigma_\text{line}$. This yields an analytic prediction for the endpoint spectral shape that we will refer to as $\big(\text{d}\mathcal{N}_{\gamma}(E)/\text{d}E\big)^\text{endpoint}$, specifically \begin{align} \bigg(\frac{\text{d}\sigma}{\text{d}E}\bigg)^{\text{NLL}} = \sigma_\text{line} \left[2\, \delta\big(E - m_{\scriptscriptstyle \text{DM}}\big) + \left(\frac{\text{d}\mathcal{N}_\gamma}{\text{d}E}\right)^\text{endpoint}\right ]\,.\notag\\[3pt] \end{align} Note that the use of a new notation for the spectrum, $\text{d}\mathcal{N}_{\gamma}/\text{d}E$, rather than $\text{d} N_{\gamma}/\text{d}E$ as appeared in Eq.~\eqref{eqn:flux} is deliberate, and is designed to emphasize that we are using a spectrum normalized to the line cross section. \begin{table*}[tb] \centering \renewcommand{\arraystretch}{1.8} \setlength{\tabcolsep}{4.5pt} \setlength{\arrayrulewidth}{1.3pt} \begin{tabular}{|r|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{$i$-th ROI}\hspace{15pt} & \multirow{2}{*}{$\begin{array}{c}\text{Solid angle:}\\[-5pt] \Delta\Omega_i\,\,\, \big[10^{-4} \text{ sr}\big]\end{array}$} & \multicolumn{6}{c|}{$J\text{-factor: } J_i \big(\Delta\Omega_i \big) \,\,\, \big[10^{20} \text{ GeV}^2\text{ cm}^{-5}\big]$} \\[2pt] \cline{3-8} & & Einasto & $r_\text{c} = 0.3 \text{ kpc}$ & $r_\text{c} = 0.5 \text{ kpc}$ & $r_\text{c} = 1 \text{ kpc}$ & $r_\text{c} = 3 \text{ kpc}$ & $r_\text{c} = 5 \text{ kpc}$\\ \hline 1: $\big(\bar \theta_1= 0.3^\circ\big)$ & 0.31 & 3.76 & 1.08 & 0.60 & 0.23 & 0.035 & 0.012 \\ 2: $\big(\bar \theta_2=0.4^\circ\big)$ & 0.50 & 5.16 & 1.14 & 0.97 & 0.38 & 0.056 & 0.019 \\ 3: $\big(\bar \theta_3=0.5^\circ\big)$ & 0.69 & 6.15 & 2.40 & 1.34 & 0.52 & 0.078 & 0.026\\ 4: $\big(\bar \theta_4=0.6^\circ\big)$ & 0.88 & 6.89 & 3.04 & 1.71 & 0.66 & 0.099 & 0.033\\ 5: $\big(\bar \theta_5=0.7^\circ\big)$ & 1.08 & 7.45 & 3.67 & 2.07 & 0.81 & 0.12 & 0.040\\ 6: $\big(\bar \theta_6=0.8^\circ\big)$ & 1.27 & 7.88 & 4.29 & 2.43 & 0.95 & 0.14 & 0.047\\ 7: $\big(\bar \theta_7=0.9^\circ\big)$ & 1.46 & 8.20 & 4.90 & 2.79 & 1.09 & 0.16 & 0.055\\ \vdots\hspace{31pt} & \vdots & \vdots &\vdots & \vdots& \vdots & \vdots & \vdots\\ 37: $\big(\bar \theta_{37}=3.9^\circ\big)$ & 7.55 & 8.78 & 8.78 & 8.78 & 5.23 & 0.88 & 0.28 \\ \hline \end{tabular} \caption{ \small \label{tab:tableJ} Definitions of the $i$-th ROI together with the corresponding solid angle size, and value of the $J$-factor for the several DM profiles considered here. For brevity, we only show the first $7$ ROIs, which are used in the $1^\circ$ analysis, and then skip to the 37th since this is the largest ROI considered in this work, and is used in the $4^\circ$ analysis. } \end{table*} Finally, in addition to investigating the impact of the perturbative endpoint spectrum, we will also include the contribution to the gamma-ray flux from processes where the hard annihilation is to a Standard Model final state that generates a spectrum of photons due to its subsequent decay. We refer to this as \emph{continuum} in the results below. In the wino example, both the neutral and charged winos can annihilate to $W^\pm$ bosons, which then decay. Note that both parton level processes must be included, since again they will be accessed by the mixing due to the Sommerfeld effect. The Sommerfeld enhanced annihilation rate is then convolved with the final state photon spectrum provided by the PPPC 4 DM ID~\cite{Cirelli:2010xx}. Following the same logic as with the endpoint spectrum, we take the PPPC results, and normalize them to $ \sigma_\text{line}$ in order to derive the continuum spectral shape, referred to as $\big(\text{d}\mathcal{N}_{\gamma}(E)/\text{d}E\big)^\text{continuum}$. Now we are setup to compare the three levels of approximation -- $(i)$ line, $(ii)$ line + endpoint, and $(iii)$ line + endpoint + continuum. Revisiting Eq.~(\ref{eqn:flux}), \begin{equation} \hspace{-5pt}\frac{\text{d}\Phi^{\rm DM}_{\gamma}}{\text{d}E}\big(\Delta\Omega,E\big) = \frac{\langle \sigma\,v \rangle_\text{line} \,J\big(\Delta\Omega\big)}{8\,\pi\,m_{\rm DM}^2} \left[\frac{\text{d}\mathcal{N}_\gamma(E)}{\text{d}E}\right] \,,\!\! \label{eqn:fluxRevisited} \end{equation} where we have grouped the combination $\big(\langle \sigma\,v \rangle_\text{line} \,J\big(\Delta\Omega\big)\big)$ since this is the quantity that can be constrained using IACT data, and the bracketed term encodes the spectral shape, \begin{align} \notag\\[-5pt] \left[\frac{\text{d}\mathcal{N}_{\gamma}(E)}{\text{d}E}\right] = \begin{cases} 2\,\delta\big(E - m_{\scriptscriptstyle \text{DM}}\big) & (i) \\ \\ (i) + \left(\frac{\text{d}\mathcal{N}_{\gamma}(E)}{\text{d}E}\right)^\text{endpoint} & (ii) \\ \\ (ii) + \left(\frac{\text{d}\mathcal{N}_{\gamma}(E)}{\text{d}E}\right)^\text{continuum}& (iii) \\[5pt] \end{cases}\,. \end{align} Note that having a broad spectrum impacts the analysis, as it can lead to contamination outside of the energy window associated with a signal of a given mass. Note that a benchmark choice $\langle \sigma\,v \rangle_\text{line} = 10^{-27} \text{cm}^3/\text{s}$ is used for many of the plots below, since this is about where the projected limit for a $3 \text{ TeV}$ wino will lie. Now that we have a clear understanding of the various aspects of the signal prediction, we are ready to explain the procedure used for deriving our expected limits. \section{Expected Sensitivity} \label{sec:mockdata} Now that we have reviewed the experimental setting, and the theoretical prediction, we have everything we need to explain the data analysis strategy. First, we will introduce many regions of interest so that we can explore optimizing the search strategy. We show how to calculate the number of expected events for both signal and background, followed by an explanation of the 2D-binned likelihood procedure used to calculate the expected sensitivity to wino DM for a H.E.S.S.-like data set. \subsection{Definition of Regions of Interest} \begin{figure*}[t] \begin{center} \includegraphics[trim=0cm -2.5cm 0cm 0cm,clip=true,width=0.5\textwidth]{Plots/Fig3a} \hfill \includegraphics[width=0.48\textwidth]{Plots/Fig3b} \caption{{\it Left:} An illustration of the seven innermost ROIs. Figure adapted from~\cite{Lefranc:2015vza}. The three brightest gamma ray sources are labelled. We mask the boxed region around the Galactic plane. When the ROI region becomes large enough for this to become relevant, we also exclude a disk centered on the position of the source HESS J1745-303 as discussed in the text. {\it Right:} $J$-factors integrated over the ROI solid angle as a function of the ROI number, for several DM profiles studied here.} \label{fig:ROIandJFactor} \end{center} \end{figure*} The area of the sky that will be targeted to extract the signal follows from~\cite{Abdallah:2016ygi,Abdallah:2018qtu}. This is the ROI, and we will often use a shorthand and refer to this as the ON region. It is defined as a circle with a one-degree radius centered on the GC. In order to best exploit the spatial behavior of a DM signal as compared to background, this region is then split in several sub-ROIs. As mentioned in Sec.~\ref{sec:GCTeV}, the GC is a very crowded environment that produces VHE gamma-rays through a variety of mechanisms. In order to avoid the need to model the contamination from known astrophysical sources of gamma-rays, the corresponding regions of the sky are excluded from the ON regions. In particular, a box with longitudes $|\ell|<$1.5$^{\circ}$ and latitudes $|b|<$0.3$^{\circ}$ in Galactic coordinates, and a disk of 0.4$^{\circ}$ radius centered at $(l,b)=(-1.29^{\circ},-0.64^{\circ})$ are masked in order to exclude the diffuse emission along the Galactic plane and the known source HESS J1745-303. The $i$-th ON regions are concentric rings of $i$-th aperture $\bar \theta_i$ ranging from 0.3$^{\circ}$ to 0.9$^{\circ}$ and constant width $\Delta\theta =0.1^{\circ}$. The solid angle of the $i$-th ROI is defined as \begin{equation}\label{eq:DeltaOmega} \Delta\Omega_{i} = \Delta\Omega_i^{\rm ring} - \Delta\Omega_i^{\rm excluded} \,, \end{equation} where \begin{equation} \displaystyle \Delta\Omega^{\rm ring}_i= 2\,\pi\,\int_{\bar\theta_i}^{\bar\theta_i+\Delta\theta} \text{d} \theta\, \sin\theta \,, \end{equation} is the solid angle of the $i$-th ring and \begin{equation} \displaystyle \Delta\Omega^{\text{excluded}}_i= 4\int_{\bar\theta_i}^{\bar\theta_i+\Delta\theta} \text{d} \ell \int_{0}^{b_{\text{max}}} \text{d} b \, \cos b \,, \end{equation} is the solid angle of the $i$-th excluded region. The corresponding $J$-factor in the $i$-th ROI is then defined as $J\big(\Delta\Omega_i\big) = J\big(\Delta\Omega_i^{\rm ring}\big) - J\big(\Delta\Omega_i^{\rm excluded}\big)$. Additionally, the solid angle of any ring that intersects the HESS J1745-303 exclusion region is also removed. The left panel of Fig.~\ref{fig:ROIandJFactor} illustrates the first seven ROIs, and Table~\ref{tab:tableJ} gives explicit values of the solid angle size $\Delta\Omega_i$ and $J$-factor assuming several of the DM profiles considered in this study, for the first 7 and 37th ROIs. The $i$-th $J$-factor integrated over the solid angle size $\Delta\Omega_i$ is plotted in the right panel of Fig.~\ref{fig:ROIandJFactor} for all 37 ROIs. As expected, if a given ROI lies within the core radius, the $J$-factors simply scales with the solid angle size $\Delta\Omega$. The increase of $J \big(\Delta\Omega \big)$ at the 12th ROI corresponds to an increase in the integration region for the $J$-factor computation where the Galactic plane is no longer excluded. Beyond the 12th ROI the $J$-factor is given by $J\big(\Delta\Omega_{\rm ring}\big)$. \begin{figure*}[t!] \begin{center} \includegraphics[width=0.48\textwidth]{Plots/Fig4a} \hfill \includegraphics[width=0.48\textwidth]{Plots/Fig4b} \caption{{\it Left:} Expected differential flux in ROI 2 for a 3 TeV wino annihilating with an annihilation cross section $\langle \sigma\,v \rangle_\text{line} = 10^{-27} \text{ cm}^3 \text{ s}^{-1}$, for the Einasto (solid red line) and 0.5 kpc cored (dashed red line) DM profiles. Only the continuum and endpoint components are displayed. The CR hadron (proton + nuclei) flux (solid black line) is plotted together with the CR electron flux (black dotted line) and the diffuse flux from the H.E.S.S. Pevatron (orange solid line). {\it Right:} Expected differential count rate as a function of energy for signal and background in ROI 2 for a wino mass of 3~TeV with an annihilation cross section $\langle \sigma\,v \rangle_\text{line} = 10^{-27}\text{ cm}^3 \text{ s}^{-1}$. For the signal, the differential count rates are given for the line (dotted blue line), the line + endpoint (dashed cyan line), and the line + endpoint + continuum (dashed-dotted red line). The residual background is plotted as a solid black line. Here the effect of the convolution with the energy resolution is included, which is not the case in the left figure.} \label{fig:signal} \end{center} \end{figure*} The background in the ON region is determined from regions in the sky, hereafter referred to as OFF regions, using the reflected background method~\cite{Abdallah:2018qtu}. For each observation and each ON region, the corresponding OFF region is defined as the area of the sky symmetric to the ON region with respect to the pointing position. In this way, the ON and OFF regions have the same exposure, acceptance, solid angle size and observational conditions, \emph{i.e.}, no further correction is needed to compare the ON and OFF regions. The procedure is then repeated for all the ROIs and all the observations at different pointing positions. Such a method has proven to be efficient in the case of cuspy DM profiles for which a DM gradient is expected between the ON and OFF regions~\cite{Abdallah:2016ygi,Abdallah:2018qtu}, or DM profiles where the core extends below about 100 pc. For profiles with kpc-sized cores, a different approach is required. One can model the expected background using dedicated simulations of the observational and instrumental conditions during data taking~\cite{Holler:2017ynz}. Alternatively, the background can be measured utilizing dedicated observations taken in the closest possible observational conditions as the signal measurement observations. In particular, the zenith angle and offset between the ROI and pointing position should be chosen to be similar to the observation conditions of the ON region. However, this strategy implies that the overall observation time is doubled, and additional corrections may be required to account for changes in the observational and instrumental conditions. The systematic uncertainties could be larger than in the case of precise Monte Carlo simulations of the residual background for each observation run~\cite{Holler:2017ynz}. Therefore, we use the strategy of simulating the expected background in the observation conditions in what follows, leaving a detailed exploration of the data driven approach for future work. \subsection{Number of Signal and Background Events} \begin{figure*}[tbh] \begin{center} \includegraphics[width=0.48\textwidth]{Plots/Fig5a} \hfill \includegraphics[width=0.48\textwidth]{Plots/Fig5b} \caption{95\% C.L. mean expected upper limits on the thermally-averaged velocity-weighted annihilation cross section $\langle \sigma\,v \rangle_\text{line}$ as a function of the DM mass $m_{\scriptscriptstyle \text{DM}}$. {\it Left:} The mean expected limits together with statistical 68 and 95\% containment bands including the systematic and theoretical uncertainties. The mass corresponding to a thermally-produced wino DM $m_{\scriptscriptstyle \text{DM}} = 2.9 \pm 0.1\text{ TeV}$~\cite{Beneke:2016ync} is shown as a light blue vertical band. The NLL cross section for wino DM is shown in gray. {\it Right:} The limits are given assuming the line-only (blue dotted line), a line + endpoint contribution (cyan dashed line), and line + endpoint + continuum spectrum (red solid line).} \label{fig:compare} \end{center} \end{figure*} Assuming a DM annihilation channel and a DM density profile, the expected number of signal gamma-rays $N_{\text{S},ij}$ in the $i$-th ROI and $j$-th energy bin can be written as \begin{equation} N_{\text{S},ij} = T_{\text{obs},i} \int_{E_j-\Delta E_j/2}^{E_j+\Delta E_j/2}\text{d}E'\,\frac{\text{d}\Gamma_{\text{S},ij}}{\text{d}E'} \,, \end{equation} where $T_{\text{obs},i}$ is the observation time in seconds, and \begin{equation} \frac{\text{d}\Gamma_{\text{S},ij}}{\text{d}E} = \int_{-\infty}^{\infty}\!\text{d}E'\,\frac{\text{d}\Phi^{{\scriptscriptstyle \text{DM}}}_{\gamma,ij}}{\text{d}E'}\big(\Delta\Omega,E'\big) \,A_{\text{eff}}^{\gamma}\big(E'\big)\, G\big(E_j-E'\big) \, ,\\[5pt] \label{eq:NDM} \end{equation} where $\text{d}\Phi^{{\scriptscriptstyle \text{DM}}}_{\gamma}/{\text{d}E'}$ is the energy-differential self-annihilation spectrum defined in Eq.~(\ref{eqn:flux}), see Sec.~\ref{sec:interpretSignal} for a discussion of the conventions used when comparing the different theory approximations. The instrument response function is encoded in the following two terms: $A_{\rm eff}^{\gamma}$ is the energy-dependent acceptance to gamma-rays; and $G$ is a Gaussian that models the finite energy resolution of the instrument. The gamma-ray acceptance for H.E.S.S.-I observations of the GC region is extracted from~\cite{lefra2016}, and following~\cite{Abdallah:2018qtu}, a width of $\sigma/E$ of 10\% is used in $G$. The backgrounds for gamma-ray measurements are dominated by CR protons and nuclei reaching the Earth's atmosphere. While the majority of these CRs can be efficiently rejected using both a shower shape parameter measurement and a stereoscopic view of the events seen by the IACT~\cite{Aharonian:2006pe}, a fraction of them cannot be distinguished from showers initiated by VHE gamma-rays, implying that there is a limit to our ability to reject the CR background. Following~\cite{2013APh43171B}, the overall CR flux includes the flux measurements of CR protons and helium as well as electrons and positrons. Given the finite discrimination between gamma-rays and CR protons and nuclei, a constant rejection factor of 10 is assumed. On the other hand, showers initiated by electrons and positrons may be distinguished from those from gamma-rays using the reconstructed primary interaction depth on the incident particle in the atmosphere -- here we use a constant rejection factor of 1. Following Eq.~(\ref{eq:NDM}), the expected number of background photons $N_{\rm B}$ from the residual CR background can be computed using \begin{equation} N_{\text{B},ij} = T_{\text{obs},i} \int_{E_j-\Delta E_j/2}^{E_j+\Delta E_j/2} \text{d}E' \,\frac{\text{d}\Gamma_{\text{B},ij}}{\text{d}E'} \,, \end{equation} where \begin{equation} \frac{\text{d}\Gamma_{\text{B},ij}}{\text{d}E} = \int_{-\infty}^{\infty}\!\text{d}E'\,\frac{\text{d}\Phi^{\text{CR}}_{\gamma,ij}}{\text{d}E'}\big(\Delta\Omega,E'\big) A_{\text{eff}}^{\text{CR}}\big(E'\big)\, G\big(E_j-E'\big) \,, \\[5pt] \label{eq:NBck} \end{equation} where $\text{d}\Phi^{\text{CR}}_{\gamma}/{\text{d}E'}$ is the overall CR flux, and $A_{\rm eff}^{\rm CR}$ is the energy-dependent acceptance for CRs. Here we assume that $A_{\rm eff}^{\rm CR} = \epsilon_{\rm CR}\, A_{\rm eff}^{\gamma}$, where $\epsilon_{\rm CR}$ is the CR efficiency and is taken to be 10\% over the full energy range considered here. Additionally, a known gamma-ray contamination due to the Pevatron in the GC~\cite{Abramowski:2016mir} is added to the first two ROIs. Refining our mock description of the H.E.S.S. response function in the GC region would require a full simulation of the instrument, which is beyond the scope of the present study. \begin{figure}[tbh] \begin{center} \includegraphics[width=0.48\textwidth]{Plots/Fig6} \caption{Mean expected upper limits at 95\% C.L. on the $J$-factor as a function of the DM mass $m_{\scriptscriptstyle \text{DM}}$. } \label{fig:Jcorelimit} \end{center} \end{figure} The left panel of Fig.~\ref{fig:signal} shows the expected fluxes in ROI 2 for a 3 TeV wino with a velocity-weighted annihilation cross section of $\langle \sigma\,v \rangle_\text{line} = 10^{-27} \text{ cm}^3\text{ s}^{-1}$ for both the Einasto and 0.5 kpc-size cored DM profiles. The CR proton plus nucleus flux and the CR electron flux are also plotted. The gamma-ray flux from the Pevatron detected by H.E.S.S. is shown for the same ROI. The right panel of Fig.~\ref{fig:signal} shows the differential count rate of signal in ROI 2 for a 3 TeV wino with $\langle \sigma\,v \rangle_\text{line}$ = 10$^{-27}$ cm$^3$s$^{-1}$, and the residual background, respectively. This provides some intuition for how the signal and background rates compare in the GC. The task of our statistical framework is then to distinguish these two sources of gamma-rays from each other such that annihilating winos could be discovered using H.E.S.S.. \subsection{Statistical Procedure} Our statistical procedure utilizes the maximal likelihood approach. The 2D-binned likelihood function in the $i$-th spatial bin (corresponding to the annular ROI) and in the $j$-th energy bin is a product of the Poisson probabilities in the ON and OFF regions. Denoting $\text{Pois}(\lambda,k) = e^{-\lambda}\,\lambda^k/k!$, we have \begin{align} &\mathcal{L}_{ij}\big(N^{\rm ON},N^{\rm OFF},\alpha \big|N_{\rm S}^{\text{ON}},N_{\rm S}^\text{OFF},N_{\rm B}\big)= \\[5pt] &\text{Pois}(N_{\text{S},ij}^\text{ON}+N_{\text{B},ij}, N^{\text{ON}}_{ij} ) \text{Pois}( N^\text{OFF}_{\text{S},ij}+\alpha_i\, N_{\text{B},ij}, N^{\text{OFF}}_{ij} )\,,\nonumber \end{align} where again the subscripts denote the $i$-th ROI and the $j$-th energy bin. Here $N^{\rm ON}$ and $N^{\rm OFF}$ are the measured count numbers in the ON and OFF regions respectively, while $N_{\rm S}^{\rm ON}$ and $N_{\rm S}^{\rm OFF}$ correspond to the expected DM signal in the ON and OFF regions, respectively. $N_{\rm B}$ is the count number of the expected residual background, which is the same in both the ON and OFF region. The $\alpha_i$ parameter defined as $\alpha_i \equiv \Delta \Omega^{\rm OFF}/\Delta \Omega^{\rm ON}$ corresponds to the ratio between the solid angle of the OFF region to that in corresponding ON region. Here we take $\alpha_i= 1$ and $N_{\rm S}^\text{OFF}$ = 0, since the OFF count numbers are obtained from a simulation of the residual background. The full likelihood is then given by the product of the likelihoods for each bin in the given ROI \begin{align} \mathcal{L} = \prod\limits_{i \in \text{ROI}} \prod\limits_j \mathcal{L}_{ij}\,. \end{align} Through this likelihood, we can use the data to compute a limit on the following combination of parameters as a function of mass, \begin{align} \kappa = \langle \sigma\,v \rangle_\text{line} \times J(\Delta\Omega)\,. \end{align} In detail, we do this using the likelihood ratio test statistic defined by \begin{align} {\rm TS}(m_{\scriptscriptstyle \text{DM}})=-2 \ln\left[\frac{\mathcal{L}\big(m_{\scriptscriptstyle \text{DM}},\kappa \big)}{\mathcal{L}\big(m_{\scriptscriptstyle \text{DM}}, \widehat{\kappa} \big)}\right]\,, \end{align} where $\widehat{\kappa}$ denotes the value of $\kappa$ which maximizes the likelihood for the given DM mass. Then, for a given model prediction for $J(\Delta\Omega)$, we can convert this constraint into one on $\langle \sigma\,v \rangle_\text{line}$, or similarly a constraint on the $J$-factor for a given cross-section model. The TS distribution follows an approximate $\chi^2$ distribution with one degree of freedom. Values of TS equal to 2.71 provides one-sided upper limits on $\langle \sigma\,v \rangle_\text{line}$ at a 95\% Confidence Level (C.L.). 100 Poisson realizations of the expected signal and of the expected background are performed. For each realization, the likelihood ratio test statistic is computed to obtain the expected limit. We show the mean expected limit on $\langle \sigma\,v \rangle_\text{line}$, together with bands calculated as follows. We derive the standard deviation of the distribution of the $\langle \sigma\,v \rangle_\text{line}$ values obtained from our 100 realizations and combine this linearly with the systematic and theoretical uncertainties. This value is used to determine the one and two sigma deviations from the mean, thereby providing the bands shown below in Fig.~\ref{fig:compare}. \section{Results and Prospects} \label{sec:results} \begin{figure*}[tbh] \begin{center} \includegraphics[width=0.48\textwidth]{Plots/Fig7a} \hfill \includegraphics[width=0.48\textwidth]{Plots/Fig7b} \caption{ {\it Left:} Mean expected upper limits at 95\% C.L. on the wino annihilation cross section $\langle \sigma\,v \rangle_\text{line}$ as a function of the DM mass $m_{\scriptscriptstyle \text{DM}}$ assuming the full line + endpoint + continuum spectrum considering ROIs up to $1^\circ$, where the profile is varied as labeled in the legend. The NLL cross section for wino DM is shown in gray. {\it Right:} Mean expected lower limits at 95\% C.L. on the DM core size as a function of the DM mass $m_{\scriptscriptstyle \text{DM}}$, required to save the wino model.} \label{fig:corelimit} \end{center} \end{figure*} Fig.~\ref{fig:compare} shows the 95\% C.L. upper limits on the velocity-weighted annihilation cross section $\langle \sigma\,v \rangle_\text{line}$ as a function of the wino mass assuming ROIs up to 1$^{\circ}$. The left panel of Fig.~\ref{fig:compare} shows the 95\% C.L. mean expected upper limits together with the 68\% and 95\% containment bands, for the Einasto DM profile. The containment bands include the systematic uncertainties for DM searches in the GC region as estimated by H.E.S.S. in~\cite{Abdallah:2018qtu}. The main sources of error come from the small dependence of energy resolution on the observation conditions, the imperfect knowledge of the energy scale, and the influence of the variation of the night sky background (NSB)\footnote{The NSB corresponds to the optical photons emitted from bright stars in the field of view of the telescope.} in the field of view on the event count measurements. The inhomogeneous NSB rate in the field of view of the GC observations implies a a shift in the limits from a few percents up to 60\% depending on the DM mass range. The systematic uncertainties can likely be lowered down using �accurate simulations of the residual background~\cite{Holler:2017ynz} in the same instrumental and observational conditions of the ROIs in the GC. In particular, the measured NSB rate in each pixel of the region of interest can be used allowing for further subtraction of this component. As pointed out in~\cite{Abdallah:2018qtu}, a systematic uncertainty in the energy scale of 10\% shifts the limits by up to 15\%. The weak dependency of the energy resolution on the observational condition is a subdominant source of systematic uncertainty. An artificial deterioration of the energy resolution by a factor two would only weaken the limits by 25\%. The theoretical uncertainty from the full wino spectrum is taken into account, it yields an uncertainty on the limits from a few percents up to $\sim10\%$ at the highest masses. The NLL theory cross section for a wino as a function of $m_{\scriptscriptstyle \text{DM}}$ is shown in gray. Further sophisticated DM searches in the GC will tackle the experimental systematic uncertainties in this complex environment by a careful consideration of the instrumental and observational conditions in the analyses. Provided that the sources of systematic uncertainties can be controlled up to a level of the theoretical uncertainty a higher precision in the theoretical computation may be relevant. \begin{figure*}[tbh] \begin{center} \includegraphics[width=0.48\textwidth]{Plots/Fig8a} \hfill \includegraphics[width=0.48\textwidth]{Plots/Fig8b} \caption{{\it Left:} Mean expected upper limits at 95\% C.L. on the wino annihilation cross section $\langle \sigma\,v \rangle_\text{line}$ as a function of the DM mass $m_{\scriptscriptstyle \text{DM}}$ assuming the full line + endpoint + continuum spectrum considering ROIs up to $4^\circ$, where the profile is varied as labeled in the legend. A 250 hour homogeneous exposure is assumed over all the ROIs. The NLL cross section for wino DM is shown in gray. {\it Right:} Comparison of 95\% C.L. mean expected upper limits on $\langle \sigma\,v \rangle_\text{line}$ versus core radius size $r_{\rm c}$ for a 2.9 TeV wino using the IGS observation strategy with respect to the H.E.S.S.-I-like observation strategy. The limits assuming a 500 hour homogeneous exposure over the ROIs up to $1^\circ$ are also shown.} \label{fig:prospects} \end{center} \end{figure*} The right panel of~Fig.~\ref{fig:compare} shows the 95\% C.L. mean expected upper limits from the line signal, the line + endpoint spectrum, and the full spectrum given by the line + endpoint + continuum contributions. The limits for wino DM are driven by the line signal for TeV masses. The contribution of the endpoint signal compared to the line-only signal is significant and increases with the DM mass. For DM masses of 2.3 TeV, 2.9 TeV and 9 TeV, the endpoint contribution improves the line-only limit by a factor 1.4, 1.5 and 2.1, respectively. The continuum signal is subdominant compared to the endpoint contribution, but its contribution increases with the DM mass. For a DM mass of 2.3 TeV, 2.9 TeV and 9 TeV, the continuum contribution improves the line plus endpoint limits by 8\%, 12\% and 27\%, respectively. Given our poor knowledge of the DM distribution in the GC region, it is useful to instead express the overall limits for pure wino DM (assuming it constitutes 100\% of the DM) as a limit on the total $J$-factor for the ROI. We show this $J$-factor limit as a function of the DM mass in Fig.~\ref{fig:Jcorelimit}. Due to the Sommerfeld enhancement, which yields resonances in the annihilation cross section at specific DM masses, very strong constraints on the $J$-factor are obtained at 2.3 and 9 TeV DM masses, respectively. The left panel of Fig.~\ref{fig:corelimit} shows the impact of a cored DM distribution in the GC on the 95\% C.L. mean expected limit on $\langle \sigma\,v \rangle_\text{line}$. For cored profiles, the limits degrade by a factor up to 200 compared to the Einasto profile assuming core radii up to 5 kpc. For a 2.3 TeV DM mass, DM profiles with core radii lower than 5 kpc can be excluded. For DM mass of 9 TeV, DM profiles with core radii lower than 3 kpc can be excluded, as shown in the right panel of Fig.~\ref{fig:corelimit}. At the thermal DM mass of 2.9 TeV, the forecast limit on the core size is approximately 2 kpc. The H.E.S.S. collaboration is pursuing an inner Galaxy survey (IGS) of the central several degrees of the GC region~\cite{Abdallah:2018qtu}. While the H.E.S.S.-I-like observations of the GC region were defined with pointing positions of the telescopes up to 1.5$^{\circ}$ from the Galactic plane, the observation strategy currently carried out utilizes pointing positions up to 3$^\circ$ in Galactic latitudes. We now compute projected expected limits considering all the ROIs up to 4$^{\circ}$ from the GC (IGS-like strategy) with a homogenous exposure over all the ROIs with observations assuming only phase-I telescopes for the gamma-ray event selection and reconstruction. We compute the signal and background counts in all the ROIs up to 4$^{\circ}$ following the procedure described in Sec.~\ref{sec:mockdata}. The left panel of Fig.~\ref{fig:prospects} shows the 95\% C.L. mean expected limit on $\langle \sigma\,v \rangle_\text{line}$ as a function of the wino mass for the DM profiles considered in this study. For cored DM profiles the limits degrade only by a factor up to $\sim70$ compared to the Einasto profile assuming core radii up to 5 kpc. The dependence of the limits on the DM profile shape in the inner region of the Milky Way is less pronounced with the IGS observation strategy compared to the H.E.S.S-I-like one. The right panel of Fig.~\ref{fig:prospects} shows the 95\% C.L. mean expected limit on $\langle \sigma\,v \rangle_\text{line}$ as a function of the core radius size for a wino DM mass of 3 TeV. Using the IGS observation strategy, the limits improve significantly over the ones obtained from H.E.S.S.-I-like one. For the Einasto and 3 kpc core DM profile, the improvement is a factor of 1.8 and 5, respectively. The ratio of the IGS-like limits over the H.E.S.S.-I-like limits versus core radius size improves up to a core radius of $\sim 1$ kpc. Beyond this radius, the improvement follows the ratio between $J$-factors computed in 1$^{\circ}$ and 4$^{\circ}$ ROIs. For the thermal wino mass of 2.9 TeV, this translates to a projected core size limit of approximately 4.5 kpc. Doubling the overall exposure in the inner 1$^{\circ}$ would only slightly increase the limits. The limits improve by 37\% with respect to the H.E.S.S.-I-like limits independent of the DM profile core radius. \section{Conclusions} \label{sec:summary} We show the prospects for wino DM over a mass range from 1 TeV up to 70 TeV using VHE gamma-ray observations of the GC that rely on the most-up-to-date EFT computation of the annihilation spectrum of winos. We build realistic mock data simulations of H.E.S.S.-I-like observations of the GC region and implement spectral and spatial analysis of the VHE emissions. We compute the sensitivity to wino DM using a binned likelihood test statistic ratio using the spectral and spatial information of signal and background. Various DM density distributions in the GC region are considered including DM density cores up to 5 kpc. We show that ($i$) the line contribution to the wino annihilation spectrum drives the overall limits in the TeV mass range, ($ii$) the endpoint contribution significantly improves the sensitivity compared to the line-only signal with increasing importance for higher DM masses, and ($iii$) the continuum contribution is sub-dominant compared to the line and endpoint contributions but becomes more relevant as the DM mass increases. The present sensitivity of H.E.S.S.-I-like observations is able to provide strong constraints on wino DM. We show for the case of winos constituting 100\% of the DM that strong constraints on the DM density in the central region of the Milky Way can be obtained using H.E.S.S.-I-like observations of the GC region. In particular, DM cores up to several kpc radii could be excluded for 2.3 and 9 TeV masses respectively, where the Sommerfeld effect strongly enhances the annihilation cross section through resonances. We additionally provided a sensitivity projection for H.E.S.S.-I-like observations of the GC region using the IGS strategy. For the thermal wino mass of 2.9 TeV, we find a projected core size limit of approximately 4.5 kpc. This makes clear that future searches will provide a decisive test for the wino under reasonable assumptions for how the DM is distributed in the center of the Milky Way at kpc scales. \begin{acknowledgments} We are particularly grateful to M.~Solon for his collaboration on the leading log theory result. MB is supported by the Office of High Energy Physics of the U.S. Department of Energy under Contract No. DE-SC-0000232627. NLR and TRS are supported by the U.S. Department of Energy, under grant numbers DE-SC00012567 and DE-SC0013999. NLR is further supported by the Miller Institute for Basic Research in Science. IM is supported by the Office of High Energy Physics of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231. TC is supported by the U.S. Department of Energy, under grant numbers DE-SC0018191 and DE-SC0011640. IWS is supported by the Office of Nuclear Physics of the U.S. Department of Energy under the Grant No. DE-SCD011090 and by the Simons Foundation through the Investigator grant 327942. VV is supported by the Office of Nuclear Physics of the U.S. Department of Energy under the Grant No. Contract DE-AC52-06NA25396 and through the LANL LDRD Program. \end{acknowledgments} \end{spacing}
\section{Introduction} When deep learning shows excellent results in more and more areas, it is becoming more and more important to understand its internal working principles and can explain some phenomena. Back-propagation~\cite{Authors12} plays an important role in deep learning field, the principle is use of gradients calculated for each iteration to update the parameters. It build the foundation for alexnet's excellent performance in ImageNet~\cite{Authors19} competition in 2012, though there are still many problems in backpropagation, such as gradient vanishing/exploding, etc, so far it is still an open question. One of the reason is that the derivative in the nonlinear layer may tend to very small or very big value, which is exacerbated by the accumulation of multiple layers, resulting in the network cannot become deeper or hard to train. Researchers mostly solved this problem by using ReLU~\cite{Authors26} activation functions, better initialization methods~\cite{Authors21}, and skip connection by ResNet~\cite{Authors17}, which is proposed by Kaiming He. It either can solve this problem in terms of network structure and can be quickly transmitted through the residual structure effectively. In this paper, we multiply the loss of loss function calculation by a random number between 0 and 1, and use it as a new loss for parameter optimization, in other words, the new loss is less than original loss because of a random number. Of course it can also be called random loss, however, since the derivation process will indirectly result in a random gradient, we are collectively called as random gradient. We used a variety of learning rates and momentum to experiment random gradient methods, drew some theory based on experimental phenomena, obtained the characteristics of the model at random gradients and some training skills. Experiments show that this is faster and better result, we have the following contributions: \begin{itemize} \item We designed a random gradient for backpropagation, multiplying the loss value with a random number. \item Experiments show that the random gradient can effectively accelerate the convergence and reduce oscillation during optimization. \item We draw a close connection between RG, learning rate, task categories, and momentum, and come to a complete set of theory. \end{itemize} We have not shown the results on some large datasets, the main reason is that we cannot afford the time such as ImageNet~\cite{Authors19} or MSCOCO~\cite{Authors27}. The proposed method is evaluated on the Pascal VOC 2012 datasets~\cite{Authors16} for semantic segmentation, and cifar datasets~\cite{Authors23} for image classification task, also have cityscapes~\cite{Authors47}, maps (scraped from Google Maps.) dataset for GANs, these experiments can be approximated as the performance of the network at different scales and different tasks, we also hope that if researchers are interested in this work, they can further study and improve performance. The following is a brief introduction to semantic segmentation, image classification, and generation adversarial networks. Semantic segmentation task contains 20 foreground object classes and one background class, dataset contains 1,464 (train), 1,449 (val), and 1,456 (test) pixel-level annotated images. The performance is measured in terms of pixel intersection-over-union averaged across the 21 classes (mIOU), but the commonly used extra annotations datasets~\cite{Authors48} will not be used to improve accuracy. Inspired by~\cite{Authors48}, we use the "poly" learning rate policy that the current learning rate equals to the base one multiplying $(1-\frac{iter}{max-iter})^{power}$. We set the base power to 0.9, we use the random mirror for data augmentation. Image classification task which using several excellent networks for training. Two CIFAR datasets \cite{Authors23} consist of colored natural images with 32$\times$32 pixels, CIFAR-10 consists of images drawn from 10 and CIFAR-100 from 100 classes. The training and test sets contain 50,000 and 10,000 images respectively. We adopt a standard data augmentation scheme (mirroring/shifting) that is widely used for these two datasets. For preprocessing, we normalize the data using the channel means and standard deviations. Generative Adversarial Networks (GANs)~\cite{Authors40,Authors41} have achieved impressive results in image generation~\cite{Authors42,Authors43}, and representation learning~\cite{Authors44}. The key to GANs’ success is the idea of an adversarial loss that forces the generated images to be, in principle, indistinguishable from real images. This is particularly powerful for image generation tasks, as this is exactly the objective that much of computer graphics aims to optimize. We used the excellent pix2pix~\cite{Authors46} network to experiment, batch size is 8, and other settings were strictly followed by the article. \begin{figure}[t] \centering \includegraphics[width=12.5cm]{fig1.png} \caption{{\bf Left}: an example of the loss function topology. {\bf Right}: When using PSPNet on semantic segmentation results, "-" represents the upper and lower limits of the random number. we set the "batchsize" to 4 during training on a GTX1060 and "cropsize" is 224 $\times$ 224.} \label{fig:1} \end{figure} \section{Background and Inspiration} In the area of accelerating training, researchers have put more attention on how to adjust the hyperparameters such as learning rate, batch size and momentum or design an optimization algorithm to improve performance, both them exists extensive literature on accelerating training. In this paper, convergence stop as a criterion for judging whether training is completed. In~\cite{Authors02,Authors03,Authors07,Authors09}, researchers get a way to improve speed of convergence by changing the learning rate or adjustment the batch size. In \cite{Authors06}, the authors analyzed in detail three factors influencing minima, which is learning rate, batch size and the variance of the loss gradients, and experimentally verify that the noise $n = \frac{\eta}{S}$ ($\eta$ is the learning rate, $S$ is the batch size) determines the width and height of the minima towards which SGD converges. In~\cite{Authors01}, the authors found a super convergence phenomenon, one of the key elements of super convergence is training with cyclical learning rates~\cite{Authors07} and a large maximum learning rate. Another direction is design a new optimization algorithm to achieve improvement, such as~\cite{Authors04,Authors05}, they based on adaptive estimates of lower-order moments, generally faster than SGD convergence, however, in some cases it is inferior to SGD performance. We also tested the performance of the random gradient method on Adam and proved that our method is not limited to SGD. \cite{Authors13} proposes that the information transmitted in opposite direction in the brain is an order of magnitude larger than that passed forward, and neuroanatomy also confirms this view, this book gives us a deep understanding of the brain feedback mechanism. Although the current artificial neural network is very different from the brain, we wish to do some similar experiments. So we tested a variety of weights applied to the loss function, to simulate the feedback mechanism of the brain. On the right side of Figure \ref{fig:1} is the result which measured using PSPNet-101~\cite{Authors37} under the same conditions, since we have fixed the learning rate and momentum, so we can directly see the influence of the RG on the model. What surprised us is that when the weight becomes larger, the result will be worse, but when the weight is random reduced, the effect will be better, when the weight becomes a random number of zero to one, the effect is best, and there is also the same effect on image classification. The left side of Figure \ref{fig:1} can be more intuitive understanding, suppose we only have two parameters that need to be optimized, this can be visualized in a three-dimensional coordinate system, the vertical axis is the value of the loss function, our finial goal is to minimize the loss function. We selected stochastic gradient descent method (SGD) for parameter updating, but the adjustment of the learning rate in SGD is crucial, excessively large may result in missing the local minimum or a better solution; too small may cause the parameter updating too slow. The orange line shows the gradient descent under normal conditions, it can be seen that there is a great deal of oscillating near the optimal value, usually we need to constantly adjust the learning rate. The black line on the right is the method proposed by us. Use the loss to multiply by a random number, it will ensure that there will not much oscillate in the optimization process under the same conditions, and we use the momentum~\cite{Authors28} method to make up for the lack of gradients, it can actually be faster convergence to local minimum or a better solution. Assume that in a more complicated example, such like the left side of Figure \ref{fig:1_2}, gradient descent direction may oscillate during optimization, random gradient method can effectively reduce this phenomenon by randomly decreasing the updated gradient each time. \begin{figure}[t] \centering \includegraphics[width=12.5cm]{fig1_2.png} \caption{{\bf Left}: Hessian matrix with ill-conditioning. {\bf Right}: Comparison between random gradient and momentum, RG represents random gradient.} \label{fig:1_2} \end{figure} \section{Analysis Optimization Method} Gradient descent is an optimization method that uses the slope as computed by the derivative to move in the direction of greatest negative gradient to iteratively update a variable. That is, given an initial point {$x_0$}, gradient descent proposes the next point to be: \begin{equation} x = x_0 - \eta\frac{dJ}{dx_0} \end{equation} When $\eta$ is the learning rate, fraction is the derivative of the loss function to $x_0$. It can be seen that our method random reduce the value on the right meanwhile the learning rate remains unchanged. Stochastic gradient descent is currently the most widely used optimization method, there are substantial discussion that why this solutions generalize so well in grateful literature~\cite{Authors08,Authors10,Authors11}. At each step $t$, a mini batch of $B$ samples $x_i$ is selected from the training set, the gradients of loss function $\nabla L(x_i,w)$ are computed from this subset, and networks weights $w$ are updated based on this stochastic gradient descent: \begin{equation} w_{t+1} = w_{t} - \eta\frac{1}{B}\sum_{i=1}^{B}\nabla L(x_i,w) \end{equation} Recently, many researchers no longer use vanilla SGD, instead preferring SGD with momentum~\cite{Authors28}. Momentum-based stochastic gradient descent methods are widely used in practice for training deep networks: \begin{equation} \begin{aligned} &v = \alpha v - \eta\frac{1}{B}\sum_{i=1}^{B}\nabla L(x_i,w)\\ &w_{t+1} = w_{t} + v \end{aligned} \label{equation_3} \end{equation} It can be seen that the momentum method add the influence of the previous gradient on the present, in~\cite{Authors09}, the authors believes increasing the momentum coefficient will accelerate convergence, though it is likely to lose some accuracy. And we found that the random gradient method is dependent on momentum to compensate for the loss of random numbers against gradients, this is also the reason why rapid convergence can be achieved even when the gradient decreases. Supposing that the random number is very small, and the new gradient is very small too, when the momentum method is not to be used, the parameter update speed will be very slow. At this moment, the momentum method ensures that even if the current gradient is very small, the parameters can be updated greatly. It sounds very reasonable, but in the experiment, momentum only works under certain conditions. Like in classification tasks, our highest point is only 0.5, but in semantic segmentation tasks, we generally adjust it to 0.9 as the lowest point. We believe that the main reason is the requirement about the learning rates of two tasks are different. It is well known that classification tasks require greater learning rates. Under the assumption above, the gradient update is mainly from the current gradient in the classification task, and the gradient update is mainly from the accumulation of the previous gradient in the segmentation task. As can be seen in the right side of Figure \ref{fig:1_2}, momentum plays a crucial role in the speed of convergence. Compared to the normal method, the random gradient method hadn't lose precision under the precondition of accelerating convergence. As can be seen in the Figure \ref{fig:2}, we use ResNet-DUC+HDC~\cite{Authors49} to experiment. When the momentum is 0, the efficiency of random gradient method is not the highest, and it not obvious improve the convergence speed, when the momentum is 0.9, the advantage of the random gradient is obvious, the accuracy is better than the original gradient, and compared to using the original gradient method with momentum=0, the accuracy has not been lost. On the left side of Figure \ref{fig:2}, when the momentum of the model is 0.95, if the comparison under the same conditions, convergence speed and accuracy have great improvement, but it will inevitably lose some accuracy. We can further hypothesis that when the loss weight increases, reducing the learning rate can theoretically achieve a certain increase, such is the fact, the bottom right of Figure \ref{fig:3} is the result of this experiment. However, the consequence of this is that the convergence speed becomes slower and more complicated, this is not what we want, we do not have more in-depth experiments. \begin{figure} \centering \includegraphics[width=12.5cm]{fig2.png} \caption{This experiment was conducted using ResNet101-DUC+HDC at a learning rate of 0.001 using the SGD optimization algorithm on the semantic segmentation tasks. {\bf Left}: Comparison between random gradient and original gradient when momentum = 0.95. {\bf Right}: Comparison between random gradient and original gradient when momentum is 0 and 0.9.} \label{fig:2} \end{figure} In addition, regularization~\cite{Authors25} is also often used on optimize models, such as dropout~\cite{Authors50} (This article does not explain the dropout in detail), others like $L_{1}$ regularization and $L_{2}$ regularization (also called weight decay), make the parameter as close as possible to zero or direct equal to zero. As report by \cite{Authors38}, $L_{2}$ regularization sometimes even helps optimization. In the experiment, we used $L_{2}$ regularization = 0.0005. The basic formula is as follows: \begin{equation} w_{t+1} = w_{t} - \eta(\frac{1}{B}\sum_{i=1}^{B}\nabla L(x_i,w) + L_{2}w) \end{equation} For convenience, we denote the parameters in a network as $\theta\in R^{N}$ and $f(x)$ is the loss function, $\sigma$ is non-linearity layers, $x$ is input, a network can be simplified as: \begin{equation} f(x) = \sigma(w_{l}\sigma(w_{l-1}\sigma(w_{l-2}\dots\sigma(w_{0}x + b_0)\dots) + b_{l-1}) + b_l) \end{equation} The Hessian-free optimization method was proposed by~\cite{Authors31} suggests a second order solution that utilizes the slope information contained in the second derivative (i.e., the derivative of the gradient $\nabla_{x}f(x)$), the main idea of the second order Newton's method is that the loss function can be locally approximated by the quadratic as: \begin{equation} f(x) \approx f(x_{0}) + (x-x_{0})^{\top}\nabla_{x}f(x_{0}) + \frac{1}{2}(x-x_{0})^{\top}H(x-x_{0}) \end{equation} Where $H$ is the Hessian, or the second derivative matrix of $f(x_{0})$. In general, it is not feasible to compute the Hessian matrix, which has $\Omega(N^2)$ elements, where $N$ is the number of parameters in the network, but it is unnecessary to compute the full Hessian. The Hessian expresses the curvature in all directions in a high dimensional space, but the only relevant curvature direction is in the direction of steepest descent that SGD will traverse. This concept is contained within Hessian-free optimization, as \cite{Authors31} suggests a finite difference approach for obtaining an estimate of the Hessian from two gradients: \begin{equation} H(x) = \lim_{\delta \to 0}\frac{\nabla f(x+\delta)-\nabla f(x)}{\delta} \end{equation} Where $\delta$ should be in the direction of the steepest descent. Although Hessian-free optimization method has not been widely used due to its impractical to invert or even store the Hessian matrix and promotion effect is not obvious, but we still consider it is necessary to mention the Hessian-free matrix to help us to understand model optimization more deeply in second-order optimization method. At the end of this section, we will mention the current optimization method Adam, which can converge more quickly. Adam~\cite{Authors04} is a simple and computationally efficient algorithm for gradient-based optimization of stochastic objective functions, but it takes extra memory and computing resources. We have further verified the effectiveness in this paper, it is proved that our method is also suitable for this kind of optimization algorithm. \section{Random Gradient} The above shows the basic formulas of optimization methods, it can be seen that the size of the learning rate and gradient directly determines the extent of the update. However, because the learning rate is associated with the batch size and is limited by the memory size of the hardware, our main breakthrough is to adjust the gradient. RG is available in almost all machine learning frameworks, such as mxnet~\cite{Authors15}, pytorch~\cite{Authors14}. Furthermore, our approach theoretically can be applied to nearly every existing deep learning architecture. The basic code structure is as follows: \begin{verbatim} for input, target in dataset: optimizer.zero_grad() output = model(input) loss = criterion(output, target) loss_random = loss * random() loss_random.backward() optimizer.step() \end{verbatim} Using RG can speed up training, although theoretically every parameter update gradient is attenuated, our experiment still have achieved great success. Similar to what is shown in Equation \ref{equation_3}, momentum method uses the previous gradient to correct the problem of the current gradient, the RG by randomly reducing the current gradient to improves performance, and it can be combined with the momentum method, make up for the impact of RG on the gradient. \begin{table}[!htp] \small \begin{center} \begin{tabular}{l|l|l|l|l|l|l|l|l} \hline Learning Rate & 0.01 & 0.01 & 0.001 & 0.001 & 0.01 & 0.01 & 0.0001 & 0.0001 \\ \hline Random Gradient & & $\surd$ & & $\surd$ & & $\surd$ & & $\surd$ \\ \hline Momentum & 0.95 & 0.95 & 0.95 & 0.95 & 0.90 & 0.90 & 0.95 & 0.95 \\ \hline Mean IOU & 31.940\% & 28.357\% & 65.473\% & 68.014\% & 28.121\% & 47.620\% & 69.076\% & 68.681\% \\ \hline \end{tabular} \end{center} \caption{This experiment uses PSPNet101 sets the batchsize is 4 and the cropsize is 224$\times$224, running on a single GTX1060. \label{table1} } \end{table} \subsection{Theoretical Analysis}\label{Theoretical Analysis} The most common training method is when the model stops converge is to decay the learning rate, which factor is typically 0.1. When decay two or three times, the model becomes unable to converge through the decay learning rate, normally, this means that training can stop. But in this paper, using random gradient strategy, the model can converge under a smaller gradient, and to explain random gradient can start with the second-order Taylor series expansion of the cost function: \begin{equation} f(x) \approx f(x_{0}) - \eta g^{\top}g + \frac{1}{2}\eta^{2}g^{\top}Hg \end{equation} \cite{Author52} states: \textit{There are three terms here: the original value of the function, the expected improvement due to the slope of the function, and the correction we must apply to account for the curvature of the function. In many cases, the gradient norm does not shrink significantly throughout learning, but the $g^{\top}Hg$ term grows by more than an order of magnitude.} When the model has been oscillating without any performance improvement, it can be considered that $g^{\top}Hg$ is already large enough to affect convergence. The result is that learning becomes very slow despite the presence of a strong gradient, and the model will continue to oscillate. \textbf{The random gradient strategy has come to the fore, on the premise of no loss of convergence speed, smaller gradient becomes the key sir, scored twice to further improve performance.} \begin{figure}[!h] \centering \includegraphics[width=12.5cm]{fig7.png} \caption{{\bf Left}: Comparison between random gradient and original method When changing Learning rate or Momentum. {\bf Right}: The Effect of Momentum on the ResNeXt.} \label{fig:7} \end{figure} \section{Experiment and Analysis} In this section, we will present some experimental data and analysis. However, it is frustrating that we currently have only one GTX1060, it cannot support excessive data calculations, perhaps the experimental results did not reach the highest level but fair and convincing experiments will prove the above results. What needs to be clarified is, although the random gradient method is very simple, but because we are involved in three areas and a variety of experiments, the experiment code will be published in \url{https://github.com/leemathew1998/RG} to facilitate researchers to obtain some details not mentioned in this paper. \begin{figure}[h] \centering \includegraphics[width=12.5cm]{fig3.png} \caption{{\bfseries Upper left:} ResNet-34 performance on cifar 10 with different momentum. {\bfseries Upper right:} MobileNet-V2 performance on cifar 10 with different momentum. {\bfseries Bottom left:} DenseNet-121 performance on cifar 10 with different momentum. {\bfseries Bottom right:} When the loss weight is 3, the performance under different learning rates.} \label{fig:3} \end{figure} \subsection{Semantic Segmentation and Image Classification} In Table \ref{table1}, it can be observed that when the learning rate is 0.01, the momentum is 0.95, under the combined effects of the two adverse conditions (learning rate and momentum for semantic segmentation task was too big.), both the network performance is very poor. When only reducing the learning rate to 0.001, networks with random gradients are better than the original network; however, when we fixed the learning rate (0.01) and reduce the momentum to 0.90, the result is still similar. From this we can conclude that adjusting the learning rate or momentum has the same effect in random gradients, but the learning rate can more improve the performance of the network, this is a unique feature of random gradients. When the learning rate is 0.0001 and the momentum is 0.95, the accuracy of a random gradient is slightly worse than the original gradient, this also shows that a better learning rate is more efficient than momentum. This conclusion also applies to image classification, as shown in the left side of Figure~\ref{fig:7}, when lr is 0.1 and momentum is 0.95, both models perform poorly, when one of the conditions is changed, and the results are greatly improved. \begin{figure} \centering \includegraphics[width=12.5cm]{fig4.png} \caption{"random" represents a random gradient method used in the experiment. {\bf Left}: Comparison between random gradient and original gradient when change learning rate. {\bf Right}: Comparison between random gradient and original method when change momentum or learning rate.} \label{fig:4} \end{figure} In the image classification task, we selected three excellent performance networks: ResNet \cite{Authors17}, DenseNet \cite{Authors18} and MobileNetV2~\cite{Authors30}, we verify the relationship between momentum and model's accuracy. For the sake of simplicity, we fixed the initial learning rate to 0.1 and constantly adjusted the value of momentum and loss weight, it can be observed in Figure~\ref{fig:3} that the optimal momentum value for each model is not fixed. In general, setting a momentum of 0.5 in an image classification task will be a good choice. About the speed of convergence, it can be clearly seen in ResNet34 that the speed of convergence has accelerated, however, there is no obvious speed advantage in other models. In this article, we do not intend to continue to discuss in depth how ResNet network architecture relates to accelerated convergence, but we think this should be an interesting issue, because we tested a lot of models, ResNet and its variants~\cite{Authors17,Authors32,Authors33,Authors34} seem to be easier to get better results, the right side of Figure~\ref{fig:7} is our further experiment. About the accuracy rate, the improvement was not obvious in some cases, mainly because we fixed the learning rate. In Fig~\ref{fig:4}, we put more attention on the learning rate. In the left side, we show the results in the image classification field when the momentum is 0.5, because the classification task requires a higher learning rate, the random gradient method does not perform well when the initial learning rate is small, but when the learning rate is greater than 0.1, the model can converge faster and better. In the right side, it can be seen that there is also the same result on semantic segmentation. It can be seen from the above that the learning rate is very important for the convergence of the model, although the model structure is different, the optimal learning rate may be significantly different, just consistent with the hyper-parameters of normal training still can have a better result, which also reduces the burden on researchers. \subsection{GAN} In Fig~\ref{fig:56}, \ref{fig:8}, it can be seen clearly that our method can generate clearer and more realistic images. In generating tasks, we do not test the relationship between learning rate and momentum, so we accord the method which mentioned in the paper~\cite{Authors46} to do our experiments. We apply the Adam solver~\cite{Authors04}, with learning rate 0.0002, and momentum parameters $\beta_{1}$ = 0.5, $\beta_{2}$ = 0.999, we trained the network 200 epochs, please refer to the original paper for details. Particularly noteworthy is the observation that the random gradient method can also work well on Adam, this gives the random gradient a great degree of freedom. \section{Conclusion and Limitation} In this paper, we presented empirical evidence for a previously phenomenon that we name random gradient. Change the gradient by applying a random weight to the loss, we are surprised that the random gradient method can perform well in many fields. It get rid of the dependence on the optimization algorithm, and using Adam in generating tasks achieves better results. Although our method can achieve compelling results in many field, but we have not given a convincing theoretical analysis, just simply and intuitively based on the phenomenon to summarize a vague conclusion. And we have no systematic analysis of Nesterov method~\cite{Authors51}, but in some simple experimental verifications, the results are similar to the momentum method. \section{Future Work} \begin{flushright}\small\emph{ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~We can only see a short distance ahead, but we can see plenty there that needs to be done. -- Alan Turing} \end{flushright} We are pleasantly surprised to find that there is a further improvement in replacing the random number with the cyclical strategy proposed by \cite{Authors07}. It is applied to adjust the learning rate and also exhibits the nature of fast convergence under certain conditions. We will conduct more in-depth research in the future. \clearpage \begin{figure}[!htbp] \centering \includegraphics[width=14cm]{fig56.jpg} \caption{Visualization result on maps and cityscapes, from left to right are {\bfseries Input}, {\bfseries Original Gradient}, {\bfseries Random Gradient}, {\bfseries Ground Truth} respectively.} \label{fig:56} \end{figure} \clearpage \begin{figure}[!htbp] \centering \includegraphics[width=14cm]{fig8.jpg} \caption{Visualization result on maps and cityscapes, from left to right are {\bfseries Input}, {\bfseries Original Gradient}, {\bfseries Random Gradient}, {\bfseries Ground Truth} respectively.} \label{fig:8} \end{figure} \clearpage \bibliographystyle{splncs} \bibliographystyle{plain}
\section{Training Balance of D-PAGE} \label{sec:train_balance} We demonstrate the proportions of training samples that get the lowest loss (match best) through the $k$th decoder, $d_k$, see Figure~\ref{fig:propotion}. During the first 10 batches, the proportions vibrate sharply. After several epochs, the proportions gradually converge to the value close to 0.2 (the ideal averaged proportion). This result shows that the training samples fall into each decoder with balance. As PPDB is composed of shorter sequences than Paralex, the clustering proportions of PPDB converge better. \begin{figure}[h] \begin{subfigure}{1.1\linewidth} \centering \includegraphics[width=1.\linewidth]{./ppdb_cluster_dist.pdf} \caption{PPDB} \label{fig:propotion_ppdb} \end{subfigure} \begin{subfigure}{1.1\linewidth} \centering \includegraphics[width=1.\linewidth]{./paralex_cluster_dist.pdf} \caption{Paralex} \label{fig:propotion_paralex} \end{subfigure} \caption{Proportions of training samples get the lowest loss through the $k$th decoder, for the first 10 batches and epochs, on PPDB and Paralex.} \label{fig:propotion} \end{figure} \section{Efficiency of D-PAGE} \label{sec:efficiency} We develop our D-PAGE-K\xspace model based on OpenNMT \cite{opennmt}. We conduct all our experiments on the server with one Nvidia Tesla P100 (SXM2). For all experiments, we train the models for 10 epochs. The total training time of Seq2Seq, with 2 layers, and D-PAGE, with 2-8 decoders, are provided in hour(h), in Table~\ref{tab:efficiency}. Introducing more decoders linearly increases the time for training. Paralex costs roughly 2 times more training time than PPDB, as the average sentence length of Paralex is longer than that of PPDB. The training time of D-PAGE-8 for PPDB and Paralex are acceptable, which are less than 1.5 days and 4.1 days respectively. As D-PAGE models share the calculation of encoder part, training time of D-PAGE-8 is about 5.5 times more than single decoder models and 2 times more than D-PAGE-2. The training efficiency can be improved by calculating the loss of each decoder in parallel through multiple GPUs. For decoding, each decoder for D-PAGE works as efficiently as Seq2Seq's decoder. \begin{table}[t!] \centering \small \begin{tabular}{ c|l|l|l|l} \hline Dataset & Seq2Seq & D-PAGE-2 & D-PAGE-4 & D-PAGE-8\\ \hline PPDB & \ \ 5.20h & 10.00h & 18.27h & 33.12h\\ \hline Paralex & 14.99h & 29.97h & 53.40h & 97.90h \\ \hline \end{tabular} \caption{Training time consumptions of D-PAGE-K and Seq2Seq, on PPDB and Paralex.} \label{tab:efficiency} \end{table} \begin{table*}[ht!] \centering \begin{tabular}{ c|c|c } \hline Model & PPDB & Paralex \\ \hline \hline Beam-8 & [\textbf{0.225}, 0.222, 0.221, 0.221,& [\textbf{0.447}, 0.441, 0.438, 0.436,\\ & 0.220, 0.221, 0.220, 0.220] & 0.435, 0.434, 0.435, 0.435] \\ \hline Noise-8 & [\textbf{0.225}, 0.225, 0.225, 0.225, & [\textbf{0.450}, 0.450, 0.450, 0.450,\\ & 0.225, 0.225, 0.225, 0.225] & 0.450, 0.450, 0.450, 0.450]\\ \hline VAE-8 & [\textbf{0.224}, 0.224, 0.224, 0.224, & [\textbf{0.446}, 0.446, 0.446, 0.446,\\ & 0.224, 0.224, 0.224, 0.224] & 0.446, 0.446, 0.446, 0.446]\\ \hline \hline D-PAGE-4 & [0.213, 0.220, \textbf{0.228}, 0.221] & [0.446, \textbf{0.449}, 0.435, 0.443] \\ \hline D-PAGE-8 & [0.215, 0.225, 0.215, 0.217, & [0.443, 0.449, \textbf{0.449}, 0.447,\\ & 0.223, \textbf{0.226}, 0.208, 0.209] & 0.439, 0.444, 0.431, 0.418]\\ \hline \end{tabular} \caption{Fidelity experimental results on PPDB and Paralex, with SARI.} \label{tab:fidelity_baseline_sari} \end{table*} \section{SARI on PPDB and Paralex} \label{subsec:sari} The experiment result of SARI on PPDB and Paralex is demonstrated in Table~\ref{tab:fidelity_baseline_sari}. The overall results are similar to those of multi-reference BLEU, as discussed in Section~\ref{subsec:fedility}. Surprisingly, in terms of SARI, both of the best D-PAGE-2 and D-PAGE-4 models outperform the best Beam-K demonstrates the potential of using D-PAGE to train model with higher fidelity. \section{Baseline results on Synthetic Datasets} \label{sec:rand_syn} In this section, we demonstrate the performance of Noise-K and VAE-K on the Synthetic datasets, in Table~\ref{tab:syn_noise} and Table~\ref{tab:syn_vae}. There are mainly two types of behavior for both Noise-K and VAE-K, on our synthetic datasets. i) The models totally get lost among different rewriting patterns, and fail to generate coherent results, such as Noise-K on Syn-Sub and Syn-Scale and VAE-K on Syn-Sub. ii) The models manage to learn one of the rewriting patterns, while they ignore other possible ways to paraphrase, such as VAE-K on Syn-Scale. Comparing with the results of D-PAGE, in Table~\ref{tab:syn_D-PAGE}, D-PAGE is able to detect and learn diverse rewriting operations, such as replacements and insertions. \begin{table}[!h] \centering \begin{subtable}{1.0\linewidth} \centering \begin{tabular}{cccccc} \hline Dec & \multicolumn{5}{c}{References} \\ \cline{2-6} Id& r1 & r2 & r3 & r4 & r5 \\ \hline D1 &0.030&0.012&0.009&\textbf{0.047}&0.006\\ \hline D2 &0.031&0.011&0.009&\textbf{0.047}&0.004\\ \hline D3 &0.031&0.011&0.009&\textbf{0.048}&0.006\\ \hline D4 &0.030&0.011&0.008&\textbf{0.046}&0.006\\ \hline D5 &0.030&0.011&0.010&\textbf{0.046}&0.004\\ \hline \end{tabular} \caption{Syn-Sub} \end{subtable \begin{subtable}{1.0\linewidth} \centering \begin{tabular}{cccccc} \hline Dec & \multicolumn{5}{c}{References} \\ \cline{2-6} Id& r1 & r2 & r3 & r4 & r5 \\ \hline D1 &\textbf{0.025}&0.007&0.006&0.005&0.003\\ \hline D2 &\textbf{0.022}&0.004&0.004&0.003&0.002\\ \hline D3 &\textbf{0.027}&0.006&0.006&0.005&0.003\\ \hline D4 &\textbf{0.025}&0.006&0.005&0.005&0.003\\ \hline D5 &\textbf{0.018}&0.004&0.003&0.003&0.002\\ \hline \end{tabular} \caption{Syn-Scale} \end{subtable \caption{The confusion matrices of Noise-5 on Syn-Sub and Syn-Scale, using BLEU.} \label{tab:syn_noise} \end{table} \begin{table}[!h] \centering \begin{subtable}{1.0\linewidth} \centering \begin{tabular}{cccccc} \hline Dec & \multicolumn{5}{c}{References} \\ \cline{2-6} Id& r1 & r2 & r3 & r4 & r5 \\ \hline D1 &0.184&\textbf{0.263}&0.204&0.231&0.119\\ \hline D2 &\textbf{0.265}&0.192&0.205&0.207&0.131\\ \hline D3 &\textbf{0.285}&0.166&0.186&0.211&0.152\\ \hline D4 &0.233&0.196&0.174&\textbf{0.234}&0.163\\ \hline D5 &0.202&0.193&0.164&\textbf{0.264}&0.178\\ \hline \end{tabular} \caption{Syn-Sub} \end{subtable \begin{subtable}{1.0\linewidth} \centering \begin{tabular}{cccccc} \hline Dec & \multicolumn{5}{c}{References} \\ \cline{2-6} Id& r1 & r2 & r3 & r4 & r5 \\ \hline D1 &0.899&0.907&\textbf{0.911}&0.904&0.882\\ \hline D2 &0.896&0.907&\textbf{0.912}&0.904&0.881\\ \hline D3 &0.899&0.907&\textbf{0.910}&0.903&0.882\\ \hline D4 &0.899&0.908&\textbf{0.911}&0.903&0.881\\ \hline D5 &0.900&0.909&\textbf{0.912}&0.903&0.880\\ \hline \end{tabular} \caption{Syn-Scale} \end{subtable \caption{The confusion matrices of VAE-5 on Syn-Sub and Syn-Scale, using BLEU.} \label{tab:syn_vae} \end{table} \iffalse \newpage \begin{table*}[h!] \centering \begin{tabular}{ c|c|c } \hline Model & PPDB & Paralex \\ \hline D-PAGE-2-non & [0.138, \textbf{0.167}]$^\ddag$ & [\textbf{0.347}, 0.329] \\ D-PAGE-2-0.01&[\textbf{0.164}, 0.139] & [0.332, \textbf{0.349}]\\ D-PAGE-2-0.1 & [0.137, \textbf{0.163}] & [\textbf{0.352}, 0.338]\\ D-PAGE-2-1 & [\textbf{0.166}, 0.139]$^\ddag$ & [\textbf{0.354}, 0.338]\\ D-PAGE-2-10 & [\textbf{0.157}, 0.145] & [\textbf{0.355}, 0.342]$^\ddag$\\ \hline D-PAGE-3-non& [\textbf{0.161}, 0.146, 0.151] & [\textbf{0.348}, 0.304, 0.344] \\ D-PAGE-3-0.01&[\textbf{0.163}, 0.151, 0.123] & [0.344, \textbf{0.348}, 0.306] \\ D-PAGE-3-0.1 & [\textbf{0.160}, 0.148, 0.122] & [\textbf{0.348}, 0.313, 0.344] \\ D-PAGE-3-1 & [0.122, \textbf{0.164}, 0.150]$^\ddag$ & [0.319, \textbf{0.351}, 0.347] \\ D-PAGE-3-10 & [0.135, \textbf{0.146}, 0.143] & [0.344, 0.314, \textbf{0.346}]\\ \hline D-PAGE-5-non & [0.141, 0.110, \textbf{0.154}, 0.125, 0.152] & [0.279, 0.331, 0.333, \textbf{0.342}, \textbf{0.342}]\\ D-PAGE-5-0.01& [] & []\\ D-PAGE-5-0.1& [] & []\\ D-PAGE-5-1& [] & []\\ D-PAGE-5-10& [] & []\\ \hline \end{tabular} \caption{Fidelity comparison of models with different orthogonal constrains. The best result of the decoder for each model is boldfaced and $^\ddag$ indicates the model achieved the highest averaged BLEU.} \label{tab:fidelity_orth} \end{table*} \begin{table*}[h!] \centering \small \begin{tabular}{ c|ccccc|ccccc } \hline Model &&& PPDB&& & &&Paralex&& \\ & distinct-1 & distinct-2 & BLEU-R & $D_{ent}$-ins & $D_{ent}$-del &distinct-1 & distinct-2 & BLEU-R & $D_{ent}$-ins & $D_{ent}$-del \\ \hline \hline D-PAGE-2 & 0.00353 & 0.04394 & 0.126 & 0.610 & 0.672 & 0.00490 & 0.03848 & 0.239\\ D-PAGE-2-0.01& 0.00353 & 0.04429 & 0.124 & 0.607 & 0.668 & 0.00498 & 0.03875 & 0.241\\ D-PAGE-2-0.1 & 0.00352 & 0.04347 & 0.124 & 0.601 & 0.673 &0.00489 & 0.03792 & 0.246\\ D-PAGE-2-1 & 0.00351 & 0.04410 & 0.125 & 0.603 & 0.673 & 0.00486 & 0.03825 & 0.248\\ D-PAGE-2-10 & 0.00351 & 0.04408 & 0.121 & 0.624 & 0.674 & 0.00483 & 0.03758 &0.248\\ \hline D-PAGE-3 & 0.00245 & 0.03484 & 0.151 & 0.952 & 1.068 & 0.00344 & 0.02979 & 0.259\\ D-PAGE-3-0.01& 0.00246 & 0.03501 & 0.150 & 0.959 & 1.065 & 0.00338 & 0.02912 & 0.258\\ D-PAGE-3-0.1 & 0.00239 & 0.03480 & 0.152 & 0.960 & 1.068 & 0.00340 & 0.02881 & 0.257\\ D-PAGE-3-1 & 0.00246 & 0.03474 & 0.151 & 0.964 & 1.069 & 0.00333 & 0.02778 & 0.256\\ D-PAGE-3-10 & 0.00233 & 0.03457 & 0.147 & 0.975 & 1.061 & \\ \hline D-PAGE-5 & 0.00154 & 0.02613 & 0.186 & & & 0.00217 & 0.02085 & 0.285\\ D-PAGE-5-0.01& \\ D-PAGE-5-0.1 & \\ D-PAGE-5-1 & \\ D-PAGE-5-10 & \\ \hline \end{tabular} \caption{Orthogonal hyper-parameter selection.} \label{tab:diversity_orth} \end{table*} \begin{table*}[h!] \centering \small \begin{tabular}{ c|ccccc|ccccc } \hline Model &&& PPDB&& & &&Paralex&& \\ & distinct-1 & distinct-2 & BLEU-R & $D_{ent}$-ins & $D_{ent}$-del &distinct-1 & distinct-2 & BLEU-R & $D_{ent}$-ins & $D_{ent}$-del \\ \hline \hline Seq2Seq\_L2 & 0.00611 & 0.06127 & \textbf{0.085} & - & - & 0.00928 & 0.06359 &\textbf{0.217} & - & - \\ Noise-1 & 0.00654 & 0.06587 & \textbf{0.085} & - & - & 0.00960 &0.06455 & 0.216 & - & - \\ VAE-1 & 0.00495& 0.04580 & 0.060& - & - & 0.00957 & 0.07558 & 0.173 & - & - \\ \hline Beam-2 & 0.00380 & 0.05068 &0.124 & 0.670 & 0.685 & 0.00549 & 0.04552 & \textbf{0.268}& 0.669 & 0.683 \\ Noise-2 & 0.00331 & 0.03443 & 0.089 & 0.691 & 0.692 & 0.00488 & 0.03350 & 0.221 & 0.689 & 0.693 \\ VAE-2 & 0.00324 & 0.03898 & 0.094 & 0.578 & 0.671 & 0.00584 & 0.05544 & 0.214 & 0.616 & 0.689\\ D-PAGE-2 & 0.00353 & 0.04394 & \textbf{0.126} & 0.610 & 0.672 & 0.00490 & 0.03848 & 0.239 & 0.678 & 0.692\\ \hline Beam-3 & 0.00273 & 0.04321 & 0.150 & 1.062 & 1.087 & 0.00400 & 0.03739 & \textbf{0.300} & 1.063 & 1.086 \\ Noise-3 & 0.00221 & 0.02338 & 0.091 & 1.096 & 1.098 & 0.00327 & 0.02268 & 0.223 & 1.095 & 1.099\\ VAE-3 & 0.00241 & 0.03223 & 0.120 & 0.943 & 1.076& 0.00396 & 0.03979 & 0.266 & 0.998 & 1.093\\ D-PAGE-3 & 0.00245 & 0.03484 & \textbf{0.151} & 0.952 & 1.068 & 0.00344 & 0.02979 & 0.259 & 1.070 & 1.096 \\ \hline Beam-5 & 0.00177 & 0.03511 & \textbf{0.189} & 1.558 & 1.596 & 0.00264 & 0.02906 & \textbf{0.343} & 1.566 & 1.606\\ Noise-5 & 0.00134 & 0.01432 & 0.093 & 1.605 & 1.608 & 0.00198 & 0.01385 &0.225 & 1.605 & 1.609\\ VAE-5 & 0.00160 & 0.02534 & 0.146 & 1.414 & 1.584& 0.00243 & 0.02715 & 0.310 & 1.495 & 1.605\\ D-PAGE-5 & 0.00154 & 0.02613 & 0.186 & 1.412 & 1.565 & 0.00217 & 0.02085 & 0.285 & 1.553 & 1.605\\ \hline \end{tabular} \caption{(save table???)Experimental results of baseline models and D-PAGE on PPDB and Paralex, with multi-reference BLEU score.} \label{tab:diversity_baseline_save} \end{table*} \fi \section{Experimental Setup} \subsection{Datasets} \subsubsection*{Real-world Datasets} The same as~\cite{COLING16_DeepParaphrase}, we use PPDB~\cite{PPDB_dataset} and Paralex~\cite{Paralex_dataset} for evaluation. \noindent \textbf{PPDB} is a widely used automatically extracted multilingual paraphrase dataset. We use the most recent \texttt{Phrasal} English PPDB 2.0\footnote{\url{http://paraphrase.org/\#/download}} from the \texttt{XXXL} size. We randomly sample 4,500K and 500K paraphrase pairs for training and testing respectively. \noindent \textbf{Paralex} is a large-scale question paraphrase corpus crawled from WikiAnswers\footnote{\url{http://wiki.answers.com}}. Semantically similar questions are annotated by web users. As a result, the dataset contains 5,326,492 question pairs, where 4,826,492 pairs are used for training and the remaining 500K are for testing.~\footnote{We use the same dataset as~\cite{COLING16_DeepParaphrase}} \subsubsection*{Synthetic Datasets} Paraphrase generation can be viewed as translating a word sequence to another by applying certain edit operations, such as substitution and insertion. Different choices of edit operation indicate different rewriting patterns. For real-world sentences, the underlying rewriting patterns are often ambiguous or comprise a complex combination of operations. It is difficult to evaluate which patterns a model fails to capture. Therefore, we build two synthetic datasets with increasing complexities to evaluate which rewriting patterns a model is able to capture. Each pattern is associated with one or two types of edit operation. The edit operations are aligned with those used in previous works~\cite{narayan2014hybrid,woodsend2011learning}. \noindent \textbf{Syn-Sub}, one common operation of paraphrasing is to substitute words with their synonyms. As a word could have more than one synonyms, we construct $K$ different dictionaries for the same input words. We randomly generate input sequences of length $L \in [6, 20]$. Then we apply each dictionary to replace all words in an input sequence with their synonyms, and end up with $K$ output sequences. In this way, different dictionaries correspond to different patterns. \noindent \textbf{Syn-Scale}, another common edit operation is measurement conversion. Herein, each input sequence consists of an integer sampled from $[1000, 10000]$ and a length unit $meter$, such as `2357 $m$'. We convert each input expression to another unit $km$, $dm$, $cm$, $mm$, and $\mu m$ respectively, such as `$2.357\ km$' and `$23570\ dm$'. To avoid a large vocabulary, we treat each digit, each unit of measure, as well as the decimal point as a word. Each conversion corresponds to a rewriting pattern, which comprises two types of operation: i) insertions of digits or the decimal point, and ii) one substitution of unit. For both synthetic datasets, we randomly generated 5,000 and 1,000 input sequences for training and testing, separately. Then we transform each of them into five paraphrase sequences, and obtain 25,000 and 5,000 target sequences for training and testing, respectively. \subsection{Evaluation}\label{subsec-eval} We evaluate system performance under two perspectives, fidelity and diversity. \noindent \textbf{Fidelity} We use multi-reference BLEU~\cite{BLEU}, a modified n-gram precision score, as the main metric. We also evaluate the results using SARI~\cite{xu2016optimizing}, which emphasizes the changes in outputs against the inputs\footnote{As SARI provides similar results as BLEU, we provide the results in Appendix~\ref{subsec:sari}.}. \noindent \textbf{Diversity} Diversity caused by different rewriting patterns often appears as different choices of words. \texttt{Distinct-N}~\cite{NAACL2016_DiversityObjFunc} is the only existing evaluation metric for lexical diversity. In particular, let $\mathcal{C}_m$ denote a corpus consisting of all paraphrases generated by a model $m$, \texttt{Distinct-N} is the number of distinct ngrams of order \texttt{N} in $\mathcal{C}_m$ divided by the total number of ngrams of the same order in $\mathcal{C}_m$. This corpus-level measure encourages the generation of a large number of infrequent ngrams. However, a large body of infrequent ngrams often accompany with grammatical errors. Thus, as a common practice in statistics, it is better off measuring differences of word distributions instead of distinct words. Moreover, it is also desirable to understand the differences between rewriting patterns. Since their differences lead to different word distributions, we apply Kullback-Leibler divergence (KL) \cite{kullback1951information} to characterize the distance between the corresponding word distributions. Let $Q_i$ and $Q_j$ denote the word distributions of a pattern $i$ and a pattern $j$ respectively, we have \begin{small} \begin{equation} KL(Q_i||Q_j) = \sum_{w\in V} Q_i(w) \log \frac{Q_i(w)}{Q_j(w)} \end{equation} \end{small} where $V$ denotes the vocabulary. Since there are more than two rewriting patterns, we average KL between all pairs of word distributions as the final measure, which is equivalent to Jeffrey's Divergence (JD)~\cite{jeffreys1998theory}. \begin{small} \begin{equation} JD(Q_1, \cdots, Q_K) = \frac{\sum_{i,j, i\neq j} KL(Q_i||Q_j)}{K(K-1)} \end{equation} \end{small} A high diversity between rewriting patterns corresponds to a large JD, which is also a theoretically well grounded measure in information theory and information geometry~\cite{NIPS17_fGANS}. Such a diversity caused by rewriting patterns is referred to as \textit{pattern diversity}. \subsection{Baselines} \label{subsec:baselines} We compare D-PAGE-K\xspace with three baselines in terms of both fidelity and diversity: \begin{itemize} \item \textbf{Beam-K} \cite{beam_search} outputs top $K$ paraphrases using beam search. \item \textbf{Noise-K} \cite{ICCV2017_diverse_image_description} generates $K$ outputs by adding random noise $z_1, \cdots, z_K$, as input to the decoder. \item \textbf{VAE-K} \cite{CVPR17_vae} provides $K$ outputs by introducing noise $z \sim Norm(0, 1)$ as input right after $h_e$, the hidden representations generated by the encoder. \end{itemize} Although Noise-K and VAE-K are not explicitly designed for generating sequences with different rewriting patterns, we can still fix the noise for the $k$th decoder and compare the behavior of the model with different noise settings. Herein, we vary $K$ in $\{2,4,8\}$ for all models in comparison. \begin{table*}[t!] \centering \begin{tabular}{ c|c|c } \hline Model & PPDB & Paralex \\ \hline \hline Beam-8 & [\textbf{0.165}, 0.148, 0.136, 0.126,& [\textbf{0.350}, 0.317, 0.298, 0.287,\\ & 0.120, 0.114, 0.108, 0.103] & 0.280, 0.276, 0.273, 0.271] \\ \hline Noise-8 & [0.163, 0.163, \textbf{0.164}, 0.163, & [\textbf{0.352}, 0.352,0.352,0.352,\\ & 0.163, 0.163, 0.163, 0.163] & 0.352, 0.352, 0.352, 0.352]\\ \hline VAE-8 & [\textbf{0.165}, 0.165, 0.165, 0.165, & [\textbf{0.345}, 0.345, 0.345, 0.345,\\ & 0.165, 0.165, 0.165, 0.165] & 0.345, 0.345, 0.345, 0.345]\\ \hline \hline D-PAGE-2 & [0.138, \textbf{0.167}] & [\textbf{0.347}, 0.329] \\ \hline D-PAGE-4 & [0.138, 0.117, 0.145, \textbf{0.154}] & [0.343, \textbf{0.350}, 0.302, 0.340] \\ \hline D-PAGE-8 & [0.106, 0.134, 0.126, 0.134,& [0.324, 0.341, \textbf{0.342}, 0.332,\\ & \textbf{0.141}, 0.105, 0.137, 0.126] & 0.326, 0.330, 0.296, 0.243]\\ \hline \end{tabular} \vspace{-2mm} \caption{Multi-reference BLEU of the baselines and D-PAGE-K, on PPDB and Paralex.} \label{tab:fidelity_baseline} \end{table*} \begin{table}[h!] \centering \begin{tabular}{ c|c|c } \hline Model & PPDB & Paralex \\ \hline \hline Seq2Seq\_Layer1 & 0.163 & 0.350 \\ Seq2Seq\_Layer2 & \textbf{0.164} & \textbf{0.351} \\ Seq2Seq\_Layer4 & 0.159 & 0.339 \\ \hline \end{tabular} \vspace{-2mm} \caption{Comparison of varying Seq2Seq architectures, with multi-reference BLEU.} \label{tab:seq2seq_architect} \end{table} \section{Experimental Results} Our extensive experimental results on two real-world datasets show that our model achieves the highest pattern diversity according to our new evaluation metric. At least one decoder gains competitive fidelity as the competitive baselines and half decoders obtain better lexical diversity than the baselines. Our model is also the only one that captures all pre-defined rewriting patterns on the synthetic datasets. \subsection{Fidelity} \label{subsec:fedility} The Seq2Seq model is the backbone of D-PAGE-K\xspace and the baselines. We evaluate Seq2Seq with varying number of stacked LSTM layers ($1,2,4$) for both encoder and decoder. As demonstrated in Table~\ref{tab:seq2seq_architect}, Seq2Seq\_Layer2 achieves the highest multi-reference BLEU on both benchmark corpora. We choose Seq2Seq\_Layer2 as the backbone for D-PAGE-K\xspace and all three baselines also because i) the results are also on a par with those of the same architectures in~\cite{COLING16_DeepParaphrase}; ii) the same architecture is the best performing one in~\cite{ACL17_neural_text_simplification} on text simplification task. We provide the BLEU scores of D-PAGE-K\xspace and baselines in Table~\ref{tab:fidelity_baseline}, as well as the results of SARI in Appendix~\ref{subsec:sari}. Compared with the Seq2Seq, at least one decoder of D-PAGE-K\xspace achieves competitive BLEU scores, on both PPDB and Paralex. One decoder of D-PAGE-2 even outperforms all Seq2Seq baselines on PPDB. As the number of decoders increases, the averaged BLEU scores of D-PAGE-K\xspace decreases. This is due to the fact that the number of training paraphrase pairs assigned to each individual decoder decreases proportionally. A sufficiently large training corpus could thus alleviate such a problem The fidelity of the highest ranked sequences generated by Beam-K measure up to those of the backbone model, while the BLEU scores of sequences decrease significantly as their ranks increases. On average, D-PAGE-8 outperforms Beam-8 Paralex (0.317 vs. 0.294), while keeps competitive on PPDB (0.126 vs. 0.127). Noise-K and VAE-K achieve similar BLEU scores as Seq2Seq, however their generated sequences are mostly identical, because both models are trained to be robust to input noise. \begin{table*}[h!] \centering \small \begin{tabular}{ c|ccc|ccc } \hline Model & & PPDB & & &Paralex & \\ \cline{2-7} & distinct-1 & distinct-2 & JD &distinct-1 & distinct-2 & JD \\ \hline \hline Beam-2 & 0.00380 & 0.05068 & 5.58E-3 & 0.00541 & 0.04464& 1.93E-3\\ Noise-2 & 0.00331 & 0.03443 & 3.53E-4 & 0.00488 & 0.03350 & 9.06E-5 \\ VAE-2 & 0.00322 & 0.03298 & 3.27E-5 & 0.00470 & 0.03248 & 3.17E-6\\ D-PAGE-2 & 0.00353 & 0.04394 & \textbf{1.56E-1} & 0.00490 & 0.03848 & \textbf{2.74E-2} \\ \hline Beam-4 & 0.00214 & 0.03847 & 5.56E-3 & 0.00309 & 0.03119 & 2.29E-3\\ Noise-4 & 0.00166 & 0.01778 & 3.60E-4 & 0.00247 & 0.01721 & 7.73E-5\\ VAE-4 & 0.00161 & 0.01654 & 2.48E-5 & 0.00235 & 0.01630 & 2.93E-6\\ D-PAGE-4 & 0.00188 & 0.02919 & \textbf{5.22E-1} & 0.00263 & 0.02391 & \textbf{4.26E-2} \\ \hline Beam-8 & 0.00109 & 0.02553 & 6.53E-3 & 0.00168 & 0.02123 & 4.07E-3\\ Noise-8 & 0.00084 & 0.00912 & 3.56E-4 & 0.00124 & 0.00879 & 7.28E-2\\ VAE-8 & 0.00081 & 0.00830 & 2.31E-5 & 0.00118 & 0.00823 & 5.73E-6\\ D-PAGE-8 & 0.00101 & 0.02055 & \textbf{5.26E-1} & 0.00142 & 0.01504 & \textbf{5.09E-2} \\ \hline \end{tabular} \vspace{-2mm} \caption{Distinct-1, distinct-2 and JD of baselines and D-PAGE-K, on PPDB and Paralex.} \label{tab:diversity_baseline} \end{table*} \hspace{-5mm} \subsection{Diversity} \label{subsec:diversity} We compare the diversity property of D-PAGE-K\xspace with baselines in terms of lexical and pattern diversities, using \texttt{distinct-N} and JD respectively. \texttt{Distinct-N} is a measure of distinct ngrams in generated sequences. From Table~\ref{tab:diversity_baseline}, we can see that both D-PAGE-K\xspace and Beam-K outperform Noise-K and VAE-K in terms of this metric. Beam-K achieves the highest \texttt{distinct}, because it deliberately avoids repeating sentences while decoding. However, sequences between different ranks do not tend to capture different rewriting patterns, because their word distributions are similar, as evident by JD scores. D-PAGE-K\xspace obtains dramatically higher JD than Beam-K, Noise-K and VAE-K, which supports the strong information-theoretic argument for diversity in rewriting patterns (Sec~\ref{subsec-eval}). This also demonstrates that the different decoders of D-PAGE-K\xspace have their distinct preferences in word usage patterns. With more decoders, JD of D-PAGE-K\xspace increases, while there is no such trend for other models. \begin{table}[h!] \centering \small \begin{tabular}{ c|cc|cc } \hline Model & \multicolumn{2}{c}{PPDB} & \multicolumn{2}{c}{Paralex}\\ \cline{2-5} & Beam-2 & Beam-4 & Beam-2 & Beam-4\\ \hline Seq2Seq\_Layer2 & 0.05068 & 0.03847& 0.04464 & 0.03119\\ \hline D-PAGE-2 (D1) & 0.03501 & 0.02576 & 0.04117 & 0.02800\\ D-PAGE-2 (D2) & \textbf{0.06127} & \textbf{0.04581} & \textbf{0.04809} & \textbf{0.03282}\\ \hline D-PAGE-4 (D1) & 0.04983 & \textbf{0.03889} & \textbf{0.04596} & \textbf{0.03135}\\ D-PAGE-4 (D2) & 0.02570 & 0.01919 & 0.03968 & 0.02720\\ D-PAGE-4 (D3) & 0.03916 & 0.02907 & \textbf{0.05243} & \textbf{0.03602}\\ D-PAGE-4 (D4) & \textbf{0.06237} & \textbf{0.04795} & 0.03621 &0.02490\\ \hline \end{tabular} \caption{Comparison of lexical diversity of top-2 and top-4 beam search on Seq2Seq\_Layer2 and D-PAGE-K\xspace, using distinct-2.} \label{tab:diversity_mixture} \end{table} We also apply top-2 and top-4 beam search for D-PAGE-2 (with decoder D1-D2) and D-PAGE-4 (with decoder D1-D4), on both PPDB and Paralex. \texttt{Distinct-2} are reported in Table~\ref{tab:diversity_mixture}. Half of the D-PAGE-K\xspace outperform the Seq2Seq\_Layer2 models. Although D-PAGE is not essentially designed for lexical diversity, we can still obtain single models with noticeable higher vocabulary coverage, on both PPDB (D-PAGE-2(D2) and D-PAGE-4(D4)) and Paralex(D-PAGE-4(D3)). \begin{table*}[h] \centering \begin{tabular}{ c|c|c|c|c} \hline Dataset & Model& AvgLen(S) & AvgLen [$D_1$, $D_2$, $D_3$,$D_4$] & $\Delta$ \\\hline \hline & Beam-4 &2.438 & [2.584, 2.578, 2.581, \textbf{2.594}] & 0.016\\ PPDB & Noise-4 & 2.438 & [\textbf{2.609}, 2.608, 2.606, 2.606] & 0.003\\ & VAE-4 & 2.438 & [2.616, \textbf{2.617}, 2.616, 2.616] & 0.001\\ & D-PAGE-4 & 2.438 & [2.516, \textbf{3.315}, 2.765, 2.084] & \textbf{1.231}\\ \hline \hline & Beam-4 & 6.643 & [5.844, 5.870, 5.904, \textbf{5.965}] & 0.121\\ Paralex & Noise-4 & 6.643 & [5.760, \textbf{5.763}, 5.756, 5.758] & 0.007\\ & VAE-4 & 6.643 & [5.852, 5.852, \textbf{5.853}, 5.852] & 0.001\\ & D-PAGE-4 & 6.643 & [5.961, 6.459, 5.270, \textbf{6.532}] & \textbf{1.262}\\ \hline \end{tabular} \caption{The average length of the sources, AvgLen(S), and average length of outputs of $k$th decoder, $\text{AvgLen}(D_k)$, across Beam-4, Noise-4, VAE-4 and D-PAGE-4, on PPDB and Paralex.} \label{tab:diversity_length} \end{table*} \begin{table*}[h] \centering \small \begin{tabular}{ |l|l|l|l|} \hline sr:\ responses to & sr:\ am pleased & sr:\ managed to & sr:\ partly or entirely \\ \hline $D_1$: responses provided & $D_1$: am happy & $D_1$: was able to & $D_1$: partially or totally \\ $D_2$: replies to the & $D_2$: am very happy to & $D_2$: have been able to & $D_2$: partially or wholly \\ $D_3$: the replies to & $D_3$: is my pleasure to & $D_3$: been able to & $D_3$: either partially or totally \\ $D_4$: answers to & $D_4$: am happy & $D_4$: managed to & $D_4$: partially or totally \\ \hline \end{tabular} \hspace{-2mm} \caption{Sample results, with sources (sr) and D-PAGE\xspace outputs of the $k$th decoder $D_k$, on PPDB.} \label{tab:case_study} \end{table*} \hspace{-10mm} \subsection{Analysis} \label{subsec:analysis} We investigate D-PAGE-K\xspace in details by using its generated sequences based on PPDB and Paralex. Inspired by the work of authorship analysis~\cite{Diederich2003AuthorshipAW} and language style classification~\cite{khosmood2008automatic}, we analyse the average output length and the preferences of function words. We also observe the performance of D-PAGE-K\xspace on synthetic datasets and demonstrate two types of rewriting patterns that can be learned by our model. Table~\ref{tab:diversity_length} lists the average length of input sentences ($\text{AvgLen}(S)$) and average length of the outputs of $k$th decoder ($\text{AvgLen}(D_k)$) for all models. We also calculate the differences between longest and shortest averaged outputs by $\Delta=\max_k \text{AvgLen}(D_k)-\min_k \text{AvgLen}(D_k)$. The average length of output sequences using D-PAGE-K\xspace is indeed longer than those of baselines. D-PAGE-K\xspace also achieves the largest $\Delta$ on both PPDB and Paralex, larger than 1.2. This shows that D-PAGE-K\xspace encodes more diverse patterns, with some decoders prefer to generate longer, probably more complex, sentence than others. In contrast, the baselines do not feature such distinct properties. Table~\ref{tab:case_study} lists sample outputs of D-PAGE-K\xspace with $K = 4$ on PPDB, together with source sentences (sr). In most cases, D-PAGE-K\xspace is able to replace the words with synonyms, e.g. ``responses'' to ``replies'' and ``answers'', ``entirely'' to ``wholly'' and ``totally''. The tense of the verbs in output phrases are also coherent with the inputs, e.g. ``am'' to ``is'', ``managed'' to ``was''. In some cases, our model generates duplicated outputs. For example, the output of ``managed to'' through $D_4$ is the same as the input. This is due to the limitation of Seq2Seq models, which does not guarantee the dissimilarity between the outputs and inputs. The outputs of ``partly or entirely'' through $D_1$ and $D_4$ are duplicated, which means that even through the models with different rewriting patterns, the outputs can still be the same. For each decoder, we demonstrate the top 10 words contributed to JD, in Table~\ref{tab:top_word}. For both PPDB and Paralex, function words contribute most, such as articles, auxiliary verbs, prepositions, conjunctions, etc. Different decoders of D-PAGE-K\xspace trained on Paralex show preferences of different question words, as Parelex is composed of question paraphrases. As the selection bias of function words was used in text style analysis~\cite{Diederich2003AuthorshipAW}, we believe such word preference between decoders illustrates the patterns of decoders, to some extent. \begin{table}[t] \centering \small \begin{tabular}{l} \hline PPDB\\ \hline D$_1$: \once{was}, are, be, \once{its}, \once{these}, \once{those}, \once{under}, \once{during}, \once{within}, \once{all} \\ D$_2$: the, \once{out}, been, be, \once{a}, \once{set}, has, \once{up}, to, are\\ D$_3$: is, been, the, to, \once{being}, of, \once{shall}, \once{had}, \once{have}, has\\ D$_4$: is, \once{were}, \once{by}, \once{and}, \once{in}, of, \once{their}, \once{on}, \once{such}, \once{that}\\ \hline \hline Paralex\\ \hline D$_1$: do, what, in, \once{where}, be, \once{you}, s, how, \once{and}, for\\ D$_2$: the, a, of, some, between, any, \once{history}, main, most, \once{all}\\ D$_3$: be, how, what, do, \once{can}, s, for, in, \once{who}, \once{to}\\ D$_4$: the, a, of, some, between, \once{different}, any, main, \once{name}, most\\ \hline \end{tabular} \vspace{-2mm} \caption{Top 10 words contribute most to JD, for each decoder $D_k$, on PPDB and Paralex. Words that appear once in the lists are \once{bold}.} \label{tab:top_word} \vspace{-4mm} \end{table} In order to understand the capability of capturing specific rewriting patterns, we conduct experiments on synthetic datasets for our model. In particular, we apply $K$ decoders to generate $K$ sets of paraphrases. Since we have a reference set per rewriting pattern, we pair each paraphrase set with each reference set. For each pair, we align each system output to a single reference, so that we are able to compute a BLEU score for that pair. The corresponding results are reported in Table~\ref{tab:syn_D-PAGE}. If a model is able to capture all patterns, we expect that for each pattern, there is one decoder achieving a high score. For Syn-Sub, our model is able to learn the patterns $r_1$, $r_3$ and $r_4$, but only partially capture the pattern $r_2$. Our further investigation shows that $D_5$ tends to provide outputs with mixed rewriting pattern between $r_2$ and $r_4$ . For Syn-Scale, although the lengths of input and output sequences are different and the dataset include two types of operations, substitution and insertion, our model can still learn all possible patterns perfectly. We contribute this to smaller vocabulary size and shorter sequence length. However, we have not observed such distinct rewriting pattern from the outputs of Noise-K or VAE-K, see Appendix~\ref{sec:rand_syn}. \begin{table}[!t] \centering \small \begin{subtable}{1.0\linewidth} \centering \begin{tabular}{cccccc} \hline Dec & \multicolumn{5}{c}{References} \\ \cline{2-6} Id& r1 & r2 & r3 & r4 & r5 \\ \hline $D_1$ &0.000&0.000&0.000&\textbf{1.000}&0.000\\ \hline $D_2$ &0.000&0.000&\textbf{1.000}&0.000&0.000\\ \hline $D_3$ &\textbf{1.000}&0.000&0.000&0.000&0.000\\ \hline $D_4$ &0.000&0.000&\textbf{1.000}&0.000&0.000\\ \hline $D_5$ &0.000&0.369&0.000&\textbf{0.631}&0.000\\ \hline \end{tabular} \caption{Syn-Sub} \end{subtable \begin{subtable}{1.0\linewidth} \centering \begin{tabular}{cccccc} \hline Dec & \multicolumn{5}{c}{References}\\ \cline{2-6} Id& r1 & r2 & r3 & r4 & r5\\ \hline $D_1$ &0.047&0.577&0.719&\textbf{1.000}&0.612\\ \hline $D_2$ &0.066&\textbf{1.000}&0.693&0.598&0.386\\ \hline $D_3$ &0.055&0.671&\textbf{1.000}&0.736&0.502\\ \hline $D_4$ &0.033&0.407&0.507&0.607&\textbf{1.000}\\ \hline $D_5$ &\textbf{1.000}&0.066&0.057&0.049&0.032\\ \hline \end{tabular} \caption{Syn-Scale} \end{subtable \vspace{-2mm} \caption{The confusion matrices of D-PAGE on Syn-Sub and Syn-Shift using BLEU scores.} \label{tab:syn_D-PAGE} \vspace{-4mm} \end{table} \section{Diverse Paraphrase Generation} To generate paraphrases with patterns, D-PAGE extends the decoder of NMT models by adding multiple rewriting pattern embeddings as inputs. We apply this method to the widely used sequence-to-sequence (Seq2Seq)~\cite{NIPS14_Seq2Seq} so that the resulted model, coined D-PAGE-K\xspace, is able to generate varying paraphrases according to different rewriting patterns. Formally, a paraphrase generation model takes a word sequence $X=\langle x_1, x_2, \cdots, x_N \rangle$ of length $N$ as input, where $x_i$ denotes a word from a vocabulary $\mathcal{V}$. The model learns a function to map the input to a paraphrase, $Y=\langle y_1, y_2, \cdots, y_M \rangle$, where $y_j$ is a word also from $\mathcal{V}$. \begin{figure*}[ht!] \centering \includegraphics[width=0.85\linewidth]{./system_design} \vspace{-1.5mm} \caption{The main structure of Diverse Paraphrase Generation method, D-PAGE.} \label{fig:system_design} \vspace{-5mm} \end{figure*} \subsection{Seq2Seq Model} Seq2Seq architecture consists of two components: (i) an \textit{encoder} projects an input sentence into a representation $\mathbf{h}^e$ and (ii) a \textit{decoder} generates a target word at a time to compose a word sequence. Both of the encoder and the decoder utilize Recurrent Neural Networks (RNN) to construct hidden representations, using Long Short-Term Memory (LSTM)~\cite{Hochreiter1997LongSM}. At the $t$th position, LSTM computes current hidden state $h_{t}$ and memory cell $c_t$ based on an input word embedding $\mathbf{x}_t$, its previous state and memory cell: \begin{equation} \mathbf{h}_t, \mathbf{c}_t = \text{LSTM}(\mathbf{h}_{t-1}, \mathbf{c}_{t-1}, \mathbf{x}_t) \end{equation} The mapping between the input and the output is defined as a set of the following equations: \begin{align} \mathbf{i}_t & =\sigma(\mathbf{W}_i \cdot [\mathbf{x}_t, \mathbf{h}_{t-1}])\\ \mathbf{f}_t & =\sigma(\mathbf{W}_f \cdot [\mathbf{x}_t, \mathbf{h}_{t-1}])\\ \mathbf{o}_t& =\sigma(\mathbf{W}_o \cdot [\mathbf{x}_t, \mathbf{h}_{t-1}])\\ \mathbf{u}_t &=\tanh(\mathbf{W}_u \cdot [\mathbf{x}_t, \mathbf{h}_{t-1}])\\ \mathbf{c}_t &= \mathbf{f}_t \odot \mathbf{c}_{t-1} + \mathbf{i}_t\odot \mathbf{u}_t\\ \mathbf{h}_t &= \mathbf{o}_t \odot \tanh(\mathbf{c}_t) \end{align} Conventionally, $\mathbf{i}_t$, $\mathbf{f}_t$, and $\mathbf{o}_t$ are referred to as input gate, forget gate and output gate, respectively. In this work, the encoder is a (stacked) LSTM which reads a sequence of word embeddings recursively and uses the last hidden state as the final representation of the input $\mathbf{h}^e_N$. The decoder consists of another (stacked) LSTM, an attention layer and a softmax classifier. The LSTM of the decoder takes the input representation from the encoder as the initial hidden state. At the $t$th step, the hidden state $h_t^d$ is computed by \begin{equation} \mathbf{h}_t^d, \mathbf{c}_t^d = \text{LSTM}_{dec}(\mathbf{h}_{t-1}^d, \mathbf{c}_{t-1}^d, \mathbf{y}_{t-1}) \end{equation} $\mathbf{y}_{t-1}$ denotes the word embeddings of words $y_{t-1}$. Global attention~\cite{EMNLP15_EffectiveAttention} is added before the softmax layer. \begin{equation} a_t(s)=\frac{\exp(\text{score}(\mathbf{h}_t^{d}, \mathbf{h}_s^{e}))}{\sum_{s'}\exp(\text{score}(\mathbf{h}_t^{d}, \mathbf{h}_{s'}^{e}))} \end{equation} \begin{equation} \mathbf{\bar{h}}_t^{d}= \sum_{s} a_t(s) \mathbf{h}_s^{e} \end{equation} The softmax classifier computes the probability of each target word $y_t$ as: \begin{equation} p(y_t|y_{<t}, x) = \text{softmax}(\mathbf{W}\cdot \mathbf{\bar{h}}_t^d) \end{equation} \subsection{D-PAGE-K\xspace Model} There are various ways to rephrase a sentence and preserve its semantic meaning. Different rewriting patterns lead to varying actions. Since those rewriting patterns are not directly observable, D-PAGE\xspace represents them as latent embeddings. Assuming there are $K$ rewriting patterns $\{r_1, r_2, \cdots, r_K\}$, we denote their corresponding pattern embeddings by $\{\mathbf{d}_1, \mathbf{d}_2, \cdots, \mathbf{d}_K\}$. A decoder is supposed to have different word choices conditioned on different rewriting patterns, thus we feed those pattern embeddings as input of the decoder. We let the pattern embeddings influence the word preference by changing the hidden representations of the decoder through LSTM. \begin{equation} \mathbf{h}_t^d, \mathbf{c}_t^d = \text{LSTM}_{dec}(\mathbf{h}_{t-1}^d, \mathbf{c}_{t-1}^d, [\mathbf{y}_{t-1}, \mathbf{d}_k]) \end{equation} At each time step, $\mathbf{d}_k$ and $\mathbf{y}_{t-1}$ are concatenated to jointly change the hidden states. From another perspective, $\mathbf{d}_k$ serves as a pattern condition in addition to previously generated words and input sentences. In this way, a decoder with different rewriting patterns can be viewed as different decoders, as illustrated in Figure~\ref{fig:system_design}. The LSTM parameters are shared among different decoders in order to capture the common language modeling. Otherwise it can easily lead to the explosion of parameter space. It is also beneficial to learn the pattern embeddings $d_k$ as model parameters instead of using randomly generated ones, as the learned embeddings can better encode the differences between rewriting patterns than the constant noisy ones. \subsection{Training and Decoding} The special challenge of training is the unobserved alignment between input sentences and rewriting patterns. We propose a customized loss, which automatically finds the hard assignment of rewriting patterns to input sentences. For each ground truth paraphrase pair $\langle X, Y \rangle$, the cross entropy loss associated with a rewriting pattern $r_k$ is defined as: \begin{equation} \mathcal{L}_k(X, Y;\theta) = -\sum_{t=1}^{M} \log p(y_t|y_{<t}, X, r_k; \theta) \end{equation} The above loss measures the compatibility between input and output sequences using $r_k$. For the same paraphrase pair, if the $\mathcal{L}_k$ is smaller than $\mathcal{L}_i$, $r_k$ is more likely to explain the pair than $r_i$. Thus, we select the smallest loss among all $K$ rewriting patterns for each pair, which is given as: \begin{equation} \mathcal{L}(X, Y; \theta) = \min_{k} \mathcal{L}_k(X, Y; \theta) \end{equation} Then we apply SGD~\cite{robbins1951stochastic} to update the selected pattern embedding and the model parameters of the backbone Seq2Seq model associated with the smallest loss. In the decoding phase, we apply first the encoder to construct the embedding $\mathbf{h}^e$ of an input sequence. Taking $\mathbf{h}^e_N$ as the initial hidden state, each decoder $D_k$ generates the most likely word sequence using beam search, conditioned on its own rewriting pattern. Thus, D-PAGE-K\xspace guarantees to generate $K$ sequences. \section{Introduction} \textit{Diversity} is an essential characteristic of human language, as the meaning of a text or passage can often be restated. This work promotes the diversity of language by focusing on \textit{paraphrase generation}, which aims to rephrase a text in multiple ways, while preserving its semantic meaning. Therefore, a full-fledged paraphrase generation system features two desired properties, The first is \textit{fidelity}, preserving semantic meanings while paraphrasing. The second is \textit{diversity}, capturing a wide range of linguistic variations. In the past few years, deep learning models~\cite{COLING16_DeepParaphrase,Arxiv17Paraphrase_RL} achieve superior performance than the shallow models \cite{Zhao2010LeveragingMM,Wubben2010ParaphraseGA} on paraphrase generation, as well as a related task text simplification~\cite{ACL17_neural_text_simplification,EMNLP17Sentence_simplification_RL}. Those deep models employ the encoder-decoder architecture to formulate paraphrasing as monolingual machine translation problem, where the encoder encodes the input texts into hidden representations, and then the decoder takes the representations as input and generates output word sequences in a word-by-word fashion. In recent years, there are growing interests in generating lexically and syntactically diverse texts~\cite{narayan2014hybrid,NAACL2016_DiversityObjFunc,ICCV2017_diverse_image_description}. For deep models, the techniques capable of generating diverse paraphrases fall into two categories: i) applying decoding methods such as sampling or top-$K$ beam search; ii) including random noise~\cite{ICCV2017_diverse_image_description,CVPR17_vae} as model input. The former methods can always be applied to a trained deep model. As the model utilizes the same parameters, serving as a deterministic mapping from an input to one optimal output, the other outputs selected by the decoding methods are suboptimal. Moreover, empirically, the fidelity of outputs decreases as the number of outputs grows, as observed in Section~\ref{subsec:fedility}. Alternatively, although adding random noise to model inputs can sometimes make slight changes to model outputs, we observe in our experiments that in most times the corresponding models generate identical outputs. In this paper, we propose a simple but effective method, called \textbf{D}iverse \textbf{PA}raphrase \textbf{GE}neration (\textbf{D-PAGE}), extending neural machine translation (NMT) models to support multiple optimal outputs. We assume that different outputs of the same input can be explained by different rewriting patterns. The rewriting patterns are encoded in different subsets of model parameters, called pattern embeddings. In particular, we keep the encoder intact, and augment the decoder with pattern embeddings. Given an input text, the model selects appropriate pattern embeddings for different outputs so that the model uses different parameters for different input-output mappings. Different pattern embeddings may also be used to customize models for specific scenarios. For example, a child education system may prefer a model with relatively small vocabulary while a journalist assistant system prefers richer vocabulary. Our models equipped with pattern embeddings provide more flexibility than the models with fixed parameters. To measure the diversity between models, caused by varying patterns, we introduce an evaluation metric called Jeffrey's Divergence. According to this metric, our results on two real-world datasets show that our model is at least one order of magnitude better than the baselines. Furthermore, our model with at least one pattern embedding is able to achieve competitive fidelity as the baselines. Moreover, since it is difficult to explain the underlying complex rewriting patterns in real-world datasets, we construct synthetic datasets with atomic and interpretable patterns. On those datasets, our model is the only one among all models in comparison being able to capture the predefined patterns. To sum up, our contributions are three-folds: \begin{itemize} \item To the best of our knowledge, D-PAGE is the first attempt to extend NMT models for diverse outputs from model's perspective. \item We propose an evaluation metric and synthetic datasets for measuring diversity caused by various rewriting patterns. \item Our model achieves substantial improvement in terms of the new evaluation metric, without compromising fidelity. \end{itemize} \section{Related Work} Our work is closely related to the following three fields, paraphrase generation, creative language generation, and stylistic language generation. The mainstream approaches on paraphrase generation are based on monolingual machine translation~\cite{Barzilay2001ExtractingPF,Ibrahim2003ExtractingSP,Zhao2010LeveragingMM,ACL12_sentence_simplification_MT,Coling12_Paraphrasing_for_style,xu2016optimizing}, where the original sequences and paraphrased sequences are treated as source and target languages, respectively. Adopting contemporary Neural Machine Translation~\cite{NIPS14_Seq2Seq} technology, paraphrase generation systems manage to improve quality of paraphrases with better grammaticality and meaning preservation~\cite{ACL17_neural_text_simplification,COLING16_DeepParaphrase,Arxiv17Paraphrase_RL,EMNLP17Sentence_simplification_RL}. Although previous paraphrasing systems provide multiple outputs, they focus on lexical diversity~\cite{ACL12_sentence_simplification_MT,dong2017learning} and syntactic diversity~\cite{narayan2014hybrid,narayan2016paraphrase}. The diversity caused by varying rewriting patterns has been largely neglected. Recently, there has been increasing attention to the diversity of language generation systems, such as conversation systems~\cite{NAACL2016_DiversityObjFunc,li2016persona} and image caption systems~\cite{AAAI16_SentiCap,CVPR17_StyleNet}. \newcite{NAACL2016_DiversityObjFunc} introduce a novel loss function to increase the usage of more interesting words. \cite{ACL17_Diversity_Summ} proposes to use a novel attention mechanism to reduce repeating phrases, and thus improve diversity. These two approaches treat the diverse text generation problem as improving creativity of the generator, by introducing lexical diversity. Another line of works is capable of generating multiple outputs, by introducing random noise as input of the decoder~\cite{ICCV2017_diverse_image_description} or adding noise to the encoder's final hidden representation~\cite{CVPR17_vae}. Our work is also relevant to stylistic language generation that generates sentences with particular writing style. \cite{Coling12_Paraphrasing_for_style} paraphrases sentences with the style of a writer, e.g. Shakespeare. SentiCap~\cite{AAAI16_SentiCap} investigates generating image descriptions with positive or negative sentiments. Later on, StyleNet \cite{CVPR17_StyleNet} proposes to generate romantic and humorous captions to increase the attractiveness of captions. These approaches can be used to generate outputs with diverse styles, while they rely on the definitions of the styles by human. To train the stylish language generation model, one should collect additional corpora with designated styles, which is expensive in many scenarios. In contrast, our model do not rely on such copora. \input{paraphrase_model.tex} \input{paraphrase_exp.tex} \section{Conclusion} This paper presents a novel paraphrase generation method D-PAGE\xspace, which generates paraphrases with multiple rewriting patterns. Our model with different patterns can generate diverse outputs, with little loss of fidelity. D-PAGE\xspace also manages to provide models with higher lexical diversity than baselines. The experiments on synthetic datasets demonstrate the strong capacity of our model to learn common rewriting patterns.
\section{Introduction} Leavitt path algebras are algebraic analogues of graph C*-algebras and, ever since they were introduced in 2004, have become an active area of research. Many of the initial developments during the 2004 - 2014 period have been nicely described in the recent book \cite{AAS} and in the excellent survey article \cite{A}. Our goal in this article is to report on some of the recent developments in the investigation of the algebraic aspects of Leavitt path algebras not included in \cite{AAS}, \cite{A}. Because the Leavitt path algebras grew as algebraic analogues of graph C*-algebras, their initial investigation involved mostly the ideas and techniques used in the study of graph C*-algebras such as the graph properties of Conditions (K) and (L), and the ring properties of being simple, purely infinite simple, prime/primitive etc. An important \ starting goal in this initial study was to work out the algebraic analogue of the deep and powerful Kirchberg Phillips theorem to classify purely infinite simple Leavitt path algebras $L:=L_{K}(E)$ up to isomorphism or up to Morita equivalence by means the Grothendieck groups $K_{0}(L)$ and the sign of the determinant $\det(I-A_{E})$ where $A_{E}$ is the adjacent matrix of the graph $E$. After such initial progress, there has been an explosion of articles dealing with not only the various different aspects of Leavitt path algebras, but also many natural generalizations such as Leavitt path algebras over commutative rings, of separated graphs, of high rank graphs, Steinberg algebras and groupoids etc. In the background of many of these investigation is the special feature that every Leavitt path algebra $L$ is endowed with three mutually compatible structures: $L$ is a $K$-algebra, $L$ is a \mathbb{Z} $-graded ring and $L$ is a ring with involution $^{\ast}$. Our focus in this survey is to describe a selection of recent graded and non-graded ring-theoretic and module-theoretic investigations of Leavitt path algebras. My apologies to authors whose work has not been included due to the constrained focus, limitation of time and length of the paper. In the first part of this survey, we describe graphical conditions \ on $E$ under which the corresponding Leavitt path algebra $L_{K}(E)$ belongs to well-known classes of rings. The interesting fact is that often a single graph property of $E$ seems to imply multiple ring properties of $L_{K}(E)$ and these properties for general rings are usually independent of each other. The poster child of such a phenomenon is the graph property for a finite graph $E$ that no cycle in $E$ has an exit. In this case $L_{K}(E)$ possesses at least nine completely different ring properties ! (see Theorem \ref{NC-finiteCase}). Because of such connections between $E$ and $L_{K}(E)$, Leavitt path algebras can be effective tools in the construction of examples of rings with various desired properties. If we do not impose any graphical conditions on $E$ and just look at $L_{K}(E)$ as a \mathbb{Z} $-graded ring, a really interesting result by Hazrat \cite{H} states that $L_{K}(E)$ is a graded von Neumann regular ring. Because of this, the graded one-sided and two-sided ideals of $L_{K}(E)$ possess many desirable properties. The module theory over Leavitt path algebras is still at an infant stage. \ The second part of this survey gives an account of some of the recent advances in this theory. Naturally, the initial investigations focussed on the simplest of the modules, namely, the simple modules over $L_{K}(E)$. We begin with outlining a few methods of constructing graded and non-graded simple left/right $L_{K}(E)$-modules. A special type of simple modules, called Chen simple modules introduced by Chen \cite{C}, play an important role. This is followed by characterizing Leavitt path algebras over which all the simple modules possess some special properties, such as, when all the simple modules are flat, or injective, or finitely presented or graded etc. For example, very recently, A.A. Ambily, R. Hazrat and H. Li (\cite{AHL}) have proved that every simple left/right $L_{K}(E)$-modules is flat if and only if $L_{K}(E)$ is von Neumann regular, thus showing, in the case of Leavitt path algebras, an open question in ring theory has an affirmative answer. Likewise, it was shown in \cite{AMT-1} that $Ext_{L_{K}(E)}^{1}(S,S)\neq0$ for a Chen simple module $S$ induced by a cycle. It can then be shown that if all the simple left $L_{K}(E)$-modules are injective, then $L_{K}(E)$ is von Neumann regular. The converse easily holds if $E$ is a finite graph, since it that case $L_{K}(E)$ is semi-simple artinian. In contrast, if $R$ is an arbitrary non-commutative ring, the injectivity of all simple left $R$- modules need not imply von Neumann regularity of $R$ (see \cite{CO}). Our next result in this section describes Leavitt path algebras of finite graphs having finite irreducible representation type, that is, when there are only finitely many isomorphism classes of simple modules. Interestingly, this class of algebras turns out to be precisely the class of Leavitt path algebras of finite graphs having finite Gelfand-Kirillov dimension. The last section deals with one-sided ideals of a Leavitt path algebra $L$. Four years ago it was shown in \cite{R-2} that finitely generated two-sided ideals of $L$ are principal ideals. Recently, G. Abrams, F. Mantese and A.Tonolo (\cite{AMT-2}) generalized this by showing that every finitely generated one-sided ideal of $L$ is a principal ideal. Such rings are called B\'{e}zout rings. Using a deep theorem of G. Bergman, Ara and Goodearl (\cite{AG}) showed that one-sided ideals of $L$ are projective. From these two results, it follows that the sum and the intersection of principal one-sided ideals of $L$ are again principal. Thus the principal one-sided ideals of $L$ form a sublattice of the lattice of all one-sided ideals of $L$. A well-known theorem, proved originally for graph C*-algebras and later for Leavitt path algebras $L_{K}(E),$ states that every two-sided ideal of $L_{K}(E)$ is a graded ideal if and only if $E$ satisfies Condition (K), equivalently $L_{K}(E)$ is a weakly regular ring. What happens when every one-sided ideal of $L_{K}(E)$ is graded? The last theorem of this section answers this question, namely, every one-sided ideal of $L_{K}(E)$ is graded if and only if every simple $L_{K}(E)$-module is graded if and only if $L_{K}(E)$ is a von Neumann regular ring (see \cite{HR}). In summary, this survey is intended to showcase a small sample of some of the recent research on the algebraic aspects of Leavitt path algebras. Hopefully, this provides the reader with some insights into this theory and generates further interest in this exciting and growing field of algebra. \ \section{Preliminaries} For the general notation, terminology and results in Leavitt path algebras, we refer to \cite{AAS} and \cite{A}. We give below an outline of some of the needed basic concepts and results. A (directed) graph $E=(E^{0},E^{1},r,s)$ consists of two sets $E^{0}$ and $E^{1}$ together with maps $r,s:E^{1}\rightarrow E^{0}$. The elements of $E^{0}$ are called \textit{vertices} and the elements of $E^{1}$ \textit{edges}. \textbf{\ }A vertex $v$ is called a \textit{sink} if it emits no edges and a vertex $v$ is called a \textit{regular} \textit{vertex} if it emits a non-empty finite set of edges. An \textit{infinite emitter} is a vertex which emits infinitely many edges. For each $e\in E^{1}$, we call $e^{\ast}$ a \textit{ghost} edge. We let $r(e^{\ast})$ denote $s(e)$, and we let $s(e^{\ast})$ denote $r(e)$. A\textit{\ path} $\mu$ of length $n>0$ is a finite sequence of edges $\mu=e_{1}e_{2}\cdot\cdot\cdot e_{n}$ with $r(e_{i})=s(e_{i+1})$ for all $i=1,\cdot\cdot\cdot,n-1$. In this case $\mu^{\ast}=e_{n}^{\ast}\cdot\cdot\cdot e_{2}^{\ast}e_{1}^{\ast}$ is the corresponding ghost path. A vertex\ is considered a path of length $0$. A path $\mu$ $=e_{1}\cdot\cdot\cdot e_{n}$ in $E$ is \textit{closed} if $r(e_{n})=s(e_{1})$, in which case $\mu$ is said to be \textit{based at the vertex }$s(e_{1})$. A closed path $\mu$ as above is called \textit{simple} provided it does not pass through its base more than once, i.e., $s(e_{i})\neq s(e_{1})$ for all $i=2,...,n$. The closed path $\mu$ is called a \textit{cycle} if it does not pass through any of its vertices twice, that is, if $s(e_{i})\neq s(e_{j})$ for every $i\neq j$. An \textit{exit }for a path $\mu=e_{1}\cdot\cdot\cdot e_{n}$ is an edge $e$ such that $s(e)=s(e_{i})$ for some $i$ and $e\neq e_{i}$. For any vertex $v$, the \textit{tree} of $v$ is $T_{E}(v)=\{w\in E^{0}:v\geq w\}$. We say there is a\textit{\ bifurcation} at a vertex $v$ or $v$ is a\textit{\ bifurcation vertex}, if $v$ emits more than one edge. In a graph $E $, a vertex $v$ is called a \textit{line point} if there is no bifurcation or a cycle based at any vertex in $T_{E}(v)$. Thus, if $v$ is a line point, the vertices in $T_{E}(v)$ arrange themselves on a straight line path $\mu$ starting at $v$ ($\mu$ could just be $v$) such as $\bullet_{v}\rightarrow \bullet\cdot\cdot\cdot\bullet\rightarrow\bullet\cdot\cdot\cdot$ which could be finite or infinite. If $p$ is an infinite path in $E$, say, $p=e_{1}\cdot\cdot\cdot e_{n e_{n+1}\cdot\cdot\cdot$ \ \ \ , we follow Chen \cite{C} to define, for each $n\geq1$, $\tau^{\leq n}(p)=e_{1}\cdot\cdot\cdot e_{n}$ \ and $\tau ^{>n}(p)=e_{n+1}e_{n+2}\cdot\cdot\cdot$ \ . Two infinite paths $p,q$ are said to be \textit{tail-equivalent} if there are positive integers $m,n$ such that $\tau^{>m}(p)=\tau^{>n}(q)$. This defines an equivalence relation among the infinite paths in $E$ and the equivalence class containing the path $p$ is denoted by $[p]$. An infinite path $p$ is said to be a \textit{rational path }if it is tail-equivalent to an infinite path $q=ccc\cdot\cdot\cdot$ , where $c$ is a closed path. Given an arbitrary graph $E$ and a field $K$, the \textit{Leavitt path algebra }$L_{K}(E)$ is defined to be the $K$-algebra generated by a set $\{v:v\in E^{0}\}$ of pair-wise orthogonal idempotents together with a set of variables $\{e,e^{\ast}:e\in E^{1}\}$ which satisfy the following conditions: (1) \ $s(e)e=e=er(e)$ for all $e\in E^{1}$. (2) $r(e)e^{\ast}=e^{\ast}=e^{\ast}s(e)$\ for all $e\in E^{1}$. (3) (The \textquotedblleft CK-1 relations\textquotedblright) For all $e,f\in E^{1}$, $e^{\ast}e=r(e)$ and $e^{\ast}f=0$ if $e\neq f$. (4) (The \textquotedblleft CK-2 relations\textquotedblright) For every regular vertex $v\in E^{0}$, \[ v=\sum_{e\in E^{1},s(e)=v}ee^{\ast}. \] An arbitrary element $a\in L:=L_{K}(E)$ can be written as $a=$ {\displaystyle\sum\limits_{i=1}^{n}} k_{i}\alpha_{i}\beta_{i}^{\ast}$ where $\alpha_{i},\beta_{i}$ are paths and $k_{i}\in K$. Here $r(\alpha_{i})=s(\beta_{i}^{\ast})=r(\beta_{i})$. Every Leavitt path algebra $L_{K}(E)$ is a \mathbb{Z} $\textit{-graded algebra}, namely, $L_{K}(E) {\displaystyle\bigoplus\limits_{n\in\mathbb{Z}}} L_{n}$ induced by defining, for all $v\in E^{0}$ and $e\in E^{1}$, $\deg (v)=0$, $\deg(e)=1$, $\deg(e^{\ast})=-1$. Here the $L_{n}$ are abelian subgroups satisfying $L_{m}L_{n}\subseteq L_{m+n}$ for all $m,n\i \mathbb{Z} $. Further, for each $n\i \mathbb{Z} $, the homogeneous component $L_{n}$ is given by $L_{n}=\ {\textstyle\sum} k_{i}\alpha_{i}\beta_{i}^{\ast}\in L:\alpha,\beta\in Path(E),$ $|\alpha _{i}|-|\beta_{i}|=n\}$. (For details, see Section 2.1 in \cite{AAS}). An ideal $I$ of $L_{K}(E)$ is said to be a \textit{graded ideal} if $I=$ {\displaystyle\bigoplus\limits_{n\in\mathbb{Z}}} (I\cap L_{n})$. Throughout this paper, $E$ will denote an arbitrary graph (with no restriction on the number of vertices or on the number of edges emitted by each vertex) and $K$ will denote an arbitrary field. For convenience in notation, we will denote, most of the times, the Leavitt path algebra $L_{K}(E)$ by $L$. We shall first recall the definition of the Gelfand-Kirillov dimension of associative algebras over a field. Let $A$ be a finitely generated $K$-algebra, generated by a finite dimensional subspace $V=Ka_{1}\oplus\cdot\cdot\cdot\oplus Ka_{m}$. Let $V^{0}=K$ and, for each $n\geq1$, let $V^{n}$ denote the $K$-subspace of $A$ spanned by all the monomials of length $n$ in $a_{1},\cdot\cdot\cdot,a_{m}$. Set $V_{n} {\textstyle\sum\limits_{i=0}^{n}} V^{i}$. Then the \textbf{Gelfand-Kirillov dimension} of $A$ ( for short, the \textbf{GK-dimension} of $A$) is defined b \[ \text{GK-dim}(A):=\underset{n\rightarrow\infty}{\lim\sup}\log_{n}(\dim V_{n}). \] It is known that the GK-dim($A$) is independent of the choice of the generating subspace $V$. If $A$ is an infinitely generated $K$-algebra, then the GK-dimension of $A$ is defined as \[ \text{GK-dim}(A):=\underset{B}{Sup\text{ }}\text{GK-dim}(B) \] where $B$ runs over all the finitely generated $K$-subalgebras of $A$. The GK-dimension of an algebra $A$ measures the growth of the algebra $A$ and might be considered the non-commutative analogue of the classical Krull dimension for commutative algebras. Some useful examples (see \cite{KL}) are: The GK-dimension the matrix ring $M_{\Lambda}(K)$ is $0$ and the GK-dimension of the matrix ring $M_{\Lambda^{\prime}}(K[x,x^{-1}])$ is $1$, where $\Lambda,\Lambda^{\prime}$ are arbitrary possibly imnfinite index sets. \textbf{Grading of a matrix ring over a } \mathbb{Z} $\textbf{-graded ring:} We wish to recall the grading of matrices of finite order and then indicate how to extend this to the case of infinite matrices in which at most finitely many entries are non-zero (see \cite{H-1} and \cite{NvO}). This will be used in Section 4. In the following, the length of a path $p$ will be denoted by $|p|$. Let $\Gamma$ be an additive abelian group, $A$ be a $\Gamma$-graded ring and $(\delta_{1},\cdot\cdot\cdot,\delta_{n})$ an $n$-tuple where $\delta_{i \in\Gamma$. Then $M_{n}(A)$ is a $\Gamma$-graded ring where, for each $\lambda\in\Gamma$, its $\lambda$-homogeneous component consists of $n\times n$ matrice \[ M_{n}(A)(\delta_{1},\cdot\cdot\cdot,\delta_{n})_{\lambda}=\left( \begin{array} [c]{cccccc A_{\lambda+\delta_{1}-\delta_{1}} & A_{\lambda+\delta_{2}-\delta_{1}} & \cdot & \cdot & \cdot & A_{\lambda+\delta_{n}-\delta_{1}}\\ A_{\lambda+\delta_{1}-\delta_{2}} & A_{\lambda+\delta_{2}-\delta_{2}} & & & & A_{\lambda+\delta_{n}-\delta_{2}}\\ & & & & & \\ & & & & & \\ & & & & & \\ A_{\lambda+\delta_{1}-\delta_{n}} & A_{\lambda+\delta_{2}-\delta_{n}} & & & & A_{\lambda+\delta_{n}-\delta_{n} \end{array} \right) .\qquad\ \ (1) \] This shows that for each homogeneous element $x\in A$, \[ \deg(e_{ij}(x))=\deg(x)+\delta_{i}-\delta_{j}\text{,}\qquad\qquad\qquad \qquad(2) \] where $e_{ij}(x)$ is a matrix with $x$ in the $ij$-position and with every other entry $0$. Now let $A$ be a $\Gamma$-graded ring and let $I$ be an arbitrary infinite index set. Denote by $M_{I}(A)$ the matrix with entries indexed by $I\times I $ having all except finitely many entries non-zero and for each $(i,j)\in I\times I$, the $ij$-position is denoted by $e_{ij}(a)$ where $a\in A$. Considering a "vector" $\bar{\delta}:=(\delta_{i})_{i\in I}$ where $\delta _{i}\in\Gamma$ and following the usual grading on the matrix ring \ (see (1),(2)), define, for each homogeneous element $a$ \[ \deg(e_{ij}(a))=\deg(a)+\delta_{i}-\delta_{j}\text{.}\qquad\qquad\qquad \qquad(3) \] This makes $M_{I}(A)$ a $\Gamma$-graded ring, which we denote by $M_{I}(A)(\bar{\delta})$. Clearly, if $I$ is finite with $|I|=n$, then the graded ring coincides (after a suitable permutation) with $M_{n}(A)(\delta _{1},\cdot\cdot\cdot,\delta_{n})$. Suppose $E$ is a finite acyclic graph consisting of exactly one sink $v$. Let $\{p_{i}:1\leq i\leq n\}$ be the set of all paths ending at $v$. Then it was shown in (Lemma 3.4, \cite{AAS-1}) \[ L_{K}(E)\cong M_{n}(K)\qquad\qquad\qquad(4) \] under the map $p_{i}p_{j}^{\ast}\longmapsto e_{ij}$. Now taking into account the grading of $M_{n}(K)$, it was further shown in (Theorem 4.14, \cite{H-1}) that the same map induces a graded isomorphism \[ L_{K}(E)\longrightarrow M_{n}(K)(|p_{1}|,\cdot\cdot\cdot,|p_{n}|)\qquad \qquad\qquad(5) \ \[ p_{i}p_{j}^{\ast}\longmapsto e_{ij\text{.} \] In the case of a comet graph $E$ (that is, a finite graph $E$ with a cycle $c $ without exits and a vertex $v$ on $c$ such that every path in $E$ which does not include all the edges in $c$ ends at $v$), it was shown in (Lemma 2.7.1, \cite{AAS}) that the ma \[ L_{K}(E)\longrightarrow M_{n}(K[x,x^{-1}])\qquad\qquad\qquad(6) \] given by \[ \text{ }p_{i}c^{k}p_{j}^{\ast}\longmapsto e_{ij}(x^{k}) \] where the $e_{ij}$ are matrix units, induces an isomorphism. Again taking into account the grading, it was shown in (Theorem 4.20, \cite{H-1}) that the ma \[ L_{K}(E)\longrightarrow M_{n}(K[x^{|c|},x^{-|c|}])(|p_{1}|,\cdot\cdot \cdot\cdot,|p_{n}|)\qquad\qquad\qquad(7) \] given by \[ \text{ }p_{i}c^{k}p_{j}^{\ast}\longmapsto e_{ij}(x^{k|c|}) \] induces a graded isomorphism. Later in the paper \cite{AAS-2}, the isomorphisms (4) and (6) were extended to infinite acyclic and infinite comet graphs respectively \ (see Proposition 3.6 \cite{AAS-2}). The same isomorphisms with the grading adjustments will induce graded isomorphisms for Leavitt path algebras of such graphs. We now describe this extension below. Let $E$ be a graph such that no cycle in $E$ has an exit and such that every infinite path contains a line point or is tail-equivalent to a rational path $ccc\cdot\cdot\cdot.$ \ where $c$ is a cycle (without exits). \ Define an equivalence relation in the set of all line points in $E$ by setting $u\sim v $ if $T_{E}(u)\cap T_{E}(v)\neq\emptyset$\ \ Let \ $X$ be the set of representatives of distinct equivalence classes of line points in $E$, so that for any two line points $u,v\in X$ with $u\neq v$, $T_{E}(u)\cap T_{E}(v)=\emptyset$. For each vertex \ $v_{i}\in X$, let $\overset{-}{p^{v_{i }}:=\{p_{s}^{v_{i}}:s\in\Lambda_{i}\}$ be the set of all paths that end at $v_{i}$, where $\Lambda_{i}$ is an index set which could possibly be infinite. Denote by $|\overset{-}{p^{v_{i}}|}=\{|p_{s}^{v_{i}}|:s\in\Lambda_{i}\}$. Let $Y$ be the set of all distinct cycles in $E$. As before, for each cycle $c_{j}\in Y$ based at a vertex $w_{j}$, let $\overset{-}{q^{w_{j}} :=\{q_{r}^{w_{j}}:r\in\Upsilon_{j}\}$ be the set of all paths that end at $w_{j}$ but do not include all the edges of $c_{j}$, where $\Upsilon_{j}$ is an index set which could possibly be infinite. Let $|$ $\overset{-}{q^{w_{j}}}|:=\{|q_{r}^{w_{j}}|:r\in\Upsilon_{j}\}$. Then the isomorphisms (5) and (7) extend to a \mathbb{Z} $-graded isomorphis \[ L_{K}(E)\cong_{gr {\displaystyle\bigoplus\limits_{v_{i}\in X}} M_{\Lambda_{i}}(K)(|\overset{-}{p^{v_{i}}|)}\oplu {\displaystyle\bigoplus\limits_{w_{j}\in Y}} M_{\Upsilon_{j}}(K[x^{|c_{j}|},x^{-|c_{j}|}])(|\overset{-}{q^{w_{j}} |)\qquad(8) \] where the grading is as in (3). \section{Leavitt path algebras satisfying a polynomial identity} Observe that Leavitt path algebras in general are highly non-commutative. For instance, if the graph $E$ contains an edge $\ e$ with $u=s(e)\neq r(e)=v $, then $ue=e$, \ but $eu=0$. Indeed, it is an easy exercise to conclude that if $\ E$ is a connected graph, then $L_{K}(E)$ is a commutative ring if and only if the graph $E$ consists of just a single vertex $v$ or is a loop $e$, that is a single edge $e$ with $s(e)=r(e)=v$. In this case, $L_{K}(E)$ is isomorphic to $K$ or $K[x,x^{-1}]$. Note that to say a ring $R$ is commutative is equivalent to saying that $R$ satisfies the polynomial identity $xy-yx=0$. \ An algebra $A$ over a field $K $ is said to \textbf{satisfy a polynomial identity} (or simply, a \textbf{PI-algebra}), if there is a polynomial $p(x_{1},\cdot\cdot\cdot ,x_{n})$ in finitely many non-commuting variable $x_{1},\cdot\cdot\cdot,x_{n}$ with coefficients in $K$ such that $p(a_{1},\cdot\cdot\cdot,a_{n})=0$ for all choices of elements $a_{1},\cdot\cdot\cdot,a_{n}\in A$. For example, the Amitsur-Levitzky theorem (see \cite{P}) states that the ring $M_{n}(R)$ of $n\times n$ matrices over a commutative ring $R$ satisfies the so called standard polynomial identity $P_{n}(x_{1},\cdot\cdot\cdot,x_{n}) {\displaystyle\sum\limits_{\sigma\in S_{n}}} \epsilon_{\sigma}x_{\sigma(1)}\cdot\cdot\cdot x_{\sigma(n)}$ where $S_{n}$ is the symmetric group of $n!$ permutations of the set $\{1,\cdot\cdot\cdot,n\}$ and $\epsilon_{\sigma}=1$ or $-1$ according as $\sigma$ is even or odd. A natural question is to characterize the Leavitt path algebras which satisfy a polynomial identity. This is completely answered in the next theorem. \begin{theorem} \label{BLR}(\cite{BLR}) Let $E$ be an arbitrary graph. Then the following properties are equivalent for $L_{K}(E)$: (a) $L_{K}(E)$ satisfies a polynomial identity; (b) No cycle in $E$ has an exit, there is a fixed positive integer $d$ such that the number of distinct paths that end at any vertex $v$ is $\leq d$ and the only infinite paths in $E$ are paths that are eventually of the form $ggg\cdot\cdot\cdot$, for some cycle $g$; (c) There is a fixed positive integer $d$ such that $L_{K}(E)$ is a subdirect product of matrix rings over $K$ or $K[x,x^{-1}]$ of order at most $d$. \end{theorem} If the graph $E$ is row-finite, then the Leavitt path algebra $L_{K}(E)$ in Theorem \ref{BLR} actually decomposes as a ring direct sum of matrix rings over $K$ or $K[x,x^{-1}]$ of order at most a fixed positive integer $d$. This shows that satisfying a polynomial identity imposes a serious restriction on the structure of Leavitt path algebras. \section{Four Important Graphical Conditions} In this section, we shall illustrate how specific graphical conditions on the graph $E$ give rise to various algebraic properties of $L_{K}(E)$. We illustrate this by choosing four different graph properties of $E$. Interestingly, a single graph theoretical property of $E$ often implies several different ring properties for $L_{K}(E)$. It is amazing that a single property that no cycle in a finite graph $E$ has an exit implies that the corresponding Leavitt path algebra $L_{K}(E)$ possesses several different ring properties such as being directly finite, self-injective, having bounded index of nilpotence, a Baer ring, satisfying a polynomial identity, having GK-dimension $\leq1$, etc. (see Theorem \ref{NC-finiteCase} below). Consequently, Leavitt path algebras turn out to be useful tools in the construction of various examples of rings. We will also describe the interesting history behind the terms Condition (K) and Condition (L) which play an important role in the investigation of both the graph C*-algebras and Leavitt path algebras (see \cite{AAS}, \cite{T},\cite{T-2}). Recall, a ring $R$ is said to be von Neumann regular if to each element $a\in R$ there is an element $b\in R$ such that $a=aba$. The ring $R$ is said to be $\pi$-regular (strongly left or right $\pi$-regular) if to each element $a\in R$, there is a $b\in R$ and an integer $n\geq1$ such that $a^{n}=a^{n}ba^{n}$ ($a^{n}=a^{n+1}b$ or $a^{n}=ba^{n+1}$). In general, these ring properties are not equivalent. But as the next theorem shows, they all coincide for Leavitt path algebras. A graph $E$ is said to be \textbf{acyclic} if $E$ contains no cycles. The next theorem characterizes the von Neumann regular Leavitt path algebras. \begin{theorem} \cite{AR} For an arbitrary graph $E$, the following conditions are equivalent for $L:=L_{K}(E)$: (a) The graph $E$ is acyclic; (b) $L$ is von Neumann regular; (c) $L$ is $\pi$-regular; (d) $L$ is strongly left/right $\pi$-regular. \end{theorem} Another important graph property is Condition (K). In some sense this property is diametrically opposite of being acyclic. \begin{definition} A graph $E$ satisfies \textbf{Condition (K)} if whenever a vertex $v$ lies on a simple closed path $\alpha$, $v$ also lies on another simple closed path $\beta$ distinct from $\alpha$. \end{definition} The Condition (K) implies a number of ring properties; \begin{definition} (i) A ring $R$ is said to be left/right \textbf{weakly regular }if for every left/right ideal $I$ of $R$, $I^{2}=I$; (ii) A ring $R$ is said to be an \textbf{exchange ring} if given any left/right $R$-module $M$ and two direct decompositions of $M$ as $M=M^{\prime}\oplus A$ and $M {\displaystyle\bigoplus\limits_{i=1}^{n}} A_{i}$, where $M^{\prime}\cong R$, there exist submodules $B_{i}\subseteqq A_{i}$ such that $M=M^{\prime}\oplu {\displaystyle\bigoplus\limits_{i=1}^{n}} B_{i}$. \end{definition} \begin{theorem} \label{Condn K}( \cite{APS}, \cite{ARS}, \cite{T}) Let $E$ be an arbitrary graph. Then the following conditions are equivalent for $L:=L_{K}(E)$: (i) \ The graph $E$ satisfies Condition (K); (ii) $L$ is an exchange ring; (iii) $L$ is left/right weakly regular; (iv) Every two-sided ideal of $L$ is a graded ideal. \end{theorem} \begin{definition} A graph $E$ is said to satisfy \textbf{Condition (L)}, if every cycle in $E$ has an exit. \end{definition} \begin{theorem} \cite{R-1} Let $E$ be an arbitrary graph. Then the following are equivalent for $L_{K}(E)$: (i) $E$ satisfies Condition (L); (ii) $L$ is a \textbf{Zorn ring}, that is, every (non-nil) right/left ideal $I$ contains a non-zero idempotent.; (iii) Every element $a\in L$ \ is the von Neumann inverse of another element $b\in L$; that is, to each $a\in L$, there is an element $b\in L$ such that $bab=b$. \end{theorem} \textbf{An interesting history of Conditions (K) and (L)}: One may wonder about the choice of the letters K and L in the terms Condition (K) and Condition (L). There is an interesting narrative about the origins of these terms. I am grateful to Mark Tomforde for outlining this history to me which he will also be including in his forth-coming book on Graph Algebras (\cite{T-2}). Both these two graph conditions were originally introduced by graph C*-algebraists. It all started when Cuntz and Krieger (whom some consider the founders of graph C*-algebras), introduced in their original paper (\cite{CK}) \ a condition on matrices with entries in $\{0,1\}$ and called it Condition (I). Assuming that the "I" is the English letter I and not the Roman numeral one, Pask and Raeburn introduced in 1996 a Condition (J) in their paper (\cite{PR}), as J is the letter that follows I in the English alphabet. (They apparently did not recognize that C\"{u}ntz and Krieger also introduced a follow-up Condition (II), thus indicating, in their view, I and II stand for Roman numerals). Conforming to this pattern, when Kumjian, Pask, Raeburn and Renault introduced a new condition in their 1997 paper (\cite{KPRR}), they chose the letter K to denote this new condition and called it Condition (K). Continuing this pattern yet again, Kumjian, Pask and Raeburn introduced Condition (L) in 1998 (\cite{KPR}). Actually, Astrid an Huef later showed that Condition (L) coincides with Condition (I) for graphs of finite matrices. Moreover, Condition (K) is considered analogous to Condition (II) for Cuntz-Krieger algebras. In all the investigations that followed in graph C*-algebras and also in Leavitt path algebras, Conditions (K) and (L) emerged as important graph conditions. Poor Condition (J) remains neglected ! Recall, Condition (L) requires every cycle to have an exit. We next consider a graph property that is diametrically opposite to Condition (L), namely, no cycle in the graph has an exit. This implies several interesting ring/module properties. First, consider a finite graph $E$ in which no cycle has an exit. In this case, $L_{K}(E)$ is a ring with identity. \ We begin recalling a number of ring properties. A ring $R$ with identity $1$ is said to be \textbf{directly finite} if for any two elements $x,y$, $xy=1$ implies $yx=1$. This is equivalent to $R$ being not isomorphic to any proper direct summand of $R$ as a left or a right $R$-module. A ring $R$ with identity is called a \textbf{Baer ring }if the left/right annihilator of every subset $X$ of $R$ is generated by an idempotent. A $\Gamma$-graded ring $R$ is said to be a \textbf{graded Baer ring}, if the left/right annihilator of every subset $X$ of homogeneous elements is generated by a homogeneous idempotent. A ring $R$ is said to have \textbf{bounded index of nilpotence} if there is a positive integer $n$ which is such that $a^{n}=0$ for every nilpotent element $a\in R$. \begin{theorem} \label{NC-finiteCase}( \cite{AAJZ}, \cite{BLR}, \cite{HR}, \cite{HRS-1}, \cite{HV}, \cite{V} ) For a finite graph $E$, the following conditions are equivalent for $L:=L_{K}(E)$: (i) \ \ \ \ \ No cycle in $E$ has an exit; (ii) \ $\ \ \ L$ is directly finite; (iii) $\ \ \ L$ is a Baer ring; (iv) $\ \ \ L$ is a graded Baer ring; (v) \ $\ \ L$ is a graded left/right self-injective ring; (vi) $\ \ L$ satisfies a polynomial identity; (vii) \ $L$ has bounded index of nilpotence; (viii) $L$ is graded semi-simple; (ix) \ $L$ has GK-dimension $\leq1;$ (x) \ $L$ is finite over its center. \end{theorem} Thus if $E$ is the following graph, \ \begin{array} [c]{ccccccccccc} & & & & & & \bullet & \longrightarrow & \bullet & & \\ & & & & & \nearrow & & & & \searrow & \\ \bullet_{{}} & \longrightarrow & \bullet & \longrightarrow & \bullet & & & & & & \bullet\\ & & & & & \nwarrow & & & & \swarrow & \\ & & & & & & \bullet & \longleftarrow & \bullet & & \end{array} \] then $L_{K}(E)$ will possess all the stated nine ring properties. For a finite graph $E$, if $L_{K}(E)$ satisfies any of the equivalent conditions in the preceding theorem, $L_{K}(E)$ decomposes as a graded direct sum of finitely many matrix rings of finite order over $K$ and/or $K[x,x^{-1}]$ which are given the matrix gradings indicated in equations (5) and (7) in the Preliminaries section. For a ring $R$ without identity, but with local units, $R$ is said to be directly finite if for every $x,y\in R$ and an idempotent $u\in R$ satisfying $ux=x=xu,uy=y=yu$, we have $xy=u$ implies $yx=u$. Every commutative ring is trivially directly finite. If $R$ is a ring without identity, $R$ is called a \textbf{locally Baer ring} (\textbf{locally graded Baer }ring) if for every idempotent (homogeneous idempotent) $e$, the corner $eRe$ is a Baer (graded Baer) ring. \begin{theorem} (\cite{HR}, \cite{HV}) Let $E$ be an arbitrary graph. Then the following conditions are equivalent for $L:=L_{K}(E)$: (i) \ \ No cycle in $E$ has an exit, $E$ is row-finite and every infinite path ends at a sink or a cycle. (ii) $\ L$ is a locally Baer ring; (iii) $L$ is a \ graded locally Baer ring; (iv) $L$ is a graded left/right self-injective ring; (v) $L$ is graded isomorphic to a ring direct sum of \ matrix ring \[ L_{K}(E)\cong_{gr {\displaystyle\bigoplus\limits_{v_{i}\in X}} M_{\Lambda_{i}}(K)(|\overset{-}{p^{v_{i}}|)}\oplu {\displaystyle\bigoplus\limits_{w_{j}\in Y}} M_{\Upsilon_{j}}(K[x^{t_{j}},x^{-t_{j}}])(|\overset{-}{q^{w_{j}}}|) \] where $\Lambda_{i}$,$\Upsilon_{j}$ are suitable index sets, the $t_{j}$ are positive integers,\ $X$ is the set of representatives of distinct equivalence classes of line points in $E$ and $Y$ is the set of all distinct cycles (without exits) in $E$. \end{theorem} \section{ Simple modules over Leavitt path algebras} In this section, we shall indicate the methods of constructing simple modules over Leavitt path algebras by graphical methods. As noted in \cite{AAS}, every element $a$ of a Leavitt path algebra $L_{K}(E) $ over a graph $E$ can be written in the form $a {\displaystyle\sum\limits_{i=1}^{n}} \alpha_{i}\beta_{i}^{\ast}$ and that the map {\displaystyle\sum\limits_{i=1}^{n}} \alpha_{i}\beta_{i}^{\ast}\longrightarro {\displaystyle\sum\limits_{i=1}^{n}} \beta_{i}^{{}}\alpha_{i}^{\ast}$ induces an isomorphism $L_{K (E)\longrightarrow(L_{K}(E))^{op}$. Consequently, $L_{K}(E)$ is left-right symmetric. So in this and the next section, we shall only be stating results on left ideals and left modules over $L_{K}(E)$. The corresponding results on right ideals and right modules hold by symmetry. \begin{definition} A \ vertex $v$ is called a\textit{\ }\textbf{Laurent vertex }if $T_{E}(v)$ consists of the set of all vertices on a single path $\gamma=\mu c$ where $\mu$ is a path without bifurcations starting at $v$ and $c$ is a \ cycle without exits based on a vertex $u=r(\mu)$. \end{definition} An easy example of a Laurent vertex is the vertex $v$ in the following graph \ \begin{array} [c]{ccccccccccc} & & & & & & \bullet & \longrightarrow & \bullet & & \\ & & & & & \nearrow & & & & \searrow & \\ \bullet_{v} & \longrightarrow & \bullet & \longrightarrow & \bullet & & & & & & \bullet\\ & & & & & \nwarrow & & & & \swarrow & \\ & & & & & & \bullet & \longleftarrow & \bullet & & \end{array} \] The next theorem gives conditions under which a vertex in the graph $E$ generates a simple left ideal/graded simple left ideal of $L_{K}(E)$. \begin{theorem} (\cite{AAS}, \cite{HR}) Let $E$ be an arbitrary graph and let $v$ be a vertex. Then (a) The left ideal $L_{K}(E)v$ is a simple/minimal left ideal of $L_{K}(E)$ if and only if $v$ is a line point; (b) The left ideal $L_{K}(E)v$ is a graded simple/minimal left ideal of $L_{K}(E)$ if and only if $v$ is either a line point or a Laurent vertex. \end{theorem} Next we shall describe the general methodology used by Chen (\cite{C}) \ and extended in (\cite{HR}, \cite{R-3}) to construct left simple and graded simple modules over $L_{K}(E)$ by using special vertices or cycles in the graph $E$. I) \textbf{Definition of the module }$A_{u}$: Let $u$ be a vertex in a graph $E$ which is either a sink or an infinite emitter. Let $A_{u}$ be the $K$-vector space having as a basis the set $B=\{p:p$ is a path in $E$ with $r(p)=u\}$. We make $A$ a left $L_{K}(E)$-module as follows: Define, for each vertex $v$ and each edge $e$ in $E$, linear transformations $P_{v},S_{e}$ and $S_{e^{\ast}}$ on $A$ by defining their actions on the basis $B$ are as follows: For all $p\in B$, (I) $\ \ P_{v}(p)=\left\{ \begin{array} [c]{c p\text{, if }v=s(p)\\ 0\text{, otherwise \end{array} \right. $ (II) $\ S_{e}(p)=\left\{ \begin{array} [c]{c ep\text{, if }r(e)=s(p)\\ 0\text{, \qquad otherwise \end{array} \right. $ (III) $S_{e^{\ast}}(p)=\left\{ \begin{array} [c]{c p^{\prime}\text{, if }p=ep^{\prime}\\ 0\text{, otherwise \end{array} \right. $ (IV) $S_{e^{\ast}}(u)=0$. The endomorphisms $\{P_{v},S_{e},S_{e^{\ast}}:v\in E^{0},e\in E^{1}\}$ satisfy the defining relations (1) - (4) of the Leavitt path algebra $L_{K}(E)$. This induces an algebra homomorphism $\phi$ from $L_{K}(E)$ to $End_{K}(A_{u})$ mapping $v$ to $P_{v}$, $e$ to $S_{e}$ and $e^{\ast}$ to $S_{e^{\ast}}$ . Then $A_{u}$ can be made a left module over $L_{K}(E)$ via the homomorphism $\phi$. We denote this $L_{K}(E)$-module operation on $A_{u}$ by $\cdot$. \begin{theorem} (\cite{C}, \cite{R-3}) If the vertex $u$ is either a sink or an infinite emitter, then $A_{u}$ is a simple left $L_{K}(E)$-module. \end{theorem} If the vertex $u$ lies on a cycle without exits, then in the Definition of $A_{u}$, define the basis $B=\{pq^{\ast}:p,q$ path in $E$ with $r(q^{\ast })=s(q)=u\}$. We then get the following result. \begin{theorem} (\cite{HR}) If a vertex $u\in E$ lies on a cycle without exits, then $A_{u}$ is a graded simple left $L_{K}(E)$-module graded isomorphic to the graded minimal left ideal $L_{K}(E)u$ and $A_{u}$ is not a simple left $L_{K}(E)$-module. \end{theorem} \begin{remark} In \cite{HR}, the module $A_{u}$ is defined by using an algebraic branching system and is denoted as $N_{vc}$. Here we have defined the module $A_{u}$ differently, but the proof of the above theorem is just the proof of Theorem 3.5(1) of \cite{HR}. \end{remark} With a slight modification of the definition of $A_{u}$, Chen \cite{C} shows one more way of constructing simple modules by using the infinite paths that are tail-equivalent to a fixed infinite path in $E$. Recall, two infinite paths $p=e_{1}\cdot\cdot\cdot e_{r}\cdot\cdot\cdot$ and $q=f_{1}\cdot \cdot\cdot f_{s}\cdot\cdot\cdot$ are said to be \textbf{tail-equivalent} if there exist fixed positive integers $m,n$ such that $e_{n+k}=f_{m+k}$ for all $k\geq1$. Let $[p]$ denote the tail-equivalence class of all infinite paths equivalent to $p$. Let $A_{[p]}$ denote the $K$-vector space having $[p]$ as a basis. As in the definition of $A_{u}$, for each vertex $v$ and each edge $e$ in $E$, define the linear transformations $P_{v},S_{e}$ and $S_{e^{\ast}}$ on $A$ by defining their actions on the basis $[p]$ satisfying the conditions (I),(II),(III), but not (IV) above. \ As before, they satisfy the defining relations of a Leavitt path algebra and thus induce a homomorphism $\varphi:L_{K}(E)\rightarrow A_{[p]}$. The vector space $A_{[p]}$ then becomes a left $L_{K}(E)$-module via the map $\varphi$. \begin{theorem} \label{Chen}(\cite{C}) The module $A_{[p]}$ is a simple left $L_{K}(E)$-module and for two infinite paths $p,q$, $A_{[p]}\cong A_{[q]}$ if and only if $[p]=[q]$. \end{theorem} It can be shown (see \cite{R-3}) that the simple modules $A_{u},A_{v}$ and $A_{[p]}$ corresponding respectively to a sink $u$, an infinite emitter $v$ \ and an infinite path $p$, are all non-isomorphic. A special infinite path is the so called a \textbf{rational infinite path} induced by a simple closed path (and in particular, a cycle) $c$. This is the infinite path $ccc\cdot\cdot\cdot$ . We denote this path by $c^{\infty}$. We shall be using the corresponding simple $L_{K}(E)$-module $A_{c^{\infty}}$ subsequently. \section{Leavitt path algebras with simple modules having special properties} We shall describe when all the simple modules over a Leavitt path algebra are flat or injective or finitely presented or graded etc. An open problem, raised by Ramamuthi (\cite{Ram}) some forty years ago, asks whether a non-commutative ring $R$ with $1$ is von Neumann regular if all the simple left $R$-modules are flat. Using a more general approach of Steinberg algebras, Ambily, Hazrat and Li (\cite{AHL}) obtain the following theorem which shows that Ramamurthi's question has an affirmative answer in the case of Leavitt path algebras. \begin{theorem} (\cite{AHL}) Let $E$ be an arbitrary graph. Then every simple left $L_{K (E)$-module is flat if and only if $L_{K}(E)$ is von Neumann regular. \end{theorem} Next we consider the case when $L_{K}(E)$ is a left V-ring, that is, when every simple left $L_{K}(E)$-module is injective. Kaplansky showed that if $R$ is a commutative ring, then every simple $R$-module is injective if and only if $R$ is von Neumann regular. A natural question is under what conditions every simple left $L_{K}(E)$-module is injective. It was shown in \cite{HRS-2} that, in this case, $L_{K}(E)$ becomes a weakly regular ring. However, recently Abrams, Mantese and Tonolo (\cite{AMT-1}) showed that, if $c$ is a cycle in a graph $E$, then the corresponding simple left $L_{K}(E)$-module $A_{c^{\infty}}$ satisfies $Ext_{L_{K}(E)}^{1}(A_{c^{\infty}},$ $A_{c^{\infty }})\neq0$. This implies that the module $A_{c^{\infty}}$ cannot be an injective module. So, if every simple left $L_{K}(E)$-module is injective, then necessarily $E$ contains no cycles. Then by (\cite{AR}) $L_{K}(E)$ must be von Neumann regular. Thus we obtain the following new result and its corollary. \begin{theorem} Let $E$ \ be an arbitrary graph. If every simple left $L_{K}(E)$-module is injective, then $L_{K}(E)$ is a von Neumann regular ring. \end{theorem} Conversely, if $L_{K}(E)$ is a von Neumann regular ring then is the graph $E$ contains no cycles (\cite{AR}) and, if $E$ is further a finite graph, then $L_{K}(E)$ is a direct sum of finitely many matrix rings of finite order over $K$ (Thorem 2.6.17, \cite{AAS}). In this case, $L_{K}(E)$ is a direct sum of left/right simple modules and hence every simple left/right $L_{K}(E)$-module is injective. This leads to the following corollary. \begin{corollary} Let $E$ be a finite graph. Then every simple left/right $L_{K}(E)$-module is injective if and only if $L_{K}(E)$ is a von Neumann regular ring. \end{corollary} When $E$ is an arbitrary graph, it is an open question whether the von Neumann regularity of $L_{K}(E)$ implies that every simple left/right $L_{K (E)$-module is injective. Next we consider Leavitt path algebras $L_{K}(E)$ whose simple modules are all finitely presented. When $E$ is a finite graph, $L_{K}(E)$ possesses a number of interesting properties as noted in the following theorem \begin{theorem} (\cite{A-1R}) For any finite graph $E$, the following properties of $\ $the Leavitt path algebra $L:=L_{K}(E)$ are equivalent: (i) \ \ Every simple left $L$-module \ is finitely presented; (ii) \ No two cycles in $E$ have a common vertex; (iii) There is a one-to-one correspondence between isomorphism classes of simple $L$-modules and primitive ideals of $L$; (iv) The Gelfand-Kirillov dimension of $L$ is finite. \end{theorem} The preceding theorem has been generalized in (\cite{R-4}) to the case when $E$ is an arbitrary graph with several similar equivalent conditions. \bigskip It is easy to observe that every simple left module over a Leavitt path algebra $L:=L_{K}(E)$ is of the form $Lv/N$ for some vertex $v$ and a maximal left submodule $N$ of $Lv$. A natural question is, given a vertex $u$, can we estimate the number\ $\kappa_{u}$ of distinct maximal left $L$-submodules $M$ of $Lu$ such that $Lu/M$ is isomorphic to $Lv/N$? In \cite{R-4} it is shown that $\kappa_{u}\leq|uLv\backslash N|$ \ and consequently the cardinality of the set of \ all such simple modules corresponding to various vertices is $\le {\displaystyle\sum\limits_{u\in E^{0}}} |uLv\backslash N|$ and thus is $\leq|L|$. More generally, one may try to estimate the number of non-isomorphic simple modules over a Leavitt path algebra. In this connection, observe the following: Suppose a graph $E$ contains two cycles $g,h$ which share a common vertex $v$, such as the two cycles in the following graph \ \begin{array} [c]{ccccccccccc} & & \bullet & & & & \bullet & \longleftarrow & \bullet & & \\ & \nearrow & & \searrow & & \swarrow & & & & \nwarrow & \\ \bullet_{v} & & & & \bullet & & & & & & \bullet\\ & \nwarrow & & \swarrow & & \searrow & & & & \nearrow & \\ & & \bullet & & & & \bullet & \longrightarrow & \bullet & & \end{array} \] We then wish to show that there are uncountably many non-isomorphic simple modules over the corresponding $L_{K}(E)$. By Theorem \ref{Chen}, we need only to produce uncountably many non-equivalent infinite paths in $E$. With that in mind, consider the infinite rational path $p=ggg\cdot\cdot\cdot$ which, for convenience, we write as $p=g_{1}g_{2}g_{3}\cdot\cdot\cdot$ $\ $\ indexed by the set $\mathbb{P}$ of positive integers, where $g_{i}=g$ for all $i$. Now, for every subset $S$ of $\mathbb{P}$, define an infinite path $p_{S}$ by replacing $g_{i}$ by $h$ if and only if $i\in S$. Observe that this gives rise to uncountably many distinct infinite paths. From the definition of equivalence of paths, it can be derived that, given an infinite path $q$ there are at most countably many infinite paths that are equivalent to $q$. From this one can then establish that there are uncountably many non-isomorphic simple left $L_{K}(E)$-modules. Leavitt path algebras having only finitely many non-isomorphic simple modules are characterized in the next theorem. Recall, a ring $R$ is called left/right semi-artinian if every non-zero left/right $R$-module contains a simple submodule. \begin{theorem} (\cite{A-2R})\label{FIRT} Let $E$ be an arbitrary graph and $K$ be any field. Then the following are equivalent for the Leavitt path algebra $L=L_{K}(E)$: (i) \ $L$ has at most finitely many non-isomorphic simple left/right $L$-modules; (ii) $L$ is a left and right semi-artinian von Neumann regular ring with finitely many two-sided ideals which form a chain under set inclusion; (iii) The graph $E$ is acyclic and there is a finite ascending chain of hereditary saturated subsets $\{0\}\subsetneqq H_{1}\subsetneqq\cdot\cdot \cdot\subsetneqq H_{n}=E^{0}$ such that for each $i<n$, $H_{i+1}\backslash H_{i}$ is the hereditary satusrated closure of the set of all the line points in $E\backslash H_{i}$. \end{theorem} \section{One-sided Ideals in a Leavitt Path Algebra} In this section, we shall describe some of the interesting properties of one-sided ideals of a Leavitt path algebra. Using a deep theorem of G. Bergman \cite{B}, Ara and Goodearl proved the following result that Leavitt path algebras are hereditary. \begin{theorem} \label{hereditary}(\cite{AG}) If $\ E$ is an arbitrary graph, then every left/right ideal of $L_{K}(E)$ is a projective left/right $L_{K}(E)$-module. \end{theorem} A von Neumann regular ring $R$ has the characterizing property that every finitely generated one-sided ideal of $R$ is a principal ideal generated by an idempotent. Four years ago, it was shown in \cite{R-2} that every finitely generated two-sided ideal of a Leavitt path algebra is a principal ideal. Recently, Abrams, Mantese and Tonolo have proved that this interesting property holds for one sided ideals too, as indicated in the next theorem. \begin{theorem} \label{Bezout} (\cite{AMT-2}) Let $E$ be an arbitrary graph. Then $L:=L_{K}(E)$ is a B\'{e}zout ring, that is, every finitely generated one-sided ideal is a principal ideal. \end{theorem} Thus if $La$ and $Lb$ are two principal left ideals of $L$, then, being finitely generated, $La+Lb=Lc$, a principal left ideal. So the sum of any two principal left ideals of $L$ is again a principal left ideal. What about their intersection? Should the intersection of two principal left ideals of $L$ be again a principal left ideal? This is answered in the next theorem. Since this result is new, we outline its proof which is straight forward. \begin{theorem} Let $E$ be an arbitrary graph. Then both the sum and the intersection of two principal left ideal of $L:=L_{K}(E)$ are again principal left ideals. Thus the principal left ideals of $L$ form a sublattice of the lattice of all left ideals of $L$. \end{theorem} \begin{proof} Suppose $A,B$ are two principal left ideals of $L$. Consider the following exact sequence where the map $\theta$ is the additive map $(a,b)\rightarrow a+b \[ 0\longrightarrow K\longrightarrow A\oplus B\overset{\theta}{\longrightarrow }A+B\longrightarrow0 \] where $K=\{(x,-x):x\in A\cap B\}\cong A\cap B$. Now $A+B$ is a (finitely generated) left ideal of $L_{K}(E)$. By Theorem \ref{hereditary}, it is a projective module and hence the above exact sequence splits. Consequestly, $A\cap B$ is isomorphic a direct summand of $A\oplus B$. Since $A\oplus B$ is finitely generated, so is $A\cap B$. By Theorem \ref{Bezout}, $A\cap B$ is then a principal left ideal. \end{proof} As we noted in Theorem \ref{Condn K}, every two-sided ideal of $L_{K}(E)$ is graded if and only if the graph $E$ satisfies Condition (K). What happens if every one-sided ideal of $L_{K}(E)$ is graded ? This is answered in the next and the last theorem of this section. \begin{theorem} (\cite{HR}) Let $E$ be an arbitrary graph. Then the following properties are equivalent for $L=L_{K}(E)$: (i) \ \ Every left ideal of $L$ is a graded left ideal; (ii) \ Every simple left $L$-module is a graded module; (iii) The graph $E$ contains no cycles; (iv) $L$ is a von Neumann regular ring. \end{theorem}
\subsection{Android Location \& Sensor APIs} \label{sec_mitigation_apis} The MATRIX~system audits all location and sensor accesses and updates the location information reported to an app in some contexts. There are a standard set of Android APIs that provide this information. Location information can be accessed using four different APIs. The \code{LocationManager} is the default API available in all versions of the Android SDK. The \code{FusedLocationProviderClient}, \code{FusedLocationProviderApi} (deprecated) and \code{LocationClient} (deprecated) are provided by Google Play services as recommended closed source alternatives that consume less battery for higher accuracy data. All these APIs contain \code{request*} and \code{remove*} calls (e.g., \code{requestLocationUpdates} in \code{LocationManager}) that enable apps to register and unregister for continuous location updates. Once registered, location information is sent asynchronously to the listeners based on the criteria set by the app (e.g., quality, rate, latency). These managers also contain additional methods such as \code{getLastKnownLocation} in \code{LocationManager} that can return a location update immediately. Sensor information (e.g., Accelerometers and Gyroscopes) can be accessed using the \code{SensorManager} API. It is important to note that access to these sensors does not require permissions in any versions of Android. Also, these sensors can be accessed by apps in the background without any notification or visual cues to the user. \section{High-Level Approach} \label{sec_mitigation_approach} MATRIX~is an extensible system designed to address several location privacy protection weaknesses in Android. It uses the Android design paradigms for easy integration into the Android ecosystem with minimal changes. MATRIX~hides all implementation complexity from the end-users to make the system easy to use and intuitive. The system comprises of three modules: an App-activity PrivoScope~Service, a Synthetic Location Service, and a Synthetic Location Provider. The App-activity PrivoScope~Service monitors and analyzes apps patterns of location and sensor API accesses. It is designed for end-users, researchers and security apps desiring to assess the privacy posture of installed apps on the device. To the best of our knowledge, this service is currently the only one to provide an efficient auditing capability in Android. End-users can view all location and sensor access information as intuitive graphs. Other apps can get real-time audit events via a permission protected secure API \textbf{(W2)}. The service also displays real-time visual notifications of location and sensor access activity to users. The notification bar is updated whenever any app accesses these sensors and displays information about which apps are actively accessing what sensors on the device \textbf{(W3)}. The architecture of PrivoScope~is described in \Cref{sec_mitigation_privoscope}. The Synthetic Location Service provides an interface to the user to set their location privacy preferences for all installed apps. This service implements three settings for location granularity: Block level, City level and Synthetic Locations \textbf{(W4)}. The architecture of this service is described in \Cref{sec_mitigation_synservice}. The last module, the Synthetic Location Provider provides the Synthetic Location Service obfuscated/synthetic locations whenever the service requests for it. To the best of our knowledge, this provider is currently the only one to generate realistic privacy-preserving synthetic identities and mobility trajectories for protecting users' privacy \textbf{(W5)}. The techniques for modeling synthetic identities and movements are described in \Cref{sec_mitigation_synthetic}. The Synthetic Location Service relies on the default Android permission manager for managing location permissions, however, it restricts location access to background apps by default. Instead of completely denying location information, it detects if the requesting app is in the background and provides it the last location fix that the app received in foreground to prevent it from tracking users \textbf{(W1)}. \begin{figure}[t] \begin{center} \includegraphics[width=\linewidth]{figures/Stack.pdf} \caption{MATRIX~integration into the Android ecosystem.\label{fig_matrixstack}} \end{center} \end{figure} \Cref{fig_matrixstack} shows how MATRIX~integrates into the Android ecosystem. The PrivoScope Service and Synthetic Location Service are implemented as system services that start at device boot and are registered in the system server registry. These services implement all the protections that ensure that only authorized apps can use their functions. Apps installed on the device interact with these services using APIs provided by the PrivoScope Manager and Synthetic Location Manager. These managers are loaded into each app's process and communicate with the corresponding services. At the user level, MATRIX~implements a PrivoScope GUI that provides a graphical interface to the users to analyze the app's privacy practices, and a Location Preference GUI that enables users to set their location privacy preferences. These also use the PrivoScope and Synthetic Location Managers to communicate with the corresponding system services. \subsection{The App-activity PrivoScope Service} \label{sec_mitigation_privoscope} \begin{figure}[t] \centering \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/P_1.pdf} \caption{\label{fig_privo_1}PrivoScope Notification Bar} \end{subfigure} \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/P_2.pdf} \caption{\label{fig_privo_2}App Selection Activity} \end{subfigure} \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/P_3.pdf} \caption{\label{fig_privo_3}App Detail Activity} \end{subfigure} \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/P_4.pdf} \caption{\label{fig_privo_4}Accelerometer Timeline} \end{subfigure} \caption{Example screenshots of the PrivoScope GUI.} \label{fig_privo} \end{figure} At a high level, the PrivoScope~service uses the Xposed framework to intercept all location and sensor APIs, generates events containing the audit details, adds the events to a database and displays real-time usage notifications to the end-user. The service also exposes a permission protected API that other security apps can register to get real-time and archived audit events. It also implements a GUI interface for the users to analyze app behavior on their device. The motivation is to help users make privacy aware decisions regarding installed apps. \Cref{fig_privo} shows example screenshots of the PrivoScope GUI, where \Cref{fig_privo_1} shows the PrivoScope real-time location and sensor usage notification, \Cref{fig_privo_2} shows a list of installed apps sorted by most recent access of location and sensor APIs, \Cref{fig_privo_3} shows links to an app's permissions and access details, and \Cref{fig_privo_4} shows a timeline of Accelerometer access by an app at different times. This timeline can be set to display accesses in the past month, week, day, or a custom number of hours. Note that an app's life-cycle is color coded to help users differentiate between foreground and background accesses. Here, blue indicates that the app was in the foreground while gray would indicate background access. The evaluation and performance analysis of PrivoScope is reported in \Cref{sec_performance}. \begin{figure}[t] \centering \includegraphics[width=.9\linewidth]{figures/Architecture1.pdf} \caption{Architecture diagram of the PrivoScope service.} \label{fig_arch1} \end{figure} The architecture of the PrivoScope service for a \code{requestLocationUpdate} method call from \code{LocationManager} is shown in \Cref{fig_arch1}. Note that we abstract away from the low level implementation details and Android's internal complexities in this paper for simplification. Also note that the architecture is generic across all location managers and the sensor manager and we use \code{LocationManager} here just for illustration purposes. Like all other Android services, PrivoScope~implements a manager called \code{PrivoScopeManager} that exposes public APIs to other apps and a system service called \code{PrivoScopeService} that performs all the security sensitive operations and checks if apps have appropriate access rights for their services. The control flows like this: An app requests continuous location updates using the \code{requestLocationUpdate} method call from \code{LocationManager}. The manager and the privileged \code{LocationManagerService} validate the app's access by checking its requested permissions \textcircled{1}. Once access is validated, the API call interception service generates an event containing all relevant information to be logged for auditing. All private user information contained by the request are ignored. For example, this specific event would contain \textit{the system time, the app package name, the activity invoking the request, whether the app is background or foreground, the requested location provider, and the requested accuracy and sampling rate} \textcircled{2}. This event is then sent to the \code{PrivoScopeManager} for logging using an \code{addAuditEvent} method call exposed by the manager \textcircled{3}. The \code{PrivoScopeManager} forwards this event to the \code{PrivoScopeService} which validates whether the package name in the event is the same as the package name of the app making the request. This ensures security as only apps generating an event can add the event. The event is discarded if the package names do not match and a \code{SecurityException} is thrown. In case of a successful match, the event is added to the service's database \textcircled{4}. The \code{PrivoScopeService} also sends this event to a Notification service that keeps track of all active apps accessing location and sensor APIs and updates the notification bar with this new event information \textcircled{5}. The \code{PrivoScopeManager} exposes a \code{requestAuditEvents} method call that other apps on the device can register for receiving real-time audit events. This call is protected using a custom permission called \code{GET\_AUDIT\_EVENTS} and apps must request this permission for access. The \code{PrivoScopeManager} sends the event to all registered apps that receive this event asynchronously using a \code{AuditEventListener} callback interface \textcircled{6}. Based on whether this event was successfully added to the database or not, the \code{addAuditEvent} method call returns a boolean value to the \code{LocationManager} \textcircled{7}. Note that steps \textcircled{3} to \textcircled{7} execute in a new thread to ensure that the app functionality and the performance is not impacted by PrivoScope. After step \textcircled{3}, the \code{requestLocationUpdate} method call simply terminates as its return type is a \code{void}. The other method calls and managers return the expected values and their functionality is not updated by PrivoScope \textcircled{8}. \section{Location Privacy in Android} \label{sec_mitigation_background} This section provides a background on Android location and sensor APIs, the current Android privacy protection schemes and their weaknesses. \input{apis} \input{weaknesses} \section{Conclusion} \label{sec_mitigation_conclusion} We presented MATRIX, a system that addresses current privacy protection weaknesses in Android, provides users with a tool to analyze how apps access their private information, and the capability to provide obfuscated/synthetic data to untrusted apps. We demonstrated that~MATRIX~is portable to most Android devices globally, is reliable, has low-overhead, and generates privacy-preserving synthetic trajectories that are difficult to differentiate from real mobility trajectories by an adversary. \subsection{Detection of Synthetic Trajectories} \subsubsection{Detection by Popular Mobile Apps} \begin{table*}[ht] \centering \caption{Results of the Synthetic Trajectories detection test on $10$ popular Android apps that rely on location data.\label{tab_detection}} \begin{tabular}{ p{2.5cm} p{2.5cm} p{1.2cm} p{2.5cm} p{2.5cm} p{3cm} } \hline \textbf{App Name} & \textbf{Category} & \textbf{Rating} & \textbf{Synthetic} & \textbf{High Speed (HS)} & \textbf{HS+Teleport (HS+T)} \\ \hline Ingress & Adventure Game & 4.3 & \checkmark & Detected & Detected \\ Pok\'emon Go & Adventure Game & 4.1 & \checkmark & \checkmark & \checkmark \\ Geocaching & Health \& Fitness & 4.0 & \checkmark & \checkmark & \checkmark \\ Glympse & Social & 4.5 & \checkmark & \checkmark & \checkmark \\ Family Locator & Lifestyle & 4.4 & \checkmark & \checkmark & \checkmark \\ happn & Lifestyle & 4.5 & \checkmark & \checkmark & \checkmark \\ Yelp & Travel \& Local & 4.3 & \checkmark & \checkmark & \checkmark \\ Foursquare & Food \& Drink & 4.1 & \checkmark & \checkmark & \checkmark \\ Waze & Maps \& Navigation & 4.6 & \checkmark & \checkmark & Unstable \\ Google Maps & Travel \& Local & 4.3 & \checkmark & \checkmark & Unstable \\ \hline \end{tabular} \end{table*} We evaluated this metric using 10 popular location-driven apps (listed in \Cref{tab_detection}) on Google Play Store. These apps rely heavily on location data to provide their services to users. The evaluation was performed by feeding these apps three types of synthetic location data and monitoring their behavior. In test 1 \textbf{(Synthetic)}, the synthetic trajectories were generated using the techniques described in \Cref{sec_schedule}. In test 2 \textbf{(HS)}, the trajectories from test 1 were time compressed by a factor of 5 such that the user appeared to move 5 times faster (e.g., at $300km/h$ in a $60km/h$ speed zone). In test 3 \textbf{(HS+T)}, the trajectories from test 2 were perturbed by large noises ($\approx 1000m$) such that the user appeared to teleport to different locations very quickly. The expected results was that apps that detect fake location should be able to easily detect the \textbf{HS} and \textbf{HS+T} trajectories, but not \textbf{Synthetic} trajectories. \Cref{tab_detection} shows the results of the three tests for our test apps. None of the apps were able to detect synthetic locations in the \textbf{Synthetic} trajectories test. Even for \textbf{HS} and \textbf{HS+T} trajectories test, with the exception of Ingress, none of the other apps detected the presence of high speed and noisy synthetic locations. Ingress did not ban us from playing the game, however, it denied points when it detected that the user was moving too fast or teleporting. Pok\'emon Go is also known to ban users, however, we did not get banned during our tests even after capturing many Pok\'emons using the noisy data. This is likely because the ban threshold is set to high to prevent users from going to a higher level by cheating. All the remaining apps kept performing their functions without detecting the presence of the synthetic data. Note that Waze and Google Maps navigation operated properly for \textbf{HS} but became unstable for \textbf{HS+T}, which was expected as they constantly updated the\ routing information based on the teleported locations. These observations indicate that popular location-driven apps fail to check validity of the received data. Some of these apps (Ingress, Pok\'emon Go, Foursquare and Google Maps) check whether the \code{MockLocationProvider} \cite{mocklocation} is enabled on the device. Some apps rely on other schemes to limit user abuse (e.g., Foursquare detects and limits rapid check-ins). This means that they rely on simple checks but do not implement algorithms for detecting synthetic data. The only app that checked location validity in our set was Ingress, and it was unable to detect any discrepancies in the synthetic trajectories generated by our system. \section{Evaluation} \label{sec_mitigation_evaluation} In this section, we evaluate MATRIX~using the following metrics: the portability, stability and performance of the system, and the detection of synthetic trajectories by popular location-driven apps, by regular users, and by Machine Learning algorithms. \input{portability} \input{stability} \input{performance} \input{detection} \input{study} \input{ml} \section{Introduction} Mobile smartphones are presently the primary means for users globally to communicate, access information and even interact with the physical environment. These devices are equipped with an increasingly large number of precise and sophisticated sensors. These sensors vastly improve the quality of the user's interaction with the environment, but also pose significant threats for privacy breaches as they directly or indirectly leak private information about their users. The leakage of location information from the GPS sensor, for instance, has been a fast growing privacy concern. The commercial GPS hardware available in modern smartphones is capable of triangulating a user's position within an accuracy of 3 meters. This leakage enables more sophisticated threats such as tracking users, identity discovery, and identification of home and work locations. \subheading{Motivation} The current protections against location tracking mostly revolve around obfuscating the users' location. Several research works have proposed solutions that induce noise in the location data~\cite{Andres2013, Bordenabe2014, Shokri2012, Wang2012, ardagna2011}. Others have devised solutions that sends the real location with several dummy locations or within a data-set, and uses the response pertaining to the real location~\cite{Hoh07, Kato2012, Kido2005, Lu2008, Suzuki2010, You2007}. Others have proposed stripping off all identifying information about a user before sending the real location data in order to protect the user's privacy~\cite{pingley2011, Baik2006}. Unfortunately, these solutions still leak information about their users and can be combined with other information (e.g., census data) to infer user identities and their locations~\cite{Shokri2011, Zang2011}. Moreover, incomplete or incorrect implementations of these solutions make them vulnerable to location discovery attacks. Mobile operating systems also try to prevent undesired location tracking by implementing permissions that all apps must request for accessing location data. These measures, however, are not very effective in preventing location tracking because users are unaware of an app's privacy practices and are often careless about granting such permissions. Also, no protections exist against sensor side-channels (e.g., from Accelerometers and Gyroscopes) even when they are now known to leak location information~\cite{han2012, PowerSpy, nawaz2014, NarainVBN2016, PinMe}. An alternative protection against location tracking is the generation of synthetic location trajectories~\cite{Bindschaedler2016, Machanavajjhala2008} that are independent of users real locations~\cite{krumm2009, chow2009}. These trajectories guarantee location privacy because it is not possible to derive the user's location from them, however, they risk denial of service if an adversary detects that the trajectories are fake. To be effective against detection, these trajectories must emulate real movements and routes by incorporating real user transitions, movement schedules, traffic information and driving behavior. Synthetic, yet realistic, mobility trajectories are important as they have the potential to eliminate privacy leaks and also enable the understanding of how users' location information is exploited by mobile apps. \subheading{Approach} The proposed MATRIX~system is designed to address privacy protection weaknesses in Android. To detect leakage from location and sensor data, it implements a PrivoScope~service to monitor and analyze apps patterns for accessing location and sensor APIs. PrivoScope~provides users with real-time notifications and a graphical interface to display how apps access their location information and permissionless sensors (e.g., the time of location access, the accuracy of the location data received, the rate a sensor was sampled, and whether the app was in foreground or background). The service is designed to hide all the underlying complexity from the users and provide them an intuitive interface to help them make more privacy informed decisions about providing synthetic location data to apps using MATRIX~or uninstalling/disabling apps they do not trust. PrivoScope~also implements a permission-protected API that allows security apps installed on the device to get real-time information about which apps access private location and sensors information. To protect against leakage of location data, MATRIX implements a Synthetic Location Service that gives users the capability of setting their privacy preferences for each installed app. The service dynamically and seamlessly sandboxes apps installed on the device to receive obfuscated or synthetic feeds as specified by the user. The synthetic feeds are generated such that they are difficult to distinguish from real ones by an adversary. To this end, we model user identities and their movements between locations through Finite State Machines (FSM) with probabilistic transitions connecting states. The transitions between states represent routes that are generated from graphs constructed from real road networks. These synthetic routes are made realistic by generating a randomized schedule (path in the FSM) using Linear Programming that satisfies each state's preferences in terms of time spent, and expected arrival in those states. We further incorporate traffic information from historical traffic APIs such as Google Maps Directions API, generate accelerations and speeds using Quadratic Programming based on statistical information from user driving behavior, and also add noise to the synthetic data to emulate real GPS data, in addition to incorporating walk times and idle times. \subheading{Contributions} Our contributions are as follows: \begin{itemize} \item MATRIX~is the first system, to the best of our knowledge, to implement an efficient and extensible auditing system for the Android ecosystem. It audits all location and sensor accesses by all apps on the device to detect leakages, generates real-time notifications and graphs for visualizing these accesses in an easy and intuitive manner. \item MATRIX~gives users the capability to change their privacy preferences and provide obfuscated or synthetic trajectories to installed apps. It is the first system, in our knowledge, to generate realistic synthetic identities and trajectories to protect users' privacy. We show that generating such trajectories is feasible by incorporating traffic information. The trajectories are randomized yet satisfy realistic schedule constraints using a randomized linear program, and match statistical characteristics of user driving behavior using a quadratic program. \item MATRIX is an extensible system integrated within Android without modifications to the operating system, nor requires rooting. It will be extended to incorporate other sensitive APIs, e.g., Wi-Fi, Telephony, Camera and Microphones to provide users a holistic view of accesses to their private information. It can also be used by security apps and researchers to identify which apps misuse/leak private location and sensors information, by analyzing an app's accesses and injecting synthetic honey-data to observe if it is used in contexts not authorized by users. \item We extensively evaluated MATRIX~to validate system performance and reliability, and realism of synthetic trajectories. Testing 1000 popular Android apps, we report negligible impact in performance and reliability. For 10 popular location-driven apps, we report that MATRIX is undetected while at least one app could detect non-MATRIX mobility patterns. Our user study involving 100 users indicates that the synthetic trajectories are difficult to differentiate from real traces visually, with more users confusing synthetic trajectories to be real. Our machine learning evaluation indicates that most well-known algorithms fail to differentiate between real and synthetic trajectories with an average accuracy of 50\% (comparable to an algorithm that uses a coin-flip), with just one algorithm achieving an accuracy of 63\% in guessing if a trajectory is synthetic. \end{itemize} \subsubsection{Detection by Machine Learning Algorithms} We evaluated this metric using the $400$ routes collected for analyzing user driving behavior (cf. \Cref{sec_schedule}). These set of routes were labeled as `Real'. For each real route, a corresponding synthetic route was generated using the real route's departure time, and start and end locations. These set of routes were labeled as `Synthetic'. Note that the routes may have completely different trajectories, therefore, extracting spatial features or using the entire route for machine learning will generate inaccurate models. As such, we extract only temporal features from these routes. The following 9 features were extracted from both set of routes for training the machine learning models: \emph{max and min acceleration}, \emph{mean and standard deviation of accelerations}, \emph{mean and standard deviation of absolute accelerations}, \emph{maximum speed}, \emph{idle time} and \emph{distance traveled}. The models were built and the predictions were averaged over $1000$ iterations. In each iteration, 90\% of the dataset from each set were randomly chosen for training data, and the remaining 10\% from each set were test data. \Cref{tab_mlresults} shows the list of algorithms that were evaluated and their prediction accuracies for the `Real' and `Synthetic' test trajectories. Note that in our context, the ideal results should be a 50-50 split, i.e., 50\% of `Real' routes are predicted as `Synthetic' and 50\% of `Synthetic' routes are predicted as `Real'. We can observe that most algorithms (except Decision Trees) have an average prediction accuracy of close to 50\%. Three of those algorithms (Naive Bayes, Neural Network and SVM) display results biased towards one of the two classifiers implying that the models had difficulty predicting the correct classifier and defaulted to one classifier. The Decision Trees algorithm could detect $\approx62\%$ of the `Synthetic' trajectories as synthetic. The ensemble classifier of Decision Trees, Random Forest, could detect $\approx63\%$ of the `Synthetic' trajectories as synthetic. These numbers also do not signify large detection rate for our synthetic trajectories. We must note that this evaluation is preliminary as $800$ routes do not suffice for these algorithms to build generalized models from training data, and the models may be subject to overfitting. We intend to extend our dataset in the future to incorporate more routes and run this evaluation again for more generalized models. \begin{table}[t] \centering \caption{Results of the Machine Learning algorithms evaluation showing the `Real' and `Synthetic' prediction accuracy.\label{tab_mlresults}} \begin{tabular}{ l c c c c } \hline \textbf{Algorithm} & \multicolumn{2}{c}{\textbf{Real Trajectories}} & \multicolumn{2}{c}{\textbf{Synthetic Trajectories}} \\ & \textbf{Real} & \textbf{Synthetic} & \textbf{Real} & \textbf{Synthetic} \\ \hline Decision Trees & 53\% & 47\% & 38\% & 62\% \\ Random Forest & 61\% & 39\% & 37\% & 63\% \\ Nearest Neighbor & 50\% & 50\% & 43\% & 57\% \\ 10 Nearest Neighbor & 49\% & 51\% & 43\% & 57\% \\ Naive Bayes & 86\% & 14\% & 86\% & 14\% \\ Neural Networks & 95\% & 5\% & 96\% & 4\% \\ SVM & 5\% & 95\% & 3\% & 97\% \\ \hline \end{tabular} \end{table} \subsection{System Performance} \label{sec_performance} MATRIX~was extensively evaluated for performance overheads occurring from the most expensive operations of the system. We identified 3 potential performance bottlenecks in our system: (1) the API call interception function using the Xposed framework; (2) the add audit event function of the PrivoScope service; and (3) the location provider function of the Synthetic Location service. We implemented a test app that invoked these functions $1$ million times to test performance. The execution time was calculated as the difference between two \code{System.nanoTime} method calls placed immediately before and after the function execution. The API interception bottleneck is caused by the Xposed framework loading and hooking method calls. To evaluate its performance, we created an empty method inside our system and hooked it using the Xposed framework. \Cref{tab_performance} shows the mean $\mu$, standard deviation $\sigma$ and maximum time of execution for the three functions on a LG Nexus 5 and a LG Nexus 5X. The API interception function using the Xposed framework averaged about $\mu=0.2ms$ on both the phones, which is negligible from a usage perspective. The add audit event function of PrivoScope~had a low $\mu$ for both the phones ($4.3ms$ and $3.2ms$, resp), and its performance is also acceptable. The location provider function of the Synthetic Location service had a relatively higher $\mu$ and $\sigma$ for the Nexus 5 ($\mu=11.1ms$, $\sigma=7.7ms$). We believe this overhead is due to database lookups performed by the service to check the location preferences for the app. Overall, the entire system can run with an average overhead of $15.6ms$ on the Nexus 5 and $9.1ms$ on the Nexus 5X which should have a negligible impact on the user experience. The sum of worst case performances overhead at $171.8ms$ on the Nexus 5 should also not affect user experience since such overhead occurs rarely. \begin{table}[t] \centering \caption{Results of the Performance evaluation of MATRIX~for $2$ smartphones.\label{tab_performance}} \begin{tabular}{ l p{2.2cm} l l l } \hline \textbf{Phone} & \textbf{Service} & \textbf{Mean ($\mu$)} & \textbf{Std ($\sigma$)} & \textbf{Max} \\ \hline \multirow{3}{4em}{Nexus~5} & Xposed Hook & 0.2 ms & 0.3 ms & 17.1 ms \\ & Add Audit Event & 4.3 ms & 3.8 ms & 67.1 ms \\ & Update Location & 11.1 ms & 7.7 ms & 87.6 ms \\ \hline \multirow{3}{4em}{Nexus~5X} & Xposed Hook & 0.2 ms & 0.15 ms & 5.7 ms \\ & Add Audit Event & 3.2 ms & 1.6 ms & 26.8 ms \\ & Update Location & 5.7 ms & 1.5 ms & 16.0 ms \\ \hline \end{tabular} \end{table} \subsection{System Portability and Stability} MATRIX~is compatible with Android \code{KitKat} and onwards. It has been tested to work on Xposed Framework API versions 82 to 89 (current) which are compatible with the above Android versions. This implies that MATRIX~can be ported to $\approx94\%$ of all Android devices globally (based on information from the Android Dashboard~\cite{android_dashboard} as of August 10, 2018). \section{Related Work} \label{sec_mitigation_relatedwork} A large body of research has focused on mitigating location and other private information leakage attacks on Android devices. Most of these works are orthogonal to our system as their motivation and techniques differ. Examples of such work include, but are not limited to, recommending new frameworks/privacy metrics \cite{Fawaz:2014:LPP:2660267.2660270, boxify, spe, spism, deva2015, fawazu2015, OyaTP2017}, location obfuscation \cite{Andres2013, Bordenabe2014, Shokri2012, Wang2012, ardagna2011}, location cloaking \cite{Hoh07}, generating dummy locations \cite{Kato2012, Kido2005, Lu2008, Suzuki2010, You2007, fakemask}, tainting sensitive data \cite{taintdroid, taintart}, dynamic analysis \cite{appaudit, tissa}, static code analysis \cite{flowdroid, amandroid, rdroid, lu_ndss15}, permissions analysis \cite{drandroid}, and application retrofitting \cite{retroskeleton, appfence, Case16}. Synthesizing human mobility has also been studied in the context of opportunistic networks \cite{orbit, slaw, ekman2008, karamshuk2011}, ad-hoc and vehicular wireless networks \cite{tuduce2005, choffnes2005, kim2006, zheng2010}, community based mobility models \cite{hong1999, li2002, hermann2003, musolesi2006}, predicting location of moving objects \cite{tao2004, zhou2007}, and implementing efficient location update mechanisms \cite{wolfson2003, ding2009, huang2013, huang2014}. Some research has also focused on generating synthetic traces for user privacy \cite{Bindschaedler2016, krumm2009, chow2009}, however, these works have limitations that can enable an adversary to detect fake traces. None of the above works satisfy traffic constraints for different roads at different times of the day, nor take into account the statistical properties of user driving behavior. For example, \cite{krumm2009, wolfson2003} simply superimpose speed patterns from real routes on synthetic traces based on the street type without accounting for traffic conditions of the road. These speed patterns can also be repeated and can be detected. Bindschaedler and Shokri~\cite{Bindschaedler2016} generate synthetic traces that are derived from seed datasets of real traces which does not apply in our context of generating completely synthetic identities for users. Their work is also not scalable globally due to their reliance of real datasets, while ours can easily scale since map data for any location of the world is readily available. Beresford et al.~\cite{mockdroid} implemented MockDroid, a modified version of Android 2.2.1 with a user controlled permissions manager. The system allowed users to define mock permissions for installed apps. The location mock permission was implemented to block all location fixes from reaching the app simulating a lack of available location information. The authors ran the system on 27 apps and showed that most apps continued to function with reduced functionality. This work is similar to the current Android permissions model and, therefore, subject to the weaknesses in Android's permission model that we have addressed with MATRIX. Agarwal and Hall~\cite{pmp} implemented ProtectMyPrivacy (PMP) for iOS jailbroken devices that intercepted method calls accessing user's private data, and allowed the user to substitute anonymized data in place of the real information. The limitations of this work are: (1) the anonymized data is provided by the user at run-time which may be completely random and unrealistic, and (2) the app's functionality is paused for user input which is detrimental to user experience and possibly also to the app's functionality. The above limitations are addressed by MATRIX~through the seamless delivery of realistic synthetic locations to apps without requiring constant interaction with the user. Liu et al.~\cite{ppa} implemented Personalized Privacy Assistant (PPA) for rooted Android devices. This system is a modified \code{App Ops} permission manager that displays an app's recent requests and the frequencies of requests in the past 7 days. The system uses this information to generate daily privacy nudges to motivate users to interact and change their privacy settings. We believe that this information provided to users is not sufficient to make any kind of privacy-aware decisions. Additional context is required to determine if an app is misusing the information (e.g., time and duration of those requests, was the app in the background?). PrivoScope~addresses the limitations by providing much more context to the users and displaying them in a way that it is easier for the users to grasp and visualize these accesses. Zheng et al.~\cite{zheng2010} propose an agenda driven mobility model that considers a person's daily social activities for motion generation. They derive this agenda from the National Household Travel Survey (NHTS) database by the U.S. Department of Transportation. The first agenda and all subsequent activities are based on the NHTS activity distribution, and addresses are picked at random from many addresses for the corresponding activity. The start time of the first agenda determines the schedule for the entire day and each activity starts immediately after the mean dwell time+longest transition time from previous activity. The route between two activities assumes a longest possible time given by the Dijkstra's algorithm. This work has several limitations (all addressed by MATRIX) that are trivial to detect: (1) the addresses are picked at random without accounting for distances (e.g., gas station may be miles away from regular route), (2) the routes do not incorporate any traffic information and are always static, and (3) the routes do not incorporate any driving behavior and likely assume a constant speed of motion. Fawaz and Shin~\cite{Fawaz:2014:LPP:2660267.2660270} implemented LP-Guardian, a privacy protection framework modifying the Android source code. The framework changes location granularity of installed apps based on the threat posed by the app and its location granularity requirements. It automatically coarsens the location to a city level if it identifies a request from an A\&A library, the app is in the background, or the app is a weather app. It synthesizes the location for fitness apps but preserves features of the actual route such as the distance traveled. The framework supplies a synthetic location if it determines that it is not safe to release the location. This work has the following limitations that are addressed in MATRIX: (1) the preservation of route features can lead to inference of the user's real locations, and (2) unless chosen very carefully, the synthetic traces generated from real features will not snap to streets (e.g., different street lengths and curvatures) and can be detected as synthetic. \section{MATRIX~Architecture} \label{sec_mitigation_solution} This section describes the architecture of the PrivoScope~and Synthetic Location services implemented for the MATRIX~framework. \input{xposed_ser} \input{audit_ser} \input{synthetic_ser} \subsection{Modeling User States} \label{sec_states} A user's synthetic mobility patterns are defined as an automated probabilistic state machine with a finite set of $S$ states $Q = \{Q_0, \ldots, Q_{S-1}\}$. The states, in this context, represent a set of tuples \{(Loc($Q_i$), $t_{min, i}$, $a_{min, i}$, $a_{max, i}$)\}, where Loc($Q_i$) is the geographic coordinates of state $Q_i$, $t_{min, i}$ is the minimum time spent in the state, and $a_{min, i}$, $a_{max, i}$ are the lower and upper time bounds for arrival at the state. The geographic coordinates of the states are obtained from OpenStreetMap by parsing the `building' and `amenity' tags \cite{osmbuilding, osmamenity} of all ways and nodes for the given area. For instance, a `Home' state can be chosen as a way or node in OpenStreetMap whose building type is one of the following: `apartments', `house', `residential', or `bungalow'. Similarly, a `Work' state can be chosen from the `commercial' or `industrial' tags. The other attributes are used for scheduling the user's activity for each day and set based on typical times that these activities occur. Note that the attributes are set to default values when they are unimportant for a state, i.e., $t_{min,i}=0$, $a_{min,i}=00$:$00$:$00$, and $a_{max,i}=23$:$59$:$59$. In the simplest form, a state machine may contain just two synthetic states $Q = \{Q_0, Q_1\}$, where $Q_0$ = `Home' and $Q_1$ = `Work'. We label these as \emph{significant} states as the user spends most of their time in one of these states. The geographic coordinates Loc($Q_0$) and Loc($Q_1$) are randomly chosen from the list of all locations with the relevant tags. Assuming no `Work from Home' scenarios, the probabilities $P(Q_0)$ and $P(Q_1)$ of occurrence of these states is taken to be $1$. The state machine is made more realistic by adding synthetic states like $Q_2$ = `School', $Q_3$ = `Gas Station', $Q_4$ = `Lunch' and $Q_5$ = `Dinner'. We label these as \emph{transitional} states because a user will temporarily visit these states when transitioning between \emph{significant} states (i.e., $Q_0$ and $Q_1$). For any transitional state $Q_i$, the geographic coordinates Loc($Q_i$) is selected from a set of locations Loc = $\{Loc_1, \ldots, Loc_N\}$ with the relevant tags, such that its distance is shortest from the significant states, i.e., $\text{Loc}(Q_i) = \arg\min_{L \in \text{Loc}} d(L, \text{Loc}(Q_0)) + d(L, \text{Loc}(Q_1))$. Note that, unlike \emph{significant} states, visits to \emph{transitional} states are occasional based on some specific frequency of occurrence. This frequency, denoted by $f_i$, is derived from a uniform distribution $\mathcal{U}(l, u)$ with $l$ and $u$ as the bounds for the frequency of visits to that state (e.g., once a week to once a month). In case of `Gas Station' specifically, the system chooses a random mileage $m$ and gas capacity $c$, and calculates the frequency as the number of days a user can travel between the \emph{significant} states before the gas level goes below $1/4^{th}$ of capacity, i.e., $f_3 = int(\frac{0.75mc}{d(\text{Loc}(Q_0), \text{Loc}(Q_1)) + d(\text{Loc}(Q_1), \text{Loc}(Q_0))})$. Assuming $W$ workdays in a year, the probability of occurrence for any \emph{transitional} state $Q_i$ is then calculated as $P(Q_i) = (W / f_i) / W$. The transition probability between states $Q_i$ and $Q_j$, denoted by $\chi_{i,j}$, is equivalent to the compound probability of the two independent states, i.e., $P(\chi_{i,j}) = P(Q_i)P(Q_j)$. The following conditions determine if a state $Q_i$ can transition to state $Q_j$: (1) $Q_i$ is a \emph{significant} state and the originating state for $Q_j$, (2) $Q_j$ is a \emph{significant} state and the destination state for $Q_i$, or (3) the two states originate from the same \emph{significant} state $Q_{s}$ and distance $d(\text{Loc}(Q_s),\text{Loc}(Q_i)) < d(\text{Loc}(Q_s),\text{Loc}(Q_j))$. The \emph{significant} states are always connected and their probabilities are calculated as $P(\chi_{0,1}) = 1 - \sum_{i=2}^{S-1} P(\chi_{0,i})$ and $P(\chi_{1,0}) = 1 - \sum_{i=2}^{S-1} P(\chi_{1,i})$, respectively. All other transitions have a probability of 0. \begin{figure}[t] \centering \includegraphics[width=.95\linewidth]{figures/StateDiagram.pdf} \caption{Example of a simplified finite state machine simulating a user's movements based on some transition probabilities.} \label{fig_statemachine} \end{figure} Note that users can go for `Lunch' in the afternoon and `Dinner' in the evening from the `Work' state. If we use the same `Work' state for both transitions, the probabilities are split when they clearly are different transitions. To address this, the `Work' state is internally represented as two states: $Q_{1a}$ for afternoon and $Q_{1e}$ for evening. Also note that the model described here is for weekdays, and a similar model is created for weekends with a different set of states (e.g., the user may leave from `Home' to watch a `Movie', eat `Dinner' and return `Home'). \Cref{fig_statemachine} provides an intuition for our automated finite state machine model. This specific model comprises of 6 states $Q = \{Q_0,\cdots, Q_5\}$ and their transition probabilities are shown. We see that it is possible to transition from state $Q_0$ to states $Q_1$, $Q_2$ or $Q_3$. As the transition probability $P(\chi_{0,1})$ is $0.78$, the model should typically choose state $Q_1$ $\approx8$ times out of $10$. This makes sense as a user will mostly go to `Work' from `Home' but may sometimes need to drop their kids to `School' or fill up gas at a `Gas Station'. \subsubsection{Detection by Regular Users} \begin{figure}[t] \centering \begin{subfigure}{\linewidth} \centering \fbox{\includegraphics[width=\linewidth]{figures/traces/Real.pdf}} \caption{\label{fig_real} Real Driving Route} \end{subfigure} \begin{subfigure}{\linewidth} \centering \fbox{\includegraphics[width=\linewidth]{figures/traces/Synthetic.pdf}} \caption{\label{fig_synthetic} Generated Synthetic Trajectory} \end{subfigure} \caption{An example of the similarity between a real route and a generated synthetic route.} \label{fig_realvssynthetic} \end{figure} \begin{table}[t] \centering \caption{Cumulative results of the User Study on Mechanical Turk sorted by the number of noisy trajectories correctly labeled.\label{tab_cum_turk}} \begin{tabular}{ l l c c c c } \hline \textbf{Noisy} & \textbf{Surveyors} & \multicolumn{2}{c}{\textbf{Real Trajectories}} & \multicolumn{2}{c}{\textbf{Synthetic Trajectories}} \\ & & \textbf{Real} & \textbf{Synthetic} & \textbf{Real} & \textbf{Synthetic}\\ \hline 0 & 100 & 65.1\% & 34.9\% & 66.0\% & 34.0\%\\ 1 & 91 & 65.4\% & 34.6\% & 65.9\% & 34.1\%\\ 2 & 72 & 65.7\% & 34.3\% & 65.4\% & 34.6\%\\ 3 & 54 & 68.3\% & 31.7\% & 64.4\% & 35.6\%\\ \hline \end{tabular} \end{table} We evaluated this metric by conducting two separate user studies: one comprising of a group of $12$ students from a university and another comprising of $100$ users from Amazon Mechanical Turk \cite{turk}. The intuition behind two studies was to understand the results from two perspectives; one of users who know the area very well and another of users unaware of the area. The university area was chosen so that the students were aware of its traffic congestions. The study asked the users to visually analyze a mix of $20$ real and synthetic trajectories and label them as `Real' or `Synthetic' based on their observations. \Cref{fig_real,,fig_synthetic} show an example of a real route and a synthetic trajectory used for the study. The green marker marks the start location, the white markers are $500 m$ apart, and the red marker marks the stop location. These markers display the time the vehicle was at the given location. The trajectories were created as follows: First, we drove $10$ unique routes close to the university area, each starting and ending at different locations and times of the day. Each route can be represented as $R = [n_1, \ldots, n_L]$, where $n$ is a node and $L$ is the number of nodes in the route. Each node $n_i$ is attributed with timing and geographic information $n_i = (t_i, \text{Loc}(n_i))$, where $t_i$ is the timestamp and $\text{Loc}(n_i)$ is the node's geographic coordinates. Next, we generated $10$ synthetic routes similar to the $10$ real routes using the timestamp of the first node (i.e., $t_1$) and geographic coordinates of the end nodes (i.e., $\text{Loc}(n_1)$ and $\text{Loc}(n_L)$) for each route R. The trajectories were shuffled so they appeared in a random order. For mechanical turk, we added three very noisy trajectories which looked obviously synthetic to find users who did not take the study seriously. \subheading{University Students Study} For the real trajectories, $\approx64.2\%$ of the trajectories were labeled as `Real' and the rest were labeled as `Synthetic'. For the synthetic trajectories, $\approx 65.8\%$ of the trajectories were labeled as `Real' and the rest were labeled as `Synthetic'. Note that more users of this study confused the `Synthetic' trajectories to be `Real'. \subheading{Amazon Mechanical Turk Study} For the real trajectories, $\approx 68.3\%$ of the trajectories were labeled as `Real' and the rest were labeled as `Synthetic'. For the synthetic trajectories, $\approx 64.4\%$ of the trajectories were labeled as `Real'. The above results are for $54$ users who detected all the obviously noisy trajectories. \Cref{tab_cum_turk} shows the cumulative results of the mechanical turk study based on the number of noisy trajectories detected by the users. We can see that the results are not significantly different even for all 100 users, however, more users labeled `Synthetic' as `Real'. The results indicate that it was difficult for the users to differentiate between synthetic and real driving trajectories. There was confusion in both groups regarding their validity. Evaluating individual trajectories, we saw that this confusion applied to each trajectory as not a single one was labeled as `Real' or `Synthetic' unanimously by all users. \subsection{The Synthetic Location Service} \label{sec_mitigation_synservice} \begin{figure}[t] \centering \includegraphics[width=.9\linewidth]{figures/Architecture2.pdf} \caption{Architecture diagram of the Synthetic Location service.} \label{fig_arch2} \end{figure} The architecture of the Synthetic Location service is shown in \Cref{fig_arch2}, again in the context of receiving location updates from the \code{LocationManager} API. Like PrivoScope, this architecture is generic across all the location managers. The Synthetic Location service implements a manager called \code{SyntheticLocationManager} that exposes public APIs to other apps and a system service called \code{SyntheticLocationService} that manages and protects the database storing the user location preferences, and connects with the \code{LocationProvider} to request obfuscated/synthetic locations. The control flows like this: When an app requests continuous location updates (with the correct permissions) using the \code{requestLocationUpdates} call from \code{LocationManager}, the first steps that occur are the listener registration (cf. \Cref{sec_mitigation_apis}) and addition of the audit event to the PrivoScope service's database (cf. \Cref{sec_mitigation_privoscope}). \textcircled{1}, \textcircled{2}. After registration is completed, all the location fixes generated by the \code{LocationManagerService} are typically sent asynchronously to the app's \code{LocationListener}, \code{PendingIntent} or \code{LocationCallback} implementation. In MATRIX, these location fixes are intercepted by a \code{LocationListenerProxy} that proxies it to the app's listener. The proxy works by hooking the \code{Location} object that is used by all the managers to send location fixes to the app's listener. This enables it to modify the location object before the app loads the information using the get* method calls (e.g., \code{getLatitude() and getLongitude()}) \textcircled{3}. The \code{LocationListenerProxy} requests the \code{SyntheticLocationManager} to provide an updated location for the app, based on the app's location preference set by the user. The manager forwards this request to the \code{SyntheticLocationService} that maintains and protects the database storing the user location preference for each app \textcircled{4}. The \code{SyntheticLocationService} looks up the user's location preferences in the database, and communicates with the \code{LocationProvider} to request an obfuscated/synthetic location if the user has chosen to receive such location information for the app. The default preference set for an app requesting fine location is block level obfuscated data ($500m$) \textcircled{5}. An updated location object is returned to the \code{SyntheticLocationService} which forwards it to the \code{SyntheticLocationManager}. The \code{SyntheticLocationManager} sends this location to the \code{LocationListenerProxy} that updates it before the app accesses the location \textcircled{6}, \textcircled{7}. \begin{figure}[t] \centering \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/S_1.pdf} \caption{\label{fig_syn_1}Real Location} \end{subfigure} \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/S_2.pdf} \caption{\label{fig_syn_2}App Selection Activity} \end{subfigure} \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/S_3.pdf} \caption{\label{fig_syn_3}Location Preference} \end{subfigure} \begin{subfigure}[b]{0.24\textwidth} \centering \includegraphics[width=\linewidth]{figures/screenshots/S_4.pdf} \caption{\label{fig_syn_4}Synthetic Location} \end{subfigure} \caption{Example screenshots of the Synthetic Location GUI.} \label{fig_syn_ui} \end{figure} The Synthetic Location service currently provides four settings for per-app location privacy: High Accuracy, Block Level Accuracy, City Level Accuracy, and Synthetic Locations. Note that the High Accuracy and Block Level Accuracy options are only available for apps requesting fine location using the \code{ACCESS\_FINE\_LOCATION} permission. This is because apps that use \code{ACCESS\_COARSE\_LOCATION} permissions already receive coarser location data than that provided by the two options. The high accuracy option set for an app tells the service to not obfuscate or synthesize locations for this app. For block level and city level accuracy, we extended the default Android \code{LocationFudger} implementation to support different grid resolutions. The implementation is in \code{com.android.server.location.LocationFudger} under the Android source tree~\cite{aosp}. We analyzed this code to find that the real location information is obfuscated in two steps. First, a random offset is applied to the location to mitigate against accurate detection of grid transitions when a user crosses a grid boundary. This offset is changed slowly over time (e.g., once every hour) to mitigate against location inference attacks. Second, the primary means of obfuscation is to snap the offset data (already mitigated against grid transitions) to a grid. This grid radius chosen by most recent versions of Android is $2000m$. We found this technique to be effective against location inference attacks. The current grid radius settings for block level and city level accuracy are $500m$ and $5000m$, respectively. \Cref{fig_syn_ui} shows screenshots, illustrating the Synthetic Location service for a GPS tracking app. Note that this app is used for demonstrating how the service works because it displays the user location on the screen, and it is not a malicious app. \Cref{fig_syn_1} shows the test app displaying the user's real location, \Cref{fig_syn_2} shows the list of installed apps that request location permissions, \Cref{fig_syn_3} shows the location privacy preference for the test app being changed to synthetic, and \Cref{fig_syn_4} shows the test app now displaying a synthetic location in another city. This synthetic location is provided based on the time of the day and a realistic GPS trajectory generated for the user for that specific day. \section{Generating Synthetic Identities} \label{sec_mitigation_synthetic} This section provides a detailed description of our technique for generating unique and realistic privacy-preserving synthetic identities and mobility trajectories for each user using the MATRIX~system. \input{states} \input{traces} \subsection{Modeling Mobility Trajectories}\label{sec_schedule} The finite state machine generated for each user is used to synthesize mobility trajectories for the user every day. This is a 3 step process: (1) synthesize the user states for the entire day, (2) synthesize the schedule to satisfy the time constraints, and (3) synthesize the trajectory based on the schedule. \subheading{Synthesizing the user states} The state machine of a user is loaded every day to generate a route of the states the user will visit that day. This route always starts and ends at the initial state $Q_0$ (`Home`) and traverses through $Q_1$ (`Work`), i.e., $R = \lbrack Q_0, \ldots, Q_1, \ldots, Q_0 \rbrack$. The first state $Q_0$ can transition to any connected state $Q_i$ based on the transition probabilities of $Q_0$. The state $Q_i$ can then transition to any of its connected state $Q_j$ based on the transition probabilities of $Q_i$, and so forth forming a chain that ends at the final state $Q_0$. Note that the construction technique of the state machine ensures that this route traverses through $Q_1$. Let $P(\chi_i) = \{P(\chi_{i,0}), \ldots, P(\chi_{i,S-1})\}$ denote the set of all transitional probabilities of state $Q_i$. To obtain the next state, the system first derives a random transitional probability from a uniform distribution $\mathcal{P} = \mathcal{U}(0, 1)$. This probability $\mathcal{P}$ is then compared with the cumulative probabilities of all transitions in $P(\chi_i)$. A state $Q_j$ is selected if $\mathcal{P}$ lies between the previous state's cumulative probability and its cumulative probability, i.e., $P(X \le \chi_{i,j-1}) < \mathcal{P} \le P(X \le \chi_{i,j})$. \input{lp} \input{route} \subsection{Weaknesses in Privacy Protections} \label{sec_weaknesses} Android implements some location privacy protection schemes to give users the capability to control how and whether certain apps can access their location information. These schemes are not sufficient for protecting a user's privacy. Some of the weaknesses are discussed below. Note that these weaknesses are labeled (\textbf{W\#}) for ease of referring to them in the next section. \subheading{Weak Permissions Model (W1)} Android specifies two permissions for limiting access to the user's location information: \code{ACCESS\_FINE\_LOCATION} and \code{ACCESS\_COARSE\_LOCATION}. The former allows apps to access high accuracy location information, while the latter provides obfuscated information to hide the user's real location. The permissions model is a good step in notifying users of location access, however, this protection is limited as users have an option to always allow access. This means that the user will not be notified about location access again even if the app's context has changed, i.e., location is accessed from another activity or from a service, or a previously benign app is updated with a privacy intrusive version. \subheading{Non-existent Auditing Capabilities (W2)} Android does not provide a framework to audit how apps access a user's private information. Also, App stores (e.g., Google Play Store) do not provide enough information about the privacy practices of an app. Without any privacy-related knowledge, users are more than likely to install and use an app if they require the services provided by that app. \subheading{Weak Location Activity Notification (W3)} The Android operating system displays a notification icon on the notification bar of the device, whenever any app requests continuous location updates. An adversary can easily bypass this protection by using an alternative method for location access. One example is the \code{getLastKnownLocation} call in \code{LocationManager} which can be invoked numerous times for receiving continuous location updates. Another example is exploiting the permissionless sensors like Accelerometers, Gyroscopes and Barometers to infer user locations. Both these methods do not display any notifications of access. Furthermore, the notification simply indicates that some app has access to location and no further information is given to the user to make privacy-aware decisions. \subheading{Restricted Privacy Preferences (W4)} Android does not provide the capability for users to define their privacy preferences for apps installed on their device. Users can deny location access to certain apps by disallowing location permissions, however, certain apps may then deny service to the users. There are situations in which users may not wish to disclose their locations, in particular at some moments in time, and still require the services of the app. One example of this is when the app is turned-off or in the background. \subheading{Weak Location Granularity Settings (W5)} Android implements a location obfuscation scheme that hides a user's real location from apps requiring just the \code{ACCESS\_COARSE\_LOCATION} permission. This obfuscated location still leaks information about the user's location. There is currently no mechanism for users to completely hide their location by providing synthetic information to untrusted apps. \subsection{API Call Interception} Previous mitigation systems (excluding Boxify~\cite{boxify}) were implemented by either modifying the Android source code, using rooted devices, or using third party frameworks such as the Xposed Framework \cite{xposed}. The Xposed framework adds an extended \code{app\_process} executable in the \code{/system/bin} folder of the device on installation. This extended \code{app\_process} adds an additional \code{jar} file to the classpath and calls methods even before the \code{main} method of \code{Zygote} is called. This enables apps to intercept method calls that are otherwise inaccessible from an app's process. MATRIX~uses the Xposed framework to intercept location and sensor API calls. One example usage in our context is intercepting the \code{requestLocationUpdates} method of \code{LocationManager} to generate an event every time an app requests location updates. This event contains all the relevant information about the request and sent to PrivoScope~for logging and notification. Using the framework is both necessary and advantageous due to the following reasons: (1) Xposed has the capability to intercept external APIs like Google Play Services which is currently not possible by modifying the Android source or by rooting, (2) the framework is supported and has a consistent API for different versions of Android ensuring portability and ease of development, and (3) the framework does not require a rooted device to function properly. We developed a simple tool that automates the installation of Xposed and MATRIX~through a custom recovery (e.g., TWRP \cite{twrp}) without rooting the device. The Xposed framework and TWRP recovery are both open-source and consistently analyzed and updated by a large community of Android users, making them quite reliable.
\section{Introduction} Computer vision has witnessed many impressive breakthroughs over the past decades in image classification~\cite{krizhevsky2012imagenet,he2016deep}, image segmentation~\cite{long2015fully}, and object detection~\cite{girshick2014rich} by applying convolutional neural networks to large-scale, labeled datasets, often exceeding human performance. These systems give outputs such as class labels, segmentation masks, or bounding boxes, but it would be more natural for humans to interact with these systems through natural language. To this end, the research community has introduced various multi-modal tasks, such as image captioning~\cite{xu2015show}, referring expressions~\cite{kazemzadeh2014referitgame}, visual question-answering~\cite{antol2015vqa,malinowski2015ask}, visual reasoning~\cite{johnson2017clevr}, and visual dialogue~\cite{de2017guesswhat,das2017visual}. These tasks require models to effectively integrate information from both vision and language. One common approach is to process both modalities independently with large unimodal networks before combining them through concatenation~\cite{malinowski2015ask}, element-wise product~\cite{kim2016multimodal,lu2016hierarchical}, or bilinear pooling~\cite{fukui2016multimodal}. Inspired by the success of attention in machine translation~\cite{bahdanau2014neural}, several works have proposed to incorporate various forms of spatial attention to bias models towards focusing on question-specific image regions~\cite{xu2015show,xu2016ask}. However, spatial attention sometimes only gives modest improvements over simple baselines for visual question answering~\cite{jabri16vqa} and can struggle on questions involving multi-step reasoning~\cite{johnson2017clevr}. More recently,~\cite{devries2017modulating,perez2018film} introduced Feature-wise Linear Modulation (FiLM) layers as a promising approach for vision-and-language tasks. These layers apply a per-channel scaling and shifting to a convolutional network's visual features, conditioned on an external input such as language, e.g.\@, captions, questions, or full dialogues. Such feature-wise affine transformations allow models to dynamically highlight the key visual features for the task at hand. The parameters of FiLM layers which scale and shift features or feature maps are determined by a separate network, the so-called \emph{FiLM generator}, which predicts these parameters using the external conditioning input. Within various architectures, FiLM has outperformed prior state-of-art for visual question-answering~\cite{devries2017modulating,perez2018film}, multi-modal translation~\cite{delbrouck2017modulating}, and language-guided image segmentation~\cite{rupprecht2018guide}. \begin{figure}[t] \begin{minipage}{0.30\textwidth} \centering \includegraphics[width=0.85\textwidth]{img/frisbee} \end{minipage} \begin{minipage}{0.68\textwidth} \begin{tabular}{llll} \toprule \textit{ReferIt\xspace} & \quad\quad & \textit{GuessWhat?!\xspace} & \\ \midrule - The girl with a sweater & & Is it a person? &\quad Yes\\ - The fourth person & & Is it a girl? &\quad Yes\\ - The girl holding a white & & Does she have a blue&\quad No\\ frisbee & & frisbee? &\\ \end{tabular} \end{minipage} \caption{The ReferIt\xspace task identifies a selected object (in the bounding box) using a single expression, while in GuessWhat?!\xspace, a speaker localizes the object with a series of yes or no questions.} \label{fig:example} \end{figure} However, the best way to design the FiLM generator is still an open question. For visual question-answering and visual reasoning, prior work uses single-hop FiLM generators that predict all FiLM parameters at once~\cite{perez2018film,devries2017modulating}. That is, a Recurrent Neural Network (RNN) sequentially processes input language tokens and then outputs all FiLM parameters via a Multi-Layer Perceptron (MLP). In this paper, we argue that using a \textit{Multi-hop FiLM Generator} is better suited for tasks involving longer input sequences and multi-step reasoning such as dialogue. Even for shorter input sequence tasks, single-hop FiLM generators can require a large RNN to achieve strong performance; on the CLEVR visual reasoning task~\cite{johnson2017clevr} which only involves a small vocabulary and templated questions, the FiLM generator in~\cite{perez2018film} uses an RNN with 4096 hidden units that comprises almost 90\% of the model's parameters. Models with Multi-hop FiLM Generators may thus be easier to scale to more difficult tasks involving human-generated language involving larger vocabularies and more ambiguity. As an intuitive example, consider the dialogue in Fig.~\ref{fig:example} through which one speaker localizes the second girl in the image, the one who does not ``have a blue frisbee.'' For this task, a single-hop model must determine upfront what steps of reasoning to carry out over the image and in what order; thus, it might decide in a single shot to highlight feature maps throughout the visual network detecting either non-blue colors or girls. In contrast, a multi-hop model may first determine the most immediate step of reasoning necessary (i.e.\@, locate the girls), highlight the relevant visual features, and then determine the next immediate step of reasoning necessary (i.e.\@, locate the blue frisbee), and so on. While it may be appropriate to reason in either way, the latter approach may scale better to longer language inputs and/or or to ambiguous images where the full sequence of reasoning steps is hard to determine upfront, which can even be further enhanced by having intermediate feedback while processing the image. In this paper, we therefore explore several approaches to generating FiLM parameters in multiple hops. These approaches introduce an intermediate context embedding that controls the language and visual processing, and they alternate between updating the context embedding via an attention mechanism over the language sequence (and optionally by incorporating image activations) and predicting the FiLM parameters. We evaluate Multi-hop FiLM\xspace generation on ReferIt\xspace~\cite{kazemzadeh2014referitgame} and GuessWhat?!\xspace~\cite{de2017guesswhat}, two vision-and-language tasks illustrated in Fig.~\ref{fig:example}. We show that Multi-hop FiLM\xspace models significantly outperform their single-hop counterparts and prior state-of-the-art for the longer input sequence, dialogue-based GuessWhat?!\xspace task while matching the state-of-the-art performance of other models on ReferIt\xspace. Our best GuessWhat?!\xspace model only updates the context embedding using the language input, while for ReferIt\xspace, incorporating visual feedback to update the context embedding improves performance. \noindent In summary, this paper makes the following contributions: \begin{itemize} \item We introduce the Multi-hop FiLM\xspace architecture and demonstrate that our approach matches or significantly improves state-of-the-art on the GuessWhat?!\xspace Oracle task, GuessWhat?!\xspace Guesser task, and ReferIt\xspace Guesser task. \item We show Multi-hop FiLM\xspace models outperforms their single-hop counterparts on vision-and-language tasks involving complex visual reasoning. \item We find that updating the context embedding of Multi-hop FiLM Generator\xspace based on visual feedback may be helpful in some cases, such as for tasks which do not include object category labels like ReferIt\xspace. \end{itemize} \section{Background} In this section, we explain the prerequisites to understanding our model: RNNs, attention mechanisms, and FiLM. We subsequently use these building blocks to propose a Multi-hop FiLM\xspace model. \subsection{Recurrent Neural Networks} One common approach in natural language processing is to use a Recurrent Neural Network (RNN) to encode some linguistic input sequence $l$ into a fixed-size embedding. The input (such as a question or dialogue) consists of a sequence of words $\omega_{1:T}$ of length $T$, where each word $\omega_t$ is contained within a predefined vocabulary $\mathcal{V}$. We embed each input token via a learned look-up table $e$ and obtain a dense word-embedding $\bm{e}_{\omega_t} = e(\omega_t)$. The sequence of embeddings $\{\bm{e}_{\omega_t}\}_{t=1}^T$ is then fed to a RNN, which produces a sequence of hidden states $\{\bm{s}_{t}\}_{t=1}^T$ by repeatedly applying a transition function $f$: $ \bm{s}_{t+1} = f(\bm{s}_{t}, \bm{e}_{\omega_t}) $ To better handle long-term dependencies in the input sequence, we use a Gated Recurrent Unit (GRU)~\cite{chung2014empirical} with layer normalization~\cite{ba2016layer} as transition function. In this work, we use a bidirectional GRU, which consists of one forward GRU, producing hidden states $\overrightarrow{\bm{s}_{t}}$ by running from $\omega_1$ to $\omega_T$, and a second backward GRU, producing states $\overleftarrow{\bm{s}_{t}}$ by running from $\omega_T$ to $\omega_1$. We concatenate both unidirectional GRU states $\bm{s}_{t} = [ \overrightarrow{\bm{s}_{t}}; \overleftarrow{\bm{s}_{t}} ]$ at each step $t$ to get a final GRU state, which we then use as the compressed embedding $\bm{e}_l$ of the linguistic sequence $l$. \subsection{Attention} The form of attention we consider was first introduced in the context of machine translation~\cite{bahdanau2014neural,luong2015effective}. This mechanism takes a weighted average of the hidden states of an encoding RNN based on their relevance to a decoding RNN at various decoding time steps. Subsequent \textit{spatial} attention mechanisms have extended the original mechanism to image captioning~\cite{xu2015show} and other vision-and-language tasks~\cite{xu2016ask,kim2016hadamard}. More formally, given an arbitrary linguistic embedding $\bm{e}_l$ and image activations $\bm{F}_{w,h,c}$ where $w$, $h$, $c$ are the width, height, and channel indices, respectively, of the image features $\bm{F}$ at one layer, we obtain a final visual embedding $\bm{e}_v$ as follows: \begin{align} \small \xi_{w, h} = MLP(g(\bm{F_{w,h,\cdot}},\bm{e_l})) \;;\quad \alpha_{w, h} = \frac{\exp(\xi_{w, h})}{\sum_{w',h'} \exp(\xi_{w',h'})} \quad;\; \bm{e}_{v} = \sum_{w, h} \alpha_{w, h} \bm{F_{w,h,\cdot}}, \end{align} where $MLP$ is a multi-layer perceptron and $g(.,.)$ is an arbitrary fusion mechanism (concatenation, element-wise product, etc.). We will use Multi-modal Low-rank Bilinear (MLB) attention~\cite{kim2016hadamard} which defines $g(.,.)$ as: \begin{equation} g(\bm{F}_{w,h,\cdot}, \bm{e_l}) = \tanh(\bm{U}^{T}\bm{F}_{w, h, \cdot}) \circ \tanh(\bm{V}^{T}\bm{e_l}) , \end{equation} where $\circ$ denotes an element-wise product and where $\bm{U}$ and $\bm{V}$ are trainable weight matrices. We choose MLB attention because it is parameter efficient and has shown strong empirical performance~\cite{kim2016hadamard,kafle2017visual}. \subsection{Feature-wise Linear Modulation} Feature-wise Linear Modulation was introduced in the context of image stylization~\cite{dumoulin2017learned} and extended and shown to be highly effective for multi-modal tasks such as visual question-answering~\cite{devries2017modulating,perez2018film,delbrouck2017modulating}. A Feature-wise Linear Modulation (FiLM) layer applies a per-channel scaling and shifting to the convolutional feature maps. Such layers are parameter efficient (only two scalars per feature map) while still retaining high capacity, as they are able to scale up or down, zero-out, or negate whole feature maps. In vision-and-language tasks, another network, the so-called FiLM generator $h$, predicts these modulating parameters from the linguistic input $\bm{e}_l$. More formally, a FiLM layer computes a modulated feature map $\bm{\hat{F}}_{w,h,c}$ as follows: \begin{align} [\;\bm{\gamma} \;;\; \bm{\beta}\;] = h(\bm{e}_l) \qquad ; \qquad \bm{\hat{F}}_{.,.,c} = \gamma_{c}\bm{F}_{.,.,c} + \beta_{c}, \end{align} where $\bm{\gamma}$ and $\bm{\beta}$ are the scaling and shifting parameters which modulate the activations of the original feature map $\bm{F}_{.,.,c}$. We will use the superscript $k \in [1;K]$ to refer to the $k^{th}$ FiLM layer in the network. FiLM layers may be inserted throughout the hierarchy of a convolutional network, either pre-trained and fixed~\cite{de2017guesswhat} or trained from scratch~\cite{perez2018film}. Prior FiLM-based models~\cite{devries2017modulating,perez2018film,delbrouck2017modulating} have used a single-hop FiLM generator to predict the FiLM parameters in all layers, e.g.\@, an MLP which takes the language embedding $\bm{e}_{l}$ as input~\cite{devries2017modulating,perez2018film,delbrouck2017modulating}. \section{Multi-hop FiLM\xspace} \label{sec:mem_cell} In this section, we introduce the Multi-hop FiLM\xspace architecture (shown in Fig.~\ref{fig:film}) to predict the parameters of FiLM layers in an iterative fashion, to better scale to longer input sequences such as in dialogue. Another motivation was to better disantangle the linguistic reasoning from the visual one by iteratively attending to both pipelines. \begin{figure}[t] \centering \includegraphics[width=0.75\linewidth]{img/FiLM.pdf} \caption{\label{fig:film} The Multi-hop FiLM\xspace architecture, illustrating inputs (green), layers (blue), and activations (purple). In contrast, Single-hop FiLM\xspace models predict FiLM parameters directly from $\bm{e}_{l,T}$.} \end{figure} We introduce a context vector $\bm{c}^k$ that acts as a controller for the linguistic and visual pipelines. We initialize the context vector with the final state of a bidirectional RNN $\bm{s}_T$ and repeat the following procedure for each of the FiLM layers in sequence (from lowest to highest convolutional layer): first, the context vector is updated by performing attention over RNN states (extracting relevant language information), and second, the context is used to predict a layer's FiLM parameters (dynamically modulating the visual information). Thus, the context vector enables the model to perform multi-hop reasoning over the linguistic pipeline while iteratively modulating the image features. More formally, the context vector is computed as follows: \begin{align} \begin{cases} \bm{c}^0 = \bm{s}_T \\ \bm{c}^{k} = \sum_{t} \kappa^k_{t}(\bm{c}^{k-1},\bm{s}_{t}) \bm{s}_{t}, \end{cases} \end{align} where: \begin{equation} \kappa^k_{t}(\bm{c}^{k-1},\bm{s}_{t}) = \frac{\exp(\chi^k_{t})}{\sum_{t} \exp(\chi^k_{t})} \qquad ; \qquad \chi^k_{t}(\bm{c}^{k-1},\bm{s}_{t}) = MLP_{Attn}(g'(\bm{c}^k,\bm{s}_{t})), \end{equation} where the dependence of $\chi^k_{t}$ on $(\bm{c}^{k-1},\bm{s}_{t})$ may be omitted to simplify notation. $MLP_{Attn}$ is a network (shared across layers) which aids in producing attention weights. $g'$ can be any fusion mechanism that facilitates selecting the relevant context to attend to; here we use a simple dot-product following~\cite{luong2015effective}, so $g'(\bm{c}^k,\bm{s}_{t}) = \bm{c}^k\circ\bm{s}_{t}$ . Finally, FiLM is carried out using a layer-dependent neural network $MLP_{FiLM}^k$: \begin{align} [\;\bm{\gamma}^k \;;\; \bm{\beta}^k\;] = MLP_{FiLM}^k(\bm{c}^k) \qquad ; \qquad \bm{\hat{F}}^k_{w,h,c} = \gamma^k_{c}\bm{F}^k_{.,.,c} + \beta^k_{c}. \end{align} As a regularization, we append a normalization-layer~\cite{ba2016layer} on top of the context vector after each attention step. \emph{External information.} Some tasks provide additional information which may be used to further improve the visual modulation. For instance, GuessWhat?!\xspace provides spatial features of the ground truth object to models which must answer questions about that object. Our model incorporates such features by concatenating them to the context vector before generating FiLM parameters. \emph{Visual feedback.} Inspired by the co-attention mechanism~\cite{lu2016hierarchical,zhuang2017parallel}, we also explore incorporating visual feedback into the Multi-hop FiLM\xspace architecture. To do so, we first extract the image or crop features $\bm{F}^k$ (immediately before modulation) and apply a global mean-pooling over spatial dimensions. We then concatenate this visual state into the context vector $\bm{c}^k$ before generating the next set of FiLM parameters. \section{Experiments} In this section, we first introduce the ReferIt\xspace and GuessWhat?!\xspace datasets and respective tasks and then describe our overall Multi-hop FiLM\xspace architecture\footnote{The code and hyperparameters are available at \url{https://github.com/GuessWhatGame}}. \subsection{Dataset} \emph{ReferIt\xspace}~\cite{kazemzadeh2014referitgame,yu2016modeling} is a cooperative two-player game. The first player (the Oracle) selects an object in a rich visual scene, for which they must generate an expression that refers to it (e.g.\@, ``the person eating ice cream''). Based on this expression, the second player (the Guesser) must then select an object within the image. There are four ReferIt\xspace datasets exist: RefClef, RefCOCO, RefCOCO+ and RefCOCOg. The first dataset contains 130K references over 20K images from the ImageClef dataset~\cite{Mller:2012:IEE:2462702}, while the three other datasets respectively contain 142K, 142K and 86K references over 20K, 20k and 27K images from the MSCOCO dataset~\cite{lin2014microsoft}. Each dataset has small differences. RefCOCO and RefClef were constructed using different image sets. RefCOCO+ forbids certain words to prevent object references from being too simplistic, and RefCOCOg only relies on images containing 2-4 objects from the same category. RefCOCOg also contains longer and more complex sentences than RefCOCO (8.4 vs. 3.5 average words). Here, we will show results on both the Guesser and Oracle tasks. \emph{GuessWhat?!\xspace}~\cite{de2017guesswhat} is a cooperative three-agent game in which players see the picture of a rich visual scene with several objects. One player (the Oracle) is randomly assigned an object in the scene. The second player (Questioner) aims to ask a series of yes-no questions to the Oracle to collect enough evidence to allow the third player (Guesser) to correctly locate the object in the image. The GuessWhat?!\xspace dataset is composed of 131K successful natural language dialogues containing 650k question-answer pairs on over 63K images from MSCOCO~\cite{lin2014microsoft}. Dialogues contain 5.2 question-answer pairs and 34.4 words on average. Here, we will focus on the Guesser and Oracle tasks. \begin{figure}[t] \centering \includegraphics[width=0.85\linewidth]{img/Oracle_model_by_modality2} \caption{Overall model, consisting of a visual pipeline (red and yellow) and linguistic pipeline (blue) and incorporating additional contextual information (green).} \label{fig:oracle model} \end{figure} \subsection{Task Descriptions} \emph{Game Features.} Both games consist of triplets $(\mathcal{I}, l, o)$, where $\mathcal{I} \in \mathbb{R}^{3\times M\times N}$ is an RGB image and $l$ is some language input (i.e.\@, a series of words) describing an object $o$ in $\mathcal{I}$. The object $o$ is defined by an object category, a pixel-wise segmentation, an RGB crop of $\mathcal{I}$ based on bounding box information, and hand-crafted spatial information $\bm{x}_{spatial}$, where \begin{equation} \bm{x}_{spatial} = [ x_{min}, y_{min}, x_{max}, y_{max}, x_{center}, y_{center}, w_{box}, h_{box}] \end{equation} We replace words with two or fewer occurrences with an ${<}unk{>}$ token. \emph{The Oracle task.} Given an image $\mathcal{I}$, an object $o$, a question $q$, and a sequence $\delta$ of previous question-answer pairs $(\bm{q},a)_{{1:\delta}}$ where $a \in \{\mbox{Yes},\mbox{No},\mbox{N/A}\}$, the oracle's task is to produce an answer $a$ that correctly answers the question $q$. \emph{The Guesser task.} Given an image $\mathcal{I}$, a list of objects $O = o_{1:\Phi}$, a target object $o^* \in O$ and the dialogue $\mathcal{D}$, the guesser needs to output a probability $\sigma_\phi$ that each object $o_\phi$ is the target object $o^*$. Following~\cite{hu2016natural}, the Guesser is evaluated by selecting the object with the highest probability of being correct. Note that even if the individual probabilities $\sigma_\phi$ are between 0 and 1, their sum can be greater than 1. More formally, the Guesser loss and error are computed as follows: \begin{equation} L_{Guesser} = \frac{-1}{N_{games}}\sum_n^{N_{games}} \frac{1}{\Phi^n} \sum_\phi^\Phi \text{log}(p(o^*|\mathcal{I}^n, o^n_\phi, \mathcal{D}^n)) \end{equation} \begin{equation} E_{Guesser} = \frac{-1}{N_{games}}\sum_n^{N_{games}} \mathbb{1}( o^* \not = o_{ \argmax_\phi \sigma^n_\phi}) \end{equation} where $\mathbb{1}$ is the indicator function and $\Phi^n$ the number of objects in the $n^{th}$ game. \subsection{Model} We use similar models for both ReferIt\xspace and GuessWhat?!\xspace and provide its architectural details in this subsection. \emph{Object embedding} The object category is fed into a dense look-up table $\bm{e}_{cat}$, and the spatial information is scaled to [-1;1] before being up-sampled via non-linear projection to $\bm{e}_{spat}$. We do not use the object category in ReferIt\xspace models. \emph{Visual Pipeline} We first resized the image and object crop to $448\times 448$ before extracting $14\times 14\times 1024$ dimensional features from a ResNet-152~\cite{he2016deep} (block3) pre-trained on ImageNet~\cite{russakovsky2015imagenet}. Following~\cite{perez2018film}, we feed these features to a $3\times3$ convolution layer with Batch Normalization~\cite{ioffe2015batch} and Rectified Linear Unit~\cite{nair2010rectified} (ReLU). We then stack four modulated residual blocks (shown in Fig~\ref{fig:film}), each producing a set of feature maps $\bm{F}^k$ via (in order) a $1\times 1$ convolutional layer (128 units), ReLU activations, a $3\times 3$ convolutional layer (128 units), and an untrainable Batch Normalization layer. The residual block then modulates $\bm{F}^k$ with a FiLM layer to get $\bm{\hat{F}}^k$, before again applying ReLU activations. Lastly, a residual connection sums the activations of both ReLU outputs. After the last residual block, we use a $1\times1$ convolution layer (512 units) with Batch Normalization and ReLU followed by MLB attention~\cite{kim2016hadamard} (256 units and 1 glimpse) to obtain the final embedding $\bm{e}_v$. Note our model uses two independent visual pipeline modules: one to extract modulated image features $\bm{e}^{img}_v$, one to extract modulated crop features $\bm{e}^{crop}_v$. To incorporate spatial information, we concatenate two coordinate feature maps indicating relative x and y spatial position (scaled to $[-1, 1]$) with the image features before each convolution layer (except for convolutional layers followed by FiLM layers). In addition, the pixel-wise segmentations $S \in \{0,1\}^{M\times N}$ are rescaled to $14\times 14$ floating point masks before being concatenated to the feature maps. \emph{Linguistic Pipeline} We compute the language embedding by using a word-embedding look-up (200 dimensions) with dropout followed by a Bi-GRU ($512\times2$units) with Layer Normalization~\cite{ba2016layer}. As described in Section~\ref{sec:mem_cell}, we initialize the context vector with the last RNN state $\bm{c}^0=\bm{s}_{T}$. We then attend to the other Bi-GRU states via an attention mechanism with a linear projection and ReLU activations and regularize the new context vector with Layer Normalization. \emph{FiLM parameter generation} We concatenate spatial information $\bm{e}_{spat}$ and object category information $\bm{e}_{cat}$ to the context vector. In some experiments, we also concatenate a fourth embedding consisting of intermediate visual features $\bm{F}^k$ after mean-pooling. Finally, we use a linear projection to map the embedding to FiLM parameters. \emph{Final Layers} We first generate our final embedding by concatenating the output of the visual pipelines $\bm{e}_{final} = [\bm{e}^{img}_v$ ; $\bm{e}^{crop}_v]$ before applying a linear projection (512 units) with ReLU and a softmax layer. \emph{Training Process} We train our model end-to-end with Adam~\cite{kingma2014adam} (learning rate $3e^{-4}$), dropout ($0.5$), weight decay ($5e^{-6}$) for convolutional network layers, and a batch size of 64. We report results after early stopping on the validation set with a maximum of 15 epochs. \subsection{Baselines} In our experiments, we re-implement several baseline models to benchmark the performance of our models. The standard \emph{Baseline NN} simply concatenates the image and object crop features after mean pooling, the linguistic embedding, and the spatial embedding and the category embedding (GuessWhat?!\xspace only), passing those features to the same final layers described in our proposed model. We refer to a model which uses the MLB attention mechanism to pool the visual features as \emph{Baseline NN+MLB}. We also implement a \emph{Single-hop FiLM\xspace} mechanism which is equivalent to setting all context vectors equal to the last state of the Bi-GRU $\bm{e}_{l,T}$. Finally, we experiment with injecting intermediate visual features into the FiLM Generator input, and we refer to the model as \emph{Multi-hop FiLM\xspace~(+img)}. \begin{table}[t] \caption{ReferIt\xspace Guesser Error.} \label{tab:referit_res} \centering \scriptsize \begin{tabular}{l|x{1.2cm}x{1.1cm}x{1.1cm}|x{1.1cm}x{1.1cm}x{1.1cm}|x{1.5cm}} \toprule \textbf{Referit} & \multicolumn{3}{c|}{RefCOCO} & \multicolumn{3}{c|}{RefCOCO+} &\multicolumn{1}{c}{RefCOCOg}\\ Split by & \multicolumn{3}{c|}{(unc)} & \multicolumn{3}{c|}{(unc)} &\multicolumn{1}{c}{(google)} \\ Report on& Valid& TestA & TestB & Valid & TestA & TestB & Val \\ \midrule MMI~\cite{nagaraja2016modeling} & - &71.7\% & 71.1\% & - & 58.4\% & 51.2\% & 59.3\% \\ visDif + MMI~\cite{yu2016modeling} & - &74.6\% & 76.6\% & - & 59.2\% & 55.6\% & 64.0\% \\ NEG Bag~\cite{nagaraja2016modeling} & - &75.6\% & 78.0\% & - & - & - & 68.4\% \\ Joint-SLR~\cite{yu2017joint} & 78.9\% &78.0\% & 80.7\% & 61.9\% & 64.0\% & 59.2\% & - \\ PLAN~\cite{zhuang2017parallel} & 81.7\% &80.8\% & 81.3\% & 64.2\% & 66.3\% & 61.5\% & 69.5\% \\ MAttN~\cite{yu2018mattnet} & $\bm{85.7}$\% &85.3\% & $\bm{84.6}$\% & 71.0\% & 75.1\% & $\bm{66.2}$\% & - \\ \midrule Baseline NN+MLB & 77.6\% &79.6\%&77.2\% &60.8\% & 59.7\% &66.2\% & 63.1\% \\ Single-hop FiLM\xspace & 83.4\% &85.8\% &80.9\% &72.1\% & 77.3\% &63.9\% & 67.8\% \\ Multi-hop FiLM\xspace & 83.5\% &86.5\% &81.3\% &73.4\% & 77.7\% &64.5\% & 69.8\% \\ Multi-hop FiLM\xspace (+img) & 84.9\% &$\bm{87.4}$\% &83.1\% &$\bm{73.8\%}$&$\bm{78.7}$\% &65.8\% & $\bm{71.5}$\% \\ \bottomrule \end{tabular} \end{table} \subsection{Results} \emph{ReferIt\xspace Guesser} We report the best test error of the outlined methods on the ReferIt\xspace Guesser task in Tab.~\ref{tab:referit_res}. Note that RefCOCO and RefCOCO+ split test sets into TestA and TestB, only including expression referring towards people and objects, respectively. We do not report~\cite{yu2018mattnet} and~\cite{yu2017joint} scores on RefCOCOg as the authors use a different split (umd). Our initial baseline achieves 77.6\%, 60.8\%, 63.1\%, 73.4\% on the RefCOCO, RefCOCO+, RefCOCOg, RefClef datasets, respectively, performing comparably to state-of-the-art models. We observe a significant improvements using a FiLM-based architecture, jumping to 84.9\%, 87.4\%, 73.8\%, 71.5\%, respectively, and outperforming most prior methods and achieving comparably performance with the concurrent MAttN~\cite{yu2018mattnet} model. Interestingly, MAttN and Multi-hop FiLM\xspace are built in two different manners; while the former has three specialized reasoning blocks, our model uses a generic feature modulation approach. These architectural differences surface when examining test splits: MAttN achieves excellent results on referring expression towards objects while Multi-hop FiLM\xspace performs better on referring expressions towards people. \begin{table*}[t] \caption{\label{tab:oracle_results} GuessWhat?!\xspace Oracle Error by Model and Input Type.} \centering \scriptsize \begin{tabular}{l|x{1.1cm}x{1.1cm}x{1.1cm}x{1.1cm}x{1.1cm} | x{ 1.5cm} } \toprule \textbf{Oracle Models} & Quest. & Dial. & Object & Image & Crop & Test Error \\ \midrule Dominant class (``no'') & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & 50.9\% \\ Question only~\cite{de2017guesswhat} & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & 41.2\% \\ Image only~\cite{de2017guesswhat} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & 46.7\% \\ Crop only~\cite{de2017guesswhat} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & 43.0\% \\ \midrule No-Vision (Quest.)~\cite{de2017guesswhat} & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} &21.5\% \\ No-Vision (Dial.) & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{red}{\ding{55}} &20.6\% \\ \midrule Baseline NN (Quest.) & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & 23.3\%\\ Baseline NN (Dial.) & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & 22.4\%\\ Baseline NN + MLB (Quest.) & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & 21.8\%\\ Baseline NN + MLB (Dial.) & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & 21.1\%\\ \midrule MODERN~\cite{devries2017modulating} & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} &19.5\% \\ \midrule Single-hop FiLM\xspace (Quest.) & \textcolor{green}{\ding{51}} & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & 17.8\%\\ Single-hop FiLM\xspace (Dial.) & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & 17.6\%\\ Multi-hop FiLM\xspace & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \bf{16.9\%} \\ Multi-hop FiLM\xspace (+img) & \textcolor{red}{\ding{55}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & \textcolor{green}{\ding{51}} & 17.1\% \\ \bottomrule \end{tabular} \end{table*} \emph{GuessWhat?!\xspace Oracle} We report the best test error of several variants of GuessWhat?!\xspace Oracle models in Tab.~\ref{tab:oracle_results}. First, we baseline any visual or language biases by predicting the Oracle's target answer using only the image (46.7\% error) or the question (41.1\% error). As first reported in~\cite{de2017guesswhat}, we observe that the baseline methods perform worse when integrating the image and crop inputs (21.1\%) rather than solely using the object category and spatial location (20.6\%). On the other hand, concatenating previous question-answer pairs to answer the current question is beneficial in our experiments. Finally, using Single-hop FiLM\xspace reduces the error to 17.6\% and Multi-hop FiLM\xspace further to 16.9\%, outperforming the previous best model by 2.4\%. \emph{GuessWhat?!\xspace Guesser} We provide the best test error of the outlined methods on the GuessWhat?!\xspace Guesser task in Tab.~\ref{tab:guesser_results}. As a baseline, we find that random object selection achieves an error rate of 82.9\%. Our initial model baseline performs significantly worse (38.3\%) than concurrent models (36.6\%), highlighting that successfully jointly integrating crop and image features is far from trivial. However, Single-hop FiLM\xspace manages to lower the error to 35.6\%. Finally, Multi-hop FiLM\xspace architecture outperforms other models with a final error of 30.5\%. \section{Discussion} \emph{Single-hop FiLM\xspace \textit{vs.} Multi-hop FiLM\xspace} In the GuessWhat?!\xspace task, Multi-hop FiLM\xspace outperforms Single-hop FiLM\xspace by 6.1\% on the Guesser task but only 0.7\% on the Oracle task. We think that the small performance gain for the Oracle task is due to the nature of the task; to answer the current question, it is often not necessary to look at previous question-answer pairs, and in most cases this task does not require a long chain of reasoning. On the other hand, the Guesser task needs to gather information across the whole dialogue in order to correctly retrieve the object, and it is therefore more likely to benefit from multi-hop reasoning. The same trend can be observed for ReferIt\xspace. Single-hop FiLM\xspace and Multi-hop FiLM\xspace perform similarly on RefClef and RefCOCO, while we observe 1.3\% and 2\% gains on RefCOCO+ and RefCOCOg, respectively. This pattern of performance is intuitive, as the former datasets consist of shorter referring expressions (3.5 average words) than the latter (8.4 average words in RefCOCOg), and the latter datasets also consist of richer, more complex referring expressions due e.g.\@ to taboo words (RefCOCO+). In short, our experiments demonstrate that Multi-hop FiLM\xspace is better able reason over complex linguistic sequences. \begin{table*}[t] \caption{GuessWhat?!\xspace Guesser Error.} \label{tab:guesser_results} \begin{minipage}{0.36\linewidth} \centering \scriptsize \begin{tabular}{l|x{1.5cm}} \toprule \textbf{Guesser Error} & {Test Error} \\ \midrule Random & 82.9\% \\ \midrule LSTM~\cite{de2017guesswhat} &38.7\% \\ LSTM + Img~\cite{de2017guesswhat} &39.5\% \\ PLAN~\cite{zhuang2017parallel} &36.6\% \\ \midrule Base NN + MLB (crop)& 38.3\%\\ Single-hop FiLM\xspace & 35.6\%\\ Multi-hop FiLM\xspace &\bf{30.5\%} \\ \bottomrule \end{tabular} \end{minipage}% \quad \begin{minipage}{0.62\linewidth} \centering \scriptsize \begin{tabular}{l|x{1.2cm}x{1.2cm}x{1.45cm}} \toprule \textbf{Guesser Error} & {Crop} & {Image} & {Crop+Img} \\ \midrule Baseline NN & 38.3\% & 40.0\% & 45.1\% \\ Single-hop FiLM\xspace & 35.3\% & 35.7\% & 35.6\% \\ Multi-hop FiLM\xspace & 32.3\% & 35.0\% & $\bf{30.5\%}$ \\ Multi-hop FiLM\xspace (no categ.) & 33.1\% & 40\% & 33.4\%\\ \bottomrule \end{tabular} \end{minipage}% \end{table*} \emph{Reasoning mechanism} We conduct several experiments to better understand our method. First, we assess whether Multi-hop FiLM\xspace performs better because of increased network capacity. We remove the attention mechanism over the linguistic sequence and update the context vector via a shared MLP. We observe that this change significantly hurts performance across all tasks, e.g.\@, increasing the Multi-hop FiLM\xspace error of the Guesser from 30.5 to 37.3\%. Second, we investigate how the model attends to GuessWhat?!\xspace dialogues for the Oracle and Guesser tasks, providing more insight into how to the model reasons over the language input. We first look at the top activation in the (crop) attention layers to observe where the most prominent information is. Note that similar trends are observed for the image pipeline. As one would expect, the Oracle is focused on a specific word in the last question 99.5\% of the time, one which is crucial to answer the question at hand. However, this ratio drops to 65\% in the Guesser task, suggesting the model is reasoning in a different way. If we then extract the top 3 activations per layer, the attention points to ${<}yes{>}$ or ${<}no{>}$ tokens (respectively) at least once, 50\% of the time for the Oracle and Guesser, showing that the attention is able to correctly split the dialogue into question-answer pairs. Finally, we plot the attention masks for each FiLM layer to have a better intuition of this reasoning process in Fig.~\ref{fig:attention}. \emph{Crop \textit{vs.} Image.} We also evaluate the impact of using the image and/or crop on the final error for the Guesser task~\ref{tab:guesser_results}. Using the image alone (while still including object category and spatial information) performs worse than using the crop. However, using image and crop together inarguably gives the lowest errors, though prior work has not always used the crop due to architecture-specific GPU limitations~\cite{devries2017modulating}. \emph{Visual feedback} We explore whether adding visual feedback to the context embedding improves performance. While it has little effect on the GuessWhat?!\xspace Oracle and Guesser tasks, it improves the accuracy on ReferIt\xspace by 1-2\%. Note that ReferIt\xspace does not include class labels of the selected object, so the visual feedback might act as a surrogate for this information. To further investigate this hypothesis, we remove the object category from the GuessWhat?!\xspace task and report results in Tab.~\ref{tab:oracle_results_nocat} in the supplementary material. In this setup, we indeed observe a relative improvement 0.4\% on the Oracle task, further confirming this hypothesis. \emph{Pointing Task} In GuessWhat?!\xspace, the Guesser must select an object from among a list of items. A more natural task would be to have the Guesser directly point out the object as a human might. Thus, in the supplementary material, we introduce this task and provide initial baselines (Tab.~\ref{sec:pointing}) which include FiLM models. This task shows ample room for improvement with a best test error of 84.0\%. \begin{figure}[t] \centering \subfloat{\includegraphics[width=0.44\linewidth]{img/tie}} \quad \subfloat{\includegraphics[width=0.45\linewidth]{img/dog}} \caption{\label{fig:attention} Guesser (left) and Oracle (right) attention visualizations for the visual pipeline which processes the object crop.} \end{figure} \section{Related Work} The ReferIt\xspace game~\cite{kazemzadeh2014referitgame} has been a testbed for various vision-and-language tasks over the past years, including object retrieval~\cite{nagaraja2016modeling,yu2016modeling,yu2017joint,zhuang2017parallel,luo2017comprehension,yu2018mattnet}, semantic image segmentation~\cite{hu2016segmentation,rohrbach2016grounding}, and generating referring descriptions~\cite{yu2016modeling,luo2017comprehension,yu2017joint}. To tackle object retrieval,~\cite{nagaraja2016modeling,yu2016modeling,yu2018mattnet} extract additional visual features such as relative object locations and~\cite{yu2017joint,luo2017comprehension} use reinforcement learning to iteratively train the object retrieval and description generation models. Closer to our work,~\cite{hu2016natural,zhuang2017parallel} use the full image and the object crop to locate the correct object. While some previous work relies on task-specific modules~\cite{yu2016modeling,yu2018mattnet}, our approach is general and can be easily extended to other vision-and-language tasks. The GuessWhat?!\xspace game~\cite{de2017guesswhat} can be seen as a dialogue version of the ReferIt\xspace game, one which additionally draws on visual question answering ability. \cite{strub2017end,lee2018answerer,zhu2017interactive} make headway on the dialogue generation task via reinforcement learning. However, these approaches are bottlenecked by the accuracy of Oracle and Guesser models, despite existing modeling advances~\cite{zhuang2017parallel,devries2017modulating}; accurate Oracle and Guesser models are crucial for providing a meaningful learning signal for dialogue generation models, so we believe the Multi-hop FiLM\xspace architecture will facilitate high quality dialogue generation as well. A special case of Feature-wise Linear Modulation was first successfully applied to image style transfer~\cite{dumoulin2017learned}, whose approach modulates image features according to some image style (i.e.\@, cubism or impressionism). \cite{devries2017modulating} extended this approach to vision-and-language tasks, injecting FiLM-like layers along the entire visual pipeline of a pre-trained ResNet. \cite{perez2018film} demonstrates that a convolutional network with FiLM layers achieves strong performance on CLEVR~\cite{johnson2017clevr}, a task that focuses on answering reasoning-oriented, multi-step questions about synthetic images. Subsequent work has demonstrated that FiLM and variants thereof are effective for video object segmentation where the conditioning input is the first image's segmentation (instead of language)~\cite{yang2018osmn} and language-guided image segmentation~\cite{rupprecht2018guide}. Even more broadly,~\cite{dumoulin2018feature-wise} overviews the strength of FiLM-related methods across machine learning domains, ranging from reinforcement learning to generative modeling to domain adaptation. There are other notable models that decompose reasoning into different modules. For instance, Neural Turing Machines~\cite{graves2014neural,graves2016hybrid} divide a model into a controller with read and write units. Memory networks use an attention mechanism to answer a query by reasoning over a linguistic knowledge base~\cite{weston2014memory,sukhbaatar2015end} or image features~\cite{xiong2016dynamic}. A memory network updates a query vector by performing several attention hops over the memory before outputting a final answer from this query vector. Although Multi-hop FiLM\xspace computes a similar context vector, this intermediate embedding is used to predict FiLM parameters rather than the final answer. Thus, Multi-hop FiLM\xspace includes a second reasoning step over the image. Closer to our work, \cite{arad2018compositional} designed networks composed of Memory, Attention, and Control (MAC) cells to perform visual reasoning. Similar to Neural Turing Machines, each MAC cell is composed of a control unit that attends over the language input, a read unit that attends over the image and a write unit that fuses both pipelines. Though conceptually similar to Multi-hop FiLM\xspace models, Compositional Attention Networks differ structurally, for instance using a dynamic neural architecture and relying on spatial attention rather than FiLM. \section{Conclusion} In this paper, we introduce a new way to exploit Feature-wise Linear Modulation (FiLM) layers for vision-and-language tasks. Our approach generates the parameters of FiLM layers going up the visual pipeline by attending to the language input in multiple hops rather than all at once. We show Multi-hop FiLM Generator\xspace architectures are better able to handle longer sequences than their single-hop counterparts. We outperform state-of-the-art vision-and-language models significantly on the long input sequence GuessWhat?!\xspace tasks, while maintaining state-of-the-art performance for the shorter input sequence ReferIt\xspace task. Finally, this Multi-hop FiLM Generator\xspace approach uses few problem-specific priors, and thus we believe it can extended to a variety of vision-and-language tasks, particularly those requiring complex visual reasoning. \paragraph*{Acknowledgements} The authors would like to acknowledge the stimulating research environment of the SequeL Team. We also thank Vincent Dumoulin for helpful discussions. We acknowledge the following agencies for research funding and computing support: Project BabyRobot (H2020-ICT-24-2015, grant agreement no.687831), CHISTERA IGLU and CPER Nord-Pas de Calais/FEDER DATA Advanced data science and technologies 2015-2020, NSERC, Calcul Qu\'{e}bec, Compute Canada, the Canada Research Chairs, and CIFAR. \bibliographystyle{splncs04}
\section{Stuff by bazofies} YA LO AGREGUÉ ABAJO \section{Introduction} Morphology deals with the internal structure of words \cite{aronoff2011morphology,haspelmath2013understanding}. Languages of the world have different word production processes. Morphological richness vary from language to language, depending on their linguistic typology. In natural language processing (NLP), taking into account the morphological complexity inherent to each language could be important for improving or adapting the existing methods, since the amount of semantic and grammatical information encoded at the word level, may vary significantly from language to language. Conceptualizing and quantifying linguistic complexity is not an easy task, many quantitative and qualitative dimensions must be taken into account \cite{miestamo2008grammatical}. On one hand we can try to answer what is complexity in a language and which mechanisms express it, on the other hand, we can try to find out if there is a language with more complex phenomena (phonological, morphological, syntactical) than other and how can we measure it. \newcite{miestamo2008grammatical} distinguishes between two types of complexity: the absolute, which defines complexity in terms of the number of parts of a system; and the relative, which is related to the cost and difficulty faced by language users. Some authors focuses in the absolute approach since it is less subjective. Another common complexity distinction is between global and particular. Global complexity characterizes entire languages, e.g., as easy or difficult to learn \cite[p. 29]{miestamo2008grammatical}, while particular complexity refers only to a level of the whole language (for example phonological complexity, morphological complexity, syntactical complexity). We focus on morphological complexity. Many definitions of this term have been proposed \cite{baerman2015understanding,anderson2015dimensions,sampson2009language}. From the computational linguistics perspective there has been a special interest in corpus based approaches to quantify it, i.e., methods that estimate the morphological complexity of a language directly from the production of morphological instances over a corpus. This type of approach usually represents a relatively easy and reproducible way to quantify complexity without the strict need of linguistic annotated data. The underlying intuition of corpus based methods is that morphological complexity depends on the morphological system of a language, like its inflectional and derivational processes. A very productive system will produce a lot of different word forms. This morphological richness can be captured with several statistical measures, e.g., information theory measures \cite{blevins2013information} or type token relationships. For example, \newcite[p.~9]{bybee2010language} affirms that ``the token frequency of certain items in constructions [i.e., words] as well as the range of types [...] determines representation of the construction as well as its productivity''. In this work, we are interested in using corpus based approaches; however, we would like to quantify the complexity not only by the type and token distributions over a corpus, but also by taking into account other important dimension: the predictability of a morph sequence \cite{montermini2013stem}. This is a preliminary work that takes as a case of study the distant languages Otomi, Nahuatl and Spanish. The general idea is to use parallel corpora, type-token relationship and some NLP strategies for measuring the predictability in statistical language models. Additionally, most of the previous works do not analyze how the complexity changes when different types of morphological normalization procedures are applied to a language, e.g., lemmatization, stemming, morphological segmentation. This information could be useful for linguistic analysis and for measuring the impact of different word form normalization tools depending of the language. In this work, we analyze how the type-token relationship changes using different types of morphological normalization techniques. \subsection{The type-token relationship (TTR)} The type-token relationship (TTR) is the relationship that exists between the number of distinct words (types) and the total word count (tokens) within a text. This measure has been used for several purposes, e.g., as an indicator of vocabulary richness and style of an author \cite{herdan1966advanced,stamatatos2009survey}, information flow of a text \cite{altmann2008anleitung} and it has also been used in child language acquisition, psychiatry and literary studies \cite{malvern2002investigating,kao2012computational}. TTR has proven to be a simple, yet effective, way to quantify the morphological complexity of a language. This is why it has been used to estimate morphological complexity using relatively small corpora \cite{kettunen2014can}. It has also shown a high correlation with other types of complexity measures like entropy and paradigm-based approaches that are based on typological information databases \cite{bentz2016comparison} It is important to notice that the value of TTR is affected by the type and length of the texts. However, one natural way to make TTRs comparable between languages is to use a parallel corpus, since the same meaning and functions are, more or less, expressed in the two languages. When TTR is measured over a parallel corpus, it provides a useful way to compare typological and morphological characteristics of languages. \newcite{kelih2010type} works with parallel texts of the Slavic language family to analyze morphological and typological features of the languages, i.e., he uses TTR for comparing the morphological productivity and the degree of syntheticity and analycity between the languages. Along the same line, ~\newcite{mayer2014extraction} automatically extract typological features of the languages, e.g., morphological synthesis degree, by using TTR. There exist several models that have been developed to examine the relationship between the types and tokens within a text \cite{mitchell2015type}. The most common one is the ratio $\frac{types}{tokens}$ and it is the one that we use in this work. \subsection{Entropy and Perplexity} In NLP, statistical language models are a useful tool for calculating the probability of any sequence of words in a language. These models need a corpus as training data, they are usually based on n-grams, and more recently, in neural representations of words. Information theory based measures can be used to estimate the predictiveness of these models, i.e., perplexity and entropy. Perplexity is a common measure for the complexity of n-grams models in NLP \cite{brown1992class}. Perplexity is based in Shannon's entropy \cite{shannon1951mathematical} as the perplexity of a model $\mu$ is defined by the equation $2^{H(\mu)}$, where $H(\mu)$ es the entropy of the model (or random variable). Shannon's entropy had been used for measuring complexity of different systems. In linguistics, entropy is commonly used to measure the complexity of morphological systems \cite{blevins2013information,ackerman2013morphological,baerman2012paradigmatic}. Higher values of perplexity and entropy mean less predictability. Perplexity depends on how the model is represented (this includes the size of the data). In this work, we compare two different models for calculating the entropy and perplexity: a typical bigram model adapted to a morph level\cite{brown1992class}; and our proposal based on using the word as a context instead of ngrams. We rely in parallel corpora to compare the measures across languages, since the same meaning and functions are shared in the two languages. \begin{description} \item[Bigram model.] This model takes into consideration bigrams \cite{brown1992class} as context for determining the joint probabilities of the sub-strings. Here the bigrams are sequences of two morphs in the text (whether they belong to the same word or not). This is a typical statistical language model but instead of using sequences of words, we use morphological segmented texts. In addition, we use a Laplacian (or add one) smoothing for the conditional probabilities \cite{chen1999empirical}. \item[Word level.] The word level representation takes the whole word as context for the determination of joint probabilities. Therefore, the frequency of co-occurrence is different from zero only if the sub-word units (morphs) are part of the same word. For example, if $xby$ is a word with a prefix $x$ and a suffix $y$, the co-occurrence of $x$ with $b$ will be different from zero as both morphs are part of the word $xby$. Similarly, the co-occurrence of $y$ with $b$ will be different from zero. Conversely, if two morphs are sub-strings of different words, its co-occurrence will be zero. To calculate the conditional probabilities we use and add one estimator defined as: \begin{equation} p(x|y) = \frac{fr(x,y) + 1 }{fr(x,y) + V} \end{equation} Where $V$ is the number of types and $fr(\cdot)$ is the frequency of co-occurrence function. \end{description} \section{Experimental setting} \subsection{The corpus} We work with two language pairs that are spoken in the same country (Mexico) but they are typologically distant languages: Spanish (Indo-European)-Nahuatl (Uto-Aztecan) and Spanish-Otomi (Oto-Manguean). Both, Nahuatl and Otomi are low-resource languages that face scarcity of digital parallel and monolingual corpora. Nahuatl is an indigenous language with agglutinative and polysynthethic morphological phenomena. It can agglutinate many different prefixes and suffixes to build complex words. Spanish also has rich morphology, but it mainly uses suffixes and it can have a fusional behavior, where morphemes can be fused or overlaid into a single one that encodes several grammatical meanings. Regarding to Otomi, its morphology also has a fusional tendency, and it is head-marking. Otomi morphology is usually considered quite complex \cite{palancar2012conjugation} as it exhibits different phenomena like stem alternation, inflectional class changes and suprasegmental variation, just to mention some. Since we are dealing with low resource languages that have a lot of dialectal and orthographic variation, it is difficult to obtain a standard big parallel corpus. We work with two different parallel corpora, i.e., Spanish-Nahuatl and Spanish-Otomi. Therefore the complexity comparisons are always in reference to Spanish. We used a Spanish-Nahuatl parallel corpus created by \newcite{GUTIERREZVASQUES16.1068}. However, we used only a subset since the whole corpus is not homogeneous, i.e., it comprises several Nahuatl dialects, sources, periods of time and it lacks of a general orthographic normalization. We chose the texts that had a more or less systematic writing. On the other hand, we used a Spanish-Otomi parallel corpus \cite{lastra1992otomi} conformed by 38 texts transcribed from speech. This corpus was obtained in San Andr\'es Cuexcontitlan. It is principally composed by narrative texts, but also counts with dialogues and elicited data. Table \ref{parallelcorpus} shows the size of the parallel corpora used for the experiments. \begin{table}[!h] \small \begin{center} \begin{tabular}{|l|l|l|} \hline \bf Parallel Corpus & \bf Tokens & \bf Types \\ \hline \bf Spanish-Nahuatl & & \\ \hline Spanish (ES) & 118364 & 13233 \\ \hline Nahuatl (NA) & 81850 & 21207 \\ \hline \bf Spanish-Otomi & & \\ \hline Spanish (ES) & 8267 & 2516 \\ \hline Otomi (OT) & 6791 & 3381 \\ \hline \end{tabular} \end{center} \caption{\label{parallelcorpus} Size of the parallel corpus } \end{table} \subsection{Morphological analysis tools} \label{secc:morpho} We used different morphological analysis tools, in order to explore the morphological complexity variation among languages and between the different types of morphological representations. We performed lemmatization for Spanish language, and morphological segmentation for all languages. In NLP, morphology is usually tackled by building morphological analysis (taggers) tools. And more commonly, lemmatization and stemming methods are used to reduce the morphological variation by converting words forms to a standard form, i.e., a lemma or a stem. However, most of these technologies are focused in a reduced set of languages. For languages like English, with plenty of resources and relatively poor morphology, morphological processing may be considered solved. However, this is not the case for all the languages. Specially for languages with rich morphological phenomena where it is not enough to remove inflectional endings in order to obtain a stem. Lemmatization and stemming aim to remove inflectional endings. Spanish has available tools to perform this task. We used the tool Freeling\footnote{http://nlp.lsi.upc.edu/freeling/}. Regarding to morphological segmentation, we used semi-supervised statistical segmentation models obtained with the tool Morfessor \cite{virpioja2013morfessor}. In particular, we used the same segmentation models reported in \newcite{ximena2017bilingual} for Spanish and Nahuatl. As for Otomi, we used manual morphological segmentation of the corpus, provided by a specialist. \subsection{Complexity measures} We calculated the type-token relationship for every language in each parallel corpus. Table \ref{TTR1} shows the TTR of the texts without any processing ($ES$, $NA$) and with the different types of morphological processing: morphological segmentation ($ES_{morph}$, $NA_{morph}$), lemmatization ($ES_{lemma}$). In a similar way, Table \ref{TTR2} shows the TTR values for the Spanish-Otomi corpus. It is worth mentioning that the TTR values are only comparable within the same parallel corpus. \begin{table}[!h] \small \begin{center} \begin{tabular}{c c c c} \hline ~ & \bf Tokens & \bf Types & \bf TTR ($\%$) \\ \hline $ES$ & 118364 & 13233 & 11.17 \\ $NA$ & 81850 & 21207 & \bf 25.90\\ \hline $ES_{morph}$ & 189888 & 4369 & 2.30 \\ $NA_{morph}$ & 175744 & 2191 & \bf 1.24 \\ \hline $ES_{lemma}$ & 118364 & 7599 & 6.42 \\ \hline \end{tabular} \end{center} \caption{\label{TTR1} TTR for Nahuatl-Spanish corpus} \end{table} \begin{table}[!h] \small \begin{center} \begin{tabular}{c c c c } \hline ~ & \bf Tokens & \bf Types & \bf TTR ($\%$) \\ \hline $ES$ & 8267 & 2516 & 30.43 \\ $OT$ & 6791 & 3381 & \bf 49.78 \\ \hline $ES_{morph}$ & 14422 & 1072 & 7.43 \\ $OT_{morph}$ & 13895 & 1788 & \bf 1.28 \\ \hline $ES_{lemma}$ & 8502 & 1020 & 8.33\\ \hline \end{tabular} \end{center} \caption{\label{TTR2} TTR for Otomi-Spanish corpus} \end{table} We also calculate the perplexity and complexity for the different languages. Since we are focusing on morphological complexity, we took only the segmented data for computing the entropy and the perplexity. We do not use the lemmatized or non segmented data since this would be equivalent to measuring the combinatorial complexity between words, i.e. syntax. In this sense, the entropy and perplexity reflects the predictability of the morphs sequences. Tables ~\ref{tab:perplexity} and \ref{tab:entropy} shows the perplexity and entropy in each language pair. \begin{table}[!h] \small \centering \begin{tabular}{c c c} \\ \hline ~ & \textbf{Word level} & \textbf{Bigram model} \\ \hline ~ & ES-NA & ~ \\ \hline $NA_{morph}$ & 214.166 & 1069.973 \\ $ES_{morph}$ & 1222.956 & 2089.774 \\ \hline ~ & ES-OT & ~ \\ \hline $ES_{morph}$ & 208.582 & 855.1766 \\ $OT_{morph}$ & 473.830 & 1315.006 \\ \hline \end{tabular} \caption{\small Perplexity obtained in the different parallel corpora} \label{tab:perplexity} \end{table} \begin{table}[!h] \small \centering \begin{tabular}{c c c} \\ \hline ~ & \textbf{Word level} & \textbf{Bigram model} \\ \hlin ~ & ES-NA & ~ \\ \hline $NA_{morph}$ & 0.697 & 0.906 \\%& 0.966\\ $ES_{morph}$ & 0.848 & 0.911 \\ \hline ~ & ES-OT & ~ \\ \hline $ES_{morph}$ & 0.765 & 0.967 \\%& 0.999 \\ $OT_{morph}$ & 0.843 & 0.984 \\ \hline \end{tabular} \caption{ \small Entropy obtained in the different parallel corpora} \label{tab:entropy} \end{table} \section{Results analysis} \subsection{TTR as a measure of morphological complexity} When no morphological processing is applied, Nahuatl has a lot higher TTR value than Spanish, i.e., a greater proportion of different word forms (types). In spite of Nahuatl having fewer tokens because of its agglutinative nature, it has a lot more types than Spanish. This suggests that Nahuatl has a highly productive system that can generate a great number of different morphological forms. In other words, it is more likely to find a repeated word in Spanish than in a Nahuatl corpus. In the case of Otomi-Spanish, Otomi also has a bigger complexity compared to Spanish in terms of TTR. Even though both Otomi and Spanish show fusional patterns in its inflection, Otomi also count with a lot of derivational processes and shows regular stem alternations. In every case, morphological segmentation induced the smallest values of TTR for all languages. Suggesting that greater reduction of the morphological complexity is achieved when the words are split into morphs, making it more likely to find a repeated item. For instance, when Nahuatl was morphologically segmented, TTR had a dramatic decrease (from $26.22$ to $1.23$). This TTR reduction could be the result of eliminating the combinatorial variety of the agglutinative and polysynthetical morphology of the language. Therefore, when we segment the text we break this agglutination, leading to significantly less diverse units. In the case of Otomi language, a similar trend can be observed. Otomi seems to be morphologically more complex than Spanish in terms of TTR, i.e., more diverse types or word forms. When morphological segmentation is applied, TTR decreases and Otomi language has a lower TTR compared to Spanish. Even though Otomi is not a polysynthetic language like Nahuatl, these results suggest that Otomi has also a great combinatory potential of its morphs, i.e, when Otomi gets morphologically segmented we obtain less diverse types, these morphs may be recurrent in the text but they can be combined in many several ways within the Otomi word structure. Linguistic studies have shown that Otomi language can concatenate several affixes, specially in derivative processes \cite{lastra1992otomi}. It has brought to our attention that Spanish has a higher TTR than Nahuatl and Otomi, only when the languages are morphologically segmented. It seems that the morphs inventory is bigger in Spanish, we conjecture this is related to the fact that Spanish has more suppletion or ``irregular'' forms phenomena \cite{boye2006structure}. \subsection{Predictability} The predictability of the internal structure of word is other dimension of complexity. It reflects the difficulty of producing novel words given a set of lexical items (stems, suffixes or morphs). First of all, as a general overview, we can see that word level models have the lower perplexity and entropy (Tables \ref{tab:perplexity} and \ref{tab:entropy}). We believe that this type of models capture better the morphological structure, since they take into account the possible combinations of morphs within a word and not outside the bounds of it (like the bigram model). It is interesting to compare the TTR and the predictability measures for each language. In the case of Nahuatl, TTR shows that there is a lot of complexity at lexical level (many different word forms, few repetitions), however, this contrasts with the predictability of the elements that conform a lexical item: the combination of morphs within a word is more predictable than Spanish, since it obtains lower values of Perplexity and entropy. The combinatorial structure of Nahuatl morphology shows less uncertainty than Spanish one, despite the fact that Nahuatl is capable of producing many more different types in the corpus due to its agglutinative and polysynthetic nature. The case of Otomi language is different, since it seems that it is not only complex in terms of TTR but also in terms of predictability. It obtains higher entropy and perplexity than Spanish. We conjecture this is related to several phenomena. For instance, Otomi and Nahuatl allow a large number of morphs combinations to modify a stem (inflectional and derivational). However, Otomi shows phenomena that is not easy to predict; for example, it has a complex system of inflectional classes, stem alternations and prefix changes. Moreover, tones and prosody plays an important role in the morphology of Otomi verbs \cite{palancar2004verbal,palancar2016typology}. Also, we mentioned before that many of the affixes concatenations in Otomi take place in derivative processes. Derivation tends to be less predictable than inflection phenomena (derivation is less frequent and less regular), and this could be an additional reason of why the entropy values of this language are high. \section{Conclusions} In this work we used corpus based measures like TTR, entropy and perplexity for exploring the morphological complexity of three languages, using two small parallel corpora. We use TTR as a measure of morphological productivity of a language, and we use the entropy and perplexity calculated over a sequence of morphs, as a measure of predictability. There may be a common believe that polysynthetical languages are far more complex than analytic ones. However, it is important to take into account the many factors that lay a role in the complexity of the system. We stressed out that morphological complexity has several dimensions that must be taken into account \cite{baerman2015understanding}. While some agglutinative polysynthetical languages, like Nahuatl, could be considered complex by the number of morphemes the combinations and the information than can be encoded in a single word; the sequence of these elements may be more predictable than fusional languages like Spanish. Languages like Otomi, showed high complexity in the two dimensions that we focused in this work (this is consistent with qualitative perspectives \cite{palancar2016typology}). These two dimensions of complexity are valid and complementary. Measures like TTR reflect the amount of information that words can encode in a language, languages that have a high TTR have the potential of encoding a lot of functions at the word level, therefore, they produce many different word forms. Perplexity and entropy measured over a sequence of morphs reflect the predictability or degree of uncertainty of these combinations. The higher the entropy (hence, the perplexity), the higher the uncertainty in the combinations of morphs. This was a preliminary work. Deeper linguistic analysis, more corpora and more languages are needed. However, we believe that quantitative measures extracted from parallel corpora can complement and deepen the study of linguistic complexity. Efforts are currently being made \cite{bane2008quantifying}. However, more studies are needed, especially for low resources languages. \subsection{Future work} Languages of the world have a wide range of functions that can be codified at the world level. Therefore, it would be interesting to consider the study of more complexity dimensions in our work. Popular quantitative approaches are successful in reflecting how many morphs can be combined into a single word. However, it is also important to take into account how complex the format of a word can be, i.e., not only how many elements can be combined but also what type of elements. For example, \newcite{dahl2009testing} argues that when a phoneme is added to a word, this process is not as complex as adding a tone. Another interesting dimension is the complexity of the morphology in terms of acquisition (of native and L2 speakers). \newcite{miestamo2008grammatical} points out that this typo of complexity should be made on the basis of psycho-linguistics analysis in both processing and acquisition. Finally, one important factor that influences language complexity is culture. In many languages, pragmatics nuances are produced via morphological processes. For instance, languages like Nahuatl have a complex honorific or reverential system that is expressed using different types of affixes. Spanish expresses this type of phenomena with morphosyntactic processes. It is a challenging task to be able to quantify all these factors that play a role in the complexity of a language. \section*{Acknowledgements} This work was supported by the Mexican Council of Science and Technology (CONACYT), fund 2016-01-2225, and CB-2016/408885. We also thank the reviewers for their valuable comments and to our friend Morris\'e P. Martinez for his unconditional support. \bibliographystyle{acl}
\section{Introduction} \begin{figure}[b] \centering \includegraphics[width=\columnwidth]{wet_packing_slice_UntappedII_15ml_twoface.png} \caption{Horizontal slice through a tomogram of a wet packing with a liquid content of 3.1\%. \textit{Left}: Raw data after applying a bilateral filter for noise reduction. White areas are liquid domains and gray areas particles. Holes inside the particles are due to manufacturing and are removed by image processing. \textit{Right}: After image processing pixels belonging to spheres are marked blue and yellow areas correspond to liquid clusters. } \label{fig:tomo_slice} \end{figure} Everyone who has ever built a sand castle at the beach is familiar with the different mechanical properties of wet and dry granular media. Adding a small amount of a wetting liquid to the particles allows the formation of capillary bridges between particles \cite{Hornbaker_1997,Halsey_1998,Mason_1999,kohonen:04,butt:09,gogelein:10,Herminghaus_2013}. These bridges add tensile forces to the packing, resulting in a significantly increased mechanical stability \cite{mason:68,pierrat:97,tegzes:02,Scheel_2004,Fournier:05,Huang:05,richefeu:06,xu:07,moller:07,huang:09,rahbari:09,fiscina:10,Liu_2011,vandewalle:12,fiscina:12,2014_Fall_SlidingFrictionOnWetAndDrySand,bossler:16,kovalcinova:18,liefferink:18}: it is simple to build vertical sand castle walls from wet sand while the same material in its dry state can not form piles with steeper slopes than its angle of repose around 30$^\circ$, which is dependent on the friction coefficient of the sand. However, this intuitive notion of additional tensile forces from capillary bridges has not yet been translated into a quantitative theory capable of predicting the properties of a specific wet granular material. Part of the problem is that while X-ray tomography studies \cite{Scheel_2008,scheel:09,mani:15,saingier:17} have provided a more detailed picture of the liquid morphologies inside wet packings, it is still unclear how much these additional tensile forces also lead to geometrical rearrangements of the particles by drawing close-by particles together. Such rearrangements can change the mechanical properties of the sample: The stability of a granular sample is conferred by its force chains \cite{Majmudar_2005,Puckett_2013,Brodu_15,Daniels_2017,kollmer:18}, which consist of lines of contacts. Therefore a change of fabric could modify the mechanical behavior independently of the tensile nature of the bridges. In this work we demonstrate that while adding liquid to a sphere packing does introduce tensile forces, it does not significantly change the geometrical arrangement of our sphere packings. And due to their disability to interlock when compared to other particle shapes, spheres can be expected to be most susceptible to such geometrical changes. \section{Experiments} \subsection{Packing preparation} We prepare wet and dry packings of approximately 5000 monodisperse Polyoxymethylene (POM) spheres (diameter $d$ = 3.5 $\pm$ 0.022 mm) in a plexiglass cylinder of 84 mm diameter and 150 mm height. In order to avoid crystallization \cite{Hanifpour_2015} in the dry experiments, the container walls are lined with bubble wrap foil. Wet packings are prepared by distributing Bromodecane between the spheres by continuously rotating and shaking the container. Bromodecane wets POM surfaces well and provides good X-ray contrast to POM. We will show below that all particles in contact have liquid bridges. We note our earlier failed attempts to use glass particles with a solution of CsCl in water, which did not result in a homogeneous distribution of the liquid. Measurements are performed for liquid volume fractions $\eta=\SI{0}{\%}$, $\eta=\SI{2.1}{\%}$ and $\eta=\SI{3.1}{\%}$, where $\eta$ is defined as the total liquid volume divided by the total sample volume \cite{Scheel_2004,Scheel_2008}. In choosing our experimental parameters we need to consider the ratio of gravitational and surface tension forces in our sample, which is measured by the E\"otv\"os number $Eo = \Delta \rho \, g \, d^2 / \sigma$ where $g$ is the gravitational acceleration. Inserting our values for the density difference $\Delta \rho$ = 1.4 g/cm$^3$ and surface tension $\sigma$ = 30 mN/m we obtain $Eo$ = 5.7, i.e. gravitational forces dominate, but surface tension still plays an important roll. The contribution of surface tension to the mechanical stability of the packings becomes evident when comparing the range of accessible global volume fractions $\phi_g$: Wet packings have a volume fractions after preparation in the range 0.575 to 0.591\footnote{It was not feasible to increase $\phi_g$ in wet packings above 0.605 because longer shaking lead to crystallization of the sample and we could not use rough container boundaries as this would have lead to inhomogeneous liquid distributions.}. Continuous vertical shaking (30 to 6000 seconds, 30 Hz, maximal acceleration 8g) increases their $\phi_g$ to only 0.588 - 0.605. In contrast,we could not prepare dry packings at $\phi_g$ below 0.61; vertical tapping (10 to 160000 sinusoidal taps with a maximal acceleration of 2 $g$) increases $\phi_g$ up to 0.64 \cite{knight:95,Ribiere_2005} . These non-overlapping $\phi_g$ ranges of wet and dry packings are a clear testimonial to the influence of liquid bridges on the mechanical properties, even at a E\"otv\"os number larger one. \subsection{Data acquisition} The internal structure of the packings is evaluated using X-ray tomography; wet samples are measured with a CT-Rex (Fraunhofer EZRT, voxel resolution \SI{35}{\micro\meter}), dry samples with a Nanotom (GE Sensing and Inspection, voxel resolution \SI{64}{\micro\meter}). The image size after cropping the boundary is $1300 \times 1300 \times 1000$ voxels in both setups. All wet packings were prepared at least 30 minutes prior to the measurements in order to allow the bromodecane to equilibrate inside the packing \cite{Scheel_2008,scheel:09}. Particle center positions are detected for all particles, but the further analysis is limited to the $N\approx 800$ particles which are at least 20 mm away from the boundaries, using the methods described in \cite{Weis_2017_xray}\footnote{Parameters for image processing: Bilateral filter $\sigma_g = \num{4}$ in units of voxels, $\sigma_p = \num{2700}$ in units of greyvalues and an erosion depth $\lambda=\num{5}$ voxels.}. Voxels representing bromodecane are detected by a second binarisation with another, higher threshold. Figure \ref{fig:tomo_slice} shows cross-sections of the raw and segmented tomographies. Rendered visualizations of the wet packings can be found at \cite{video1,video2}. \subsection{Computing global volume fractions} The global volume fraction inside our analysis area is the harmonic mean \cite{Aste_2006_volumeFluctuations,Weis_2017_xray} of the local volume fractions $\phi_l^i$ of the individual particles $i$ inside that area. $\phi_l^i$ is calculated as the ratio of the volume of particle $i$ and the volume of its Voronoi cell \cite{Voronoi_1909,Rycroft_2009,Weis_2017_pomelo,pomelo_theo1} i.e.~the volume which is closer to this spheres center than to any other sphere center \subsection{Computing contact and bridge numbers} The next step is the determination of the average contact numbers $\langle Z \rangle$ and the average bridge number $\langle B \rangle$, cf.~figure \ref{fig:sketch}. The former describes how many other sphere surfaces a typical particle touches, the latter counts the number of liquid bridges formed by an average particle. $\langle Z \rangle$ is determined using the 'contact number scaling function' (CNS) method \cite{Rintoul_1998,Aste_2005a,Aste_2006, Schaller_2013_tomo,Schaller_2015,Weis_2017_xray}; this method uses the ensemble of all interparticle distances to determine the correct threshold distance up to which two particles are considered to be in contact. $\langle B \rangle$ is measured by detecting all liquid domains which connect the surface of two spheres. As expected for a good wetting fluid, for all particle pairs in contact there is also a bridge present at that contact. We also find that within the central region of the packing less than 1 \% of all liquid domains touch only one particle; and not a single liquid domain involves three touching particles, so called trimers. The latter is expectd to change for higher values of $\eta$. \subsection{Analyzing the shape of the Voronoi cells} Voronoi cell shape analysis is based on a morphometric Minkowski tensor isotropy analysis \cite{Gerd_2011,Gerd_2013}. Specifically, we calculate the volume moment tensors $\mathbf{W_0^{2,0}}(K) := \int_K \mathbf{r} \otimes \mathbf{r} \; \mathbf{dV}$ of each individual Voronoi cell $K$ where the origin is chosen to be the particle center point, $\mathbf{r}$ is the position vector, and $\otimes$ is the symmetric tensor product. The shape of the Voronoi cell is then characterized by the ratio of the smallest to largest eigenvalue $\beta_0^{2,0} = \frac{\epsilon_\textnormal{min}}{\epsilon_\textnormal{max}}$ where $\epsilon_\textnormal{min}$, $\epsilon_\textnormal{max}$ are the smallest and largest eigenvalue, respectively; note that the eigenvalues are positive. When applied to the Voronoi partition, these Minkowski structure metrics have become commonly used structure metrics \cite{Gerd:2010,Kapfer_2012,Schaller_2015_nonuniversal}, complementary to other metrics such as the two-point correlation function. \begin{figure}[t!] \centering \def0.45\textwidth{0.45\textwidth} \input{sketch.pdf_tex} \caption{ Sketch of the two different types of liquid bridges. In all our experiments, we have found not a single particle contact without an associated liquid bridge. } \label{fig:sketch} \end{figure} \begin{figure}[b] \centering \includegraphics{fig_waterbridges.pdf} \caption{Both bridge number $\langle B\rangle$ and contact number $\langle Z\rangle$ increase with increasing volume fraction. Contact numbers are shown as red (dry) and yellow (wet) circles, bridge numbers as blue and turquois squares. Wet measurements correspond to $\eta=\SI{2.1}{\%}$. Open and closed symbols correspond to tapped and untapped system preparation, respectively. } \label{fig:bncnphig} \end{figure} \section{Comparing wet and dry packings} \subsection{Contact and bridge number} Figure \ref{fig:bncnphig} summarizes our results for $\langle Z\rangle$ and $\langle B\rangle$. Our main finding here is that, within experimental noise, the average $\langle Z\rangle$ of both wet and dry packings seem to be consistent with the previously published empirical model for dry spheres \cite{Schaller_2015}. The small but systematic deviations of the dry packing data from the model can be explained by the larger asphericity of the 3D printed particles used in reference \cite{Schaller_2015}. For more details see the supplemental material. It is also noteworthy that the $\langle Z\rangle$ values of wet packings fluctuate more strongly from preparation to preparation than those of dry packings, in contrast to the $\langle B\rangle$ values which display a smoother increase with $\phi_g$. Dry packings are hyperstatic, i.e.~the contact forces provide more constraints than what is needed to fix all the degrees of freedom of the particles \cite{schroeter:17}. In absense of a dominating mechanical constraint, the dependence of $\langle Z\rangle$ on $\phi_g$ originates from geometrical effects such as volume exclusion \cite{song:08,baule:13}. In wet packings, hyperstaticity is even stronger than in dry packings due to the addition of the capillary bridges as another force transmission mechanism. However, the stronger fluctuations of $\langle Z\rangle$ compared to $\langle B\rangle$ indicates that the physics of wet packings might be less determined by volume exclusion (which is strongly connected to $\phi_g$) than by the preparation dependent interplay between tensile and compressive forces. Figure \ref{fig:bncnphig} shows also that in wet packings each particle has on average two liquid bridges that do not correspond to a particle contact: $\langle B\rangle - \langle Z\rangle \approx 2$ (keeping in mind that each contact also corresponds to a liquid bridge). Put differently, the number of force transmission channels for compressive forces (at the contact points) is by two lower than the number of force transmission points for tensile, cohesive forces (all liquid bridges). \begin{figure}[tb!] \centering \includegraphics{fig_packinganisotropy.pdf} \caption{Adding liquid to a packing does not change the shape of the Voronoi cells: the average cell isotropy $\langle\beta_0^{2,0}\rangle$ of dry (red circles) and wet (yellow circles) packings agrees with the previously published data (grey diamonds) for dry sphere packings \cite{Gerd:2010}. Open and closed symbols correspond to Fig.\ \ref{fig:bncnphig}. } \label{fig:packinganisotropy} \end{figure} \subsection{Voronoi cell shape} The Voronoi cell shape analysis shown in figure \ref{fig:packinganisotropy} reinforces the conclusion that wet packings can be thought of as dry packings with additional liquid bridges introduced between particles that are not in contact but very close by. It shows the average isotropy index over all particles $\langle\beta_0^{2,0}\rangle$, calculated for all dry and wet packings. The average packing isotropy $\langle\beta_0^{2,0}\rangle$ allows for no identification of a structural difference between dry and wet packings. Both wet and dry systems coincide with earlier independent results \cite{Gerd:2010}. For the system and length scale studied here, this supports the conclusion that, structurally, the wet packings are 'just dry packings with added liquid bridges', with the presence of the liquid bridges not being accompanied by a significant change in structure of the packing. Another commonly used metric to study the structure of amorphous packings is the pair correlation function. We show in the appendix that there are again no differences between wet and dry packings within the experimental resolution of our data. \begin{figure}[t] \centering \includegraphics{fig_wetcontactdistance_multiplot_a.pdf} \caption{The probability $\zeta$ that a liquid bridge exists between two particles depends only on their distance $r$, not the global volume fraction $\phi_g$ of the packing. Here the distance between spheres is rescaled with the particle diameter $d$: $r'=(r-d)/d$. Typical liquid bridges between particles extend up to 0.15$d$. To improve statistics, we have averaged all tapped and all untapped experiments. The inset provides the proof that this is permissible because $\zeta(r')$ does not depend on $\phi_g$: the slope of the curves, determined from a linear fit to $\zeta(r')$ in the range between 0 and 0.1, is constant for all experiments. } \label{fig:wetcontactdistances_multiplot_a} \end{figure} \section{Probability of a liquid bridge forming between spheres} While both $\langle Z\rangle$ and $\langle B\rangle$ depend on $\phi_g$, the fraction $\zeta(r)$ of particle pairs at distance $r$ that are connected through a liquid bridge (called \textit{bridge probability}) does not. This is shown in figure \ref{fig:wetcontactdistances_multiplot_a} using a rescaled distance $r'$ between particles: $r'=(r-d)/d$. Particles in contact always have a liquid bridge, $\zeta(0)=1$, as expected for a good wetting liquid. Liquid bridges between particle pairs with gap distances $r-d>0.15d$ do not occur within our packings. Between these two limits, $\zeta(r)$ decays monotonously with a slope that is independent of $\phi_g$. This result supports an inversion of our main argument: while the geometry of the packing does change (increasing $\phi_g$ does change the pair correlation function), the probability of formation of liquid bridges seems to be unaltered (which points to liquid properties such as surface tension as the main control parameter). \begin{figure}[t] \centering \includegraphics{fig_wetcontactdistance_multiplot_bc.pdf} \caption{Adding more liquid increases the number of and the average volume inside liquid bridges. But it does not create additional bridges between particles that are further apart. This is shown in panel \textbf{a)}: Typical liquid bridges extend up to 0.15 particle diameters regardless if the liquid content $\eta$ is $\SI{2.1}{\%}$ or $\SI{3.1}{\%}$. \textbf{(b)}: The average volume inside liquid clusters $\langle V_B \rangle (r')$ increases with $\eta$. If no liquid bridges exist in a given distance bin, the corresponding data point is omitted. Data is averaged over 11 ($\eta$ = 2.1 \%) respectively 7 ($\eta$ = 3.1 \%) experiments. } \label{fig:wetcontactdistances_multiplot_b} \end{figure} All data for wet packings shown in figures \ref{fig:bncnphig} to \ref{fig:wetcontactdistances_multiplot_a} are for a liquid volume fraction $\eta=2.1\%$. Figure \ref{fig:wetcontactdistances_multiplot_b} addresses the natural question how the shape and distributions of liquid bridges changes when the liquid volume fraction is increased: the main effect is an increase in the volume (and hence shape) of the liquid bridges, not the creation of additional longer liquid bridges. Figure \ref{fig:wetcontactdistances_multiplot_b} (a) shows that while the bridge probability $\zeta(r)$ does increase slightly for $\eta$ = 3.1 \%, there is no emergence of longer bridges: $\zeta(r)$ still drops to zero for $r-d\approx 0.016 d$. The main effect of increasing $\eta$ is a proportional increase in size of the liquid bridges: within statistical accuracy the ratio of the average bridge volumes $\langle V_B\rangle$ at $\eta=2.1\%$ and $\eta=3.1\%$ corresponds to the ratio of added bromodecane for all values of $r'$. It is a worthwhile future question beyond the scope of this article to investigate in more detail the shape and volume of the liquid bridges (considering the resolution of our CT data, details of the shape can be probed; a volume of $200 nL$ corresponds to approximately 4000 voxels). \section{Conclusion} We have found that the structure of the wet packings to be very similar to that of a dry packing at the same packing fraction. This is a surprising result considering that the presence of the wetting liquid has a clear influence on the mechanical properties. Our conclusions depend almost certainly on the sphere diameter because the relative importance of surface tension forces compared to gravitational forces increase when $d$ decreases. Our results are for beads of diameter 3.5 mm where liquid bridges are relevant for the mechanical properties, despite not affecting the structure of the bead pack. Future research should explore the limit of smaller particles, where the presence of a wetting liquid can stabilize packings at substantially lower packing fractions than what can be reached in dry packings. A second important avenue for future research will be non-spherical particles which introduce not only new liquid bridge geometries but also interesting new geometrical features in dry packings. \section*{Acknowledgements} We are grateful to Martin Brinkmann (Saarbr\"ucken) for advice and discussion, and Klaus Mecke and Thorsten P\"oschel (both Erlangen) and Stephan Herminghaus (G\"ottingen) for support. We acknowledge funding by the German Science Foundation (DFG) under grant SCHR-1148/3-2 within the research group 'Geometry and Physics of Spatial Random Systems' an through the Cluster of Excellence 'Engineering of Advanced Materials'. GEST acknowledges support through a collaboration scheme of Universities Australia and the German Academic Exchange Service (DAAD).
\section{Introduction} Transverse field Ising model (TFIM) is a prototype to study quantum phase transitions~\cite{sachdev2007quantum,Dutta}. It describes a variety of quantum magnets ranging from \(\text{LiHoF}_4\)\cite{Ronnow389} to \( \text{CoNb}_2\text{O}_6 \) \cite{Coldea2010},\cite{Imai}. It is also a theoretical model to understand adiabatic quantum annealing \cite{RevModPhys.80.1061,Cirac2012,1606.07740}, where the gap closing is important. Given Ref.~\onlinecite{1063-7869-44-10S-S29} , TFIM can also be a play ground for topological quantum computation, where Majorana zero modes are supported at the boundaries of 1D chains. In the pure system, the TFIM is well understood.~\cite{Pfeuty:1970} However, disorder is an inevitable reality. It can come from numerous sources. Instead of universal power law near pure system quantum critical point, thermodynamic properties will be highly singular in disordered systems, including log-normal distribution of gaps,~\cite{PhysRevLett.107.196804} activated scaling, exponentially slow dynamics, and so on.~\cite{fisherPRL1992,fisherPRB1995,riegerPRB1996,youngPRB1996,guoPRL1994} These can be understood as rare region effects. There has been work on disorder effects on Majorana modes \cite{PhysRevLett.109.146403,PhysRevB.93.075129,PhysRevB.97.125408} , and the low energy distribution, but little is known about the spatial distribution of the Majorana modes, and their relation with Griffiths-like rare regions. In this paper, we will clarify the relation of rare regions, exponentially slow dynamical excitations, and the exponential degeneracy of Majorana zero modes. The outline of this paper is as follows: in section \ref{section:methods}, the problem is stated quite generally, including the three spin interactions studied recently, and the method of calculating spin-spin correlation function, and the dynamical structure factor. In section \ref{section:2-spin_binary}, the condition for the emergent low energy states is given for the TFIM for the binary transverse field disorder that gives rise to the interesting effects discussed in the present paper. We do not consider other forms of disorder such as the box or the Gaussian distribution.The binary distribution consists of a large field \(h_L\) and a small field \(h_S\), with probability \(P_L+P_S=1\) such that \begin{eqnarray} h_i=\begin{cases} h_L \qquad \text{Probablity} =P_L := P\\ h_S \qquad \text{Probablity} =P_S \end{cases} \end{eqnarray} In section \ref{section:2-Griffith}, we will argue that these low energy modes are Majorana zero modes (MZM) at the boundaries of Griffiths-like rare regions by correlating the spin-spin correlation function and the lowest energy Majorana eigenvectors. The size distribution of MZM is also calculated at the critical point; the most probable size is $1/5$ of the system length; we also notice a self similar distribution. In the Section~\ref{lrange}, disordered longer ranged interaction is explored.~\cite{PhysRevB.85.035110} (see also Ref.~\onlinecite{DeGottardi}) The rare region induced Majorana zero mode picture is similar to the TFIM.This is a model that exhibits a very rich phase diagram. Given frustration from the longer ranged interaction, we also note a spin-glass phase transitions in this case. \section{the Hamiltonian} \label{section:methods} The transverse field Ising chain with longer range interaction with disorder~\cite{PhysRevB.85.035110} is \begin{eqnarray} H=-\sum_{i=1}^{L} h_i \sigma^z_i -\sum_{i=1}^{L-1} \lambda_{1i} \sigma^x_i \sigma^x_{i+1} -\sum_{i=1}^{L-2} \lambda_{2i} \sigma^x_i\sigma^z_{i+1} \sigma^x_{i+2} \qquad \label{eq:3spinHamiltonian} \end{eqnarray} where \(i\) is the site index and \(L\) is the size of the 1D system with open boundary condition. Here \(h_i\) is quenched transverse field, \(\lambda_{1i}\) are two-spin couplings and \(\lambda_{2i}\) are three-spin couplings, they can be of constant value, or assume random variables satisfying certain distributions. The spin-spin correlation function, is calculated using the ground state average \( \langle \cdots \rangle \) and the disorder ensemble average is denoted by an overbar \begin{eqnarray} C(r,t):= \overline{\langle \sigma^x_i(t)\sigma^x_j(0) \rangle} \label{eq:correlator} \end{eqnarray} Since our disorder averaged system is translationally invariant, we use $r$ as the distance between two sites. The dynamical structure factor \(S(k,\omega)\) is the time and spatial Fourier transformation of the spin-spin correlation function: \begin{eqnarray} S(k,\omega)=\int dt \int dr \ e^{i\omega t} e^{-ikr} C(r,t) \label{eq:Fourier} \end{eqnarray} \subsection{Jordan Wigner transformation} From Jordan-Wigner transformation~\cite{Pfeuty:1970} the system can be expressed in terms of single-particle fermion operators to solve the eigenvalues and eigenvectors for a given lattice with a given disorder configuration \begin{widetext} \begin{eqnarray} H=\sum_{i=1}^{L}h_i (c^\dagger_i-c_i)(c^\dagger_i+c_i)-\sum_{i=1}^{L-1}\lambda_{1i} (c^\dagger_i-c_i)(c^\dagger_{i+1}+c_{i+1}) -\sum_{i=1}^{L-2}\lambda_{2i} (c^\dagger_i-c_i)(c^\dagger_{i+2}+c_{i+2}) \qquad \label{eq:fermionHamiltonian} \end{eqnarray} \end{widetext} The spin-spin correlation function in terms of fermion operators is given by \begin{equation} \langle\sigma^x_i(t) \sigma_j^x(0)\rangle=\langle (c^\dagger_1(t) +c_1(t)) \cdots (c^\dagger_j(0) +c_j(0) \rangle. \end{equation} Using Wick's theorem (see, for example, Ref.~\onlinecite{sachdev2007quantum}), the right hand side can be expressed as a Pfaffian of a \(2i+2j-2\) dimensional matrix. Each element in the matrix is a free two-fermion correlator. \subsection{Pure system} Figure \ref{fig:phasediagram} is the phase diagram of the pure 3-spin model.~ \cite{PhysRevB.85.035110} The transverse field \(h\) is set to unity. The horizontal line at \( \lambda_2=0\) corresponds to the transverse field, with critical point at \(e\). In this phase diagram, the \(n=1\) regions correspond to the magnetically ordered regions. \begin{figure} \includegraphics[width=0.8\linewidth]{phasediagram.pdf}% \caption{\label{fig:phasediagram} Pure system phase diagram of 3-spin model $H$. The transverse field is taken to be unity. The labels \(n=0,1,2\) are the topological numbers, denoting pairs of Majorana modes at open boundaries.~\cite{PhysRevB.85.035110} } \end{figure} To explore the dynamics in the phase diagram, we plot a few examples of \( S(k,\omega) \): Fig.~\ref{fig:Swk101} \( (h=1,\lambda_1=0.5,\lambda_2=0) \) ; Fig.~\ref{fig:Swk103} \( (h=1,\lambda_1=1,\lambda_2=-0.5) \); Fig.~\ref{fig:Swk102} \( (h=1,\lambda_1=1,\lambda_2=1) \) Note that Fig. \ref{fig:Swk102} is in the magnetically ordered region \(n=1\); \(m^2\) has been subtracted from the spin-spin correlation function, and the excitation is two-particle continuum. \begin{figure}{htb} \includegraphics[width=\linewidth]{Swk101.png}% \caption{ the dynamical structure factor 120 sites, paramagnetic phase: \( h=1 \quad \lambda_1=0.5 \quad \lambda_2=0 \) } \label{fig:Swk101} \end{figure} \begin{figure}{htb} \includegraphics[width=\linewidth]{Swk103.png}% \caption{ Dynamical structure factor of pure system \(h = \lambda_1 = 1 \quad \lambda_2 = -0.5\), 120 sites the dispersion curve has a dip at non-zero \(k\) value, that gap can also be closed at non-zero \(k\) by tuning parameters} \label{fig:Swk103} \end{figure} \begin{figure}{htb} \includegraphics[width=\linewidth]{Swk102.png}% \caption{ Dynamical structure factor of pure system \(h = \lambda_1=\lambda_2 = 1 \), 120 sites this is in the two particles continuum region, single spinon excitation is forbidden in this n = 1 phase \label{fig:Swk102} } \end{figure} \section{Emergent low energy modes in disorder chain } \label{section:2-spin_binary} In this section, let's only consider the 2-spin Hamiltonian \(H_{2}=-\sum_{i=1}^L h_i \sigma^z_i -\sum_{i=1}^{L-1} \sigma^x_i \sigma^x_{i+1} \) with \( \lambda_1=1 \quad {\rm and}\; \lambda_2=0 \), the random transverse field has the binary distribution: the larger field \(h_L\) and the smaller field \(h_S\), with probability \(P_L+P_S=1\) As $P$ is changed from $0$ to $1$, we will show that, for \( 0<h_S<1<h_L \) there is a phase transition as we change $P$, and there will be low energy emergent modes. Consider, for eample, $h_L=3.0, P_L=0.6, \text{and}\; h_S=0.2, P_{S} = 0.4$ For these parameters we get the spectra shown in Fig. \ref{fig:Swk}. The spectral density has a very strong peak near the zero energy \(\omega=0 \), and near \(k=0\). At higher energies, the spectra breaks up into horizontal stripes. The central question of this paper is to understand what is the origin of the low energy signal. \begin{figure}[htb] \includegraphics[width=\linewidth]{Swk.png}% \caption{\label{fig:Swk} \(S(k,\omega)\) of a 2-spin model: the quenched disorder transverse field \(h_i\) satisfies binary distribution with \(P(h_i=3.0)=0.6 \) and \( P(h_i=0.2)=0.4 \) (120 sites).} \end{figure} To answer the question, let's fix \(h_S\) and \(h_L\), and take \(P\) as a tuning parameter. Then it can be converted into another question: how do the zero energy modes emerge as a function of \(P\)? We plotted the density of states in Fig.~\ref{fig:dos}. There are 11 graphs for different \(P\) values. The \(P_L=0.6\) corresponds to Fig.~(\ref{fig:Swk}). Notice that the density of state \(\rho(\omega) \) and the integrated \( \int S(k,\omega) dk \) are related. In Fig.~\ref{fig:dos}, the two extreme cases \(P=0 \) and \(P=1\) are gapped, with no zero energy modes. For intermediate values, we can see the zero energy modes. \begin{figure}[htb] \includegraphics[width=1.1\linewidth]{1.png}% \caption{\label{fig:dos} 11 density of state plots for system with binary transverse field disorder. All of the graphs have the same large field \(h_L=3.0\) and small field \(h_S=0.2\), the difference is the binary disorder. The two extreme density of states plots, on the top \(P=0\%\) and in the bottom \(P=100\%\), correspond to the pure system in ferromagnetic and paramagnetic phases. From top to bottom, the probability of large field is increasing, the probability of small field is decreasing } \end{figure} In Fig.~\ref{fig:logDOS}, we plot the density of states near the zero energy, on a log-scale. It capture the details about how the gap is closed. \begin{figure}[htb] \includegraphics[width=1.0\linewidth]{logDOS.png}% \caption{\label{fig:logDOS} The density of state plot near zero energy of Fig.~\ref{fig:dos}. The horizontal axis is in \( \log_{10}\) scale. This detailed study shows that, although the gap looks closed for all disorder in Fig.~\ref{fig:dos}, there is a optimal percentage, where the closing is the best } \end{figure} From Fig.~\ref{fig:dos}, we can also find that the excitations are grouped into three regions. \begin{enumerate} \item \( h_L-1 <\omega < h_L+1 \) corresponds to the excitations in the paramagnetic region. \item \( 1-h_S <\omega < 1-h_S \) corresponds to the ferromagnetic phase. The two-particle continuum excitations is not obvious in \(S(k,\omega)\) graph. \item \( \omega < \omega_0 \) corresponds to the emergent low energy modes. \end{enumerate} The energy is always bounded by these groups, no matter what the disorder is. The emergent low energy modes do not always exist. By tunung \(h_L, h_S\), we find: \begin{itemize} \item it exists when the large and the small fields straddle the critical point \( 0< h_S < 1 <h_L \). For the cases of \( 1<h_S <h_L \) or \( 0< h_S <h_L<1 \) , no low energy mode emerges, no matter what \(P\) is. \item in the proper case \( 0< h_S < 1 <h_L \), there is a value of \(P\) which generates maximum numbers of low energy modes, and the gap is minimized. We will show that such a point is given by \( \overline{\ln h_i} =\overline{\ln J_i} \) \cite{PhysRevB.53.8486} \end{itemize} \subsection{the critical point} In the two extreme cases in Fig.~\ref{fig:dos}, i.e. with no disorder, \(P=0.\) represents the ferromagnetic phase, and \( P=1\) represents the paramagnetic phase. At an intermediate value of \(P_L\)\, the system must have a quantum phase transition. The critical value of \(P_C\) is given by: \begin{eqnarray} \overline{\ln h_i}=\overline{\ln J_i } \nonumber \\ h_L^{P_C} h_S^{1-P_C}=1 \nonumber \\ P_C=\frac{\ln h_S}{\ln h_S - \ln h_L} \label{eq:Pc} \end{eqnarray} In Fig.~\ref{fig:magne} the magnetization is plotted, for \( h_S=0.2 \quad \textrm{and} \; h_L=3.0 \). The vertical line is the critical value \(P_C=\frac{\ln 0.2}{\ln 0.2 -\ln 3.0}\approx 0.5943 \). The magnetization is calculated by \( m= \sqrt{ \overline{\langle \sigma^x_{+\infty}(0)\sigma^x_0(0) \rangle} } \), with 129 random configurations for the ensemble average. Due to the randomness, the magnetization takes large computational resources in the averaging procedure. \begin{figure}[htb] \includegraphics[width=1\linewidth]{magne.png}% \caption{\label{fig:magne} The magnetization as a function of binary distribution parameter \(P\) , the random transverse field \(h_i = P\delta(h-h_L) +(1-P)\delta(h-h_S)\) , \(h_L=3.0 \ h_S=0.2 \) we can see the critical behavior predicted by \(P_C=\frac{\ln h_S}{\ln h_S - \ln h_L}=0.59 \)} \end{figure} The Fig.~\ref{fig:Egap} is the energy gap plotted against \(P\). In our calculation, we choose periodic boundary condition for the fermions. We also choose logarithmic scale for the energy. Without the log-scale, they all look close to zero; see Fig.~\ref{fig:dos}. \begin{figure}[htb] \includegraphics[width=1\linewidth]{Egap.png}% \caption{\label{fig:Egap} The log of energy gap as a function of binary distribution parameter \(P\) , the random transverse field \(h_i= P\delta(h-h_L) +(1-P)\delta(h-h_S)\) . At \(h_L=3.0 \ h_S=0.2 \) we can see the critical behavior predicted by \(P_C=\frac{\ln h_S}{\ln h_S - \ln h_L}=0.59 \). Notice that the ensemble average is the typical average, it is the \(\text{mean}\{\epsilon_{gap_i}\}\), not the \(\text{min}\{\epsilon_{gap_i}\}\)} \end{figure} The Figs.~\ref{fig:dos}, ~\ref{fig:magne}, and ~ \ref{fig:Egap} have already shown that, the critical point exists, and it is predicted by Eq.~ (\ref{eq:Pc}). The Figs. \ref{fig:Esize} and ~ \ref{fig:Esize1} demonstrate the activated scaling at the quantum critical point; the energy gap is proportional to \( e^{-\alpha \sqrt{L}} \) \begin{figure}[htb] \includegraphics[width=1\linewidth]{scaling0.png}% \caption{\label{fig:Esize} The gap distributions for different system sizes. horizontal axis is the log of the energy gap \(\log(\Delta E)\); the vertical axis is the distribution count. The system sizes from right to left are \(L=32,48,64,80,96,112, 128,114\); the random average consisted of 10000 random samples} \end{figure} \begin{figure}[htb] \includegraphics[width=1\linewidth]{scaling1.png}% \caption{\label{fig:Esize1} The collapse of the data in Fig.~\ref{fig:Esize}. The horizontal axis is rescaled by the square root of the system size. This collapse only happens at the critical point \(P_C=0.59\)} \end{figure} \section{Griffiths-like phase and the Majorana zero modes} \label{section:2-Griffith} In the last section we have shown that there is a phase transition as a function of $P$, and the low energy modes emerge close to the critical point. In this section, we will explore the nature of the low energy modes. \subsection{Disorder induced rare regions} We know that in a pure system, Majorana modes exist at the boundaries of a topologically non-trivial phase. In a disordered system, which is not uniform, it is possible that a spatial region is in the non-trivial phase, while the surrounding region is still in the trivial phase. Thus the low energy Majorana zero modes are created by rare regions of magnetization, the ``Griffiths phase''. To understand, let's plot the equal time spin-spin correlation function for a specific random configuration: \begin{eqnarray} <\sigma^x_n \sigma^x_m> \end{eqnarray} \(n\) and \(m\) run from \(1\) to \(L\); so this plot contains the correlation of each pair at equal times. Here are some important properties: (1) the diagonal term is always unity, \(<\sigma^x_n \sigma^x_n>=1\); (2) it is symmetric under \( m \leftrightarrow n \); (3) it is real because, \(<\sigma^x_n \sigma^x_n>^*=<\sigma^x_n \sigma^x_n> \) From Fig.~\ref{fig:MZMrareRegions}, one can see the rare regions clearly by watching which site is correlated with which site. \begin{figure}[htb] \includegraphics[width=1\linewidth]{MZMrareRegions.png}% \caption{\label{fig:MZMrareRegions} equal time spin-spin correlation \( <\sigma^x_n \sigma^x_m> \) , the horizontal axis is \(m\) the vertical axis is \(n\), the color is the strength of \(<\sigma^x_n \sigma^x_m> \) } \end{figure} It is a spin-spin correlator plot: \(h_L=3.0\) with \(60 \%\) probability and \(h_S=0.2\) with 40\% probability. We can see the cluster of rare regions A,B,C,D,E. The largest region A spans about 30 sites from 125 to 160, it is where the small field \(h_S=0.2\) are gathered. Since the field is weak there, the spins tend to be coupled by interaction, and correlated to form magnetic order. Although, at certain sites, the cluster may contain large field, the cluster is not broken by it. At a coarse grained level, it is single giant spin. The quadratic fermion Hamiltonian in Eq.~\ref{eq:fermionHamiltonian}, can also be rewritten in the of Majorana representation: $a_i =c^\dagger_{i}+ c_i$ and $b_i = i(c^\dagger_{i}- c_i )$. The Hamiltonian is then \begin{eqnarray} H=i \sum_{i=1}^{L}h_i b_i a_i+i\sum_{i=1}^{L-1}\lambda_{1i} b_i a_{i+1} +i\sum_{i=1}^{L-2}\lambda_{2i} b_i a_{i+2} \qquad \label{eq:majoranaHamiltonian} \end{eqnarray} The Equation \ref{eq:majoranaHamiltonian} can be solved with singular value decomposition, into decoupled Majorana pairs: \begin{eqnarray} H=i \sum_{n=1}^L \epsilon_n \tilde{a}_n \tilde{b}_n \end{eqnarray} The Fig.~\ref{fig:MZMs} shows the five lowest eigenvectors of \( \tilde{a}_n=\sum_i\psi_{ni} a_i \) and \( \tilde{b}_n=\sum_i\phi_{ni} b_i \), the vertical axis labels the eigenenergy \( \epsilon_n=\Lambda_{nn} \). These Majorana pairs are the eigenstates representing the many-body excitations. From top to bottom, those Majorana pairs in Fig.~\ref{fig:MZMs} correspond to the rare regions A,B,C,D,E in Fig.~\ref{fig:MZMrareRegions} \begin{itemize} \item Majorana pairs reside at the boundary of magnetic rare regions. \item if the magnetic rare region's boundary is not sharp, the Majorana mode will span a large distance \item when the Majorana pairs get closer, their energy increase \end{itemize} \begin{figure}[H] \includegraphics[width=1\linewidth]{MZMs.png}% \caption{\label{fig:MZMs} Five lowest eigenvectors, titles are the energy \(\epsilon_n \), index \(n\) is in ascending order of eigen-energy. The horizontal axis is the lattice site, the vertical axis is the value of \( \psi_{ni} \) and \(\phi_{ni}\). The orange and blue curves correspond to decoupled Majorana pairs, the real part \( \tilde{a}_n=\sum_i\psi_{ni} a_i \) and the imaginary part \( \tilde{b}_n=\sum_i\phi_{ni} b_i \). A,B,C,D,E correspond to the rare regions in Fig.~\ref{fig:MZMrareRegions} } \end{figure} \subsection{The separation between the Majorana zero mode pairs} The separation of a Majorana pair is defined by: \begin{eqnarray} s_n=|\frac{\sum_i i |\psi_{in}|^2}{\sum_i |\psi_{in}|^2} -\frac{\sum_i i |\phi_{in}|^2}{\sum_i |\phi_{in}|^2} | \label{eq:MZMsize} \end{eqnarray} the \(n\) labels the different eigenmodes; \(i\) is the lattice site. The above definition works for any Majorana eigenvectors (not necessarily the zero mode) . But we are interested in the behavior of the low energy modes, because for high energy modes, \(\psi_{in}\) and \(\phi_{in}\) will significantly overlap, and \(s_n\) will be trivially small. We define \(n=1\) to be the lowest energy mode (eigenvalues are in ascending order). Then \(s_n\) will be the largest separation distance. We plot the distribution of relative sizes, \(s_n/L\), for a random ensemble, at the critical point. \begin{figure}[H] \includegraphics[width=\linewidth]{scalingSize1.png}% \caption{\label{fig:size1} The distribution of the sizes of Majorana pairs at the critical point \(P=P_C=60\% \)} \end{figure} We can see from the Fig.~\ref{fig:size1} that at the critical point the separation distance of Majorana pairs scales linearly with the system size; all system sizes collapse. This is fractal behavior, the distribution of rare region size, looks the same at all length scale. And the size distribution is very broad. large sizes have high probabilities. In contrast, in Fig.~\ref{fig:size2} the size distribution is plotted in the off-critical case. The distribution is very narrow, most of them is less than \(0.3\) of the system size. These don't collapse on the same distribution curve, as the system size increases; the distribution shifts to the left, which means that the relative size of rare regions are getting smaller and smaller. This does not mean that the rare regions will vanish in the thermodynamic limit \(L\rightarrow \infty \). The the size of the rare regions may still grow as \(s_1 \sim L^\theta \), but with \(\theta<1\). And the macroscopic number of zero modes will contribute to the non-universal power law behavior of the thermodynamics properties. \begin{figure}[htb] \includegraphics[width=\linewidth]{scalingSize2.png}% \caption{\label{fig:size2} the distribution of the size of Majorana pair seperation at the off the critical point \(P=40\% \)} \end{figure} Now, the low energy mode in the previous chapter can be explained by the emergent Majorana modes. The Eq.~\ref{eq:MZMsize} is much easier to calculate than the spin-spin correlation function, and the rare region information can be derived from the Majorana picture. \section{Disorder with longer range interaction}\label{lrange} \subsection{induced Majorana modes} Let \(\lambda_1\) be non-zero. The results are given in Fig.~\ref{fig:3spinsB} and Fig.~\ref{fig:AAAAA}; the rare region diagram is shown in Fig.~\ref{fig:AAAAB}. Due to the competition between \(\lambda_1\) and \(\lambda_2\), the Majorana zero mode oscillation pattern shifts to a new \(k\) value, between \(0\) and \( \pi \). In Fig.~\ref{fig:3spinsB}, we can see the zero energy modes exist below the minimum of the dispersion curve. This is a very general phenomenon, the zero mode in the disordeed system is usually located where the pure system has the smallest gap. The calculation is carried with the following Hamiltonian. \begin{eqnarray} H=-\sum_{i=1}^L h_i \sigma^z_i -0.4 \sum_{i=1}^{L-1} \sigma^x_i \sigma^x_{i+1} +\sum_{i=1}^{L-2} \sigma^x_i \sigma^z_{i+1} \sigma^x_{i+2} \nonumber \\ h_i=\begin{cases} h_L=1.6 \qquad \text{probability}=95\% \\ h_S=0.1 \qquad \text{probability}=5\% \end{cases} \label{eq:3spinsB} \end{eqnarray} Note that, the rare region $C$ is inside another rare region $A$ in Fig.~\ref{fig:AAAAA}. \begin{figure}[htb] \includegraphics[width=1\linewidth]{3spinsB.png}% \caption{\label{fig:3spinsB} \(S(k,\omega)\) for the binary distribution of the transverse field: \(P(h_L=1.6)=95\% \) \(p(h_S=0.1)=5\%\); here \(\lambda_1=0.4\) \(\lambda_2=-1.0 \)} \end{figure} \begin{figure}[htb] \includegraphics[width=1\linewidth]{AAAAA.png}% \caption{\label{fig:AAAAA} Five lowest eigenvectors, titles are the energy \(\epsilon_n \); index \(n\) is in the ascending order of eigenenergy The horizontal axis is the lattice sites; the vertical axis is the value of \( \psi_{ni} \) and \(\phi_{ni}\). The orange and blue curves correspond to decoupled Majorana pairs: the real part \( \tilde{a}_n=\sum_i\psi_{ni} a_i \) and imaginary part \( \tilde{b}_n=\sum_i\phi_{ni} b_i \). A,B,C,D,E correspond to the rare regions in Fig.~\ref{fig:AAAAB} } \end{figure} \begin{figure}[htb] \includegraphics[width=1\linewidth]{AAAAB.png}% \caption{\label{fig:AAAAB} equal time spin-spin correlation \( <\sigma^x_n \sigma^x_m> \) , the horizontal axis is \(m\) the vertical axis is \(n\), the color is the strength of \(<\sigma^x_n \sigma^x_m> \) } \end{figure} \subsection{Spin glass phase} In the three spin problem consider setting the transverse field and the next nearest coupling to be \[ h=1 \qquad \lambda_2 =-0.3 \] The nearest couplings \(\lambda_{1i}\) are chosen to be random variables, satisfying the uniform distribution. $[\lambda_1-\delta J, \lambda_1+ \delta J]$. With \(\lambda_2\) providing frustration and \(\lambda_{1i}\) providing disorder, we expect to see a spin-glass phase transition as a function of \(\delta J\) The spin glass [SG] order is defined by \[ \chi_{SG}=\big[\sum_{i,j=1}^L \langle \sigma^x_i \sigma^x_j \rangle ^2\big] \] there are \(L^2\) terms in the summation, the square parenthesis corresponds to disorder average. \begin{itemize} \item When all sites are correlated, deep in the SG phase, \[\chi_{SG} \sim L^2 \] \item In the other extreme case, non-SG phase, \(i\) and \(j\) are correlated only within some distance \(\xi\) \[\chi_{SG}\sim \xi L \] \end{itemize} In the Fig.~\ref{fig:L2}, we plot \(\chi_{SG}/L^2\) \begin{figure}[htb] \centering \includegraphics[width=0.5\textwidth]{L2} \caption{ \label{fig:L2} spin glass order for different system sizes. There is a phase transition near the disorder strength \(\delta J_c \approx 4\)} \end{figure} \begin{figure}[htb] \centering \includegraphics[width=0.5\textwidth]{zoom} \label{fig:zoom} \caption{Zoom of the plot of the spin glass order Fig.~\ref{fig:L2}, the critical point is near \(\delta J_c\approx 4\)} \end{figure} \section{conclusion} In this paper, we have explored quenched binary disorder in TFIM, and a model recently extended to include to contain a three spin term. In the structure factor we find strong zero energy modes whenever binary disorder straddles two distinct phases defined by winding numbers, analog of Griffiths-like rare region. A previous attempt in TFIM to explain~\cite{PhysRevB.74.172414} this phenomenon was not satisfactory. We show here from far more extensive calculations that it can be explained by MZM modes induced by rare regions. The results also hold for the three-spin extended model. The distribution of separation distance of the lowest energy Majorana mode pairs was defined. This quantity is very easy to calculate. We have shown that it has a fractal behavior at the critical point. The most probable size of Majorana modes is about 1/5th of the system size. With the three spin interaction, the phase diagram becomes quite complex,~\cite{PhysRevB.85.035110} as was discussed previously. lt is interesting that even in this case the rare region induced MZM picture still holds, implying that our interpretation in terms of Griffiths-like rare region must have some validity -- note that topological orders are not defined by local order parameters. In the three spin model a spin-glass phase transition is observed as a result of both frustration and disorder. Whether or not our work could be experimentally accessible remains problem for the future. \begin{acknowledgments} The authors would like to thank the condensed matter theory group for their patience through the various versions of this work. This work was supported in part by funds from the David S Saxon Presidential term Chair. \end{acknowledgments}
\section{Introduction} The application of deep neural networks in reinforcement learning (RL) has shown success in a variety of domains. For example, Deep Q-Networks~\cite{Mnih2015} achieved human-level performance in Atari 2600 games. Other recent approaches, including trust region policy optimization~\cite{Schulman2015}, asynchronous advantage actor-critic~\cite{Mnih2016}, and proximal policy optimization~\cite{Schulman2017}, have shown success in domains such as 3D mazes and simulated robotic motion. However, the sample inefficiency of these algorithms limits the application of current deep RL solutions to many real-world problems where access to sample operations may be limited or expensive. A simulation environment generates sample observations quickly and cheaply, providing an RL agent with enough data to learn a high-performing policy. We aim to apply reinforcement learning to a dynamic sensor-network configuration problem. While, we attempt maintain generality throughout our experiments, our specific motivation is to use cameras to capture high-resolution views of vehicles in a scene. Directly simulating this environment would involve a variety of difficult technical challenges and would likely be computationally expensive and unrealistic when compared to a real-world scenario. Instead, we focus on modeling an abstract scenario, where objects and sensors are represented as bounding boxes. A deep RL agent can learn to maximize the percentage of objects captured at high-resolution within a scene by training in this simulation environment. After learning an effective policy, the agent can operate within a real-world environment where preexisting object detection and tracking algorithms are applied to emulate the simulation environment from training. \section{Related work} Several methods have been proposed in the literature for reconfiguration of dynamic visual sensor networks of static and Pan-Tilt-Zoom (PTZ) cameras. These methods can be grouped into resource-aware methods, target-based methods, and coverage-oriented methods~\cite{piciarelli2016dynamic}. Resource-aware methods seeks to find the optimal trade-off between available resources in the sensor network and task performance requirements. The sensing parameters are reconfigured to minimize usage of resources such as power in energy-aware surveillance systems~\cite{khan2012reinforcement} and communication bandwidth in distributed camera networks~\cite{karuppiah2010automatic}. Resource-aware methods are often found in settings where the visual sensors are static. In target-based method the focus is on the optimization of the camera parameters to put a target of interest in view. Common applications include online adjustments of the orientation and zoom parameters of a PTZ camera for single target tracking~\cite{del2010exploiting}, and camera assignment or hand-off for optimal view in static camera networks. The group of methods related to ours are coverage-oriented methods in which the goal is to maintain optimal scene coverage with a network of PTZ cameras~\cite{kansal2007reconfiguration, konda2013optimal, piciarelli2011automatic}. In these methods, the parameters of the PTZ cameras are adjusted to maximize the view of relevant areas in the scene while also adapting to the scene dynamics. Existing methods for optimal coverage with visual sensor networks make use of hand-crafted mathematical models and shallow neural networks which do not generalize well. In this work we introduce a general framework for reconfiguring visual sensor networks to optimize coverage by leveraging advances in model-free RL and deep representation learning. \section{Background} This section contains relevant background information on the asynchronous advantage actor-critic (A3C) algorithm~\cite{Mnih2016} and the relational network (RN) module~\cite{Relational} which are the foundations of our solution. A3C is used as the reinforcement learning algorithm and training framework for our agent, while RN is used as part of the deep neural network architecture to enable the effective application of A3C to our specific problem. \subsection{Asynchronous advantage actor-critic} Consider the standard reinforcement learning scenario in which an agent interacts with an environment $\mathcal{E}$. At any given time step $t$, the agent receives a state $s_t$ and takes an action $a_t$ chosen from the set of possible actions $\mathcal{A}$ according to its policy $\pi$, which maps states $s_t$ to an action (or distribution of actions) $a_t$. The goal of the agent is to maximize the discounted return at any given state $s_t$, defined by $R_t = \sum_{k=0}^{\infty} \gamma^k r_{t+k}$, where $\gamma \in (0,1]$ is the reward discount factor. The value of any particular state $s$ following a policy $\pi$ is defined by $V^\pi(s) = \mathbb{E}[R_t|s_t = s]$. Similarly, the action value at any particular state is defined by $Q^\pi(s,a) = \mathbb{E}[R_t|s_t=s, a]$. These two quantities are used to define the advantage of an action $a_t$ in state $s_t$ given by $A(a_t,s_t) = Q(a_t, s_t) - V(s_t)$. The advantage function represents the expected increase in future reward if a given action is taken rather than following the current policy. A3C is an example of a model-free policy-based method which trains an agent to maximize $R_t$ by updating the parameters $\theta$ of the policy $\pi(a|s;\theta)$. Methods stemming from the REINFORCE algorithm~\cite{Willia1992} update the parameters $\theta$ by performing approximate gradient ascent on $\mathbb{E}[R_t]$. The standard REINFORCE algorithm updates $\theta$ in the approximate direction of $\nabla_\theta \mathbb{E}[R_t]$ using the unbiased estimate $\nabla_\theta \log \pi(a_t|s_t;\theta)\mathbb{E}[R_t]$. Often, a function of the state known as the baseline $b_t(s_t)$ is subtracted from $R_t$ to reduce the variance of the estimate, while remaining unbiased. If $b_t(s_t)$ is learned estimate of $V^\pi(s_t)$, then $R_t - b_t$ can be seen as an estimate of the advantage $A(a_t, s_t)$, because $R_t$ estimates $Q^\pi(a_t, s_t)$ and $b_t$ estimates $V^\pi(s_t)$. A3C uses an estimate of the advantage to scale the policy gradient, $$A(s_t,a_t,\theta,\theta_v) = \sum_{i=0}^{k-1}\gamma^i r_{t+i} + \gamma^k V(s_{t+k}; \theta_v) - V(s_t;\theta_v).$$ Here, $V(s_t;\theta_v)$ is a learned estimate of the value function and $k$ varies across states, but is bounded above by $t_{max}$, the number of time steps performed before updating the policy parameters. To encourage exploration, an entropy regularization loss term, $H(\pi(s_t; \theta))$ is added to the objective function. Here, $H$ computes the entropy of a distribution. This adds an additional hyperparameter, $\beta$, which is used to scale the entropy regularization loss term. The resulting objective function for the policy is $\log \pi(a_t|s_t; \theta)A(s_t, a_t, \theta, \theta_v) + \beta H(\pi(s_t; \theta))$. To train the policy function $\pi$, we apply gradient ascent to this objective function with respect to the policy function parameters $\theta$. The estimated value function $V$ is trained via standard supervised learning to approximate the same bootstrapped estimate of $R_t$ that was used to compute the advantage function given by $\sum_{i=0}^{k-1}\gamma^i r_{t+i} + \gamma^k V(s_{t+k}; \theta_v)$. The system is designed to be trained on multiple CPU cores by running parallel simulation environments for a fixed amount of time steps, $t_{max}$, before accumulating gradients and updating a global network. See the original paper~\cite{Mnih2016} for more details on how this is implemented. \subsection{Relational Networks} The RN module is designed with the capacity to reason about the pairwise relations in a set of objects. Consider a set of $n$ objects $O = \{o_1, o_2, ..., o_n \}$. Here, the $i^{\text{th}}$ object is an $m$-dimensional vector, $o_i \in \mathbb{R}^m$. Additionally, we consider a condition, $c \in \mathbb{R}^l$, represented as an $l$-dimensional vector. The RN is expressed as a composite function, \begin{equation} \text{RN}(O,c) = f_\phi\left( \sum_{i,j} g_\theta (o_i, o_j, c) \right). \label{eq:rn} \end{equation} Here $O$ and $c$ are defined as above and $f_\phi$ and $g_\theta$ are multilayer perceptrons (MLPs) with weights $\phi$ and $\theta$, respectively. In this formulation, the role of $g_\theta$ is to compute a relation vector corresponding to the relationship between two objects under a given condition. The role of $f_\phi$ is to construct an output based on all relations by operating on the sum of all relation vectors. Object representation vectors can be directly provided (as is the case for our inputs) or generated from another neural network module (such as a CNN) as demonstrated in~\cite{Relational}. The input size of $g_\theta$ is $2m + l$ and the network may be several layers deep. Naturally, the input size of $f_\phi$ must be equal to the output size of $g_\theta$ and may also consist of multiple layers. The result is a simple, end-to-end differentiable, neural network module that can effectively reason about object relations. \section{Deep Multi-view Controller} \subsection{Problem formulation} We consider a master-worker setup with a single stationary master camera which provides an overview of a scene of vehicles and multiple active cameras with a narrow field of view. Our goal is to view a maximum number of vehicles at a specified high-resolution. These vehicles may be moving or stationary and can exit or enter the scene at any point in time throughout the scenario. The scenario eventually ends, but the specific time that this happens is unknown to the agent. We created an abstract simulation environment to enable the effective use of model-free reinforcement learning techniques. The developed simulation uses bounding boxes to represent the vehicles in a scene and the camera views. This abstraction generalizes the scenario to any sensor with a rectangular view and objects with similar movement patterns to vehicles. Objects within the simulation can randomly switch between moving and remaining stationary. Moving objects randomly turn by adjusting their direction continuously and may randomly reverse directions. The sensors within the simulation can select between five possible actions (do nothing, move up, move down, move left, and move right). The agent receives a positive reward whenever an object is captured at high-resolution by an active camera for the first time. \begin{figure}[!htb] \begin{center} \includegraphics[width=0.8\linewidth]{simulation_environment_multiple_cameras.png} \end{center} \caption{Simulation Environment used for training the agent. The light boxes represents sensor views within the environment. The green rectangles represent objects in the scene that have been captured at high-resolution, while the black rectangles represent objects that have yet to be captured at high-resolution.} \label{fig:simulation} \end{figure} To increase the observability of environment, the simulation environment marks vehicles that have already been captured at high-resolution. This can be visualized in Figure~\ref{fig:simulation} where marked vehicles are represented as green. The simulation environment randomizes the number of objects and sensors, the object and sensor view sizes, the movement speeds of the sensors, and the time scale of observations by the agent. The purpose of this randomization is to increase the likelihood of a policy trained within the simulation environment being able generalize to a real-world scenario. We draw inspiration from recent work in which a robotic arm trained in a randomized non-photo-realistic simulation environment is able to perform the task in a real world setting without additional training~\cite{Tobin2017}. The abstract representation was chosen, because we can use recent work in computer vision to translate a real-world scenario into the same representation. We assume access to sensor-view registration and an object and tracking system. While these systems are not trivial to implement, they are required to allow the agent to avoid keeping track of each previously detected object in the scene for the duration of the scenario. The absence of a tracking algorithm would require the agent to implicitly track each agent in the scene. Further, a system making use of the sensor network would likely be able to make use of an explicit tracking system for additional purposes. \subsection{A3C with Multiple Agents} Our agent is based on the A3C algorithm from ~\cite{Mnih2016}. We use multiple parallel simulation environments and update a global network by accumulating gradients computed from sample observations in each simulation environment. We enable the use of multiple sensors by controlling each sensor with a different instance of the same agent. We provide each instance of the agent with a similar input state, but mark a different sensor as the controlled sensor. In each simulation environment, we use the same agent to control each individual sensor, but only perform updates to the agent based on a chosen main agent in the simulation environment. The main agent receives credit for the reward received by all other agents within the environment. This was intended to increase cooperation between the agents in the scene by eliminating incentive for the agents to compete to capture the same vehicles at high-resolution. \subsection{Model Architecture} \begin{figure*}[!htb] \begin{center} \includegraphics[width=0.8\linewidth]{network_architecture.png} \end{center} \caption{Graphical representation of network architecture used in our agent.} \label{fig:architecture} \end{figure*} We base our network architecture on the A3C architecture used in~\cite{Mnih2016}. However, we make a significant modification by replacing the convolutional neural network (CNN) used to process the input state with a modified Relational Network (RN) module. The objects used by the RN are the object representations for each sensor and object in the scene from the last 4 time steps. Each object is represented by a 4-dimensional vector representing the bounding box of the object concatenated with a 1-dimensional vector representing type of object. Bounding boxes are represented as a vector containing the xy-coordinates of the object's center normalized to fall between -1 and 1 and the width and height of the object normalized to fall between 0 and 1. Concatenating these object vectors over the last 4 time steps results in 20-dimensional object representation vector. To optimize memory and computation time, we only consider relations between objects in which at least one of the objects is a sensor. Additionally, we do not show the agent objects which have already captured at high-resolution. The relations are conditioned upon the vector representation of the sensor that is being controlled by the agent. This results in a 60-dimensional vector representation for each relation. We pass each relationship vector through an MLP with 3 fully-connected layers with sizes 128, 256, and 256 respectively. This is the MLP represented by the function $g_\theta$ in Equation~\ref{eq:rn}. We then perform an element-wise sum operation and pass the result through a fully-connected layer with size 256 and 2\% dropout. Two separate fully-connected layers are applied to resulting output to produce a vector of five action probabilities and an estimate of value function. This is the MLP represented by the function $f_\phi$ in Equation~\ref{eq:rn}. The entire architecture can be visualized in Figure~\ref{fig:architecture}. The element-wise sum operation in the RN module allows us to represent a dynamically sized input as a fixed-size vector. This vector is then used to generate the policy and value networks as done in the traditional A3C design. Arbitrary input size into the network is particularly important, because we have an arbitrary number of objects and sensors within the scene. In addition to feeling less natural, attempts to process our input using convolutional and recurrent neural networks resulted in significantly worse performance and increased running times. \section{Training and Experiments} \begin{figure}[!htb] \begin{center} \includegraphics[width=0.8\linewidth]{training_matlab_graph.png} \end{center} \caption{Smoothed performance over the course of training 4 agents.} \label{fig:training} \end{figure} We trained out agent using 16 parallel simulation environments. The number of sensors and objects in each scene were selected from discrete uniform distributions with ranges of 1 to 5 and 1 to 50 respectively. We optimized three hyperparameters: learning rate, the entropy regularization constant, and the reward discount factor. We trained 4 agents with random hyperparameters from a limited range and selected the highest performing agent. A graph of this training process over the course of a week is shown in Figure~\ref{fig:training}. We observed instability in training with certain hyperparameters as can be seen with the yellow agent in Figure~\ref{fig:training}. The agent failed to learn a policy significantly better than simply taking random actions. We evaluate our algorithm's performance by comparing with random movement and with a hand-crafted "lawn mower" method. We devised two random movement strategies which selected randomly and uniformly between the possible actions. One method included the "do nothing" action in which the camera simply remains in the same position for a time step, while the other method assigned zero probability to this action resulting in a slight performance increase. Under the "lawn mower" method, each active sensor view systematically covers the entire scene by moving up and down in columns, moving to the side for a single time step after reaching the top or bottom of the scene. The performance achieved by each method are shown in Table~\ref{tab:evaluation}. We can see that our agent performs significantly better than both the random and "lawn mower" strategies. Note that it certain scenarios within the simulation environment it may be impossible to capture 100\% of the objects at high-resolution, because objects may move out of the scene before any sensor is able to view it. We do not place a large emphasis on the specific percentage of vehicles captured, as the performance of the agent can be easily manipulated by adjusting the parameters of the environment such as the movement speed and view size of the active cameras. \begin{table} \begin{center} \begin{tabular}{|l|c|} \hline Agent & Percentage of Objects \\& Captured at High-Resolution \\ \hline\hline Random with "do nothing" & 44.75\% \\ Random & 46.28\% \\ "Lawn mower" method & 64.44\% \\ Ours (stochastic) & 82.74\% \\ Ours (deterministic) & 84.75\% \\ \hline \end{tabular} \end{center} \caption{Percentage of objects viewed at high-resolution over 100 episodes for our agents and several baseline methods. The stochastic version of our algorithm samples actions from the generated distribution. The deterministic version simply selects the action with the largest probability in the generated distribution, resulting in a slight increase in performance. } \label{tab:evaluation} \end{table} As an additional method of evaluating our learned policy, we look at the contribution of each relation considered by the agent towards the selected action distribution. This was calculated using the gradient of the KL divergence between the uniform action distribution and the selected action distribution with respect to a vector that is multiplied entry-wise with the computed relationships in the relational network evaluated at $\vec{1}$. Effectively, this results in a number scaled proportionally to the amount that each relation contributed to the chosen action distribution. The resulting contribution computation over several time steps in a scene can be visualized in Figure~\ref{fig:contributions}. Note that the sensor has learned to place high importance on the relations between itself and objects that are close to it. For example, at time step 16, we see that nearly all the focus of the policy is on the two objects closest to it. In this instance it chooses to captured the object on the left at high-resolution first. However, we see that the relationship between object to the right of the controlled camera contributes negatively to the agent's choice. \begin{figure}[!htb] \begin{center} \includegraphics[width=1.0\linewidth]{contributions_final_single_max_frames.png} \end{center} \caption{Visualization of the contribution of the relation between pairs of objects towards the chosen action under the learned policy. Relationships that contribute strongly to the chosen action are shown in green, while relationships that contribute negatively to the chosen action are shown in red. The controlled sensor is shown in cyan, while other sensors are shown in blue. The objects in the scene that have not yet been viewed at high-resolution are shown in black, while the objects that have are hidden.} \label{fig:contributions} \end{figure} We attempt to validate the ability of our learned policy to generalize by constructing pseudo real-world test environment. This involved a real-world video stream which was treated as the sensor reading from an overview camera. We applied real-time object detection and tracking to the video stream to simulate the inaccuracies in a real-world environment. The individual sensor views were simulated similarly to in the training simulation environment. Qualitative results to this experiment can be found in Figure~\ref{fig:synthesis}. Note that the object detector does not detect all vehicles and the tracker occasionally loses track of its targets. This increases the difficulty of the reconfiguration task, while also providing a good test for the problems that may be encountered in a real-world environment. \begin{figure}[!htb] \begin{center} \includegraphics[width=1.0\linewidth]{synthesis_video_frames.png} \end{center} \caption{Visualization of the learned policy operating in a non-simulated environment. The white bounding boxes represent sensor views, while the vehicles in the scene that have not yet been viewed at high-resolution are shown in black, while the vehicles that have are shown in green.} \label{fig:synthesis} \end{figure} \section{Conclusion} We have shown that deep reinforcement learning can be applied to the problem of visual sensor network reconfiguration by training within a simulated environment. Although our results suggest that applying reinforcement learning to sensor network reconfiguration is feasible, there is much needed in terms of future work to reach a viable solution for the real world. There are several engineering challenges required to run object detection and tracking algorithms and control multiple cameras with low latency. Additional future work is needed to improve the collaboration between multiple sensor controllers. Traditional reinforcement learning algorithms tend to ignore the case in which multiple agents are collaborating on a task. Our policy did not appear to learn many collaborative strategies outside of typically not overlapping sensor views. We can verify this by observing that the relation between the controlled sensor and other sensors in the scene does not seem to contribute to the selected action distribution as shown in Figure~\ref{fig:contributions}. Applying methods similar to recent research in multi-agent reinforcement learning such as MADDPG~\cite{Lowe2017} may increase the performance of the sensor network by increasing the level of collaboration between individual sensors in capturing all vehicles at high-resolution. {\small \bibliographystyle{ieee}
\section{Introduction} Unsupervised image-to-image translation is the process of learning an arbitrary mapping between image domains without labels or pairings. This can be accomplished via deep learning with generative adversarial networks (GANs), through the use of a discriminator network to provide instance-\IGNORE{or mini-batch-}specific generator training, and the use of a cyclic loss to overcome the lack of supervised pairing. Prior works such as DiscoGAN~\cite{kim2017} and CycleGAN~\cite{zhuICCV2017} are able to transfer sophisticated local texture appearance between image domains, such as translating between paintings and photographs. However, these methods often have difficulty with objects that have both related appearance and shape changes; for instance, when translating between cats and dogs. Coping with shape deformation in image translation tasks requires the ability to use spatial information from across the image. For instance, we cannot expect to transform a cat into a dog by simply changing the animals' local texture. From our experiments, networks with fully connected discriminators, such as DiscoGAN, are able to represent larger shape changes given sufficient network capacity, but train much slower~\cite{isolaCVPR2017} and have trouble resolving smaller details. Patch-based discriminators, as used in CycleGAN, work well at resolving high frequency information and train relatively quickly~\cite{isolaCVPR2017}, but have a limited `receptive field' for each patch that only allows the network to consider spatially local content. These networks reduce the amount of information received by the generator. Further, the functions used to maintain the cyclic loss prior in both networks retains high frequency information in the cyclic reconstruction, which is often detrimental to shape change tasks. We propose an image-to-image translation system, designated \emph{GANimorph}, to address shortcomings present in current techniques. To allow for patch-based discriminators to use more image context, we use dilated convolutions in our discriminator architecture \cite{yu2015multi}. This allows us to treat discrimination as a semantic segmentation problem: the discriminator outputs per-pixel real-vs.-fake decisions, each informed by global context. This per-pixel discriminator output facilitates more fine-grained information flow from the discriminator to the generator. We also use a multi-scale structure similarity perceptual reconstruction loss to help represent error over image areas rather than just over pixels. We demonstrate that our approach is more successful on a challenging shape deformation toy dataset than previous approaches. We also demonstrate example translations involving both appearance and shape variation by mapping human faces to dolls and anime characters, and mapping cats to dogs (Figure~\ref{fig:teaser}). The source code to our GANimorph system and all datasets are online: \href{https://github.com/brownvc/ganimorph/}{https://github.com/brownvc/ganimorph/}. \begin{figure}[t] \centering \includegraphics[,,width=0.45\linewidth]{images_cropped/00000000.jpg}% \quad \includegraphics[,,width=0.45\linewidth]{images_cropped/00000001.jpg} \caption{Our approach translates texture appearance and complex head and body shape changes between the cat and dog domains (left: input; right: translation).} \label{fig:teaser} \end{figure} \section{Related Work} \paragraph{Image-to-image Translation.} Image analogies provides one of the earliest examples of image-to-image translation \cite{hertzmann2001image}. The approach relies on non-parametric texture synthesis and can handle transformations such as seasonal scene shifts~\cite{laffont2014transient}, color and texture transformation, and painterly style transfer. Despite the ability of the model to learn texture transfer, the model cannot affect the shape of objects. Recent research has extended the model to perform visual attribute transfer using neural networks \cite{liao2017,he2017neuralcolor}. However, despite these improvements, deep image analogies are unable to achieve shape deformation. \paragraph{Neural Style Transfer.} These techniques show transfer of more complex artistic styles than image analogies \cite{gatysCVPR2015}. They combine the style of one image with the content of another by matching the Gram matrix statistics of early-layer feature maps from neural networks trained on general supervised image recognition tasks. Further, Duomiln et al.~\cite{dumoulin2016} extended Gatys et al.'s technique to allow for interpolation between pre-trained styles, and Huang et al.~\cite{huang2017arbitrarystyle} allowed real-time transfer. Despite this promise, these techniques have difficulty adapting to shape deformation, and empirical results have shown that these networks only capture low-level texture information \cite{bau2017}. Reference images can affect brush strokes, color palette, and local geometry, but larger changes such as anime-style combined appearance and shape transformations do not propagate. \paragraph{Generative Adversarial Networks.} Generative adversarial networks (GANs) have produced promising results in image editing \cite{Liang2017}, image translation \cite{isolaCVPR2017}, and image synthesis \cite{goodfellow2014}. These networks learn an adversarial loss function to distinguish between real and generated samples. Isola et al.~\cite{isolaCVPR2017} demonstrated with Pix2Pix that GANs are capable of learning texture mappings between complex domains. However, this technique requires a large number of explicitly-paired samples. Some such datasets are naturally available, e.g., registered map and satellite photos, or image colorization tasks. We show in our supplemental material that our approach is also able to solve these limited-shape-change problems. For specific domains such as faces, prior work has achieved domain transfer without explicit pairing. For instance, Taigman et al.~\cite{taigman2016emoji} tackled the problem of generating a personal emoji avatar from a photograph of a human face. Their technique requires a pre-trained facial attribute classifier, plus domain-specific and task-specific supervised labels for the photorealistic domain. Wolf et al.~\cite{wolf2017avatar} improved the generation by learning an underlying data generating avatar parameterization to create new avatars. Such a technique requires an existing and easily-parameterized model, and therefore cannot cope with more complex art styles, avatars, or avatar scenes, which are difficult to parameterize. \paragraph{Unsupervised Image Translation GANs.} Pix2Pix-like architectures have been extended to work with unsupervised pairs \cite{kim2017,zhuICCV2017}. Given image domains X and Y, these approaches work by learning a cyclic mapping from X$\rightarrow$Y$\rightarrow$X and Y$\rightarrow$X$\rightarrow$Y. This creates a bijective mapping that prevents mode collapse in the unsupervised case. We build upon the DiscoGAN \cite{kim2017} and CycleGAN \cite{zhuICCV2017} architectures, which themselves extend Coupled GANs for style transfer \cite{liu2016}. We seek to overcome their shape change limitations through more efficient learning and expanded discriminator context via dilated convolutions, and by using a cyclic loss function that considers multi-scale frequency information (Table \ref{tab:dilatedVsDense}). \begin{table}[t] \centering \makeatletter \define@key{Gin}{tSize}[true]{% \edef\@tempa{{Gin}{width=.23\linewidth, keepaspectratio}}% \expandafter\setkeys\@tempa } \makeatother \newcommand{\tableTitleSize}[1]{\footnotesize{#1}} \begin{minipage}[c]{0.69\linewidth} \begin{tabular}{c c c c} \tableTitleSize{Input} & \tableTitleSize{Patch based} & \tableTitleSize{Dense} & \tableTitleSize{Dilated} \\ \includegraphics[tSize,frame,]{images_cropped/00000002.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000003.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000004.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000005.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000006.jpg}& \includegraphics[tSize,frame, ]{images_cropped/00000007.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000008.jpg}& \includegraphics[tSize,frame, ]{images_cropped/00000009.jpg}\\ \end{tabular} \end{minipage} \begin{minipage}[c]{0.3\linewidth} \vspace{0.6cm} \caption{\small Translating a human to a doll, and a cat to a dog. Dilated convolutions in the discriminator outperform both patch-based and dense convolution methods for image translations that require larger shape changes and small detail preservation.} \label{tab:dilatedVsDense} \end{minipage} \end{table} Other works tackle complementary problems. Yi et al.~\cite{yi2017dualgan} focus on improving high frequency features over CycleGAN in image translation tasks, such as texture transfer and segmentation. Shuang et al.~\cite{shuang2018dagan} examine adapting CycleGAN to wider variety in the domains---so-called instance-level translation. Liu et al.~\cite{liu2017} use two autoencoders to create a cyclic loss through a shared latent space with additional constraints. Several layers are shared between the two generators and an identity loss ensures that both domains resolve to the same latent vector. This produces some shape transformation in faces; however, the network does not improve the discriminator architecture to provide greater context awareness. One qualitatively different approach is to introduce object-level segmentation maps into the training set. Liang et al.'s ContrastGAN \cite{Liang2017} has demonstrated shape change by learning segmentation maps and combining multiple conditional cyclic generative adversarial networks. However, this additional input is often unavailable and time consuming to declare. \section{Our Approach} Crucial to the success of translation under shape deformation is the ability to maintain consistency over global shapes as well as local texture. Our algorithm adopts the cyclic image translation framework~\cite{kim2017,zhuICCV2017} and achieves the required consistency by incorporating a new dilated discriminator, a generator with residual blocks and skip connections, and a multi-scale perceptual cyclic loss. \subsection{Dilated Discriminator} Initial approaches used a global discriminator with a fully connected layer~\cite{kim2017}. Such a discriminator collapses an image to a single scalar value for determining image veracity. Later approaches~\cite{zhuICCV2017,Liang2017} used a patch-based DCGAN~\cite{radford2015dcgan} discriminator, initially developed for style transfer and texture synthesis~\cite{li2016precomputed}. In this type of discriminator, each image patch is evaluated to determine a fake or real score. The patch-based approach allows for fast generator convergence by operating on each local patch independently. This approach has proven effective for texture transfer, segmentation, and similar tasks. However, this patch-based view limits the networks' awareness of global spatial information, which limits the generator's ability to perform coherent global shape change. \paragraph{Reframing Discrimination as Semantic Segmentation.} To solve this issue, we reframe the discrimination problem from determining real/fake images or subimages into the more general problem of finding real or fake regions of the image, i.e., a \emph{semantic segmentation} task. Since the discriminator outputs a higher-resolution segmentation map, the information flow between the generator and discriminator increases. This allows for faster convergence than using a fully connected discriminator, such as in DiscoGAN. Current state-of-the-art networks for segmentation use dilated convolutions, and have been shown to require far fewer parameters than conventional convolutional networks to achieve similar levels of accuracy~\cite{yu2015multi}. Dilated convolutions provide advantages over both global and patch-based discriminator architectures. For the same parameter budget, they allow the prediction to incorporate data from a larger surrounding region. This increases the information flow between the generator and discriminator: by knowing that regions of the image contribute to making the image unrealistic, the generator can focus on that region of the image. An alternative way to think about dilated convolutions is that they allow the discriminator to implicitly learn context. While multi-scale discriminators have been shown to improve results and stability for high resolution image synthesis tasks~\cite{wang2017pix2pixHD}, we will show that incorporating information from farther away in the image is useful in translation tasks as the discriminator can determine where a region should fit into an image based on surrounding data. For example, this increased spatial context helps localize the face of a dog relative to its body, which is difficult to learn from small patches or patches learned in isolation from their neighbors. Figure~\ref{fig:architectureN} (right) illustrates our discriminator architecture. \subsection{Generator} Our generator architecture builds on those of DiscoGAN and CycleGAN. DiscoGAN uses a standard encoder-decoder architecture (Figure~\ref{fig:architectureN}, top left). However, its narrow bottleneck layer can lead to output images that do not preserve all the important visual details from the input image. Furthermore, due to the low capacity of the network, the approach remains limited to low resolution images of size 64$\times$64. The CycleGAN architecture seeks to increase capacity over DiscoGAN by using a residual block to learn the image translation function~\cite{he2015resnet}. Residual blocks have been shown to work in extremely deep networks, and they are able to represent low frequency information~\cite{zeiler2014,bau2017}. However, using residual blocks at a single scale limits the information that can pass through the bottleneck and thus the functions that the network can learn. Our generator includes residual blocks at multiple layers of both the decoder and encoder, allowing the network to learn multi-scale transformations that work on both higher and lower spatial resolution features (Figure~\ref{fig:architectureN}, bottom left). \begin{figure}[t] \includegraphics[width=\linewidth]{figures/diagrams/DiscriminatorGeneratorV4.pdf} \caption{\small (Left) Generators from different unsupervised image translation models. The skip connections and residual blocks are combined via concatenation as opposed to addition. (Right) Our discriminator network architecture is a fully-convolutional segmentation network. Each colored block represents a convolution layer; block labels indicate filter size. In addition to global context from the dilations, the skip connection bypassing the dilated convolution blocks preserves the network's view of local context.} \label{fig:architectureN} \end{figure} \subsection{Objective Function} \paragraph{Perceptual Cyclic Loss.} As per prior unsupervised image-to-image translation work~\cite{kim2017,Liang2017,liu2017,zhuICCV2017,yi2017dualgan}, we use a cyclic loss to learn a bijective mapping between two image domains. However, not all image translation functions can be perfectly bijective, e.g., when one domain has smaller appearance variation, like human face photos vs.~anime drawings. When all information in the input image cannot be preserved in the translation, the cyclic loss term should aim to preserve the most important information. Since the network should focus on image attributes of importance to human viewers, we should choose a perceptual loss that emphasizes shape and appearance similarity between the generated and target images. Defining an explicit shape loss is difficult, as any explicit term requires known image correspondences between domains. These do not exist for our examples and our unsupervised setting. Further, including a more-complex perceptual neural network into the loss calculation imparts a significant computational and memory overhead. While using pretrained image classification networks as a perceptual loss can speed up style transfer~\cite{johnson2016ploss}, these do not work on shape changes as the pretrained networks tend only to capture low-level texture information \cite{bau2017}. Instead, we use multi-scale structure similarity loss (MS-SSIM)~\cite{wang2004}. This loss better preserves features visible to humans instead of noisy high frequency information. MS-SSIM can also better cope with shape change since it can recognize geometric differences through area statistics. However, MS-SSIM alone can ignore smaller details, and does not capture color similarity well. Recent work has shown that mixing MS-SSIM with L1 or L2 losses is effective for super resolution and segmentation tasks~\cite{zhao2017Loss}. Thus, we also add a lightly-weighted L1 loss term, which helps increase the clarity of generated images. \paragraph{Feature Matching Loss.} To increase the stability of the model, our objective function uses a feature matching loss~\cite{salimans2016fm}: \begin{equation \mathcal{L}_{\textnormal{FM}}(G, D) = \frac{1}{n-1}\sum_{i=1}^{n-1} \lVert\mathbb{E}_{x \sim p_{\text{data}}}f_i(x) - \mathbb{E}_{z \sim p_{z}}f_i(G(z))\rVert_{2}^{2}. \label{eq:featurematchloss} \end{equation} Where $f_i\in D(x)$ represents the raw activation potentials of the $i^{th}$ layer of the discriminator $D$, and $n$ is the number of discriminator layers. This term encourages fake and real samples to produce similar activations in the discriminator, and so encourages the generator to create images that look more similar to the target domain. We have found this loss term to prevent generator mode collapse, to which GANs are often susceptible~\cite{kim2017,salimans2016fm,wang2017pix2pixHD}. \paragraph{Scheduled Loss Normalization (SLN).} In a multi-part loss function, linear weights are often used to normalize the terms with respect to one another, with previous works often optimizing a single set of weights. However, finding appropriately-balanced weights can prove difficult without ground truth. Further, often a single set of weights is inappropriate because the magnitude of the loss terms changes over the course of training. Instead, we create a procedure to periodically renormalize each loss term and so control their relative values. This lets the user intuitively provide weights that sum to 1 to balance the loss terms in the model, without having knowledge of how their magnitudes will change over training. Let $\mathcal{L}$ be a loss function, and let $\mathcal{X}_n = \{x_t\}_{t=1}^{bn}$ be a sequence of $n$ batches of training inputs, each $b$ images large, such that $\mathcal{L}(x_t)$ is the training loss at iteration $t$. We compute an exponentially-weighted moving average of the loss: \begin{equation} \mathcal{L}_{\textnormal{moavg}}(\mathcal{L}, \mathcal{X}_n) = (1 - \beta)\sum_{x_t\in\mathcal{X}_n} \beta^{bn - t} \mathcal{L}(x_t)^2 \end{equation} where $\beta$ is the decay rate. We can renormalize the loss function by dividing it by this moving average. If we do this on every training iteration, however, the loss stays at its normalized average and no training progress is made. Instead, we schedule the loss normalization: \[ \textnormal{SLN}(\mathcal{L}, \mathcal{X}_n, s) = \begin{cases} \mathcal{L}(\mathcal{X}_n)/(\mathcal{L}_{\textnormal{moavg}}(\mathcal{L}, \mathcal{X}_n) + \epsilon) &\text{if } n\Mod{s} = 1\\ \mathcal{L}(\mathcal{X}_n)&\text{otherwise} \end{cases} \] Here, $s$ is the scheduling parameter such that we apply normalization every $s$ training iterations. For all experiments, we use $\beta = 0.99$, $\epsilon = 10^{-10}$, and $s=200$. One other normalization difference between CycleGAN/DiscoGAN and our approach is the use of instance normalization~\cite{huang2017arbitrarystyle} and batch normalization~\cite{ioffe2015batchnorm}, respectively. We found that batch normalization caused excessive over-fitting to the training data, and so we used instance normalization. \paragraph{Final Objective.} Our final objective comprises three loss normalized terms: a standard GAN loss, a feature matching loss, and two cyclic reconstruction losses. Given image domains $X$ and $Y$, let $G: X\to Y$ map from $X$ to $Y$ and $F:Y\to X$ map from $Y$ to $X$. $D_{X}$ and $D_{Y}$ denote discriminators for $G$ and $F$, respectively. For GAN loss, we combine normal GAN loss terms from Goodfellow et al.~\cite{goodfellow2014}: \begin{align} \mathcal{L}_{\textnormal{GAN}} &= \mathcal{L}_{\textnormal{GAN}_X}(F,D_{X},Y,X) + \mathcal{L}_{\textnormal{GAN}_Y}(G, D_{Y},X, Y) \end{align} For feature matching loss, we use Equation \ref{eq:featurematchloss} for each domain: \begin{equation} \mathcal{L}_{\textnormal{FM}} = \mathcal{L}_{\textnormal{FM}_X}(G, D_X) + \mathcal{L}_{\textnormal{FM}_Y}(F, D_Y) \end{equation} For the two cyclic reconstruction losses, we consider structural similarity~\cite{wang2004} and an $\mathbb{L}_1$ loss. Let $X'= F(G(X))$ and $Y'= G(F(Y))$ be the cyclically-reconstructed input images. Then: \begin{align} \mathcal{L}_{\textnormal{SS}}=& (1-\text{MS-SSIM}(X', X)) + (1-\text{MS-SSIM}(Y', Y))\\ \mathcal{L}_{\textnormal{L1}}=& \lVert X'-X\rVert_1 + \lVert Y'-Y\rVert_1 \end{align} where we compute MS-SSIM without discorrelation. Our total objective function with scheduled loss normalization (SLN) is: \begin{align} \label{eqn:GGANtot} \mathcal{L}_{\textnormal{total}} =& \lambda_{\textnormal{GAN}} \textnormal{SLN}(\mathcal{L}_{\textnormal{GAN}}) + \lambda_{\textnormal{FM}} \textnormal{SLN}(\mathcal{L}_{\textnormal{FM}}) + \nonumber \\ & \lambda_{\textnormal{CYC}} \textnormal{SLN}(\lambda_{\textnormal{SS}}\mathcal{L}_{\textnormal{SS}} + \lambda_{\textnormal{L1}} \mathcal{L}_{\textnormal{L1}}) \end{align} with $\lambda_{\textnormal{GAN}} + \lambda_{\textnormal{FM}} + \lambda_{\textnormal{CYC}} = 1$, $\lambda_{\textnormal{SS}} + \lambda_{\textnormal{L1}} = 1$, and all coefficients $\geq 0$. We set $\lambda_{\textnormal{GAN}}=0.49$, $\lambda_{\textnormal{FM}}=0.21$, and $\lambda_{\textnormal{CYC}}=0.3$, and $\lambda_{\textnormal{SS}}=0.7$ and $\lambda_{\textnormal{L1}}=0.3$. Empirically, these helped to reduce mode collapse and worked across all datasets. \subsection{Training} The network architecture both consumes and output 128$\times$128 images. All models trained within 3.2 days on a single NVIDIA Titan X GPU with a batch size of 16. The number of generator updates per step varied between 1 and 2 for each dataset depending on the dataset difficulty. Each update of the generator used separate data than in the update of the discriminator. We train for 50--400 epochs depending on the domain, with 1,000 batches per epoch. Overall, this resulted in 400,000 generator updates over the course of training for difficult datasets (e.g., cat to dog) and 200,000 generator updates for easier datasets (e.g., human to doll). We empirically define a dataset as hard or easy if it is difficult to generate images in the domain. \paragraph{Data Augmentation.} To help mitigate dataset overfitting, the following image augmentations were applied to each dataset: rescale to 1.1 input size, random horizontal flipping of the image, random rotation of up to 30 degrees in either direction, random rescaling, and random cropping of the image. \section{Experiments} \begin{figure}[t] \centering \begin{minipage}[c]{0.6\linewidth} \includegraphics[frame,width=0.45\linewidth]{figures/toy/examples/NN0-reg_crop.png} \includegraphics[frame,width=0.45\linewidth]{figures/toy/examples/NN0-warp_crop.png} \end{minipage}\hfill \begin{minipage}[c]{0.4\linewidth} \vspace{-0.35cm} \caption{Toy Dataset (128$\times$128). \emph{Left:} $\mathcal{X}$ instance; a regular polygon with deformed dot matrix overlay. \emph{Right:} $\mathcal{Y}$ instance; a deformed polygon and dot lattice. The dot lattice provides information from across the image to the true deformation.} \label{fig:toysetup} \end{minipage} \end{figure} \subsection{Toy Problem: Learning 2D Dot and Polygon Deformations} We created a challenging toy problem to evaluate the ability of our network design to learn shape- and texture-consistent deformation. We define two domains: the regular polygon domain $X$ and its deformed equivalent $Y$ (Figure~\ref{fig:toysetup}). Each example $X_{s, h, d}\in X$ contains a centered regular polygon with $s\in \{3\ldots 7\}$ sides, plus a deformed matrix of dots overlaid. The dot matrix is computed by taking a unit dot grid and transforming it via $h$, a Gaussian random normal 2$\times$2 matrix, and a displacement vector $d$, a Gaussian normal vector in $\mathbb{R}^2$. The corresponding domain equivalent in $Y$ is $Y_{s, h, d}$, with instead the polygon transformed by $h$ and the dot matrix remaining regular. This construction forms a bijection from $X$ to $Y$, and so the translation problem is well-posed. Learning a mapping from $X$ to $Y$ requires the network to use the large-scale cues present in the dot matrix to successfully deform the polygon, as local patches with a fixed image location cannot overcome the added displacement $d$. Table \ref{tab:toyresults} shows that DiscoGAN is unable to learn to map between either domain, and produces an output that is close to the mean of the dataset (off-white). CycleGAN is able to learn only local deformation, which produces hue shifts towards the blue of the polygon when mapping from regular to deformed spaces, and which in most cases produces an undeformed dot matrix when mapping from deformed to regular spaces. In contrast, our approach is significantly more successful at learning the deformation as the dilated discriminator is able to incorporate information from across the image. \begin{table}[t] \setlength{\tabcolsep}{0.01pt} \renewcommand{\arraystretch}{0.05}% \providecommand\aport{} \newcommand{\tableTitleSize}[1]{\tiny{#1}} \newcommand{128}{128} \setlength{\tP}{128\Xoffset} \makeatletter \define@key{Gin}{tSize}[true]{% \edef\@tempa{{Gin}{width=.110\linewidth, keepaspectratio}}% \expandafter\setkeys\@tempa } \makeatother \caption{Toy Dataset. When trying to estimate complex deformation, DiscoGAN collapses to the mean value of dataset (all white). CycleGAN is able to approximate the deformation of the polygon but not the dot lattice (right-hand side). Our approach is able to learn both under strong deformation.} \vspace{0.25cm} \label{tab:toyresults} \centering \rotatebox[origin=c]{90}{Regular to Deformed} \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours}\\ \includegraphics[tSize,frame]{images_cropped/00000010.png} & \includegraphics[tSize,frame]{images_cropped/00000011.png} & \includegraphics[tSize,frame]{images_cropped/00000012.png} & \includegraphics[tSize,frame]{images_cropped/00000013.png} \\ \includegraphics[tSize,frame]{images_cropped/00000014.png} & \includegraphics[tSize,frame]{images_cropped/00000015.png} & \includegraphics[tSize,frame]{images_cropped/00000016.png} & \includegraphics[tSize,frame]{images_cropped/00000017.png} \\ \includegraphics[tSize,frame]{images_cropped/00000018.png} & \includegraphics[tSize,frame]{images_cropped/00000019.png} & \includegraphics[tSize,frame]{images_cropped/00000020.png} & \includegraphics[tSize,frame]{images_cropped/00000021.png} \\ \includegraphics[tSize,frame]{images_cropped/00000022.png} & \includegraphics[tSize,frame]{images_cropped/00000023.png} & \includegraphics[tSize,frame]{images_cropped/00000024.png} & \includegraphics[tSize,frame]{images_cropped/00000025.png} \\ \end{tabular} \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \includegraphics[tSize,frame]{images_cropped/00000026.png} & \includegraphics[tSize,frame]{images_cropped/00000027.png} & \includegraphics[tSize,frame]{images_cropped/00000028.png} & \includegraphics[tSize,frame]{images_cropped/00000029.png} \\ \includegraphics[tSize,frame]{images_cropped/00000030.png} & \includegraphics[tSize,frame]{images_cropped/00000031.png} & \includegraphics[tSize,frame]{images_cropped/00000032.png} & \includegraphics[tSize,frame]{images_cropped/00000033.png} \\ \includegraphics[tSize,frame]{images_cropped/00000034.png} & \includegraphics[tSize,frame]{images_cropped/00000035.png} & \includegraphics[tSize,frame]{images_cropped/00000036.png} & \includegraphics[tSize,frame]{images_cropped/00000037.png} \\ \includegraphics[tSize,frame]{images_cropped/00000038.png} & \includegraphics[tSize,frame]{images_cropped/00000039.png} & \includegraphics[tSize,frame]{images_cropped/00000040.png} & \includegraphics[tSize,frame]{images_cropped/00000041.png} \\ \end{tabular} \rotatebox[origin=c]{-90}{Deformed to Regular}\\ \label{fig:toyresults} \end{table} \paragraph{Quantitative Comparison.} As our output is a highly-deformed image, we estimate the learned transform parameters by sampling. We compute a Hausdorff distance between 500 point samples on the ground truth polygon and on the image of the generated polygon after translation: for finite sets of points $X$ and $Y$, $d(X, Y) = \max_{y\in Y}\min_{x\in X} \lVert x - y\rVert$. We hand annotate 220 generated polygon boundaries for our network, sampled uniformly at random along the boundary. Samples exist in a unit square with bottom left corner at (0, 0). First, DiscoGAN fails to generate polygons at all, despite being able to reconstruct the original image. Second, for `regular to deformed', CycleGAN fails to produce a polygon, whereas our approach produces average Hausdorff distance of $0.20\pm 0.01$. Third, for `deformed to regular', CycleGAN produces a polygon with distance of $0.21\pm 0.04$, whereas our approach has distance of $0.10\pm 0.03$. In the true dataset, note that regular polygons are centered, but CycleGAN only constructs polygons at the position of the original distorted polygon. Our network constructs a regular polygon at the center of the image as desired. \subsection{Real-world Datasets} We evaluate our GANimorph system by learning mappings between several image datasets (Figure~\ref{fig:Dataset Ex}). For human faces, we use the aligned version of the CelebFaces Attribute dataset~\cite{liu2015faceattributes}, which contains 202,599 images. \begin{figure}[t] \setlength{\imgSize}{.15\textwidth} \centering \includegraphics[width=\imgSize,frame,]{images_cropped/00000042.jpg} \includegraphics[width=\imgSize,frame,]{images_cropped/00000043.jpg} \includegraphics[width=\imgSize,frame,]{images_cropped/00000044.jpg} \includegraphics[width=\imgSize,frame,]{images_cropped/00000045.jpg} \includegraphics[width=\imgSize,frame,]{images_cropped/00000046.jpg} \includegraphics[width=\imgSize,, ]{images_cropped/00000047.jpg} \caption{Face dataset examples, left to right: CelebA, Danbooru, Flickr Cat, Columbia Dog, Flickr Dolls, and Pets in the Wild.} \label{fig:Dataset Ex} \end{figure} \paragraph{Anime Faces.} Previous works have noted that anime images are challenging to use with existing style transfer methods, since translating between a photoreal face and an anime-style face involves both shape and appearance variation. To test on anime faces, we create a large 966,777 image anime dataset crowdsourced from Danbooru~\cite{danbooru2017}. The Danbooru dataset has a wide variety of styles from super-deformed chibi-style faces, to realistically-proportioned faces, to rough sketches. Since traditional face detectors yield poor results on drawn datasets, we ran the Animeface filter~\cite{nagadomiAnimeface} on both datasets. When translating humans to anime, we see an improvement in our approach for head pose and accessories such as glasses (Table~\ref{tab:mainresults}, \nth{3} row, right), plus a larger degree of shape deformation such as reduced face vertical height. The final line of each group represents a particularly challenging example. \begin{table}[t] \setlength{\tabcolsep}{0.05em} \renewcommand{\arraystretch}{0.2}% \providecommand\aport{} \newcommand{\tableTitleSize}[1]{\tiny{#1}} \newcommand{128}{128} \setlength{\tP}{128\Xoffset} \makeatletter \define@key{Gin}{tSize}[true]{% \edef\@tempa{{Gin}{width=.110\linewidth, keepaspectratio}}% \expandafter\setkeys\@tempa } \makeatother \caption{GANimorph can translate shape and style changes while retaining many input attributes such as hair color, pose, glasses, headgear, and background. CycleGAN and DiscoGAN are less successful both with just shape (human to doll) and with shape and style changes (human to anime).} \label{tab:mainresults} \centering \begin{tabular}[c]{c c} \rotatebox[origin=c]{90}{Photoreal to Anime} \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \includegraphics[tSize,]{images_cropped/00000048.jpg} & \includegraphics[tSize,]{images_cropped/00000049.jpg} & \includegraphics[tSize,]{images_cropped/00000050.jpg} & \includegraphics[tSize,]{images_cropped/00000051.jpg} \\ \includegraphics[tSize,]{images_cropped/00000052.jpg} & \includegraphics[tSize,]{images_cropped/00000053.jpg} & \includegraphics[tSize,]{images_cropped/00000054.jpg} & \includegraphics[tSize,, ]{images_cropped/00000055.jpg} \\ \includegraphics[tSize,]{images_cropped/00000056.jpg} & \includegraphics[tSize,]{images_cropped/00000057.jpg} & \includegraphics[tSize,]{images_cropped/00000058.jpg} & \includegraphics[tSize,]{images_cropped/00000059.jpg} \\ \includegraphics[tSize,]{images_cropped/00000060.jpg} & \includegraphics[tSize,]{images_cropped/00000061.jpg} & \includegraphics[tSize,]{images_cropped/00000062.jpg} & \includegraphics[tSize,]{images_cropped/00000063.jpg} \\ \end{tabular} & \hspace{0.4\tabcolsep} \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \includegraphics[tSize,]{images_cropped/00000064.jpg} & \includegraphics[tSize,]{images_cropped/00000065.jpg} & \includegraphics[tSize,]{images_cropped/00000066.jpg} & \includegraphics[tSize,, ]{images_cropped/00000067.jpg} \\ \includegraphics[tSize,]{images_cropped/00000068.jpg} & \includegraphics[tSize,]{images_cropped/00000069.jpg} & \includegraphics[tSize,]{images_cropped/00000070.jpg} & \includegraphics[tSize,]{images_cropped/00000071.jpg} \\ \includegraphics[tSize,]{images_cropped/00000072.jpg} & \includegraphics[tSize,]{images_cropped/00000073.jpg} & \includegraphics[tSize,]{images_cropped/00000074.jpg} & \includegraphics[tSize,]{images_cropped/00000075.jpg} \\ \includegraphics[tSize]{images_cropped/00000076.jpg} & \includegraphics[tSize]{images_cropped/00000077.jpg} & \includegraphics[tSize]{images_cropped/00000078.jpg} & \includegraphics[tSize]{images_cropped/00000079.jpg} \\ \end{tabular} \rotatebox[origin=c]{-90}{Anime to Photoreal}\\ \vspace{2.5\tabcolsep} \\ \rotatebox[origin=t]{90}{Human to Doll Face} \begin{tabular}[c]{c c c c} \centering \includegraphics[tSize,]{images_cropped/00000080.jpg} & \includegraphics[tSize,]{images_cropped/00000081.jpg} & \includegraphics[tSize,]{images_cropped/00000082.jpg} & \includegraphics[tSize,, ]{images_cropped/00000083.jpg} \\ \includegraphics[tSize,]{images_cropped/00000084.jpg} & \includegraphics[tSize,]{images_cropped/00000085.jpg} & \includegraphics[tSize,]{images_cropped/00000086.jpg} & \includegraphics[tSize,, ]{images_cropped/00000087.jpg} \\ \includegraphics[tSize,]{images_cropped/00000088.jpg} & \includegraphics[tSize,]{images_cropped/00000089.jpg} & \includegraphics[tSize,]{images_cropped/00000090.jpg} & \includegraphics[tSize,, ]{images_cropped/00000091.jpg} \\ \includegraphics[tSize,]{images_cropped/00000092.jpg} & \includegraphics[tSize,]{images_cropped/00000093.jpg} & \includegraphics[tSize,]{images_cropped/00000094.jpg} & \includegraphics[tSize,, ]{images_cropped/00000095.jpg} \\ \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \end{tabular} & \hspace{0.4\tabcolsep} \begin{tabular}[c]{c c c c} \includegraphics[tSize,]{images_cropped/00000096.jpg} & \includegraphics[tSize,]{images_cropped/00000097.jpg} & \includegraphics[tSize,]{images_cropped/00000098.jpg} & \includegraphics[tSize,, ]{images_cropped/00000099.jpg} \\ \includegraphics[tSize,]{images_cropped/00000100.jpg} & \includegraphics[tSize,]{images_cropped/00000101.jpg} & \includegraphics[tSize,]{images_cropped/00000102.jpg} & \includegraphics[tSize,, ]{images_cropped/00000103.jpg} \\ \includegraphics[tSize,]{images_cropped/00000104.jpg} & \includegraphics[tSize,]{images_cropped/00000105.jpg} & \includegraphics[tSize,]{images_cropped/00000106.jpg} & \includegraphics[tSize,, ]{images_cropped/00000107.jpg} \\ \includegraphics[tSize,]{images_cropped/00000108.jpg} & \includegraphics[tSize,]{images_cropped/00000109.jpg} & \includegraphics[tSize,]{images_cropped/00000110.jpg} & \includegraphics[tSize,]{images_cropped/00000111.jpg} \\ \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \end{tabular} \rotatebox[origin=c]{-90}{Doll Face to Human} \end{tabular} \label{fig:results} \vspace{-0.5cm} \end{table} \paragraph{Doll Faces.} To demonstrate that our algorithm can handle shape deformations with similar photographic appearance, we translate between the two domains of doll and human face photographs. Similar to Morsita et al.~\cite{morshita2016dolls}, we extracted 13,336 images from the Flickr100m dataset~\cite{ni2015flickr100m} using specific doll manufacturers as keywords. Then, we extract local binary patterns~\cite{ojala1994lbp} using OpenCV~\cite{opencv_library}, and use the Animeface filter for facial alignment~\cite{nagadomiAnimeface}. Stylizing human faces as dolls provides an informative test case: both domains have similar photorealistic appearance, so the translation task focuses on shape more than texture. Table \ref{tab:mainresults}, bottom, shows that our architecture handles local deformation and global shape change better than CycleGAN and DiscoGAN, while preserving local texture similarity to the target domain. The second to last row on the right hand side shows that, with other networks, either the shape is malformed (DiscoGAN), or the shape shows artifacts from the original image or unnatural skin texture (CycleGAN). Our method matches skintones from the CelebA dataset, while capturing the overall facial structure and hair color of the doll. For a more difficult doll to human example in the bottom right-hand corner, while our transformation is not realistic, our method still creates more shape change than existing networks. \paragraph{Pet Faces.} To test whether our network could translate between animal domains, we constructed a dataset of 47,906 cat faces from Flickr100m\cite{ni2015flickr100m} dataset using OpenCV's~\cite{opencv_library} Haar cascade cat face detector. This detector produces false positives, and occasionally detects a human face as a cat face. We also use the 8,223-image Columbia Dog dataset~\cite{liu2012dog}, which comes with curated bounding boxes around the dog faces, which reduced the number of noisy results. Translation results are shown in Table \ref{fig:petfaces}. \begin{table}[t] \makeatletter \define@key{Gin}{tSize}[true]{% \edef\@tempa{{Gin}{width=.117\linewidth, keepaspectratio}}% \expandafter\setkeys\@tempa } \makeatother \caption{Pet Faces: GANimorph can map poses across large variations in appearance, and does not incorrectly replace local texture without replacing the surrounding context.} \label{fig:petfaces} \setlength{\tabcolsep}{0.00em} \renewcommand{\arraystretch}{0.01}% \providecommand\aport{} \newcommand{\tableTitleSize}[1]{\tiny{#1}} \centering \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \includegraphics[tSize,frame,, ]{images_cropped/00000112.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000113.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000114.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000115.jpg}\\ \includegraphics[tSize,frame,, ]{images_cropped/00000116.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000117.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000118.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000119.jpg}\\ \includegraphics[tSize,frame,, ]{images_cropped/00000120.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000121.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000122.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000123.jpg}\\ \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \end{tabular} % \begin{tabular}{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \includegraphics[tSize,frame,, ]{images_cropped/00000124.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000125.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000126.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000127.jpg}\\ \includegraphics[tSize,frame,, ]{images_cropped/00000128.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000129.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000130.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000131.jpg}\\ \includegraphics[tSize,frame,, ]{images_cropped/00000132.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000133.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000134.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000135.jpg}\\ \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \end{tabular}% \end{table} \paragraph{Pets in the Wild.} To demonstrate our network on unaligned data, we evaluate on the Kaggle cat and dog dataset from Microsoft Research~\cite{elson2007catdog}. This dataset contains 12,500 images of each species. The intended purpose of the dataset is to classify cat images from dog images, and so it contains many animal breeds at varying scales, lighting conditions, poses, backgrounds, and occlusion factors. When translating between cats and dogs (Table \ref{fig:resultsPetsInWild}), the network is able to change both the local features such as the addition and removal of fur and whiskers, plus the larger shape deformation required to fool the discriminator, such as growing a snout. Most errors in this domain come from the generator failing to identify an animal from the background, such as forgetting the rear or tail of the animal. Sometimes the generator may fail to identify the animal at all. We also translate between humans and cats. Table \ref{fig:resultsCatsToHumans} demonstrates how our architecture handles large scale translation with these two variable data distributions. Our failure cases are approximately the same as that of the cats to dogs translation, with some promising results. Overall, we translate a surprising degree of shape deformation even when we might not expect this to be possible. \paragraph{Supplemental Datasets.} We also tested our approach on existing datasets used in the CycleGAN paper (maps to satellite imagery, horses to zebras, and apples to oranges). These mappings focus on appearance transfer and require less shape deformation; please see our supplemental material to verify that our approach can handle this setting as well. \begin{table}[t] \makeatletter \define@key{Gin}{tSize}[true]{% \edef\@tempa{{Gin}{width=.1\linewidth, keepaspectratio}}% \expandafter\setkeys\@tempa } \makeatother \caption{Pets in the Wild: Between dogs and cats, our approach is able to generate shape transforms across pose and appearance variation.} \label{fig:resultsPetsInWild} \setlength{\tabcolsep}{0.025\linewidth} \renewcommand{\arraystretch}{0.001}% \providecommand\aport{} \newcommand{\tableTitleSize}[1]{\tiny{#1}} \label{tab:catdog} \centering \begin{tabular}[c]{c c} \centering \rotatebox[origin=c]{90}{ {\large Cat\textrightarrow Dog}} \setlength{\tabcolsep}{0.00em}% \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \includegraphics[tSize,frame,]{images_cropped/00000136.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000137.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000138.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000139.jpg}\\ \includegraphics[tSize,frame,]{images_cropped/00000140.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000141.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000142.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000143.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000144.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000145.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000146.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000147.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000148.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000149.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000150.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000151.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000152.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000153.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000154.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000155.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000156.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000157.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000158.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000159.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000160.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000161.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000162.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000163.jpg} \\ \end{tabular}& \setlength{\tabcolsep}{0.00em}% \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{CycleGAN} & \tableTitleSize{DiscoGAN} & \tableTitleSize{Ours} \\ \includegraphics[tSize,frame,]{images_cropped/00000164.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000165.jpg} & \includegraphics[tSize,frame,, ]{images_cropped/00000166.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000167.jpg}\\ \includegraphics[tSize,frame,]{images_cropped/00000168.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000169.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000170.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000171.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000172.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000173.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000174.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000175.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000176.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000177.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000178.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000179.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000180.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000181.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000182.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000183.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000184.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000185.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000186.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000187.jpg} \\ \includegraphics[tSize,frame,]{images_cropped/00000188.jpg}& \includegraphics[tSize,frame,]{images_cropped/00000189.jpg}& \includegraphics[tSize,frame,, ]{images_cropped/00000190.jpg} & \includegraphics[tSize,frame,]{images_cropped/00000191.jpg}\\ \end{tabular} \rotatebox[origin=c]{-90}{ {\large Dog\textrightarrow Cat }} \end{tabular}% \end{table} \begin{table}[H] \makeatletter \define@key{Gin}{tSize}[true]{% \edef\@tempa{{Gin}{width=0.1175\linewidth, keepaspectratio} \expandafter\setkeys\@tempa } \makeatother \caption{Human and Pet Faces: As a challenge, we try to map cats to humans and humans to cats. Pose is reliably translated; semantic appearance such as hair color is sometimes translated; but some inputs still fail (bottom left).} \setlength{\tabcolsep}{0.05pt} \renewcommand{\arraystretch}{0.05}% \providecommand\aport{} \newcommand{\tableTitleSize}[1]{\footnotesize{#1}} \centering \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{Output} \\ \includegraphics[tSize,frame]{images_cropped/00000192.jpg} & \includegraphics[tSize,frame]{images_cropped/00000193.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000194.jpg} & \includegraphics[tSize,frame]{images_cropped/00000195.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000196.jpg} & \includegraphics[tSize,frame]{images_cropped/00000197.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000198.jpg} & \includegraphics[tSize,frame]{images_cropped/00000199.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000200.jpg} & \includegraphics[tSize,frame]{images_cropped/00000201.jpg} \\ \end{tabular}% \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{Output} \\ \includegraphics[tSize,frame]{images_cropped/00000202.jpg} & \includegraphics[tSize,frame]{images_cropped/00000203.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000204.jpg} & \includegraphics[tSize,frame]{images_cropped/00000205.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000206.jpg} & \includegraphics[tSize,frame]{images_cropped/00000207.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000208.jpg} & \includegraphics[tSize,frame]{images_cropped/00000209.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000210.jpg} & \includegraphics[tSize,frame]{images_cropped/00000211.jpg} \\ \end{tabular}% \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{Output} \\ \includegraphics[tSize,frame]{images_cropped/00000212.jpg} & \includegraphics[tSize,frame]{images_cropped/00000213.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000214.jpg} & \includegraphics[tSize,frame]{images_cropped/00000215.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000216.jpg} & \includegraphics[tSize,frame]{images_cropped/00000217.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000218.jpg} & \includegraphics[tSize,frame]{images_cropped/00000219.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000220.jpg} & \includegraphics[tSize,frame]{images_cropped/00000221.jpg} \end{tabular}% \begin{tabular}[c]{c c c c} \tableTitleSize{Input} & \tableTitleSize{Output} \\ \includegraphics[tSize,frame]{images_cropped/00000222.jpg} & \includegraphics[tSize,frame]{images_cropped/00000223.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000224.jpg} & \includegraphics[tSize,frame]{images_cropped/00000225.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000226.jpg} & \includegraphics[tSize,frame]{images_cropped/00000227.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000228.jpg} & \includegraphics[tSize,frame]{images_cropped/00000229.jpg} \\ \includegraphics[tSize,frame]{images_cropped/00000230.jpg} & \includegraphics[tSize,frame]{images_cropped/00000231.jpg} \\ \end{tabular}% \label{fig:resultsCatsToHumans} \end{table} \begin{table}[t] \centering \caption{Percentage of pixels classified in translated images via CycleGAN, DiscoGAN, and our algorithm (with design choices). Target classes are in \cstress{blue}.} \label{tab:AblationCatDogBody} \vspace{-1.5mm} \begin{tabular}{l rrrr rrrr} \toprule Class (\%) & \multicolumn{4}{c}{Cat\textrightarrow Dog} & \multicolumn{4}{c}{Dog\textrightarrow Cat } \\ \cmidrule(lr){2-5} \cmidrule(lr){6-9} Networks & Cat & \cstress{\textbf{Dog}} & Person & Other & \cstress{\textbf{Cat}} & Dog & Person & Other \\ \midrule Initial Domain & 100.00 & \cstress{0.00} & 0.00 & 0.00 & \cstress{0.00} & 98.49 & 1.51 & 0.00 \\ \midrule CycleGAN & 99.99 & \cstress{0.01} & 0.00 & 0.00 & \cstress{2.67} & 97.27 & 0.06 & 0.00 \\ DiscoGAN & 24.37 & \cstress{75.38} & 0.25 & 0.00 & \cstress{96.95} & 0.00 & 2.71 & 0.34 \\ Ours w/ L1 & 100.00 & \cstress{0.00} & 0.00 & 0.00 & \cstress{0.00} & 0.00 & 0.00 & 100.00 \\ Ours w/o feature match loss & 5.03 & \cstress{93.64} & 0.81 & 0.53 & \cstress{85.62} & 14.15 & 0.00 & 0.23 \\ Ours w/ fully conn.~discrim. & 6.11 & \cstress{93.60} & 0.29 & 0.00 & \cstress{91.41} & 8.45 & 0.03 & 0.10 \\ Ours w/ patch discrim. & 46.02 & \cstress{42.90} & 0.05 & 11.03 & \cstress{91.77} & 8.22 & 0.00 & 0.01 \\ Ours (dilated discrim.) & 1.00 & \cstress{\textbf{98.57}} & 0.41 & 0.02 & \cstress{\textbf{100.00}} & 0.00 & 0.00 & 0.00 \\ \bottomrule \end{tabular} \vspace{-2mm} \end{table} \begin{table}[t] \centering \setlength{\twidth}{0.135\linewidth} \begin{tabular}{c|cc|cc|cc} Input & DiscoGAN & & CycleGAN & & Ours & \\ \includegraphics[width=\twidth,frame] {images_cropped/00000232.jpg} & \includegraphics[width=\twidth,frame] {images_cropped/00000233.jpg} & \includegraphics[width=\twidth,frame]{figures/cycle_or_ours/seg_demo/discogan/DiscoGAN_single_mask_0_bettercolors.png} & \includegraphics[width=\twidth,frame]{images_cropped/00000234.jpg} & \includegraphics[width=\twidth,frame]{figures/cycle_or_ours/seg_demo/cyclegan/testA_0_out_single_bettercolors.png} & \includegraphics[width=\twidth,frame]{images_cropped/00000235.jpg} & \includegraphics[width=\twidth,frame]{figures/cycle_or_ours/seg_demo/ours/testA_0_out_single_bettercolors.png} \end{tabular} \caption{Example segmentation masks from DeepLabV3 for Table~\ref{tab:AblationCatDogBody} for Cat\textrightarrow Dog. {\color{red}{Red}} denotes the cat class, and {\color{blue}{blue}} denotes the intended dog class.} \label{tab:segDemo} \vspace{-0.5cm} \end{table} \begin{table}[t] \centering \setlength{\twidth}{0.15\linewidth} \newcommand{\tableTitleSize}[1]{\scriptsize{#1}} \newcolumntype{P}[1]{>{\centering\arraybackslash}p{#1}} \caption{In qualitative comparisons, GANimorph outperforms all of its ablated versions. For instance, our approach better resolves fine details (e.g., second row, cat eyes) while also better translating the overall shape (e.g., last row, cat nose and ears).} \label{tab:AblationCatDogBodyQualitative} \vspace{-2mm} \setlength\tabcolsep{0.5pt} \renewcommand{\arraystretch}{0.05} \begin{tabular}{*{6}{P{\twidth}}} \tableTitleSize{Input} & \tableTitleSize{No FM Loss} & \tableTitleSize{L1 Loss} & \tableTitleSize{Patch \mbox{Discrim}} & \tableTitleSize{FC \mbox{Discrim}} & \tableTitleSize{Ours} \\ \includegraphics[frame,width=\twidth,]{images_cropped/00000236.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000237.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000238.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000239.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000240.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000241.jpg} \\ \includegraphics[frame,width=\twidth,]{images_cropped/00000242.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000243.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000244.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000245.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000246.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000247.jpg} \\ \includegraphics[frame,width=\twidth,]{images_cropped/00000248.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000249.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000250.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000251.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000252.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000253.jpg} \\ \includegraphics[frame,width=\twidth,]{images_cropped/00000254.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000255.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000256.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000257.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000258.jpg} & \includegraphics[frame,width=\twidth,]{images_cropped/00000259.jpg} \end{tabular} \vspace{-2mm} \end{table} \subsection{Quantitative Study} To quantify GANimorph's translation ability, we consider classification-based metrics to detect class change, e.g., whether a cat was successfully translated into a dog. Since there is no per pixel ground truth in this task for any real-world datasets, we cannot use Fully Convolution Score. Using Inception Score~\cite{salimans2016fm} is uninformative since simply outputting the original image would score highly. Further, similar to adversarial examples, CycleGAN is able to convince many classification networks that the image is translated even though to a human the image appears untranslated: all CycleGAN results from Table \ref{fig:petfaces} convince both ResNet50~\cite{he2015resnet} and the traditional segmentation network of Zheng et al.~\cite{zheng2015conditional}, even though the image is unsuccessfully translated. However, semantic segmentation networks that model multi-scale properties can distinguish CycleGAN's `adversarial examples' from true translations, such as DeepLabV3~\cite{chen2017deeplabv3} (trained on PascalVOC 2012 and using dilated convolutions itself). As such, we run each test image through the DeepLabV3 network to generate a segmentation mask. Then, we compute the percent of non-background-labeled pixels per class, and average across the test set (Table \ref{tab:AblationCatDogBody}). Our approach is able to more fully translate the image in the eyes of the classification network, with images also appearing translated to a human (Table \ref{tab:segDemo}). \subsection{Ablation Study} We use these quantiative settings for an ablation study (Table \ref{tab:AblationCatDogBody}). First, we removed MS-SSIM to leave only L1 ($\mathcal{L}_{\textnormal{SS}}$, Eq.~\ref{eqn:GGANtot}), which causes our network to mode collapse. Next, we removed feature match loss, but this decreases both our segmentation consistency and the stability of the network. Then, we replaced our dilated discriminator with a patch discriminator. However, the patch discriminator cannot use global context, and so the network confuses facial layouts. Finally, we replace our dilated discriminator with a fully connected discriminator. We see that our generator architecture and loss function allow our network to outperform DiscoGAN even with the same type of discriminator (fully connected). Qualitative ablation study results are shown in Table~\ref{tab:AblationCatDogBodyQualitative}. The patch based discriminator translates texture well, but fails to create globally-coherent images. Decreasing the information flow by using a fully-connected discriminator or removing feature match leads to better results. Maximizing the information flow ultimately leads to the best results (last column). Using L1 instead of a perceptual cyclic loss term leads to mode collapse. \section{Discussion} There exists a trade off in the relative weighting of the cyclic loss. A higher cyclic loss term weight $\lambda_{cyc}$ will prevent significant shape change and weaken the generator's ability to adapt to the discriminator. Setting it too low will cause the collapse of the network and prevent any meaningful mapping from existing between domains. For instance, the network can easily hallucinate objects in the other domain if the reconstruction loss is too low. Likewise, setting it too high will prevent the network from deforming the shape properly. As such, an architecture which could modify the weight of this term at test time would prove valuable for user control over how much deformation to allow. One counter-intuitive result we discovered is that in domains with little variety, the mappings can lose semantic meaning (see supplemental material). One example of a failed mapping was from celebA to bitmoji faces \cite{taigman2016emoji}. Many attributes were lost, including pose, and the mapping fell back to pseudo-stegano\-graphic encoding of the faces~\cite{chu2017cyclesteg}. For example, background information would be encoded in color gradients of hair styles, and minor variations in the width of the eyes were used similarly. As such, the cyclic loss limits the ability of the network to abstract relevant details. Approaches such as relying on mapping the variance within each dataset, similar to Benaim et al.~\cite{benaim2017distancegan}, may prove an effective means of ensuring the variance in either domain is maintained. We found that this term over-constrained the amount of shape change in the target domain; however, this may be worth further investigation. Finally, trying to learn each domain simultaneously may also prove an effective way to increase the accuracy of image translation. Doing so allows the discriminator(s) and generator to learn how to better determine and transform regions of interest for either network. Better results might be obtained by mapping between multiple domains using parameter-efficient networks (e.g., StarGAN~\cite{choi2017stargan}). \vspace{-0.25cm} \section{Conclusion} \vspace{-0.1cm} We have demonstrated that reframing the discriminator's role as a semantic segmenter allows greater shape change with less image artifacts. Further, that training with a perceptual cyclic loss and that adding explicit multi-scale features both help the network to translate more complex shape deformation. Finally, that training techniques such as feature matching loss and scheduled loss normalization can increase the performance of translation networks. In summary, our architecture and training changes allow the network to go beyond simple texture transfer and improve shape deformation. This lets our GANimorph system perform challenging translations such as from human to anime and feline faces, and from cats to dogs. The source code to our GANimorph system and all datasets are online: \href{https://github.com/brownvc/ganimorph/}{https://github.com/brownvc/ganimorph/}. \vspace{-0.1cm} \paragraph{Acknowledgement:} Kwang~In~Kim thanks RCUK EP/M023281/1, and Aaron Gokaslan and James Tompkin thank NVIDIA Corporation. \bibliographystyle{splncs04}
\section{Introduction} \label{s.intro} Transverse momentum spectra are of theoretical interest for many reasons, and processes with an electromagnetic hard scale like Drell-Yan scattering (DY) and semi-inclusive deeply inelastic scattering (SIDIS) are ideal clean probes of the underlying hadronic correlation functions. In many efforts dedicated specifically to probing the details of hadronic structure, the hard scales involved are relatively low or moderate, making a distinction between the different regions delicate. In this article, we will focus on SIDIS, $$l(l) + \text{Proton}(P) \to l^{\prime}(l^{\prime})+ \text{Hadron}(P_H) + X,$$ wherein a single identified hadron with momentum $P_H$ is observed in the final state. The virtuality of the space-like momentum $q\equiv l^{\prime}-l$ is used to define a hard scale $Q\equiv \sqrt{-q^2}$ for the process. For us, the phrase ``transverse momentum'' is $\T{q}{}$, the transverse momentum of the virtual photon in a frame where $P$ and $P_H$ are back- to-back. (See \sref{partonkin} for a detailed overview of our notation.) When the SIDIS cross section is differential in both $\Tsc{q}{}$ and $z$, it displays the relative contributions from different underlying physical mechanisms for transverse momentum generation. For the purposes of this article, we are interested in cases where $z$ is large enough to be in the current fragmentation region, wherein it can be associated with a fragmentation function (FF). Then there are a further three transverse momentum subregions, each with its own physical interpretation: \begin{enumerate} \item When the transverse momentum is very small (between $0$ and a scale of order a hadron mass), it is usually understood to have been generated by non-perturbative processes intrinsic to the incoming proton or outgoing measured hadron. This is the transverse momentum dependent (TMD) factorization region, and it has attracted major attention in recent years due to its connection to intrinsic non- perturbative properties of partons inside hadrons. (See Refs.~\cite{Collins:1981uw,Collins:1981uk, Collins:1981tt,Collins:1984kg} for the Collins-Soper-Sterman (CSS) formalism, and Refs~\cite{Collins:2011qcdbook} for the updated version of TMD factorization by Collins. See a recent review, Ref.~\cite{Rogers:2015sqa}, by one of us, which contains more references. For approaches rooted in soft-collinear effective theory, see especially Refs.~\cite{GarciaEchevarria:2011rb,Echevarria:2016scs, Luebbert:2016itl,Li:2016axz,Li:2016ctv,Scimemi:2017etj,Gutierrez-Reyes:2018qez}.) TMD factorization theorems apply to the limit of $\Tsc{q}{} \ll Q$ since neglected terms are suppressed by powers of $\Tscsq{q}{}/Q^2$. \item At still small but somewhat larger transverse momenta, there is a regime where $\Lambda_{\rm QCD}^2 \ll \Tscsq{q}{} \ll Q^2$. The ratio $\Tscsq{q}{}/Q^2$ continues to be small, so the same TMD factorization methods of region 1 continue to apply. However, $\Lambda_{\rm QCD}^2/\Tscsq{q}{}$ is also small, so the transverse momentum in this region may be described largely by perturbative or semi-perturbative techniques, often in the form of resummed logarithms of transverse momentum. The general concepts of TMD parton distribution functions (PDFs) and TMD FFs remains valid, and the transition between regions 1 and 2 happens naturally as part of a general TMD factorization formalism. Therefore, it is reasonable in many contexts to just treat them as a single region, as is usually done. \item However, at even larger transverse momenta where $\Tsc{q}{} \gtrsim Q$ the $\Tscsq{q}{}/Q^2$-suppressed terms that are neglected in TMD factorization are not necessarily negligible. (Indeed, the logarithms induced by the small $\Tsc{q}{}/Q$ approximations can create large errors in the very large $\Tsc{q}{}$ regions.) In this region, the transverse momentum is probably best understood not as an intrinsic property of the hadrons, but instead as something produced directly in a process-dependent hard collision. Fortunately, in this situation there are two valid and comparable hard scales, $Q$ and $\Tsc{q}{}$, so fixed order calculations with pure collinear factorization should be very reliable. This most direct pQCD approach begins to fail if $\Tsc{q}{}$ is too small to play the role of a hard scale comparable to $Q$, and this shows up in fixed order calculations as terms that diverge as $\Tsc{q}{}/{Q} \to 0$. In that limit, one must return to the methods of regions 1 or 2. \end{enumerate} Since regions 2 and 3 both deal with the limit of $\Tsc{q}{} \gg \Lambda_{\rm QCD}$, they both might reasonably be referred to as ``large transverse momentum'' regions. However, it is important to keep the distinction between them clear, particularly for this paper. The former uses the $\Tsc{q}{}/Q \ll 1$ approximations of TMD factorization while the latter does not. In this paper, ``large transverse momentum'' will always refer specifically to region 3. See~\cite{Bacchetta:2008xw} for more details on the matching between different types of behavior at large and small transverse momentum and~\cite{Anselmino:2006rv} for an early phenomenological perspective. SIDIS is fully understood only after each of these three subregions is understood on its own and only after it is clear how they match onto one another for the full range of kinematical scales from small to large $Q$. Most especially, identifying properties of transverse momentum dependence that are truly intrinsic to specific hadrons requires that they be disentangled from those that are generated in process-specific hard collisions. This can be delicate, especially at the smaller values of $Q$ typical of SIDIS experiments, because the three regions enumerated above begin to be squeezed into an increasingly small range of $\Tsc{q}{}$ (see \cite{Boglione:2014oea,Collins:2017ybb}). Of course, the above classification of transverse momentum regions is not specific to SIDIS. In fact, the more common introduction to the subject of transverse momentum dependence in pQCD and its physical origins usually begins by considering processes like DY scattering. In the standard introduction, region 3 styles of calculation appear to be the more manageable scenario, given that all scales are both large and comparable so that asymptotic freedom applies and there are none of the diverging logarithms associated with $\Tsc{q}{} \to 0$ limit. (See, for example, chapter 5.6 of \cite{Field:1989uq} and chapter 9.1 of \cite{Ellis:1996qj}.) As long as both the $l^+ l^-$ mass $Q$ and the center-of-mass transverse momentum $\Tsc{q}{}$ are comparably large, one expects these calculations to be at least very roughly consistent with measurements. Away from very large hard scales (such as weak boson mass scales, $Q \gtrsim 80$~GeV) the number of more recent phenomenological studies designed specifically to test region 3 calculations on their own merits is surprisingly small. But understanding the transition to the $\Tsc{q}{} \sim Q$ region is important for clarifying the general nature of transverse momentum dependence in processes like SIDIS, especially for more moderate values of $Q$ where the transition between regions is not obvious. Furthermore, these are highly constrained calculations since the only input objects that involve prior fitting -- the PDFs and FFs -- are those taken from collinear factorization. Thus, they yield highly unambiguous predictions with no fitting parameters. However, as we will show, region 3 calculations that use modern PDF and FF sets do not in general produce even roughly successful predictions in SIDIS, even for values of $x$, $z$, $Q^2$ and transverse momentum where the expectation is that fixed order calculations should be very reliable. We will discuss further the delineation between different regions in \sref{partonkin}, where we will also explain our notation. In \sref{results}, we will show examples of large transverse momentum behavior compared with existing data and find that for moderate $x$, moderate $z$, $Q$ of a few GeVs, and $\Tsc{q}{} \gtrsim Q$, existing data are poorly described by both leading order or next-to-leading order calculations. In \sref{conc}, we comment on our observations. \section{Factorization and regions of partonic kinematics} \label{s.partonkin} We will express quantities in terms of the conventional kinematical variables $z \equiv P_H \cdot P/ (P \cdot q)$ and $x\equiv Q^2/2P\cdot q$. $\T{P}{H,}$ is the Breit frame transverse momentum of the produced hadron, and $P$ and $q$ are the four-momenta of the incoming target hadron and the virtual photon respectively. We assume that $x$ and $1/Q$ are small enough that both the proton, final state hadron, and lepton masses can be dropped in phase space factors. (A word of caution is warranted here, since the values of $Q$ for the experiments we examine here can be quite low. In the future, target and hadron mass effects should be examined in greater detail using methods such as those discussed in Refs.~\cite{Brady:2011uy,Guerrero:2015wha}.) As mentioned in the introduction, it is useful to express transverse momentum in terms of \begin{equation} \T{q}{} = -\frac{\THD{P}}{z} \, . \label{e.qtdef} \end{equation} In a frame where the incoming and outgoing hadrons are back-to-back, $\T{q}{}$ is the transverse momentum of the virtual photon. \begin{figure} \centering \centering \begin{tabular}{c@{\hspace*{5mm}}c} \multicolumn{2}{c}{ \includegraphics[scale=0.45]{gallery/graph_2toN} } \\ \multicolumn{2}{c}{(a)} \\ \includegraphics[scale=0.45]{gallery/graph_2to2} \hspace{0.5cm} & \hspace{0.5cm} \includegraphics[scale=0.45]{gallery/graph_2to3} \\ (b) & (c) \end{tabular} \caption{Momentum labeling in amplitudes for $2 \to N$ partonic scattering kinematics. The dashed lines represent partons of unspecified type and flavor. The dot on the end of $k_1$ is to indicate this is the parent parton of the detected hadron. The other momenta are integrated in SIDIS. All final state lines are meant to represent energetic but mutually highly non-collinear massless partons. If two lines become nearly collinear, it should be understood that they merge into a single line. If a line becomes soft, it is simply to be removed. In both cases $2 \to N$ kinematics reduce to $2 \to N-1$ kinematics. (a) is a general $2 \to N$ amplitude. For perturbatively large $\Tsc{P}{H}$, $N \geq 1$ and the lowest order contribution is $\order{\alpha_s}$, corresponding to the $2\to2$ kinematics in (b). We will consider in addition the $2 \to 3$ kinematics in (c), which appear at $\order{\alpha_s^2}$. } \label{f.basickinematics} \end{figure} \begin{figure} \includegraphics[scale=0.5]{gallery/graph_2to1hand} \caption{Figure \ref{f.basickinematics}(a) reduces to this handbag structure when $|k^2| \sim \Lambda_{\rm QCD}^2$. The $k$ line becomes part of the target parton, and the lower blob is part of a PDF in the square-modulus amplitude integrated over final states.} \label{f.hand} \end{figure} The factorization theorem that relates the hadronic and partonic differential cross sections in SIDIS at large $\THD{P}$ is \begin{equation} 4 P_{\rm H}^0 E^\prime \frac{\diff{\sigma}{}}{\diff{^3 {\bf l}{'}} \, \diff{^3 {\bf P}_{H} }} = \int_{x}^{1} \frac{\diff{\xi}}{\xi} \int_{z}^{1} \frac{\diff{\zeta}}{\zeta^2} \left( 4 k_1^0 E^\prime \frac{\diff{\hat{\sigma}_{ij}}{}}{\diff{^{3} {\bf l}{'}} \, \diff{^{3} {\bf k} _1 }} \right) f_{i/P}(\xi;\mu) d_{H/j}(\zeta;\mu) \, + O(\Lambda_{\rm QCD}^2/q_{\rm T}^2) \, . \label{e.xsecfact} \end{equation} The $1/\xi$ is from the partonic flux factor, and the 1$/\zeta^2$ is from the conversion between ${\bf k}_1$ and ${\bf P}_{H}$. The indices $i$ and $j$ denote, respectively, the flavors of the initial parton in the proton and of the outgoing fragmenting parton, and a sum over j and i are implied. The incoming and outgoing parton momenta $p$ and $k_1$ satisfy $p=\xi P$ and $k_1=P_H/\zeta$. (Indices $i$ and $j$ for incoming and outgoing partons $p_i$ and $k_{1,j}$ will not be shown explicitly on the momenta but are understood). $f_{i/P}(\xi;\mu)$ and $d_{H/j}(\zeta;\mu)$ are the collinear parton distribution and fragmentation functions respectively, with a renormalization group scale $\mu$. It is also useful to define partonic variables \begin{equation} \hat{x}\equiv \frac{Q^2}{2p\cdot q} = \frac{x}{\xi} \, , \qquad \hat{z} \equiv \frac{k_1\cdot p} {p\cdot q} = \frac{z}{\zeta} \, , \qquad \Tsc{k}{1}\equiv \frac{\Tsc{P}{H,}}{\zeta} \, . \end{equation} Note that at large transverse momentum, the cross section starts at order $\order{\alpha_s}$ which is finite and well-behaved for $\Tsc{q}{} > 0$. The possible kinematical scenarios at $\Tsc{q}{} \sim Q$ for the partonic sub cross section in the integrand on the right-hand side of \eref{xsecfact} are sketched in \fref{basickinematics}. The dashed lines represent generic parton momenta in that all are assumed to be massless and highly non-collinear, but the exact identities of the partons are left unspecified. The large $q_{\rm T}$ factorized cross section in \eref{xsecfact} has power corrections suppressed by $1/\Tscsq{q}{}$, or $1/Q^2$ when $\Tsc{q}{} = \order{Q}$. Those corrections are not negligible in the small $\Tsc{q}{}$ limit. In that limit, the cross section is best described in terms of TMD factorization, wherein the power corrections are $O(\Tscsq{q}{}/Q^2)$. The first term in \eref{xsecfact} contains contributions that would be counted as power suppressed in the $\Tsc{q}{}/Q \to 0$ limit, so \eref{xsecfact} cannot generally be inferred from the high transverse momentum behavior of TMD factorization results. Since transverse momentum is frame dependent, characterizing its size requires some clarification. In light of the outline of regions in \sref{intro}, we must ask what criteria generally need to be satisfied for a transverse momentum to be considered large or small. For this, define \begin{equation} k \equiv k_1 -q \, . \end{equation} The $k$ momentum would be the target parton momentum in the small transverse momentum limit where $k^2 \approx 0$ and the parton model $2 \to 1$ subprocess $\gamma^* q \to q$ applies. (See \fref{hand}.) Note that in \fref{basickinematics}(a), however, all the final state particles are at wide angles relative to one another, so internal propagators are off shell by order $Q^2$. It will also be useful to define \begin{equation} k_X \equiv p + q - k_1 \, . \end{equation} Note that in \fref{basickinematics}(b) $k_X^2 = 0$. Within the blob in \fref{basickinematics}(a), two basic forms of propagator denominators may arise: \begin{align} &{} \frac{1}{k^2 + \order{\Lambda_{\rm QCD}^2}} \, , \label{e.denomsizes1} \\ &{} \frac{1}{k^2 + \order{Q^2}} \, . \label{e.denomsizes2} \end{align} In \eref{denomsizes1}, the $\order{\Lambda_{\rm QCD}^2}$ terms are very small mass scales associated with non-perturbative physics. Equation~\eqref{e.denomsizes2} involves either the virtual photon vertex or emissions corresponding to (the wide-angle) $k_X$. Note that $k \cdot q \sim q \cdot p = \order{Q^2}$. These propagator denominators illustrate the sort of power counting arguments necessary to justify the relevant factorization approximations in each region of partonic kinematics outlined in the introduction. For instance, when $|k^2| \approx \Lambda_{\rm QCD}^2$, the $k$-line is nearly on-shell and collinear to the target proton. So it should then be considered part of the proton blob, and the relevant physical picture becomes the handbag topology in \fref{hand} with $k$ now playing the role of the target parton. The $\Tscsq{q}{}/Q^2 \ll 1$ approximations that lead to TMD factorization apply here. Namely, the $k^2$ in \eref{denomsizes2} can be neglected relative to the $\order{Q^2}$ terms, although no small $k^2$ approximations are appropriate for \eref{denomsizes1}. When $|k^2| \approx Q^2$, the $\order{\Lambda_{\rm QCD}^2}$ terms can be neglected in \eref{denomsizes1} and all of the blob in \fref{basickinematics}(a) can be calculated in pQCD with both $Q^2$ and $k^2$ acting as hard scales. Of course, it is then no longer appropriate to neglect $k^2$ relative to $Q^2$ terms in \eref{denomsizes2}, so this is the large transverse momentum region 3. Explicit diagrammatic calculations, keeping small masses, easily confirm that the coefficients of the $\order{Q^2}$ and $\order{\Lambda_{\rm QCD}^2}$ terms in \erefs{denomsizes1}{denomsizes2} are simple numerical factors not radically different from 1. Moreover, this generalizes to entire diagrams including propagator numerators. Thus, the ratio $|k^2|/Q^2$ is the relevant Lorentz invariant measure of the size of transverse momentum, in the sense that it should be much less than $1$ for the small transverse momentum approximations to be accurate. Calculating it in terms of $\hat{z}$, $ \Tscsq{q}{}$ and $Q^2$, \begin{equation} \left| \frac{k^2}{Q^2} \right| = 1-\hat{z} + \hat{z} \frac{\Tscsq{q}{}}{Q^2} \, . \label{e.rattm} \end{equation} For current fragmentation, $z$ is fixed at some value not too much smaller than $1$. (In practice it is often assumed to be between approximately $0.2$ and $0.8$.) In the integral over $\zeta$, $z < \hat{z} < 1$ so \begin{equation} \frac{\Tscsq{q}{}}{Q^2} < \left| \frac{k^2}{Q^2} \right| < 1 - z \parz{1 - \frac{\Tscsq{q}{}} {Q^2}} \, , \label{e.rat2} \end{equation} assuming $\Tsc{q}{} < Q$. So, for any $z$ in the current region, $\Tscsq{q}{}/Q^2 \ll 1$ signals the onset of the TMD factorization region while $\Tscsq{q}{}/Q^2 \sim 1$ signals the onset of the large transverse momentum region where fixed order pQCD is optimal. That is, $\Tscsq{q}{}/Q^2 \ll 1$ implies region 1 or 2 of the introduction, while $\Tscsq{q}{}/Q^2 \gtrsim 1$ implies region 3. This establishes that it is the magnitude of $\T{q}{}$ specifically, defined in \eref{qtdef}, that is most useful for assessing the transition between different regions. Another way to estimate the boundary between large and small transverse momentum is to recall that the region 1 and 2 methods of calculating are the result of a small $\Tsc{q}{}$ approximation. Thus, one may examine the effect of that approximation in specific fixed order calculations. For SIDIS at $\order{\alpha_s}$ in the small $\Tscsq{q}{}/Q^2 \to 0$ limit, the cross section is proportional to \begin{equation} d(z;\mu) \int_x^1 \frac{\diff{\xi}}{\xi} f(\xi;\mu) P(x/\xi) + f(x;\mu) \int_z^1 \frac{\diff{\zeta}}{\zeta} d(\zeta;\mu) P(z/\zeta) + 2 C_F f(x;\mu) d(z;\mu) \parz{\ln \parz{\frac{Q^2}{\Tscsq{q}{}}} - \frac{3}{2}} \, . \label{e.asym} \end{equation} where the functions $P$ are lowest order splitting functions and sums over flavors are implied. (See, for example, Eq.~(36) of~\cite{Nadolsky:1999kb}.) The appearance of the logarithm is a consequence of approximations specific to the small $\Tsc{q}{}$ limit. The actual fixed order calculation of the cross section from which this is obtained is positive everywhere. Therefore, the $\Tscsq{q}{}/Q^2 \to 0$ approximation is surely inappropriate once $\Tscsq{q}{}$ is so large that the cross section as calculated in \eref{asym} becomes significantly negative. If the first two terms of \eref{asym} are of order unity or less, then this happens when $\Tsc{q}{} \gtrsim Q$. One can use \eref{asym} to estimate where region 3 methods are definitely needed. Specific calculations in \cite{Boglione:2014oea} show values of $\Tsc{q}{}$ above which the cross section goes negative in typical calculations. For example, Fig.~1 of \cite{Boglione:2014oea} suggests that the change of sign occurs before $\Tsc{q}{} \sim Q/2$ in typical SIDIS kinematics. (This further establishes $\Tscsq{q}{}/Q^2$ as the relevant transverse momentum ratio.) Another question is whether, for a particular combination of $x$ and $z$, the large $\Tsc{q}{}$ calculation should be expected to be well-described by the $\order{\alpha_s}$ calculation or whether higher orders are needed. For the leading $\order{\alpha_s}$ large transverse momentum cross section, the partonic process is $2 \to 2$ with all partons massless and on-shell (\fref{basickinematics}(b)), i.e., $k_X^{2\,\,(\alpha_s)} = 0$. For the $\order{\alpha_s}$ calculation to be a good approximation, therefore, the ratio $k_X^2/Q^2$ (\fref{basickinematics}(a)) must be small enough that it does not affect the $k^2$ terms in \eref{denomsizes1} and \eref{denomsizes2}. Considering $k^2/Q^2$ but now in terms of $k_X^2$ instead of $\hat{z}$, \begin{align} \left|\frac{k^2}{Q^2} \right| = \frac{1}{1-\hat{x}+\hat{x}q^2_{\rm T}/Q^2} \left[ \frac{q_{\rm T}^2}{Q^2} + \hat{x}\frac{k_X^2}{Q^2}\left(1-\frac{q^2_{\rm T}}{Q^2}\right) \right] \, . \label{e.ksq} \end{align} So the $k^2$ terms in \eref{denomsizes1} and \eref{denomsizes2} are nearly independent of $k_X$ if $k_X^2 /Q^2 \ll 1$. Otherwise, higher orders in $\alpha_s$ are necessary to generate the non-zero $k_X^2$. In terms of $\hat{x}$, $\hat{z}$ and $Q^2$, \begin{equation} \frac{k_X^2}{Q^2} = \frac{(1-\hat{x})(1-\hat{z})}{\hat{x}} - \hat{z} \frac{\Tscsq{q}{}}{Q^2} \, . \label{e.kXsq} \end{equation} In practice, typical $\hat{x}$ and $\hat{z}$ are largely determined by the distributions in longitudinal momentum fraction in PDFs and FFs for a particular kinematical scenario. If it turns out that they are mostly dominated by moderate values of $\hat{x}$ and $\hat{z}$, then the $k_X^2/Q^2 \ll 1$ criterion is not difficult to satisfy for large $\Tsc{q}{} \sim Q$. Then, the leading order in $\alpha_s$ can reasonably be expected to dominate at large transverse momentum. If, however, the typical $\hat{x}$ and $\hat{z}$ are much smaller than 1, then they force a large average $k_X^2$. This can create the situation that higher order corrections are larger relative to $\order{\alpha_s}$ for certain regions of transverse momentum. (If there is large sensitivity to the kinematical threshold at $k_X^2 \approx 0$, then this can also induce large higher order corrections.) Note that the shape of the transverse momentum dependence can be significantly affected by the PDFs and FFs because of the correlation between $\zeta$ and $\xi$: \begin{equation} \zeta = z \parz{ \frac{\xi - x + x \Tscsq{q}{}/Q^2}{\xi - x - x k_X^2/Q^2} } \, . \end{equation} Inclusive quantities are sensitive to the peak in the cross section at small $\Tsc{q}{}$ (and small $k_X^2$) and thus are mainly sensitive to the region where $\zeta \approx z$. Both large $\Tscsq{q}{}$ and large $k_X^2$, however, push $\zeta$ to values significantly higher than $z$. \section{Existing Measurements and Calculations} \label{s.results} Given the discussion above, we should expect to find reasonable agreement between fixed order calculations and SIDIS measurements where $\Tsc{q}{}/Q$ ratios easily exceed 1 and typical $x$ and $z$ are not such that higher orders are extremely large. This at first appears promising when considering H1~\cite{Aktas:2004rb} kinematics~\footnote{H1 is the experimental collaboration that produced the data in~\cite{Aktas:2004rb}.}, where the fixed order large-$\Tsc{q}{}$ prediction from Fig. 4 of~\cite{Daleo:2004pn} (copied here in \fref{dal}) gives a satisfactory description of $\pi^0$ production data if $\order{\alpha_s^2}$ corrections are included. An obvious concern is that the order-of-magnitude higher order corrections needed might be signaling a breakdown of perturbative convergence. But as explained in~\cite{Daleo:2004pn}, this behavior is most likely due simply to the particular kinematics of the H1 data. Indeed $5\times10^{-5} \lesssim x \lesssim 5\times10^{-3}$ for the data in~\fref{dal}. Also, the cross section is integrated over $z$ with \begin{align} z=\frac{P \cdot P_{\pi}}{P \cdot q}= \frac{2x E_p^2}{Q^2} (E_{\pi^0}/E_p) (1-\cos(\theta)) \end{align} where $E_p$, $E_{\pi^0}$ are the energies of the proton and final state $\pi^0$ and $\theta$ is the polar scattering angle relative to the incoming proton direction, all defined in the H1 laboratory frame. The data are constrained to $E_{\pi^0} / E_p > 0.01$ and $5^{\circ}< \theta < 25^{\circ}$. Using H1 kinematics, we find that the $z$ values included in~\fref{dal} can be as small as $\sim 0.001$. See section IV of~\cite{Daleo:2004pn} for more on the role of H1 cuts in producing \fref{dal}. A calculation similar to~\cite{Daleo:2004pn} was performed in~\cite{Kniehl:2004hf} with similar results. The small values of $z$ are cause for caution. This is a region where a description of non-perturbative properties in terms of fracture functions (see, e.g.,~\cite{Trentadue:1993ka,Kotzinian:2013kra} and also applications to SIDIS in~\cite{Daleo:2003xg,Daleo:2003jf}) is more appropriate. One consequence of the small $z$ values is that $\Tsc{q}{} = \Tsc{P}{H,}/z$ is very large for each $\Tsc{P}{H,}$ point in \fref{dal}, so even the smallest transverse momenta in the plots correspond to very large transverse momenta by the criterion of \eref{rat2}. So it is maybe reasonable to expect that the full range of transverse momentum observable in \fref{dal} corresponds to region 3 large transverse momentum. Also, for most of the range of the integrals over $\zeta$ and $\xi$ in \eref{xsecfact}, $\hat{x}$ and $\hat{z}$ are close to zero, but with a large contribution at $\hat{x} \approx 1$. Given \erefs{ksq}{kXsq}, therefore, it is perhaps not surprising that $\order{\alpha_s^2}$ calculations actually dominate since they are needed to produce the large $k_X^2/Q^2$. The question then, however, is whether fixed order SIDIS calculations continue to be in reasonable agreement with measurements at more moderate $x$ and $z$ and at large $\Tsc{q}{}$, where the expectation is that agreement should improve, at least with the inclusion of $\order{\alpha_s^2}$ corrections. Figure~\ref{f.dalcomp}, shows that this is not the case, however. The order $\order{\alpha_s}$ and $\order{\alpha_s^2}$ curves are obtained with an analogous computer calculation as that used in Ref.~\cite{Daleo:2004pn} to generate \fref{dal}, but modified to be consistent with the kinematics of the corresponding experimental data. (We have verified that the curves in \fref{dal} are reproduced.) The data are from recent COMPASS measurements for charged hadron production~\cite{Aghasyan:2017ctw}. Neither leading order nor next-to-leading order calculations give reasonable agreement with the measurements, even for moderate $x$, $z$ and $\Tsc{q}{} > Q$, as both systematically undershoot the data, most significantly at the more moderate values of $x$ close to the valence region. \begin{figure} \includegraphics[scale=0.85]{gallery/daleo} \caption{Fig.~4 from~\cite{Daleo:2004pn}. The differential cross section was integrated over $x$, $z$ and bins of $Q$ with H1 cuts, calculated with both leading order and next-to-leading order, and compared with $\pi^0$ production data from~\cite{Aktas:2004rb}. Here $p_T$ corresponds to our $\Tsc{P}{H,}$ -- see \eref{qtdef}. Note the large correction from $\order{\alpha_s^2}$.} \label{f.dal} \end{figure} \begin{figure} \includegraphics[width=0.75\paperwidth]{gallery/dalcompass} \caption{Calculation of $O(\alpha_s)$ and $O(\alpha_s^2)$ transversely differential multiplicity using code from~\cite{Daleo:2004pn}, shown as the curves labeled DDS (for Daleo-de Florian-Sassot). The bar at the bottom marks the region where $\Tsc{q}{} > Q$. The PDF set used is CJNLO~\cite{Accardi:2016qay} and the FFs are from~\cite{deFlorian:2007ekg}. Scale dependence is estimated using $\mu=\left((\zeta_{Q} Q)^2+(\zeta_{q_{\rm T}}q_{\rm T})^2\right)^{1/2}$ where the band is constructed point-by-point in $q_{\rm T}$ by taking the min and max of the cross section evaluated across the grid $\zeta_{Q}\times \zeta_{q_{\rm T}}=[1/2,1,3/2,2]\times[0,1/2,1,3/2,2]$ except $\zeta_{Q}=\zeta_{q_{\rm T}}=0$. The red band is generated with $\zeta_{Q}=1$ and $\zeta_{q_{\rm T}}=0$. A lower bound of $1$~GeV is place on $\mu$ when $Q/2$ would be less than $1$~GeV. } \label{f.dalcomp} \end{figure} At smaller $x$ the disagreement lessens, as might be expected given the trend in \fref{dal}. To highlight the valence region ($x \gtrsim 0.1$) at the larger values of $Q$, we have plotted the ratio between data and theory in \fref{compassrat} for three particular kinematic bins from \fref{dalcomp}. Even including the $\order{\alpha_s^2}$ correction, the deviation is typically well above a factor of $2$, even for $\Tsc{q}{}$ significantly larger than $Q$. In this context it is also worth considering Fig.~8 of \cite{Kniehl:2004hf}, which is for similar kinematics to \fref{dal} but for charged hadrons measured at ZEUS~\cite{Derrick:1995xg}. The next-to-leading order $K$ factor is $\gtrsim 1.5$ for large transverse momentum. \begin{figure} \includegraphics[width=0.6\paperwidth]{gallery/compass17-rat} \caption{Ratio of data to theory for several near-valence region panels in \fref{dalcomp}. The grey bar at the bottom is at $1$ on the vertical axis and marks the region where $\Tsc{q}{} > Q$.} \label{f.compassrat} \end{figure} \begin{figure} \includegraphics[width=0.7\paperwidth]{gallery/hermes} \caption{Calculation analogous to \fref{dalcomp} but for $\pi^+$ production measurements from~\cite{Ma:2015lka}. } \label{f.dalcompherm} \end{figure} \begin{figure} \includegraphics[width=0.55\paperwidth]{gallery/hermes-rat} \caption{Ratio calculation analogous to \fref{compassrat} but for $\pi^+$ production measurements from~\cite{Ma:2015lka}.} \label{f.dalcomphermrat} \end{figure} At least one other set of SIDIS data at somewhat different kinematics exhibits the same trend. This is the set of HERMES measurements of $\pi^+$ multiplicities~\cite{Ma:2015lka} shown in \fref{dalcompherm}. Note that the kinematics very much correspond to the valence region for the target. Figure~\ref{f.dalcomphermrat} shows that the failure to match the data is even more pronounced than in the COMPASS case. Even for $Q > 3$~GeV and $\Tsc{q}{} > Q$, the difference is nearly an order of magnitude. \section{Discussion} \label{s.conc} We have argued that there is tension between existing fixed order pQCD calculations and at least two sets of large transverse momentum measurements where those calculations should be reasonably accurate, and that this disagreement is too large to be attributable to $\Tsc{q}{}$ being too small. Thus, it appears to us to be a genuine mystery that needs attention, especially for TMD phenomenology. The TMD formalism relies on approximations that apply only in the $\Tsc{q}{}/Q \to 0$ limit, so it is critical to have an alternative approach to describe the transition to very large transverse momentum. If standard fixed order collinear pQCD is not adequate for this, then something new is needed. It is worth pointing out that one encounters similar problems in Drell-Yan scattering, where a lowest order calculation with current PDF sets is easily found to undershoot the lowest available $Q$ data by very large factors. It is less clear how to interpret the disagreement here, however, since most of the existing data for lower $Q$ regions are close to the threshold region and including threshold resummation introduces extra subtleties. The observations of this article have focused on unpolarized cross sections, but the implications extend to spin and azimuthally dependent cross sections, since the key issue is the relevance of different types of transverse momentum dependence. There are a number of possible resolutions that deserve further investigation. An interesting one is that the hadronization mechanism is different in high-transverse- momentum SIDIS from the usual picture in terms of universal FFs. Models used in Monte Carlo event generators might be a source of ideas regarding this possibility. In the context of this possibility, it is noteworthy that much of the data for SIDIS transverse momentum dependence is describable in a Gaussian model of TMDs~\cite{Anselmino:2013lza,Signori:2013mda}. In pQCD, there are also arguments that certain higher twist correlation functions actually dominate over leading twist functions. In this picture, the $q \bar{q}$ pair that ultimately forms the final state is directly involved in the hard part~\cite{Ma:2015lka,Kang:2014pya}. It is possible that threshold effects are important ~\cite{deFlorian:2013taa,Westmark:2017uig}. If that is the case, then there are serious implications for TMD studies, because additional non-perturbative effects beyond those associated with intrinsic transverse momentum can then be important ~\cite{Collins:2007ph}. However, the largest $x$ and $z$ in \fref{compassrat} and \fref{dalcomphermrat}, where the disagreement is the worst, corresponds to valence regions of $x$ and $z$, well away from kinematics where partonic kinematics are close to kinematical thresholds for most $\xi$ and $\zeta$. Furthermore, this would contradict the observation in \fref{dal} that fixed order corrections alone succeed in describing data, even for very small $x$ and $z$. Another possibility is that FFs and/or PDFs are not well-enough constrained to handle the particular kinematical scenarios that arise at large $\Tsc{q}{}$. To see that this is plausible, consider the large $\Tsc{q}{}$ observable \begin{equation} \frac{\diff{\sigma}{} }{\diff{Q^2} \diff{x} \diff{z} \diff{\Tscsq{q}{}}} \sim \int_{\xi_{\rm min}}^1 \diff{\xi}{} f\parz{\xi} d\parz{\zeta=z \parz{1 + \frac{x \Tscsq{q}{}}{(\xi - x) Q^2}}} \, , \label{e.ob1} \end{equation} where the ``$\sim$'' is to indicate the combination of PDF and FF that appear in fixed order pQCD calculations at large transverse momentum and lowest order. The minimum final state momentum fraction is \begin{equation} \xi_{\rm min} = x \parz{1 + \frac{z \Tscsq{q}{} }{(1 - z)Q^2}} \, . \end{equation} Note that small $\xi$ ($\xi \approx x$) tends to select the large $\zeta \gg z$ region and vice versa, and the nature of the correlation between $\zeta$ and $\xi$ changes as $\Tsc{q}{}$ varies. Also, very large $\Tsc{q}{}$ forces $\xi_{\rm min}$ to be large. Therefore, while the hard scattering gives a characteristic power-law shape to the large $\Tsc{q}{}$ dependence, both its shape and normalization are also significantly influenced by the large $\xi$ and $\zeta$ behavior in the collinear PDFs and FFs. Note also that gluon PDFs and FFs appear in the first non-vanishing order in \eref{ob1}. Contrast that with the observable, \begin{equation} \sum_{\text{Hadron Flavors}} \int z \diff{z} \diff{\Tscsq{q}{}} \frac{\diff{\sigma}{} }{\diff{Q^2} \diff{x} \diff{z} \diff{\Tscsq{q}{}}} \ = \frac{\diff{\sigma}{} }{\diff{Q^2} \diff{x}} \sim f\parz{x} \, , \label{e.ob2} \end{equation} that is, the total DIS cross section; or with the $\Tsc{q}{}$-integrated SIDIS cross section, \begin{equation} \int \diff{\Tscsq{q}{}} \frac{\diff{\sigma}{} }{\diff{Q^2} \diff{x} \diff{z} \diff{\Tscsq{q}{}}} \ = \frac{\diff{\sigma}{} }{\diff{Q^2} \diff{x} \diff{z}} \sim f\parz{x} d\parz{z} \, . \label{e.ob3} \end{equation} In \eref{ob2}, the dominant contribution at leading order is from quark PDFs only, and is evaluated only at a single value $x$. Likewise, \eref{ob3} is only sensitive to the FF at $\zeta = z$. Of course, \eref{ob1}, \eref{ob2}, and \eref{ob3} are all for basically the same process, but in going from \eref{ob1} to \eref{ob2} or \eref{ob3} information is lost in the integrations and summations, and the sensitivity to the PDFs and FFs is consequently less detailed. Most typically, however, low-$Q$ fits that are aimed at constraining the valence region at lower $Q$ use observables like \eref{ob2} or \eref{ob3}. But \eref{ob1} scans through small to large values of $\xi$ and $\zeta$ as $\Tsc{q}{}$ varies. The question then arises whether existing fits maintain enough information to predict \eref{ob1} observables reliably. Note that it has already been suggested in the past~\cite{Berger:1998ev} to use transversely differential Drell-Yan measurements at large $\Tsc{q}{}$ and including smaller $Q$ to constrain gluon distributions. An analogous possibility applies to gluon FFs at large $\zeta$ in large transverse momentum SIDIS or back-to-back hadron pair production in $e^+ e^-$ annihilation. To test this, it would be informative to include the large transverse momentum behavior of lower-$Q$ but highly differential cross sections in global simultaneous fits of PDFs and FFs. It is also noteworthy that in very early calculations~\cite{Halzen:1978et} that gave rise to satisfactory fits in Drell-Yan scattering, the gluon and sea distributions used were much larger than modern ones. This suggests that contributions from gluon and sea PDFs and FFs at larger values of $x$ may need to be reassessed in light of the mismatches above. We leave further investigation of all these possibilities to future work. A resolution is an important part of the goal to understand SIDIS generally in terms of an underlying partonic picture. \begin{acknowledgments} We thank J. Collins, L. Gamberg, F. Halzen, J. Owens, J.-W. Qiu, and W. Vogelsang for very useful discussions. We thank R. Sassot for explanations regarding the code in \cite{Daleo:2004pn}. T.~Rogers's work was supported by the U.S. Department of Energy, Office of Science, Office of Nuclear Physics, under Award Number DE-SC0018106. This work was also supported by the DOE Contract No. DE- AC05-06OR23177, under which Jefferson Science Associates, LLC operates Jefferson Lab. N.~Sato was supported by DE-FG-04ER41309. B.~Wang was supported in part by the National Science Foundation of China (11135006, 11275168, 11422544, 11375151, 11535002) and the Zhejiang University Fundamental Research Funds for the Central Universities (2017QNA3007). J.~O.~Gonzalez-Hernandez work was partially supported by Jefferson Science Associates, LLC under U.S. DOE Contract \#DE-AC05-06OR23177 and by the U.S. DOE Grant \#DE-FG02-97ER41028. \end{acknowledgments}
\section{Introduction} \renewcommand*{\thetheorem}{\Alph{theorem}} The aim of this paper is to study Cartan subalgebras in uniform Roe algebras, and in particular to what extent the `standard' Cartan subalgebra is unique. Roe algebras associated to metric spaces were introduced in \cite{Roe:1993lq} for their connections to (higher) index theory and the associated applications to manifold topology and geometry \cite{Roe:1996dn,Yu:200ve}. The uniform variant of the Roe algebra has since been fairly extensively studied for its own sake, and provides an interesting bridge between coarse geometry and $C^*$-algebra theory. It is natural to ask how much of the information about a metric space is remembered by, or can be recovered from, the associated uniform Roe algebra; this line of research was initiated by \v{S}pakula and the second author in \cite{Spakula:2011bs}. Such \emph{rigidity} questions are strongly motivated by the coarse Baum-Connes conjecture and its variants \cite{Higson:1995fv,Yu:1995bv,Spakula:2009tg,Engel:2014tx}. Roughly speaking these conjectures predict that the analytic K-theory of the (uniform) Roe algebra provides a faithful model for the large scale algebraic topology of the underlying space, i.e.\ they postulate that on the level of $K$-theory, $C^*_u(X)$ retains all relevant information about $X$. If these conjectures have a positive answer, one can apply powerful analytic tools (positivity and the spectral theorem) to the study of $X$, and thus deduce important consequences in topology and geometry. This latter motivation has been made particularly stark by recent results of Braga and Farah \cite{Braga:2018dz}, who show that possible failure of rigidity is intimately tied to the existence of so-called ghost operators that are also known to cause problems for the coarse Baum-Connes conjecture (see \cite[Section 6]{Higson:2002la} and \cite[Sections 5-6]{Willett:2010ud}). \smallskip On the other hand, Cartan subalgebras have been present in the study of operator algebras since the foundational work of Murray and von Neumann. Indeed, the prototypical example of a Cartan subalgebra arises from Murray and von Neumann's group measure space construction. Reminiscent of the semidirect product construction in group theory, given a group $G$ acting by non-singular transformations on a measure space $(X,\mu)$, one constructs a single von Neumann algebra $L^\infty(X,\mu)\rtimes G$ containing a copy of $L^\infty(X,\mu)$ and so that the induced action of $G$ on $L^\infty(X,\mu)$ is by inner automorphisms. Here $L^\infty(X,\mu)$ is a Cartan subalgebra of $L^\infty(X,\mu)\rtimes G$. Abstracting the properties of the inclusion $L^\infty(X,\mu)\subseteq L^\infty(X,\mu)\rtimes G$, Vershik defined the concept of a Cartan subalgebra \cite{Vershik:1971aa}, and this was extensively studied by Feldman and Moore \cite{Feldman:1977tx,Feldman:1977rd} who showed that these subalgebras correspond to (twisted) measured orbit equivalence relations. Thus Cartan subalgebras provide an operator algebraic framework for the study of dynamical systems. Moreover, a major step in understanding the range of possible group actions giving rise to the same crossed product algebra involves classifying Cartan subalgebras. Voisculescu famously showed free group factors have no Cartan subalgebras \cite{Voiculescu:1996ux}, while in the uniqueness direction, a celebrated theorem of Connes, Feldmann and Weiss shows that injective von Neumann algebras with separable predual have unique Cartan subalgebras up to automorphism \cite{Connes:1981aa}, i.e. if $A,B$ are Cartan subalgebras in an injective von Neumann algebra $M$, then there is an automorphism $\alpha$ of $M$ with $\alpha(A)=B$. In the injective setting, it will rarely be the case that this automorphism can be taken to be inner (cf.\ \cite[Theorem 7]{Feldman:1977rd}), and a major breakthrough was made by Ozawa and Popa who gave the first example of a II$_1$ factor with a unique Cartan subalgebra up to inner automorphism in \cite{Ozawa:2010sz}. Subsequently Popa's deformation-rigidity theory has been used to produce a number of striking uniqueness and non-uniqueness results for Cartan subalgebras in von Neumann factors: see for example \cite{Ozawa:2010el,Vaes:2010aa,Chifan:2013ji,Popa:2014jq,Popa:2014cu}. Corresponding notions have been developed in the setting of $\mathrm{C}^*$-algebras. Building on Kumjian's much earlier notion of a $\mathrm{C}^*$-diagonal \cite{Kumjian:1986aa}, Renault defined a Cartan pair in \cite{Renault:2008if}, showing that any such pair is isomorphic to the inclusion $C_0(G^{(0)})\subseteq C^*_r(G,\Sigma)$ of the $C_0$-functions on the unit space $G^{(0)}$ of a twisted, \'{e}tale, topologically principal groupoid $(G,\Sigma)$ into the associated twisted groupoid $C^*$-algebra. Such a decomposition is particularly useful in the nuclear case, as it implies that the universal coefficient theorem of Rosenberg and Schochet holds \cite{Barlak:2017aa}. Recently, there has been growing interest in studying general existence and uniqueness questions for Cartan subalgebras in $C^*$-algebras \cite{Li:2017aa,Carlsen:2017aa}. In contrast to the von Neumann algebraic setting, even very elementary $\mathrm{C}^*$-algebras such as dimension drop algebras and UHF-algebras have multiple Cartan subalgebras \cite{Blackadar:1990aa,Barlak:2017ab}. One key difference is that separable measure spaces are readily classified, while compact metrisable spaces are not. Indeed every non-atomic Cartan subalgebra in a von Neumann algebra with separable predual is abstractly isomorphic to $L^\infty([0,1])$. In the references above the spectrum is used to distinguish Cartan subalgebras. So in the setting of $\mathrm{C}^*$-algebras one should really only attempt to classify Cartan subalgebras with a specified spectrum. The key example relevant to this paper is the canonical Cartan subalgebra in a uniform Roe algebra. If $\Gamma$ is a countable group, the uniform Roe algebra $C^*_u(\Gamma)$ is the reduced group $\mathrm{C}^*$-algebra crossed product $\ell^\infty(\Gamma)\rtimes_r \Gamma$, where the action is by left translation. Thus uniform Roe algebras have a mixed $C^*$-algebraic (from the reduced crossed product) and von Neumann algebraic (from $\ell^\infty$) identity, which suggests they are a good candidate for pushing uniqueness of Cartan results into the $C^*$-world. The subalgebra $\ell^\infty(\Gamma)$ provides a canonical Cartan subalgebra inside $C^*_u(\Gamma)$. More generally, when $X$ is a metric space of bounded geometry, $\ell^\infty(X)$ is a Cartan subalgebra of $C^*_u(X)$; this corresponds to the description of $C^*_u(X)$ as a groupoid $C^*$-algebra due to Skandalis, Tu, and Yu, \cite{Skandalis:2002ng}. \smallskip Our aim in this paper is to study the following questions. \begin{itemize} \itemsep-.1cm \item What form can general Cartan subalgebras in a uniform Roe algebra take? This could mean what isomorphism type as an abstract $C^*$-algebra, or it could mean the more refined spatial theory of how a Cartan subalgebra can be represented on $\ell^2(X)$. \item When does an abstract Cartan pair $B\subseteq A$ come from a uniform Roe algebra? \item To what extent is the canonical Cartan subalgebra in a uniform Roe algebra unique? Here uniqueness might mean up to automorphism or more strongly up to inner automorphism, and might refer to uniqueness among some class of Cartan subalgebras satisfying additional conditions. \end{itemize} We address the first question in Section \ref{gen cart sec}, where we work in the generality of $\mathrm{C}^*$-algebras between the compact and bounded operators on a Hilbert space. Specialising our results to uniform Roe algebras we obtain the following proposition (which is a combination of the more general statements Theorem \ref{cart com the} and Proposition \ref{non sep}). \begin{proposition}\label{IntroA} Let $X$ be a countably infinite metric space of bounded geometry. Then any Cartan subalgebra $B\subseteq C^*_u(X)$ is non-separable and contains a complete family of orthonormal rank one projections for $\ell^2(X)$. \end{proposition} While Cartan subalgebras in uniform Roe-algebras must be non-separable, they do not have to be abstractly isomorphic to $\ell^\infty$, and even relatively straightforward metric spaces admit Cartan subalgebras with exotic spectra. This is the subject of Section \ref{S3}. Thus, and as expected in the $\mathrm{C}^*$-setting, we must impose additional structure such as spectral data in order to recognise the canonical Cartan subalgebra amongst all possible Cartan subalgebras of a uniform Roe algebra. We explore this in Section \ref{abs cart sec}, abstracting the following key features of the inclusion $\ell^\infty(X)\subseteq C^*_u(X)$ into the concept of a \emph{Roe Cartan pair} (see Definition \ref{roe cartan def}): \begin{itemize} \itemsep-.1cm \item containment of the compacts as an essential ideal; \item the Cartan subalgebra is abstractly isomorphic to $\ell^\infty(\mathbb N)$; \item countable generation of the containing algebra over the subalgebra (``co-separability''). \end{itemize} Such Cartan pairs can only arise from canonical Cartan subalgebras in uniform Roe algebras. \begin{theorem}\label{cart abs} Let $B\subseteq A$ be a Roe Cartan pair. Then there exists a bounded geometry metric space $Y$ such that for any irreducible and faithful representation of $A$ on a Hilbert space $H$ there is a unitary isomorphism $v:\ell^2(Y)\to H$ such that $$ v^*Bv=\ell^\infty(Y) \quad \text{and}\quad v^*Av=C^*_u(Y). $$ \end{theorem} When the algebra $A$ above is already a uniform Roe algebra associated to a metric space $X$, then it is natural to ask how $X$ and the space $Y$ produced by the previous theorem are related. Using the very recent preprint \cite{Braga:2019wv}, we have the following corollary. \begin{corollary}\label{IntroC} Let $X$ be a bounded geometry metric space that coarsely embeds into a Hilbert space. If $B\subseteq C^*_u(X)$ is a Roe Cartan pair, then the bounded geometry metric space associated to this pair by Theorem \ref{cart abs} is coarsely equivalent to $X$. \end{corollary} The hypotheses of the above theorem apply broadly. Every exact group (in the sense of Kirchberg and Wassermann \cite{Kirchberg:1999ss}) coarsely embeds into a Hilbert space by \cite[Theorem 2.2]{Yu:200ve}. Exactness of a group $\Gamma$ is characterised coarsely through Yu's property A for the associated metric space $X$, which is also equivalent to nuclearity of $C^*_u(X)$ (see \cite{Ozawa:2000th}). The class of exact groups is very large, including for example all linear groups \cite{Guentner:2005xr}, all groups with finite asymptotic dimension \cite{Higson:2000dp}, and all amenable groups; see \cite{Willett:2009rt} for a survey. In fact by \cite[Theorem 2]{Osajda:2014ys}, the class of groups which coarsely embed into a Hilbert space is strictly larger than the exact groups, and the only groups that are known not to coarsely embed into Hilbert space are the so-called \emph{Gromov monster} groups whose Cayley graphs contain expanders \cite{Gromov:2003gf,Arzhantseva:2008bv,Osajda:2014ys}. \smallskip We now turn to uniqueness results for Cartan subalgebras of Roe algebras. Any Cartan subalgebra of a uniform Roe algebra that is conjugate by an automorphism to the canonical Cartan must be a Roe Cartan, so we only ask for uniqueness for Roe Cartans. Using results of Whyte \cite{Whyte:1999uq}, we can obtain uniqueness up to automorphism whenever the space $X$ coarsely embeds into Hilbert space and is non-amenable in the sense of Block and Weinberger \cite{Block:1992qp} (when $X$ is the metric space associated to a finitely generated group, non-amenability is precisely failure of amenability of the group in the usual sense \cite[Chapter 3]{Roe:2003rw}). In particular, the following corollary (proved in Section \ref{inn sec}) applies to examples like non-abelian free groups, non-elementary word hyperbolic groups, and lattices in higher rank semi-simple Lie groups. \begin{corollary}\label{IntroD} Let $X$ be a bounded geometry metric space that coarsely embeds into a Hilbert space, and is non-amenable. Let $B\subseteq C^*_u(X)$ be a Roe Cartan subalgebra. Then there is a $^*$-automorphism $\alpha$ of $C^*_u(X)$ such that $\alpha(\ell^\infty(X))=B$. \end{corollary} Finally we turn to the strong form of uniqueness up to inner automorphism. Theorem \ref{c*-alg the} is the central result of the paper. It uses both Proposition \ref{IntroA} and Theorem \ref{cart abs} above as ingredients in its proof. Other key ingredients include the rigidity results from \cite{Spakula:2011bs}, a recent criterion for detecting when an operator lies in a uniform Roe algebra under the hypothesis of property A due to \v{S}pakula and Zhang \cite{Spakula:2018aa} (which builds on work of \v{S}pakula and Tikuisis \cite{Spakula:2017aa}), the operator norm localisation property of \cite{Chen:2008so}, and results of Braga and Farah \cite{Braga:2018dz}. \begin{theorem}\label{c*-alg the} Let $X$ be a bounded geometry metric space with property A. Let $B\subseteq C^*_u(X)$ be a Roe Cartan subalgebra. Then there is a unitary operator $u\in C^*_u(X)$ such that $uBu^*=\ell^\infty(X)$. \end{theorem} Theorem \ref{c*-alg the} gives a stronger conclusion than Corollary \ref{IntroD} in the property A case. However, as noted above there are examples where Corollary \ref{IntroD} applies and Theorem \ref{c*-alg the} does not: see for example \cite{Osajda:2014ys}. It seems plausible to us that Theorem \ref{c*-alg the} will fail without some assumption on $X$, due to the well-known exotic analytic properties of uniform Roe algebras outside of the property A setting; see for example \cite{Sako:2012kx} and \cite{Roe:2013rt}. We would be very interested in any progress towards the construction of exotic examples, or in showing that they cannot exist. \medskip \noindent\textbf{Acknowledgements.} We would like to thank Bruno Braga, Sel\c{c}uk Barlak, Ilijas Farah, Kang Li, J\'an \v{S}pakula, and Aaron Tikuisis for their helpful conversations, insights and comments on earlier versions of this paper. Part of the underlying research for this paper was undertaken during the conference Noncommutative Dimension Theories at the University of Hawai\kern.05em`\kern.05em\relax i~at M\=anoa~in 2015, and the IRP on Operator Algebras: Dynamics and Interactions at the CRM in Barcelona in 2017. We would like to thank the (other) organisers of those meetings, and the funding bodies for supporting the meetings. We would also like to thank the referees for their helpful reports. \numberwithin{theorem}{section} \section{Cartan subalgebras of $\mathrm{C}^*$-algebras containing the compacts}\label{gen cart sec} Our aim in this section is to prove some general structural results about Cartan subalgebras in $C^*$-algebras that contain the compact operators. We begin by recalling the definition of a Cartan subalgebra from \cite{Renault:2008if}. \begin{definition}\label{cart def} Let $A$ be a $C^*$-algebra. A \emph{Cartan subalgebra} of $A$ is a $C^*$-subalgebra $B\subseteq A$ such that: \begin{enumerate}[(i)] \itemsep-.1cm \item $B$ is a maximal abelian self-adjoint subalgebra (MASA) of $A$; \item $B$ contains an approximate unit\footnote{We will mainly be interested in the case that $A$ is unital, in which case condition (ii) is automatic: indeed condition (i) implies that $B$ contains the unit of $A$.} for $A$ \item the \emph{normaliser} of $B$ in $A$, defined as $$ \mathcal{N}_A(B):=\{a\in A\mid aBa^*\cup a^*Ba\subseteq B\} $$ generates $A$ as a $C^*$-algebra; \item there is a faithful conditional expectation $E:A\to B$. \end{enumerate} A \emph{Cartan pair} is a nested pair $B\subseteq A$ of $C^*$-algebras such that $B$ is a Cartan subalgebra of $A$. \end{definition} For later purposes we make the following definition. \begin{definition}\label{cosepdef} We say that a Cartan subalgebra $B$ of $A$ is \emph{co-separable} if there is a countable subset $S$ of $A$ (or equivalently of $\mathcal N_A(B)$) such that $A=C^*(S,B)$.\end{definition} We need the following routine fact. \begin{lemma}\label{new lemma} Let $A\subseteq\mathcal B(H)$ be a concrete $C^*$-algebra containing the compact operators on $H$, and let $B\subseteq A$ be a maximal abelian subalgebra. Then any minimal projection in $B$ is rank one. \end{lemma} \begin{proof} If $p\in B$ is minimal and not rank one, then there exists a rank one projection $q\in A$ with $q\leq p$. However, $q$ commutes with $B=pB\oplus (1-p)B$, a contradiction. \end{proof} \begin{lemma}\label{comp lem} Let $A\subseteq \mathcal{B}(H)$ be a concrete $C^*$-algebra containing the compact operators on $H$. Let $B\subseteq A$ be a maximal abelian subalgebra, equipped with a conditional expectation $E:A\to B$. Then for any compact operator $a\in A$, $E(a)$ is also compact. \end{lemma} \begin{proof} It suffices to show that $E(e)$ is compact for any rank one projection $e$ on $H$, which we fix from now on. First, we establish the following claim, called ($*$) in the rest of the proof: there cannot exist $\lambda>0$ such that for any $N\in \mathbb{N}$ there are positive and mutually orthogonal contractions $b_1,...,b_N$ in $B$ such that $\|b_iE(e)b_i\|\geq \lambda$ for each $i$. Indeed, if such a $\lambda>0$ exists, then find $b_1,...,b_N$ with the properties above. Let $\text{Tr}:\mathcal{B}(H)_+\to [0,\infty]$ be the canonical unbounded trace. Then we have that \begin{equation}\label{small trace} \text{Tr}\Big(\sum_{i=1}^N b_ieb_i\Big)=\Bigg|\text{Tr}\Big(\sum_{i=1}^N b_i^2e\Big)\Bigg|\leq \Bigg\|\sum_{i=1}^Nb_i^2\Bigg\|\text{Tr}(e)=1, \end{equation} where the last inequality follows as mutual orthogonality of the $b_i$ gives $\|\sum_{i=1}^Nb_i^2\|=\sup_{i=1}^N \|b_i^2\|$, and this is at most one as each $b_i$ is a contraction. On the other hand, using that $E$ is a conditional expectation (so in particular contractive) and that the $b_i$ are in $B$, we have that \begin{equation} \|b_ieb_i\|\geq \|E(b_ieb_i)\|=\|b_iE(e)b_i\|\geq \lambda \end{equation} for each $i$. Combining this with \eqref{small trace} and using $\|\cdot\|_1$ for the trace norm, we have \begin{equation} 1\geq \text{Tr}\Big(\sum_{i=1}^N b_ieb_i\Big)=\sum_{i=1}^N \|b_ieb_i\|_1\geq \sum_{i=1}^N \|b_ieb_i\|\geq N\lambda \end{equation} (the penultimate inequality follows as the trace norm is always at least as big as the operator norm). As $N$ was arbitrary, this is impossible, proving claim ($*$). We next claim that for any $\lambda>0$, the intersection of the spectrum of $E(e)$ and $[\lambda,\infty)$ must be finite. Indeed, if not, then fix $\lambda>0$ such that the intersection of the spectrum of $E(e)$ with $[\lambda,\infty)$ is infinite. For any $N$, there are continuous functions $\phi_1,...,\phi_N:\mathbb{R}\to [0,1]$ supported on $[\lambda,\infty)$, with mutually disjoint supports, and with the property that each $\phi_i$ attains the value $1$ somewhere on the intersection of the spectrum of $E(e)$ and $[\lambda,\infty)$. Setting $b_i:=\phi_i(E(e))$ the functional calculus gives us that the $b_i$ are positive, mutually orthogonal contractions with $\|b_iE(e)b_i\|\geq \lambda$ for each $i$ and so we have contradicted claim ($*$). Thus the spectrum of $E(e)$ is a countable subset of $[0,\infty)$, and the only possible limit point is $0$. Given $\lambda>0$ in this spectrum, let $p:=\chi_{\{\lambda\}}(E(e))\in B$ be the associated spectral projection. Suppose by way of reaching a contradiction that $p$ has infinite rank. By Lemma \ref{new lemma}, $p$ is not a minimal projection in $B$ so has a proper subprojection $p_1\in B$. By replacing $p_1$ with $p-p_1$ if necessary we may assume $p_1$ is also infinite rank. Repeating this argument we obtain a strictly decreasing infinite sequence $p\geq p_1\geq p_2\geq \cdots $ of infinite rank projections in $B$. Set $b_i:=p_i-p_{i-1}$. Then for any $i$, we have \begin{equation} \|b_iE(e)b_i\|\geq \frac{1}{\lambda}\|b_ipb_i\|=\frac{1}{\lambda}. \end{equation} This contradicts claim ($*$). Therefore $p$ is finite rank, and hence $E(e)$ is compact. \end{proof} \begin{lemma}\label{onb lem} Suppose that $A\subseteq \mathcal{B}(H)$ is a concrete $C^*$-algebra containing the compact operators on $H$. Let $B\subseteq A$ be a Cartan subalgebra. Then $B$ contains a complete orthogonal set of rank one projections. \end{lemma} \begin{proof} Write $E:A\to B$ for the faithful conditional expectation that comes with the fact that $B$ is a Cartan subalgebra of $A$, and let $e$ be a rank one projection. Then $E(e)$ is compact by Lemma \ref{comp lem}, and non-zero as $E$ is faithful. It follows from the spectral theorem that $B$ contains a non-zero finite rank projection, and thus a minimal non-zero finite rank projection, say $q$, which must be rank one by Lemma \ref{new lemma}. Let now $S$ be the collection of all rank one projections in $B$, which is non-empty by the above argument. As $B$ is commutative, the projections in $S$ are all mutually orthogonal, and thus the sum $p:=\sum_{q\in S} q$ converges strongly to a non-zero projection. Note that as $p$ is a strong limit of operators in $B$, it commutes with everything in $B$. We claim that in fact $p$ commutes with everything in the normaliser of $B$ in $A$. Indeed, if not, there exists $a\in \mathcal{N}_A(B)$ such that $pa(1-p)\neq 0$. The definition of $p$ thus gives a rank one projection $q$ in $B$ such that $qa(1-p)\neq 0$. Hence $(1-p)a^*qa(1-p)\neq 0$; note that this operator is positive and rank one, so a non-zero scalar multiple of a projection, say $r$. As $a$ normalises $B$, the element $r$ is in the cut-down $(1-p)B$, which is a commutative $C^*$-algebra as $p$ commutes with $B$. Now, $r$ is in $A$ as it is rank one and $A$ contains the compacts. Hence it is in $B$ as this $C^*$-algebra is maximal abelian in $A$ and as $r$ commutes with $B\subseteq pB\oplus (1-p)B$. However, $r$ is orthogonal to $p$, a contradiction. Therefore $p$ commutes with $\mathcal N_A(B)$. Finally, as $B\subseteq A$ is a Cartan subalgebra, $\mathcal{N}_A(B)$ generates $A$ as a $C^*$-algebra, and thus $p$ commutes with everything in $A$. As $A$ contains the compacts, this forces $p=1$. \end{proof} Recall that if $S$ is a subset of $\mathcal{B}(H)$, then $C^*(S)$ denotes the $C^*$-algebra generated by $S$, and $W^*(S)$ the von Neumann algebra generated by $S$. \begin{theorem}\label{cart com the} Let $A\subseteq \mathcal{B}(H)$ be a concrete $C^*$-algebra that contains the compact operators on $H$, and let $B\subseteq A$ be a Cartan subalgebra. Then there exists a complete orthogonal set of rank one projections $\{p_i\}_{i\in I}$ on $H$ such that $$ C^*(\{p_i\}_{i\in I})\subseteq B \subseteq vN(\{p_i\}_{i\in I}). $$ \end{theorem} \begin{proof} Let $\{p_i\}_{i\in I}$ be the complete set of orthogonal rank one projections in $B$ given by Lemma \ref{onb lem}. As $B$ is a $C^*$-algebra, it contains $C^*(\{p_i\})$. As $W^*(\{p_i\})$ is the maximal abelian $^*$-subalgebra of $\mathcal{B}(H)$ that contains $C^*(\{p_i\})$, $B$ is contained in $W^*(\{p_i\})$. \end{proof} Note that the conclusion of Theorem \ref{cart com the} on the structure of $B$ is best possible with those assumptions. Indeed, if $\{p_i\}_{i\in I}$ is a complete orthogonal set of rank one projections on $H$, and $B$ is a $C^*$-subalgebra of $\mathcal{B}(H)$ with \begin{equation} C^*(\{p_i\})\subseteq B\subseteq W^*(\{p_i\}) \end{equation} then $A:=B+\mathcal{K}(H)$ clearly contains $B$ as a Cartan subalgebra. On the other hand, we have the following observation giving some sufficient conditions for $B$ to equal $W^*(\{p_i\})$, which will play a role later in the paper. \begin{proposition}\label{full basis} Let $B\subseteq \mathcal{B}(H)$ be a concrete $C^*$-algebra such that there is a complete orthogonal set $\{p_i\}_{i\in I}$ of rank one projections such that \begin{equation} C^*(\{p_i\})\subseteq B\subseteq W^*(\{p_i\}). \end{equation} Assume moreover that either: \begin{enumerate}[(i)] \itemsep-.1cm \item $B$ is closed in the strong topology\footnote{When $B$ is contained in a $C^*$-algebra $A\subseteq\mathcal B(H)$ containing the compact operators as in Theorem \ref{cart com the}, this can be defined in a representation independent way using that $b_n\to b$ strongly if and only if $b_nf \to bf$ in norm for each finite rank $f\in A$; this can be made sense of in a representation independent way as the finite rank operators are the unique minimal algebraic ideal of $A$.}; or \item $B$ is abstractly $^*$-isomorphic to $\ell^\infty(X)$ for some set $X$. \end{enumerate} Then $B$ equals $W^*(\{p_i\})$. \end{proposition} \begin{proof} As the strong closure of $C^*(\{p_i\})$ equals $W^*(\{p_i\})$, part (i) is clear. For part (ii), let $\phi:B\to \ell^\infty(X)$ be an abstract $^*$-isomorphism. As $\phi$ must take the family $\{p_i\}_{i\in I}$ of minimal projections in $B$ bijectively to the family $\{q_x\}_{x\in X}$ of minimal projections in $\ell^\infty(X)$, it induces a bijection $f:I\to X$. Note that if $S\subseteq I$ and $q_{f(S)}:=\sum_{i\in S}q_{f(i)}$ is the corresponding projection in $\ell^\infty(X)$, then $\phi^{-1}(q_{f(S)})$ is a projection on $H$ that commutes with the set $\{p_i\}_{i\in I}$, and that satisfies \begin{equation} \phi^{-1}(q_{f(S)})p_i=\left\{\begin{array}{ll} p_i & i\in S \\ 0 & i\not\in S\end{array}\right.. \end{equation} This is only possible if $\phi^{-1}(q_{f(S)})$ equals the projection $p_S:=\sum_{i\in S}p_i$ on $H$. Hence $p_S$ is in $B$, and as $S$ was arbitrary, $B$ contains all projections in $W^*(\{p_i\})$. The projections in $W^*(\{p_i\})$ span a norm-dense subset, however, so this gives us $B=W^*(\{p_i\})$. \end{proof} The next lemma adds another assumption on $A$ in order to limit the structure of $B$ a little more. In order to state it, we introduce a little more notation. We will work on a separable Hilbert space, so any complete orthogonal set of projections can, and will, be indexed by $\mathbb N$. With this additional assumption we use the notation of Theorem \ref{cart com the}, and let $\{p_n\}_{n=1}^\infty$ be as in the conclusion, so in particular \begin{equation} C^*(\{p_n\})\subseteq B\subseteq W^*(\{p_n\}). \end{equation} Assume moreover $A$ is unital, whence $B$ is too. Then the spectrum of $B$ is a compact Hausdorff set $\widehat{B}$ that contains a copy of $\mathbb N$ as an open, dense, discrete subset; indeed, this follows as $C^*(\{p_n\})$ is an essential ideal in $B$, and the spectrum of $C^*(\{p_n\})$ identifies with $\mathbb N$. Write $\widehat{B}_\infty:=\widehat{B}\setminus \mathbb N$, so that $\widehat{B}_\infty$ is a closed subset of $\widehat{B}$; by density of $\mathbb N$ in $\widehat{B}$, note that every point in $\widehat{B}_\infty$ is a limit of a net from $\mathbb{N}$. Since a uniform Roe algebra satisfies the conditions on $A$ below, the following result also proves Proposition \ref{IntroA} from the introduction. \begin{proposition}\label{non sep} Let $A\subseteq \mathcal{B}(H)$ be a concrete unital $C^*$-algebra containing the compact operators, and assume that $H$ is infinite dimensional and separable. Let $B\subseteq A$ be a Cartan subalgebra, with \begin{equation} C^*(\{p_n\})\subseteq B\subseteq W^*(\{p_n\}). \end{equation} as above. Assume moreover that there is another complete orthogonal set of projections $\{q_n\}_{n=1}^\infty$ for $H$ such that $A$ contains $W^*(\{q_n\})$. Then no element of $\widehat{B}_\infty$ is the limit of a sequence from $\mathbb N$. In particular $B$ is non-separable. \end{proposition} The assumptions of the lemma apply if $A$ is the uniform Roe algebra of a bounded geometry metric space (see Definition \ref{roe alg} below), and $B$ any Cartan subalgebra of $A$. One can think of the lemma as saying that the topology of the spectrum of $B$ must be fairly complicated, and in particular $B$ cannot be separable. However, it does not imply that $B$ is all of $\ell^\infty$ as we will see in Example \ref{bad cartan ex} below. \begin{proof} We will identify $\widehat{B}=\mathbb{N}\sqcup \widehat{B}_\infty$, and write $\{p_n\}_{n\in \mathbb{N}}$ for the complete orthogonal set of projections that we started with; in terms of the spectrum $\widehat{B}=\mathbb{N}\sqcup \widehat{B}_\infty$ of $B$, $p_n$ can be thought of as the characteristic function of the singleton $\{n\}$. For each $r\in \mathbb{N}$, let $Q_r\in W^*(\{q_n\})$ be defined by \begin{equation} Q_r:=q_1+\cdots q_r \end{equation} and set $Q_0=0$. Assume for contradiction that there is some point $x_\infty\in \widehat{B}_\infty$ and a sequence in $\mathbb{N}$ that converges to it. We will iteratively construct strictly increasing subsequences $(n_k)_{k=1}^\infty$ and $(m_k)_{k=1}^\infty$ of the given sequence converging to $x_\infty$, a strictly increasing sequence $(r_k)_{k=1}^\infty$ in $\mathbb{N}\cup\{0\}$, and a sequence $(e_k)_{k=1}^\infty$ of mutually orthogonal finite rank projections in $W^*(\{q_j\})$ with the following properties: \begin{enumerate}[(i)] \item $\|p_{n_k}e_kp_{n_k}\|>3/4$ for all $k$\label{p big}; \item $\|p_{m_k}e_jp_{m_k}\|<(1/4)2^{-j}$ for all $k$ and all $j\in \{1,...,k\}$; \label{p small} \item $e_k\leq 1-Q_{r_k}$ for all $k$; \label{big e} \item $\|p_{m_j}Q_{r_k}p_{m_j}\|>3/4$ for all $j\in \{1,...,k-1\}$. \label{big q} \end{enumerate} Indeed, to start the process off with $k=1$, set $r_1:=0$, so $Q_{r_1}=0$. Let $n_1$ be the first element of the given sequence that converges to $x_\infty$, and choose $e_1=Q_r$ where $r$ is large enough that \eqref{p big} holds. Now choose $m_1$ large enough in the given sequence so that \eqref{p small} holds. Note that \eqref{big q} and \eqref{big e} are vacuous. Now, say we have constructed the desired elements up to stage $k$. Choose $r_{k+1}>r_k$ large enough so that \eqref{big q} holds. Choose $n_{k+1}>n_k$ far enough along the sequence converging to $x_\infty$ so that $\|p_{n_{k+1}}Q_{r_k}p_{n_{k+1}}\|<1/4$. Then choose $e_{k+1}$ so that \eqref{p big} and \eqref{big e} hold. Finally, choose $m_{k+1}>m_k$ far enough along the given sequence so that \eqref{p small} holds. It is not too difficult to show that the resulting sequences have the claimed properties. Now, given the above, set $e:=\sum_{k=1}^\infty e_k$, which converges strongly to an element of $W^*(\{q_j\})$. Let $E:A\to B$ be the conditional expectation. Thinking of elements of $B$ as functions on $\mathbb{N}$, we have that $E(e)$ is the function $f:n\mapsto \|p_nep_n\|$. On the one hand, note that \eqref{p big} gives \begin{equation}\label{e bigg} \|p_{n_k}ep_{n_k}\|\geq \|p_{n_k}e_kp_{n_k}\|>3/4 \end{equation} for each $k$. On the other hand, we have \begin{eqnarray}\label{e smalll} \|p_{m_k}ep_{m_k}\|&\leq& \sum_{j=1}^k \|p_{m_k}e_jp_{m_k}\|+\|p_{m_k}(\sum_{j=k+1}^\infty e_j)p_{m_k}\|\nonumber\\ &\stackrel{\eqref{p small},\ \eqref{big e}}{\leq}&\frac{1}{4}+\|p_{m_k}(1-Q_{r_{k+1}})p_{m_k}\|\\ &\stackrel{\eqref{big q}}{\leq}&\frac{1}{2}. \end{eqnarray} Now, as both sequences $(n_k)$ and $(m_k)$ converge to $x_\infty$, we have that \begin{equation} f(x_\infty)=\lim_{k\to\infty}f(n_k)=\lim_{k\to\infty} \|p_{n_k}ep_{n_k}\|\geq 3/4 \end{equation} from \eqref{e bigg}, and that \begin{equation} f(x_\infty)=\lim_{k\to\infty}f(m_k)=\lim_{k\to\infty} \|p_{m_k}ep_{m_k}\|\leq 1/2 \end{equation} from \eqref{e smalll}, giving us the desired contradiction. \end{proof} \section{An exotic Cartan subalgebra of a uniform Roe algebra}\label{S3} In this short section we give an example of a Cartan subalgebra of a uniform Roe algebra with `exotic' spectrum. We begin by recalling the definitions of bounded geometry metric spaces and the associated uniform Roe algebras. \begin{definition}\label{bg def} A metric space $X$ has \emph{bounded geometry} if for all $r>0$ there is $n_r\in \mathbb{N}$ such that all balls in $X$ of radius $r$ have at most $n_r$ elements. A function $f:X\to Y$ between metric spaces is \emph{uniformly expansive} if for all $r>0$ we have that $$ \sup_{x,y\in X,~d_X(x,y)\leq r} d_Y(f(x),f(y))<\infty. $$ A function $f:X\to Y$ is a \emph{coarse equivalence} if it is uniformly expansive, and if there is a uniformly expansive function $g:Y\to X$ such that $$ \sup_{x\in X} d_X(x,g(f(x)))<\infty \quad \text{and}\quad\sup_{y\in Y} d_Y(y,f(g(y)))<\infty. $$ Metric spaces $X$ and $Y$ are called \emph{coarsely equivalent} when there exists a coarse equivalence $f:X\rightarrow Y$. \end{definition} \begin{definition}\label{roe alg} Let $X$ be a bounded geometry metric space, and let $a$ be a bounded operator on $\ell^2(X)$, which we think of as an $X$-by-$X$ matrix $a=(a_{xy})_{x,y\in X}$. The \emph{propagation} of $a$ is $$ \text{prop}(a):=\sup\{d(x,y)\mid a_{xy}\neq 0\}\in [0,\infty]. $$ Let $\mathbb{C}_u[X]$ denote the collection of bounded operators on $\ell^2(X)$ with finite propagation; this is a $^*$-algebra. The \emph{uniform Roe algebra} of $X$, denoted $C^*_u(X)$, is the closure of $\mathbb{C}_u[X]$ for the operator norm. \end{definition} As a special case, note that if $X$ is a finitely generated group $\Gamma$ equipped with some word metric, then $C^*_u(X)$ is naturally $^*$-isomorphic to $\ell^\infty(\Gamma)\rtimes_r\Gamma$; this is proved for example in \cite[Proposition 5.1.3]{Brown:2008qy}. The uniform Roe algebra of a bounded geometry metric space always contains the compact operators $\mathcal{K}(\ell^2(X))$, as an essential ideal (note that $\mathcal{K}(\ell^2(X))$ is also the unique minimal $C^*$-ideal), and hence fits into the framework of the previous section. Moreover, the subalgebra $\ell^\infty(X)$ of multiplication operators is a Cartan subalgebra (we prove this in more generality in Proposition \ref{l inf is cartan} below); hence in particular Proposition \ref{non sep} applies to uniform Roe algebras. \begin{example}\label{bad cartan ex} Let \begin{equation} X:=\{n^2\mid n\in \mathbb{N}\} \end{equation} be the space of square numbers\footnote{There is nothing particularly special about the sequence $(n^2)$ here: any strictly increasing subsequence $(a_n)$ of $\mathbb{N}$ such that $|a_{n+1}-a_n|\to \infty$ as $n\to\infty$ would work just as well.} equipped with the metric it inherits as a subspace of $\mathbb{N}$. Note that we have \begin{equation}\label{roe alg 2} C^*_u(X)=\ell^\infty(X)+\mathcal{K}(\ell^2(X)). \end{equation} This follows as the points of $X$ get more and more widely spaced, whence the only finite propagation operators are of the form `diagonal plus finite rank'. Now, for each $n\in \mathbb{N}$, let $\xi_n:=\frac{1}{\sqrt{2}}(\delta_{(2n-1)^2}+\delta_{(2n)^2})$ and $\eta_n:=\frac{1}{\sqrt{2}}(\delta_{(2n-1)^2}-\delta_{(2n)^2})$, so the set \begin{equation} S:=\{\xi_n,\eta_n\mid n\in \mathbb{N}\} \end{equation} is an orthonormal basis for $\ell^2(X)$. Let $\ell^\infty(S)$ be the corresponding $C^*$-algebra of multiplication operators on $\ell^2(X)$, and define $B:=C^*_u(X)\cap \ell^\infty(S)$. Thinking of $\ell^2(X)$ as decomposed into a direct sum of two dimensional subspaces \begin{equation} \ell^2(X)=\bigoplus_{n\geq 1} \ell^2(\{(2n-1)^2,(2n)^2\}), \end{equation} operators in $\ell^\infty(S)$ look like \begin{equation}\label{mat prod} \prod_{n\geq 1} \begin{pmatrix} a_n & b_n \\ b_n & a_n \end{pmatrix}, \end{equation} where $(a_n)$ and $(b_n)$ are arbitrary bounded sequences. Elements of $B$ look like this, except now we must also ask that $b_n\to 0$ as $n\to\infty$ (it is straightforward to check that this is a necessary and sufficient for such an operator from $\ell^\infty(S)$ to be in $C^*_u(X)$). We claim the algebra $B$ is a Cartan subalgebra of $C^*_u(X)$. This follows from the computations below. \begin{enumerate}[(i)] \item It is maximal abelian: The algebra $B$ contains $C_0(S)$. The commutant of $C_0(S)$ in $\mathcal{B}(\ell^2(X))$ is $\ell^\infty(S)$, and thus $B$ contains everything in $C^*_u(X)$ that commutes with $C_0(S)$, and in particular contains everything that commutes with $B$ itself. \item The normaliser $\mathcal{N}_{C^*_u(X)}(B)$ generates $C^*_u(X)$: Indeed, thinking of operators in $B$ as matrices as in \eqref{mat prod} above, we see that the normaliser of $B$ in $C^*_u(X)$ contains all products of matrices of the form \begin{equation} \prod_{n\geq 1} \begin{pmatrix} c_n & 0 \\ 0 & c_n \end{pmatrix}\quad\text{and}\quad\prod_{n\geq 1} \begin{pmatrix} d_n & 0 \\ 0 & -d_n \end{pmatrix}, \end{equation} where $(c_n)$, $(d_n)$ are arbitrary bounded sequences. Clearly then the $C^*$-algebra generated by the normaliser $\mathcal{N}_{C^*_u(X)}(B)$ contains $\ell^\infty(X)$. It also straightforward to see that it contains $\mathcal{K}(\ell^2(X))$, and so by \eqref{roe alg 2} is all of $C^*_u(X)$. \item There is a faithful conditional expectation $C^*_u(X)\to B$. Let $E:\mathcal{B}(\ell^2(X))\to \ell^\infty(S)$ be the canonical conditional expectation, which is faithful. We need to check that $E$ takes $C^*_u(X)$ onto $B$ (and not onto some larger subalgebra of $\ell^\infty(S)$). Looking at line \eqref{roe alg} above, $E$ takes $\mathcal{K}(\ell^2(X))$ to $C_0(S)\subseteq B$, so it suffices to check that $E(\ell^\infty(X))\subseteq B$. With respect to a matrix decomposition as in \eqref{mat prod} above, an arbitrary element of $\ell^\infty(X)$ looks like \begin{equation} \prod_{n\geq 1} \begin{pmatrix} a_n & 0 \\ 0 & b_n \end{pmatrix} \end{equation} for some bounded sequences $(a_n)$ and $(b_n)$. The computation of the image of this element under $E$ may be performed one matrix at a time. Doing this, with $E_n$ the restriction of $E$ to the bounded operators on $\ell^2(\{(2n-1)^2,(2n)^2\})$, we see that \begin{align} E_n\Big(\begin{pmatrix} a_n & 0 \\ 0 & b_n \end{pmatrix}\Big) & =\frac{1}{2}\begin{pmatrix} 1 & 1 \\ 1 & 1 \end{pmatrix}\begin{pmatrix} a_n & 0 \\ 0 & b_n \end{pmatrix}\frac{1}{2}\begin{pmatrix} 1 & 1 \\ 1 & 1 \end{pmatrix}+\nonumber \\ & \quad \quad \quad \frac{1}{2}\begin{pmatrix} 1 & -1 \\ -1 & 1 \end{pmatrix}\begin{pmatrix} a_n & 0 \\ 0 & b_n\end{pmatrix} \frac{1}{2}\begin{pmatrix} 1 & -1 \\ -1 & 1 \end{pmatrix} \nonumber\\ & =\frac{1}{2}\begin{pmatrix} a_n+b_n & 0 \\ 0 & a_n+b_n \end{pmatrix} \end{align} and this is certainly in $B$. \end{enumerate} \end{example} \begin{remark}\label{bad cart cosep} The Cartan subalgebra $B$ above is co-separable in the sense of Definition \ref{cosepdef}, and indeed we do not know if it is possible for the uniform Roe algebra of a bounded geometry metric space to admit a Cartan subalgebra that is not co-separable. To see co-separability of $B$, let $S_0$ be a countable subset of $\mathcal{N}_{C^*_u(X)}(B)$ that generates $\mathcal{K}(\ell^2(X))$, and with our usual matrix conventions, let $s$ be the element \begin{equation} s:=\prod_{n\geq 1} \begin{pmatrix} 1 & 0 \\ 0 & -1\end{pmatrix} \end{equation} of $\ell^\infty(X)$, which normalizes $B$. Set $S:=S_0\cup \{s\}$. We claim that $S$ and $B$ together generate $C^*_u(X)$. By assumption on $S_0$ and line \eqref{roe alg 2}, it suffices to show that the $C^*$-algebra generated by $s$ and $B$ contains $\ell^\infty(X)$. Let then \begin{equation} \prod_{n\geq 1} \begin{pmatrix} a_n & 0 \\ 0 & b_n\end{pmatrix} \end{equation} be an arbitrary element of $\ell^\infty(X)$, and note that \begin{align} \nonumber\prod_{n\in \mathbb{N}} \begin{pmatrix} a_n & 0 \\ 0 & b_n\end{pmatrix} & =\frac{1}{2}\prod_{n\in \mathbb{N}} \begin{pmatrix} a_n+b_n & 0 \\ 0 & a_n+b_n\end{pmatrix} \\ & \quad \quad \quad+s\frac{1}{2}\prod_{n\in \mathbb{N}} \begin{pmatrix} a_n-b_n & 0 \\ 0 & a_n-b_n\end{pmatrix}~; \end{align} as the two products of matrices on the right hand side are in $B$, we are done. \end{remark} \begin{remark}\label{not diag} Recall from \cite{Kumjian:1986aa} and \cite[Page 55]{Renault:2008if} that a Cartan subalgebra $B\subseteq A$ in a $C^*$-algebra is a \emph{$C^*$-diagonal} if every pure state on $B$ extends uniquely to a (necessarily pure) state on $A$. The usual Cartan subalgebra $\ell^\infty(X)$ in a uniform Roe algebra $C^*_u(X)$ is a $C^*$-diagonal, as is not difficult to check directly (this also follows from \cite[Proposition 5.11]{Renault:2008if}, and the fact that the underlying coarse groupoid is principal). The exotic Cartan subalgebra of Example \ref{bad cartan ex} is not a $C^*$-diagonal, however. To see this, fix a non-principal ultrafilter $\omega$ on $\mathbb{N}$, and note that the state on $B$ defined on matrices as in line \eqref{mat prod} above by \begin{equation} \prod_{n\geq 1} \begin{pmatrix} a_n & b_n \\ b_n & a_n \end{pmatrix}\mapsto \lim_{n\to\omega} a_n \end{equation} is pure: indeed, the fact that the sequence $(b_n)$ of off-diagonal entries is in $C_0(\mathbb{N})$ implies that it is a $^*$-homomorphism. However, it admits two different pure extensions to $C^*_u(X)$: indeed, if $a\in C^*_u(X)$ has diagonal entries given by $a_{m^2~m^2}$, these can be defined by \begin{equation} a\mapsto \lim_{n\to\omega} a_{(2n-1)^2~(2n-1)^2} \quad \text{and}\quad a\mapsto \lim_{n\to\omega} a_{(2n)^2~(2n)^2}. \end{equation} We do not know if there exist uniform Roe algebras that admit exotic $C^*$-diagonals. \end{remark} \section{Abstract coarse structures and Roe Cartan subalgebras}\label{abs cart sec} Our goal in this section is to prove that $C^*$-algebras containing the compact operators as an essential ideal and a co-separable Cartan masa which is abstractly isomorphic to $\ell^\infty(\mathbb N)$ are essentially the same thing as bounded geometry metric spaces (considered up to bijective coarse equivalence). Actually, we work in more generality than this, using the language of abstract coarse structures as this seems to give slightly cleaner results. The following definition is due to Roe \cite[Chapter 2]{Roe:2003rw}. \begin{definition}\label{cs} Let $X$ be a set. A \emph{coarse structure on $X$} is a collection $\mathcal{E}$ of subsets of $X\times X$ such that: \begin{enumerate}[(i)] \itemsep-.1cm \item for all $E,F\in \mathcal{E}$ the union $E\cup F$ is in $\mathcal{E}$; \item for all $E,F\in \mathcal{E}$, the composition \begin{equation} E\circ F:=\{(x,z)\in X\times X\mid \exists y\in X \text{ with } (x,y)\in E \text{ and } (y,z)\in F\} \end{equation} is in $\mathcal{E}$; \item for all $E\in \mathcal{E}$, the inverse \begin{equation} E^{-1}:=\{(x,y)\in X\times X\mid (y,x)\in E\} \end{equation} is in $\mathcal{E}$; \item for all $E\in \mathcal{E}$, if $F\subseteq E$, then $F\in \mathcal{E}$; \item \label{unital cs} $\mathcal{E}$ contains the diagonal $\{(x,x)\in X\times X\mid x\in X\}$. \end{enumerate} A set $X$ together with a coarse structure $\mathcal E$ is called a \emph{coarse space}; when it is unlikely to cause confusion, we will leave $\mathcal{E}$ implicit, and just say that $X$ is a coarse space. A coarse space $(X,\mathcal{E})$ is: \begin{enumerate}[(a)] \itemsep-.1cm \item \label{bg part} of \emph{bounded geometry} if for all $E\in \mathcal{E}$, the cardinalities of the `slices' \begin{equation} E_x:=\{(y,x)\in E\mid y\in X\} \text{ and } E^x:=\{(x,y)\in E\mid y\in X\} \end{equation} are bounded independently of $x$; \item \emph{connected} if for every $x,y\in X$, $\mathcal{E}$ contains $\{(x,y)\}$; \item \emph{countably generated} if there is a countable collection $S$ of subsets of $X\times X$ such that $\mathcal{E}$ is generated by $S$ (i.e.\ such that $\mathcal{E}$ is the intersection of all coarse structures containing $S$). \end{enumerate} \end{definition} The basic example of a coarse structure is the \emph{bounded coarse structure} on a metric space $(X,d)$, defined by \begin{equation} \mathcal{E}_d:=\{E\subseteq X\times X\mid d|_{E} \text{ is bounded}\} \end{equation} (it is straightforward to check that this is a coarse structure). A coarse space $(X,\mathcal{E})$ is \emph{metrisable} if there exists a metric $d$ on $X$ such that $\mathcal{E}$ is the associated bounded coarse structure. Note that the bounded coarse structure associated to a metric has bounded geometry if and only if the metric does in the usual sense of Definition \ref{bg def} above. The bounded coarse structure is connected and generated by the countably many sets \begin{equation} E_n:=\{(x,y)\in X\times X\mid d(x,y)\leq n\}, \end{equation} for $n\in\mathbb N$, $q\geq 0$. Conversely, one has the following result: see \cite[Theorem 2.55]{Roe:2003rw} for a proof. \begin{theorem}\label{met the} A coarse space $X$ is metrizable if and only if it is connected and countably generated. \qed \end{theorem} The following combinatorial lemma (a standard `greedy algorithm' argument) will be used several times below. \begin{lemma}\label{greedy} Let $(X,\mathcal{E})$ be a bounded geometry coarse space and $E$ be an element of $\mathcal{E}$. Then there exists $N\in \mathbb{N}$ and a decomposition \begin{equation} E=\bigsqcup_{n=1}^N E_n \end{equation} of $E$ into disjoint subsets such that for each $x\in X$ and each $n$, there is at most one element in each set \begin{equation} E_n\cap\{(x,y)\mid y\in X\} \quad \text{and} \quad E_n\cap \{(y,x)\mid y\in X\} \end{equation} (in words, $E_n$ intersects each row and column in $X\times X$ at most once). \end{lemma} \begin{proof} Set $E_0$ to be the empty set. Having chosen disjoint subsets $E_0,E_1,...,E_n$ of $E$, set $E_{n+1}$ to be a maximal subset of $E\setminus (E_1\cup \cdots \cup E_n)$ that intersects each row and column at most once. We claim that for some $N$, $E_n$ is empty for all $n\geq N$. Indeed, if not, then for every $N$, there is some element $(x_N,y_N)$ in $E_N$, and in particular that has not appeared in any of $E_1,...,E_{N-1}$. Maximality of these sets implies that for each $n\in \{1,...,N-1\}$ there is either $x_n$ such that $(x_n,y_N)$ is in $E_n$, or $y_n$ such that $(x_N,y_n)$ is in $E_n$. This implies that at least one of the sets \begin{equation} \{(x_N,y)\in E\mid y\in X\} \quad \text{or}\quad \{(x,y_N)\in E\mid x\in X\} \end{equation} has cardinality at least $\lfloor (N-1)/2\rfloor$. As this happens for all $N$, this contradicts that $(X,\mathcal{E})$ has bounded geometry. \end{proof} We now turn to bounded operators. We start with a basic class of operators. \begin{definition}\label{sd} Let $\{\xi_i\}_{i\in I}$ be an orthonormal basis for a Hilbert space $H$. For any bounded operator $a$ on $H$, let $a_{ij}:=\langle \xi_i,a\xi_j\rangle$ be the corresponding matrix entries. We will say that a matrix $(a_{ij})$, or the operator defining it (if one exists) is \emph{supported on a single diagonal (with respect to $\{\xi_i\}_{i\in I}$)} if for each $i$ there is at most one $j$ such that $a_{ij}\neq 0$, and at most one $k$ such that $a_{ki}\neq 0$ (in words, $a$ has at most one non-zero matrix entry in each row and column). \end{definition} The following elementary lemma is well-known. \begin{lemma}\label{linf normal} Let $\{\xi_i\}_{i\in I}$ be an orthonormal basis for $H$, and let $\{p_i\}_{i\in I}$ be the corresponding complete set of orthogonal rank one projections. \begin{enumerate}[(i)] \item Let $B\subseteq \mathcal{B}(H)$ be a $C^*$-algebra such that \begin{equation} C^*(\{p_i\})\subseteq B\subseteq W^*(\{p_i\}). \end{equation} Then if $a\in \mathcal{B}(H)$ normalises $B$, we have that $a$ is supported on a single diagonal with respect to the basis $\{\xi_i\}_{i\in I}$. If $B=W^*(\{p_i\})$ and $a$ is supported on a single diagonal, then $a$ normalises $B$. \item Let $(a_{ij})_{i,j\in I}$ be a matrix supported on a single diagonal (not necessarily coming from a bounded operator). Then matrix multiplication by $(a_{ij})$ defines a bounded operator $a$ if and only if its matrix entries are uniformly bounded, and in this case, $\|a\|=\sup_{i,j}|a_{ij}|$. \end{enumerate} \end{lemma} \begin{proof} For each $i\in I$ and $a\in \mathcal{B}(H)$, the operators $ap_ia^*$ and $a^*p_ia$ have matrix entries given by \begin{equation} (ap_ia^*)_{jk}=a_{ji}\overline{a_{ki}} \quad \text{and} \quad (a^*p_ia)_{jk}=\overline{a_{ij}}a_{ik} \end{equation} respectively. As $B\subseteq W^*(\{p_i\})$, in order for these operators to be in $B$ for some fixed $i$ the entries can only be non-zero if $j=k$, which can only happen if $a$ has at most one non-zero entry in each row and column. For the second part of the statement, note that the computation above shows that if $a$ is supported on a single diagonal, then $ap_ia^*$ and $a^*p_ia$ are in $B$ for each $i$. As we are now assuming that $B$ is generated by the $p_i$ (as a von Neumann algebra), this completes the proof. For part (ii), assume $a$ is supported on a single diagonal. Note that $a\xi_i=a_{t(i)i}\xi_{t(i)}$, where $t(i)$ is the unique element of $I$ such that $a_{t(i)i}\neq 0$, or $a\xi_i=0$ if no such $t(i)$ exists. Moreover, if $i\neq j$, then $a\xi_i$ is orthogonal to $a\xi_j$. Hence for any element $v:=\sum_{i\in I}\lambda_i \xi_i$ of $H$, \begin{align} \nonumber\|av\|^2 & =\sum_{i\in I,t(i) \text{ exists}}\|a_{t(i)i}\lambda_iv_{t(i)}\|^2\leq \sup_{i\in I,t(i)\text{ exists}}|a_{it(i)}|^2\sum_{i\in I}|\lambda_i|^2 \\ & =\sup_{i,j}|a_{ij}|^2\|v\|^2. \end{align} This gives $\|a\|\leq \sup_{i,j}|a_{ij}|$; the opposite inequality follows as $\|a\|\geq |\langle \xi_i,a\xi_j\rangle|$ for any $i,j$. \end{proof} As a special case of Definition \ref{sd}, we equip $\ell^2(X)$ with its canonical orthonormal basis $\{\delta_x\}_{x\in X}$, so the matrix entries of a bounded operator $a$ on $\ell^2(X)$ are $a_{xy}:=\langle \delta_x,a\delta_y\rangle$. It is routine to extend the definition of uniform Roe algebras from metric spaces to general coarse spaces of bounded geometry; we set out the details below. \begin{definition}\label{fin prop} Let $(X,\mathcal{E})$ be a coarse space. The \emph{support} of an operator $a\in \mathcal{B}(\ell^2(X))$ is \begin{equation} \text{supp}(a):=\{(x,y)\in X\times X\mid a_{xy}\neq 0\}. \end{equation} An operator $a\in \mathcal{B}(\ell^2(X))$ has \emph{finite propagation} if its support is an element of $\mathcal{E}$. \end{definition} From the axioms for a coarse structure, it is not difficult to check that the collection of finite propagation operators is a $^*$-algebra, leading to the following definition. \begin{definition}\label{u roe} Let $(X,\mathcal{E})$ be a coarse space. Let $\mathbb{C}_u[X;\mathcal{E}]$ denote the $^*$-algebra of finite propagation operators on $\mathcal{B}(\ell^2(X))$ as in Definition \ref{fin prop}. The \emph{uniform Roe algebra of $X$}, denoted $C^*_u(X;\mathcal{E})$, is the norm closure of $\mathbb{C}_u[X;\mathcal{E}]$. \end{definition} Note that if a coarse space $(X,\mathcal{E})$ is metrisable, then $C^*_u(X;\mathcal{E})$ is the usual uniform Roe algebra associated to any choice of metric $d$ on $X$ which induces $\mathcal E$. Note also that condition \eqref{unital cs} in Definition \ref{cs} above implies that the multiplication operators $\ell^\infty(X)\subseteq \mathcal{B}(\ell^2(X))$ are contained in $\mathbb{C}_u[X;\mathcal{E}]$. The following special class of operators in $\mathbb{C}_u[X;\mathcal{E}]$ will be useful for us. \begin{definition}\label{p isoms} Let $(X,\mathcal{E})$ be a bounded geometry coarse space. For any $E\in \mathcal{E}$ with at most one entry in each row and column, define a matrix $(v^E_{xy})$ by the formula \begin{equation} v^E_{xy}:=\left\{\begin{array}{ll} 1 & (x,y)\in E \\ 0 & (x,y)\not\in E\end{array}\right.. \end{equation} Let $v^E$ denote the unique bounded operator on $\ell^2(X)$ associated to this matrix by Lemma \ref{linf normal} part (ii). \end{definition} We now have the following useful structure lemma for $C^*_u(X;\mathcal{E})$ that holds whenever $X$ has bounded geometry. \begin{lemma}\label{u roe struc} With notation as in Definition \ref{p isoms}, $v^E$ is a partial isometry in $\mathbb{C}_u[X;\mathcal{E}]$ that normalizes $\ell^\infty(X)$. Moreover, if $S\subseteq \mathcal{E}$ is a collection of subsets of $X\times X$, each with at most one entry in each row and column, and that generates the coarse structure, then the collection \begin{equation} \{v^E\mid E\in S\}\cup \ell^\infty(X) \end{equation} generates $\mathbb{C}_u[X;\mathcal{E}]$ as a $^*$-algebra (and therefore generates $C^*_u(X;\mathcal{E})$ as a $C^*$-algebra). \end{lemma} \begin{proof} That each $v^E$ is a partial isometry in $\mathbb{C}_u[X;\mathcal{E}]$ follows from straightforward computations, and each normalises $\ell^\infty(X)$ by Lemma \ref{linf normal} part (i). Let $S$ be a collection of sets as in the statement. We consider the following collections of subsets of $X\times X$: $S_1$ consists of all compositions of the form $E_1\circ \cdots \circ E_n$ where for each $i$, either $E_i$ or its inverse is in $S$; $S_2$ consists of all subsets of elements of $S_1$; $S_3$ consists of all finite disjoint unions of sets from $S_2$. As $S$ generates $\mathcal{E}$, it is not too difficult to see that in fact $S_3=\mathcal{E}$. Consider now the $^*$-subalgebra $\mathcal{A}$ of $\mathbb{C}_u[X;\mathcal{E}]$ generated by $\{v^E\mid E\in S\}\cup \ell^\infty(X)$. We first claim that if the support of $a\in \mathbb{C}_u[X;\mathcal{E}]$ is contained in $S_1$, then $a$ is in $\mathcal{A}$. Indeed, if $E$, $F$ are elements of $S$, then $v^{E^{-1}}=(v^E)^*$ and $v^{E\circ F}=v^Ev^F$, from which it follows that if $E\in S_1$, then $v^E$ is in $\mathcal{A}$. Any $a\in \mathbb{C}[X;\mathcal{E}]$ with support an element of $S_1$ can be written as $fv^E$ for some $f\in \ell^\infty(X)$ and $E\in S_1$: indeed, take $E$ to be the support of $a$, and define $f$ by \begin{equation} f(x):=\left\{\begin{array}{ll} a_{xy} & \exists y\in X \text{ with } (x,y)\in E \\ 0 & \text{otherwise}\end{array}\right. . \end{equation} This completes the proof of the claim. We next claim that if $a\in \mathbb{C}_u[X;\mathcal{E}]$ has support in $S_2$, then $a$ is in $\mathcal{A}$. Indeed, let $F$ be an element of $S_1$ containing the support $E$ of $a$, and define $b\in \mathbb{C}_u[X;\mathcal{E}]$ to have the matrix that agrees with that of $a$ on $(X\times X)\setminus F$ and on $\text{supp}(a)$, and has all entries in $F\setminus \text{supp}(a)$ equal to one. Then the support of $b$ is in $F$, which is in $S_1$, and so $b$ is in $\mathcal{A}$ by our earlier claim. Moreover, $a=fb$, where $f\in \ell^\infty(X)$ is the characteristic function of the set $\{x\in X\mid (x,y)\in E \text{ for some } y \}$, so we are done with this claim. Finally, we claim that if $a\in \mathbb{C}_u[X;\mathcal{E}]$ has support in $S_3$, then $a$ is in $\mathcal{A}$; as $S_3=\mathcal{E}$, this will suffice to complete the proof. For this, write the support $E$ of $a$ as a finite disjoint union $E=\bigsqcup_{i=1}^n E_i$ with each $E_i$ in $S_2$. Then $a=\sum_{i=1}^n b_i$, where the matrix of each $b_i$ is defined to agree with the matrix of $a$ on $E_i$, and to be zero on $(X\times X)\setminus E_i$. In particular $b_i$ is in $\mathcal{A}$ by the previous claim, and we are done. \end{proof} Just as in the case of metric spaces, the canonical copy of $\ell^\infty(X)$ forms a Cartan masa in the uniform Roe algebra. \begin{proposition}\label{l inf is cartan} Let $(X,\mathcal{E})$ be a bounded geometry coarse structure. Then $\ell^\infty(X)$ is a Cartan subalgebra in $C^*_u(X;\mathcal{E})$. Moreover, if $X$ is connected, then $C^*_u(X;\mathcal{E})$ contains the compact operators. \end{proposition} \begin{proof} It is well-known that $\ell^\infty(X)$ is a unital, maximal abelian $C^*$-subalgebra of $\mathcal{B}(\ell^2(X))$ that is the image of a faithful conditional expectation $\mathcal{B}(\ell^2(X))\to \ell^\infty(X)$, so it certainly also has these properties when considered as a $C^*$-subalgebra of $C^*_u(X;\mathcal{E})$. The normaliser of $\ell^\infty(X)$ generates $C^*_u(X;\mathcal{E})$ by Lemma \ref{u roe struc}, completing the proof that $\ell^\infty(X)$ is a Cartan subalgebra. Assuming that $X$ is connected, then with notation as in Definition \ref{p isoms} we get that for any $(x,y)\in X\times X$ the operator $v^{\{(x,y)\}}$ is in $\mathbb{C}_u[X;\mathcal{E}]$. These operators generate the compact operators, so we are done. \end{proof} To summarise, given a connected coarse space $(X,\mathcal E)$ of bounded geometry, $\ell^\infty(X)\subseteq C^*_u(X,\mathcal E)$ is a Cartan pair with the compact operators contained in $C^*_u(X,\mathcal E)$. Our main goal of this section is to prove a sort of converse. \begin{definition}\label{cart coarse def} Let $A$ be a unital $C^*$-algebra containing a copy $\mathcal{K}$ of the compact operators on some Hilbert space as an essential ideal, and let $B\subseteq A$ be a Cartan subalgebra. Let $X=\{p_x\}_{x\in X}$ be the set\footnote{We treat $X$ as its own index set; apologies for this abuse of notation. It is non-empty, as we will see in Remark \ref{rep rem}.} of minimal projections in $B$, and for each $a\in \mathcal{N}_A(B)$ and each $\epsilon>0$, define \begin{equation} E_{a,\epsilon}:=\{(x,y)\in X\times X\mid \|p_xap_y\|\geq \epsilon\}. \end{equation} Define $\mathcal{E}_A$ to be the coarse structure on $X$ generated by the collection \begin{equation} \{E_{a,\epsilon}\mid a\in \mathcal{N}_A(B)\text{ and }\epsilon>0\}. \end{equation} \end{definition} \begin{remark}\label{rep rem} With notation as in Definition \ref{cart coarse def}, fix a faithful irreducible representation of $\mathcal{K}$ on some Hilbert space $H$; such a representation exists, is unique up to unitary equivalence, and necessarily consists of an isomorphism $\mathcal{K}\cong \mathcal{K}(H)$ of $\mathcal{K}$ with the compact operators on $H$ (see for example \cite[Section 4.1]{Dixmier:1977vl}). As $\mathcal{K}$ is an essential ideal in $A$, this representation extends uniquely to a representation of $A$ on $H$, which is also irreducible and faithful. Identify $A$ with its image under this representation. We may now apply Theorem \ref{cart com the}: this implies in particular that the set $\{p_x\}_{x\in X}$ of minimal projections in $B$ identifies with a complete collection of orthogonal rank one projections on $H$, and that \begin{equation}\label{cart incl} C^*(\{p_x\})\subseteq B\subseteq W^*(\{p_x\}). \end{equation} \end{remark} \begin{lemma}\label{cart coarse lem} With notation as in Definition \ref{cart coarse def}, the coarse space $(X,\mathcal{E}_A)$ is connected and has bounded geometry. \end{lemma} \begin{proof} Fix a representation $H$ of $A$ with the properties in Remark \ref{rep rem}. For each $x$, choose a unit vector $\xi_x$ in the range of $p_x$, so the collection $\{\xi_x\}_{x\in X}$ is an orthonormal basis for $H$. Use this basis to write operators on $H$ as matrices $(a_{xy})_{x,y\in X}$ as in Definition \ref{sd}. Note that $|a_{xy}|=\|p_xap_y\|$ for any $x,y\in X$. Now, as $A$ contains the compact operators, for any $(x,y)\in X\times X$, the operator $v^{\{(x,y)\}}$ whose matrix has a single entry equal to one in the $(x,y)^{\text{th}}$ position and zeros elsewhere is in $A$, and is moreover in $\mathcal{N}_A(B)$ by a direct calculation (just as in Lemma \ref{linf normal} part (i)); this implies that $\{(x,y)\}$ is in $\mathcal{E}_A$, and thus the coarse space $X$ is connected. Let $S$ be the collection of all elements $E$ of $\mathcal{E}_A$ such that $E$ has at most one element in each row and column. Then Lemma \ref{linf normal} part (ii) implies that each $E_{a,\epsilon}$ is in $S$ as $a$ ranges over $\mathcal{N}_A(B)$ and $\epsilon$ over $(0,\infty)$, whence $S$ generates $\mathcal{E}_A$. Note that $S$ is closed under all the operations defining a coarse structure, except (possibly) unions. It follows that $\mathcal{E}_A$ consists precisely of finite unions of sets from $S$, and thus has bounded geometry. \end{proof} \begin{lemma}\label{contained in roe} With notation as in Definition \ref{cart coarse def}, identify $A$ with its image in some representation on a Hilbert space $H$ with the properties in Remark \ref{rep rem}. For each $x\in X$, choose a unit vector $\xi_x$ in the range of $p_x$, so $\{\xi_x\}_{x\in X}$ is an orthonormal basis of $H$, and define a unitary isomorphism \begin{equation} u: \ell^2(X)\to H,\quad \delta_x\mapsto \xi_x. \end{equation} Consider $C^*_u(X;\mathcal{E}_A)$ and its Cartan subalgebra $\ell^\infty(X)$ as represented on $\ell^2(X)$ in the canonical way. Then $u^*Bu$ is contained in $\ell^\infty(X)$, and $u^*Au$ is contained in $C^*_u(X;\mathcal{E}_A)$. \end{lemma} \begin{proof} Note that $u^*p_xu$ is the orthogonal projection onto the span of $\delta_x$, whence $u^*(W^*(\{p_x\}))u=\ell^\infty(X)$. Hence by line \eqref{cart incl} above, $uBu^*\subseteq \ell^\infty(X)$. To see that $uAu^*\subseteq C^*_u(X;\mathcal{E}_A)$, it suffices to show that $u^*\mathcal{N}_A(B)u$ is contained in $C^*_u(X;\mathcal{E}_A)$. Let then $a$ be an element of $\mathcal{N}_A(B)$ and let $\epsilon>0$. Then as the matrix associated to $a$ has at most one non-zero entry in each row and column by Lemma \ref{linf normal} part (i), part (ii) of that lemma implies that the operator $a^{(\epsilon)}$ with matrix entries \begin{equation} a^{(\epsilon)}_{xy}:=\left\{\begin{array}{ll} a_{xy} & |a_{xy}|\geq \epsilon \\ 0 & |a_{xy}|<\epsilon \end{array}\right. \end{equation} is well-defined, bounded, and that the collection $(a^{(\epsilon)})_{\epsilon>0}$ satisfies $\|a^{(\epsilon)}-a\|\to 0$ as $\epsilon\to 0$. Clearly each conjugate $u^*a^{(\epsilon)}u$ is in $C^*_u(X;\mathcal{E}_A)$, however, so we are done. \end{proof} If $B$ is abstractly isomorphic to some $\ell^\infty(I)$ for some set $I$, then we can do better. In this case $B\subseteq A$ is unitarily equivalent to $\ell^\infty(X)\subseteq C^*_u(X,\mathcal E_A)$. \begin{proposition}\label{equals roe} With notation as in Lemma \ref{contained in roe}, assume moreover that $B$ is abstractly isomorphic to $\ell^\infty(I)$ for some set $I$. Then the inclusions $u^*Bu\subseteq \ell^\infty(X)$, and $u^*Au\subseteq C^*_u(X;\mathcal{E}_A)$ are equalities. \end{proposition} \begin{proof} The fact that $u^*Bu=\ell^\infty(X)$ follows from part (ii) of Proposition \ref{full basis}. To see that $u^*Au=C^*_u(X;\mathcal{E}_A)$, Lemma \ref{u roe struc} implies that it suffices to show that for each $a\in \mathcal{N}_A(B)$ and each $\epsilon>0$, if $E=E_{a,\epsilon}$, then the partial isometry $v^{E}$ is in $u^*Au$. Define $f\in \ell^\infty(X)$ by \begin{equation} f(x):=\left\{\begin{array}{ll} (a_{xy})^{-1} &\exists y\in X\text{ such that } |a_{xy}|\geq \epsilon \\ 0 &\text{otherwise}\end{array}\right.; \end{equation} this definition makes sense as Lemma \ref{linf normal} part (i) implies that the matrix underlying $a$ has at most one non-zero entry in each row. Noting that $f\in \ell^\infty(X)=u^*Bu\subseteq u^*Au$, we get that $v^E=fu^*au$ is in $u^*Au$ and so the proof is complete. \end{proof} The next definition and theorem formalise much of the above discussion. \begin{definition}\label{const} Let $\mathcal{A}$ be the collection of triples $(A,B,\mathcal{K})$, where $A$ is a unital $C^*$-algebra, $B\subseteq A$ is a Cartan subalgebra abstractly $^*$-isomorphic to $\ell^\infty(I)$ for some set $I$, and $\mathcal{K}$ is an essential ideal of $A$ that is abstractly $^*$-isomorphic to the compact operators on some Hilbert space. Let $\mathcal{X}$ be the collection of connected, bounded geometry coarse spaces $(X,\mathcal{E})$. Define correspondences \begin{equation} \Phi:\mathcal{X}\to \mathcal{A}, \quad (X,\mathcal{E}) \mapsto (C^*_u(X;\mathcal{E}),\ell^\infty(X),\mathcal{K}(\ell^2(X))) \end{equation} (notation on the right as in Definition \ref{u roe}) and \begin{equation} \Psi: \mathcal{A}\to \mathcal{X}, \quad (A,B,\mathcal{K})\mapsto (X,\mathcal{E}_A) \end{equation} (notation on the right as in Definition \ref{cart coarse def}). \end{definition} \begin{theorem}\label{cart coarse prop} The two correspondences $\Phi:\mathcal{X}\to \mathcal{A}$ and $\Psi: \mathcal{A}\to \mathcal{X}$ are well-defined. Moreover, the compositions $\Phi\circ \Psi$ and $\Psi\circ \Phi$ are both `isomorphic to the identity' in the following precise senses. For $\Phi\circ \Psi$: for any triple $(A,B,\mathcal{K})\in\mathcal A$, let $H$ be a representation as in Remark \ref{rep rem}; then there is a unitary isomorphism $u:\ell^2(X)\to H$ such that \begin{equation} u^*Au=C^*_u(X;\mathcal{E}_A), \quad u^*Bu=\ell^\infty(X),\quad \text{and}\quad u^*\mathcal{K}u=\mathcal{K}(\ell^2(X)). \end{equation} For $\Psi\circ \Phi$: for any $(X,\mathcal{E})\in\mathcal X$, letting $A=C^*_u(X;\mathcal{E})$ and identifying the set of minimal projections in $\ell^\infty(X)$ with $X$, we have that $\mathcal{E}=\mathcal{E}_A$. \end{theorem} \begin{proof} The correspondence $\Phi:\mathcal{X}\to \mathcal{A}$ takes values in $\mathcal{A}$ by Proposition \ref{l inf is cartan}. The correspondence $\Psi:\mathcal{A}\to \mathcal{X}$ takes values in $\mathcal{X}$ by Lemma \ref{cart coarse lem}. The statement about the composition $\Phi\circ \Psi$ follows immediately from Proposition \ref{equals roe}. To see the stated property for $\Psi\circ \Phi$, we first show that $\mathcal{E}_A\subseteq \mathcal{E}$. Given $a\in \mathcal{N}_{C^*_u(X;\mathcal{E})}(\ell^\infty(X))$ and $\epsilon>0$, find $b\in \mathbb{C}_u[X;\mathcal{E}]$ such that $\|a-b\|<\epsilon$. Therefore \begin{equation} \{(x,y)\mid |a_{xy}|\geq\epsilon\}\subseteq \{(x,y)\mid b_{xy}\neq 0\}\in\mathcal E, \end{equation} and hence $E_{a,\epsilon}\in\mathcal E$. Therefore $\mathcal{E}_A\subseteq \mathcal{E}$. For the reverse inclusion, let $E$ be an arbitrary element of $\mathcal{E}$. Lemma \ref{greedy} gives us a decomposition \begin{equation} E=\bigsqcup_{n=1}^N E_n \end{equation} of $E$ into sets $E_n$ whose intersection with each row and column contains at most one element. Then with the notation of Definition \ref{p isoms}, $v^{E_n}$ is a well-defined partial isometry in $\mathcal N_{C^*_u(X;\mathcal E)}(\ell^\infty(X))$ for each $n$. With the notation of Definition \ref{cart coarse def}, we have that $E_{v^{E_n},1/2}=E_n$, and thus $E_n$ is contained in $\mathcal{E}_A$. As this is true for each $n$, $E$ is contained in $\mathcal{E}_A$, and we are done. \end{proof} Finally we characterise when the coarse structure $(X,\mathcal E_A)$ is metrisable in terms of the Cartan pair $B\subseteq A$. First, a general lemma. \begin{lemma}\label{new cor} With notation as in Lemma \ref{contained in roe}, assume moreover that $B$ is abstractly isomorphic to $\ell^\infty(I)$ for some set $I$. Then any normaliser $a\in \mathcal N_A(B)$ can be approximated arbitrarily well in norm by products $fv$, where $f\in B$ and $v$ is a partial isometry in $A$ normalising $B$. \end{lemma} \begin{proof} Given any normaliser $c\in \mathcal N_{C^*_u(X,\mathcal E_A)}(\ell^\infty(X))$, and $\epsilon>0$, define $E:=\{(x,y)\in X\times X:|c_{xy}|\geq\epsilon\}$ so that $v^E$ is a partial isometry in $C^*_u(X,\mathcal E_A)$ normalising $\ell^\infty(X)$. Define \begin{equation} f(x):=\begin{cases}c_{xy}&\exists y\in X,\ c_{xy}\neq 0\\0,&\text{otherwise}\end{cases} \end{equation} (the $y$ above being unique if it exists by Lemma \ref{linf normal} (i)), so that $\|c-fv^E\|\leq\epsilon$. The result then transfers from $\ell^\infty(X)\subseteq C^*_u(X,\mathcal E_A)$ to $B\subseteq A$ by Proposition \ref{equals roe}. \end{proof} \begin{lemma}\label{more props} Let $(A,B,\mathcal{K})$ and $(X,\mathcal{E})$ correspond to each other under the constructions of Definition \ref{const} and Theorem \ref{cart coarse prop}. Then $B$ is co-separable in $A$ if and only if $\mathcal{E}_A$ is countably generated. In particular, $B$ is co-separable in $A$ if and only if $\mathcal{E}_A$ is metrisable. \end{lemma} \begin{proof} Suppose first that $\mathcal{E}_A$ is countably generated, say by $E^1,E^2,...$. Then Lemma \ref{greedy} allows us to decompose each $E^m$ into finitely many parts \begin{equation} E^m=\bigsqcup_{n=1}^{N_m} E^m_n \end{equation} such that each $E^m_n$ only intersects each row and column at most once. Lemma \ref{u roe struc} then gives us a countable set of operators $\{v^{E^m_n}\mid m\geq 1, 1\leq n \leq N_m\}$ that together with $B\cong \ell^\infty(X)$ generate $A\cong C^*_u(X,\mathcal{E})$. Hence $B$ is co-separable in $A$. Conversely, suppose $B$ is co-separable in $A$. Using Lemma \ref{new cor}, we can find a countable set $S$ of partial isometries in $A$ normalising $B$, such that $C^*(S,B)=A$. Moreover we may assume that $S$ is closed under taking finite products. Then, for $b_1,b_2\in B$ and $s_1,s_2\in S$, we have \begin{equation} b_1s_1b_2s_2=b_1s_1s_1^*s_1b_2s_2=b_1(s_1b_2s_1^*)s_1s_2, \end{equation} which is of the form $bs$ for $b=b_1s_1b_2s_1^*\in B$ and $s=s_1s_2\in S$. As such, the collection of finite linear combinations $\{\sum_{i=1}^n b_is_i\mid b_i\in B,\ s_i\in S\}$ has dense linear span in $A$. Let $\mathcal D$ be the coarse structure generated by the countable family of sets $E_{s,1}:=\{(x,y)\mid |s_{xy}|\geq1\}=\{(x,y)\mid s_{xy}\neq 0\}$ indexed by $s\in S$. Each $E_{s,1}$ is in $\mathcal E_A$, so $\mathcal D\subseteq \mathcal E_A$. For the reverse inclusion, given a normaliser $a\in \mathcal N_A(B)$ and $\epsilon>0$, find a finite linear combination $\sum_{i=1}^nb_is_i$ with $b_i\in B$ and $s_i\in S$ such that $\|a-\sum_{i=1}^nb_is_i\|<\epsilon/2$. Then \begin{align} \nonumber\{(x,y)\mid |a_{xy}|\geq\epsilon\}\subseteq&\bigcup_{i=1}^n\{(x,y)\mid |(b_is_i)_{xy}|\geq\epsilon/2n\}\\ \subseteq&\bigcup_{i=1}^n E_{s_i}\in \mathcal D. \end{align} Therefore $\mathcal E_A=\mathcal D$, and hence $\mathcal E_A$ is countably generated. The remaining comment about metrisability is immediate from Theorem \ref{met the}. \end{proof} In the light of the previous results, it makes sense to encapsulate the key features of a Cartan pair which enable us to obtain a bounded geometry metric space in the following definition. \begin{definition}\label{roe cartan def} An inclusion $B\subseteq A$ of $\mathrm{C}^*$-algebras is a \emph{Roe Cartan pair} if: \begin{enumerate}[(i)] \itemsep-.1cm \item $A$ is unital; \item $A$ contains the $C^*$-algebra of compact operators on a separable infinite dimensional Hilbert space as an essential ideal\footnote{and therefore as its unique minimal ideal.}; \item $B$ is a co-separable Cartan subalgebra of $A$ abstractly isomorphic to $\ell^\infty(\mathbb N)$. \end{enumerate} A subalgebra $B$ of a uniform Roe algebra $C^*_u(X)$ is a \emph{Roe Cartan} subalgebra, if $B\subseteq C^*_u(X)$ is a Roe Cartan pair. \end{definition} With this definition, Theorem \ref{cart abs} is an immediate consequence of Theorem \ref{cart coarse prop} and Lemma \ref{more props}. We end this section with a proof of Corollary \ref{IntroC}. \begin{proof}[Proof of Corollary \ref{IntroC}] Assume that $X$ coarsely embeds into Hilbert space, and let $B\subseteq C^*_u(X)$ be a Roe Cartan. Let $Y$ be the metric space associated to $B$ by Theorem \ref{cart abs}, so in particular $C^*_u(X)$ is isomorphic to $C^*_u(Y)$. We now complete the proof by appealing to \cite[Corollary 1.5]{Braga:2019wv}, which states that if $X$ and $Y$ are bounded geometry metric spaces such that $X$ is coarsely embeddable in Hilbert space and $C^*_u(X)$ is isomorphic to $C^*_u(Y)$, then $X$ is coarsely equivalent to $Y$. \end{proof} \begin{remark}\label{bf ce rem} Let $\mathcal{P}$ be a property of bounded geometry metric spaces that is invariant under coarse equivalences. For the purposes of this remark, let us say that $\mathcal{P}$ implies \emph{rigidity} if whenever $X$ and $Y$ both have $\mathcal{P}$ and $C^*_u(X)$ is isomorphic to $C^*_u(Y)$, then $X$ is coarsely equivalent to $Y$. On the other hand, let us say that $\mathcal{P}$ implies \emph{superrigidity} if whenever $X$ has $\mathcal{P}$ and $C^*_u(X)$ is isomorphic to $C^*_u(Y)$, then $X$ is coarsely equivalent to $Y$. As is clear from the proof, any property $\mathcal{P}$ that implies superrigidity could be used as a hypothesis for Corollary \ref{IntroC} in place of coarse embeddability into Hilbert space. Now, an earlier version of this paper proved Corollary \ref{IntroC} under the stronger assumption that $X$ has property A. Indeed, property A implies rigidity by \cite[Theorem 1.4]{Spakula:2011bs}. Moreover, property A for $X$ is equivalent to nuclearity of $C^*_u(X)$ by \cite[Theorem 5.3]{Skandalis:2002ng} or \cite[Theorem 5.5.7]{Brown:2008qy}, and it is clear that if $\mathcal{P}$ implies rigidity and is such that $\mathcal{P}$ for $X$ that can be characterized by an isomorphism invariant of $C^*_u(X)$, then in fact $\mathcal{P}$ implies superrigidity. Earlier work of Braga and Farah \cite[Corollary 1.2]{Braga:2018dz} showed that coarse embeddability into Hilbert space implies rigidity. This would not be enough for our proof of Corollary \ref{IntroC}, as it was not known if coarse embeddability into Hilbert space of $X$ can be characterised by an isomorphism-invariant of $C^*_u(X)$. Given this, it is quite striking that Braga, Farah, and Vignati were able to prove that coarse embeddability into Hilbert space implies superrigidity in their very recent work \cite{Braga:2019wv}, as was used in the proof above. Similar remarks to these also apply to Corollary \ref{IntroD}, which we discuss in the next section. \end{remark} \section{Uniqueness of Cartan subalgebras up to automorphism}\label{inn sec} In this short section we prove Corollary \ref{IntroD}. This is a reasonably straightforward consequence of the results of the previous section combined with the main results of \cite{Braga:2018dz} and a theorem of Whyte \cite[Theorem 4.1]{Whyte:1999uq}. First, we give a slight variation of \cite[Theorem 4.1]{Whyte:1999uq}; this is probably well-known to experts. Unexplained terminology in the proof can be found in the cited papers of Block and Weinberger, and of Whyte. \begin{theorem}\label{whyte the} Let $X$ and $Y$ be bounded geometry metric spaces, at least one of which is non-amenable. Let $f:X\to Y$ be a coarse equivalence. Then there is a bijective coarse equivalence from $X$ to $Y$ that is close to $f$. \end{theorem} \begin{proof} For a bounded geometry metric space $Z$, let $H^{uf}_*(Z)$ denote the uniformly finite homology of $Z$ (with integer coefficients) in the sense of Block and Weinberger \cite[Section 2]{Block:1992qp}, and let $[Z]\in H^{uf}_0(Z)$ be the fundamental class of $Z$, i.e.\ the $0$-cycle defined by the constant function on $X$ with value one everywhere. From the discussion around \cite[Proposition 2.1]{Block:1992qp}, if $f:X\to Y$ is a coarse embedding\footnote{``Coarse embedding'' is the current terminology for what Block and Weinberger call an \emph{effectively proper Lipschitz} map.}, then $f$ induces a map $f_*:H_*^{uf}(X)\to H^{uf}_*(Y)$. Whyte proves in \cite[Theorem 4.1]{Whyte:1999uq} that if $f:X\to Y$ is a quasi-isometry between uniformly discrete\footnote{A metric space $X$ is \emph{uniformly discrete} if $\inf_{x,y\in X,x\neq y}d(x,y)>0$.}, bounded geometry metric spaces with $f_*[X]=[Y]$, then there is a bi-Lipschitz map $X\to Y$ that is close to $f$. Let us sketch why Whyte's arguments also imply the result in the statement. Now, with no real changes, Whyte's proof of \cite[Theorem 4.1]{Whyte:1999uq} as stated above shows that if $f:X\to Y$ is a map between bounded geometry (not necessarily uniformly discrete) metric spaces such that \begin{enumerate}[(i)] \itemsep-.1cm \item $f$ is a coarse embedding (so induces maps on $H^{uf}_*$), \item $f_*[X]=[Y]$, \item $f$ has coarsely dense image (meaning that $\sup_{x\in X}d(x,f(Y))<\infty$), and \item there is a map $g:Y\to X$ such that $g\circ f$ and $f\circ g$ are close to the identities and $g$ has the properties (i), (ii), and (iii) above, \end{enumerate} then there is a bijection close to $f$. Note, however, that if $f:X\to Y$ is a coarse equivalence, then it will have have properties (i), (iii) and (iv) above, and that any map close to a coarse equivalence is a coarse equivalence, so we get the following statement: if $f:X\to Y$ is a coarse equivalence between bounded geometry metric spaces with $f_*[X]=[Y]$, then there is a bijective coarse equivalence $X\to Y$ that is close to $f$. To complete the argument we must show that (ii) above is always satisfied under our hypotheses. Indeed, note that amenability is invariant under coarse equivalence of bounded geometry metric spaces, as follows for example from \cite[Proposition 2.1 and Theorem 3.1]{Block:1992qp}. Hence if one of $X$ or $Y$ as in our set up is non-amenable, then the other is. Moreover, Block and Weinberger show in \cite[Theorem 3.1]{Block:1992qp} that $X$ is non-amenable if and only if $H^{uf}_0(X)=0$, and thus condition (ii) from Whyte's theorem is vacuous in our set-up. This completes the proof. \end{proof} \begin{proof}[Proof of Corollary \ref{IntroD}] Let $Y$ be as in Theorem \ref{cart abs}, and identify $B$ with $\ell^\infty(Y)$, and $A=C^*_u(X)$ with $C^*_u(Y)$. Choose an orthonormal basis $\{\xi_y\}_{y\in Y}$ for $H=\ell^2(X)$ that is compatible with the identification $B\cong \ell^\infty(Y)$. Precisely, if the minimal projection in $B$ corresponding to the characteristic function of $\{y\}$ is $p_y$, then choose $\xi_y$ to be a unit vector in the image of $p_y$. As $X$ coarsely embeds into Hilbert space, $X$ and $Y$ are coarsely equivalent by \cite[Corollary 1.5]{Braga:2019wv}, just as in the proof of Corollary \ref{IntroC}. Hence Theorem \ref{whyte the} gives us a bijective coarse equivalence $f:X\to Y$. Now define a map $u:\ell^2(X)\to \ell^2(X)$ by $u\delta_x=\xi_{f(x)}$. This is a unitary isomorphism, as $f$ is a bijection. Using that $f$ is a coarse equivalence, it follows that conjugation by $u$ takes $A$ to $C^*_u(Y)$, or in other words, $u$ conjugates $A$ to itself. Define $\alpha:A\to A$ by $\alpha(a)=uau^*$; we then have $\alpha(\ell^\infty(X))=u\ell^\infty(X)u^*=B$ as required. \end{proof} \begin{remark}\label{inner rem} It does not seem to be clear if the unitary $u$ produced by the above proof is actually in $A$ (or can be chosen to be in $A$), so we cannot conclude that the automorphism $\alpha$ in the statement of Corollary \ref{IntroD} is inner. Note that while any automorphism of a uniform Roe algebra $C^*_u(X)$ is induced by a unitary $u:\ell^2(X)\to \ell^2(X)$ (see \cite[Lemma 3.1]{Spakula:2011bs}) there are often many non-inner automorphisms of $C^*_u(X)$. For an illustrative example, take $X=\mathbb{Z}$ and the automorphism given by conjugation by the unitary $$ u:\ell^2(\mathbb{Z})\to \ell^2(\mathbb{Z}), \quad \delta_n\mapsto \delta_{-n}. $$ This is not inner, or even approximately inner. One can see this, for example, as it is non-trivial on $K$-theory. Indeed, the Pimsner-Voiculescu sequence implies that $K_1(C^*_u(X))$ is isomorphic to $\mathbb{Z}$, and generated by the class $[v]$ of the bilateral shift on $\ell^2(\mathbb{Z})$. We have $uvu^*=v^*$, so conjugation by $u$ takes $[v]$ to $-[v]$; on the other hand, if the corresponding automorphism were (approximately) inner, then it would act trivially on $K$-theory. \end{remark} \section{Uniqueness of Cartan subalgebras up to inner automorphism}\label{c*-alg sec} In this section, we prove our main result, Theorem \ref{c*-alg the}. The following notation will be in force for the rest of the section. Let $B\subseteq C^*_u(X)$ satisfy the assumptions of Theorem \ref{c*-alg the}. Theorem \ref{cart abs} (with $H=\ell^2(X)$) implies that there is a bounded geometry metric space $Y$, and a unitary isomorphism $v:\ell^2(Y)\to \ell^2(X)$ such that \begin{equation} v\ell^\infty(Y)v^*=B \quad \text{and}\quad vC^*_u(Y)v^*=C^*_u(X). \end{equation} \begin{lemma}\label{y fdc} With notation as above, the space $Y$ has property A. \end{lemma} \begin{proof} This follows as a bounded geometry metric space has property A if and only if its uniform Roe algebra is nuclear by \cite[Theorem 5.3]{Skandalis:2002ng} or \cite[Theorem 5.5.7]{Brown:2008qy}. \end{proof} At this point, we have two spaces $X$ and $Y$ with property A, and a unitary isomorphism $v:\ell^2(Y)\to \ell^2(X)$ that conjugates $C^*_u(Y)$ to $C^*_u(X)$. Our task is to show that there is some unitary $u\in C^*_u(X)$ that conjugates $v\ell^\infty(Y)v^*$ to $\ell^\infty(X)$. We will need some more notation that will be used throughout the rest of this section. For each $y\in Y$, let $q_y\in \mathcal{B}(\ell^2(Y))$ denote the orthogonal projection onto the span of $\delta_y$. Similarly, for each $x\in X$, let $p_x\in \mathcal{B}(\ell^2(X))$ be the orthogonal projection onto the span of $\delta_x$. For a subset $C$ of $X$ (respectively, of $Y$) define \begin{equation} p_C:=\sum_{x\in C} p_x \quad \Big(\text{respectively, } q_C:=\sum_{y\in C} q_y\Big) \end{equation} for the corresponding multiplication operator on $\ell^2(X)$ (respectively, on $\ell^2(Y)$). The proof splits fairly cleanly into three main steps. \begin{enumerate} \item Uniform approximability. For each subset $C$ of $Y$, we know that $vq_Cv^*$ is in the uniform Roe algebra of $X$, whence the following holds: ``$\forall \epsilon>0$, $\forall C\subseteq Y$, $\exists s>0$ such that $v\chi_Cv^*$ can be approximated within $\epsilon$ by an operator in $C^*_u(X)$ with propagation at most $s$''. A priori $s$ depends on $\epsilon$ and $C$. Our first aim is to improve this statement, so that $s$ only depends on $\epsilon$. Using a result of Braga and Farah (\cite[Lemma 4.9]{Braga:2018dz}), this can be achieved with no assumptions on $X$ and $Y$ beyond that they are bounded geometry metric spaces. \item The operator norm localisation property. The operator norm localisation property was introduced by Chen, Tessera, Wang, and Yu \cite{Chen:2008so}; it was shown to be equivalent to property A by Sako \cite{Sako:2012fk}. The key application here is roughly the following statement: ``$\forall\epsilon>0$, $\exists r>0$ such that $\forall y\in Y$, $\exists X_y\subseteq X$ of diameter at most $r$ such that $\|vq_yv^*p_{X_y}\|\geq 1-\epsilon$''. This says roughly that we can match points in $Y$ to uniformly bounded subsets of $X$. We need a stronger, somewhat more quantitative version of this that also works for subsets of $X$ other than singletons $\{x\}$; see Lemma \ref{soup up}. \item Completion of the proof. To finish the proof, the above step can be combined with Hall's marriage theorem to get an injection $f:Y\to X$ with $f(y)\in X_y$ for all $x$. As the situation is symmetric, we get a similar injection $g:X\to Y$, and so a bijection $h:X\to Y$ from K\"{o}nig's proof of the Cantor-Schr\"{o}der Bernstein theorem. This $h$ defines a unitary $w:\ell^2(X)\to \ell^2(Y)$ by $w\delta_x=\delta_{h(x)}$, which conjugates $\ell^\infty(X)$ to $\ell^\infty(Y)$. To complete the proof, it suffices to show that $u:=vw$ is contained in $C^*_u(X)$: this is achieved by using the quantitative results from the previous step to get a weak form of finite propagation for $u$, and then appealing to an approximation result due to \v{S}pakula and Zhang \cite{Spakula:2018aa} (which builds on work of \v{S}pakula and Tikuisis \cite[Theorem 2.8]{Spakula:2017aa}) to show that this weak property is enough. \end{enumerate} \subsubsection*{Step one: uniform approximability} Here is the result of Braga and Farah that we will use; it is a special case of \cite[Lemma 4.9]{Braga:2018dz}. \begin{lemma}\label{bf the} Let $Z$ be a bounded geometry metric space. Suppose $(a_n)_{n=1}^\infty$ is a sequence of finite rank operators on $\ell^2(Z)$ such that for every bounded sequence $(\lambda_n)_{n=1}^\infty$ of complex numbers, the series $\sum_{n=1}^\infty \lambda_n a_n$ converges strongly to an operator in $C^*_u(Z)$. Then for every $\epsilon>0$ there exists $s>0$ such that for every bounded sequence $(\lambda_n)_{n=1}^\infty$ there is $a\in C^*_u(X)$ of propagation at most $s$ and $\|\sum_{n=1}^\infty \lambda_n a_n-a\|<\epsilon$. \qed \end{lemma} The content of the lemma is in the order of quantifiers. The corresponding statement with $s$ depending also on the bounded sequence $(\lambda_n)_{n=1}^\infty$ is immediate. Here is the consequence we need. \begin{corollary}\label{spti} For any $\epsilon>0$ there exists $s>0$ such that for any $D\subseteq Y$ there is $a\in C^*_u(X)$ with propagation at most $s$, and $\|vq_Dv^*-a\|\leq \epsilon$. \end{corollary} \begin{proof} The family $\{vq_yv^*\}_{y\in Y}$ has the property that for any bounded sequence $(\lambda_y)_{y\in Y}$ of complex numbers, $\sum_{y\in Y}\lambda_yvq_yv^*$ converges strongly to $v^*(\sum_{y\in Y}\lambda_yq_y)v \in C^*_u(X)$. The corollary is then immediate from Lemma \ref{bf the}. \end{proof} \subsubsection*{Step two: the operator norm localisation property} We now recall the definition of the operator norm localisation property (ONL) from \cite[Definition 2.2]{Chen:2008so}. The version we give below is equivalent to the usual one by \cite[Proposition 2.4]{Chen:2008so}. Using the main result of \cite{Sako:2012fk}, property A is equivalent to ONL, so both our spaces $X$ and $Y$ have ONL by Lemma \ref{y fdc}. \begin{definition}\label{onl} A bounded geometry metric space $Z$ has the \emph{operator norm localisation property} (ONL) if for any $\epsilon\in (0,1)$ and any $s>0$ there is $r>0$ such that for any operator $a\in C^*_u(Z)$ with propagation at most $s$ there exists a unit vector $\xi\in \ell^2(Z)$ with \begin{equation} \|a\xi\|\geq (1-\epsilon)\|a\| \end{equation} and with $\xi$ supported in a set of diameter at most $r$. \end{definition} Again, the point is order of quantifiers; with $r$ also depending on $a$ the analogous statement is automatic. \ \begin{lemma}\label{msp cor} \begin{enumerate}[(i)] \itemsep-.1cm \item \label{msp cor spec} For any $\epsilon\in (0,1)$ there exists $r>0$ such that for any non-empty $D\subseteq Y$ there is $E\subseteq X$ with $\text{diam}(E)\leq r$ and \begin{equation} \|vq_Dv^*p_{E}\|\geq (1-\epsilon). \end{equation} \item \label{msp cor gen} For any $\epsilon\in (0,1)$ there exists $r>0$ such that for any $C\subseteq X$ and $D\subseteq Y$ there is $E\subseteq X$ with $\text{diam}(E)\leq r$ and \begin{equation} \|vq_Dv^*p_{C\cap E}\|\geq (1-\epsilon)\|vq_Dv^*p_C\|-\epsilon. \end{equation} \end{enumerate} \end{lemma} \begin{proof} We look at part \eqref{msp cor gen} first. Fix $\epsilon>0$. Using Corollary \ref{spti} there exists $s>0$ (depending only on $\epsilon$) such that for any $D\subseteq Y$, there is $a_0\in C^*_u(X)$ with propagation at most $s$ such that $\|vq_Dv^*-a_0\|<\epsilon/2$. As $p_C$ has propagation zero, it follows that if $a:=a_0p_C$ then $a$ still has propagation at most $s$, and as $\|p_C\|\leq 1$ we have that \begin{equation}\label{from spti} \|vq_Dv^*p_C-a\|<\epsilon/2. \end{equation} Using the operator norm localisation property, there exists $r>0$ (depending only on $s$ and $\epsilon$) such that there is a unit vector $\xi\in \ell^2(X)$ with support in a set $E\subseteq X$ of diameter at most $r$ such that $\|a\xi\|\geq (1-\epsilon)\|a\|$. Hence in particular we get \begin{equation}\label{from onl} \|ap_E\|\geq (1-\epsilon)\|a\|. \end{equation} Now, from line \eqref{from spti} we have \begin{equation} \|vq_Dv^*p_{C}p_{E}-ap_E\|<\epsilon/2. \end{equation} As $p_Cp_E=p_{C\cap E}$, this implies that \begin{equation} \|vq_Dv^*p_{C \cap E}\|> \|ap_E\|-\epsilon/2. \end{equation} Combining this with line \eqref{from onl} gives \begin{equation} \|vq_Dv^*p_{C \cap E}\|> (1-\epsilon)\|a\|-\epsilon/2, \end{equation} and applying line \eqref{from spti} again gives \begin{align} \|vq_Dv^*q_{C \cap E}\|&> (1-\epsilon)\|vp_Dv^*q_{C}\|-(1-\epsilon)\epsilon/2-\epsilon/2\\ &>(1-\epsilon)\|vp_Dv^*q_{C}\|-\epsilon, \end{align} proving \eqref{msp cor gen}. Part \eqref{msp cor spec} follows immediately from part \eqref{msp cor gen}. Indeed, let $r>0$ be as in the statement of part \eqref{msp cor gen} for the `error parameter' $\epsilon/2$, and take $C=X$. \end{proof} We can interchange the roles of $X$ and $Y$ in the previous argument, leading to the following lemma. \begin{lemma}\label{msp cor 2} For any $\epsilon\in (0,1)$ there exists $r>0$ such that for any $C\subseteq X$ and any $D\subseteq Y$, there is $F\subseteq Y$ with \begin{equation} \|vq_{D\cap F}v^*p_C\|\geq (1-\epsilon)\|vq_Dv^*p_C\|-\epsilon. \end{equation} and $\text{diam}(F)\leq r$. \end{lemma} \begin{proof} In the previous lemma we regarded $v^*\ell^\infty(Y)v$ as an `exotic Cartan' in $C^*_u(X)$, but we could equally well regard $v\ell^\infty(X)v^*$ as an exotic Cartan in $C^*_u(Y)$. As $Y$ also has ONL, we obtain that for every $\epsilon\in(0,1)$, there exists $r>0$ such that for any $C\subseteq X$ and $D\subseteq Y$, there exists $F\subseteq Y$ of diameter at most $r$ such that \begin{equation} \|vp_Cv^*q_{D\cap F}\|\geq (1-\epsilon)\|vp_Cv^*q_D\|. \end{equation} The result follows as $\|vp_Cv^*q_{D\cap F}\|=\|q_{D\cap F}vp_Cv^*\|=\|vq_{D\cap F}v^*p_C\|$, and likewise for the right hand side. \end{proof} We need some more notation. For each $y\in Y$ and $\delta>0$, define \begin{equation}\label{xydelta def} X_{y,\delta}:=\{x\in X\mid \|vq_yv^*p_x\|^2\geq \delta\}. \end{equation} Analogously, define \begin{equation}\label{yxdelta def} Y_{x,\delta}:=\{y\in Y\mid \|v^*p_xvq_y\|^2\geq \delta\}. \end{equation} One should think of $X_{y,\delta}$ as being the part of $X$ that is `$\delta$-close' to $y$ in some sense, and similarly for $Y_{x,\delta}$. We extend these notions to sets by defining $X_{D,\delta}:=\bigcup_{y\in D}X_{y,\delta}$ for $D\subseteq X$, and $Y_{C,\delta}:=\bigcup_{x\in C}X_{c,\delta}$ for $C\subseteq X$. \begin{lemma}\label{delt cor} With notation as in lines \eqref{xydelta def} and \eqref{yxdelta def} as above: \begin{enumerate}[(i)] \itemsep-.1cm \item \label{near xydelta} for each $\epsilon>0$, there is $\delta>0$ such that for all $y\in Y$, $\|vq_yv^*p_{X_{y,\delta}}\|^2\geq 1-\epsilon$; \item \label{xydelta bound} for each $\delta>0$ there exists $r>0$ such that for all $y\in Y$, the diameter of $X_{y,\delta}$ is at most $r$. \end{enumerate} \end{lemma} \begin{proof} Applying part \eqref{msp cor spec} of Lemma \ref{msp cor} with $D=\{y\}$, there is $r>0$ depending only on $\epsilon$ such that for each $y\in Y$ there is $E\subseteq X$ with $\text{diam}(E)\leq r$ and \begin{equation}\label{easy est} \|vq_yv^*p_E\|^2\geq 1-\epsilon/2. \end{equation} Let $\xi_y$ be any unit vector in the range of the rank one projection $vq_yv^*$, and note that \begin{equation} \|vq_yv^*p_E\|^2=\|p_Evq_yv^*\|^2=\|p_E\xi_y\|^2, \end{equation} so line \eqref{easy est} above says that \begin{equation}\label{sum of xiy} \sum_{x\in E}|\xi_y(x)|^2\geq 1-\epsilon/2. \end{equation} Notice that this implies that $X_{y,\epsilon/2}\subseteq E$, proving (\ref{xydelta bound}) after relabelling $\epsilon$ as $2\delta$, as otherwise the sum above differs from $1=\sum_{x\in X}|\xi_y(x)|^2$ by a term of size at least $\epsilon/2$, a contradiction. Let $N\in \mathbb{N}$ be an absolute bound on the cardinalities of all balls of radius $r$ in $X$, and let $\delta<\frac{\epsilon}{2N}$ (which only depends on $r$ and $\epsilon$, so only on $\epsilon$). Then \begin{align} \|vq_yv^*p_{X_{y,\delta}}\|^2 & =\sum_{x\in X_{y,\delta}}|\xi_y(x)|^2 \nonumber \\ & \geq \sum_{x\in E\cap X_{y,\delta}}|\xi_y(x)|^2 \nonumber \\ & =\sum_{x\in E}|\xi_y(x)|^2-\sum_{x\in E\setminus X_{y,\delta}}|\xi_y(x)|^2. \end{align} Now, on the one hand line \eqref{sum of xiy} gives $\sum_{x\in E}|\xi_y(x)|^2\geq 1-\epsilon/2$, and on the other hand $|\xi_y(x)|^2=\|p_xvq_yv^*\|^2<\delta$ for all $x\not\in X_{y,\delta}$. Moreover, $|E|\leq N$ whence $\sum_{E\setminus X_{y,\delta}}|\xi_y(x)|^2<N\delta$. The previous displayed inequality thus implies \begin{equation} \|vq_yv^*\chi_{X_{y,\delta}}\|^2\geq 1-\frac{\epsilon}{2}-N\delta, \end{equation} and the right hand side is at least $1-\epsilon$ by choice of $\delta$, proving (\ref{near xydelta}). \end{proof} We now bootstrap Lemma \ref{delt cor} \eqref{near xydelta} to subsets. \begin{lemma}\label{soup up} For any $\epsilon>0$, there is $\delta>0$ such that for any subset $D$ of $Y$, \begin{equation} \|vq_Dv^*(1-p_{X_{D,\delta}})\|<\epsilon, \end{equation} and for any subset $C$ of $X$ \begin{equation} \|v^*p_Cv(1-q_{Y_{C,\delta}})\|<\epsilon. \end{equation} \end{lemma} \begin{proof} Fix $\gamma>0$, to be chosen later in a way depending only on $\epsilon$. Using Lemma \ref{msp cor 2} there is $r>0$ such that for any $C\subseteq X$ and $D\subseteq Y$ we have $F\subseteq Y$ with $\text{diam}(F)\leq r$ such that \begin{equation} \|vq_{D\cap F}v^*p_C\Big\|\geq (1-\gamma)\|vq_Dv^*p_C\|-\gamma. \end{equation} Hence \begin{equation}\label{start} \|vq_Dv^*p_C\|\leq \frac{\|vq_{D\cap F}v^*p_C\|+\gamma}{1-\gamma}. \end{equation} Let $M$ be some large positive number, to be chosen later (in a way that depends only on $r$ and $\gamma$, so only on $\gamma$, so only on $\epsilon$). Applying Lemma \ref{delt cor} \eqref{near xydelta} gives $\delta_Y>0$ such that $\|vq_yv^*p_{X_{y,\delta_Y}}\|^2\geq 1-\frac{1}{M}$ for all $y\in Y$. As before, let $\xi_y$ be any unit vector in the image of $vq_yv^*$, and note that \begin{equation} \|vq_yv^*p_{X_{y,\delta_Y}}\|^2+\|vq_yv^*(1-p_{X_{y,\delta_Y}})\|^2=\sum_{x\in X_{y,\delta_Y}}|\xi_y(x)|^2 +\sum_{x\not\in X_{y,\delta_Y}}|\xi_y(x)|^2, \end{equation} which equals one, and therefore also that \begin{equation} \|vq_yv^*(1-p_{X_{y,\delta_Y}})\|\leq 1/\sqrt{M} \end{equation} for all $y\in Y$. Hence, for any $y\in D$ \begin{equation}\label{partway} \|vq_yv^*(1-p_{X_{D,\delta_Y}})\|\leq \|vq_yv^*(1-p_{X_{y,\delta_Y}})\|\leq1/\sqrt{M}. \end{equation} Now, take $C:=X\setminus X_{D,\delta_Y}$, and find $F\subseteq Y$ with diameter at most $r$, so that line (\ref{start}) holds. Using this and line \eqref{partway}, we get \begin{align} \|vq_Dv^*(1-p_{X_{D,\delta_Y}})\| & \leq \frac{|F|\sup_{y\in D}\|vq_yv^*(1-p_{X_{D,\delta_Y}})\|+\gamma}{1-\gamma} \nonumber \\ & \leq \frac{|F|\frac{1}{\sqrt{M}}+\gamma}{1-\gamma}. \end{align} Let $N$ be a bound on the cardinalities of all $r$-balls in $Y$, and set $M:=(N/\gamma)^2$. Then the above says that \begin{equation} \|vq_Dv^*(1-p_{X_{D,\delta_Y}})\|\leq \frac{2\gamma}{1-\gamma}. \end{equation} Choosing $\gamma<\frac{\epsilon}{2+\epsilon}$, this proves the first claim of the lemma. Interchanging the roles of $X$ and $Y$, exactly as in Lemma \ref{msp cor 2}, we can run the proof of Lemma \ref{delt cor} and the proof above, to obtain $\delta_X>0$ such that $\|v^*p_Cv(1-q_{Y_{C,\delta_X}})\|<\epsilon$ for all $C\subseteq X$. Then, we take $\delta=\min(\delta_X,\delta_Y)$. \end{proof} \subsubsection*{Step 3: completion of the proof} To complete the proof, we first give an application of Hall's marriage theorem to construct appropriate maps. \begin{lemma}\label{hall lem} There exist $\delta>0$ and injections $f:Y\to X$ and $g:X\to Y$ such that $f(y)\in X_{y,\delta}$ for all $y\in Y$ and $g(x)\in Y_{x,\delta}$ for all $x\in X$. \end{lemma} \begin{proof} Fix $\epsilon=1/2$ (any $\epsilon<1$ would work), and let $\delta$ satisfy the condition in Lemma \ref{soup up} for this $\epsilon$. We first claim that for any finite $D\subseteq Y$, the cardinality of $X_{D,\delta}$ is at least as large as that of $D$, or in other words that that the rank of $p_{X_{D,\delta}}$ is at least as big as that of $vq_Dv^*$. If not, then the rank of $vq_Dv^*$ is strictly larger than that of $p_{X_{D,\delta}}$; this forces the images of $vq_Dv^*$ and $1-p_{X_{D,\delta}}$ to have non-trivial intersection and thus $\|vq_Dv^*(1-p_{X_{D,\delta}})\|\geq 1$, contradicting the inequality in the first statement of Lemma \ref{soup up}. Consider now the function $\phi:Y\to \mathcal{P}(X)$ defined by $\phi(y):=X_{y,\delta}$. Then for any finite subset $D\subseteq Y$, \begin{equation} \Big|\bigcup_{y\in D}\phi(y)\Big|=|X_{D,\delta}|\geq |D|. \end{equation} The existence of $f$ follows from Hall's marriage theorem. The existence of $g$ follows in exactly the same way, using the second statement in Lemma \ref{soup up}. \end{proof} \begin{corollary}\label{csb cor} There exists $\delta>0$, $r>0$ and a bijection $h:X\to Y$ such that for any $x\in X$, $X_{h(x),\delta}$ is contained in the ball $B(x;r)$ around $x$ of radius $r$. \end{corollary} \begin{proof} Let $\delta>0$ and $f:Y\to X$ and $g:X\to Y$ be injections as in Lemma \ref{hall lem}. K\"{o}nig's proof of the Cantor-Scr\"{o}der-Bernstein theorem gives us a bijection $h:X\to Y$ with the property that for each $x\in X$, either $h(x)=g(x)$, or $x$ is in the image of $f$ and $h(x)=f^{-1}(x)$. To complete the proof we must show that there exists $r>0$ such that for every $x\in X$, $X_{h(x),\delta}$ is contained in the ball $B(x;r)$ centered at $x$ with radius $r$. Indeed, let $r$ equal the supremum of the diameters of the sets $X_{y,\delta}$ as $y$ ranges over $Y$; $r$ is finite by part (ii) of Lemma \ref{delt cor}. Note first that if $x\in X$ is such that $h(x)=f^{-1}(x)$ for some $x\in X$, then $f(h(x))=x$ is an element of $X_{h(x),\delta}$ by the properties of $f$. This implies that $X_{h(x),\delta}$ is contained in $B(x;r)$ by choice of $r$. On the other hand, say $x\in X$ is such that $h(x)=g(x)$. Then, by the defining property of $g$, $g(x)\in Y_{x,\delta}$, from which it follows that $\|v^*p_xvq_{g(x)}\|^2\geq \delta$. Hence $\|p_xvq_{g(x)}v^*\|^2\geq \delta$, which says exactly that $x$ is in $X_{g(x),\delta}$. The result follows by assumption on the diameter of all of the $X_{y,\delta}$. \end{proof} Now let $h:X\to Y$ be any bijection as in the conclusion of Corollary \ref{csb cor} for some appropriate $\delta>0$. Let $w:\ell^2(X)\to \ell^2(Y)$ be the unitary defined by $w\delta_x=\delta_{h(x)}$. Clearly then $w^*\ell^\infty(Y)w=\ell^\infty(X)$, and as also $v\ell^\infty(Y)v^*=B$ we thus get that $w^*v^*Bvw=\ell^\infty(X)$. To complete the proof, it suffices to show that the unitary \begin{equation}\label{the one} u:=w^*v^* \end{equation} is in $C^*_u(X)$. To this end, we need a general criterion of \v{S}pakula and Zhang \cite{Spakula:2018aa} (itself building on an earlier result of \v{S}pakula and Tikuisis \cite[Theorem 2.8]{Spakula:2017aa}). \begin{theorem}[\v{S}pakula and Zhang]\label{st the} Let $Z$ be a bounded geometry metric space with property A, and let $a\in \mathcal{B}(\ell^2(Z))$ be such that for any $\epsilon>0$ there exists $s>0$ such that if $C,D\subseteq Z$ satisfy $d(C,D)>s$, then $\|\chi_Ca\chi_D\|<\epsilon$. Then $a$ is in $C^*_u(X)$. \end{theorem} We finally have all the ingredients in place to prove our main result. \begin{proof}[Proof of Theorem \ref{c*-alg the}] Let $h$ and $\delta$ be as in the conclusion of Corollary \ref{csb cor}, and let $u$ be the associated unitary as in line \eqref{the one}. We claim first that for any $\epsilon>0$ there is $t>0$ such that for any subset $C\subseteq X$ if $N_t(C):=\{x\in X\mid d(x,C)\leq t\}$ then we have \begin{equation} \|vq_{h(C)}v^*(1-p_{N_t(C)})\|<\epsilon. \end{equation} Indeed, applying Lemma \ref{soup up} with $D:=h(C)$ gives us $\gamma>0$ such that \begin{equation} \|vq_{h(C)}v^*(1-p_{X_{h(C),\gamma}})\|<\epsilon. \end{equation} Now, we may assume that $\gamma\leq \delta$ and thus we have that $X_{h(x),\gamma}\supseteq X_{h(x),\delta}$ for all $x\in C$. Let $r$ be such that $X_{h(x),\delta}$ is contained in $B(x;r)$ (such exists by Corollary \ref{csb cor}), and let $s$ be such that $X_{h(x),\gamma}$ has diameter at most $s$ for all $x\in C$ (such an $s$ exists by Lemma \ref{delt cor}, part \eqref{xydelta bound}). Hence each $X_{h(x),\gamma}$ is contained in $B(x;s+r)$. The claim follows with $t=s+r$. Now, from the claim we have that for any $\epsilon>0$ there is $t>0$ such that for any subset $C\subseteq X$ we have \begin{equation} \|vwp_{C}w^*v^*(1-p_{N_t(C)})\|<\epsilon. \end{equation} Hence for any $\epsilon>0$ there is $t>0$ such that for any subset $C\subseteq X$ we have \begin{equation} \|p_Cu(1-p_{N_t(C)})\|<\epsilon, \end{equation} and this in turn implies that for any $\epsilon>0$ there is $t>0$ such that for any subsets $C,D\subseteq X$ with $d(C,D)>t$ we have that \begin{equation} \|\chi_Cu\chi_D\|<\epsilon. \end{equation} Hence, by Theorem \ref{st the}, $u$ is in $C^*_u(X)$. \end{proof} \begin{remark}\label{fdc vs a rem} An earlier version of this paper used \emph{finite decomposition complexity} (FDC) in place of the hypothesis of property A in Theorem \ref{c*-alg the}. FDC was introduced by Guentner, Tessera, and Yu \cite{Guentner:2009tg} in their work on topological rigidity. We initially used FDC as we originally appealed to an analogue of Theorem \ref{st the}, due to \v{S}pakula and Tikuisis \cite{Spakula:2017aa}, that has FDC as a hypothesis in place of property A. Since the first version of our paper, \v{S}pakula and Zhang built on the techniques of \cite{Spakula:2017aa} (and introduced some others) to prove Theorem \ref{st the} in the form stated above. Property A is known to be implied by FDC \cite[Theorem 4.6]{Guentner:2013aa}, so the version of Theorem \ref{c*-alg the} with property A as a hypothesis is a priori stronger than the version with FDC. Note though that it remains an open problem whether property A implies FDC. \end{remark} We end the paper with the following `rigidity' corollary of Theorem \ref{c*-alg the}. \begin{corollary}\label{rig the} Say $X$ and $Y$ are bounded geometry metric spaces. Then the following are equivalent: \begin{enumerate}[(i)] \itemsep-.1cm \item there is a bijective coarse equivalence between $X$ and $Y$; \item the coarse groupoids associated to $X$ and $Y$ (see \cite{Skandalis:2002ng} or \cite[Chapter 10]{Roe:2003rw}) are isomorphic; \item there is a $^*$-isomorphism from $C^*_u(X)$ to $C^*_u(Y)$ that takes $\ell^\infty(X)$ to $\ell^\infty(Y)$. \end{enumerate} Moreover, if $X$ has property A, then these statements are equivalent to \begin{enumerate} \item[(iv)] there is a $^*$-isomorphism from $C^*_u(X)$ to $C^*_u(Y)$. \end{enumerate} \end{corollary} The equivalence of (i), (ii), and (iii) in the above is fairly well-known: it seems to have been observed independently by several people. We are not sure if it has explicitly appeared in the literature before: see \cite[Theorem 8.1]{Braga:2018dz} for a closely related, and overlapping, result. The content of the corollary is the equivalence of these with (iv) when $X$ has property A. \begin{proof}[Proof of Corollary \ref{rig the}] The fact that (i) implies (ii) implies (iii) is straightforward. The implication (iii) implies (i) follows as such a $^*$-isomorphism induces a bijection between the minimal projections in $\ell^\infty(X)$ and those in $\ell^\infty(Y)$, and thus a bijection $f:X\to Y$. We claim that $f$ is uniformly expansive in the sense of Definition \ref{bg def}. Indeed, if not, then there is $r>0$ and a sequence $\big((x^{(n)}_1,x^{(n)}_2)\big)_{n=1}^\infty$ of pairs in $X\times X$ such that $d_X(x^{(n)}_1,x^{(n)}_2)\leq r$ for all $n$, but such that $d_Y(f(x^{(n)}_1),f(x^{(n)}_2))\to\infty$ as $n\to\infty$. Passing to a subsequence and using bounded geometry, we may assume that no point of $X$ appears twice in the set $\{x^{(n)}_1,x^{(n)}_2\mid n\in \mathbb{N}\}$. Now, consider the $X\times X$ matrix defined by the condition that $a_{x^{(n)}_1x^{(n)}_2}=1$ for all $n$, and all other matrix entries zero. Our assumptions that no element appears twice in $\{x^{(n)}_1,x^{(n)}_2\mid n\in \mathbb{N}\}$ implies that this matrix is supported on a single diagonal, and thus defined a bounded operator $a$ on $\ell^2(X)$ by Lemma \ref{linf normal}. Moreover, the fact that $d(x^{(n)}_1,x^{(n)}_2)\leq r$ for all $n$ implies that $a$ is in $\mathbb{C}_u[X]$. On the other hand, our isomorphism takes $a$ to an operator in $C^*_u(Y)$ whose $(f(x^{(n)}_1),f(x^{(n)}_2))^\text{th}$ matrix entry is one for all $n$. The assumption that $d_Y(f(x^{(n)}_1),f(x^{(n)}_2))\to\infty$ implies that this is impossible, however. A precisely analogous argument now shows that $f^{-1}$ is also uniformly expansive, so $f$ is a coarse equivalence as required. As (iii) implies (iv) is trivial, to complete the proof it suffices to prove (iv) implies (iii). Assume that $C^*_u(X)$ and $C^*_u(Y)$ are $^*$-isomorphic. As in \cite[Lemma 3.1]{Spakula:2011bs}, there is a unitary isomorphism $v:\ell^2(X)\to \ell^2(Y)$ such that $vC^*_u(X)v^*=C^*_u(Y)$. Let $B=v\ell^\infty(X)v^*$, which satisfies the assumptions of Theorem \ref{c*-alg the}; this needs that $Y$ has property A, which follows from \cite[Theorem 1.4]{Spakula:2011bs} and the fact that property A is a coarse invariant. Hence there is $u\in C^*_u(Y)$ with $uBu^*=\ell^\infty(Y)$. Now, we have that $uv\ell^\infty(X)v^*u^*=\ell^\infty(Y)$. Then $\mathrm{ad}(uv)$ is an isomorphism from $C^*_u(X)$ onto $C^*_u(Y)$ mapping $\ell^\infty(X)$ onto $\ell^\infty(Y)$. \end{proof} \begin{remark}\label{a vs ce} Using Corollary \ref{IntroD}, one could replace the assumption of property A in the above by the assumption that $X$ coarsely embeds into Hilbert space, and is non-amenable. The proof is essentially the same. Note that for groups, amenability implies property A (which implies coarse embeddability into Hilbert space). Therefore if $X$ is restricted to the class of groups, we can replace property A in Theorem \ref{rig the} by coarse embeddability into Hilbert space with no (non-)amenability assumption. However, for general bounded geometry metric spaces, amenability does not imply property A (or even coarse embeddability into Hilbert space), so we cannot get away with this in general. \end{remark}
\section{Introduction} \label{sec:introduction} Artificial Intelligence (AI), as an auxiliary technology in modern games, has played an indispensable role in improving gaming experience in the last decade. The film ``Ready Player One'' vividly shows the charm of future virtual games on the world. It demonstrates that one of the core technologies of virtual-realistic interaction is recognizing all kinds of complex activities. Convolutional neural networks are very powerful and have been successfully used in many neural network models. They have been widely applied in lots of virtual-realistic interactive practical applications, e.g., object recognition~\cite{b1,b2,b3}, Internet of Things~\cite{b4,b5}, human activity recognition~\cite{b6,b7}. Its successes have been driven by the recent data explosion as well as the increase in model size. \begin{figure} \centering \includegraphics[width=8cm]{F1.png}\\ \caption{The rough numbers for the computations' energy consumption (45nm technology) ~\cite{b8} and some effective methods to deploy deep neural networks on portable devices.}\label{fig:F1} \end{figure} In spite of these successes, the large computational power and high memory requirements of these models restricts them from being deployed on portable devices that lack high-performance Graphical Processing Units (GPUs) as shown in Figure~\ref{fig:F1}. As far as we know, it is more interesting to operate sensor-based portable gaming devices which are able to recognize human activities. As a result of this, it is necessary to deploy advanced CNN, e.g., Inception-Nets~\cite{b9}, ResNets~\cite{b10} and VGG-Nets~\cite{b11} on smart portable devices. However, as the winner of the ILSVRC-2015 competition, ResNets-152~\cite{b10} is a classifier trained with nearly 19.4 million real-valued parameters, making it resource-intensive in different aspects. It is unable to run on portable devices for real-time applications, due to its high CPU/GPU workload and memory usage requirements. A similar phenomenon occurs in other state-of-the-art models, such as, VGG-Net~\cite{b11} and AlexNet~\cite{b12}. Recently, in order to resolve the storage and computational problems~\cite{b13,b14} can be categorized into three methods, i.e., network pruning, low-rank decomposition and quantization of network. Among them, quantization of network has received more and more research focus. DCNNs with binary weights and activations have been designed ~\cite{b15,b16,b17}. Binary Convolutional Neural Networks (BCNNs) with weights and activations constrained to only two values (e.g., -1,+1), can bring great benefits to specialized machine learning hardware because of the following major reasons: (1) the quantized weights and activations reduce memory usage and model size by $\sim$32x compared to the full-precision version; (2) if networks are binary, then most multiply-accumulate operations (require hundreds of logic gates at least) can be replaced by popcount-XNOR operations (only require a single logic gate), which are especially well suited for FPGAs and ASICs~\cite{b18}. However, the following problems limit the practical applications of above-mentioned idea: 1) quantization usually causes severe prediction accuracy degradation. The reported accuracy of obtained models is unsatisfactory on complex tasks (e.g., ImageNet dataset). More concretely, Rastegari \emph{et al.}~\cite{b17} shows that binary weights cause the accuracy of ResNet-18 to drop by about 9\% (GoogLenet drops by about 6\%) on the ImageNet dataset. It is obvious that there is a considerable gap in performance between the accuracy of a quantization model and the full-precision model. 2) in the case of practical applications, typical human activity recognition datasets containing multiple sensor data are collected from different positions on the body. This data can be fused at different stages within a convolutional neural network architecture~\cite{b19}. However, depending on the type of activity being performed, a sensor may contribute less or more to the overall result compared to other sensors depending on its location, and thus its fusion weight adjusted accordingly. In light of these considerations, this paper proposes a novel quantization method and dynamic fusion strategy, to achieve deployments on an advanced high-precision and low-cost computation neural network model on portable devices. The main contributions of this paper are summarized as follows: \begin{enumerate} \item We propose a quantization function with an elastic scale parameter ($\boldsymbol{\epsilon}$-$\boldsymbol{Q}$) to quantize the entire full-precision convolutional neural network. The quantization of weights, activations and fusion weights are derived from the quantization function ($\boldsymbol{\epsilon }$-$\boldsymbol{Q}$) with different scale parameters ($\boldsymbol{\epsilon }$). We quantize the weights and activations to 2-bit values ${\{-0.5,\ 0,\ 0.5\}}$, and use a masked Hamming distance instead of a floating-point matrix multiplication. This setup is able to achieve an accuracy score close to that of the full-precision counterpart, using about $\sim$11$\times$ less memory and achieving a $\sim$9$\times$ speedup. \item We introduce a dynamic fusion strategy for multi-sensors environmental activity recognition, which can decrease the computational complexity and improve the performance of model by reducing the representations from sensors that have ``less contribution'' during a particular activity. For sensors whose ``contribution'' (sub-network) is less than the others, we randomly reduce their representations through fusion weights, which are sampled from a Bernoulli distribution given by the scale parameter $\boldsymbol{\epsilon}$ from the quantization method. Experimental results show that by adopting a dynamic fusion strategy, we were able to achieve a higher accuracy level and lower memory usage than the baseline model. \end{enumerate} Ideally, using more quantization weights, activation modules and fusion strategy will result in better accuracy and eventually achieve a higher accuracy than the full-precision baselines. The training strategy can reduce the amount of computing power required and the energy consumption, thereby realizing the main objective of designing a system that can be deployed on portable devices. More importantly, adopting dynamic fusion strategies for different types of activities are more in line with the actual situation. This was verified by using both the quantization method and fusion strategy on the OPPORTUNITY and PAMAP2 datasets. Only the quantization method was applied on the UniMiB-SHAR dataset. \textbf{This is the first time that both quantization and dynamic fusion strategy were adopted for convolutional networks to achieve a high prediction accuracy on complex human activity recognition tasks.} The remainder of this paper is structured as follows. In Section \ref{sec:Related_Work}, we briefly introduce the related works on human activity recognition, quantization models and methods for convolutional neural networks. In Section \ref{sec:Method}, we highlight the motivation of our method and provide some theoretical analysis for its implementation. In Section \ref{sec:EXPERIMENTS}, we introduce our experiment. Section \ref{sec:Result_and_Discussion} experimentally demonstrates the efficacy of our method and finally Section \ref{sec:Conclusion_and_Future_Work} states the conclusion and future work. \section{Related Work}\label{sec:Related_Work} \subsection{Convolutional Neural Networks for Human Activity Recognition} Several advanced algorithms have been evaluated in the last few years on the human activity recognition. Hand-crafted features method~\cite{b20} uses simple statistical value (e.g., std, avg, mean, max, min, median, etc.) or frequency domain correlation features based on the signal Fourier transform to analyze the time series of human activity recognition data. Due to its simplicity to setup and low computational cost, it is still being used in some areas, but the accuracy cannot satisfy the requirement of modern AI games. Decision Trees~\cite{b21}, Support Vector Machines (SVM)~\cite{b22}, Random Forests~\cite{b19}, Dynamic Time Warping~\cite{b23} and Hidden Markov Models (HMMs)~\cite{b24,b25} for predicting action classes, work well when data are scarce and highly unbalanced. However, when faced with the activity recognition of complex high-level behaviors tasks, identifying the relevant features through these traditional approaches is time-consuming~\cite{b22}. Recently, many researchers have adopted Convolutional Neural Networks (CNNs) to deploy human activity recognition system, such as ~\cite{b6,b22,b26,b27,b28}. Convolutional Neural Networks were based on the discovery of visual cortical cells and retain the spatial information of the data through receptive field. It is known that the power of CNNs stems in large part from their ability to exploit symmetries through a combination of weight sharing and translation equivariance. Also, with their ability to act as feature extractors, a plurality of convolution operators are stacked to create a hierarchy of progressive abstract features. Apart from image recognition ~\cite{b12,b29,b30}, NLP ~\cite{b31,b32} and video recognition ~\cite{b33}, more and more researches in recent years are using CNNs to learn sensor-based data representations for human activity recognition and have achieved remarkable performances ~\cite{b6,b34}. The model ~\cite{b28} consists of two or three temporal-convolution layers with ReLU activation function followed by max-pooling layer and a soft-max classifier, which can be applied over all sensors simultaneously. Yang \emph{et al.} ~\cite{b6} introduce a four temporal-convolutional layers on a single sensor, followed by a fully-connected layer and soft-max classifier and it shows that deeper networks can find correlations between different sensors. Just like the works discussed above, we adopt convolutional neural networks to learn representations from wearable multi-sensor signal sources. However, these advanced high-precision models are difficult to deploy on portable devices, due to their computational complexity and energy consumption. As a result, quantization of convolutional neural networks has become a hot research topic. The aim is to reduce memory usage and computational complexity while maintaining an acceptable accuracy. \subsection{Quantization Model of Convolutional Neural Networks} The convolutional binary neural network is not a new topic. Inspired by neuroscience, the unit step function is used as an activation function in artificial neural networks ~\cite{b35}. The binary activation mode can use spiking response for computing and communication, which is an energy-efficient method because it consumes energy only when necessary ~\cite{b13}. Recently, Binarized-neural-networks (BNNs) ~\cite{b16} have been used to quantize the weights and activations to binary values of each layer successfully. They proposed two binarization functions, the first is deterministic as shown in \eqref{eq:deterministic_method} and the second is stochastic as shown in \eqref{eq:stochastic_method}. Where $\tilde{w}$ is the binarized variable and $w$ is the full-precision variable, $\sigma( w )=clip( w+\frac{1}{2},\text{0,1})$ is the ``hard sigmoid'' function. \begin{equation}\label{eq:deterministic_method} \tilde{w}=\text{sign}(w) =\begin{cases} +\text{1\ }if\ w\geqslant \text{0;}\\ -\text{1\ }if\ otherwise.\\ \end{cases} \end{equation} \begin{equation}\label{eq:stochastic_method} \tilde{w}=\begin{cases} +\text{1\ }with\ probability\ p=\sigma(w) ;\\ -\text{1\ }with\ probability\ 1-p.\\ \end{cases} \end{equation} Ternary Weight Network (TWN)~\cite{b36} constrains the weights to ternary values ($-1,0,1$) by referencing symmetric thresholds. In each layer, the quantization of TWN is shown in \eqref{eq:TWN}, where $\varDelta \approx 0.7\cdot E(|w|)\approx \frac{0.7}{n}\sum_{i=1}^{n}|w_i|$ is a positive threshold parameter. They claim a trade-off between model complexity and generalization. \begin{equation}\label{eq:TWN} \tilde{w}_i=f(w_i|\Delta) =\begin{cases} +\text{1,} & if\ w_i>\Delta ;\\ \text{0,} & if\ |w_i|\leqslant \Delta ;\\ -\text{1,} & if\ w_i<-\Delta . \end{cases} \end{equation} DoReFa-Net ~\cite{b37} is derived from AlexNet, which has 1-bit weights, 2-bit activations and 6-bit gradients and it can achieve 46.1\% top-1 accuracy on ImageNet validation set. DoReFa-Net adopts a method as shown in \eqref{eq:DoRefa-net}, where $w$ and $\tilde{w}$ are the full-precision (original) and quantized weights, respectively, and $E(|w|)$ is the mean absolute value of weights. \begin{equation}\label{eq:DoRefa-net} \tilde{w}=E(|w|) \times \text{sign}(w). \end{equation} \subsection{Quantization Method for Convolutional Neural Networks} The idea of quantization of weights and activations was first proposed by ~\cite{b16}. The research showed the following two contributions: 1) the costly arithmetic operations between weights and activations in full-precision networks can be replaced with cheap bitcount and XNOR operations, which can result in significant speed improvements. Compared with the full-precision counterpart, 1-bit quantization reduces the memory usage by a factor of 32; and 2) in some visual classification tasks, using 1-bit quantization could achieve fairly good performance. Some researchers ~\cite{b17,b38} have introduced easy, high-performance and accurate approximations to convolutional neural networks by quantizing the weights, and using a uniform quantization method, which first scales its value in the range $x\in[-\text{1,}\text{1}]$. Then it adopts the following $k$-bit quantization as shown in \eqref{eq:uniform_quantization_method}, where $round$ approximates continuous values to their nearest discrete states. The benefit of this quantization method is that when calculating the inner product of two quantized vectors, costly arithmetic calculations can be replaced by cheap operations. (e.g. bit shift, count operation) In addition, this quantization method is rule-based and thus easy to implement. \begin{equation}\label{eq:uniform_quantization_method} q_k\left( x \right) =2\left( \frac{round\left( \left( 2^k-1 \right) \left( \frac{x+1}{2} \right) \right)}{2^k-1}-\frac{1}{2} \right). \end{equation} Zhou \emph{et al.} ~\cite{b39} propose a network compression method called Incremental Network Quantization (INQ). After obtaining a network through training, the parameters (full-precision parameters) of each layer are first divided into two groups. The parameters in the first group are directly quantized and fixed. The other group of parameters through retraining compensated for the loss of accuracy caused by quantization. The above process iterates until all parameters are quantized. With incremental quantization, using weights with small-width values (e.g., 3-bit, 4-bit and 5-bit) results in almost no accuracy loss compared with the full-precision counterpart. The quantization method is shown in \eqref{eq:INQ}, where $w$ and $\tilde{w}$ are full-precision (original) and quantized weights, respectively, $lb$ and $ub$ are the lower and upper bounds of the quantized set, respectively. \begin{equation}\label{eq:INQ} \tilde{w}=\begin{cases} \text{sign} (w) \times 2^p\ if\ 3\times 2^{p-2}\leqslant |w|<3\times 2^{p-1};\\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ lb\leqslant p\leqslant ub;\\ \text{sign} (w) \times 2^q\ if\ \left| w \right|\geqslant 2^{ub};\\ \text{0}\ \ \ \ \ \ \ \ \ \ \ \ \ \ if\ |w|<2^{-lb-1}.\\ \end{cases} \end{equation} Wen \emph{et al}. ~\cite{b40} proposes a method as shown in \eqref{eq:TernGrad}, where $s_t:=\lVert g_t \rVert _{\infty}:=max(abs (g_t))$ is a scaler parameter, $\otimes$ is the Hadamard product, $abs(\cdot)$ respectively returns the $absolute$ value of each element. The method quantizes gradients to ternary values that can effectively improve clients-to-server communication in distributed learning. \begin{equation}\label{eq:TernGrad} \tilde{g}_t=s_t\cdot \mbox{sign} \left( g_t \right) \otimes b_t. \end{equation} Guo \emph{et al}. ~\cite{b41} propose greedy approximation, which instead tries to learn the quantization as shown in \eqref{eq:greedy approximation}, where $B_i$ is a binary filter, $\alpha_i$ are optimization parameters and input channels ($c$)$\times$ width ($w$)$\times$ height ($h$) is the size of the filter. \begin{equation}\label{eq:greedy approximation} \begin{cases} \begin{array}{l} \alpha _{i}^{*},B_{i}^{*}=\underset{\alpha _i,B_i}{arg\min}\lVert W-\sum_{i=1}^k{\alpha _iB_i}\rVert,\\ \ \ \ \ \ \ \ s.t.\ \ \ \ \ \ B_i\in \left\{ -\text{1,}+1 \right\} ^{c\times w \times h}.\\ \end{array}\\ \end{cases} \end{equation} The greedy approximation expands to $k$-bit ($k>1$) quantization by minimizing the residue in order. Although not able to achieve a high-precision solution, the formulation of minimizing quantization error is very promising, and quantitative neural networks designed in this manner can be effectively deployed on modern portable devices. \section{Method}\label{sec:Method} In this section, we introduce our quantization method and dynamic fusion strategy, which is termed DFTerNet (Dynamic-Fusion-Ternary(2-bit)-Convolutional-Network) for convenience. We aim to recognize human activity extracted from IMU sensors. For this purpose, a fully-convolutional-based architecture is chosen and we focus on the recognition accuracy of the final model. During \textbf{train-time} (Training), we still use the full-precision network (the real-valued weights are retained and updated at each epoch). During \textbf{run-time} (Inference), we use ternary weights in convolution. \subsection{Linear Mapping} In this paper, we propose a quantization function $\boldsymbol{\epsilon}$-$\boldsymbol{Q}$ that converts a floating-point $x$ to its $k$-bitwidth signed integer. Formally, it can be defined as follows: \begin{equation}\label{eq:quantization_function} Q_k\left( x,\epsilon \right) = \end{equation} $$ Clip\left(\phi(k)\cdot round\left( \frac{x\cdot \boldsymbol{\epsilon }}{\phi \left( k \right)} \right) ,-1+\phi \left( k \right) ,1-\phi \left( k \right) \right), $$ \noindent where $\phi \left( k \right) =2^{1-k},k>1\ \text{and}\ k\in \mathbb{N}_+$ is uniform distance, whose role is to perform a discretization of $k$-bit linear mapping of continuous and unbounded values, $\epsilon$ is a scale parameter, $round$ is the approximation function that approximates continuous values to their nearest discrete states, $clip$ function that clips unbounded values to [$-1+\phi(k)$,$1-\phi(k)$]. For example, when the scale parameter $\epsilon=1$, $Q_2(x,1)$ quantizes $\{-0.85,0.22,0.67\}$ to $\{-0.5,0,0.5\}$. Consider the scale parameter $\epsilon$, assume we set two different scale parameters: $\epsilon_1=1$ and $\epsilon_2=3$ corresponds to $Q_{k}^{1}\left( x,\epsilon _1 \right) =Clip\left( x\cdot 1,\ -0.5,\ 0.5\right)$ and $Q_{k}^{2}\left( x,\epsilon _2 \right) =Clip\left( x\cdot 3,\ -0.5,\ 0.5\right)$ . In that case $Q_{2}^{1}\left( 0.22,\ 1\right)$ is 0 and $Q_{2}^{2}\left(0.22,\ 3\right)$ is 0.5. Clearly, it can be seen that each quantization function can use the scale parameter to adjust the quantization threshold, clip differently to represent the input value. \subsection{Approximate weights $\boldsymbol{Q}_w\left( \cdot \right)$} Consider that we use a $L$-layer CNN model. Suppose that learnable weights of each convolutional layer are represented as $W\in \mathbb{R}^{c_i\times c_o\times h\times w}$ , in which $c_i,c_o,w,h$ indicate the \textbf{i}nput-channel, \textbf{o}utput-channel, filter \textbf{w}idth and filter \textbf{h}eight, respectively. It is known that when using 32 bits (full-precision) floating-point arithmetic, storing all these weights would require a $32\times c_i\times c_o\times w\times h$ bit memory. As stated above, at each layer, our goal is to estimate the real-weight filter $W\in \mathbb{R}^{c_i\times c_o\times h\times w}$ using 2-bit filter $T\in \left\{ \text{-0.5,\ 0,\ 0.5} \right\} ^{c_i\times c_o\times h\times w}$ . Generally, we define a reconstruction error $e$ as shown in \eqref{eq:reconstruction_error}: \begin{equation}\label{eq:reconstruction_error} e^2:=\lVert W-\alpha T \rVert ^2, \end{equation} where $\alpha$ describes a nonnegative scaling parameter. To retain the quantization network accuracy, the reconstruction error $e$ should be minimized. However, directly minimizing reconstruction error $e$ seems an NP-hard problem, so forcibly solving it will be very time-consuming ~\cite{b42}. In order to solve the above problem in a reasonable time, we need to find an optimal estimation algorithm, in which $T$ and $\alpha$ are sequentially learnt. That is to say, the goal is to solve the following optimization problem: \begin{equation}\label{eq:optimization_problem} \begin{aligned} \underset{\alpha ,T}{\min}J\left( \alpha ,T \right) =\lVert W-\alpha T \rVert ^2, \end{aligned} \end{equation} in which $T\in\text{\{-0.5,\ 0,\ 0.5\}}$, the $\lVert\cdot\rVert$ is defined as $\lVert W \rVert :=\left< W,W \right> ^{\text{1/}2}$ for any three-dimension tensor $W$. One way to solve the optimization problem shown in \eqref{eq:optimization_problem} is to expand the cost function $J$ and take the derivate w.r.t. $\alpha$ and $T$, respectively. However, in this case, it must get correlation-dependence value of $\alpha$ and $T$. To overcome this problem, we use the quantization function $Q$ to quantize $W$ by \eqref{eq:quantization_function}: \begin{equation}\label{eq:quantization_weight} T=Q_w\left( W \right) =Q_{k_w}\left( W,\epsilon _w \right). \end{equation} In this work, we aim to quantize the real-weight filter $W$ to ternary values $\text{\{-0.5,0,0.5\}}$ , so the parameter $k_w=2$ and the threshold of weights are controlled by $\epsilon_w$ as shown in \eqref{eq:weight_boundary}, \begin{equation}\label{eq:weight_boundary} \epsilon _w=\left( \frac{\xi}{n}\sum_{i=1}^n{\left| W \right|} \right) ^{-1}, \end{equation} where $\xi$ is a shift threshold parameter which can be used to constrain thresholds. With the ${T_i}'s$ fixed through \eqref{eq:quantization_weight}, Equation \eqref{eq:optimization_problem} becomes a linear regression problem: \begin{equation}\label{eq:linear_regression_problem} \underset{\alpha}{\min}J\left( \alpha\right) =\lVert W-\alpha T \rVert ^2, \end{equation} \noindent in which the ${T_i}'s$ serve as the bases in the matrix. Therefore, we can use the ``straight-through (ST) estimator'' ~\cite{b43} to back-propagate through $T_i$. This is shown in detail in Algorithm 1. Note that in \textbf{run-time}, only ($\clubsuit$) is required. \begin{table} \label{Algorithm 1} \setlength{\tabcolsep}{3pt} \begin{tabular}{p{240pt}} \hline \specialrule{0em}{2pt}{2pt} \textbf{Algorithm 1} Training with ``straight-through (ST) estimator'' ~\cite{b43} on the forward and backward approach of an approximated convolution.\\ \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{2pt}{2pt} \textbf{Require} $k_w$-$bit$, shift parameter $\epsilon_w$. Assume $\mathcal{L}$ as the loss function, $\boldsymbol{I}$ and $\boldsymbol{O}$ as the input and output tensors of a convolutional layer respectively.\\ \specialrule{0em}{2pt}{2pt} \textbf{A. Forward propagation:}\\ \specialrule{0em}{2pt}{2pt} \ \ \ \ 1. $T=Q_w\left( W \right) =Q_{k_w}\left( W,\epsilon _w \right)$,\ \ \ \ \#Quantization\\ \ \ \ \ 2. Solve Eq. \eqref{eq:linear_regression_problem} for $\alpha$,\\ \ \ \ \ 3. $\boldsymbol{O}=\alpha Conv\left( T,I \right) $.\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ ($\clubsuit$) \\ \specialrule{0em}{2pt}{2pt} \textbf{B. Back propagation:}\\ \specialrule{0em}{1pt}{1pt} \ \ \ \ By the chain rule of gradients and ST we have:\\ \specialrule{0em}{2pt}{2pt} \ \ \ \ 1. $\frac{\partial \mathcal{L}}{\partial W}=\frac{\partial \mathcal{L}}{\partial O}\left( \alpha \frac{\partial O}{\partial T}\frac{\partial T}{\partial W} \right) \overset{\textbf{ST}}{\xlongequal{\quad}}\frac{\partial \mathcal{L}}{\partial O}\left( \alpha \frac{\partial O}{\partial T} \right) =\alpha \frac{\partial \mathcal{L}}{\partial T}$.\\ \specialrule{0em}{2pt}{2pt} \hline \end{tabular} \end{table} \subsection{Activation quantization $\boldsymbol{Q}_a\left( \cdot \right)$} In order to avoid substantial memory consumption and computational requirement, which is caused by cumbersome floating-point calculations, we should use bitwise operation. Therefore, the activations as well as the weights must be quantized. If activations are 1-bit values, we can quantize activations after they pass through a $clip$ function $\mathbb{C}$ similar to the activation quantization procedure in ~\cite{b37}. Formally, it can be defined as: \begin{equation} \mathbb{C}_a\left( x \right) =clip\left( x,-1,+1 \right). \end{equation} If activations are presented in $k_a$-$bit$, the quantized $A^q$ of real-value activations $A$ can be defined as: \begin{equation}\label{eq:quantizaiton_activation} A^q=Q_a\left( A \right) =Q_{k_a}\left( A,\epsilon _a \right). \end{equation} In this paper, we constrain the weights to ternary values $\text{\{-0.5,\ 0,\ 0.5\}}$. In order to transform the real-valued activation $a$ into ternary activation, we set the parameter $k_a=2$. The scale parameter $\epsilon_a$ controls the clip threshold and can be varied throughout the process of learning. Note that, quantization operations in networks will cause the variance of weights to be scaled compared to the original limit, which will cause exploding of network's outputs. XNOR-Net ~\cite{b17} proposes a filter-wise scaling factor calculated continuously with full precision to alleviate the amplification effect. In our experiment implementation, we control the activation threshold to attenuate the amplification effect by setting the scale parameter as $$ \epsilon_a=min\{1,\frac{1}{2^{round(\tau)}}\}, $$ where $\epsilon_a$ is pre-defined constant for each layer, and $\epsilon_a$ will be updated by $\tau$ in each epoch: $$ \tau =\frac{1}{m}\sum_{i=1}^m{\left| w_i \right|}/\underset{w_i,i=\text{1,..,}m}{\max}\left\{ w_i \right\}, $$ where $w$ is the trained weights of each layer. The forward and backward propagation of the activation are shown in detailed in Algorithm 2. \begin{table} \label{Algorithm 2} \setlength{\tabcolsep}{3pt} \begin{tabular}{p{240pt}} \hline \specialrule{0em}{2pt}{2pt} \textbf{Algorithm 2} Training with ``straight-through (ST) estimator'' ~\cite{b43} on the forward and backward approach of the activation.\\ \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{2pt}{2pt} \textbf{Require} $k_a$-$bit$, shift parameter $\epsilon_a$, $1_{|A|\leqslant 0.5}$ can be seen as propagating the gradient through $hardtanh$, $\otimes$ indicates Hadamard product. Assume $\mathcal{L}$ as the loss function.\\ \specialrule{0em}{2pt}{2pt} \textbf{A. Forward propagation:}\\ \specialrule{0em}{2pt}{2pt} \ \ \ \ 1. $A^q=Q_{k_a}(A,\epsilon_a)$,\ \ \ \ \#Quantization\\ \specialrule{0em}{2pt}{2pt} \textbf{B. Back propagation:}\\ \specialrule{0em}{2pt}{2pt} \ \ \ \ 1. $\frac{\partial \mathcal{L}}{\partial A}=\frac{\partial \mathcal{L}}{\partial A^q}\otimes 1_{\left| A \right|\leqslant 0.5}$,\ \ \ \ \#using STE\\ \specialrule{0em}{2pt}{2pt} \hline \end{tabular} \end{table} \begin{figure*} \centering \includegraphics[width=17cm]{F2.png}\\ \caption{An overview of three fusion strategy methods and architecture of the hierarchical DFTerNet for activity recognition. (a) Early fusion, (b) Late fusion, (c) Dynamic fusion, are summarized in Section \ref{sec:fusion_stragegy}. From the left of each sub-fig, the multi-sensor signal sources from different positions are processed by a common convolutional network in (a) and three sub-convolutional networks in (b)\&(c). Input sensor signals of size $T$$\times$$S$, where $T$ denotes the length of features maps and $D$ the number of sensor channels. The \emph{C1}. \emph{C2}. \emph{C3}. ((kernel size), (siding stride), numbers of kernel) are ((11,1),(1,1),50), ((10,1),(1,1),40), ((6,1),(1,1),30), respectively. The \emph{Mp1}. \emph{Mp2}. \emph{Mp3}. size are (2,1), (3,1), (1,1), respectively. Neurons in \emph{fully connected layer} is 1000. The tensors $\varphi_1, \varphi_2, \varphi_3$ are the fusion weights.}\label{fig:F2} \end{figure*} \subsection{Scalability to Multiple Sensors (IMUs)}\label{sec:fusion_stragegy} Each activity in the OPPORTUNITY and PAMAP2 datasets is collected by multi-sensors in different parts and each sensor is independent. For different types of activities, different sensors may not have the same ``contribution''. In order to improve the accuracy of our model, we conducted a comprehensive evaluation using different feature fusion strategies as shown in Figure \ref{fig:F2}. Note that the UniMiB-SHAR dataset only has 3-channels data (3D accelerometer), so we apply \textbf{early fusion}. \textbf{Early fusion.} All joints from multi-sensors in different parts are stacked as input of the network ~\cite{b22,b44}. \textbf{Late fusion.} Independent sensors in different signal sources through their own \emph{conv3} feature maps ($\boldsymbol{g}_{Conv3}\in \mathbb{R}^D$) are concatenated by fusion weights $\varphi_1=\varphi_2=\varphi_3=\{1\}^D$ as in ~\cite{b19,b45} and the feature maps $\boldsymbol{g}$ after fusion can be expressed as: $$ \boldsymbol{g}=[\boldsymbol{g}_1,\boldsymbol{g}_2,\boldsymbol{g}_3]. $$ \textbf{Dynamic fusion.} Different parts of the body (different sensors locations) have different levels of participation in different types of activities. For example, for ankle-hand-based activities (e.g., running and jumping), the ``contribution'' of back-based sensor is lower than that of the sensors on the hands and ankles. In the case of hand-based activities (e.g., opening a drawer, closing a drawer), the ``contribution'' of the sensors in the ankles and back is lower than that of the hands, etc. Therefore, unlike in the \textbf{late fusion} method, the fusion weight settings of dynamic fusion are different. For notational simplicity, we refer to the last convolutional layer of CNNs, i.e., the $3^{rd}$ convolutional layer as \emph{conv3}, the full-precision weights and feature maps as $W_{conv3}:=W_p\in \mathbb{R}^m$ and $\boldsymbol{g}_p\in \mathbb{R}^D$ respectively, where $p\in{\{1,2,3\}}$ correspond to the fusion weights $\varphi_1, \varphi_2$, $\varphi_3$ $\in \mathbb{R}^D$. This is mainly because CNNs extract low-level features at the bottom layers and learn more abstract concepts such as the parts or more complicated texture patterns at the mid-level (i.e., \emph{conv3}). These mid-level representations are more informative compared to the higher-level representations~\cite{b46}. Hence, we propose a novel dynamic fusion method, which aims to \textbf{randomly} reduce the representations of less ``contribution'' signal sources. Dynamic fusion method can be considered as ``dynamic dropout method'', i.e., dynamic clip parameter by its weights (non-fixed parameter). Given a quantized weight $W_p^q=Q_{k}\left( W_p,\epsilon\right)$, each element of fusion weight $\varphi_{p_d}$ independently follows the Bernoulli distribution as shown in (24): \begin{equation}\label{eq:Bernoulli_distribution} \begin{cases} P\left( \varphi _{p_d}=1\left| W_p^q \right. \right) = \sum_{i=1}^{m}{|W_{p_i}^q|}/ m,\\ P\left( \varphi _{p_d}=0\left| W_p^q \right. \right) =1-\sum_{i=1}^{m}{|W_{p_i}^q|}/ m,\\ \end{cases} \end{equation} where $\varphi_{p_d}$ and $W_{p_i}^q$ are the $d$-$th$ parameter of $\varphi_p$ and $W_p^q$ respectively. \noindent\textbf{Train-time.} The full-precision weights $W_p$ are first quantized by \eqref{eq:quantization_function}: \begin{equation}\label{eq:full-precision-dynamic_fusion_train-time_quantization_step_1} W_p^q=Q_k\left( W_p,\epsilon\right). \end{equation} According to \eqref{eq:Bernoulli_distribution}, the generated fusion weight $\varphi_p$ as shown in \eqref{eq:full-precision-dynamic_fusion_train-time_quantization_step_2} is given by: \begin{equation}\label{eq:full-precision-dynamic_fusion_train-time_quantization_step_2} \varphi _p=\left[ \varphi _{p_1},\varphi _{p_2},...,\varphi _{p_D} \right]. \end{equation} \textbf{Assumption.} The $Sub$-$network$-$(1,3)$ are the less ``contribution'' sub-networks. Thus, the fusion weight $\varphi _2$ is set to $\varphi _2=1^D$. The feature maps $\boldsymbol{g}$ after dynamic fusion strategy can be expressed as: \begin{equation}\label{eq:full-precision-dynamic_fusion_train-time_quantization_step_3} \boldsymbol{g}=concat\left[ \boldsymbol{g}_1\otimes \varphi _1, \boldsymbol{g}_2\otimes \varphi _2, \boldsymbol{g}_3\otimes \varphi _3 \right], \end{equation} where $\otimes$ denotes the Hadamard product. An example of this process is shown in Figure \ref{fig:F3}. \noindent\textbf{Run-time.} The full-precision $W_p$ has been quantized in \textbf{run-time}. Therefore,~\eqref{eq:full-precision-dynamic_fusion_train-time_quantization_step_1} can be skipped and only \eqref{eq:Bernoulli_distribution}, \eqref{eq:full-precision-dynamic_fusion_train-time_quantization_step_2}, \eqref{eq:full-precision-dynamic_fusion_train-time_quantization_step_3} were used. The use of a stochastic rounding method, instead of deterministic one, is chosen by TernGrad ~\cite{b40} and QSDG ~\cite{b47}. Some researchers (e.g. ~\cite{b16,b48}) have proven that stochastic rounding has an unbiased expectation and has been successfully on low-precision. \begin{figure} \centering \includegraphics[width=8cm]{F3.png}\\ \caption{An example of the dynamic fusion processing when $k=2$ in \textbf{train-time}. (a) is the sub-network feature maps $\boldsymbol{g}_p$. (b) is the full-precision weights $W_p$. (c) represents the quantized weights $W_p^q$. (d) is the fusion weights $\varphi_p$. (e) is the feature maps $\boldsymbol{g}$ after fusion. $Q$ denotes the function $Q_2(w,\epsilon)$ from (b) to (c) is quantization function, which quantize the full-precision weights to 2-bit weights by using \eqref{eq:full-precision-dynamic_fusion_train-time_quantization_step_1}. The $B$ denotes $B\sim(W^q,m)$ from (c) to (d) is the Bernoulli distribution \eqref{eq:Bernoulli_distribution} that stochastically samples $\varphi_{p_d}$ to either 0 or 1, where $\otimes$ is Hadamard product.}\label{fig:F3} \end{figure} \subsection{Error and Complexity Analysis}\label{sec:proof_section} \noindent\textbf{Reconstruction Error $\boldsymbol{e}$} According to \eqref{eq:reconstruction_error} and \eqref{eq:optimization_problem}, we have defined the reconstruction error $e$. In this section, we analyze the boundary that is satisfied by $e$. \noindent\textbf{Theorem 1.} (Reconstruction Error Bound). The reconstruction error $e$ is bounded as \begin{equation}\label{eq:reconstruction error boundary} e^2\leqslant \lVert W_{\boldsymbol{\gamma}_{\epsilon}} \rVert ^2\left( \text{1}-\text{1}/\left| \boldsymbol{\gamma}_{\epsilon} \right| \right) ^k, \end{equation} where $\boldsymbol{\gamma }_{\epsilon}=\{ i \big| | w_i |>1/4\epsilon _w\}$ and $\left| \boldsymbol{\gamma }_{\epsilon} \right|$ denotes the number of elements in $\boldsymbol{\gamma }_{\epsilon}$. \\ \\ \noindent\textbf{Proof.} We define $\mathring{W}_j$ which indicates the approximation residue after combining all the previously tensors as \begin{equation}\label{eq:approximation_residue_tensor} \mathring{W}_j=\begin{cases} W,\ if\ j=\text{0;}\\ W-\sum_{i=0}^{j-1}{\alpha\ T_i,\ if\ j\geqslant 1.}\\ \end{cases} \end{equation} Through derivative calculations, \eqref{eq:reconstruction_error} is equivalent to \begin{equation}\label{eq:reconstruction_error_through_derivative_calculations} T_j=Q_{k_w}\left( W_j,\epsilon _w \right) \ \text{and}\ \ \alpha=\frac{2}{\left| \boldsymbol{\gamma }_{\epsilon} \right|}\sum_{j\in \boldsymbol{\gamma }_{\epsilon}}{\left| W_j \right|}. \end{equation} Since $j\in \boldsymbol{\gamma }_{\epsilon}$, we can obtain, \begin{equation}\label{eq:proof_1} \left< T_j,\mathring{W}_j \right> =\frac{1}{2} \sum{\left| \mathring{w}_j \right|\geqslant \frac{1}{2} \lVert \mathring{W}_j \rVert}, \end{equation} in which $\mathring{w}_j$ is an entry of $\mathring{W}_j$. According to \eqref{eq:approximation_residue_tensor} and \eqref{eq:proof_1}, we have \begin{equation}\label{eq:proof_2} \begin{aligned} \lVert \mathring{W}_{j+1} \rVert ^2&=\lVert \mathring{W}_j \rVert ^2-\alpha \left< T_j,\mathring{W}_j \right> \\ &=\lVert \mathring{W}_j \rVert^2 \left( 1-\frac{2\sum_{j\in \boldsymbol{\gamma }_{\epsilon}}{\left| w_j \right|}\left< T_j,\mathring{W}_j \right>}{\left| \boldsymbol{\gamma }_{\epsilon} \right|\lVert \mathring{W}_j \rVert ^2} \right) \\ &\leqslant \lVert \mathring{W}_j \rVert ^2\left( 1-\text{1/}\left| \boldsymbol{\gamma }_{\epsilon} \right| \right), \end{aligned} \end{equation} in which $j$ varies from 0 to $k-1$. \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ $\Box$ We can see from \textbf{Theorem 1} that, the reconstruction error $e^2$ follows an ``exponential decay'' with a rate $\text{1/}\left| \boldsymbol{\gamma }_{\epsilon} \right|$. It means that, given a small size $W$, i.e., $|\boldsymbol{\gamma }_{\epsilon}|$ is a small value, the reconstruction error $e$ algorithm can be quite good. \noindent\textbf{Efficient Operations} Both modern CPUs and SoCs contain instructions to efficiently and massively compute 64-bit strings in short time cycles ~\cite{b49}. However, floating-point calculations require very complex logic. The calculation efficiency can be improved by several tens of times by adopting each bit-count operator instead of the 64-bit floating-point addition and multiplication calculation. In the classic deep learning architecture, floating point multiplication is the most time-consuming part. However, when the weights and activations are ternary values, floating point calculations should be avoided. In order to efficiently reduce the computational complexity and time consumption, we have to design a new operation, which aims to replace the full-precision cumulant operation of input tensor $\mathbf{I}$ and filter $\mathbf{B}$. Some previous works ~\cite{b16,b17} on 1-bit networks have been successfully implemented using Hamming space calculation\footnote{The Hamming space can be used to calculate matrix multiplication and its inner-products.} (bit-counting) as a replacement for matrix multiplication. For example, $\mathbf{I,B}\in \text{\{0,1\}}^m$, the matrix multiplication can be replaced by \eqref{eq:basic_hamming_space}: \begin{equation}\label{eq:basic_hamming_space} IB=m-\varXi \left\{ I_i\oplus B_i \right\}, \end{equation} where $\varXi$ defines a bit-count over the $m$ bits in the rows of $\mathbf{I}$ and $\mathbf{B}$, and $\oplus$ an exclusive OR operator. In this paper, we aim to extend the concept to $k$-bit networks. The quantized input tensor $\mathbf{I}$ and filter $\mathbf{W}$ can be denoted as $\mathbf{I^q}=Q_{k}(\mathbf{I},\epsilon_i) \in \mathbb{R}^m$, $\mathbf{W^q}=Q_{k}(\mathbf{W},\epsilon_w) \in \mathbb{R}^m$, where the value of $\mathbf{I^q}$ and $\mathbf{W^q}$ are composed of $sign$, $positive$-$integer\ numerator(pin)$ and $positive$-$integer\ denominator(pid)$. Given a fixed $k$ value, the $pid$ is fixed as well. Therefore, we define two tensors as $\mathbf{I^s} \in \{0,1\}^m,\mathbf{I^v} \in \{0,1\}^{(k-1)\times m}$ and $\mathbf{W^s} \in \{0,1\}^m,\mathbf{W^v} \in \{0,1\}^{(k-1)\times m}$ to store $sign$ and $pin$, respectively. (Note that the superscript $s$ and $v$ mean $sign$ and $value$ respectively). The values of $\boldsymbol{I}_{i}^{\boldsymbol{s}},\boldsymbol{W}_{i}^{\boldsymbol{s}}$ and $\boldsymbol{I}_{i}^{\boldsymbol{v}},\boldsymbol{W}_{i}^{\boldsymbol{v}}$ as $$ \boldsymbol{I}_{i}^{\boldsymbol{s}},\boldsymbol{W}_{i}^{\boldsymbol{s}}=\begin{cases} \text{1\ ,\ }if\ \boldsymbol{I}_{i}^{\boldsymbol{q}},\boldsymbol{W}_{i}^{\boldsymbol{q}}\ is\ positive;\\ \text{0,\ }else.\\ \end{cases} $$ $$ \boldsymbol{I}_{i}^{\boldsymbol{v}},\boldsymbol{W}_{i}^{\boldsymbol{v}}=\begin{cases} pin\ to\ binary\ ,\ if\ \boldsymbol{I}_{i}^{\boldsymbol{q}},\boldsymbol{W}_{i}^{\boldsymbol{q}}\ne \text{0;}\\ \text{0,\ }else.\\ \end{cases} $$ In this work, our goal is to replace matrix multiplication with the notion of bit-counting in $k$-bit convolutional networks. Imagine that $k$=$2$, $\mathbf{I^q},\mathbf{W^q} \in \{-0.5,0,0.5\}^m$. Therefore, the inner-product calculation can be used with two bit-counts in Hamming space: \begin{equation}\label{eq:our_Hamming_space} \begin{aligned} \boldsymbol{I}^{\boldsymbol{q}}\boldsymbol{W}^{\boldsymbol{q}}&=(\varXi \{\left( \overline{\boldsymbol{I}_{i}^{\boldsymbol{s}}\oplus \boldsymbol{W}_{i}^{\boldsymbol{s}}} \right) \&\left( \boldsymbol{I}_{i}^{\boldsymbol{v}}\&\boldsymbol{W}_{i}^{\boldsymbol{v}} \right)\}\\ &-\varXi \{\left( \boldsymbol{I}_{i}^{\boldsymbol{s}}\oplus \boldsymbol{W}_{i}^{\boldsymbol{s}} \right) \&\left( \boldsymbol{I}_{i}^{\boldsymbol{v}}\&\boldsymbol{W}_{i}^{\boldsymbol{v}} \right)\}) \cdot \phi(k)^2, \end{aligned} \end{equation} where $\overline{A\oplus B}$ defines the negated XOR, $\&$ an AND operator. Note that, if $k\geqslant3$, the behavior of the element-wise operator must be custom. \noindent\textbf{Batch Normalization} In previous works, weights are quantized to binary values by using a $sign$ function ~\cite{b16} and to ternary values by using a positive threshold parameter $\Delta$ ~\cite{b36} during \textbf{train-time}. However, neural networks with quantized weights all failed to converge without batch normalization, because the quantized values are rather discretization for full-precision values. Batch normalization ~\cite{b50} efficiently avoids the exploding and vanishing gradients problem. In this part, we briefly discuss the batch normalization operation which might increase extra computational cost. Simply, batch normalization is an affine function: \begin{equation}\label{eq:BN affine function} BN\left(x \right) =\gamma \cdot \hat{x}+\beta, \end{equation} where $\hat{x}=\frac{x-\mu}{\sigma}$, $\mu$ and $\sigma$ are the mean and standard deviations respectively, $\gamma$ and $\beta$ are scale and shift parameters respectively. More specifically, a batch normalization can be quantized in 2-bit values by the following quantization method: \begin{equation}\label{eq:BN_quantization_method} Q_{k_b}\left( BN\left( x \right) ,\epsilon \right) = \end{equation} \begin{small} $$ clip\left( \phi \left( k_B \right) \cdot round\left( \frac{BN\left( x \right) \cdot \epsilon}{\phi \left( k_B \right)} \right) ,-1+\phi \left( k_B \right) ,1-\phi \left( k_B \right) \right), $$ \end{small} \noindent where $k_b$=$2$. Equation \eqref{eq:BN_quantization_method} can be converted to the following: \begin{equation}\label{eq:BN_convert} \begin{split} Q_2\left( BN\left( x \right) \right) =\begin{cases} +\text{0.5,\,\,}2\left( \gamma \cdot \hat{x}+\beta \right) \cdot \epsilon >\frac{1}{2};\\ \text{0,\,\,}\left| 2\left( \gamma \cdot \hat{x}+\beta \right) \cdot \epsilon \right|\leqslant \frac{1}{2};\\ -\text{0.5,\,\,}else.\\ \end{cases} \\ =\begin{cases} +\text{0.5,\ }\hat{x}> \left( \frac{1}{4\epsilon}-\beta \right) /\gamma ;\\ \text{0,\ }-\left( \frac{1}{4\epsilon}+\beta \right) /\gamma \leqslant \hat{x} \leqslant \left( \frac{1}{4\epsilon}-\beta \right) /\gamma ;\\ -\text{0.5,\ }else.\\ \end{cases} \end{split} \end{equation} Therefore, batch normalization will be accomplished at no extra cost. \section{EXPERIMENTS}\label{sec:EXPERIMENTS} To demonstrate the usefulness of quantization methods and fusion strategies on convolutional neural networks for high-precision human activity recognition on portable devices, we explore the activity recognition on three well-known datasets. The extension of our quantization methods and fusion strategies to activity recognition is straightforward. Providing better game experience for virtual-realistic interactive games on VR/AR devices and portable devices. Therefore, the memory requirements and the quantized weights of each layer are also analyzed in detail. Many natural activities are complex, involve several parts of the body and often very faint or subtle making recognition very difficult. Therefore, networks with better generalization ability to robustly fuse the data features of different parts of sensor are necessary, at the same time, an automatic method should depict the sketch of the activity feature and accurately recognize the activity. The primary parameter of any experimental setup is the choice of datasets. To choose the optimal datasets for this study, we considered the complexity and richness of the datasets. Based on the background of our research, we selected the OPPORTUNITY ~\cite{b51}, PAMAP2 ~\cite{b52} and UniMiB-SHAR ~\cite{b53} benchmark datasets for our experiments. \subsection{Data Description and Performance Measure} \subsubsection{OPPORTUNITY} The OPPORTUNITY public dataset has been used in many open activity recognition challenges. It contains four subjects performing 17 different (morning) Activities of Daily Life (ADLs) in a sensor-rich environment, as listed in Table \ref{tab:OPPORTUNITY DATASET}. They were acquired at a sampling frequency of 30Hz equipping 7 wireless body-worn inertial measurement units (IMUs). Each IMU consists of a 3D accelerometer, 3D gyroscope and a 3D magnetic sensor, as well as 12 additional 3D accelerometers placed on the back, arms, ankles and hips, accounting for a total of 145 different sensor channels. During the data collection process, each subject performed a session 5 times with ADL and 1 drill session. During each ADL session, subjects were asked to perform the activities naturally-named ``ADL1'' to ``ADL5''. During the drill sessions, subjects performed 20 repetitions of each of the 17 ADLs of the dataset. The dataset contains about 6 hours of information in total, and the data are labeled on a timestamp level. In our experiment, the training and testing sets have \textbf{63}-\textbf{D}imensions (\textbf{36}-\textbf{D} on hand, \textbf{9}-\textbf{D} on back and \textbf{18}-\textbf{D} on ankle, respectively). In this paper, the models were trained on the data of ADL1, ADL2, ADL3, drill session, and the model test on the data of ADL4, ADL5. \subsubsection{PAMAP2} The PAMAP2 dataset contains recordings from 9 subjects who participated in carrying out 12 activities, including household activities and a variety of exercise activities as shown in Table \ref{tab:PAMAP2_DATASET}. The IMU and HR-monitor are attached on the hand, chest and ankle and they are sampled at a constant sampling rate of 100Hz\footnote{Note that, following ~\cite{b26}, the PAMAP2 dataset is downsampled to $\frac{100\text{Hz}}{3}=33.33$Hz, in order to have a temporal resolution comparable to the OPPORTUNITY dataset.}. The accelerometer, gyroscope, magnetometer, temperature and heart rate contain 40 sensors and are recorded from IMU over 10 hours in total. In our experiments, the training and testing sets have \textbf{36}-\textbf{D}imensions (\textbf{12}-\textbf{D} on hand, \textbf{12}-\textbf{D} on back and \textbf{12}-\textbf{D} on ankle, respectively). In this paper, data from subjects 5 and 6 are used as testing sets and the remaining data are used for training. \subsubsection{UniMiB-SHAR} The UniMiB-SHAR dataset collected data from 30 healthy subjects (6 male and 24 female) acquired using the 3D-accelerometer of a Samsung Galaxy Nexus I9250 with Android OS version 5.1.1. The data are sampled at a constant sampling rate of 50 Hz, and split into 17 different activity classes, 9 safety activities and 8 dangerous activities (e.g., a falling action) as shown in Table \ref{tab:UniMiB-SHAR_DATASET}. Unlike the OPPORTUNITY dataset, the dataset does not have any NULL class and remains relatively balanced. In our experiments, the training and testing sets have \textbf{3}-\textbf{D}imensions. \subsubsection{Performance Measure} ADL datasets like the OPPORTUNITY dataset are often highly unbalanced. For this dataset, the overall classification accuracy is not an appropriate measure of performance, because the activity recognition rate of the majority classes might skew the performance statistics to the detriment of the least represented classes. As a result, many previous researches such as ~\cite{b22} show the use of an evaluation metric independent of the class repartition---$F1$-score. The $F1$-score combines two measures: the \textbf{precision} $p$ and the \textbf{recall} $r$: $p$ is the number of correct positive examples divided by the number of all positive examples returned by the classifier, and $r$ is the number of correct positive results divided by the number of all positive samples. The $F1$-score is the harmonic average of $p$ and $r$, where the best value is at 1 and worst at 0. In this paper, we use an additional evaluation metric to make the comparison with them easier: the weighted $F1$-Score (Sum of class $F1$-scores, weighted by the class proportion): \begin{equation}\label{eq:weight_F1-score} F_w=2\sum_G{w_g\frac{p_g\cdot r_g}{p_g+r_g}}, \end{equation} where $w_g=N_g/N_{total}$ and $N_g$ is the number of samples in class $g$, and $N_{total}$ is the total number of samples. \begin{table*} \centering \caption{Classes and proportions of the OPPORTUNITY dataset} \setlength{\tabcolsep}{3pt} \begin{tabular}{cccc} \hline \specialrule{0em}{2pt}{2pt} Class& Proportion& Class& Proportion\\ \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{1pt}{1pt} Open Door 1/2& 1.87\%/1.26\%& Open Fridge& 1.60\%\\ Close Door 1/2& 6.15\%/1.54\%& Close Fridge& 0.79\%\\ Open Dishwasher& 1.85\%& Close Dishwasher& 1.32\%\\ Open Drawer 1/2/3& 1.09\%/1.64\%/0.94\%& Clean Table& 1.23\%\\ Close Drawer 1/2/3& 0.87\%1.69\%/2.04\%& Drink from Cup& 1.07\%\\ Toggle Switch& 0.78\%& NULL& 72.28\%\\ \specialrule{0em}{1pt}{1pt} \hline \end{tabular} \label{tab:OPPORTUNITY DATASET} \end{table*} \begin{table*} \centering \caption{Classes and proportions of the PAMAP2 dataset} \setlength{\tabcolsep}{3pt} \begin{tabular}{cccc} \hline \specialrule{0em}{2pt}{2pt} Class& Proportion& Class& Proportion\\ \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{1pt}{1pt} Lying& 6.00\%& Sitting& 5.78\%\\ Standing& 5.92\%& Walking& 7.45\%\\ Running& 3.06\%& Cycling& 5.13\%\\ Nordic walking& 5.87\%& Ascending stairs& 3.66\%\\ Descending stairs& 3.27\%& Vacuum cleaning& 5.47\%\\ Ironing& 7.44\%& House cleaning& 5.84\%\\ Null& 35.12\%\\ \specialrule{0em}{1pt}{1pt} \hline \end{tabular} \label{tab:PAMAP2_DATASET} \end{table*} \begin{table*} \centering \caption{Classes and proportions of the UniMiB-SHAR dataset} \setlength{\tabcolsep}{3pt} \begin{tabular}{cccc} \hline \specialrule{0em}{2pt}{2pt} Class& Proportion& Class& Proportion\\ \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{1pt}{1pt} StandingUpfromSitting& 1.30\%& Walking& 14.77\%\\ StandingUpfromLaying& 1.83\%& Running& 16.86\%\\ LyingDownfromStanding& 2.51\%& Going Up& 7.82\%\\ Jumping& 6.34\%& Going Down& 11.25\%\\ F(alling) Forward& 4.49\%& F and Hitting Obstacle& 5.62\%\\ F Backward& 4.47\%& Syncope& 4.36\%\\ F Right& 4.34\%& F with ProStrategies& 4.11\%\\ F Backward SittingChair& 3.69\%& F Left& 4.54\%\\ Sitting Down& 1.70\%& & \\ \specialrule{0em}{1pt}{1pt} \hline \end{tabular} \label{tab:UniMiB-SHAR_DATASET} \end{table*} \subsection{Experimental Setup}\label{sec:Experimental_Setup} \noindent\textbf{Sliding Window} Our selected data are recorded continuously. We can think of the continuous-HAR data feature as a video feature. We use a sliding time-window of fixed length to segment the data. Each segmented data can be viewed as a frame in the video (a picture). We define $T$, $S$ and $\sigma$ as the length of the time-window, the number of sensor channels and the sliding stride, respectively. Through the above segment approach, each ``picture'' consists of a $T$$\times$$S$ matrix. We set the segment parameters like ~\cite{b44}, use a time-window of 2s on the OPPORTUNITY and PAMAP2 datasets, resulting in $T$=64, and $\sigma=3$. On the UniMiB-SHAR dataset, a time-window of 2s was used, resulting in $T$=96. Due to the timestamp-level labeling, each segmented data can usually contain multiple labels. A majority labeling that appears most frequently is chosen from among those of $T$ timestamps. \noindent\textbf{Dynamic Fusion Weights} Our selected datasets (OPPORTUNITY and PAMAP2) include two families of human activity recognition samples: that of \textbf{p}eriodic activities (the locomotion category of the OPPORTUNITY dataset and the whole of PAMAP2 dataset) and that of \textbf{s}poradic activities (the gestures category of the OPPORTUNITY dataset). For designing the dynamic fusion strategies of the two families of activities, we design two groups of feature maps after dynamic fusion strategies. In \textbf{p}eriodic activities ($\boldsymbol{g}_p$), we take into account the fact that back-based sensors have less ``contribution''. Thus, we set the fusion weights $\varphi_2=\varphi_3=1^D$. In \textbf{s}poradic activities ($\boldsymbol{g}_s$), we consider the fact that both back-based and ankle-based sensors have less ``contribution''. Accordingly, we set the fusion weight $\varphi_2=1^D$. Formally, in \textbf{train-time} and \textbf{run-time}, according to \eqref{eq:Bernoulli_distribution}, \eqref{eq:full-precision-dynamic_fusion_train-time_quantization_step_1} and \eqref{eq:full-precision-dynamic_fusion_train-time_quantization_step_2}, the feature maps $\boldsymbol{g}_p$ and $\boldsymbol{g}_s$ after dynamic fusion strategies can be expressed as~\eqref{eq:Dynamic_fusion_parameters_training_time} and the effectiveness of these strategies we designed for the two families of human activity recognition is verified in Section~\ref{subsec:MSF}. \begin{equation}\label{eq:Dynamic_fusion_parameters_training_time} \begin{split} \boldsymbol{g}_p=concat\left[ \boldsymbol{g}_1\otimes \varphi_1,\boldsymbol{g}_2\otimes \varphi_2, \boldsymbol{g}_3\otimes \varphi_3 \right], \\ \boldsymbol{g}_s=concat\left[ \boldsymbol{g}_1\otimes \varphi_1,\boldsymbol{g}_2\otimes \varphi_2, \boldsymbol{g}_3\otimes \varphi_3 \right]. \end{split} \end{equation} \noindent\textbf{Pooling Layer} The role of common pooling layers is to find the maximum (max-pooling) or the average (avg-pooling) of output of each filter. Our experiments do not use the avg-pooling because the average operation will generate other values except $\{-0.5,\ 0,\ 0.5\}$. However, we observe that using max-pooling on $\{-0.5,\ 0,\ 0.5\}$ will increase the probability distribution of $\{0.5\}$, resulting in a noticeable drop in recognition accuracy. Therefore, we put the max-pooling layer before the batch normalization (BN) and activation (A) layers. \subsection{Baseline Model} The aim of this paper is not necessarily to exceed current state-of-the-art accuracies, but rather demonstrates and analyzes the impact of network model quantization and fusion strategy. Therefore, the benchmark model we used should not be very complex, because increasing the network topology and computational complexity to improve model performance runs counter to the aim of deploying advanced networks in portable devices. In this paper, we considered improving the performance of the model through a training strategy that is more in line with the practical applications. We therefore chose a CNN architecture ~\cite{b44} as the baseline model. It contains three convolutional blocks, a dense layer and a soft-max layer. Each convolutional kernel performs a 1D convolutional layer on each sensor channel independently over the time dimension. To fairly evaluate the calculation consumption and memory usage of binarization (1-bit) and ternarization (2-bit) on the CNNs, we employ the same number of channels and convolution filters for all comparison models. For early fusion Binary Convolutional Networks~\cite{b16} (termed BNN) and late fusion Binary Convolutional Networks~\cite{b16} (termed FBNN)\footnote{Note that, when the value of quantized weights is $\{-1,+1\}$, each element of fusion weights $\varphi$ is all 1. Therefore, dynamic fusion Binary Convolutional Networks can be considered as FBNN.}, see~\eqref{eq:basic_hamming_space}. Layer-wise details are shown in Table \ref{tab:computational}, in which ``Conv2'' is the most computationally expensive and ``Fc'' commits the most memory. For example, using floating-point precision on OPPORTUNITY dataset, the entire model requires approximately 82MFLOPs\footnote{Note that FLOPs consist of the same number of FMULs and FADDs.} and approximately 2 million weights, thus 0.38MBytes of storage for the model weights. During \textbf{train-time} the model requires more than 12GBytes of memory (batch size of 1024), for inference during \textbf{run-time} this can be reduced to approximately 1.8GBytes (2-bit). \begin{table*}[tp] \centering \begin{threeparttable} \centering \caption{Details of the learnable layers in our experimental model.} \label{tab:computational} \begin{tabular}{ccccc} \toprule &\multicolumn{2}{c}{OPPORTUNITY}&\multicolumn{2}{c}{PAMAP2}\cr \midrule \specialrule{0em}{2pt}{2pt} Layer Name&Params (b)&FLOPs&Params (b)&FLOPs\cr \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{2pt}{2pt} Conv1&$\sim$0.6k&$\sim$4.84M&$\sim$0.6k&$\sim$2.76M\cr \specialrule{0em}{0.5pt}{0.5pt} \specialrule{0em}{0.5pt}{0.5pt} Conv2&$\sim$20k&$\sim$68.18M&$\sim$20k&$\sim$38.96M\cr \specialrule{0em}{0.5pt}{0.5pt} \specialrule{0em}{0.5pt}{0.5pt} Conv3&$\sim$7.2k&$\sim$5.47M&$\sim$7.2k&$\sim$3.12M\cr \specialrule{0em}{0.5pt}{0.5pt} \specialrule{0em}{0.5pt}{0.5pt} Fc&$\sim$1.89M&$\sim$3.78M&$\sim$1.89M&$\sim$2.16M\cr \specialrule{0em}{2pt}{2pt} \hline \hline \specialrule{0em}{2pt}{2pt} &\multicolumn{2}{c}{UniMiB-SAHR}\cr \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{2pt}{2pt} Layer Name&Params (b)&FLOPs\cr \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{2pt}{2pt} Conv1&$\sim$0.6k&$\sim$0.23M\cr \specialrule{0em}{0.5pt}{0.5pt} \specialrule{0em}{0.5pt}{0.5pt} Conv2&$\sim$20k&$\sim$3.25M\cr \specialrule{0em}{0.5pt}{0.5pt} \specialrule{0em}{0.5pt}{0.5pt} Conv3&$\sim$7.2k&$\sim$0.26M\cr \specialrule{0em}{0.5pt}{0.5pt} \specialrule{0em}{0.5pt}{0.5pt} Fc&$\sim$1.89M&$\sim$0.18M\cr \bottomrule \end{tabular} \end{threeparttable} \end{table*} \subsection{Implementation Details}\label{sec:Implementation_Details} In this section, we provide the implementation details of the architecture of the convolution neural network. Our method is implemented with Pytorch. The model is trained with mini-batch size of 1024, the activation scale parameter $\epsilon_a$ is initialized to 1, 50 epochs and using the AdaDelta with default initial learning rate ~\cite{b54}. The cross-entropy was used as the loss function. A soft-max function is used to normalize the output of the model. The probability $P$ that a sequence $\boldsymbol{S}$ belongs to the $i$-$th$ class is given by \eqref{eq:softmax_function}: \begin{equation}\label{eq:softmax_function} P\left( G_i\left| \boldsymbol{S} \right. \right) =\frac{e^{o_i}}{\sum_{j=1}^G{e^{o_j}}},\ i=\text{1,2,3,...,}G, \end{equation} where $o=(o_1,o_2,o_3,...,o_G)^T$ is the output of the model, $G$ is the number of activities. Experiments were carried out on a platform with an Intel 2$\times$ Intel E5-2600 CPU, 128G RAM and a NVIDIA TITAN Xp 12G GPU. The hyper-parameters of the model are provided in Figure \ref{fig:F2}\footnote{The early fusion is common convolutional neural network architecture (can be regarded as a sub-network). Therefore, the hyper-parameters of early fusion is equal to any sub-network of late fusion or dynamic fusion.}. The training procedure, i.e., DFTerNet, is summarized in Algorithm 3. \begin{table} \setlength{\tabcolsep}{3pt} \begin{tabular}{p{240pt}} \hline \specialrule{0em}{2pt}{2pt} \textbf{Algorithm 3} Training a $L$-layer DFTerNet, $\mathcal{L}$ is the loss function for minibatch, $1_{|a|\leqslant 0.5}$ can be seen as propagating the gradient through $hardtanh$ and $\lambda$ is the learning rate decay factor. $\otimes$ indicates Hadamard product. BatchNorm() specifies how to batch-normalize the output of convolution. BackBatchNorm() specifies how to backpropagate through the normalization ~\cite{b50}. Update() specifies how to update the parameters when their gradients are known, such as AdaDelta ~\cite{b54}.\\ \specialrule{0em}{2pt}{2pt} \hline \specialrule{0em}{2pt}{2pt} \textbf{Require} A minibatch of inputs and targets ($a_0,a^*$), previous weights $W$, $k_w$-bit, $k_a$-bit, shift threshold parameter $\xi$ ($\epsilon_w$) and learning rate $\eta$.\\ \specialrule{0em}{1pt}{1pt} \textbf{Ensure} Updated weights $W$.\\ \specialrule{0em}{1pt}{1pt} \specialrule{0em}{1pt}{1pt} \ \ {\textbf{1. Computing the parameters gradients}:}\\ \ \ {\textbf{1.1. Forward propagation}:}\\ \ \ \ \ \textbf{for} $i$=1 to $L$ \textbf{do},\\ \ \ \ \ \ \ $T_i \gets Q_{k_w}(W_i,\epsilon_w)$ with \eqref{eq:quantization_weight}\\ \ \ \ \ \ \ Compute $\alpha$ with \eqref{eq:linear_regression_problem}\\ \ \ \ \ \ \ $s_i \gets A^q_{i-1}\alpha T_i$\\ \ \ \ \ \ \ Apply max-pooling\\ \ \ \ \ \ \ $a_i \gets$ BatchNorm($s_i$)\\ \ \ \ \ \ \ \textbf{if} $i<L$ \textbf{then}\\ \ \ \ \ \ \ \ \ $A^q_i \gets Q_{k_a}(a_i,\epsilon_a)$ with \eqref{eq:quantizaiton_activation}\\ \specialrule{0em}{2pt}{2pt} \ \ {\textbf{1.2. Backward propagation}:}\\ \ \ \{note that the gradients are full-precision.\}\\ \ \ Compute $g_{a_L}=\frac{\partial \mathcal{L}}{\partial a_L}$\ knowing $a_L$ and $a^*$\\ \ \ \textbf{for} $i=L$ to 1 \textbf{do}\\ \ \ \ \ \textbf{if} $i<L$ \textbf{then}\\ \ \ \ \ \ \ $g_{a_i} \gets g_{A^q_i} \otimes 1_{|a_i|\leqslant0.5}$ by Algorithm 2\\ \ \ \ \ \textbf{end if}\\ \ \ \ \ $g_{s_i} \gets$ BackBatchNorm($g_{a_i},s_i$)\\ \ \ \ \ $g_{A^q_{i-1}} \gets g_{s_i}T_i$\\ \ \ \ \ $g_{T_i} \gets g_{s_i}^\top A^q_{i-1}$\\ \ \ \textbf{end for}\\ \specialrule{0em}{2pt}{2pt} \ \ {\textbf{2. Accumulating the parameters gradients}:}\\ \ \ \textbf{for} $i=1$ to $L$ \textbf{do}\\ \ \ \ \ With $g_{T_i}$ known, compute $g_{W_i}$ by Algorithm 1\\ \ \ \ \ $W_i \gets$ Update($W_i,\eta,g_{W_i}$)\\ \ \ \ \ $\eta \gets \lambda\eta$\\ \ \ \textbf{end for}\\ \specialrule{0em}{2pt}{2pt} \hline \end{tabular} \label{Algorithm 3} \end{table} \section{Result and Discussion}\label{sec:Result_and_Discussion} In this section, the proposed quantization method and fusion strategies are evaluated on three famous benchmark datasets. The following are considered: 1) the proposed dynamic fusion models are compared with other baseline models, 2) the effect of weight shift threshold parameter is evaluated, 3) the trade-off between quantization and model accuracy. For the first method (we call it Baseline or (TerNet) method), the required sensor signal sources are stacked together. In the second method (referred to as FTerNet), different sensor signal sources are processed through their own sub-networks and fused together with the learned representations before the dense layer, i.e., each element of fusion weights is equal to 1. The model proposed in this paper (DFTerNet), differs from the second method discussed in the way it handles the fusion part. In the DFTerNet, each element of fusion weights is sampled from a Bernoulli distribution given by the scale parameter of the quantization method that we proposed. \subsection{Multi-sensor Signals Fusion}\label{subsec:MSF} In order to evaluate the different fusion strategies which were described in Section \ref{sec:fusion_stragegy}, an ablation study was performed on the OPPORTUNITY and PAMAP2 datasets. The first set of experiments consisted of comparing the three fusion strategies on the each dataset. As shown by the \textbf{bold scores} in Table \ref{tab:overall_performance_comparison:_OPPORTUNITY_and_UniMiB-SHAR}, the order of fusion performance is: \textbf{matched dynamic fusion} in first place, followed by \textbf{late fusion} and finally \textbf{early fusion}. The reason for this is that it is better for each sensor signal source to have its network but improper to apply a single network to unify all signal sources. Meanwhile, there is a correlation between different signal sources and activity types and therefore the result of the recognition should be more reliable when the signal sources are highly correlated with the activity type. According to the two points above, the recognition result should be weighted by the learned representations of multiple signal sources, and the weight of learned representations of each signal source should reflect the similarity between the signal source and the activity type. \begin{table}[tp] \centering \begin{threeparttable} \centering \caption{Comparison of $\xi$'s value for the activity recognition performances (Weighted $F1$-score) on OPPORTUNITY dataset.} \label{tab:xisvalue} \begin{tabular}{cccccc} \toprule $\xi$ &=2.6&2.7&\textbf{2.8}&\textbf{2.9}&3.0\cr \midrule \specialrule{0em}{2pt}{2pt} DFTerNet ($\boldsymbol{g}_p$)&0.884&0.897&\textbf{0.910}&\textbf{0.909}&0.893\cr \specialrule{0em}{2pt}{2pt} DFTerNet ($\boldsymbol{g}_s$)&0.879&0.894&\textbf{0.905}&\textbf{0.905}&0.891\cr \bottomrule \end{tabular} \end{threeparttable} \end{table} \subsection{Analysis of Weight Shift Threshold Parameter} In our DFTerNet, the result of the weight shift parameter $\xi$ of the $Q_w(\cdot)$ operation will directly affect the following fusion weights $\varphi$. Therefore, the second set of experiments consider the effect of $\xi$'s value. As mentioned in the previous section, the value of $\epsilon_w$ is related to the value of $\xi$ and the fusion weights $\varphi$ are sampled from $Bernoulli(Q_{k_w}(W,\epsilon_w),m)$. We use \textbf{matched dynamic fusion}-$\boldsymbol{g}_p$ and \textbf{matched dynamic fusion}-$\boldsymbol{g}_s$ on the OPPORTUNITY dataset as a test case to compare the performance of $\xi$'s value. In this experiment, the parameter settings are the same as described in Section \ref{sec:Experimental_Setup} and Section \ref{sec:Implementation_Details}. Table \ref{tab:xisvalue} summarizes the results of $\xi$'s value on \textbf{matched dynamic fusion}. It can be seen that the quantization method we proposed achieves its best performance when using $\xi=2.8$ or $\xi=2.9$. Similar phenomenon can also be found in~\cite{b13}. \begin{table*} \caption{(a) Weighted $F_1\text{-score}$ performances of different fusion strategies, (F)BNNs (1-bit) and our proposed models (2-bit) for activity recognition on the \textbf{\underline{O}}PPORTUNITY, \textbf{\underline{P}}AMAP2 and \textbf{\underline{U}}niMiB-SHAR datasets. (b) $\mathbf{\epsilon}$-$\mathbf{Q}$ quantization method generates 2-bit weight and activation Convolutional networks for activity recognition with the ability to make faithful inference and roughly $11\times$ fewer parameters than its counterpart.} \label{tab:double_sub_figure} \centering \subtable[]{ \begin{threeparttable} \label{tab:overall_performance_comparison:_OPPORTUNITY_and_UniMiB-SHAR} \begin{tabular}{ccccc} \toprule \specialrule{0em}{2pt}{2pt} \multirow{2}{*}{\small{Method}}& \multicolumn{2}{c}{O}&\multicolumn{1}{c}{P}&\multicolumn{1}{c}{U}\cr \cmidrule(lr){2-3}\cmidrule(lr){4-4}\cmidrule(lr){5-5} &locomotion$\dagger$&gestures$\ddagger$&Activities$\dagger$&ADLs and falls\cr \specialrule{0em}{3pt}{3pt} \midrule \specialrule{0em}{3pt}{3pt} Early fusion ~\cite{b44}&0.876 $\pm$0.09&0.881 $\pm$0.11&0.867 $\pm$0.09&0.7981 $\pm$0.12\cr \specialrule{0em}{1pt}{1pt} BNN~\cite{b16}&0.752 $\pm$0.17&0.751 $\pm$0.20&0.733 $\pm$0.14&0.6481 $\pm$0.21\cr \specialrule{0em}{1pt}{1pt} TerNet (Early fusion)&0.865 $\pm$0.14&0.876 $\pm$0.19&0.850 $\pm$0.11&0.7727 $\pm$0.20\cr \specialrule{0em}{3pt}{3pt} \hline \specialrule{0em}{3pt}{3pt} Late fusion ~\cite{b45}&0.897 $\pm$0.06&0.917 $\pm$0.05&0.908 $\pm$0.05&\textbf{---}\cr \specialrule{0em}{1pt}{1pt} FBNN~\cite{b16}&0.765 $\pm$0.16&0.773 $\pm$0.19&0.764 $\pm$0.15&\textbf{---}\cr \specialrule{0em}{1pt}{1pt} FTerNet (Late fusion)&0.883 $\pm$0.10&0.908$\pm$0.14&0.893 $\pm$0.13&\textbf{---}\cr \specialrule{0em}{3pt}{3pt} \hline \specialrule{0em}{3pt}{3pt} Dynamic fusion-$\boldsymbol{g}_p$$\dagger$&\textbf{0.915} $\pm$0.04&\textbf{---}&\textbf{0.914} $\pm$0.06&\textbf{---}\cr \specialrule{0em}{1pt}{1pt} DFTerNet ($\boldsymbol{g}_p$)$\dagger$&\textbf{\emph{0.909}} $\pm$0.06&\textbf{---}&\textbf{\emph{0.901}} $\pm$0.11&\textbf{---}\cr \specialrule{0em}{3pt}{3pt} \hline \specialrule{0em}{3pt}{3pt} Dynamic fusion-$\boldsymbol{g}_s$$\ddagger$&\textbf{---}&\textbf{0.920} $\pm$0.07&\textbf{---}&\textbf{---}\cr \specialrule{0em}{1pt}{1pt} DFTerNet ($\boldsymbol{g}_s$)$\ddagger$&\textbf{---}&\textbf{\emph{0.910}} $\pm$0.10&\textbf{---}&\textbf{---}\cr \specialrule{0em}{3pt}{3pt} \bottomrule \end{tabular} \begin{tablenotes} \item[$\dagger$] Dynamic fusion-$\boldsymbol{g}_p$ \textbf{match} the locomotion category of OPPORTUNITY and PAMAP2. \item[$\ddagger$] Dynamic fusion-$\boldsymbol{g}_s$ and the gestures category are \textbf{matched}. \end{tablenotes} \end{threeparttable} } \qquad \subtable[]{ \begin{threeparttable} \label{tab:overall_performance_comparison:_Memory} \centering \begin{tabular}{cc|c} \toprule & & Memory\cr \midrule \specialrule{0em}{1.5pt}{1.5pt} \multirow{3}*{(F)BNN}&O&$\sim$20k\\ &P&$\sim$10k\\ &U&$\sim$0.9k\\ \specialrule{0em}{1.8pt}{1.8pt} \hline \specialrule{0em}{1.8pt}{1.8pt} \multirow{3}*{TerNet}&O&$\sim$39k\\ &P&$\sim$20k\\ &U&$\sim$1.8k\\ \specialrule{0em}{1.8pt}{1.8pt} \hline \specialrule{0em}{1.8pt}{1.8pt} \multirow{3}*{FTerNet}&O&$\sim$40k\\ &P&$\sim$24k\\ &U&$\sim$1.9k\\ \specialrule{0em}{1.8pt}{1.8pt} \hline \specialrule{0em}{1.8pt}{1.8pt} \multirow{3}*{DFTerNet}&O&$\sim$\textbf{34k}\\ &P&$\sim$\textbf{17k}\\ &U&$\sim$\textbf{1.8k}\\ \specialrule{0em}{1.8pt}{1.8pt} \hline \specialrule{0em}{1.8pt}{1.8pt} \multirow{3}*{FP}&O&$\sim$0.38M\\ &P&$\sim$0.22M\\ &U&$\sim$17k\\ \specialrule{0em}{1.5pt}{1.5pt} \bottomrule \end{tabular} \end{threeparttable} } \end{table*} \subsection{Visualization of The Quantization Weights} In addition to analyzing the quantized weights, we further looked inside the learned layers and checked the values. We plot the heatmap of the fraction of zero value by DFTerNet-($\boldsymbol{g}_p$) on the locomotion category of the OPPORTUNITY dataset across epochs. As shown in Figure \ref{fig:F4}, we can see that the fraction of zero values increase in later epochs, similar phenomena also appear in DFTerNet-($\boldsymbol{g}_p$) on PAMAP2 dataset and DFTerNet-($\boldsymbol{g}_s$) on the gestures category of the OPPORTUNITY dataset. Section \ref{sec:proof_section} proves the reconstruction error $e$ boundary, the model can achieve a very small $e$ value. Table \ref{tab:computational} shows that the layers contain most of the free parameters with increased sparsity at the end of training, this indicates that our proposed quantization method can avoid overfitting and sparsity acts as a regularizer. \begin{figure*} \centering \includegraphics[width=17.5cm]{F5.png}\\ \caption{Validation Weighted $F_1$-score Curves on These Datasets.}\label{fig:F5} \end{figure*} \subsection{The Trade-off Between Quantization and Model Accuracy} The third set of experiments are performed to explore the model accuracy of the quantization method. Just like in the first and second sets of experiments, a four-layer convolutional network is used and the parameter settings for the sliding window as well as batch size are kept completely the same. The weight shift threshold parameter $\xi$ is set to $\xi=2.8$. Finally, TerNet, FTerNet and DFTerNet with their own full-precision counterparts are generated for comparison. Table \ref{tab:double_sub_figure} shows the weighted $F_1$-score performance of different full-precision models and their counterparts, which are described in Figure \ref{fig:F2}. It also depicts the memory usage of all models mentioned above. Table \ref{tab:overall_performance_comparison:_OPPORTUNITY_and_UniMiB-SHAR} shows that using the proposed quantization method, results in a very small difference in performance between TerNet (2-bit) and FTerNet (2-bit) network and its full-precision counterpart, while beating BNN (1-bit) and FBNN (1-bit) by a large margin. On the fewer channels (i.e., 3-channels) UniMiB-SHAR dataset, BNN and TerNet both get poorer performance than the full-precision counterpart. However, the accuracy gap between TerNet and the full-precision counterpart is smaller than the gap between BNN and the full-precision counterpart. Thus, TerNet beat BNN again. Figure \ref{fig:F5} shows the validation weighted $F_1$-score curves on these datasets. As shown in the Figure \ref{fig:F5}, our quantized models (TerNet, FTerNet and DFTerNet) converge almost as fast and stably as their counterparts. This demonstrates the robustness of the quantization technique we proposed. The efficiency of using Hamming distance calculation by \eqref{eq:our_Hamming_space} is another indicator of this work, compared with (16/32)-bit floating point, 2-bit (even 8-bit) operations will not only reduce the energy costs for Hardware/IC Design (see Figure~\ref{fig:F1}), but also halves the memory access costs and memory size requirements during \textbf{run-time}, which will greatly facilitate the deployment of binary/ternary convolutional neural networks on portable devices~\cite{b55}. For example, training a dynamic fusion model using the OPPORTUNITY dataset took about $\sim$12 minutes on an NVIDIA TITAN Xp 12G GPU test platform. For inference the full-precision network on a CPU takes about 15 seconds. We estimate that the DFTerNet inference time to be $\sim$1.8 seconds on a mobile CPU. This shows that the quantization technique we proposed can achieve a $\sim9\times$ speedup. \begin{figure} \centering \includegraphics[width=8cm]{F4.png}\\ \caption{Visualization of fraction of \textbf{zero value} at each epoch in DFTerNet ($\boldsymbol{g}_p$) on the locomotion category of OPPORTUNITY dataset.}\label{fig:F4} \end{figure} \section{Conclusion and Future Work}\label{sec:Conclusion_and_Future_Work} In this paper, we present DFTerNet, a new network quantization method and a novel dynamic fusion strategy, to address the problem of how to better recognize activities from multi-sensor signal sources and deploy them on low-computation capable portable devices. Firstly, the proposed quantization method $\boldsymbol{\epsilon }$-$\boldsymbol{Q}$ is called by two operations through adjusting the scale parameter $\epsilon$, weight quantization $Q_{k_w}(W,\epsilon_w)$ and activation quantization $Q_{k_a}(A,\epsilon_a)$. Secondly, the bit-counts scheme that replaces matrix multiplication proposed in this work is hardware friendly and realizes a $\sim$9$\times$ speedup as well as requiring $\sim$11$\times$ less memory. Thirdly, a novel dynamic fusion strategy was proposed. Unlike existing methods which treat the representations from different sensor signal sources equally, it considers the fact that different sensor signal sources need to be learned separately and less ``contribution'' signal sources reduce its representations by fusion weights which are sampled from a Bernoulli distribution given by the $Q_{k_w}(W,\epsilon_w)$. Experiments that were performed demonstrated the effectiveness of the proposed quantization method and dynamic fusion strategy. As for future works, we plan to extend the quantization method to quantization gradients and errors so that it can be deployed directly on portable devices for training and inference. Because improvement of model performance requires continuous online learning, separation of training and inference will limit that. \section*{Acknowledgment} The authors would also like to thank the associate editor and anonymous reviewers for their comments to improve the paper.
\section{Introduction} It is a perplexing time for particle physics. On one side we are cherishing the discovery of the Standard Model (SM)-Higgs like particle, considered to be the pinnacle of success of the SM, on the other hand we have enough reason to believe the existence of theories beyond it (BSM). To address the shortcomings of the SM, many BSM scenarios are proposed at very different scales. It is believed that any such theory, which contains the SM as a part of it, will affect the electro-weak and the Higgs sector. Thus the precision observables are expected to carry the footprints of the $new$ physics, unless it is in the decoupling limit. The ongoing and proposed future experiments are expected to improve the sensitivity of these precision observables at per mille level. Thus we can indirectly estimate the allowed room left for some BSM physics, even in the case of non-observation of new resonances. This motivates us to look into the BSM scenario through the tinted glass of Standard Model effective field theory (SMEFT). The basic idea of SMEFT is quite straightforward: integrate out heavy non-SM degrees of freedom and capture their impact through the higher mass dimensional operators -- $\sum_{i}(1/\Lambda^{d_i - 4}) C_i \mathcal{O}_i$. Here, $d_i$ is the mass dimensionality of the operator $\mathcal{O}_i$ (starts from $5$), and $C_i$ is the corresponding Wilson coefficient -- function of BSM parameters. It is important to note that the choice of operator basis, i.e., explicit structure of $\mathcal{O}_i$'s is not unique. Among different choices we restrict us to \mmaInlineCell{Code}{"SILH"} \cite{Giudice:2007fh,Contino:2013kra} and \mmaInlineCell{Code}{"Warsaw"} \cite{Jenkins:2013zja, Jenkins:2013wua,Alonso:2013hga} bases. These bases can be transformed from one to anothe . $\Lambda$ is the cut off scale at which all WCs are computed ($C_i(\Lambda)$), and usually identified as the mass of the heavy field being integrated out. This EFT approach relies on the validity of the perturbative expansion of the S-matrix in the powers of $\Lambda^{-1}$ (UV-scale), and the resultant series is expected to pass the convergence test. As this scale is higher than the scale $M_Z$, where the precision test is performed, dimension-6 operators are more suppressed than the dimension-5 ones and so on. Now, where to truncate the $1/\Lambda$ series? This decision is made case by case, based on the achieved(expected) precision level of the observables at present(future) experiments\footnote{For further interested readers, see \cite{Furnstahl:2015rha}.}. One can consult these lectures \cite{Georgi:1994qn,Kaplan:1995uv,Manohar:1996cq,Burgess:2007pt,Rothstein:2003mp} where effective field theory has been introduced and discussed in great detail. Several other packages and libraries are available in the literature, which do various things regarding SMEFT operators and the corresponding Wilson Coefficients, from basis transformation to running of the coefficients \cite{Gripaios:2018zrz,Falkowski:2015wza,Celis:2017hod,Criado:2017khh,Aebischer:2018bkb}. Now the nagging questions are: ({\em a}) Why use SMEFT instead of doing the full calculation, using the supposedly more accurate BSM Lagrangian? ({\em b}) How can one ensure that the difference between the results, computed in SMEFT approach using a truncated S-matrix and those obtained using the full BSM theory, is imperceptible (in the precision tests)? The computation with the full BSM is involved and tedious, and that too at loop level. The cut-off $\Lambda$ is chosen in such a way that the $M_Z/\Lambda$ series is converging, which ensures that the truncation of this series at some finite order is safe and sufficient. Even then, the question remains: how do we connect the physics of two different scales, namely UV and the $M_Z$? The WCs, that we are computing using SMEFT, are at the scale $\Lambda$, but the observables are measured at $M_Z$ scale. Hence, we need to evolve the $C_i(\Lambda)$ to obtain $C_i(M_Z)$, using the anomalous dimension matrix $(\gamma)$. While performing the renormalisation group evolutions (RGEs) of the $C_i'$s, we need to choose the $\gamma$ carefully, as it is basis dependent. Thus we need to choose only those bases, in which the precision observables are defined, and it is important to ensure that the basis we are working with is a complete one. As the matrix $\gamma$ contains non-zero off-diagonal elements, it is indeed possible to generate, through RGEs, some new effective operators, which were absent at $\Lambda$ scale. These effective field theory approach has been successfully used in the context of precision data and Higgs phenomenology, for details see \cite{Henning:2014wua,Henning:2016lyp,Henning:2015alf,Elias-Miro:2013mua,Elias-Miro:2013eta,Jenkins:2013fya,Manohar:2013rga,Han:2004az,Cacciapaglia:2006pk,Bonnet:2011yx,Bonnet:2012nm,delAguila:2011zs,Grojean:2013kd,Contino:2016jqw,Brehmer:2015rna,Berthier:2015gja,Gorbahn:2015gxa,Berthier:2015oma,Skiba:2010xn,Khandker:2012zu,Englert:2013wga,Banerjee:2012xc,Banerjee:2013apa}. With this backdrop, we introduce \mmaInlineCell{Code}{\mmaDef{CoDEx}}, a {\em Mathematica$^\text{\tiny \textregistered}$} package, which can integrate out the heavy field propagator(s) from tree as well as 1-loop processes and can generate SM effective operators up to dimension-6. It also provides the Wilson Coefficients as a function of BSM parameters. The draft is organised in the following manner: in section \ref{sec:theo}, we have briefly discussed the underlying principle of \mmaInlineCell{Code}{\mmaDef{CoDEx}} from a theoretical perspective. Details about downloading and installation are in section \ref{sec:install}. In the remainder of section \ref{sec:pack}, we provide a guideline to define the heavy field(s) and build the working Lagrangian (section \ref{sec:build}), provide a list of all the functions that are necessary to run \mmaInlineCell{Code}{\mmaDef{CoDEx}} in detail (section \ref{sec:howtorun}), and explain the way \mmaInlineCell{Code}{\mmaDef{CoDEx}} takes care of the RGEs of the WCs down to the electro-weak scale (section \ref{sec:rgflow}). In the next section, we provide the user with one detailed work-flow to use the package for a model with a single heavy electro-weak $SU(2)_L$ real singlet scalar in it (section \ref{sec:detailex}). Sequentially following these steps should enable one to find out the effective operators up to mass dimension-6 and the respective WCs at the high scale for that model. In the appendix we have provided various example models to encapsulate different types of fields that are used frequently to build BSM scenarios. One can consult the Refs. \cite{Jenkins:2013zja, Jenkins:2013wua,Alonso:2013hga,Wells:2015cre} regarding the running of the SM effective operators. \section{The underlying Principle}\label{sec:theo} In this section, we will briefly discuss the adopted method, based on the idea of \textit{Co}variant \textit{D}erivative \textit{Ex}pansion (CDE), to integrate out the heavy fields to compute the Wilson Coefficients (WCs). This was introduced in \cite{Gaillard:1985uh}, and then extended in \cite{Cheyette:1985ue}. As we are performing this {\it ``integrating out of the field(s)"} order by order in perturbation theory, we need to respect the gauge invariance at each and every step. The perturbative expansion thus demands to be done in terms of some gauge covariant quantities. Thus covariant derivative is the `chosen one'. CDE is not only restricted to quantify the integrating out of heavy fields, rather has a wider impact; see \cite{Henning:2014wua,Henning:2016lyp,Henning:2015alf} for detail. The method of integrating out different types of heavy fields using functional methods and the basis dependency are discussed in many places in the literature, see \cite{Lehman:2015via,Chiang:2015ura,Huo:2015exa,Huo:2015nka,Lehman:2015coa,Wells:2015uba,Drozd:2015rsp,delAguila:2016zcb,Fuentes-Martin:2016uol,Ellis:2016enq, Falkowski:2015wza} for detail. Considering the status of present and prospect of future experiments, we can adjudge ourselves safe, when we restrict ourselves to only dimension-6 operators including the tree and 1-loop parts of the effective action. The modus operandi of \mmaInlineCell{Code}{\mmaDef{CoDEx}} is based on the method of CDE discussed in \cite{Henning:2014wua,Henning:2016lyp,Henning:2015alf}. Briefly, here is what \mmaInlineCell{Code}{\mmaDef{CoDEx}} can give you: \begin{itemize} \item It will integrate out the heavy BSM field(s) while respecting the gauge invariance. \item It will generate Wilson Coefficients at tree and(or) 1-loop level. \item It will perform RG evolutions of the effective operators generated at some high scale and provide the operators at the electro-weak scale. \end{itemize} Let us consider a BSM Lagrangian in the following form \begin{equation} \mathcal{L}^{(BSM)} \equiv \mathcal{L}^{(BSM)} ( \phi , \Phi )=\mathcal{L}^{(\Phi )} + \mathcal{L}^{(\phi )} + \mathcal{L}^{(\phi , \Phi )}_{int}\,, \end{equation} where $\phi$ and $\Phi$ represent light (SM) and heavy (BSM) fields respectively. Here, $\mathcal{L}^{(\phi )}, \mathcal{L}^{(\Phi )}$, and $\mathcal{L}^{(\phi , \Phi )}_{int}$ are three different sectors of the BSM Lagrangian containing respectively only-heavy fields, only-light fields, and heavy-light both. To proceed further, we have to first solve the following Euler-Lagrange (EL) equation to compute the solution for the heavy field: \begin{equation} \frac{\partial}{\partial \Phi} \mathcal{L}^{(BSM)}(\phi , \Phi ) = \mathcal{D}_{\mu} \ \frac{\partial}{\partial (\mathcal{D}_{\mu} \Phi)} \mathcal{L}^{(BSM)}(\phi , \Phi ) , \label{el0} \end{equation} where $\mathcal{D}_{\mu}$ is the covariant derivative corresponding the heavy field $\Phi$. To find out the EL-equations, we will concentrate on the $\mathcal{L}^{(BSM)}( \phi , \Phi ) $ part only. If we express this part of the Lagrangian as a polynomial in $\Phi$, e.g., $\mathcal{L}^{(\phi)}_{I} . \ \Phi + \mathcal{L}^{(\phi)}_{II} . \ (\Phi)^{2} + \ldots$, the coefficients can then be written as: \begin{equation} \mathcal{L}^{(\phi)}_{I} = \ \mathcal{O}_{\mathcal{D}} \ . \ \hat{\Phi} , \label{od0} \end{equation} where $\mathcal{O}_{\mathcal{D}}$ contains the information regarding the covariant derivative of the heavy field and the functional of the light (SM) fields. In general, $\mathcal{O}_{\mathcal{D}}$ is in the form of an elliptic operator, e.g. $\mathcal{O}_{\mathcal{D}} = \mathcal{D}^{2} + M^{2} + \mathcal{L}_{II}^{\phi} $, where $M$ is the mass of heavy field to be integrated out. Thus the heavy field solution can be rewritten as: \begin{equation} \hat{\Phi} = [\mathcal{O}_{\mathcal{D}}]^{-1} \ . \ \mathcal{L}^{(\phi)}_{I} . \end{equation} The operator $[\mathcal{O}_{\mathcal{D}}]^{-1}$ can be Taylor-expanded, where terms are suppressed by $M^{2n}$ ($n$ takes integer values starting from 1). This series is convergent as $M$ is much larger than the allowed maximum momentum transfer in the low energy theory. Thus we can truncate this series based on our requirement of the mass dimension of the effective operator. It is important to note that in the theories where the $\mathcal{L}^{(\phi)}_{I}$ term is absent, any tree-level effective operator will not be generated after integrating out $\Phi$. The next task is to compute these effective operators at loop level. We will restrict our computation up to 1-loop, relying on the precision of present data. The effective Lagrangian at 1-loop level is given by \cite{Henning:2014wua,Henning:2016lyp,Henning:2015alf}: {\small \begin{align}\label{leff1loop} \mathcal{L}^{(dim-6)}_{1-loop}[\phi] =&\frac{c_s}{(4\pi)^2} \, \text{tr} \, \Bigg\{ \frac{1}{m^2}\Bigg[ -\frac{1}{60} \, \big(P_{\mu}G_{\mu\nu}'\big)^2 - \frac{1}{90} \, G_{\mu\nu}'G_{\nu\sigma}'G_{\sigma\mu}' -\frac{1}{12} \, (P_{\mu}U)^2 - \frac{1}{6}\, U^3 - \frac{1}{12}\, U G_{\mu\nu}'G_{\mu\nu}' \Bigg] \nonumber \\ &+ \frac{1}{m^4} \Bigg[\frac{1}{24} \, U^4 + \frac{1}{12}\, U \big(P_{\mu}U\big)^2 + \frac{1}{120}\, \big(P^2U\big)^2 +\frac{1}{24} \, \Big( U^2 G'_{\mu\nu}G'_{\mu\nu} \Big) - \frac{1}{120} \, \big[(P_{\mu}U),(P_{\nu}U)\big] G'_{\mu\nu} \nonumber \\ & - \frac{1}{120}\, \big[U[U,G'_{\mu\nu}]\big] G'_{\mu\nu} \Bigg] + \frac{1}{m^6} \Bigg[-\frac{1}{60} \, U^5 - \frac{1}{20} \, U^2\big(P_{\mu}U\big)^2 - \frac{1}{30} \, \big(UP_{\mu}U\big)^2 \Bigg] + \frac{1}{m^8} \bigg[ \frac{1}{120} \, U^6 \bigg]\Bigg\} \,. \end{align} } where $c_{s} = \frac{1}{2}, 1, - \frac{1}{2}$, and $\frac{1}{2}$ for real scalar, complex scalar, fermion, and gauge boson respectively. Here, $P_{\mu} = i \ \mathcal{D}_{\mu} \ \text{and} \ G'_{\mu \nu}=[\mathcal{D}_{\mu} , \mathcal{D}_{\nu}]$. $U$ is a collection of coefficients of the terms which are bi-linear in the heavy field. $U$ can be written in matrix form of $\delta\Big[ \mathcal{L}^{(BSM)}(\phi , \Phi )\Big]/\delta \Phi_i \delta \Phi_j$, evaluated at $\hat{\Phi}_i$ \cite{Henning:2014wua,Henning:2016lyp,Henning:2015alf}. It is important to note down that `$\text{tr}$' in the above equation is the trace performed over the internal symmetry indices. Once we find the effective operators and their respective Wilson Coefficients at high scale, i.e., scale of new physics, we can run them down to the electro-weak scale. These operators are evolved with energy scale as: \begin{equation} \frac{d \mathcal{O}_i}{d\ln\mu}=\gamma_{ij} \mathcal{O}_j, \end{equation} where $\gamma_{ij}$ is the anomalous dimension matrix. This is also implemented in \mmaInlineCell{Code}{\mmaDef{CoDEx}}, but only for \mmaInlineCell{Code}{"Warsaw"} basis, as it is the complete one. \section{The package, in detail}\label{sec:pack} \subsection{Installing and Loading {\large \texttt{CoDEx}}}\label{sec:install} Installing \mmaInlineCell{Input}{\mmaDef{CoDEx}} is quite straightforward. This can be done in one of the following ways: \subsubsection{Automatic Installation} \mmaInlineCell{Input}{\mmaDef{CoDEx}} can be installed in a Mathematica environment by downloading and importing the installer file `\texttt{install.m}' available at \href{https://github.com/effExTeam/CoDEx-1.0.0/raw/master/install.m}{this link}. The installer can also be automatically loaded inside Mathematica environment by using the command\footnote{This requires a live internet connection and Mathematica should be able to connect to the internet.} \begin{mmaCell}{Code} Import["https://github.com/effExTeam/CoDEx-1.0.0/raw/master/install.m"]; \end{mmaCell} This loads two functions in the working kernel: `\mmaInlineCell{Code}{InstallCoDEx}' and `\mmaInlineCell{Code}{InstallCoDExQuiet}'. Typical way of running them is: \begin{mmaCell}{Input} \mmaDef{InstallCoDEx}[] \end{mmaCell} One can use \mmaInlineCell{Code}{InstallCoDExQuiet} instead of \mmaInlineCell{Code}{InstallCoDEx}, which is equivalent to running: \begin{mmaCell}[index=2]{Input} \mmaDef{InstallCoDEx}[AutoDisableInsufficientVersionWarning\(\pmb{\to}\)True, AutoOverwriteCoDExDirectory\(\pmb{\to}\)True] \end{mmaCell} \begin{table}[ht] \caption{Running `InstallCoDEx' can be customized using its options:} \begin{center} \renewcommand*{\arraystretch}{2} \begin{tabular}{|cll|} \hline \rowcolor[gray]{.92} \textit{Options}$~~~$ & \textit{Default}$~~~$ & \textit{Detail} \\ \hline \rowcolor[gray]{.92} $~~~$\mmaInlineCell{Code}{AutoDisableInsufficient-}$~~$ & \mmaInlineCell{Code}{None} & True $\to $ warning messages for notebooks created with$~~~$ \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{VersionWarning} & & newer Mathematica version automatically disabled.\footnote{Needed to generate documentation in older versions. } \\ \rowcolor[gray]{.92} & & None$\to $ user will be asked by a dialog.\\ \rowcolor[gray]{.92} & & False$\to $ warnings will not be disabled. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{AutoOverwriteCoDEx-} & \mmaInlineCell{Code}{None} & True$\to $ Previous installations automatically deleted.\\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{\mmaUnd{Directory}} & & None$\to $ user will be asked by a dialog.\\ \rowcolor[gray]{.92} & & False$\to $ the directory will be overwritten. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{InstallCoDEx-} & \mmaInlineCell{Code}{False} & True$\to $ Install latest {\em development} version.\\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{\mmaUnd{DevelopmentVersion}} & & False$\to $ Install the latest {\em stable} version. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{InstallCoDExTo} & \mmaInlineCell{Code}{"path"} & Specifies custom full path to installation directory. \\ \hline \end{tabular} \end{center} \end{table} \subsubsection{Download archive file} There is a provision to download and install the program locally.\\ The \mmaInlineCell{Input}{\mmaDef{CoDEx}} package is available in both \texttt{.zip} and \texttt{.tar} format in its `Github' repository. While using the `\mmaInlineCell{Code}{Install}' option from the Notebook menu inside Mathematica or manually extracting the downloaded archive file in the `\texttt{Applications}' folder inside the \mmaInlineCell{Code}{$UserBaseDirectory} works perfectly, installing \texttt{CoDEx} is made a lot easier by downloading and importing the installer file `\texttt{install.m}' available \href{https://github.com/effExTeam/CoDEx-1.0.0/raw/master/install.m}{here}. If for some reason you choose to download the archive files and install CoDEx from them, this can still be done, using \mmaInlineCell{Code}{InstallCoDEx}. You just need to run it in a slightly different way. You need to copy the path of the downloaded archive (e.g. if you are working in Windows and have downloaded the \texttt{.zip} file to the `Downloads' folder, your path will be \mmaInlineCell{Code}{"C:\...\Downloads\CoDEx.zip"}. Let's call it \mmaInlineCell{Code}{"path"} from now). Then run this command in your notebook after importing the `install.m' file: \begin{mmaCell}[index=1]{Code} $PathToCoDExArchive = "path"; \mmaDef{InstallCoDEx}[] \end{mmaCell} This goes through exactly the same steps as in the previous section, but instead of downloading the archive from the server, uses the local file. After this, the package can always be loaded in {\em Mathematica} using: \begin{mmaCell}{Input} Needs["CoDEx`"] \end{mmaCell} The installer file is not our creation. We have edited and simplified the installer for {\em FeynRules} \cite{Alloul:2013bka}. \begin{table}[ht] \caption{Main functions provided by \texttt{CoDEx}} \begin{center} \renewcommand*{\arraystretch}{2} \begin{tabular}{{|cl|}} \hline \rowcolor[gray]{.92} \textit{Function} & \textit{Details} \\ \hline \rowcolor[gray]{.92} \mmaInlineCell{Code}{CoDExHelp} & Opens the \mmaInlineCell{Code}{\mmaDef{CoDEx}} guide, with all help files listed.\\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{treeOutput} & Calculates WCs generated from tree level processes.\\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{loopOutput} & Calculates WCs generated from 1-loop processes.\\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{codexOutput} & Generic function for WCs calculation with\\ \rowcolor[gray]{.92} & choices for level, bases etc. given with \mmaInlineCell{Code}{\mmaDef{OptionValue}}s.\\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{defineHeavyFields} & Creates representation of heavy fields.\\ \rowcolor[gray]{.92} & Use the output to construct BSM Lagrangian.\\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{texTable} & Given a \mmaInlineCell{Code}{\mmaDef{List}}, returns the \LaTeX~output of a tabular\\ \rowcolor[gray]{.92} & environment, displayed and/or copied to clipboard.\footnote{This is a simplified version of the package titled \texttt{TeXTableForm} \cite{TeXTableForm}} \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{formPick} & Applied on a list of WCs from a specific operator basis,\\ \rowcolor[gray]{.92} & reformats the output in the specified style. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{RGFlow} & RG Flow of WCs of dim. 6 operators in \mmaInlineCell{Code}{"Warsaw"} basis, \\ \rowcolor[gray]{.92} & from matching scale to a lower (arbitrary) scale. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{initializeLoop} & Prepares the Isospin and Color symmetry generators \\ \rowcolor[gray]{.92} & for a specific model with a specific heavy field content. \\ \rowcolor[gray]{.92} & \mmaInlineCell{Code}{loopOutput} can only be run after this step is done. \\ \hline \end{tabular} \end{center} \end{table} \begin{figure}[ht] \centering \includegraphics[scale=0.2]{CoDEx_Layout.png} \caption{Flow-chart for \texttt{CoDEx}} \label{flowch} \end{figure} \subsection{How to build the Lagrangian}\label{sec:build} \subsubsection{Building the Lagrangian: An example}\label{sec:buildEx} Let us demonstrate this with a toy example where the Lagrangian is given in its traditional form: \begin{equation}\label{lag1} L(\Phi ,H)\supset -\eta~ \Phi ^a \Phi ^a \left| H\right| ^2 + 2 \kappa~ H \tau ^a \Phi ^a H^{\dagger }-\frac{\lambda _{\Phi }}{4} \left(\Phi ^a \Phi ^a\right)^2 \,. \end{equation} Here, $\Phi$ is the heavy field which is going to be integrated out. From the user-end, the information for this heavy field is fed in the code as: \begin{mmaCell}[label={}]{Code} fields = { {\mmaPat{fieldName}, \mmaPat{components}, \mmaPat{colorDim}, \mmaPat{isoDim}, \mmaPat{hyperCharge}, \mmaPat{spin}, \mmaPat{mass}} }; \end{mmaCell} which contains the required information (within \{\ldots\}) about the field to compute the WCs. The properties necessary to define the heavy field are listed in table \ref{tab:fieldForm}. Now, this code is equally applicable for multiple heavy BSM fields. In this case, the field-definitions will be listed sequentially under the first set of curly braces (see section \ref{sec:buildheavy}). In the case of our example model, we have only one heavy field, a real triplet scalar (i.e. \mmaInlineCell{Code}{components} $\rightarrow$ 3, \mmaInlineCell{Code}{colorDim} $\rightarrow$ 1, \mmaInlineCell{Code}{isoDim} $\rightarrow$ 3, \mmaInlineCell{Code}{hypercharge} $\rightarrow$ 0, \mmaInlineCell{Code}{spin} $\rightarrow$ 0). Let us denote \mmaInlineCell{Code}{fieldName} $\rightarrow$ `ph' and \mmaInlineCell{Code}{mass} $\rightarrow$ `m'. This represents the field content of our model in the correct way: \begin{mmaCell}[index=1]{Code} fields = { {ph, 3, 1, 3, 0, 0, m} }; \end{mmaCell} \begin{table}[ht] \caption{Generic form of individual fields:}\label{tab:fieldForm} \centering \renewcommand*{\arraystretch}{2} \begin{tabular}{|cl|} \rowcolor[gray]{.92} \hline \textit{Pattern} & \textit{Details} \\ \hline \rowcolor[gray]{.92} \mmaInlineCell{Code}{fieldName} & field-name, used as array-head to construct the Lagrangian. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{components} & \text{number of components in the heavy field.} \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{colorDim} & \text{dimensionality of the heavy field under } $SU(3)_C$ \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{isoDim} & \text{dimensionality of the heavy field under } $SU(2)_L$ \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{hyperCharge} & \text{hyper-charge of the heavy field under }$U(1)_Y$. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{spin} & \text{spin quantum number of the heavy field.} \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{mass} & \text{variable representing the mass of the heavy field} \\ \hline \end{tabular} \end{table} Now that our field definitions are ready, it's time to write the Lagrangian in a form that the code understands. For that, first we have to create the representations of these fields in their component form. This is done by a specific function: \begin{mmaCell}{Code} hfvecs = \mmaDef{defineHeavyFields}[\mmaDef{fields}] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{\{ph[1,1], ph[1,2], ph[1,3]\}\}\} \end{mmaCell} } To write the Lagrangian in a compact form one can define the heavy field as: \begin{mmaCell}{Input} \mmaUnd{\(\pmb{\Phi}\)} = \mmaDef{hfvecs}[[1,1]] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{ph[1,1], ph[1,2], ph[1,3]\} \end{mmaCell} } With this definition, the working Lagarangian, given in regular form in Eq.~(\ref{lag1}), can be written as:\\ either in compact form like: \begin{mmaCell}[morefunctionlocal={a}]{Input} LBSM = 2 \mmaUnd{\(\pmb{\kappa}\)} *Table[(\mmaDef{dag}[H].\mmaDef{tau}[a].\mmaDef{H}),\{a,3\}].\mmaUnd{\(\pmb{\Phi}\)} - \mmaUnd{\(\pmb{\eta}\)} \mmaSup{\mmaDef{abs}[\mmaDef{H}]}{2}*(\mmaUnd{\(\pmb{\Phi}\)}.\mmaUnd{\(\pmb{\Phi}\)}) - \mmaFrac{1}{4}\mmaUnd{\(\pmb{\lambda}\)} \mmaSup{(\mmaUnd{\(\pmb{\Phi}\)}.\mmaUnd{\(\pmb{\Phi}\)})}{2}; \end{mmaCell} \subsubsection{Other examples of Defining Fields}\label{sec:buildheavy} So far we have mentioned how to integrate out a single heavy field. In case of multiple fields, the required format of the `\texttt{fieldList}' would look like \begin{mmaCell}[label={}]{Code} fieldList = { { \mmaPat{fieldName1},\mmaPat{components1},\mmaPat{colorDim1},\mmaPat{isoDim1},\mmaPat{hyperCharge1},\mmaPat{spin1},\mmaPat{mass1} }, { \mmaPat{fieldName2},\mmaPat{components2},\mmaPat{colorDim2},\mmaPat{isoDim2},\mmaPat{hyperCharge2},\mmaPat{spin2},\mmaPat{mass2} }, ... ... }; \end{mmaCell} Now we can create the heavy fields' list as: \begin{mmaCell}[label={In[..]:=}]{Input} hfVecs = \mmaDef{defineHeavyFields}[fieldList] \end{mmaCell} In general, if we have $n$ number of heavy fields, then \mmaInlineCell{Code}{hfVecs} is a list, whose $i^{th}$ element is the representation of the $i^{th}$ heavy field. Let us describe different cases in detail, where we have fields of different characteristics. A case with a single field is already shown in sec. \ref{sec:buildEx}. Following the same proposal, we can define multiple heavy fields. A possible example is: \begin{mmaCell}[index=1]{Code} fieldList2 = { {hf1, 3, 1, 3, 0, 0, m}, {hf2, 6, 3, 2, 1/6, 0, m} }; \end{mmaCell} with which we define \begin{mmaCell}{Code} hfarray2 = \mmaDef{defineHeavyFields}[\mmaDef{fieldList2}] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{\{hf1[1,1], hf1[1,2], hf1[1,3]\}\}, \{\{hf2[1,1] + i ihf2[1,1], hf2[1,2] + i ihf2[1,2]\}, \{hf2[2,1] + i ihf2[2,1], hf2[2,2] + i ihf2[2,2]\}, \{hf2[3,1] + i ihf2[3,1], hf2[3,2] + i ihf2[3,2]\}\}\} \end{mmaCell} } Here, the representation for the first heavy field is: \begin{mmaCell}{Input} hfvec1 = \mmaDef{hfarray2}[[1,1]] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{hf1[1,1],hf1[1,2],hf1[1,3]\} \end{mmaCell} } and the second field is represented as: \begin{mmaCell}{Input} hfvec2 = \mmaDef{hfarray2}[[2]] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{hf2[1,1] + i ihf2[1,1],hf2[1,2]+i ihf2[1,2]\}, \{hf2[2,1] + i ihf2[2,1],hf2[2,2]+i ihf2[2,2]\}, \{hf2[3,1] + i ihf2[3,1],hf2[3,2]+i ihf2[3,2]\}\} \end{mmaCell} } Now, these two field representations (\mmaInlineCell{Code}{hfvec1} and \mmaInlineCell{Code}{hfvec2}) can be used to build the required Lagrangian. For a spin-1 field, the field definition will be: \begin{mmaCell}[index=1]{Input} fieldList3= \{ \{hf3,3,1,3,0,1,m3\} \}; \end{mmaCell} We do not count the Lorentz components of a heavy field while writing the total number of field components (the second entry in \mmaInlineCell{Code}{fieldList}). \begin{mmaCell}{Input} hfarray3= \mmaDef{defineHeavyFields}[\mmaDef{fieldList3}] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{\{hf3[1][1],hf3[1][2],hf3[1][3],hf3[1][4]\}, \{hf3[2][1],hf3[2][2],hf3[2][3],hf3[2][4]\}, \{hf3[3][1],hf3[3][2],hf3[3][3],hf3[3][4]\}\}\} \end{mmaCell} } \begin{mmaCell}{Input} hfvec3 = \mmaDef{hfarray3}[[1]] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{hf3[1][1],hf3[1][2],hf3[1][3],hf3[1][4]\}, \{hf3[2][1],hf3[2][2],hf3[2][3],hf3[2][4]\}, \{hf3[3][1],hf3[3][2],hf3[3][3],hf3[3][4]\}\} \end{mmaCell} } In a similar manner, the spin-1/2 field is represented as: \begin{mmaCell}[index=1]{Input} fieldList4 = \{ \{hf4,3,1,3,0,\mmaFrac{1}{2},m4\} \}; \end{mmaCell} As before, we do not count the Lorentz components of a heavy field. \begin{mmaCell}{Input} hfarray4= \mmaDef{defineHeavyFields}[\mmaDef{fieldList4}] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{\{\{\{hf4[1,1][1],hf4[1,1][2],hf4[1,1][3],hf4[1,1][4]\}, \{hf4b[1,1][1],hf4b[1,1][2],hf4b[1,1][3],hf4b[1,1][4]\}\}, \{\{hf4[1,2][1],hf4[1,2][2],hf4[1,2][3],hf4[1,2][4]\}, \{hf4b[1,2][1],hf4b[1,2][2],hf4b[1,2][3],hf4b[1,2][4]\}\}, \{\{hf4[1,3][1],hf4[1,3][2],hf4[1,3][3],hf4[1,3][4]\}, \{hf4b[1,3][1],hf4b[1,3][2],hf4b[1,3][3],hf4b[1,3][4]\}\}\}\}\} \end{mmaCell} } \begin{mmaCell}{Input} hfvec4 = \mmaDef{hfarray4}[[1,1]][[All,1]] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{hf4[1,1][1],hf4[1,1][2],hf4[1,1][3],hf4[1,1][4]\}, \{hf4[1,2][1],hf4[1,2][2],hf4[1,2][3],hf4[1,2][4]\}, \{hf4[1,3][1],hf4[1,3][2],hf4[1,3][3],hf4[1,3][4]\}\} \end{mmaCell} } \begin{mmaCell}{Input} hfvec4b = \mmaDef{hfarray4}[[1,1]][[All,2]] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{\{hf4b[1,1][1],hf4b[1,1][2],hf4b[1,1][3],hf4b[1,1][4]\}, \{hf4b[1,2][1],hf4b[1,2][2],hf4b[1,2][3],hf4b[1,2][4]\}, \{hf4b[1,3][1],hf4b[1,3][2],hf4b[1,3][3],hf4b[1,3][4]\}\} \end{mmaCell} } Use \mmaInlineCell{Code}{hfvec4} and \mmaInlineCell{Code}{hfvec4b} as the field representation of the fermion (say, $\psi$) and its Lorentz conjugate ($\overline{\psi}$). \subsection{How to run the code}\label{sec:howtorun} \begin{table}[ht] \caption{Available functions for calculating Wilson Coefficients (WCs) for a given BSM Lagrangian}\label{tab:mainFuncs} \begin{center} \renewcommand*{\arraystretch}{2} \begin{tabular}{|cl|} \rowcolor[gray]{.92} \hline Function & Details \\ \hline \rowcolor[gray]{.92} \mmaInlineCell{Code}{treeOutput} & \text{Calculates tree level Wilson Coefficients.} \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{loopOutput} & \text{Calculates 1 loop level Wilson Coefficients.} \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{codexOutput} & \text{Generic function for WCs calculation upto 1 loop.} \\ \hline \end{tabular} \end{center} \end{table} We have demonstrated how to build the Lagrangian in the previous section. Here we will discuss the necessary steps that needs to be followed to compute the Wilson coefficients (WC). Of the various options that \mmaInlineCell{Input}{\mmaDef{CoDEx}} provides to the users, the first is choice of operator bases (\mmaInlineCell{Code}{operBasis}) between (i) \mmaInlineCell{Code}{"Warsaw"}, and (ii) \mmaInlineCell{Code}{"SILH"}. Here \mmaInlineCell{Code}{"Warsaw"} is the default one. The next option is the level at which the user wants the WCs.\\ One can compute upto 1-loop WCs using this code. \subsubsection{Tree Level} To obtain the tree level Wilson coefficients, one needs to use the function \mmaInlineCell{Code}{treeOutput}, used as: \begin{mmaCell}[label={}]{Code} \mmaDef{treeOutput}[\mmaPat{lagrangian},\mmaPat{fieldList}] \end{mmaCell} This will generate the WCs in the \mmaInlineCell{Code}{"Warsaw"} basis. Now, to compute the same in \mmaInlineCell{Code}{"SILH"} basis, one has to simply provide explicit choice of the operator basis as: \begin{mmaCell}[label={}]{Code} \mmaDef{treeOutput}[\mmaPat{lagrangian},\mmaPat{fieldList},operBasis->"SILH"] \end{mmaCell} \subsubsection{1-loop Level}\label{sec:1loop} To compute the WCs at 1-loop level only, we have to use another function, \mmaInlineCell{Code}{loopOutput}. This can be used as: \begin{mmaCell}[label={}]{Code} \mmaDef{loopOutput}["model",\mmaPat{lagrangian},\mmaPat{fieldList}] \end{mmaCell} Unlike the tree level case, here we need the transformation property of the heavy fields under the given gauge symmetry. More precisely, the structure of the generators determined by the dimensionality of the heavy field's representations must be provided explicitly. We have provided their structure up to fundamental and quadruplet for $SU(3)_C$ and $SU(2)_L$ gauge groups respectively. For more exotic BSM particles, we have kept provision for the user to define it. To do so, one has to run a function as: \begin{mmaCell}[label={}]{Code} \mmaDef{initializeLoop}["model",\mmaPat{fieldList}] \end{mmaCell} If the dimensionality of the heavy fields are within the mentioned ranges then one does not need to provide the explicit structures of the generators. Otherwise, she has to provide all the generators explicitly for each and every heavy field as: \mmaInlineCell{Code}{isomodel[p,i]} and \mmaInlineCell{Code}{colmodel[p, a]} where `\mmaInlineCell{Code}{p}' denotes the number of heavy fields, and `\mmaInlineCell{Code}{i}' and `\mmaInlineCell{Code}{a}' run from 1 to 3 and 1 to 8 respectively. \subsubsection{One Function to find them All} \begin{table}[ht] \caption{The Options for \texttt{codexOutput}. Other than these, this function also takes all Options of \texttt{formPick}}\label{tab:codexOutput} \begin{center} \renewcommand*{\arraystretch}{2} \begin{tabular}{|ccl|} \rowcolor[gray]{.92} \hline Option & Default Value & Details \\ \hline\rowcolor[gray]{.92} \mmaInlineCell{Code}{monitor} & \mmaInlineCell{Code}{True} & \text{Shows an animation while computing} \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{appearance} & \mmaInlineCell{Code}{"Percolate"} & \text{Appearence of the animation.} \\ \rowcolor[gray]{.92} & (\text{for} \text{Version}$\geq$ 11.) & \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{operBasis} & \mmaInlineCell{Code}{"Warsaw"} & \text{Choice of basis of the Dim.-6 operators } \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{format} & \mmaInlineCell{Code}{List} & \text{The output format.} \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{model} & \mmaInlineCell{Code}{""} & Takes the same input as \mmaInlineCell{Code}{initializeLoop}.\\ \rowcolor[gray]{.92} & & If left blank, will give the tree-level. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{outRange} & \mmaInlineCell{Code}{All} & The level at which output is evaluated.\\ \rowcolor[gray]{.92} & & `\mmaInlineCell{Code}{All}' means the result calculates both\\ \rowcolor[gray]{.92} & & tree and loop level results and combines them. \\ \rowcolor[gray]{.92} \mmaInlineCell{Code}{ibp} & \mmaInlineCell{Code}{True} & Turns the `Integration by Parts' option on.\\ \rowcolor[gray]{.92} & & Detail available on the \mmaInlineCell{Code}{loopOutput} page.\\ \hline \end{tabular} \end{center} \end{table} Now, one can wish to get all the WCs, i.e., tree and 1-loop levels together. For that one can simply use the following function as: \begin{mmaCell}[label={}]{Input} codexOutput[\mmaPat{lagrangian},\mmaPat{fieldList},model\(\pmb{\to}\)\mmaPat{modelName_String}] \end{mmaCell} Essentially, this function is all one needs to calculate the WCs and even format them in the correct way. With careful choice of \mmaInlineCell{Code}{OptionValues}, one can obtain results at different levels, with different operator bases, and in different formats. We have enlisted the main options which can be found using \mmaInlineCell{Code}{Options[codexOutput]}. \subsection{RGEs of WCs -- Anomalous dimension matrix and choice of basis}\label{sec:rgflow} For a given BSM Lagrangian we can compute the effective dimension-6 operators and the associated Wilson coefficients by integrating out the heavy fields. \mmaInlineCell{Input}{\mmaDef{CoDEx}} can provide these results in two different bases: \mmaInlineCell{Code}{"Warsaw"} and \mmaInlineCell{Code}{"SILH"}. In the \mmaInlineCell{Code}{"Warsaw"} basis, operators form a complete basis unlike the \mmaInlineCell{Code}{"SILH"} one. Thus we prefer to perform the running of the Wilson Coefficients in \mmaInlineCell{Code}{"Warsaw"} basis only. Once the WCs are computed at the high scale, one can run those effective operators using the Anomalous dimension matrix and can compute the operator structures at the electro-weak (EW) scale by using the \mmaInlineCell{Code}{RGFlow} function. Results of this module will help to connect the EW observables and the BSM physics through the effective operators and the WCs. To perform the RG evolution of the WCs, we need to use the function : \begin{mmaCell}[label={}]{Input} RGFlow[\mmaPat{WCList_List},\mmaPat{MatchingScale},\mmaPat{\(\pmb{\mu}\)}] \end{mmaCell} This function works in the following way: \begin{itemize} \item \mmaInlineCell{Code}{RGFlow} takes a list as its first argument. List output from \mmaInlineCell{Code}{treeOuput}, \mmaInlineCell{Code}{loopOutput} and \mmaInlineCell{Code}{codexOutput} functions should be used as the first argument. \item \mmaInlineCell{Code}{RGFlow} takes Wilson Coefficients of dimension six operators in \mmaInlineCell{Code}{"Warsaw"} basis only. \item The second argument is the scale at which the full BSM theory is matched with the EFT. \item \mmaInlineCell{Input}{\mmaPat{\(\pmb{\mu}\)}} can be any energy scale below the matching scale. \end{itemize} Here, both the \mmaInlineCell{Code}{\mmaPat{MatchingScale}} and \mmaInlineCell{Input}{\mmaPat{\(\pmb{\mu}\)}} can be symbolic inputs. The working principle of this function works is as follows: \begin{itemize} \item Load the package through: \begin{mmaCell}[index=1]{Code} Needs["CoDEx`"] \end{mmaCell} \item Say that the following is the output in the form of list of WCs, that you had found from an earlier session of \mmaInlineCell{Input}{\mmaDef{CoDEx}} and had saved. Let's give it a name: \begin{mmaCell}{Input} trrt= \{ \{"qH",-\mmaFrac{\mmaUnd{\(\pmb{\eta}\)} \mmaSup{\mmaUnd{\(\pmb{\kappa}\)}}{2}}{\mmaSup{m}{4}}\}, \{"qHbox",\mmaFrac{\mmaSup{\mmaUnd{\(\pmb{\kappa}\)}}{2}}{\mmaSup{m}{4}}\},\{"qHD",-\mmaFrac{2 \mmaSup{\mmaUnd{\(\pmb{\kappa}\)}}{2}}{\mmaSup{m}{4}}\} \}; \end{mmaCell} These WCs are evaluated at the high scale. Now, to compute the WCs at the electro-weak scale(\mmaInlineCell{Input}{\mmaPat{mu}}) we need to perform their RGEs. After setting the matching scale (high scale) at the mass of the heavy particle (`\mmaInlineCell{Code}{\mmaUnd{m}}'), we have to recall the function \mmaInlineCell{Code}{RGFlow} as: \begin{mmaCell}{Input} floRes1 = \mmaDef{RGFlow}[\mmaDef{trrt},m,\mmaUnd{\(\pmb{\mu}\)}] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} \{ \{qH,-\mmaFrac{\(\eta\) \mmaSup{\(\kappa\)}{2}}{\mmaSup{m}{4}} + \mmaFrac{3 \mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{4 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}} + \mmaFrac{3 \mmaSup{gW}{4} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{32 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}} - \mmaFrac{3 \mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{4 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}} + \mmaFrac{3 \mmaSup{gW}{2} \mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{16 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}+\mmaFrac{3 \mmaSup{gY}{4} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{32 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}} + \mmaFrac{27 \mmaSup{gW}{2} \(\eta\) \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{32 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}} + \mmaFrac{9 \mmaSup{gY}{2} \(\eta\) \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{32 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}+\mmaFrac{5 \mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} \(\lambda\) Log[\mmaFrac{\(\mu\)}{m}]}{6 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{qHbox,\mmaFrac{\mmaSup{\(\kappa\)}{2}}{\mmaSup{m}{4}}-\mmaFrac{\mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{4 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}-\mmaFrac{7 \mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{24 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{qHD,-\mmaFrac{2 \mmaSup{\(\kappa\)}{2}}{\mmaSup{m}{4}}-\mmaFrac{9 \mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{16 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}} + \mmaFrac{25 \mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{48 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{qeH[1,1],\mmaFrac{19 \mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}] \mmaSup{Yu}{\(\dagger\)}[e]}{48 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}-\mmaFrac{3 \mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}] \mmaSup{Yu}{\(\dagger\)}[e]}{16 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{quH[1,1],\mmaFrac{19 \mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}] \mmaSup{Yu}{\(\dagger\)}[u]}{48 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}-\mmaFrac{3 \mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}] \mmaSup{Yu}{\(\dagger\)}[u]}{16 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{qdH[1,1],\mmaFrac{19 \mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}] \mmaSup{Yu}{\(\dagger\)}[d]}{48 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}-\mmaFrac{3 \mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}] \mmaSup{Yu}{\(\dagger\)}[d]}{16 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{q1Hl[1,1],\mmaFrac{\mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{96 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{q3Hl[1,1],\mmaFrac{\mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{96 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{qHe[1,1],\mmaFrac{\mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{48 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{q1Hq[1,1],-\mmaFrac{\mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{288 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{q3Hq[1,1],\mmaFrac{\mmaSup{gW}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{96 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{qHu[1,1],-\mmaFrac{\mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{72 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\}, \{qHd[1,1],\mmaFrac{\mmaSup{gY}{2} \mmaSup{\(\kappa\)}{2} Log[\mmaFrac{\(\mu\)}{m}]}{144 \mmaSup{m}{4} \mmaSup{\(\pi\)}{2}}\} \} \end{mmaCell} } \item One can reformat, save, and/or export all these WCs corresponding to the effective operators at the electro-weak scale (\mmaInlineCell{Input}{\mmaUnd{\(\pmb{\mu}\)}}) to \LaTeX, using \mmaInlineCell{Input}{formPick}. Below is an illustrative example: \begin{mmaCell}{Input} \mmaDef{formPick}["Warsaw","Detailed2",\mmaDef{floRes1},Frame\(\pmb{\to}\)All,FontSize\(\pmb{\to}\)\mmaDef{Medium}, FontFamily\(\pmb{\to}\)"Times New Roman"] \end{mmaCell} \begin{mmaCell}{Output} \end{mmaCell} \begin{center} {\tiny \begin{tabular}{|*{3}{c|}} \hline $Q_H$ & $\left(H^{\dagger }H^{ })^3\right.$ & $\frac{\log \left(\frac{\mu }{m}\right) \left(-\frac{\eta \kappa ^2 \left(-\frac{27 \text{gW}^2}{2}-\frac{9 \text{gY}^2}{2}\right)}{m^4}- \ldots +\frac{40 \text{gW}^2 \kappa ^2 \lambda }{3 m^4}\right)}{16 \pi ^2}-\frac{\eta \kappa ^2}{m^4}$ \\ \hline $\vdots$ & $\vdots$ & $\vdots$ \\ \hline $Q_{\text{Hd}}$ & $\left(H^{\dagger }\text{ i }\overleftrightarrow{\mathcal{D} }_{\mu } H^{ }\text{)(}\bar{d} \gamma ^{\mu }\text{ d)}\right.$ & $\frac{\text{gY}^2 \kappa ^2 \log \left(\frac{\mu }{m}\right)}{144 \pi ^2 m^4}$\\ \hline \end{tabular} } \end{center} Here we have shown a truncated version of the resulting long table\footnote{Fun-fact: This table in \LaTeX~format, and other similar results used in this draft, are all created using \texttt{formPick} as well.}. \item Remember that the RGE of WCs can only be performed in the \mmaInlineCell{Input}{"Warsaw"} basis (as it a complete one) and not in the \mmaInlineCell{Input}{"SILH"} basis. \begin{mmaCell}{Input} RGFlow[\{\{"oH",\mmaFrac{\mmaSup{\mmaUnd{\(\pmb{\kappa}\)}}{2}}{\mmaSup{m}{4}}\}\},m,\mmaUnd{\(\pmb{\mu}\)}] \end{mmaCell} {\scriptsize \begin{mmaCell}{Output} RG flow only works when the Wilson Coefficient basis is complete. For now, it only works for the `Warsaw' basis. \end{mmaCell} } \end{itemize} \subsection{Detailed example: Electro-weak $SU(2)_L$ Real Singlet Scalar}\label{sec:detailex} Here we demonstrate the work-flow of \mmaInlineCell{Code}{\mmaDef{CoDEx}} with the help of a complete analysis of a representative model. This and many others are listed in the package documentation. We also list the results of the other models in the appendix of this draft \ref{sec:app1}. Say the Lagrangian is: {\small \begin{align} \label{lbsmRSS} \mathcal{L}_{BSM} & = \mathcal{L}_{SM} \ + \ \frac{1}{2} \ (\mathcal{\partial}_{\mu} \phi )^{2} \ - \ \frac{1}{2} \ m_{\phi}^{2} \ \phi^{2} - c_{a} |H|^{2} \phi - \frac{1}{2} \kappa |H|^{2} \phi^{2} - \frac{1}{3!} \ \mu \phi^{3} - \frac{1}{4!} \ \lambda_{\phi} \phi^{4}\,. \end{align} } Here $\phi$ is the real singlet scalar. Once this field is integrated out, few effective operators will emerge. To obtain those effective dimension-6 operators and their respective Wilson Coefficients using \mmaInlineCell{Code}{\mmaDef{CoDEx}}, we need to perform the following steps: \begin{table*}[ht] \caption{Effective operators and Wilson Coefficients for Real Singlet Scalar.} \label{tab:realSing} \small \centering \renewcommand{\arraystretch}{2.5} \subfloat[``SILH'' basis]{ \begin{tabular}{|c|c|} \hline $O_6$ & $\frac{c_{a}^3 \mu }{6 m_{\phi}^6}-\frac{c_{a}^2 \kappa \lambda_{\phi} }{32 \pi ^2 m_{\phi}^4}-\frac{c_{a}^2 \kappa }{2 m_{\phi}^4}-\frac{\kappa ^3}{192 \pi ^2 m_{\phi}^2}$ \\ \hline $O_H$ & $\frac{c_{a}^2 \mu ^2}{192 \pi ^2 m_{\phi}^6}+\frac{c_{a}^2 \lambda_{\phi} }{16 \pi ^2 m_{\phi}^4}+\frac{c_{a}^2}{m_{\phi}^4}-\frac{c_{a} \kappa \mu }{96 \pi ^2 m_{\phi}^4}+\frac{\kappa ^2}{192 \pi ^2 m_{\phi}^2}$ \\ \hline \end{tabular}\label{tab:realSingS} } \subfloat[``Warsaw'' basis]{ \begin{tabular}{|c|c|} \hline $Q_H$ & $\frac{c_{a}^3 \mu }{6 m_{\phi}^6}-\frac{c_{a}^2 \kappa \lambda_{\phi} }{32 \pi ^2 m_{\phi}^4}-\frac{c_{a}^2 \kappa }{2 m_{\phi}^4}-\frac{\kappa ^3}{192 \pi ^2 m_{\phi}^2}$ \\ \hline $Q_{\text{HD}}$ & $\frac{c_{a}^2 \mu ^2}{96 \pi ^2 m_{\phi}^6}-\frac{c_{a}^2 \lambda_{\phi} }{8 \pi ^2 m_{\phi}^4}-\frac{2 c_{a}^2}{m_{\phi}^4}-\frac{c_{a} \kappa \mu }{48 \pi ^2 m_{\phi}^4}+\frac{\kappa ^2}{96 \pi ^2 m_{\phi}^2}$ \\ \hline \end{tabular}\label{tab:realSingW} } \end{table*} \begin{enumerate} \item First, load the package: \begin{mmaCell}[index=1]{Input} Needs["CoDEx`"] \end{mmaCell} \item We have to define the field $\phi$ as: \begin{mmaCell}[index=1]{Input} fieldewrss= \{ \{hf,1,1,1,0,0,m\} \}; \end{mmaCell} \begin{mmaCell}{Input} hfvecsewrss=\mmaDef{defineHeavyFields}[\mmaDef{fieldewrss]}; \end{mmaCell} \begin{mmaCell}{Input} \mmaUnd{\(\pmb{\phi}\)} = \mmaDef{hfvecsewrss}[[1,1,1]] \end{mmaCell} \begin{mmaCell}{Output} hf[1,1] \end{mmaCell} \item Then we need to build the relevant part of the Lagrangian (involving the heavy field only). As a side-note, we should mention, that for \mmaInlineCell{Input}{\mmaDef{CoDEx}} to function, it does not need the heavy field kinetic term (the covariant derivative and the mass terms). Thus, the only part of the Lagrangian we need here is: \begin{mmaCell}{Input} Lpotenewrss=Expand[-\mmaSub{c}{a}*\mmaSup{\mmaDef{abs}[\mmaDef{H}]}{2}*\mmaDef{\(\pmb{\phi}\)}-\mmaFrac{\mmaUnd{\(\pmb{\kappa}\)}}{2}*\mmaSup{\mmaDef{abs}[\mmaDef{H}]}{2}*\mmaSup{\mmaDef{\(\pmb{\phi}\)}}{2}-\mmaFrac{1}{3!} \mmaUnd{\(\pmb{\mu}\)}*\mmaSup{\mmaDef{\(\pmb{\phi}\)}}{3}-\mmaFrac{1}{4!} \mmaUnd{\(\pmb{\lambda}\)}*\mmaSup{\mmaDef{\(\pmb{\phi}\)}}{4}]; \end{mmaCell} \item Next, we need to construct the symmetry generators: \begin{mmaCell}{Input} \mmaDef{initializeLoop}["ewrss",\mmaDef{fieldewrss},printInfo\(\pmb{\to}\)False] \end{mmaCell} {\small \begin{mmaCell}[label={\mmaShd{>>}}]{Output} Isospin Symmetry Generators for the field `hf' are isoewrss[1,a] = 0 \end{mmaCell} \begin{mmaCell}[label={\mmaShd{>>}}]{Output} Color Symmetry Generators for the field `hf' are colewrss[1,a] = 0 \end{mmaCell} } (See the documentation of \mmaInlineCell{Input}{initializeLoop} for details.) \item The last step is the computation of effective operators and associated WCs as: \begin{mmaCell}{Input} res1=\mmaDef{codexOutput}[\mmaDef{Lpotenewrss},\mmaDef{fieldewrss},model\(\pmb{\to}\)"ewrss"]; \mmaDef{formPick}["Warsaw","Detailed2",\mmaDef{res1},FontSize\(\pmb{\to}\)\mmaDef{Medium}, FontFamily\(\pmb{\to}\)"Times New Roman",Frame\(\pmb{\to}\)All] \end{mmaCell} \item The output is obtained in \mmaInlineCell{Code}{"Warsaw"} basis and is formatted as a detailed table in \mmaInlineCell{Code}{TraditionalForm}. There is provision to export the result in \LaTeX~ format. Table \ref{tab:realSingW} is actually obtained from the output of the code above. We can compute the same in \mmaInlineCell{Code}{"SILH"} basis as well and for that we have to use: \begin{mmaCell}{Input} res2=\mmaDef{codexOutput}[\mmaDef{Lpotenewrss},\mmaDef{fieldewrss},model\(\pmb{\to}\)"ewrss",operBasis\(\pmb{\to}\)"SILH"]; \mmaDef{formPick}["SILH","Detailed2",\mmaDef{res2},FontSize\(\pmb{\to}\)\mmaDef{Medium}, FontFamily\(\pmb{\to}\)"Times New Roman",Frame\(\pmb{\to}\)All] \end{mmaCell} Output of this can be found in table \ref{tab:realSingS}. \item As is demonstrated in section \ref{sec:rgflow}, these resulting WCs can then be runned down to the electro-weak scale, using \mmaInlineCell{Code}{RGFlow}. \end{enumerate} \subsection{Miscellaneous} \mmaInlineCell{Code}{\mmaDef{CoDEx}} is written in {\em Wolfram Language$^\text{\tiny \textregistered}$} \cite{Mathematica}. Careful steps has been taken to speed-up the code using parallelization over multi-cores, when available, while keeping the customizability for the user. All the example models listed in this draft and in the documentation have been run on different processors, with different operating systems and versions of Mathematic . When run on a 1.6 GHz Intel$^\text{\tiny \textregistered}$ Core i5 processor the models take $\sim$ 20 to 2000 seconds to run. Tree level runs never take more than a minute. The only exception is 2HDM, which we have run in a 16 core Xeon processor, with 32 GB RAM. How much time it takes to get the WCs for the user's model, depends on its structure and complexity. We hope a user can have a clear idea about run time if she runs all the examples given in documentation as trials. \section{Summary} \mmaInlineCell{Input}{\mmaDef{CoDEx}} allows one to integrate out single and(or) multiple degenerate heavy field(s) in a gauge covariant way. The user needs to provide the part of the Lagrangian that involves heavy BSM fields only. She needs to identify that BSM field by providing its no. of component fields, spin, mass and quantum numbers under Standard Model gauge symmetry in a certain way. \mmaInlineCell{Code}{\mmaDef{CoDEx}} then integrates out the heavy field propagators from all tree level and(or) 1-loop processes, and generates the Wilson Coefficients for an exhaustive set of effective operators in both \mmaInlineCell{Code}{"SILH"} and \mmaInlineCell{Code}{"Warsaw"} bases. It allows the user to run down the operators in \mmaInlineCell{Code}{"Warsaw"} basis to the electro-weak scale. As the precision observables can be recast in terms of the effective operators, it will be really helpful to test the BSM physics under the light of electro-weak precision data. A list of example models are provided along with the package. These include a variety of field representations usually used by the BSM model builders. In the present version of \mmaInlineCell{Code}{\mmaDef{CoDEx}}, the user can compute up to mass dimension-6 operators by integrating out up to spin-1 particles. This package can integrate out only heavy field propagators at the tree and 1-loop levels. In a future version, we will include a few other aspects, such that it can deal with (i) loops containing light (SM) - heavy (BSM) mixed field propagators, (ii) non-degenerate multiple heavy BSM fields \cite{our-future-paper}. \section{Acknowledgements} The authors acknowledge the useful discussions with Soumitra Nandi. This work is supported by the Department of Science and Technology, Government of India, under the Grant IFA12/PH/34 (INSPIRE Faculty Award); the Science and Engineering Research Board, Government of India, under the agreement SERB/PHY/2016348 (Early Career Research Award), and Initiation Research Grant, agreement no. IITK/PHY/2015077, by IIT Kanpur. \section*{References}
\section{Introduction} \subsection{MDPs and risk sensitivity} In the classical theory of Markov Decision Processes (MDPs), one deals with controlled Markovian stochastic processes $(X_n)$ taking values on a Borel space $\mathcal{X}$. These processes are controlled via a series of actions $(A_n)$, according to a policy $\pi$, that changes the underlying state transition probabilities $\mathrm{P}(X_{n+1}|X_n,A_n)$ of $(X_n)$. The goal is to find a policy $\pi$ that optimizes the expected value $$\Iw_{N}(x_0,\pi) = \mathbb{E}_{x_{0}}^{\pi}\left[\sum_{n=0}^{N-1}\beta^{n}C(X_{n},A_{n},X_{n+1})\right],$$ where $\beta\in(0,1]$ is called \textit{discount factor}, and $N\in\mathbb{N}\cup\{\infty\}.$ The inclusion of risk-sensitivity and partial observability are natural extensions to this standard model with applications in various fields such as finance or engineering. In \textit{risk-sensitive modeling}, the aim remains to optimize the expected value, while avoiding (seeking) events that, although possibly rare, can lead to outcomes with outstandingly large negative (positive) impact. To our best knowledge, there are three major approaches to introduce risk sensitivity in MDPs: These are, first, the classical theory of expected utility \citep{jaquette1973, bauerle2014}, where one tries to optimize \begin{equation}\label{firsteq}\Iw_{N}(x_0,\pi) = \mathbb{E}_{x_0}^{\pi}\left[U\left[\sum_{n=0}^{N-1}\beta^{n}C(X_{n},A_{n},X_{n+1})\right]\right],\end{equation} for some increasing and continuous function $U:\mathbb{R}\to\mathbb{R}$, second, mean-variance models introduced by \citet{markowitz1952} \citep[see also][]{white1988, filar1989} for portfolio selection, where one tries to optimize \begin{equation*} \Iw_{N}(x_0,\pi) = \mathbb{E}_{x_{0}}^{\pi}\left[\sum_{n=0}^{N-1}\beta^{n}C(X_{n},A_{n},X_{n+1})\right]+ \lambda Var_{x_{0}}^{\pi}\left[\sum_{n=0}^{N-1}\beta^{n}C(X_{n},A_{n},X_{n+1})\right],\end{equation*} and, third, the recent theory of risk measures introduced by \citet{ruszczynski2010} and generalized in by \citet{lin2013} and \citet{shen2013}. Note that the exponential utility function $U = \exp$ generates a performance index that belongs to several models of risk at the same time, and it has been extensively studied in many different settings \citep{borkar2002, cavazos2010, chung1987, dimasi2007, dupuis2018, fleming1997, hernandez1996a, howard1972, levitt2001}. Recently, \citet{bauerle2014} treated problems with optimality criteria of form \eqref{firsteq}. They do so by introducing extra variables that keep track of the accumulated wealth and total discount (when $\beta<1$). They introduce an operator on a suitable subset of the space of lower semi-continuous functions on $\mathcal{X}\times\mathbb{R},$ ($\mathcal{X}\times\mathbb{R}^{2}$ when $\beta<1$), which they use in an iterative manner to retrieve the value function for the original problem, as well as optimal controls. Even more, they prove that optimal policies have to take into account only the current state, accumulated wealth and accumulated discount, but not any further information of the state-action history. They also prove that under a convexity or concavity assumption for the utility function, the finite time discounted problem converges to the infinite time one. \subsection{Partial observability} In classical MDPs, one makes the assumption that the controlled process $(S_n)$ takes values on a set of states $\mathcal{S}$ which is always accessible to the controller. However, in several real-life applications, the real state is not directly observable, but a secondary information, dependent on the state, can be observed. Partially Observable Markov Decision Processes (POMDPs) are a generalization of MDPs towards incomplete information about the current state. POMDPs extend the notion of MDPs by a set of observations $\mathcal{Y}$ and a set of conditional observation probabilities $Q(\cdot|s)$ given the ``hidden'' state $s \in \S$. Risk-sensitivity has been extensively studied in the full information scenario, while partial observability has so-far been mostly considered in the risk-neutral framework, both theoretically \citep{sawaragi1970, feinberg2016, smallwood1973, sondik1978} and numerically \citep{shani2013, kaelbling1998}. To our best knowledge, there is only partial progress \citep{marecki2010, bauerle2017b,bauerle2017a, fan2018, fernandez1997,baras1997,hernandez1999,cavazos2005} when it comes to combining risk-sensitivity and partial observability, and most articles study the specific case of the exponential utility function. \subsection{Combining partial observability and risk sensitivity} In risk-neutral POMDPs, one can introduce a new state space, called \emph{belief (state) space} $\mathcal{X}=\mathcal{P}(\mathcal{S})$, the set of probability measures on $\S$, and a stochastic process $(X_{n})$ taking values in $\mathcal{X}$, such that $X_{n}(s)$ is the expected probability of $S_{n}$ being equal to the ``hidden'' state $s \in \mathcal{S}$ at time $n$, conditioned on the accumulated observations and actions up to time $n.$ One can treat this new process on the belief space like a Completely Observable Markov Decision Process (COMDP) on $\X$ with classical tools, retrieve optimal or $\eps$-optimal polices (i.e. policies with expected value at most $\eps$-far from the optimal value), and then apply them to the original problem. It is remarkable that, due to the linearity of the expectation operator, the belief state is a so-called \emph{sufficient statistic}. Broadly speaking, a sufficient statistic carries adequate information for the controller to make an optimal choice at a specific point in time. It also allows to separate the present cost from the future cost through a Bellman-style equation. For an introduction to sufficient statistics, we refer to \citet{hinderer1970}. When risk is involved, extra or alternative information is necessary to make an optimal decision. In the case of expected utilities, additional information on the accumulated cost is necessary to make an optimal choice, even if the true state is known to the controller \citep{bauerle2014, marecki2010}. When risk is modeled by risk measures, the current state is a sufficient statistic in the fully observable case \citep{ruszczynski2010, lin2013, shen2013}, but the belief state still does not appear to be a sufficient statistic in the partially observable setting. A common workaround to this problem is to assume that the controller is aware of the running cost through some mechanism. For example, the controller observes either the running cost directly \citep{marecki2010}, or a part of the whole process that is responsible for the cost \citep{bauerle2017b}. \citet{fan2018} study cost functions that depend on both observable quantities and beliefs. In \citet{bauerle2017a}, a general approach for treating problems with risk measured by a utility function is introduced. It is shown there, that one can use probability measures on the product space $X\times\R$ as state space. This way, the authors end up with an MDP on the state space $\mathcal{P}(X\times\R).$ As we will explain in the sequel, we take a different route that, although not as general, is computational less demanding in several cases. \subsection{Contributions} \subsubsection{Multivariate utility functions} As a first contribution, we extend the results by \citet{bauerle2014} in the following directions: First, we introduce multivariate utility functions $\mathcal{U}:\mathbb{R}^{d}\rightarrow\mathbb{R},$ componentwise increasing, where each variable will correspond to a different running cost, giving rise to the following optimality metric \begin{equation}\label{multicrit} \Iw_{N}(x,\pi):=\E_{x}^{\pi}\left[\Uw\left(\sum_{n=0}^{N-1}\boldsymbol{\beta}^{n}\cdot\C(X_{n},A_{n},X_{n+1})\right)\right]. \end{equation} The dot product denotes the point-wise multiplication. Criteria like \eqref{multicrit} can arise when one is trying to solve a multi-objective task, with different running costs, each of the costs contributing in a different manner to a total cost. As an example, one can think of a policy maker allocating tax money to different public sectors (education, infrastructure, health, etc). For each of them, we get a different cost which can be the position in the global chart or any other comparison metric. However, the total utility, depends on how much each government prioritizes each of these aspects, something that is encoded in the choice of the utility function. In a similar manner to \citet{bauerle2014}, we augment the space to keep track of each accumulated cost term. Furthermore, we provide the example of a two-armed bandit cost problem, that is covered by our approach and can be solved analytically. Finally, we prove that the finite time discounted problem converges to the infinite time one, without the extra assumption demanding that the utility function is either convex or concave, appearing in \citet{bauerle2014}. \subsubsection{A broader class of utility functions} RSPOMDPs with exponential utility can be treated with methods similar to risk-neutral POMDPs \citep{fernandez1997,baras1997,hernandez1999,cavazos2005}. One can find both the value function and optimal strategies by introducing a new state space called the information (state) space, and solve an equivalent problem with complete observation in that space. Specifically, in \citet{cavazos2005}, a variation of the information space is used that allows to replace the original RSPOMDP by a Risk Sensitive Completely Observable Markov Decision Process (RSCOMDP) with exponential cost structure, where the running cost also depends on the next state. Our second contribution is to show that it is actually possible to apply similar arguments to treat utility functions that are sums of exponentials, i.e. utility functions of the form \begin{equation}\label{sumexp} \widehat{U}(t)=\sum_{i=1}^{i_{\max}}w^{i}\sign(\lambda^{i})e^{\lambda^{i}t}.\end{equation} With slight abuse of notation, we observe that for a probability distribution $\theta_{0}$ on $\mathcal{S},$ we can write \begin{equation*} \widehat{\Iw}_{N}(\theta_{0},\widehat{\pi})=\widehat{\mathbb{E}}_{\theta_{0}}^{\widehat{\pi}}\left[\sum_{i=1}^{i_{\max}}w^{i}\sign(\lambda^{i})e^{\lambda^{i}\left(\sum_{n=0}^{N-1}\widehat{C}(S_{n},A_{n})\right)}\right]=\sum_{i=1}^{i_{\max}}\widehat{\mathbb{E}}_{\theta_{0}}^{\widehat{\pi}}\left[w^{i}\sign(\lambda^{i})e^{\lambda^{i}\left(\sum_{n=0}^{N-1}\widehat{C}(S_{n},A_{n})\right)}\right]. \end{equation*} Then, similar to \citet{cavazos2005}, by applying a change of measure argument, we identify a new state space $\mathcal{X}=\mathcal{P}(\mathcal{S})^{i_{\max}}\times \mathcal{Y},$ a controlled transition matrix $P(x'|x,a),$ and a collection of running costs $C^{i}:\mathcal{X}\times\mathcal{A}\times\mathcal{X}\to\mathbb{R},$ that depend on the next stage as well, such that for the resulting completely observable controlled processes $(X_{n})$, we have with $x_{0}=(\theta_{0},\dots,\theta_{0},y_{0})$ and a fixed but arbitrary $y_{0}\in \mathcal{Y}$, \begin{equation}\label{aha} \widehat{\Iw}_{N}(\theta_{0},\widehat{\pi})=\Iw_{N}(x_{0},\pi)=\mathbb{E}_{x_{0}}^{\pi}\left[\sum_{i=1}^{i_{\max}}w^{i}\sign(\lambda^{i})e^{\lambda^{i}\left(\sum_{n=0}^{N-1}C^{i}(X_{n},A_{n},X_{n+1})\right)}\right]. \end{equation} Note that $(\pi, \mathbb{E})$ and $(\widehat{\pi},\widehat{\mathbb{E}})$ are connected in a straightforward manner, see Section \ref{sct:rspomdp}. Now, one can observe that $(\ref{aha})$ falls in the class of problems mentioned in the previous section by taking \begin{equation}\mathcal{U}(t_{1},\dots,t_{i_{max}})=\sum_{i=1}^{i_{\max}}w^{i}\sign(\lambda^{i})e^{\lambda^{i}t_{i}}.\end{equation} \begin{remark} For two utility functions that are $\eps$-close on the interval $$[N\min_{s,u}\widehat{C}(s,u), N\max_{s,u}\widehat{C}(s,u)],$$ it is easy to observe that an $\eps$-optimal policy for one utility function is a $2\eps$-optimal policy for the other. Therefore, one can apply the method to solve RSPOMDPs with utility functions that can be \textit{approximated} by functions of the form \eqref{sumexp}. One can easily show that this involves all real functions that are bilateral Laplace transformations of $\sign(s)\mu(ds)$ for finite positive measures $\mu$ with compact support, i.e. functions of the form $$U(t)=\int_{-\infty}^{\infty}\sign(s)e^{st}\mu(ds).$$ \end{remark} \subsubsection{Comparing our method with \citet{bauerle2017a}} The method we introduce works only for a class of finite time, state, and noise problems, contrasting \citet{bauerle2017a}. However the resulting state space is $\mathcal{P}(\mathcal{X})^{i_{\max}}\times\mathcal{Y}\subset \mathbb{R}^{|\mathcal{X}|\times i_{\max}}\times\mathcal{Y}$, where $i_{\max}$ is the number of exponential functions that make up the utility function, see \eqref{sumexp}. In \citet{bauerle2017a}, the resulting state space is $\mathcal{P}(\mathcal{X}\times\mathbb{R})$ which is an infinite dimensional space, and even in cases where the wealth space is discretized appropriately, one ends up with a dimension of $|\mathcal{X}|\cdot$(partition size). Our method therefore has a clear computational advantage when $i_{\max}$ is small. \section{Multivariate Utility Functions} In this section, we describe a model for risk sensitive multi-objective sequential decision making \citep{bauerle2014, hernandez1996b, puterman2005} on a Borel state and action space with multiple cost and utility functions. The performance index is the expected multivariate utility, where each variable corresponds to a different running cost. As a generalization to the classical MDP model, we allow for the cost to depend on the subsequent state in addition to the current state-action pair. We thereby follow \citet{bauerle2014} and \citet{hernandez1996b}. \subsection{Notation and Assumptions} \label{scn:model} Throughout this section, we assume that an $N$-step Markov Decision Process is given by a Borel state space $\X$, a Borel action space $\A$, a Borel set $\D \sse \X \times \A$, and a regular conditional distribution $\mathrm{P}$ from $\X \times \D$ to $\X$. Given the current state $x \in \X$, we assume that an action $a \in D(x)$ may be chosen, where $D(x) := \{ a \in \A \mid (x,a) \in \D \}$ is the set of feasible actions. The transition probability to the next state is then given by the distribution $\mathrm{P}(\cdot | x ; a)$, according to the chosen action. The set of histories from up to time $n$ is defined by \begin{equation*} \H_{0} := \X, \hspace{32pt} \H_{n} := \H_{n-1} \times \A \times \X, \quad n\in\mathbb{N} \end{equation*} and $h_{n} = (x_{0},a_{0},\dots,x_{n}) \in \H_{n}$ is a historical outcome up to time $n.$ \begin{definition} The set of (history-dependent) policies is defined by $$\PiH:= \left\{ \pi = (f_{0},f_{1},\dots) \middlemid f_{n} : \H_{n} \to \D,\quad \forall h_{n} \in \H_{n} : f_{n}(h_{n}) \in D(x_n),\quad n\in\mathbb{N} \right\}.$$ Similarly, the set of Markovian policies is defined by $$\PiX := \left\{ \pi = (g_{0},g_{1},\dots) \middlemid g_{n} : \X \to \D, \quad\forall x \in \X : g_{n}(x) \in D(x),\quad n\in\mathbb{N} \right\}.$$ \end{definition} Given an initial state $x \in \X$ and a history-dependent policy $\pi = (f_1, f_2, \dots) \in \PiCh$, due to the Ionescu-Tulcea theorem, there exists a probability measure $\P_{x}^\pi$ on $\H_{\infty}$ and two stochastic processes $(X_n)_{n}$, $(A_n)_{n}$ such that $$\P_{x}^\pi(X_{0} \in B) = \delta_x(B),\ \P_{x}^\pi(X_{n+1} \in B \mid H_n, A_n) = \mathrm P(X_{n+1} \in B \mid X_n, A_n)$$ and $$A_n = f_n(H_n)$$ for all Borel sets $B \sse \X$. Canonically, $H_n$, $X_n$, $A_n$ are the history, state and action at time $n$. By $\E_x^\pi$ we denote the expectation operator corresponding to $\P_x^\pi.$ For more details of this construction, we refer to \citet{bauerle2014} and \citet{hernandez1996b}. Throughout the whole section, we have the following standing assumptions: \begin{assumption}\label{assumption} ~ \begin{enumerate} \item The utility function $\Uw: [0,\infty)^{i_{\max}} \to \R$ is continuous and component-wise increasing. \item The sets $\mathcal{D}(x), x \in \X$ are compact. \item The map $x \mapsto \D(x)$ is upper semi-continuous, i.e. if $x_n \to x \in X$ and $a_n \in D(x_n)$, then $(a_n)$ has an accumulation point in $D(x)$. \item The maps $(x,a,x') \mapsto C^{i}(x,a,x'),\ i=1,\dots,\imax,$ are lower semi-continuous, and it holds $\underline{c} \leq C^i(\cdot, \cdot, \cdot) \leq \bar c$ for some fixed $\underline c, \bar c > 0$. \item $\mathrm{P}$ is weakly continuous. \end{enumerate} \end{assumption} For notational convenience, we define the vector valued function $\C: \X \times \A \times \X \to \R^\imax$ by \begin{equation*} \C(x,a,x') := \left(C^1(x,a,x'), \dots, C^\imax(x,a,x')\right).\end{equation*} \subsection{Finite Horizon Problems} \subsubsection{Performance Index} After we have set the stage for Markov Decision Processes and their policies, we can now define a performance index that is the expected utility of several running costs. \begin{definition} Denote by $N$ the number of steps of the MDP. We define the \emph{total cost} $\Iw_N(x,\pi)$ given an initial state $x \in \mathcal{X},$ and a history dependent policy $\pi \in \PiCh$ by $$\Iw_{N}(x,\pi):=\E_{x}^{\pi}\left[\Uw\left(\sum_{n=0}^{N-1}\C(X_{n},A_{n},X_{n+1})\right)\right],$$ and the corresponding value function by \begin{equation} \label{PTotal} \tag{$P$} \Vw_{N}(x) := \inf_{\pi\in\PiH}\Iw_{N}(x,\pi). \end{equation} \end{definition} \subsubsection{Augmented problem} The aim of what follows is to determine $\mathcal{V}_N,$ and optimal policies in \eqref{PTotal}. To this end, we augment the state space of the MDP to $\X \times \R^\imax$. The second component models the so-far accumulated cost of the advancing MDP. In particular, $\widetilde{X}_n:=(X_{n},\D_{n}) \in \X \times \R^\imax$ taking the value $(x, \d) = (x, d^1, \dots, d^\imax)$ implies that the MDP has advanced to state $x$ and accumulated a cost amounting to $d^i$ in the $i$-th objective after the first $n$ steps. In order to define transition probabilities of the augmented problem, we introduce the notion of a pushforward measure. \begin{definition} \label{push} Given measurable spaces $(\mathcal{S},\mathcal{F})$, $(\widetilde{\mathcal{S}},\widetilde{\mathcal{F}})$, a measurable mapping $\mathcal{T}:\mathcal{S}\rightarrow\widetilde{\mathcal{S}}$ and a measure $\mu:\mathcal{F}\rightarrow\lbrack0,\infty]$, the pushforward of $\mu$ is the measure induced on $(\widetilde{\mathcal{S}},\widetilde{\mathcal{F}})$ by $\mu$ under $\mathcal{T}$, i.e., the measure $\mathcal{T}_{\#}\mu:\widetilde{\mathcal{F}}\rightarrow \lbrack0,\infty]$ is given b \[ (\mathcal{T}_{\#}\mu)(B)=\mu\left( \mathcal{T}^{-1}(B)\right) \mbox{ for }B\in\widetilde {\mathcal{F}}. \] \end{definition} In particular, if a function $f$ is $\wt{\mathcal{F}}$-measurable and $\mathcal{T}_\# \mu$-integrable, and $f \circ \mathcal{T}$ is $\mu$-integrable, then $$\int f\ d\mathcal{T}_\# \mu = \int f \circ \mathcal{T}\ d\mu.$$ Now, we define the transition kernel $\widetilde P$ of the augmented problem by \begin{equation} \widetilde{\mathrm{P}}(\cdot|\widetilde{x};a) =\widetilde{\mathrm{P}}(\cdot|(x,\d);a) =(\mathcal{T}_{(x,\d)})_{\#}\mathrm{P}(\cdot|x,a), \end{equation} where \begin{equation} \mathcal{T}_{(x,\d)}(x')=(x',\mathbf{C}(x,a,x')+\d). \end{equation} If $\mathcal{X}$ is finite, this leads to \begin{equation} \widetilde{\mathrm{P}}(\widetilde{x}'|\widetilde{x};a)= \begin{cases} \mathrm{P}(x'|x;a), & \text{if } \widetilde{x}=(x,\d), \widetilde{x}' = (x',\d+\C(x,a,x')), \\ 0, & \text{otherwise}. \end{cases} \end{equation} The histories for the augmented MDP are given by \begin{equation*} \widetilde{\mathcal{H}}_{0} := \X \times \R^\imax, \hspace{16pt} \widetilde{\mathcal{H}}_{n} := \widetilde{\mathcal{H}}_{n-1} \times \D \times \left( \X \times \R^\imax \right), \quad n\in\mathbb{N}. \end{equation*} The definition of history-dependent policies $\widetilde \pi \in \wPiH$, Markovian policies $\widetilde \pi \in \wPiX$, and the corresponding decision rules are changed accordingly. Similar to the previous section, there exist a probability measure $\wt \P_{x}^\pi$ on $\wt \H_{\infty}$ and a coupled stochastic process $(\wt X)_{n\in\N}$ with $\wt X_n= (X_n, D_n)$, and a stochastic process $(A_n)_{n \in \N}$, such that $$ \wt \P_{\wt x}^{\wt \pi} (\wt X_{0} \in B) = \delta_{\wt x}(B), \quad \wt \P_{\wt x}^{\wt \pi} (\wt X_{n+1} \in B \mid \wt H_n, A_n) = \widetilde{\mathrm{P}}(\wt X_{n+1} \in B \mid \wt X_n, A_n)$$ and $$A_n = \wt f_n(\wt H_n)$$ for all Borel sets $B \sse \X$, and $H_n$, $X_n$, $A_n$ are the history, state and action at time $n$, given an initial state $\wt x \in \X \times \R^\imax$ and a history-dependent policy $\wt \pi \in \wPiH$, By induction, it is easy to prove that $D_{n}=\sum_{k=0}^{n-1}\C(X_{k},A_{k},X_{k+1})+\d,$ $\widetilde{\mathbb{P}}^{\mathcal{\widetilde{\pi}}}_{\widetilde{x}}$-almost surely. \begin{definition} Denote by $N\in\mathbb{N}$ the number of steps of the MDP. For $n=1,\dots,N$, we define the \emph{total cost} $\wt \Iw_n((x,\d), \widetilde\pi)$ for the augmented problem, given the initial state $x\in \X$, initial cost $\d \in \R^\imax$, and policy $\widetilde\pi \in \widetilde{\Pi}$ by \begin{equation}\label{ara} \widetilde{\Iw}_n(\widetilde{x},\widetilde{\pi})=\widetilde{\Iw}_n((x,\boldsymbol{d}),\widetilde{\pi}):= \widetilde{\E}^{\widetilde{\pi}}_{\widetilde{x}} \left[ \Uw \left( \sum_{k=0}^{n-1}\C(X_{k},A_{k},X_{k+1})+\d \right) \right]=\widetilde{\E}_{\widetilde{x}}^{\widetilde{\pi}} \left[ \Uw \left(D_n) \right) \right], \end{equation} and the corresponding value function by \begin{equation} \label{PCostToGo} \tag{$\widetilde P$} \widetilde{\mathcal{V}}_{N}(\widetilde{x}) := \inf_{\widetilde{\pi}\in\wPiH} \widetilde{\Iw}_{N}(\widetilde{x},\widetilde{\pi}). \end{equation} \end{definition} \begin{remark} When $\mathcal{U}$ is a univariate function, equation (\ref{ara}) is similar to a result presented by \citet{bauerle2014}. Using the last equality in (\ref{ara}), the augmented problem can also be seen as standard MDP with only terminal cost. This implies that for many problems, optimal policies exist and they are Markovian \citep[Section 6 and Theorem 6.5]{hinderer1970}. It also ensures that numerical methods for calculating the value function of standard MDPs are applicable, in addition to the value iteration method demonstrated by \citet{bauerle2014}. By writing $\widetilde{\E}_{\wt x}^{\widetilde{\pi}} \left[\Uw \left(\DD_{n}\right)\right]$ in a telescopic fashion, i.e. $$\widetilde{\E}_{\wt x}^{\widetilde{\pi}} \left[\sum_{i=1}^{n}\left(\Uw \left(\DD_{i}\right)-\Uw \left(\DD_{i-1}\right)\right)\right] =\widetilde{\E}_{\wt x}^{\widetilde{\pi}} \left[\sum_{i=1}^{n}\left(\Uw \left(\DD_{i-1}+\C(X_{i-1},A_{i-1},X_{i})\right)-\Uw \left(\DD_{i-1}\right)\right)\right],$$ an equivalent problem with intermediate rewards is constructed, that is more suitable for online methods such as TD-$\lambda$ \citep{bertsekas2012}. We are not going to explore this approach here further, but to follow the approach due to \citet{bauerle2014} which is based on properties of the minimal cost operators. \end{remark} \subsubsection{Policy bijection} \label{assasin} For the sequel, let $ x\in\mathcal{X},$ and $\widetilde{x}=(x,\mathbf{0}).$ Note that policies $\pi = (f_{0},f_{1},\dots)\in\PiCh$ of the original problem consist of functions $f_{n}$ that are defined on $\mathcal{H}_{n}$, and policies $\widetilde \pi \in \wPiH$ consist of functions $\widetilde{f}_{n}$ defined on $\widetilde{\mathcal{H}}_{n}.$ Therefore there is no simple bijectional correspondence between the two sets. However, the set of histories \begin{equation} \widetilde{\mathcal{H}}^{-}_{n}=\{\widetilde{h}_{n}\in\widetilde{\mathcal{H}}_{n}|\left( \exists k\in\{1,\dots,n-1\} : \d_{k}\neq \d_{k-1}+\C(x_{k},a_{k},x_{k+1})\right) \vee (\d_{0}\neq\mathbf{0})\},\end{equation} is not accessible in the sense that these histories cannot occur. In a more rigorous manner, we have that $\widetilde{\mathbb{P}}^{\widetilde{\pi}}_{\tilde{x}}(\widetilde{\mathcal{H}}^{-}_{n})=0,$ for all $\widetilde{\pi}\in\wPiH.$ For every policy $\widetilde{\pi}\in \wPiH,$ we may define a new ``reduced'' policy $\widetilde{\pi}^{\red}$ by \begin{equation} \widetilde{f}^{\red}_{n}(\widetilde{h}_{n})=\begin{cases} a^{\red}(x_{n}), & \text{if } \widetilde{h}_{n}\in\widetilde{\mathcal{H}}^{-}_{n},\\ \widetilde{f}_{n}(\widetilde{h}_{n}), & \text{otherwise}, \end{cases} \end{equation} where $a^{\red}$ can be any arbitrary but fixed point in $\D(x_{n}).$ Then for the set $\wPiH^{\red}=\{\widetilde{\pi}^{\red}\in\wPiH:\widetilde{\pi}\in\wPiH\},$ we can define a bijection to $\PiH.$ To do so, for $\pi = (f_{0},f_{1},\dots)\in\PiCh,$ we define $\widetilde{\pi}^{\red}=( \widetilde{f}^{\red}_{0},\widetilde{f}^{\red}_{1},\dots)\in \wPiH^{\red},$ by \begin{equation}\label{polpol} \begin{split} \widetilde{f}^{\red}_{n}\left(\left(x_0,0\right),a_{0},\dots,\left(x_{n-1},\sum_{i=0}^{n-1}\mathbf{C}(x_{i},a_{i},x_{i+1})\right),a_{n-1},\left(x_{n},\sum_{i=0}^{n}\mathbf{C}(x_{i},a_{i},x_{i+1})\right)\right)=\\ \begin{cases} a^{\red}, & \text{if } \widetilde{h}_{n}\in\widetilde{\mathcal{H}}^{-}_{n}, \\ f_{n}(x_{0},a_{0},\dots,x_{n-1},a_{n-1},x_{n}), & \text{otherwise}. \end{cases} \end{split} \end{equation} It is easy to see that the value function of (\ref{PTotal}) coincides with the value function of (\ref{PCostToGo}) with $\d=\mathbf{0}$, i.e. $$\mathcal{V}_N(x) =\inf_{\pi\in\PiH}\Iw_{N}(x,\pi)= \inf_{\widetilde{\pi}\in\wPiH^{\red}} \widetilde{\Iw}_{N}((x,\mathbf{0}),\widetilde{\pi})= \inf_{\widetilde{\pi}\in\wPiH} \widetilde{\Iw}_{N}((x,\mathbf{0}),\widetilde{\pi})=\widetilde{\mathcal{V}}_{N}((x, \mathbf{0})).$$ The next step is to derive a Bellman-style equation for the augmented problem (\ref{PCostToGo}). It can be shown that the minimizer of (\ref{PCostToGo}) is a Markovian policy. \subsubsection{Bellman operator and first theorem} First, we define the set \begin{align*} \Delta := \big\{ v : \X \times (\R^+)^\imax \to \R ~\big\vert~ & \text{$v$ is lower semi-continuous,} \\ & \text{$v(x,\cdot)$ is continuous, and componentwise increasing for all $x \in \X$}, \\ & \text{$v(x,\d) \geq \Uw(\d)$ for all $(x,\d) \in \X \times (\R^+)^\imax$} \big\}. \end{align*} For $v \in \Delta$ and a Markovian decision rule $\widetilde g \in \wPiX$, we define the operators \begin{equation*} \begin{split} T_{\g}[v](\widetilde{x}) &= T_{\g}[v](x,\boldsymbol{d}) = \int v\left(\widetilde{x}'\right)\widetilde{\mathrm{P}}\left(d\widetilde{x}' \mid \widetilde{x},\g(\widetilde{x})\right) = \int v\left((x',d')\right)(\mathcal{T}_{(x,\d)})_{\#}\mathrm{P}\left(dx' \mid x,\g(x,d)\right) \\ & =\int v\left(x',\C(x,\g(x,\boldsymbol{d}),x')+\boldsymbol{d}\right)\mathrm{P}(dx' \mid x,\g(x,\boldsymbol{d})), \end{split} \end{equation*} and \begin{equation*} T[v](x,\boldsymbol{d})=\inf_{a\in D (x)}\int v(x',\C(x,a,x')+\boldsymbol{d})P(dx' \mid x,a), \end{equation*} whenever the integrals exist. $T$ is called the \emph{minimal cost operator}. We say that a Markovian decision rule $\widetilde g$ is a \emph{minimizer} of $T[v]$ if $T_{\widetilde g}[v] = T[v]$. In this situation, $\widetilde g(x,\d)$ is a minimizer of $$\D(x) \ni a \mapsto \int v\left(x',\C(x,a,x')+\boldsymbol{d}\right)P(dx' \mid x,a)$$ for every $(x,\d) \in \X \times \R^\imax$. We may now state the main result of this section: \begin{theorem} \label{thm:SumsOfCostThm} Let $\wt\Vw_{0}(x,\d) := \Uw (\d)$. Then, the following holds: \begin{enumerate}[label=\alph*)] \item For any Markovian policy $\widetilde \pi=(\g_0, \g_1, \dots) \in \wPiX$, we have the cost iteration \begin{equation*} \wt \Iw_{n}((x,\d),\widetilde{\pi}) = T_{\wt g_0}[\dots [T_{\wt g_{n-1}}[\wt\Vw_{0}]]\dots](x,\d) \end{equation*} for all $n=1,\dots,N.$ \item The optimal policy is Markovian, i.e. $$\inf_{\widetilde\pi \in \wPiH} \Iw_{N}(\widetilde{x},\widetilde\pi) = \inf_{\widetilde\pi \in \wPiX} \Iw_{N}(\widetilde{x},\widetilde\pi).$$ \item The operator $T: \Delta \to \Delta$ is well-defined, and for every $v \in \Delta$, there exists a minimizer of $T[v]$. \item We get the Bellman-style equation $$\wt\Vw_{n}(x,\d)= T[\wt\Vw_{n-1}](x,\d) = \inf_{a\in D(x)} \int \wt\Vw_{n-1}(x',\C(x,a,x')+\d)P(dx' \mid x,a)$$ for all $n=1,\dots,N$. \item If $\widetilde g^*_{n}$ is a minimizer of $\wt \Vw_{n-1}$ for $n=1,\dots,N$, then the history-dependent policy $\pi^* = (f^*_0,\dots, f^*_{N-1})$, defined by $$f_n^*(h_{n}):= \begin{dcases} \widetilde g^*_{N}(x_0, 0) & \text{if } n=0, \\ \widetilde g^*_{N-n} \left(x_n,\sum_{k=0}^{n-1} \C(x_k,a_k,x_{k+1})\right) & \text{otherwise}, \end{dcases} $$ is an optimal policy for problem (\ref{PTotal}). \end{enumerate} \end{theorem} For the proof of Theorem \ref{thm:SumsOfCostThm}, we need the following lemma: \begin{lemma} \label{thm:minexists} Let $v:\X \times (\R^+)^\imax \to \R$ be bounded and lower semi-continuous. Suppose \begin{enumerate} \item $D(x)$ is compact, \item $x \mapsto D(x)$ is upper semi-continuous, \item $(x,\d,\g,x') \mapsto v(x', \C(x,\g(x,\d),x')+\d)$ is lower semi-continuous. \end{enumerate} Then, $Tv$ is is lower semi-continuous and there exists a minimizer $\g^*$ such that $T_{\g^*}v = Tv$. \end{lemma} \begin{proof} By Lemma 17.11 in \citet{hinderer1970}, $(x,\d,\g) \mapsto T_{\g}v(x,\d)$ is lower semi-continuous. The claim then follows from a similar argument to Proposition 2.4.3 in \citet{bauerle2011} with the upper bounding function $b \equiv 1$ as defined in \citet[Definition 2.4.1]{bauerle2011}. \qed \end{proof} \begin{proof}[Proof of Theorem \ref{thm:SumsOfCostThm}] The proof is similar to Theorem 2.3.4 and Theorem 2.3.8 in \citet{bauerle2011} with a different state space, see also \citet{bauerle2014}. \begin{enumerate}[label=\textit{{ad }\alph*)}] \item An easy calculation shows that \begin{align*} \wt \Iw_1((x,\d),\widetilde{\pi}) &= \mathbb{E}^{\widetilde{\pi}}_x \Big[ \Uw \left( \C(X_0, A_0, X_1) + \d \right) \Big] \\ &= \int \Uw \left( \C(x, \wt g _0(x,\d), x') + \d \right) P(dx' \mid x, \wt g_1(x,\d)) = T_{\wt g_1} [\wt \Vw_0](x,\d). \end{align*} Now, let $\wt \pi^+ = (\wt g_2, \dots)$. For $n = 2,\dots,N$, we get \begin{align*} &\wt \Iw_n((x,\d),\widetilde{\pi}) = \mathbb E^{\wt \pi}_x \left[ \Uw \left( \sum_{k=0}^{n-1} \C(X_k, A_k, X_{k+1}) + \d \right) \right] \\ &= \int \E^{\wt\pi^+}_{x'} \left[ \Uw \left( \sum_{k=0}^{n-2} \C(X_k, A_k, X_{k+1}) + \d + \C(x, \wt g_{1}(x, \d), x') \right) \right] P(dx' \mid x,\wt g_0(x,\d)) \\ &= \int \wt \Iw((x', \d), \wt \pi^+) P(dx' \mid x, \wt g_1(x,\d)) = T_{\wt g_1}[\wt \Iw_{n-1}(\cdot, \wt \pi^+)](\wt x) = T_{\g_{1}}[\dots [T_{\g_{n-1}}[\wt\Vw_0]]\dots](x,\d,z). \end{align*} The claim follows then by induction. \item This follows from Theorem 2.2.3 in \citet{bauerle2011}. \item Note that every $v \in \Delta$ is bounded from below by $\Uw(\mathbf{0})$. By our assumptions, we get that $(x,\d,\g,x') \mapsto v(x', \C(x,\g(x,\d),x')+\d)$ is lower semi-continuous, and bounded from below, i.e. we are in the setting of Theorem \ref{thm:minexists}. Thus, $T[v]$ is lower semi-continuous and there exists a minimizer $\g^*$ such that $T_{\g^*}[v] = T[v]$. For fixed $x \in \X$, and $a \in \D(x)$, the map $\d \mapsto \int v(x', \C(x,a,x')+\d) P(dx' \mid x,a)$ is increasing and continuous for every $a \in D(x)$. Therefore, the infimum of these maps over all $a \in D(x)$ is increasing and upper semi-continuous in $\d$. With this, we have shown that $Tv(x,\cdot)$ is upper and lower semi-continuous, and therefore continuous, and increasing for all $x \in \X$. Because $v(x,\cdot) \geq \Uw(\cdot)$, we have $T[v](x,\cdot) \geq \Uw(\cdot)$. We have then shown that $T: \Delta \to \Delta$ is well-defined. \item Let $\g^*_{n}$ be a minimizer of $\Vw_{n-1}$ for $n=1,\dots,N$ and denote by $\pi^* = (\g^*_1,\dots,\g^*_{N})$ the associated policy. For $n = 1$, we get that \begin{equation*} \begin{split} \wt \Vw_1(x,\d) = \inf_{\widetilde{\pi}\in \wPiX}\E_x^{\wt\pi} \Big[ \Uw \left( \C(X_0, A_0, X_1) + \d \right) \Big] {=} \inf_{a \in D(x)} \int \Uw(\C(x,a,x') + \d) P(dx' \mid x,a) = T[\wt\Vw_0](x,\d), \end{split} \end{equation*} and obviously, $\wt \Vw_1(x,\d) = \wt \Iw_1((x,\d),\widetilde{\pi}^*)$. Now, assume that $\wt \Iw_n((x,\d),\widetilde{\pi}^*) = \wt \Vw_n(x,\d)$ for a fixed $n \in \{1,\dots,N\}$. Then, \begin{align*} \wt \Iw_{n+1}((x,\d),\wt \pi^*) &= T_{\wt g^*_1}[\wt \Iw_n(\cdot,(\wt \pi^*)^+)](x,\d) & \text{using (a),} \\ &= T_{\wt g^*_1}[\wt \Vw_n](x,\d) & \text{by the induction hypothesis,} \\ &= T[\wt \Vw_n](x,\d) & \text{by definition of $\g^*_0$.} \end{align*} By taking the infimum, we get \begin{equation}\label{eqn:inf1} \inf_{\wt \pi \in \wPiX} \wt \Iw_{n+1}((x,\d),\wt\pi) = \wt \Vw_{n+1}(x,\d) \leq \wt \Iw_{n+1}((x,\d),\wt \pi^*) = T[\wt \Vw_{n}](x,\d). \end{equation} On the other hand, with an arbitrary policy $\widetilde \pi = (\wt g_1,\dots,\wt g_{N})$, \begin{align*} \wt \Iw_{n+1}((x,\d),\wt\pi) &=T_{\wt g_1}[\wt \Iw_n(\cdot,\wt \pi^+)](x,\d) & \text{using (a),} \\ &\geq T_{\wt g_1}[\wt \Vw_n](x,\d) & \text{by the monotonicity of $T$,} \\ &\geq T [\wt \Vw_n](x,\d) & \text{by taking the infimum.} \end{align*} By taking the infimum, we get \begin{equation} \label{eqn:inf2} \inf_{\widetilde{\pi}\in \wPiX} \wt \Iw_{n+1}((x,\d),\widetilde{\pi}) = \wt \Vw_{n+1}(x,\d) \geq T[\wt \Vw_n](x,\d). \end{equation} From (\ref{eqn:inf1}) and (\ref{eqn:inf2}), it follows by induction that $$ \wt \Vw_{n}(x,\d) = T[\wt \Vw_{n-1}](x,\d) = \wt \Iw_n((x,\d),\wt \pi^*) $$ for all $n = 1,\dots,N$. \item Consider the Markovian policy $\widetilde{\pi}^* = (\widetilde g^*_1,\dots,\widetilde g^*_{N})$ as defined in \textit{(d)}. We have just shown that $\wt \Vw_N(x,\d) = \wt \Iw_N((x,\d),\widetilde\pi^*)$, i.e. $\widetilde\pi^*$ is a minimizer of (\ref{PCostToGo}), and therefore an optimal policy for the $N$-step MDP with states in $X \times \R^\imax$. The claim follows by \eqref{polpol} in Section \ref{assasin} where the policy bijection is explored. \qed \end{enumerate} \end{proof} \subsection{A two-armed bandit cost problem} Consider an investor who has to repeatedly allocate one unit of wealth between two alternative assets with random costs. The first (second) asset costs one unit of gold (silver) with a probability of $0.5$ and nothing otherwise. We thus have the state space $\X := \{0,1\}^2$, where $x_g = 0$ ($x_s = 0$) denotes that the first (second) asset has zero cost in state $x = (x_g, x_s) \in \X$. The cost function reads as $$ C(x, a, x') = \begin{pmatrix} C^g(x_g, a, x'_g) \\ C^s(x_s, a, x'_s) \end{pmatrix} = \begin{pmatrix} a x_g \\ (1-a) x_s \end{pmatrix}.$$ The utility of the investor dependent on the so-far accumulated cost of gold $g$ and silver $s$ is given by $$U(g,s) = g^2 + \mu s$$ for some $0 < \mu \leq 2$. The investor meets a decision $a \in D(x) := \A$ with $\A := [0,1]$ in each round, where $a$ describes the share of wealth allocated in the first asset. The two assets are independent, i.e. for every $x, x' \in \X$, $a \in D(x)$, it holds $\mathrm{P}(x' \mid x, a) = \frac{1}{4}$. After each round, the investor regains one unit of wealth to invest. First, we will compute the value function for this problem inductively. To that end, consider the the one-step value function \begin{align*} V_{1}(g,s) = T[U](g,s) &= \inf_{a \in [0,1]} \frac{1}{4} \bigg( U(g,s) + U(g+a,s) + U(g,s+1-a) + U(g+a,s+1-a)\bigg) \\ &= \inf_{a \in [0,1]} \underbrace{\frac{1}{4} \bigg( 2 g^2 + 2 \mu s + 2 (g+a)^2 + 2 \mu(s+1-a) \bigg)}_{=:t_0(g,s,a)}. \end{align*} In order to compute the infimum, consider \begin{equation*} \frac{\partial t_0}{\partial a} (g,s,a) = g + a - \frac{\mu}{2}, \hspace*{4em} \frac{\partial^2 t_0}{\partial a^2} (g,s,a) = 1 > 0, \end{equation*} i.e. the infimum is attained at $a_0^* = \left[\frac{\mu}{2} - g\right]_+ \in [0,1]$, where $[a]_+ = \max\{a,0\}$ for any $a \in \R$. Then, $$t_0(g,s,a_0^*) = \begin{cases} \frac{1}{2} g^2 + \frac{1}{2} \mu g + \mu s - \frac{1}{8} \mu^2 + \frac{1}{2} \mu, & \text{if } g < \frac{\mu}{2}, \\ g^2 + \mu s + \frac{\mu}{2}, & \text{otherwise}. \end{cases}$$ Next, assume that $V_{n}$ takes the form \begin{equation}\label{eqn:valuecostbandit} V_{n}(g,s) = \begin{cases} c_1^\n g^2 + c_2^\n \mu g + \mu s + c_3^\n \mu^2 + c_4^\n \mu, & \text{if } g < \frac{\mu}{2}, \\ g^2 + \mu s + n \frac{\mu}{2}, & \text{otherwise}, \end{cases} \end{equation} where $c_1^\n := \frac{1}{2^n}$, $c_2^\n := 1 - \frac{1}{2^n}$, $c_3^\n = \frac{1}{2^{n+2}} - \frac{1}{4}$, and $c_4^\n = \frac{n}{2}$. Then, \begin{align*} V_{n+1}(g,s) &= T[V_{n}](g,s) \\ &= \inf_{a \in [0,1]} \underbrace{ \bigg( V_{n}(g,s) + V_{n}(g+a,s) + V_{n}(g,s+1-a) + V_{n}(g+a,s+1-a) \bigg) }_{=: t_n(g,s,a)} \end{align*} Consider the following conditions on the partial derivative of $t_n$ ($a \neq \frac{\mu}{2} - g$): We have \begin{equation*} \frac{\partial t_n}{\partial a} (g,s,a) = \begin{cases} c_1^\n (g+a) + \frac{c_2^\n-1}{2} \mu = c_1^\n \left( g+a - \frac{\mu}{2} \right) < 0, & \text{if } g+a < \frac{\mu}{2}, \\ g + a - \frac{\mu}{2} > 0, & \text{otherwise}, \end{cases} \end{equation*} i.e. the infimum is attained at $a_n^* = \left[\frac{\mu}{2} - g\right]_+$. By plugging in the optimal control, we get \begin{align*} t_n\left(g,s,a_n^*\right) &= \begin{cases} \frac{c_1^\n}{2} g^2 + \left( c_2^\n + \frac{1}{2^{n+1}} \right) \mu g + \mu s + \left( c_3^\n - \frac{1}{2^{n+3}} \right) \mu^2 + \left( c_4^\n + \frac{1}{2} \right) \mu, & \text{if } g < \frac{\mu}{2}, \\ g^2 + \mu s + \frac{\mu}{2} + n \frac{\mu}{2}, & \text{otherwise}, \end{cases} \\ &= \begin{cases} c_1^\nn g^2 + c_2^\nn \mu g + \mu s + c_3^\nn \mu^2 + c_4^\nn \mu, & \text{if } g < \frac{\mu}{2},\\ g^2 + \mu s + (n+1) \frac{\mu}{2}, & \text{otherwise}. \end{cases} \end{align*} It follows by induction that the value function $V_{n}$ takes the form (\ref{eqn:valuecostbandit}). \begin{remark} Note that $(g,s) \mapsto U(g,s)$ is convex in $g$ and linear in $s$, i.e. the investor is risk-averse in the first asset and risk-neutral in the second asset. Therefore, the investor will diversify between the two assets until $g \geq \mu/2$.\end{remark} \subsection{Discounted finite horizon problems} We now consider finite horizon problems with a discount vector $\boldsymbol{\beta} \in (0,1)^{\imax}$, and prove the corresponding analogon to Theorem \ref{thm:SumsOfCostThm}. The techniques used are similar to those from \citet{bauerle2014}, where they are applied to \textit{univariate} utility functions. Similar to the previous setting, we define the \emph{total cost} $\Iw_N(x,\pi)$, given an initial state $x \in \mathcal{X},$ and a history dependent policy $\pi \in \PiCh$, by \begin{equation}\label{dot}\Iw_{N}(x,\pi):=\E_{x}^{\pi}\left[\Uw\left(\sum_{n=0}^{N-1} \boldsymbol{\beta}^{n}\cdot \C(X_{n},A_{n},X_{n+1})\right)\right],\end{equation} and the corresponding value function, by \begin{equation}\tag{$P$} \Vw_{N}(x) := \inf_{\pi\in\PiH}\Iw_{N}(x,\pi). \end{equation} We remark that the dot product appearing in \eqref{dot} is a componentwise product, i.e. $$\mathbf{a}\cdot\mathbf{b} =(a_{1}b_{1},\dots,a_{n}b_{n})\hspace{32pt}\text{for } \mathbf{a}=(a_{1},\dots,a_{n}), \mathbf{b}=(b_{1},\dots,b_{n}).$$ \subsubsection{Augmented problem} Again, we consider an augmented state space $\X \times \R^\imax \times (0,1]^{i_{\max}}$, where the new components keep track of the decreasing discount factor. Policy augmentation is done similar to the previous section. The new transition kernel $\widetilde P$ of the augmented problem is given by \begin{equation} \widetilde{\mathrm{P}}(\cdot|\widetilde{x};a) =\widetilde{\mathrm{P}}(\cdot|(x,\d,\z);a) =(\mathcal{T}_{(x,\d,\z)})_{\#}\mathrm{P}(\cdot|x,a), \end{equation} where \begin{equation} \mathcal{T}_{(x,\d,\z)}(x')=(x',\z\cdot \mathbf{C}(x,a,x')+\mathbf{d}, \z\cdot \bb). \end{equation} On the augmented state space, given an initial state $x \in \X$, initial cost $\d \in \R^\imax$, initial discount rates $\z \in (0,1]^{i_{max}}$, and a policy $\widetilde\pi \in \wPiH$ the total cost $\wt \Iw_n((x,\d, z), \widetilde\pi)$ for $n=1,...,N$ is given by \begin{equation} \wt\Iw_{n}(\wt x, \wt \pi) = \widetilde{\Iw}_{n}((x,\boldsymbol{d},z),\widetilde{\pi}):= \widetilde{\E}_{\wt x}^{\widetilde{\pi}} \left[ \Uw \left( \z\cdot \sum_{k=0}^{n-1} \bb^{k} \cdot\C(X_{k},A_{k},X_{k+1})+\d \right) \right]. \end{equation} The corresponding value function is \begin{equation}\tag{$\widetilde P$} \widetilde{\mathcal{V}}_{n}(\widetilde{x}) := \inf_{\widetilde{\pi}\in\wPiH} \widetilde{\Iw}_{n}(\widetilde{x},\widetilde{\pi}). \end{equation} \subsubsection{Bellman operator and second theorem} Let \begin{align*} \Delta := \big\{ v : \X \times (\R^+)^\imax &\times (0,1]^\imax \to \R ~\big\vert~ \text{$v$ is lower semi-continuous,} \\ & \text{$v(x,\cdot,\cdot)$ is continuous, and componentwise increasing for all $x \in \X$}, \\ & \text{$v(x,\d, \z) \geq \Uw(\d)$ for all $(x,\d, \z) \in \X \times (\R^+)^\imax \times (0,1]$} \big\}. \end{align*} For $v \in \Delta$ and a Markovian decision rule $\widetilde g$, we define the operators \begin{equation*} \begin{split} T_{\g}[v](\wt x) &= T_{\g}[v](x, \d, \z) := \int v\left(\widetilde{x}'\right)\widetilde{\mathrm{P}}\left(d\widetilde{x}' \mid \widetilde{x},\g(\widetilde{x})\right) = \int v\left((x',\d',\z')\right)(\mathcal{T}_{(x,\d,\z)})_{\#}\mathrm{P}\left(dx' \mid x,\g(x,\d,\z)\right) \\ & =\int v\left(x',\z\cdot\C(x,\g(x,\boldsymbol{d},\z),x')+\boldsymbol{d}, \z\cdot \bb \right)\mathrm{P}(dx' \mid x,\g(x,\boldsymbol{d},z)), \end{split} \end{equation*} and \begin{equation*} T[v](x,\d,\z)=\inf_{a\in D (x)}\int v(x', \z\cdot\C(x,a,x')+\boldsymbol{d}, \z\cdot\bb )\mathrm{P}(dx' \mid x,a), \end{equation*} whenever the integrals exist. $T$ is again called the \textit{minimal cost operator}. We may now state the main theorem of this section. \begin{theorem} Let $\wt\Vw_0(x, \d, \z) := \Uw (\d)$. The following holds: \begin{enumerate}[label=\alph*)] \item For any Markovian policy $\widetilde \pi=(\g_1, \dots) \in \wPiX$, we have the cost iteration \begin{equation*} \wt \Iw_n((x,\d,\z),\wt \pi) = T_{\g_{1}}[\dots [T_{\g_{n-1}}[\wt\Vw_0]]\dots](x,\d,\z) \end{equation*} for all $n=1,\dots,N.$ \item The optimal policy is Markovian, i.e. $$\inf_{\widetilde\pi \in \wPiH} \Iw_{N}(\widetilde{x},\widetilde\pi) = \inf_{\widetilde\pi \in \wPiX} \Iw_{N}(\widetilde{x},\widetilde\pi).$$ \item The operator $T: \Delta \to \Delta$ is well-defined, and for every $v \in \Delta$, there exists a minimizer of $T[v]$. \item We get the Bellman-style equation $$\wt\Vw_{n}(x,\d,\z)= T[\wt\Vw_{n-1}](x,\d,\z) = \inf_{a\in D(x)} \int \wt\Vw_{n-1}(x',\z\cdot \C(x,a,x')+\d, \z\cdot\bb)P(dx' \mid x,a)$$ for all $n=1,\dots,N$. \item If $\widetilde g^*_{n}$ is a minimizer of $\wt\Vw_{n-1}$ for $n=1,\dots,N$, then $\widetilde \pi^* = (\widetilde g^*_1,\dots,\widetilde g^*_{N})$ is an optimal policy for ($\widetilde P$). In this situation, the history-dependent policy $\pi^* = (f^*_0,\dots, f^*_{N-1})$, defined by $$f_n^*(h_{n}):= \begin{dcases} \widetilde g^*_N(x_0, 0, 1) & \text{if } n=0, \\ \widetilde g^*_{N-n}\left(x_n,\sum_{k=0}^{n-1} \bb^k \cdot\C(x_k,a_k,x_{k+1}), \bb^n \right) & \text{otherwise}, \end{dcases} $$ is an optimal policy for problem (P). \end{enumerate} \end{theorem} \begin{proof} The proof is similar to the derivation of Theorem \ref{thm:SumsOfCostThm}. We will only prove \textit{(a)} by induction. To that end, note that \begin{align*} \wt \Iw_1((x,\d,\z), \wt \pi) &= \wt \E^{\wt \pi}_{x} \bigg[ \Uw(\z\cdot \C(X_0, A_0, X_1) + \d) \bigg] \\ &= \int \Uw(\z\cdot \C(x, \wt g_0(x,\d,\z), x') + \d) P(dx' \mid x, \wt g_0(x,\d,\z)) \\ &= T_{\wt g_1}[\wt\Vw_0](x,\d,\z). \end{align*} Let $\wt \pi^+ = (\wt g_2, \wt g_3, \dots)$. For $n = 2,\dots,N$, we get \begin{align*} &\wt \Iw_n((x,\d,\z),\widetilde{\pi}) = \mathbb E^{\wt\pi}_{x} \left[ \Uw \left(\z \sum_{k=0}^{n-1} \beta^k \C(X_k, A_k, X_{k+1}) + \d \right) \right] \\ &= \int \E^{\wt\pi^+}_{x'} \left[ \Uw \left(\z\cdot \sum_{k=0}^{n-2} \bb^{k+1}\cdot \C(X_k, A_k, X_{k+1}) + \z\cdot \C(x, \wt g_1(x,\d,\z), x') + \d \right) \right] P(dx' \mid x, \wt g_1(x,\d,\z)) \\ &= \int \wt \Iw_{n-1}((x',\z\cdot \C(x, \wt g_1(x,\d,\z)+\d,\bb\cdot\z),\wt\pi^+) P(dx' \mid x, \wt g_1(x,\d,\z)) \\ &= T_{\wt g_1}[\wt \Iw_{n-1}(\cdot, \wt \pi^+)](\wt x) = T_{\g_{1}}[T_{\g_{2}}[\dots [T_{\g_{n-1}}[\wt\Vw_0]]\dots]](x,\d,\z). \end{align*} The claim follows then inductively. \qed \end{proof} \subsection{Infinite horizon problems} In this section, we study the infinite horizon problem with \textit{discount factor} $\bb \in (0,1)^{\imax}$. For a vector $\boldsymbol{a}\in\mathbb{R}^{\imax},$ we will denote with $\underline{a}=\min\{a_{1},\dots,a_{\imax}\}, \overline{a}=\max\{a_{1},\dots,a_{\imax}\}.$ The notion of $T$ and $\Delta$ from the previous section is unchanged. The total cost in this situation reads as $$\Iw_\infty(x, \pi) := \E_x^\pi \left[ \Uw \left( \sum_{n=0}^\infty \bb^n\cdot \C(X_n, A_n, X_{n+1}) \right) \right],$$ and $\wt\Vw_\infty$ is defined accordingly. We shall use the following definition: \begin{definition} For a continuous function $\Fw:\mathbb{R}^{d}\rightarrow\mathbb{R},$ we define the modulus of continuity $\omega_{\Fw}(\delta,R)$ on the ball $B(0,R),$ by \begin{equation} \omega_{\Fw}(\delta,R)=\sup\left\{|\Fw(x)-\Fw(y)| \ \Big|\ x,y\in B(0,R), \|x-y\|_{2}<\delta\right\} \end{equation} \end{definition} Note that the modulus of continuity is increasing in both variables, and it holds $\lim_{\delta\rightarrow 0}\omega_{\Fw}(\delta,R)\rightarrow 0.$ \begin{theorem} Let $\underline b(\d, \z) := \Uw\left(\z\cdot \frac{\underline c}{\mathbf{1}-\bb} + \d\right)$ and $\bar b(\d, \z) := \Uw\left(\z\cdot \frac{\bar c}{\mathbf{1}-\bb} + \d\right),$ where $\frac{1}{\boldsymbol{a}}=\left(\frac{1}{a_{1}},\dots,\frac{1}{a_{\imax}}\right)$. \begin{enumerate}[label=\alph*)] \item Let $K$ be a compact subset of $(\R^+)^\imax$. Then, $T^n [\underline b] \nearrow \wt\Vw_\infty$, $T^n[ \Uw] \nearrow \wt\Vw_\infty$, and $T^n[ \bar b] \searrow \wt\Vw_\infty$ as $n \to \infty$ uniformly on $\X\times K\times (0,1)^{\imax}$. \item $\wt\Vw_\infty$ is the unique solution of $$\left\{ \begin{array}{l} v = T[v], \\ v \in \Delta, \\ \underline b(\cdot, \cdot) \leq v(x,\cdot,\cdot) \leq \bar b(\cdot, \cdot) \text{ for all } x \in \X. \end{array} \right.$$ \item There exists a decision rule $g^*$ that minimizes $\wt\Vw_\infty$. \item The history-dependent policy $f^* = (f_0^*, f_1^*, \dots)$ given by $$f_n^*(h_n) = g^*\left( x_n, \sum_{k=0}^{n-1} \bb^k c(x_k, a_k,x_{k+1}), \bb^n \right)$$ is an optimal policy for $\Vw_\infty$. \end{enumerate} \end{theorem} \begin{proof} \begin{enumerate}[label=\textit{{ad }\alph*)}] \item For $n \in \N$ and $(x,\d,\z) \in \wt \X$, it holds \begin{equation}\label{modcont} \begin{split} &\Uw\left(\z\cdot \sum_{k=0}^\infty \bb^k\cdot \C(x_n, a_n, x_{n+1}) + \d\right)-\Uw\left(\z\cdot \sum_{k=0}^n \bb^k\cdot \C(x_n, a_n, x_{n+1}) + \d\right)\\&\leq \omega_\Uw\left(\left\|\z\cdot \bb^n \sum_{k=n}^\infty \bb^{k-n} \cdot\C(x_k, a_k, x_{k+1})\right\|_{2},\left\|\z\cdot \sum_{k=0}^\infty \bb^k\cdot \C(x_n, a_n, x_{n+1}) + \d\right\|_{2}\right)\\&\leq \omega_\Uw\left(\imax\overline{z} \overline{\beta}^n \frac{\bar c}{1-\overline{\beta}},\imax\overline{z}\frac{\overline{c}}{1-\overline{\beta}} + \overline{d}\right) \end{split}. \end{equation} Now, we get \begin{equation*} \begin{aligned} \wt\Vw_n(x,\d,\z) &\leq \wt\Iw_{n,\wt\pi}(x,\d,\z) \leq \wt\Iw_{\infty,\wt\pi}(x,\d,\z) = \E_x^{\wt\pi} \left[ \Uw\left(\z\cdot \sum_{k=0}^\infty \bb^k\cdot \C(X_n, A_n, X_{n+1}) + \d\right) \right] \\ &\leq \E_x^{\wt\pi} \left[ \Uw\left(\z\cdot \sum_{k=0}^n \bb^k\cdot \C(X_n, A_n, X_{n+1}) + \d\right) \right] + \omega_\Uw\left(\imax\overline{z} \overline{\beta}^n \frac{\bar c}{1-\overline{\beta}},\imax\overline{z}\frac{\overline{c}}{1-\overline{\beta}} + \overline{d}\right)\\ &\leq \wt\Iw_{n,\wt\pi}(x,\d,\z) + \underbrace{\omega_\Uw\left(\imax\overline{z} \overline{\beta}^n \frac{\bar c}{1-\overline{\beta}},\imax\left(\overline{z}\frac{\overline{c}}{1-\overline{\beta}} + \overline{d}\right)\right)}_{=: \varepsilon_n(x,\d,\z)}. \end{aligned} \end{equation*} Since $K$ is compact, there exists $R > 0$ such that $\bar d < R$. Then, we have $$\varepsilon_n(x,\d,\z)\leq \omega_\Uw\left(\imax\overline{\beta}^n \frac{\bar c}{1-\overline{\beta}},\imax\frac{\overline{c}}{1-\overline{\beta}} + R\right),$$ and since $\overline{\beta} \in (0,1)$, we have $\varepsilon_n \searrow 0$ uniformly. Because $\wt\pi$ was arbitrary, the previous inequality also holds for the infimum, i.e. \begin{equation} \label{eqn:withinfimum} \wt\Vw_n(x,\d,\z) \leq \wt\Vw_\infty(x,\d,\z) \leq \wt\Vw_n(x,\d,\z) + \varepsilon_n(x,\d,\z), \end{equation} and therefore $\wt\Vw_n \nearrow \wt\Vw_\infty$. Recall that $\C$ is componentwise bounded by $\underline c, \bar c > 0$, and therefore, independent of the process $(X_n), (A_n)$, the infinite time cost $\sum_{n=0}^\infty \bb^n\cdot \C(X_n, A_n, X_{n+1})$ is componentwise bounded by $\frac{\underline c}{\mathbf{1}-\bb}, \frac{\bar c}{\mathbf{1}-\bb}$. We have therefore $\underline b \leq \wt\Vw_\infty \leq \bar b$. Since $T$ is increasing, we have with the previous result $\wt\Vw_{n+1} = T[\wt\Vw_n] \leq T[\wt\Vw_\infty]$, i.e. $\wt\Vw_\infty \leq T[\wt\Vw_\infty]$. Since $\z\in (0,\infty)^{\imax}$, we observe that for every triple $(x,\d,\z)$ and $a\in\D(x),$ we have \begin{equation} \begin{split} \varepsilon'_{n}(x,\d,\z, a)&:=\int\varepsilon_n(x',\z\cdot\C(x,a,x')+\d,\z\cdot\bb)\mathrm{P}(dx' \mid x,a)\\&\leq \omega\left(\imax\overline{z} \overline{\beta}^{n+1}\frac{\bar c}{1-\overline{\beta}},\imax\left(\overline{z}\overline{\beta}\frac{\overline{c}}{1-\overline{\beta}} + \overline{d}+\overline{z}\, \overline{c}\right)\right)\\&\leq \omega\left(\imax\overline{z} \overline{\beta}^{n+1}\frac{\bar c}{1-\overline{\beta}},\imax\overline{z}\frac{\overline{c}}{1-\overline{\beta}} \right)=\varepsilon_{n+1}(x,\d,\z). \end{split} \end{equation} Now, we get with (\ref{eqn:withinfimum}) \begin{equation} \begin{split} T[\wt\Vw_\infty](x,\d,\z)&\leq T[\wt\Vw_n + \varepsilon_n](x,\d,\z) \leq T[\wt\Vw_n](x,\d,\z) +\sup_{a\in\D(x)}\varepsilon'_{n}(x,\d,\z, a)\\&\leq \wt\Vw_{n+1}(x,\d,\z)+\varepsilon_{n+1}(x,\d,\z), \end{split} \end{equation} but the last term converges to zero as $n \in \infty$. Therefore we have, $\wt\Vw_\infty \geq T[\wt\Vw_\infty]$, i.e. $\wt\Vw_\infty = T[\wt\Vw_\infty]$. We next show that $T^n[ \bar b] \searrow \wt\Vw_\infty$, and $T^n [\underline b] \nearrow \wt\Vw_\infty$ as $n \to \infty$. First, observe that \begin{align*} T[ \bar b] (x, \d, \z) &= \inf_{a \in D(x)} \int \Uw\left( \z\cdot \bb \cdot\frac{\bar c}{1-\bb} + \z \cdot\C(x,a,x') + \d \right) P(dx'|x,a) \\ &\leq \Uw \left( \z\cdot \frac{\bar c}{\mathbf{1}-\bb} + \d \right) \\ &\leq \bar b (\d,z), \end{align*} and the same holds true for $$T [\underline b](x,\d,z) \geq \underline b(\d,z).$$ Since $T$ is increasing, the sequences $(T^n [\bar b])_n$ and $(T^n [\underline b])_n$ are pointwise monotone and bounded, and therefore their pointwise limit exists. By iteration, \begin{align*} T^n[\Uw](x,\d,\z) &= \inf_{\pi \in \wPiX} \E_x^\pi \left[ \Uw \left( \z \cdot\sum_{k=0}^{n-1} \bb^k\cdot \C(X_k, A_k, X_{k+1}) + \d \right) \right] \\ T^n\left[\bar b\right](x,\d,\z) &= \inf_{\pi \in \wPiX} \E_x^\pi \left[ \Uw \left( \z\cdot \bb^n \frac{\bar c}{\mathbf{1}-\bb} + \z \cdot\sum_{k=0}^{n-1} \bb^k\cdot \C(X_k, A_k, X_{k+1}) + \d \right) \right]. \end{align*} We obtain \begin{align*} 0 &\leq T^n[\bar b](x,\d,\z) - T^n[\underline b](x,\d,\z)\hspace{20pt} \text{ by monotonicity of} \hspace{2pt}T \hspace{2pt}\text{and} \hspace{2pt}T(0)=0\\ &\leq T^n[\bar b](x,\d,\z) - T^n[\Uw](x,\d,\z) \hspace{20pt}\text{by monotonicity of} \hspace{2pt}T \hspace{2pt}\text{and} \hspace{2pt} \mathcal{U}(\d)\leq\underline{b}(x,\d,\z)\\ &\leq \sup_{\pi \in \Pi_{\wt \H}} \E_x^\pi \left[ \Uw\left( \z\cdot \bb^n \frac{\bar c}{\mathbf{1}-\bb} + \z \sum_{k=0}^{n-1} \bb^k\cdot\C(X_k, A_k, X_{k+1}) + \d \right) - \Uw\left( \z\cdot \sum_{k=0}^{n-1} \bb^k \cdot \C(X_k, A_k, X_{k+1}) + \d \right) \right]\\&= \varepsilon_n(x,\d,\z). \end{align*} For $n \to \infty$, we obtain $$\lim_{n \to \infty} T^n \underline [b] = \lim_{n \to \infty} T^n [\bar b]= \lim_{n \to \infty} T^n [\Uw] = \wt\Vw_\infty,$$ uniformly on compact sets. This proves (a). \item $\wt\Vw_\infty$ is lower semi-continuous as a uniform limit on sets of the form $\X\times K\times (0,1)^{\imax},$ where $K$ is a compact subset of $(\R^+)^\imax,$ of lower semi-continuous function. As proved in Theorem \ref{thm:SumsOfCostThm}, $T^n [\bar b](x, \cdot, \cdot)$ is continuous and componentwise increasing for all $x \in \X$. Since $T^n [\bar b] \searrow \wt\Vw_\infty$, $\wt\Vw_\infty(x,\cdot,\cdot)$ is upper semi-continuous and therefore continuous, and also increasing for each $x \in \X$. We have thereby shown $\wt\Vw_\infty \in \Delta$. It remains to show the uniqueness. To that end, suppose that there is $v \in \Delta$, $v \neq \wt\Vw_\infty$ such that $v = T[v]$ with $\underline b \leq v \leq \bar b$. Then, because $T$ is increasing, $T^n [\underline b] \leq T^n [v] = v \leq T^n [\bar b]$, and with $n \in \infty$, we get $\wt\Vw_\infty \leq v \leq \wt\Vw_\infty$, i.e. $v = \wt\Vw_\infty$, a contradiction. This proves (b). \item The claim follows similar to Theorem \ref{thm:SumsOfCostThm}. \item Since $\wt\Vw_\infty(x,y,z) \geq \Uw(y)$, we obtain $$\wt\Vw_\infty = \lim_{n \to \infty} T^n_{g^*} [\wt\Vw_\infty] \geq \lim_{n \to \infty} T^n_{g^*} [\Uw] = \lim_{n \to \infty} \wt\Iw_n(\cdot,(g^*, g^*, \dots)) = \wt\Iw_\infty(\cdot, (g^*, g^*, \dots)) \geq \wt\Vw_\infty,$$ Hence $f^*$ is optimal for $\wt\Iw_\infty$. This finally proves (d). \qed \end{enumerate} \end{proof} \section{RSPOMDPs on a novel class of utility functions: Sums of exponentials}\label{sct:rspomdp} In this section, we consider RSPOMDPs with a class of utility functions that can be written as weighted sums of exponentials. We will show that it is possible to reformulate the problem in terms of a MORSMDP with a new performance index that, in turn, can be treated with tools described in the previous section. \subsection{The original setting} We start by describing the initial setting. Let $\mathcal{S},\mathcal{Y},\mathcal{A}$ be three \emph{finite} sets equipped with the discrete topology. In the sequel, $\mathcal{S}$ is called the \textit{hidden} state space, $\mathcal{Y}$ the set of observations, and $\mathcal{A}$ the set of controls. For every $a\in \mathcal{A},$ we define a transition probability matrix $\widehat{P}(a)=\left[\widehat{P}(s'|s;a)\right]_{s,s'\in S}.$ Finally, we denote by $Q=[Q(y|s)]_{y\in \mathcal{Y}, s\in\mathcal{S}}$ the signal matrix and by $\widehat{C}:\mathcal{S}\times \mathcal{A}\rightarrow \mathbb{R}$ the cost function. Now, for each $n\in\mathbb{N},$ let $\widehat{\mathcal{H}}_{n}$ be the set of histories up to time $n,$ where $\widehat{\mathcal{H}}_{0}=\mathcal{P}(S),$ and $\widehat{\mathcal{H}}_{n}= \widehat{\mathcal{H}}_{n-1}\times \mathcal{A}\times \mathcal{Y}.$ We denote by $\oPiH := \left\{ \widehat\pi =\left(\widehat{f}_0,\widehat{f}_{1},\dots\right) \middlemid \widehat{f}_n : \widehat{\H}_n \to A, n\in\mathbb{N} \right\}$ the set of deterministic polices that are functions of the history $\widehat{h}_{n}=(\theta,a_{0},y_{1},\dots,a_{n-1},y_{n})$ up to time $n.$ Given $\theta\in\mathcal{P}(S),$ and $\widehat{\pi}\in\oPiH,$ due to the Ionescu-Tulcea theorem, there exists a unique measure $\widehat{\mathbb{P}}^{\widehat{\pi}}_{\theta}$ on the Borel sets of $\Omega:=\mathcal{S}\times(\mathcal{A}\times \mathcal{S}\times \mathcal{Y})^{\infty}$ that satisfies: \begin{equation*} \widehat{\mathbb{P}}^{\widehat{\pi}}_{\theta}(s_{0},a_{0},s_{1},y_{1},a_{1},\dots,a_{n-1},s_{n},y_{n}):=\theta(s_{0}) \prod_{k=0}^{n-1}\left(\widehat{P}\left(s_{k+1}\vert s_{k};\widehat{f}_{k}\left(\widehat{h}_{k}\right)\right)Q\left(s_{k+1}\vert y_{k+1}\right)\right), \end{equation*} The corresponding expectation operator is denoted by $\widehat{\mathbb{E}}_{\theta}^{\widehat{\pi}}.$ Finally, for each $n\in\mathbb{N},$ we define the $\sigma$-fields $\widehat{\mathcal{F}}_{n}$, $\widehat{\mathcal G}_{n},$ by \begin{equation*} \begin{split} \widehat{\mathcal{F}}_{n}:=\sigma\left(\left(A_{k},Y_{k+1}\right),\ k=0,1,\dots,n-1\right),\hspace{14pt} \widehat{\mathcal{G}}_{n}:=\sigma\left(S_{0},\left(A_{k},S_{k+1},Y_{k+1}\right),\ k=0,1,\dots,n-1\right). \end{split} \end{equation*} It is straightforward to see that the set of policies $\oPiH,$ contains exactly the elements $\big(\widehat{f}_{n}\big)_{n\in\mathbb{N}},$ where $\widehat{f}_{n}$ are $\widehat{\mathcal{F}}_{n}$-measurable functions from $\widehat{\mathcal{H}}_{n}$ to $\mathcal{A}.$ \subsection{Towards a completely observable problem} Following \citet{cavazos2005}, we note that $\mathbb{P}^{\widehat{\pi}}_{\theta}$, defined by \begin{equation*} {\mathbb{P}}^{\widehat{\pi}}_{\theta}\left(s_{0},a_{0},s_{1},y_{1},a_{1},\dots,a_{n-1},s_{n},y_{n}\right):=\theta(s_{0}) \prod_{k=0}^{n-1}\left(\frac{1}{|\mathcal{Y}|}\widehat{P}\left(s_{k+1}\vert s_{k};\widehat{f}_{k}(h_{k})\right)\right), \end{equation*} is a probability measure, where $|\mathcal{Y}|$ is the number of elements in $\mathcal{Y}$. Denote by $\E^{\widehat \pi}_\theta$ the corresponding expectation operator. On the $\sigma$-field $\widehat{\mathcal{G}}_{n},$ the Radon-Nikodyn derivative of $\widehat{P}^{\widehat \pi}_{\theta}$ with respect to $P^{\widehat \pi}_{\theta}$ is given by \begin{equation*} \frac{\partial\widehat{\mathbb{P}}^{\widehat{\pi}}_{\theta}}{\partial\mathbb{P}^{\widehat{\pi}}_{\theta}}\bigg|_{\widehat{\mathcal{G}}_{n}}=\prod_{k=0}^{n-1}\left(|\mathcal{Y}|Q(Y_{k+1}\vert S_{k+1})\right)=:R_{n}, \end{equation*} and therefore \begin{equation*} \widehat{\mathbb{E}}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i}\left[\sum_{k=0}^{n}\widehat{C}(S_{k},A_{k})\right]}\right]=\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i}\left[\sum_{k=0}^{n}\widehat{C}(S_{k},A_{k})\right]}R_{n}\right]. \end{equation*} Now, for each $s\in \mathcal{S}$, $i=1,\dots,i_{\max}$, $n \in\mathbb{N}$, we define the positive and $\widehat{\mathcal{F}}_{n}$-measurable random variable $\psi^{i}_{n}$, by \begin{equation*} \psi^{i}_{n}(s):=\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\charf_{\{S_{n}=s\}}e^{\lambda^{i}\left[\sum_{k=0}^{n}\widehat{C}(S_{k},A_{k})\right]}R_{n}\Big|\widehat{\mathcal{F}}_{n}\right]. \end{equation*} Heuristically speaking, $\psi^{i}_{n}(s)$ is the \textit{(random) average accumulated cost} up to time $n$ of all outcomes that share the same observations and choices of controls leading to final state $S_n=s.$ If we set $\int\psi^{i}_{n}=\sum_{s\in\mathcal{S}}\psi_{n}^{i}(s),$ by using the tower property for expectations, it is straightforward to see that \begin{equation}\label{av} \mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i}\left[\sum_{k=0}^{n}\widehat{C}(S_{k},A_{k})\right]}R_{n}\right]=\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\sum_{s\in\mathcal{S}}\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\charf_{\{S_{n}=s\}}e^{\lambda^{i}\left[\sum_{k=0}^{n}\widehat{C}(S_{k},A_{k})\right]}R_{n}\Big|\widehat{\mathcal{F}}_{n}\right]\right]=\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\int\psi^{i}_n\right] \end{equation} Now, we can rewrite the last term \eqref{av} as telescopic product by \begin{equation}\label{telescopic} \mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\int\psi^{i}_n\right]=\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\prod^{n}_{k=1}\frac{\int\psi^{i}_k}{\int \psi^{i}_{k-1}}\int\psi^{i}_{0}\right]. \end{equation} Furthermore, for each $(a,y)\in \mathcal{A}\times \mathcal{Y},$ we define the matrix $M(a,y)$ given by \begin{equation*} M^{i}(a,y)[s,s']:=\left(e^{\lambda^{i}\widehat{C}(s,a)}\widehat{P}(s'\vert s ; a)Q(y\vert s')\right)^{\intercal}. \end{equation*} Note that with $\psi^{i}_{0}=\theta_{0}$, the recursion formula \begin{equation}\label{recursion} \psi^{i}_{n} = |\mathcal{Y}| M^{i}(A_{n-1},Y_{n})\psi^{i}_{n-1} \end{equation} holds. By combining the telescopic product \eqref{telescopic} and the recursion formula \eqref{recursion}, we get \begin{equation}\label{gamw} \mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\int\psi^{i}_n\right]=\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[|\mathcal{Y}|^{n}\prod^{n}_{k=1}\int M^{i}(A_{k-1},Y_{k})\frac{\psi^{i}_{k-1}}{\int \psi^{i}_{k-1}}\int\psi^{i}_{0}\right]. \end{equation} If we set \begin{equation} \theta^{i}_{n}=\frac{\psi^{i}_{n}}{\int \psi^{i}_{n}}, \end{equation} by \eqref{gamw}, we get \begin{equation*} \mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\int\psi^{i}_n\right]\!=\mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[\!|\mathcal{Y}|^{n}\prod^{n}_{k=1}\int M^{i}(A_{k-1},Y_{k})\theta^{i}_{k-1}\!\right]\!= \mathbb{E}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i}\left(\sum^{n}_{k=1}\left(\frac{1}{\lambda^{i}}\log\left(\int M^{i}(A_{k-1},Y_{k})\theta^{i}_{k-1}\right)+|\mathcal{Y}|\right)\right)}\right]. \end{equation*} Now, we define for $i=1, ..., \imax$ the operators $F^i$ and cost functions $G^i$ by \begin{equation*} F^{i}\left(\theta^{i},a,y\right):=\frac{M^{i}(a,y) \theta^{i}}{\int M^{i}(a,y)\theta^{i}},\hspace{50pt} G^{i}\left(\theta^{i},a,y\right):=\frac{1}{\lambda^{i}}\log\left(\int M^{i}(u,y)\theta^{i}\right). \end{equation*} We set $\mathcal{X}=\mathcal{P}(\mathcal{S})^{i_{\max}}\times \mathcal{Y},$ and for $x=(\theta^{1},\dots,\theta^{i_{\max}},y)\in \mathcal{X} ,a\in \mathcal{A},$ we define a controlled transition matrix $P(x'|x;a)$ by \begin{equation*} P(x'|x;a):=\begin{cases}\frac{1}{|\mathcal{Y}|}, & \text{if}\hspace{8pt} x'=(F^{1}(\theta^{1},a,y'),\dots,F^{i_{\max}}(\theta^{i_{\max}},a,y'),y'), \\ 0, &\text{otherwise}.\end{cases} \end{equation*} We also define the following cost functions on $\mathcal{X} \times \mathcal{A}\times \mathcal{X}$: For $x=(\theta^{1},\dots,\theta^{i_{\max}},y),$ we set $C^{i}(x,u,x')=G^{i}(\theta^{i},u,y') + \log(|\mathcal Y|)$. Then, we get \begin{equation*} \widehat{\mathbb{E}}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i}\left[\sum_{n=0}^{N-1}\widehat{C}(S_{n},A_{n})\right]}\right]=\mathbb{E}_{x_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i}\left[\sum_{n=0}^{N-1}C^{i}(X_{n},A_{n},X_{n+1})\right]}\right]. \end{equation*} At this point, we assume that $\widehat{\pi}$ is an element of $\oPiH.$ We define a different set of histories by $\mathcal{H}_{0}=\X,$ and $\mathcal{H}_{n}=\mathcal{H}_{n-1}\times \A \times \X$. An element $h_n \in \H_n$ takes the form $h_{n}=(x_{0},a_{0},x_{1},a_{1}\dots,x_{n})$, and a policy $\pi\in\PiH$ takes the form $\pi=(f_0,\dots,f_{n},\dots)$, where $f_{n} : \mathcal{H}_{n} \to \mathcal{A}$. We define $\eta:\oPiH\rightarrow \PiH$ such that $(f_{n})_{n\in \{0,\dots,N-1\}}=\eta((\widehat{f}_{n})_{n\in \{0,\dots,N-1\}})$ satisfies \begin{equation} \label{eqn:eta} f_n(x_{0},a_{0},\dots,x_{n-1},a_{n-1},x_{n})=\widehat{f}_{n}(\theta_{0},a_{0},\dots,y_{n-1},a_{n-1},y_{n}) \end{equation} for every $\theta_{0}\in\mathcal{P}(\mathcal{S})$, $x_{0}=(\theta_{0},\dots,\theta_{0},y_{0})$ and an arbitrary, fixed $y_{0}\in\mathcal{Y}$. Note that for histories $h_{n}$ that are not generated by a $\widehat{h}_{n}\in\mathcal{H}_{n},$ the $f_{n}$'s in $(f_{n})_{n\in \{0,\dots,N-1\}}=\eta((\widehat{f}_{n})_{n\in \{0,\dots,N-1\}})$ can be defined in an arbitrary fashion as they cannot be realized anyway. Now, it is easy to see that any performance index of the form $$\widehat{\Iw}_{N}(\theta_{0},\widehat{\pi})=\ell\left(\widehat{\mathbb{E}}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{1}\left[\sum_{n=0}^{N-1}\widehat{C}(S_{n},A_{n})\right]}\right],\dots,\widehat{\mathbb{E}}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i_{\max}}\left[\sum_{n=0}^{N-1}\widehat{C}(S_{n},A_{n})\right]}\right]\right),$$ where $\ell:\mathbb{R}^{i_{\max}}\rightarrow\mathbb{R},$ can be written as $$\widehat{\Iw}_{N}(\theta_{0},\widehat{\pi})=\Iw_{N}(x_{0},\eta(\widehat{\pi})),$$ where $$\Iw_{N}(x_{0},\pi))=\ell\left(\mathbb{E}_{x_{0}}^{\pi}\left[e^{\lambda^{1}\left[\sum_{n=0}^{N-1}C^{1}(X_{n},A_{n},X_{n+1})\right]}\right],\dots,\mathbb{E}_{x_{0}}^{\pi}\left[e^{\lambda^{i_{\max}}\left[\sum_{n=0}^{N-1}C^{i_{\max}}(X_{n},A_{n},X_{n+1})\right]}\right]\right).$$ \subsection{Utility functions that are sums of exponentials} Let $\{\lambda^{i}, i = 1,\dots,\imax\}\sse\mathbb{R}\setminus\{0\}$ be a finite collection of risk parameters, and $\{w^{i}, i=1,\dots,\imax\}\sse\mathbb{R^{+}}$ be a collection of weights. We define the utility function $\widehat{U}:\mathbb{R}\to\mathbb{R}$ by \begin{equation}\label{expsum} \widehat{U}(t):=\sum_{i=1}^{i_{\max}}w^{i}\sign(\lambda^{i})e^{\lambda^{i}t}, \end{equation} and introduce the performance index \begin{equation*} \widehat{\Iw}_{N}(\theta_{0},\widehat{\pi})=\sum_{i=1}^{i_{\max}}w^{i}\sign(\lambda^{i})\widehat{\mathbb{E}}_{\theta_{0}}^{\widehat{\pi}}\left[e^{\lambda^{i}\left[\sum_{n=0}^{N-1}\widehat{C}(S_{n},A_{n})\right]}\right], \end{equation*} and the corresponding value fuction \begin{equation}\tag{$\widehat{P}$} \widehat{V}_{N}(\theta_{0}) := \inf_{\widehat{\pi}\in\oPiH}\widehat{\Iw}_{N}(\theta_{0},\widehat{\pi}). \end{equation} The goal is to minimize $\widehat{\Iw}_{N}(\theta_{0},\widehat{\pi})$ over all policies $\widehat{\pi}\in\oPiH.$ Now, using the previous subsection, we can instead work on the Completely Observable RSMDP on the space $\mathcal{X}$ with performance index \begin{equation}\label{eqn:ObjectiveSumsOfExp} \Iw_{N}(x_{0},\pi)=\sum_{i=1}^{i_{\max}}w^{i}\sign(\lambda^{i})\mathbb{E}_{x_{0}}^{\pi}\left[e^{\lambda^{i}\left[\sum_{n=0}^{N-1}C^{i}(X_{n},A_{n},X_{n+1})\right]}\right], \end{equation} and corresponding value function \begin{equation}\tag{$P$} \Vw_{N}(x) := \inf_{\pi\in\PiH}\Iw_{N}(x,\pi). \end{equation} \begin{remark} Note that, if $m_{i}=\inf_{\mathcal{X}\times \mathcal{A}\times\mathcal{X}}C^{i}(\cdot,\cdot,\cdot) \leq 0,$ and Assumption \ref{assumption} is not satisfied, we can use the properties of the exponential functions and rewrite \eqref{eqn:ObjectiveSumsOfExp} as \begin{equation*} \Iw_{N}(x_{0},\pi)=\sum_{i=1}^{i_{\max}}\mathbb{E}_{x_{0}}^{\pi}\left[\left(w^{i}e^{-2N\lambda_{i}|m_{i}|}\right)\sign(\lambda^{i})e^{\lambda^{i}\left[\sum_{n=0}^{N-1}C^{i}(X_{n},A_{n},X_{n+1})+2|m_{i}|\right]}\right] \end{equation*} \end{remark} Now problem $(P)$ falls in the framework of Section \ref{scn:model} that provides the means to calculate the optimal value and optimal policies. \bibliographystyle{apacite}
\section{Introduction}\label{sec:intro} The regression discontinuity (RD) design is one of the most credible strategies for estimating causal treatment effects in non-experimental settings. In an RD design, units receive a score (or running variable), and a treatment is assigned based on whether the score exceeds a known cutoff value: units with scores above the cutoff are assigned to the treatment condition, and units with scores below the cutoff are assigned to the control condition. This treatment assignment rule creates a discontinuity in the probability of receiving treatment which, under the assumption that units' average characteristics do not change abruptly at the cutoff, offers a way to learn about the causal treatment effect by comparing units barely above and barely below the cutoff. Despite the popularity and widespread use of RD designs, the evidence they provide has an important limitation: the RD causal effect is only identified for the very specific subset of the population whose scores are ``just'' above or below the cutoff, and is not necessarily informative or representative of what the treatment effect would be for units whose scores are far from the RD cutoff. Thus, by its very nature, the RD parameter is local and has limited external validity. We empirically illustrate the advantages and limitations of RD designs employing a recent study of the ACCES (\textit{Acceso con Calidad a la Educaci\'on Superior}) program by \citet{MelguizoSanchezVelasco2016-WD}. ACCES is a subsidized loan program in Colombia, administered by the Colombian Institute for Educational Loans and Studies Abroad (ICETEX), that provides tuition credits to underprivileged populations for various post-secondary education programs such as technical, technical-professional, and university degrees. In order to be eligible for an ACCES credit, students must be admitted to a qualifying higher education program, have good credit standing and, if soliciting the credit in the first or second semester of the higher education program, achieve a minimum score on a high school exit exam known as \textit{SABER 11}. In other words, to obtain ACCES funding students must have an exam score above a known cutoff. Students who are just below the exam cutoff are deemed ineligible, and therefore are not offered financial assistance. This discontinuity in program eligibility based on the exam score leads to a RD design: \citet{MelguizoSanchezVelasco2016-WD} found that students just above the threshold in SABER 11 test scores were significantly more likely to enroll in a wide variety of post-secondary education programs. The evidence from the original study is limited to the population of students around the cutoff. This standard causal RD treatment effect is informative in its own right but, in the absence of additional assumptions, it cannot be used to understand the effects of the policy for students whose test scores are outside the immediate neighborhood of the cutoff. Treatment effects away from the cutoff are useful for a variety of purposes, ranging from answering purely substantive questions to addressing practically important policy making decisions such as whether to roll-out the program or not. We propose a novel approach for estimating RD causal treatment effects away from the cutoff that determines treatment assignment. Our extrapolation approach is design-based as it exploits the presence of multiple RD cutoffs across different subpopulations to construct valid counterfactual extrapolations of the expected outcome of interest, given different scores levels, in the absence of treatment assignment. In sum, our approach imputes the average outcome in the absence of treatment of a treated subpopulation exposed to a given cutoff, using the average outcome of another subpopulation exposed to a higher cutoff. Assuming that the difference between these two average outcomes is constant as a function of the score, this imputation identifies causal treatment effects at score values higher than the lower cutoff. The rest of the article is organized as follows. The next section presents further details on the operation of the ACCES program, discusses the particular program design features that we use for the extrapolation of RD effects, and presents the intuitive idea behind our approach. In that section, we also discuss related literature on RD extrapolation as well as on estimation and inference. Section \ref{sec:methods} presents the main methodological framework and extrapolation results for the case of the ``Sharp'' RD design, which assumes perfect compliance with treatment assignment (or a focus on an intention-to-treat parameter). Section \ref{sec:analysis} applies our results to extrapolate the effect of the ACCES program on educational outcomes, while Section \ref{sec:simuls} illustrates our methods using simulated data. Section \ref{sec:extensions} presents an extension to the ``Fuzzy'' RD design, which allows for imperfect compliance. Section \ref{sec:conclusion} concludes. The supplemental appendix contains additional results, including further extensions and generalizations of our extrapolation methods. \section{The RD Design in the ACCES Program} The SABER 11 exam that serves as the basis for eligibility to the ACCES program is a national exam administered by the Colombian Institute for the Promotion of Postsecondary Education (ICFES), an institute within Colombia's National Ministry of Education. This exam may be taken in the fall or spring semester each year, and has a common core of mandatory questions in seven subjects---chemistry, physics, biology, social sciences, philosophy, mathematics, and language. To sort students according to their performance in the exam, ICFES creates an index based on the difference between (i) a weighted average of the standardized grades obtained by the student in each common core subject, and (ii) the within-student standard deviation across the standardized grades in the common core subjects. This index is commonly referred to as the SABER 11 score. Each semester of every year, ICFES calculates the 1,000-quantiles of the SABER 11 score among all students who took the exam that semester, and assigns a score between 1 and 1,000 to each student according to their position in the distribution---we refer to these scores as the SABER 11 position scores. Thus, the students in that year and semester whose scores are in the top 0.1\% are assigned a value of 1 (first position), the students whose scores are between the top 0.1\% and 0.2\% are assigned a value of 2 (second position), etc., and the students whose scores are in the bottom 0.1\% are assigned a value of 1,000 (the last position). Every year, the position scores are created separately for each semester, and then pooled. \citet{MelguizoSanchezVelasco2016-WD} provide further details on the Colombian education system and the ACCES program. In this sharp RD design, the running variable is the SABER 11 position score, denoted by $X_i$ for each unit $i$ in the sample, and the treatment of interest is receiving approval of the ACCES credit. Between $2000$ and $2008$, the cutoff to qualify for an ACCES credit was $850$ in all Colombian departments (the largest subnational administrative unit in Colombia, equivalent to U.S. states). To be eligible for the program, a student must have a SABER 11 position score at or below the 850 cutoff. \subsection{The Multi-Cutoff RD Design}\label{sec:multicutoffs} In the canonical RD design, a single cutoff is used to decide which units are treated. As we noted above, eligibility for the ACCES program between $2000$ and $2008$ followed this template, since the cutoff was $850$ for all students. However, in many RD designs, the same treatment is given to all units based on whether the RD score exceeds a cutoff, but different units are exposed to different cutoffs. This contrasts with the assignment rule in the standard RD design, in which all units face the same cutoff value. RD designs with multiple cutoffs, which we call Multi-Cutoff RD designs, are fairly common and have specific properties \citep{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP}. In $2009$, ICFES changed the program eligibility rule, and started employing different cutoffs across years and departments. Consequently, after $2009$, ACCES eligibility follows a Multi-Cutoff RD design: the treatment is the same throughout Colombia---all students above the cutoff receive the same financial credits for educational spending---but the cutoff that determines treatment assignment varies widely by department and changes each year, so that different sets of students face different cutoffs. This design feature is at the core of our approach for extrapolation of RD treatment effects. \subsection{The Pooled RD Effect of the ACCES Program}\label{sec:pooled} Multi-Cutoff RD designs are often analyzed as if they had a single cutoff. For example, in the original analysis, \citet{MelguizoSanchezVelasco2016-WD} redefined the RD running variable as distance to the cutoff, and analyzed all observations together using a common cutoff equal to zero. In fact, this normalizing-and-pooling approach \citep{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP}, which essentially ignores or ``averages over'' the multi-cutoff features of the design, is widespread in empirical work employing RD designs. See the supplemental appendix for a sample of recent papers that analyze RD designs with multiple cutoffs across various disciplines. We first present some initial empirical results using the normalizing-and-pooling approach as a benchmark for later analyses. The outcome we analyze is an indicator for whether the student enrolls in a higher education program, one of several outcomes considered in the original study by \citet{MelguizoSanchezVelasco2016-WD}. In order to maintain the standard definition of RD assignment as having a score above the cutoff, we multiply the SABER 11 position score by $-1$. We focus on the intention-to-treat effect of program eligibility on higher education enrollment, which gives a Sharp RD design. We discuss an extension to Fuzzy RD designs in Section \ref{sec:extensions}. We focus our analysis on the population of students exposed to two different cutoffs, $-850$ and $-571$. For our main analysis, we employ statistical methods for RD designs based on recent methodological developments in \citet{Calonico-Cattaneo-Titiunik_2014_ECMA,Calonico-Cattaneo-Titiunik_2015_JASA}, \citet{Calonico-Cattaneo-Farrell_2018_JASA,Calonico-Cattaneo-Farrell_2020_ECTJ,Calonico-Cattaneo-Farrell_2020_wp}, \citet{Calonico-Cattaneo-Farrell-Titiunik_2019_RESTAT}, and references therein. In particular, point estimators are constructed using mean squared error (MSE) optimal bandwidth selection, and confidence intervals are formed using robust bias correction (RBC). We provide details on estimation and inference in Section \ref{sec:estimation}. Figure \ref{fig:pld} reports two RD plots of the data, reporting linear and quadratic global polynomial approximations. Using RBC local polynomial inference, Table \ref{tab:results} reports that the pooled RD estimate of the ACCES program treatment effect on expected higher education enrollment is $0.125$, with corresponding $95\%$ RBC confidence interval $[0.012 , 0.219]$. These results indicate that, in our sample, students who barely qualify for the ACCES program based on their SABER 11 score are 12.5 percentage points more likely to enroll in a higher education program than students who are barely ineligible for the program. These results are consistent with the original positive effects of ACCES eligibility on higher education enrollment rates reported in \cite{MelguizoSanchezVelasco2016-WD}. However, the pooled RD estimate only pertains to a limited set of ACCES applicants: those whose scores are barely above or below one of the cutoffs. \citet{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP} show that the pooled RD estimand is a weighted average of cutoff-specific RD treatment effects for subpopulations facing different cutoffs. The empirical results for the pooled and cutoff-specific estimates can be seen in the upper panel of Table \ref{tab:results}. In our sample, the pooled estimate of 0.125 is a (linear in large samples) combination of two cutoff-specific RD estimates, one for units facing the low cutoff $-850$ and one for units facing the high cutoff $-571$. We provide a detailed analysis of these estimates in Section \ref{sec:analysis}. These cutoff-specific estimates are not directly comparable, as these magnitudes correspond not only to different values of the running variable but also to different subpopulations. We discuss next how the availability of multiple cutoffs can be exploited to learn about treatment effects far from the cutoff in the context of the ACCES policy intervention. \subsection{Using the Multi-Cutoff RD Design for Extrapolation} Our key contribution is to exploit the presence of multiple RD cutoffs to extrapolate the standard RD average treatment effects (at each cutoff) to students whose SABER 11 scores are away from the cutoff actually used to determine program eligibility. Our method relies on a simple idea: when different units are exposed to different cutoffs, different units with the same value of the score may be assigned to different treatment conditions, relaxing the strict lack of overlap between treated and control scores that is characteristic of the single-cutoff RD design. For example, consider the simplest Multi-Cutoff RD design with two cutoffs, $\L$ and $\H$, with $\L < \H$, where we wish to estimate the average treatment effect at a point $\bar{x} \in (\L,\H)$. Units exposed to $\L$ receive the treatment according to $\mathbbm{1}(X_i\ge \L)$, where $X_i$ is unit's $i$ score and $\mathbbm{1}(.)$ is the indicator function, so they are all treated at $X=\bar{x}$. However, the same design contains units who receive the treatment according to $\mathbbm{1}(X_i\ge \H)$, so they are controls at both $X=\bar{x}$ and $X=\L$. Our idea is to compare the observable difference in the control groups at the low cutoff $\L$, and assume that the same difference in control groups occurs at the interior point $\bar{x}$. This allows us to identify the average treatment effect for all score values between the cutoffs $\L$ and $\H$. Our identifying idea is analogous to the ``parallel trends'' assumption in difference-in-difference designs \citep[see, e.g.,][and references therein]{Abadie_2005_RES}, but over a continuous dimension---that is, over the values of the continuous score variable $X_i$. \subsection{Related Literature\label{sec:literature}} We contribute to the causal inference and program evaluation literatures \citep{Imbens-Rubin_2015_Book,Abadie-Cattaneo_2018_ARE} and, more specifically, to the methodological literature on RD designs. See \cite{Imbens-Lemieux_2008_JoE}, \cite{Cattaneo-Titiunik-VazquezBare_2017_JPAM}, \cite{Cattaneo-Titiunik-VazquezBare_2020_Sage} and \cite{Cattaneo-Idrobo-Titiunik_2019_Book,Cattaneo-Idrobo-Titiunik_2020_Book}, for literature reviews, background references, and practical introductions. Our paper adds to the recent literature on RD treatment effect extrapolation methods, a nonparametric identification problem in causal inference. This strand of the literature can be classified into two groups: strategies assuming the availability of external information, and strategies based only on information from within the research design. Approaches based on external information include \cite{Mealli-Rampichini_2012_JRSSA}, \cite{WingCook2013-JPAM}, \cite{Rokkanen2015-wp}, and \cite{AngristRokkanen2015-JASA}. The first two papers rely on a pre-intervention measure of the outcome variable, which they use to impute the treated-control differences of the post-intervention outcome above the cutoff. \cite{Rokkanen2015-wp} assumes that multiple measures of the running variable are available, and all measures capture the same latent factor; identification relies on the assumption that the potential outcomes are conditionally independent of the available measurements given the latent factor. \cite{AngristRokkanen2015-JASA} rely on pre-intervention covariates, assuming that the running variable is ignorable conditional on the covariates over the whole range of extrapolation. All these approaches assume the availability of external information that is not part of the original RD design. In contrast, the extrapolation approaches in \cite{Dong-Lewbel_2015_ReStat} and \citet{Bertanha-Imbens_2020_JBES} require only the score and outcome in the standard (single-cutoff) RD design. \cite{Dong-Lewbel_2015_ReStat} assume mild smoothness conditions to identify the derivatives of the average treatment effect with respect to the score, which allows for a local extrapolation of the standard RD treatment effect to score values marginally above the cutoff. \citet{Bertanha-Imbens_2020_JBES} exploit variation in treatment assignment generated by imperfect treatment compliance imposing independence between potential outcomes and compliance types to extrapolate a single-cutoff fuzzy RD treatment effect (i.e., a local average treatment effect at the cutoff) away from the cutoff. Our paper also belongs to this second type, as it relies on within-design information, using only the score and outcome in the Multi-Cutoff RD design. \citet{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP} introduced the causal Multi-Cutoff RD framework, which we employ herein, and studied the properties of normalizing-and-pooling estimation and inference in that setting. Building on that paper, \citet{Bertanha_2020_JoE} discusses estimation and inference of an average treatment effect across multi-cutoffs, assuming away cutoff-specific treatment effect heterogeneity. Neither of these papers addressed the topic of RD treatment effect extrapolation across different levels of the score variable, which is the main goal and innovation of the present paper. All the papers mentioned above focus on extrapolation of RD treatment effects away from the cutoff by relying on continuity-based methods for identification, estimation and inference, which are implemented using local polynomial regression \citep{Fan-Gijbels_1996_Book}. As pointed out by a reviewer, an alternative approach to analyzing RD designs is to employ the local randomization framework introduced by \cite{Cattaneo-Frandsen-Titiunik_2015_JCI}. This framework has been later used in the context of geographic RD designs \citep{Keele-Titiunik-Zubizarreta_2015_JRSSA}, principal stratification \citep{Li-Mattei-Mealli_2015_AoAS}, and kink RD designs \citep{Ganong-Jager_2018_JASA}, among other settings. More recently, this alternative RD framework was expanded to allow for finite-sample falsification testing and for local regression adjustments \citep{Cattaneo-Titiunik-VazquezBare_2017_JPAM}. See also \cite{Sekhon-Titiunik_2016_ObsStud,Sekhon-Titiunik_2017_AIE} for further conceptual discussions, \cite{Cattaneo-Titiunik-VazquezBare_2020_Sage} for another review, and \cite{Cattaneo-Idrobo-Titiunik_2020_Book} for a practical introduction. Local randomization RD methods implicitly give extrapolation within the neighborhood where local randomization is assumed to hold because they assume a parametric (usually constant) treatment effect model as a function of the score. However, those methods cannot aid in extrapolating RD treatment effects beyond such neighborhood without additional assumptions, which is precisely our goal. Since local randomization methods explicitly view RD designs as local randomized experiments, we can summarize the key conceptual distinction between that literature and our paper as follows: available local randomization methods for RD designs have only internal validity (i.e., within the local randomization neighborhood), while our proposed method seeks to achieve external validity (i.e., outside the local randomization neighborhood), which we achieve by exploiting the presence of multiple cutoffs (akin to multiple local experiments) together with an additional identifying assumption within the continuity-based approach to RD designs (i.e., parallel control regression functions across cutoffs). Our core extrapolation idea can be developed within the local randomization framework, albeit under considerably stronger assumptions. To conserve space, in the supplemental appendix, we discuss multi-cutoff extrapolation of RD treatment effects using local randomization ideas, and develop randomization-based estimation and inference methods \citep{Rosenbaum_2010_Book,Imbens-Rubin_2015_Book}. We also empirically illustrate these methods in the supplemental appendix. \section{Extrapolation in Multi-Cutoff RD Designs} \label{sec:methods} We assume $(Y_i,X_i,C_i,D_i)$, $i=1,2,\dots,n$, is an observed random sample, where $Y_i$ is the outcome of interest, $X_i$ is the score (or running variable), $C_i$ is the cutoff indicator, and $D_i$ is a treatment status indicator. We assume the score has a continuous positive density $f_X(x)$ on the support $\mathcal X$. Unlike the canonical RD design where the cutoff is a fixed scalar, in the Multi-Cutoff RD design the cutoff faced by unit $i$ is the random variable $C_i$ taking values in a set $\mathcal C\subset \mathcal X$. For simplicity, we consider two cutoffs: $\mathcal{C} = \{\L,\H\}$, with $\L<\H$ and $\L,\H \in \mathcal X$. Extensions to more than two cutoffs and to geographic and multi-score RD designs are conceptually straightforward, and hence discussed in the supplemental appendix. The conditional density of the score at each cutoff is $f_{X|C}(x|c)$, $c\in\mathcal C$. In sharp RD designs treatment assignment and status are identical, and hence $D_i=\mathbbm{1}(X_i\ge C_i)$. Section \ref{sec:extensions} discusses an extension to fuzzy RD designs. Finally, we let $Y_{i}(1)$ and $Y_{i}(0)$ denote the potential outcomes of unit $i$ under treatment and control, respectively, and $Y_i=D_iY_{i}(1)+(1-D_i)Y_{i}(0)$ is the observed outcome. The potential outcome regression functions are $\mu_{d,c}(x) = \mathbbm{E}[Y_{i}(d)|X_i=x,C_i=c]$, for $d=0,1$. We express all parameters of interest in terms of the ``response'' function \begin{equation}\label{cef} \tau_c(x) =\mathbbm{E}[Y_i(1)-Y_i(0)\mid X_i=x,C_i=c]. \end{equation} This function measures the treatment effect for the subpopulation exposed to cutoff $c$ when the running variable takes the value $x$. For a fixed cutoff $c$, it records how the treatment effect for the subpopulation exposed to this cutoff varies with the running variable. As such, it captures a key quantity of interest when extrapolating the RD treatment effect. The usual parameter of interest in the standard (single-cutoff) RD design is a particular case of $\tau_c(x)$ when cutoff and score coincide: \begin{equation*}\label{eq:RD-single} \tau_c(c)=\mathbbm{E}[Y_i(1)-Y_i(0)\mid X_i=c,C_i=c]=\mu_{1,c}(c)-\mu_{0,c}(c) \text{.} \end{equation*} It is well known that, via continuity assumptions, the function $\tau_c(x)$ is nonparametrically identifiable at the single point $x=c$. Our approach exploits the presence of multiple cutoffs to identify this function at other points on a portion of the support of the score variable. Figure \ref{fig:estimands} contains a graphical representation of our extrapolation approach for Multi-Cutoff RD designs. In the plot, there are two populations, one exposed to a low cutoff $\L$, and another exposed to a high cutoff $\H$. The RD effects for each subpopulation are, respectively, $\tau_\L(\L)$ and $\tau_\H(\H)$. We seek to learn about the effects of the treatment at points other than the particular cutoff to which units were exposed, such as the point $\bar{x}$ in Figure \ref{fig:estimands}. Below, we develop a framework for the identification of $\tau_\L(x)$ for $\L<x\leq\H$ so that we can assess what would have been the average treatment effect for the subpopulation exposed to the cutoff $\L$ at score values above $\ell$ (illustrated by the effect $\tau_\L(\bar{x})$ in Figure \ref{fig:estimands} for the intermediate point $X_i=\bar{x}$). In our framework, the multiple cutoffs define different subpopulations. In some cases, the cutoff to which a unit is exposed depends only on characteristics of the units, such as when the cutoffs are cumulative and increase as the score falls in increasingly higher ranges. In other cases, the cutoff depends on external features, such as when different cutoffs are used in different geographic regions or time periods. This means that, in our framework, the cutoff $C_i$ acts as an index for different subpopulation ``types'', capturing both observed and unobserved characteristics of the units. Given the subpopulations defined by the cutoff values actually used in the Multi-Cutoff RD design, we consider the effect that the treatment would have had for those subpopulations had the units had a higher score value than observed. This is why, in our notation, the index for the cutoff value is fixed, and the index for the score is allowed to vary and is the main argument of the regression functions. This conveys the idea that the subpopulations are defined by the multiple cutoffs actually employed, and our exercise focuses on studying the treatment effect at different score values for those pre-defined subpopulations. For example, this setting covers RD designs with a common running variable but with cutoffs varying by regions, schools, firms, or some other group-type variable. Our method is not appropriate to extrapolate to populations outside those defined by the Multi-Cutoff RD design. \subsection{Identification Result} The main challenge to the identification of extrapolated treatment effects in the single-cutoff (sharp) RD design is the lack of observed control outcomes for score values above the cutoff. In the Multi-Cutoff RD design, we still face this challenge for a given subpopulation, but we have other subpopulations exposed to higher cutoff values that, under some assumptions, can aid in solving the missing data problem and identify average treatment effects. Before turning to the formal derivations, we illustrate the idea graphically. Figure \ref{fig:constantbias} illustrates the regression functions for the populations exposed to cutoffs $\L$ and $\H$, with the function $\mu_{1,\H}(x)$ omitted for simplicity. We seek an estimate of $\tau_\L(\bar{x})$, the average effect of the treatment at the point $\bar{x} \in (\L,\H)$ for the subpopulation exposed to the lower cutoff $\L$. In the figure, this parameter is represented by the segment $\overline{ab}$. The main identification challenge is that we only observe the point $a$, which corresponds to $\mu_{1,\L}(\bar{x})$, the treated regression function for the population exposed to $\L$, but we fail to observe its control counterpart $\mu_{0,\L}(\bar{x})$ (point $b$), because all units exposed to cutoff $\L$ are treated at any $x > \L$. We use the control group of the population exposed to the higher cutoff, $\H$, to infer what would have been the control response at $\bar{x}$ of units exposed to the lower cutoff $\L$. At the point $X_i = \bar{x}$, the control response of the population exposed to $\H$ is $\mu_{0,\H}(\bar{x})$, which is represented by the point $c$ in Figure \ref{fig:constantbias}. Since all units in this subpopulation are untreated at $\bar{x}$, the point $c$ is identified by the average observed outcomes of the control units in the subpopulation $\H$ at $\bar{x}$. Of course, units facing different cutoffs may differ in both observed and unobserved ways. Thus, there is generally no reason to expect that the average control outcome of the population facing cutoff $\H$ will be a good approximation to the average control outcome of the population facing cutoff $\L$. This is captured in Figure \ref{fig:constantbias} by the fact that $\mu_{0,\L}(\bar{x})\equiv b \neq c \equiv \mu_{0,\H}(\bar{x})$. This difference in untreated potential outcomes for units facing different cutoffs can be interpreted as a bias driven by differences in observed and unobserved characteristics of the different subpopulations, analogous to ``site selection'' bias in multiple randomized experiments. We formalize this idea with the following definition. \begin{definition}[Cutoff Bias] \label{seldef} $B(x,c,c')=\mu_{0,c}(x)-\mu_{0,c'}(x)$, for $c,c'\in \mathcal C$. There is bias from exposure to different cutoffs if $B(x,c,c')\ne 0$ for some $c,c'\in \mathcal C$, $c\ne c'$ and for some $x \in \mathcal X$. \end{definition} Table \ref{tab:FigParams} defines the parameters associated with the corresponding segments in Figure \ref{fig:constantbias}. The parameter of interest, $\tau_\L(\bar{x})$, is unobservable because we fail to observe $\mu_{0,\L}(\bar{x})$. If we replaced $\mu_{0,\L}(\bar{x})$ with $\mu_{0,\H}(\bar{x})$, we would be able to estimate the distance $\overline{ac}$. This distance, which is observable, is the sum of the parameter of interest, $\tau_\L(\bar{x})$, plus the bias $B(\bar{x},c,c')$ that arises from using the control group in the $\H$ subpopulation instead of the control group in the $\L$ subpopulation. Graphically, $\overline{ac} = \overline{ab} + \overline{bc}$. Since we focus on the two-cutoff case, we denote the bias by $B(\bar{x})$ to simplify the notation. We use the distance between the control groups facing the two different cutoffs at a point where both are observable, to approximate the unobservable distance between them at $\bar{x}$---that is, to approximate the bias $B(\bar{x})$. As shown in the figure, at $\L$, all units facing cutoff $\H$ are controls and all units facing cutoff $\L$ are treated. But under standard RD assumptions, we can identify $\mu_{0,\L}(\L)$ using the observations in the $\L$ subpopulation whose scores are just below $\L$. Thus, the bias term $B(\L)$, captured in the distance $\overline{ed}$, is estimable from the data. Graphically, we can identify the extrapolation parameter $\tau_\L(\bar{x})$ assuming that the observed difference between the control functions $\mu_{0,\L}(\cdot)$ and $\mu_{0,\H}(\cdot)$ at $\L$ is constant for all values of the score: \begin{align*} \overline{ac} - \overline{ed} & = \left\{ \mu_{1,\L}(\bar{x}) - \mu_{0,\H}(\bar{x})\right\} - \left\{ \mu_{0,\L}(\L) - \mu_{0,\H}(\L)\right\}\\ & = \left\{ \tau_\L(\bar{x}) + B(\bar{x})\right\} - \left\{ B(\L) \right\}\\ & = \tau_\L(\bar{x}) \text{.} \end{align*} We now formalize this intuitive result employing standard continuity assumptions on the relevant regression functions. We make the following assumptions. \begin{assumption}[Continuity]\label{assu:continuity} $\mu_{d,c}(x)$ is continuous in $x\in [\L,\H]$ for $d=0,1$ and for all $c$. \end{assumption} The observed outcome regression functions are $\mu_c(x) = \mathbbm{E}[Y_i|X_i=x,C_i=c]$, for $c\in\mathcal C= \{\L, \H\}$, and note that by standard RD arguments $\mu_{0,c}(c) = \lim_{\varepsilon \uparrow 0} \mu_{c}(c+\varepsilon)$ and $\mu_{1,c}(c) = \lim_{\varepsilon \downarrow 0} \mu_{c}(c+\varepsilon)$. Furthermore, $\mu_{0,\H}(x) = \mu_{\H}(x)$ and $\mu_{1,\L}(x) = \mu_{\L}(x)$ for all $x \in (\L, \H)$. Our main extrapolation assumption requires that the bias not be a function of the score, which is analogous to the parallel trends assumption in the difference-in-differences design. \begin{assumption}[Constant Bias]\label{assu:constantbias} $B(\L) = B(x)$ for all $x \in (\L, \H)$. \end{assumption} While technically our identification result only needs this condition to hold at $x=\bar{x}$, in practice it may be hard to argue that the equality between biases holds at a single point. Combining the constant bias assumption with the continuity-based identification of the conditional expectation functions allows us to express the unobservable bias for an interior point, $\bar{x} \in (\L,\H)$, as a function of estimable quantities. The bias at the low cutoff $\L$ can be written as \begin{align*} B(\L) &= \lim_{\varepsilon\uparrow 0}\mu_{\L}(\L+\varepsilon) - \mu_{\H}(\L) \text{.} \end{align*} Under Assumption \ref{assu:constantbias}, we have \[\mu_{0,\L}(\bar{x}) = \mu_{\H}(\bar{x}) + B(\L), \qquad \bar{x} \in (\L,\H),\] that is, the average control response for the $\L$ subpopulation at the interior point $\bar{x}$ is equal to the average observed response for the $\H$ subpopulation at the same point, plus the difference in the average control responses between both subpopulations at the low cutoff $\L$. This leads to our main identification result. \begin{theorem}[Extrapolation]\label{thm:extrapol} Under Assumptions \ref{assu:continuity} and \ref{assu:constantbias}, for any point $\bar{x} \in (\L,\H )$, \[\tau_{\L}(\bar{x}) = \mu_{\L}(\bar{x}) - [\mu_{\H}(\bar{x}) + B(\L)].\] \end{theorem} This result can be extended to hold for $\bar{x}\in(\L,\H]$ by using side limits appropriately. In Section \ref{sec:paralleltrends}, we discuss two approaches to provide empirical support for the constant bias assumption. We extend our result to Fuzzy RD designs in Section \ref{sec:extensions}, and allow for non-parallel control regression functions and pre-intervention covariate-adjustment in the supplemental appendix. While we develop our core idea for extrapolation from ``left to right'', that is, from a low cutoff to higher values of the score, it follows from the discussion above that the same ideas could be developed for extrapolation from ``right to left''. Mathematically, the problem is symmetric and hence both extrapolations are equally viable. However, conceptually, there is an important asymmetry. Theorem \ref{thm:extrapol} requires the regression functions for \textit{control} units to be parallel over the extrapolation region (Assumption \ref{assu:constantbias}), while a version of this theorem for ``right to left'' extrapolation would require that the regression functions for \textit{treated} units be parallel. These two identifying assumptions are not symmetric because the latter effectively imposes a constant treatment effect assumption across cutoffs (for different values of the score), while the former does not because it pertains to control units only. \subsection{Estimation and Inference}\label{sec:estimation} We estimate all (identifiable) conditional expectations $\mu_{d,c}(x)=\mathbbm{E}[Y_i(d)|X_i=x,C_i=c]$ using nonparametric local polynomial methods, employing second-generation MSE-optimal bandwidth selectors and robust bias correction inference methods. See \citet{Calonico-Cattaneo-Titiunik_2014_ECMA}, \citet{Calonico-Cattaneo-Farrell_2018_JASA,Calonico-Cattaneo-Farrell_2020_ECTJ,Calonico-Cattaneo-Farrell_2020_wp}, and \cite{Calonico-Cattaneo-Farrell-Titiunik_2019_RESTAT} for more methodological details, and \citet{Calonico-Cattaneo-Farrell-Titiunik_2017_Stata} and \citet{Calonico-Cattaneo-Farrell_2019_JSS} for software implementation. See also \citet{Hyytinen-etal_2018_QE}, \citet{Ganong-Jager_2018_JASA} and \citet{Dong-Lee-Gou_2020_wp} for some recent applications and empirical testing of those methods. To be more precise, a generic local polynomial estimator is $\hat{\mu}_{d,c}(x)=\mathbf{e}_0'\hat{\boldsymbol{\beta}}_{d,c}(x)$, where \[\hat{\boldsymbol{\beta}}_{d,c}(x) = \argmin_{\mathbf{b}\in\mathbbm{R}^{p+1}}\sum_{i=1}^n(Y_i-\mathbf{r}_p(X_i-x)'\mathbf{b})^2K\left(\frac{X_i-x}{h}\right)\mathbbm{1}(C_i=c)\mathbbm{1}(D_i=d),\] $\mathbf{e}_0$ is a vector with a one in the first position and zeros in the rest, $\mathbf{r}_p(\cdot)$ is a polynomial basis of order $p$, $K(\cdot)$ is a kernel function, and $h$ a bandwidth. For implementation, we set $p=1$ (local-linear), $K$ to be the triangular kernel, $h$ to be a MSE-optimal bandwidth selector, unless otherwise noted. Then, given the two cutoffs $\L$ and $\H$ and an extrapolation point $\bar{x}\in(\L,\H]$, the extrapolated treatment effect at $\bar{x}$ for the subpopulation facing cutoff $\L$ is estimated as \[\hat{\tau}_\L(\bar{x}) =\hat{\mu}_{1,\L}(\bar{x})-\hat{\mu}_{0,\H}(\bar{x})-\hat{\mu}_{0,\L}(\L)+\hat{\mu}_{0,\H}(\L). \] The estimator $\hat{\tau}_\L(\bar{x})$ is a linear combination of nonparametric local polynomial estimators at boundary and at interior points depending on the choice of $\bar{x}$ and data availability. Hence, optimal bandwidth selection and robust bias-corrected inference can be implemented using the methods and software mentioned above. By construction, $\hat{\mu}_{d,\L}(\cdot)$ and $\hat{\mu}_{0,\H}(\cdot)$ are independent because the observations used for estimation come from different subpopulations. Similarly, $\hat{\mu}_{0,\L}(\cdot)$ and $\hat{\mu}_{1,\L}(\cdot)$ are independent since the first term is estimated using control units whereas the second term uses treated units. On the other hand, in finite samples, $\hat{\mu}_{0,\H}(\L)$ and $\hat{\mu}_{0,\H}(\bar{x})$ can be correlated if the bandwidths used for estimation overlap (or, alternatively, if $\L$ and $\bar{x}$ are close enough), in which case we account for such correlation in our inference results. More precisely, $\mathbbm{V}[\hat{\tau}_\L(\bar{x})|\mathbf{X}] =\mathbbm{V}[\hat{\mu}_{1,\L}(\bar{x})|\mathbf{X}] +\mathbbm{V}[\hat{\mu}_{0,\H}(\bar{x})|\mathbf{X}] +\mathbbm{V}[\hat{\mu}_{0,\L}(\L)|\mathbf{X}] +\mathbbm{V}[\hat{\mu}_{0,\H}(\L)|\mathbf{X}] -2\mathbbm{C}\mathrm{ov}(\hat{\mu}_{0,\H}(\L),\hat{\mu}_{0,\H}(\bar{x})|\mathbf{X})$, where $\mathbf{X}=(X_1,X_2,\dots,X_n)'$. Precise regularity conditions for large sample validity of our estimation and inference methods can be found in the references given above. The replication files contain details on practical implementation. \subsection{Assessing the Validity of the Identifying Assumption}\label{sec:paralleltrends} Assessing the validity of our extrapolation strategy should be a key component of empirical work using these methods. In general, while the assumption of constant bias is not testable, this assumption can be tested indirectly via falsification. While a falsification test cannot demonstrate that an assumption holds, it can provide persuasive evidence that an assumption is implausible. We now discuss two strategies for falsification tests to probe the credibility of the constant bias assumption that is at the center of our extrapolation approach. The first falsification approach relies on a global polynomial regression. We test globally whether the conditional expectation functions of the two control groups are parallel below the lowest cutoff. One way to implement this idea, given the two cutoff points $\L < \H$, is to test $\boldsymbol{\delta}=\mathbf{0}$ based on the regression model \[Y_i = \alpha + \beta\mathbbm{1}(C_i=\H) + \mathbf{r}_p(X_i)'\boldsymbol{\gamma} + \mathbbm{1}(C_i=\H)\mathbf{r}_p(X_i)'\boldsymbol{\delta} + u_i, \qquad \mathbbm{E}[u_i|X_i,C_i]=0, \] only for units with $X_i<\L$. In words, we employ a $p$-th order global polynomial model to estimate the two regression functions $\mathbbm{E}[Y_i|X_i=x,X_i<\L,C_i=\L]$ and $\mathbbm{E}[Y_i|X_i=x,X_i<\L,C_i=\H]$, separately, and construct a hypothesis test for whether they are equal up to a vertical shift (i.e., the null hypothesis is $\mathsf{H}_0:\boldsymbol{\delta}=\mathbf{0}$). This approach is valid under standard regularity conditions for parametric least squares regression. This approach could also be justified from a nonparametric series approximation perspective, under additional regularity conditions. The second falsification approach employs nonparametric local polynomial methods. We test for equality of the derivatives of the conditional expectation functions for values $x<\L$. Specifically, we test for $\mu^{(1)}_{\L}(x)=\mu^{(1)}_\H(x)$ for all $x<\L$, where $\mu^{(1)}_{\L}(x)$ and $\mu^{(1)}_{\H}(x)$ denote the derivatives of $\mathbbm{E}[Y_i|X_i=x,X_i<\L,C_i=\L]$ and $\mathbbm{E}[Y_i|X_i=x,X_i<\L,C_i=\H]$, respectively. This test can be implemented using several evaluation points, or using a summary statistic such as the supremum. Validity of this approach is also justified using nonparametric estimation and inference results in the literature, under regularity conditions. \section{Extrapolating the Effect of Loan Access on College Enrollment}\label{sec:analysis} We use our proposed methods to investigate the external validity of the ACCES program RD effects. As mentioned above, our sample has observations exposed to two cutoffs, $\L = -850$ and $\H = -571$. We begin by extrapolating the effect to the point $\bar{x} = -650$; our focus is thus the effect of eligibility for ACCES on whether the student enrolls in a higher education program for the subpopulation exposed to cutoff 850 when their SABER 11 score is $650$. As described in Section \ref{sec:multicutoffs}, the observations facing cutoff $\L$ correspond to years 2000 to 2008, whereas observations facing cutoff $\H$ correspond to years 2009 and 2010. Our identification assumption allows these two groups to differ in observable and unobservable characteristics so long as the difference between the conditional expectations of their control potential outcomes is constant as a function of the running variable. In addition, our approach relies on the assumption that the underlying population does not change over time (which is implicit in our notation). We offer empirical support for these assumptions in two ways. First, we implement the tests discussed in Section \ref{sec:paralleltrends} to assess the plausibility of Assumption \ref{assu:constantbias}. In addition, Section SA-2 in the Supplemental Appendix shows that our results remain qualitatively unchanged when restricting the empirical analysis to the period 2007-2010, which reduces the (potential) heterogeneity of the underlying populations over time. We begin by assessing the validity of our constant bias assumption with the methods described in Section \ref{sec:paralleltrends}. The results can be seen in Tables \ref{tab:trendsgl} and \ref{tab:trendsloc}. Specifically, Table \ref{tab:trendsgl} reports results employing global polynomial regression, which does not reject the null hypothesis of parallel trends. Figure \ref{fig:rdmcplot_trends} offers a graphical illustration. Table \ref{tab:trendsloc} shows the results for the local polynomial approach, which again does not reject the null hypothesis. Additionally, Figure \ref{fig:rdmcplot_trends_deriv} plots the difference in derivatives (solid line) between groups estimated nonparametrically at ten evaluation points below $\L$, along with pointwise robust bias-corrected confidence intervals (dashed lines). The figure reveals that the difference in derivatives is not significantly different from zero. As discussed in Section \ref{sec:pooled} and Table \ref{tab:results}, the pooled RD estimated effect is 0.125 with a RBC confidence interval of $[0.012,0.219]$. The single-cutoff effect at $-850$ is $0.137$ with $95\%$ RBC confidence interval of $[0.036,0.232]$, and the effect at $-571$ is somewhat higher at $0.169$, with $95\%$ RBC confidence interval of $[-0.039 , 0.428]$. These estimates based on single-cutoffs are illustrated in Figures \ref{fig:RD-results}(\subref{subfig:lowC}) and \ref{fig:RD-results}(\subref{subfig:highC}), respectively. In finite samples, the pooled estimate may not be a weighted average of the cutoff-specific estimates as it contains an additional term that depends on the bandwidth used for estimation and small sample discrepancies between the estimated slopes for each group. This is evident in Table \ref{tab:results}, where the pooled estimate does not lie between the cutoff specific estimates. This additional term vanishes as the sample size grows and the bandwidths converge to zero, yielding the result in \citet{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP}. To provide further evidence on the overall effect of the program, we also estimated a weighted average of cutoff-specific effects using estimated weights. This average effect equals 0.156 with a RBC confidence interval of $[0.025,0.314]$. Since this estimate is a proper weighted average of cutoff-specific effects, it may give a more accurate assessment of the overall effect of the program. The extrapolation results are illustrated in Figure \ref{fig:RD-results}(\subref{subfig:extrapol}) and reported in the last two panels of Table \ref{tab:results}. At the $-650$ cutoff, the treated population exposed to cutoff $-850$ has an enrollment rate of $0.756$, while the control population exposed to cutoff $-571$ has a rate of $0.706$. This naive comparison, however, is likely biased due to unobservable differences between both subpopulations. The bias, which is estimated at the low cutoff $-850$, is $-0.142$, showing that the control population exposed to the $-850$ cutoff has lower enrollment rates at that point than the population exposed to the high cutoff $-571$ (0.525 versus 0.667). The extrapolated effect in the last row corrects the naive comparison according to Theorem \ref{thm:extrapol}. The resulting extrapolated effect is $0.756 - (0.706 - 0.142) = 0.191$ with RBC confidence interval of $[ 0.080, 0.336]$. The choice of the point $-650$ is simply for illustration purposes, and indeed considering a set of evaluation points for extrapolation can give a much more complete picture of the impact of the program away from the cutoff point. In Figures \ref{fig:extrapol} and \ref{fig:teffects}, we conduct this analysis by estimating the extrapolated effect at 14 equidistant points between $-840$ and $-580$. The effects are statistically significant, ranging from around $0.14$ to $0.25$. \section{Simulations}\label{sec:simuls} We report results from a simulation study aimed to assess the performance of the local polynomial methods described in Section \ref{sec:estimation}. We construct $\mu_{0,\H}(x)$ as a fourth-order polynomial where the coefficients are calibrated using the data from our empirical application, and $\mu_{0,\ell}(x) = \mu_{0,\H}(x) + \Delta$. Based on our empirical findings, we set $\Delta=-0.14$ and an extrapolated treatment effect of $\tau_\ell(\bar{x})=0.19$. We consider three sample sizes: $N=1,000$ (``small N''), $N=2,000$ (``moderate N''), and $N=5,000$ (``large N''). To assess the effect of unbalanced sample sizes across evaluation points/cutoffs, our simulation model ensures that some evaluation points/cutoffs have fewer observations than others. In particular, the available sample size to estimate $\mu_\ell(\ell)$ is always less than a third of the sample size available to estimate $\mu_\H(\bar{x})$. We provide all details in the supplemental appendix to conserve space. The results are shown in Table \ref{tab:simul}. The robust bias-corrected $95\%$ confidence interval for $\tau_\ell(\bar{x})$ has an empirical coverage rate of around 91 percent in the ``small N'' case. This is because one of the parameters, $\mu_\ell(\ell)$, is estimated using very few observations. The empirical coverage rate increases slightly to 92 percent in the ``moderate N'' case, and to about 94 percent in the ``large N'' case. In sum, in our Monte Carlo experiment, we find that local polynomial methods can yield estimators with little bias and RBC confidence intervals with accurate coverage rates for RD extrapolation. \section{Extension to Fuzzy RD Designs} \label{sec:extensions} The main idea underlying our extrapolation methods can be extended in several directions that may be useful in other applications. We briefly discuss an extension to Fuzzy RD designs employing a continuity-based approach. In the supplemental appendix we discuss other extensions: covariate adjustments (i.e., ignorable cutoff bias), score adjustments (i.e., polynomial-in-score cutoff bias), many multiple cutoffs, and multiple scores and geographic RD designs. In the Fuzzy RD design, treatment compliance is imperfect, which is common in empirical applications. For simplicity, we focus on the case of one-sided (treatment) non-compliance: units assigned to the control group comply with their assignment but units assigned to treatment status may not. This case is relevant for a wide array of empirical applications in which program administrators are able to successfully exclude units from the treatment, but cannot force units to actually comply with it. We employ the Fuzzy Multi-Cutoff RD framework of \citet{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP}, which builds on the canonical framework of \citet{AngristImbensRubin1996-JASA}. Let $D_i(x,c)$ be the binary treatment indicator and $\underline{x}\leq\bar{x}$. We define compliers as units with $D_i(\underline{x},c)<D_i(\bar{x},c)$, always-takers as units with $D_i(\underline{x},c)=D_i(\bar{x},c)=1$, never-takers as units with $D_i(\underline{x},c)=D_i(\bar{x},c)=0$, and defiers as units with $D_i(\underline{x},c)>D_i(\bar{x},c)$. We assume the following conditions: \begin{assumption}[Fuzzy RD Design]\label{assu:fuzzy}$ $ \begin{enumerate} \item Continuity: $\mathbbm{E}[Y_i(0)|X_i=x,C_i=c]$ and $\mathbbm{E}[(Y_i(1)-Y_i(0))D_i(x,c)|X_i=x,C_i=c]$ are continuous in $x$ for all $c$. \item Constant bias: $B(\L) = B(x)$ for all $x \in (\L, \H)$. \item Monotonicity: $D_i(\underline{x},c) \leq D_i(\bar{x},c)$ for all $i$ and for all $\underline{x}\leq\bar{x}$. \item One-sided noncompliance: $D_i(x,c)=0$ for all $x<c$. \end{enumerate} \end{assumption} The conditions are standard in the fuzzy RD literature and used to identify the local average treatment effect (LATE), which is the treatment effect for units that comply with the RD assignment. The following result shows how to recover a LATE-type extrapolation parameter in this fuzzy RD setting. \begin{theorem}\label{thm:fuzzy} Under Assumption \ref{assu:fuzzy}, \[\frac{\mu_{\L}(\bar{x}) - [\mu_{\H}(\bar{x}) + B(\L)]}{\mathbbm{E}[D_i|X_i=x,C_i=\L]}=\mathbbm{E}[Y_i(1)-Y_i(0)|X_i=x,C_i=\L,D_i(x,\L)=1].\] \end{theorem} The left-hand side can be interpreted as an ``adjusted'' Wald estimand, where the adjustment allows for extrapolation away from the cutoff point $\L$. More precisely, this theorem shows that under one-sided (treatment) noncompliance we can recover the average extrapolated effect on compliers by dividing the adjusted intention-to-treat parameter by the proportion of compliers. \section{Conclusion} \label{sec:conclusion} We introduced a new framework for the extrapolation of RD treatment effects when the RD design has multiple cutoffs. Our approach relies on the assumption that the average outcome difference between control groups exposed to different cutoffs is constant over a chosen extrapolation region. Our method does not require any information external to the design, and can be used whenever two or more cutoffs are used to assign the treatment for different subpopulations, which is a very common feature in many RD applications. Our main extrapolation idea can also be used in settings with more than two cutoffs, multi-scores RD designs \citep{PapayWillettMurnane2011-JoE,ReardonRobinson2012-JREE}, and geographic RD designs \citep{Keele-Titiunik_2015_PA}. In addition, our main idea can be extended to the RD local randomization framework introduced by \cite{Cattaneo-Frandsen-Titiunik_2015_JCI} and \cite{Cattaneo-Titiunik-VazquezBare_2017_JPAM}. These additional results are reported in the supplemental appendix for brevity. \onehalfspacing \bibliographystyle{jasa} \section{Empirical Examples of Multi-Cutoff RD Designs} Table \ref{tab:litreview} collects over $30$ empirical papers in social, behavioral and biomedical sciences, where RD designs with multiple cutoffs are present. In most of these papers, the multi-cutoff feature of the RD designs was not exploited, but rather a pooling-and-normalizing approach was taken to conduct the empirical analysis \citep[see][for methodological background]{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP}. \begin{table}[htbp] \footnotesize{ \begin{center} \caption{Empirical Papers Employing RD Designs with Multiple Cutoffs.} \label{tab:litreview} \resizebox{\textwidth}{!}{\begin{tabular}{lllll} \toprule \textbf{Citation} & \textbf{Place} & \textbf{Running Variable} & \textbf{Outcome Variable} & \textbf{Cutoffs}\\ \midrule \citet{abdulkadroglu2017regression} & US & Test scores & Test scores & Many \\ \citet*{Angrist:1999} & Israel & Cohort size & Test scores & 2\\ \citet*{Behaghel:2008} & France & Age & Layoff rates & Many \\ \citet*{Berk:1999} & U.S. & Prison score & Re-conviction & 4\\ \citet*{Black:2007} & U.S. & Training eligibility score & Job training and aid & Many\\ \citet*{Brollo:2012} & Brazil & Population & Federal transfers & Many \\ \citet*{Buddelmeyer:2004} & Mexico & Poverty score & Education attainment & Many\\ \citet*{Canton:2004} & Mexico & Elgibility score & College outcomes & Many\\ \citet*{Card:2004} & U.S. & Child age and income & Doctor visits & 2 \\ \citet*{card2016can} & US & Elgibility score & Test score & Many\\ \citet*{Chay:2005} & Chile & Elgibility score & School aid & 13 \\ \citet*{Chen:2004} & U.S. & Prison score & Rearrest & 5\\ \citet*{Chen:2008} & U.S. & Age & Disability awards & 3 \\ \citet*{Clark:2009} & UK & Majority vote & Test scores & Many\\ \citet*{crost2014aid} & Phillipines & Poverty index & Conflict & 22 \\ \citet*{dell2017nation} & Vietnam & Geographic regions & Military strategy by location & Many \\ \citet*{Dobkin:2010} & U.S. & Birthday & Education attainment & 3 \\ \citet*{Edmonds:2004} & S. Africa & Age & Child outcomes & 2 - 3\\ \citet{garibaldi2012college} & Italy & Income & Graduation & 12 \\ \citet*{Goodman:2008} & U.S. & Test score & Scholarship & Many \\ \citet*{Hjalmarsson:2009} & U.S. & Adjudication score & Re-conviction & 2\\ \citet*{hoekstra2009effect} & US & Test and grades & Earnings & Many\\ \citet*{Hoxby:2000} & U.S. & Cohort size & Test scores & Many\\ \citet*{Kane:2003} & U.S. & GPA & College attendance & Many\\ \citet*{klavsnja2017incumbency} & Brazil & Margin of victory & Incumbency advantage & Many\\ \citet*{kirkeboen2016field} & Norway & Test scores & Earnings & Many\\ \citet*{Litschig:2013} & Brazil & Population & Poverty reduction & 17\\ \citet*{spenkuch2018political} & US & County borders & Advertising and vote shares & Many\\ \citet*{snider2015barriers} & US & Distance from airports & Airfares & Many \\ \citet*{Urquiola:2006} & Bolivia & Cohort size & Test scores & 2\\ \citet*{Urquiola:2009} & Chile & Cohort size & Test scores & 3 \\ \citet*{Van:2002} & U.S. & Aid score & Financial aid & Many \\ \citet*{Van:2008} & U.S. & Poverty Score & School aid & Many \\ \bottomrule \end{tabular}} \end{center} } {\scriptsize \textbf{Note}: ``Many'' refers to examples where either a large number of cutoff points are present or a continuum of cutoff points can be generated (e.g., the cutoff is a continuous random variable). This table excludes a large number of political science and related applications reported in \citet[Supplemental Appenedix]{Cattaneo-Keele-Titiunik-VazquezBare_2016_JOP}.} \end{table} \section{Additional Empirical Results}\label{sec:robustness} In this section we explore the sensitivity of our empirical results when restricting the sample to the period 2007-2010. This check allows us to reduce the heterogeneity of the sample due to variation over time. The results are shown in Table \ref{tab:robustness}. We find overall similar results, with a positive and significant extrapolated effect of 12.8 percentage points. \begin{table} \begin{center} \caption{Results for ACCES loan eligibility on Post-Education Enrollment in restricted ample \label{tab:robustness}} \resizebox{.8\textwidth}{!}{\input{./inputs/table_results_650_short.txt}} \end{center} \footnotesize Notes. Local polynomial regression estimation with MSE-optimal bandwidth selectors and robust bias corrected inference. See \cite{Calonico-Cattaneo-Titiunik_2014_ECMA} and \cite{Calonico-Cattaneo-Farrell_2018_JASA} for methodological details, and \cite{Calonico-Cattaneo-Farrell-Titiunik_2017_Stata} and \cite{Cattaneo-Titiunik-VazquezBare_2020_Stata} for implementation. ``Eff. $N$'' indicates the effective sample size, that is, the sample size within the MSE-optimal bandwidth. ``Bw'' indicates the MSE-optimal bandwidth. \end{table} \begin{table}[h] \caption{Segments and Corresponding Parameters in Figure \ref{fig:estimands}} \label{tab:FigParams} \centering \resizebox{1\textwidth}{!}{ \begin{tabular}{ccl} \toprule \textbf{Segment} & \textbf{Parameter} & \textbf{Description}\\ \midrule $\overline{ab}$ & $\tau_\L(\bar{x}) = \underbrace{\mu_{1,\L}(\bar{x})}_\text{Observable} - \underbrace{\mu_{0,\L}(\bar{x})}_\text{Unobservable}$ & Extrapolation parameter of interest\vspace{0.2in} \\ $\overline{bc}$ & $B(\bar{x}) = \underbrace{\mu_{0,\L}(\bar{x})}_\text{Unobservable} - \underbrace{\mu_{0,\H}(\bar{x})}_\text{Observable}$ & Control facing $\L$ vs. control facing $\H$, at $X_i=\bar{x}$ \vspace{0.2in} \\ $\overline{ac}$ & $\tau_\L(\bar{x}) + B(\bar{x}) = \underbrace{\mu_{1,\L}(\bar{x})}_\text{Observable} - \underbrace{\mu_{0,\H}(\bar{x})}_\text{Observable}$ & Treated facing $\L$ vs. control facing $\H$, at $X_i=\bar{x}$ \vspace{0.2in} \\ $\overline{ed}$ & $B(\L) = \underbrace{\mu_{0,\L}(\L)}_\text{Observable} - \underbrace{\mu_{0,\H}(\L)}_\text{Observable}$ & Control facing $\L$ vs. control facing $\H$, at $X_i=\L$ \vspace{0.05in}\\ \bottomrule \end{tabular} } \end{table} \section{Simulation Setup} We provide further details on the simulation setup used in the paper. Potential outcome regression functions are generated in the following way: \[\mu_{0,\H}(x) = \mathbf{r}_p(x)'\boldsymbol{\gamma},\quad \mu_{0,\ell}(x) = \mu_{0,\H}(x) + \Delta,\quad \mu_{1,c}(x) = \mu_{0,c}(x) + \tau \] where $\mathbf{r}_p(x)$ is a $p$-th order polynomial basis for $x$. We set $p=4$. The value of $\boldsymbol{\gamma}$, given below, is chosen by running a regression of the observed outcome for the high-cutoff on a fourth order polynomial using data from our empirical application. The observed variables are generated according to the following model: \begin{align*} X_i &\sim \mathsf{Uniform}(-1000,-1)\\ \{C_i\}_{i=1}^N &\sim \mathsf{FixedMargins}(N,N_{\ell}) \\ D_i &= \mathbbm{1}(X_i\ge C_i)\\ Y_i &= \mu_{0,\H}(X_i) + \tau D_i + \Delta \mathbbm{1}(C_i=\ell) + \mathsf{Normal}(0,\sigma^2) \end{align*} where $\mathsf{FixedMargins}(N,N_\ell)$ denotes a fixed-margins distribution that assigns $N_\ell$ observations out of the total $N$ sample to face cutoff $\ell$ and the remaining $N-N_{\ell}$ ones to face cutoff $\H$. Proceeding as above, we set the parameters of the data generating process as follows: \begin{align*} \boldsymbol{\gamma}&=(-14.089,-0.074,-1.372e(-4),-1.125e(-07),-3.444e(-11))' \\ \Delta &= -0.14, \qquad \tau = 0.19, \qquad \sigma^2 = 0.3^2 \\ N &\in \{1000,2000,5000\},\quad N_\ell = N/2\\ \ell & = -850,\quad \H = -571, \quad \bar{x}=-650. \end{align*} All these parameters were estimated using local polynomial and related methods. \section{Extensions and Generalizations} We briefly discuss some extensions and generalizations of our main extrapolation results. \subsection{Conditional-on-covariates Constant Bias} Following \citet{Abadie_2005_RES}, we can relax the constant bias assumption to hold conditionally on observable characteristics. Let the bias term conditional on a vector of observable covariates $Z_i=z\in\mathcal{Z}$ be denoted by $B(x,z)=\mathbbm{E}[Y_i(0)| X_i=x,Z_i=z,C_i=\L]-\mathbbm{E}[Y_i(0)| X_i=x,Z_i=z,C_i=\H]$. Let $p(x,z)=\P(C_i=\ell| X_i=x,Z_i=z)$ denote the low-cutoff propensity score and $p(x)=\P(C_i=\ell|X_i=x)$. We impose the following conditions: \begin{assumption}[Ignorable Constant Bias]\label{assu:condcov}$ $ \begin{enumerate} \item Conditional bias: $B(\L,z)=B(x,z)$ for all $x\in(\L,\H)$ and for all $z\in\mathcal{Z}$. \item Common support: $\delta<p(x,z)<1-\delta$ for some $\delta>0$, $x\in\mathcal{X}$ and for all $z\in\mathcal{Z}$. \item Continuity: $p(x,z)$ is continuous in $x$ for all $z\in\mathcal{Z}$. \end{enumerate} \end{assumption} Part 1 states that the selection bias is equal across cutoffs after conditioning on a covariates, part 2 is the usual assumption rulling out empty cells defined by the covariates $Z_i$, and part 3 assumes that the propensity score is continuous in the running variable. Then, letting $S_i=\mathbbm{1}(C_i=\L)$, we have the following result, which is proven in the supplemental appendix. \begin{theorem}[Covariate-Adjusted Extrapolation]\label{thm:condcov} Under Assumption 1 and \ref{assu:condcov}, \begin{align*} \tau_\L(\bar{x})&=\mathbbm{E}\left[\left.\frac{Y_iS_i}{p(\bar{x})}\right\vert X_i=\H\right]-\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)}{1-p(\bar{x},Z_i)}\cdot \frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=x\right]\\ &\quad +\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)p(\bar{x},Z_i)}{p(\bar{x})(1-p(\L,Z_i))}\cdot \frac{f_{X|Z}(\H|Z_i)}{f_{X|Z}(\L|Z_i)}\cdot \frac{f_X(\L)}{f_X(\H)}\right\vert X_i=\L\right] \\ &\quad -\lim_{x\to \L^-}\mathbbm{E}\left[\left.\frac{Y_iS_i p(\bar{x},Z_i)}{p(\bar{x})p(\L,Z_i)}\cdot\frac{f_{X|Z}(\H|Z_i)}{f_{X|Z}(\L|Z_i)}\cdot \frac{f_X(\L)}{f_X(\H)}\right\vert X_i=x\right]. \end{align*} \end{theorem} This result is somewhat notationally convoluted, but it is straightforward to implement. It gives a precise formula for extrapolating RD treatment effects for values of the score above the cutoff $\L$, based on a conditional-on-$Z_i$ constant bias assumption. All the unknown quantities in Theorem \ref{thm:condcov} can be replaced by consistent estimators thereof, under appropriate regularity conditions. \subsection{Non-Constant Bias} Although the constant bias restriction (Assumption 2) is intuitive and allows for a helpful analogy with the difference-in-differences design, the RD setup leads for a natural extension via local polynomial extrapolation. The score is a continuous random variable and, under additional smoothness conditions of the bias function $B(x)$, we can replace the constant bias assumption with the assumption that $B(x)$ can be approximated by a polynomial expansion of $B(\L)$ around $x \in (\L,\H)$. For example, using a polynomial of order one, we can approximate $B(x)$ at $\bar{x}$ as \begin{align}\label{eq:biasp1} B(\bar{x}) \approx B(\L) + \dot B(\L)\cdot[\bar{x}-\L] \end{align} where $\dot B(x)= \dot\mu_{0,\L}(x)-\dot\mu_{0,\H}(x)$ and $\dot\mu_{d,c}(x)=\partial \mu_{d,c}(x)/\partial x$. This shows that the constant bias assumption $B(x) = B(\L)$ can be seen as a special case of the above approximation, where the first derivatives of $\mu_{0,\L}(x)$ and $\mu_{0,\H}(x)$ are assumed equal to each other at $x=\bar{x}$. In contrast, the approximation in (\ref{eq:biasp1}) allows these derivatives to be different, and corrects the extrapolation at $\bar{x}$ using the difference between them at the point $\L$. This idea allows, for instance, for different slopes of the control regression functions at $\bar{x}$, leading to $B(\bar{x}) \neq B(\L)$. The linear adjustment in expression (\ref{eq:biasp1}) provides a way to correct the bias term to account for the difference in slopes at the low cutoff $\L$. This represents a generalization of the constant assumption, which allows the intercepts of $\mu_{0,\L}(x)$ and $\mu_{0,\H}(x)$ to differ, but does not allow their difference to be a function of $x$. It is straightforward to extend this reasoning to employ higher order polynomials to approximate $B(\bar{x})$, at the cost of a stronger smoothness and extrapolation assumptions. \begin{assumption}[Polynomial-in-Score Bias]\label{assu:polybias} \hfill \begin{enumerate} \item \textit{Smoothness}: $\mu_{d,c}(x)=\mathbbm{E}[Y_i(d)\mid X_i=x,C_i=c]$ are $p$-times continuously differentiable at $x=c$ for all $c\in\mathcal C $, $d=0,1$ and for some $p\in\{0,1,2,...\}$. \item \textit{Polynomial Approximation}: there exists a $p\in\{0,1,2,...\}$ such that, for $x \in (\L,\H)$ \[B(x) =\sum_{s=0}^p \frac{1}{s!}B^{(s)}(\L)\cdot [x-\L]^s\] where $B^{(s)}(x)= \mu^{(s)}_{0,\L}(x)-\mu^{(s)}_{0,\H}(x)$ and $\mu^{(s)}_{d,c}(x)=\partial^s \mu_{d,c}(x)/\partial x^s$. \end{enumerate} \end{assumption} The main extrapolation result in can be generalized as follows. \begin{theorem}\label{thm:extrapol2} Under Assumption \ref{assu:polybias}, for $\bar{x} \in (\L,\H )$, \[\tau_{\L}(\bar{x}) = \mu_{\L}(\bar{x}) - \Big[\mu_{\H}(\bar{x}) + \sum_{s=0}^p \frac{1}{s!}B^{(s)}(\L)\cdot [x-\L]^s\Big].\] \end{theorem} This result establishes valid extrapolation of the RD treatment effect away from the low cutoff $\L$. This time the extrapolation is done via adjusting for not only the constant difference between the two control regression functions but also their higher-order derivatives. Heuristically, this result justifies approximating the control regression functions by a higher-order polynomial, local to the cutoff, and then using the additional information about higher-derivatives to extrapolate the treatment effects. \subsection{Many Cutoffs} All the identification results in the main paper hold for any number of cutoffs $J\ge 2$. The key issue to be assessed in this case is whether the constant bias assumption holds for all subpopulations. When this is the case, $\tau_c(x)$ is overidentified (for $x\ge c$), since there are many control groups that can be used to identify this parameter. In this setting, joint estimation can be performed using fixed effects models, as explained in the next section. Furthermore, when more than two cutoffs are available, more control regression functions are therefore available for extrapolation. These could be combine to extrapolate or, alternatively, each of them could be used to extrapolate the RD treatment effect and only after these treatment effects could be combined. We relegate this interesting problem for future work. \subsection{Multi-Scores and Geographic RD Designs} In many applications, RD designs include multiple scores \citep[e.g.,][]{PapayWillettMurnane2011-JoE,ReardonRobinson2012-JREE,Keele-Titiunik_2015_PA}. Examples include treatments assigned based on not exceeding a given threshold on two different scores (Figure \ref{fig:RD-multiscore}(a)) or based on being one side of some generic boundary (Figure \ref{fig:RD-multiscore}(b)). While these designs induce a continuum of cutoff points, it is usually better to analyze them using a finite number of cutoffs along the boundary determining treatment assignment. For example, in Figure \ref{fig:RD-multiscore} we illustrate two settings with three chosen cutoff points (A, B, and C). In panel (a), the three cutoffs correspond to ``extremes'' over the boundary, while in panel (b) the cutoff points are chosen towards the ``center''. Once these cutoffs points are chosen, the analysis can proceed as discussed in the main paper. Usually, the multidimensionality of the problem is reduced by relying on some metric that maps the multi-score feature of the design to a unidimensional problem. For instance, $X_i$ is usually taken to be a measure of distance relative to the desired cutoff point. Once this mapping is constructed, all the ideas and methods discussed in the paper can be extended and applied to extrapolate RD treatment effects across cutoff points in multi-score RD designs. \begin{figure} \centering \caption{Illustration of Multi-Score and Geographic RD Designs} \label{fig:RD-multiscore} \vspace{-.05in} \begin{subfigure}[b]{0.49\textwidth} \includegraphics[width=1\textwidth]{./inputs/rdmcplot_multiscore.pdf} \caption{Multi-Score RD Design} \end{subfigure} \hspace{-0.2in} \begin{subfigure}[b]{0.49\textwidth} \includegraphics[width=1\textwidth]{./inputs/rdmcplot_geoRD.pdf} \caption{Geographic RD Design} \end{subfigure} \end{figure} \section{Relationship with Fixed Effects Models} Consider a separable model for the potential outcomes and only two cutoffs $\L<\H$: \begin{align*} Y_i(0)&=g_0(X_i)+\gamma_0\mathbbm 1(C_i=\H)+\varepsilon_{0i},\quad \mathbbm{E}[\varepsilon_{0i}\mid X_i,C_i]=0\\ Y_i(1)&=g_1(X_i)+\gamma_1\mathbbm 1(C_i=\H)+\varepsilon_{1i},\quad \mathbbm{E}[\varepsilon_{1i}\mid X_i,C_i]=0 \end{align*} This model assumes that $X_i,C_i$ and the error terms are separable. A key implication of separability is the absence of interaction between the cutoff and the score. In other words, changing the cutoff only shifts the conditional expectation function without affecting the slope. The above model implies: \[\tau_c(x)=\mathbbm{E}[Y_{i}(1)-Y_{i}(0)\mid X_i=x,C_i=c]=g_1(x)-g_0(x)+(\gamma_1-\gamma_0)\mathbbm 1(c=\H)\] Also, let $D_i=\mathbbm 1(X_i\ge C_i)$, $S_i=\mathbbm 1(C_i=\H)$, $\gamma\equiv \gamma_0$ and $\delta\equiv \gamma_1-\gamma_0$, so that defining the observed outcome in the usual way, $Y_i=D_iY_{i}(1)+(1-D_i)Y_{i}(0)$, we get: \[Y_i=g_0(X_i)+\gamma S_i+(g_1(X_i)-g_0(X_i))D_i+\delta D_i\times S_i+\varepsilon_i\] where $\varepsilon_i=\varepsilon_{0i}D_i+\varepsilon_{1i}(1-D_i)$ and $\mathbbm{E}[\varepsilon_i\mid X_i,C_i]=0$. Although restrictive, this separable model nests several particular cases that are commonly used in RD estimation. For instance, if we assume: \[g_0(x)=\alpha_0+\beta_0 x,\quad g_1(x)=\alpha_1+\beta_1 x,\] the model reduces to: \[Y_i=\alpha_0+\beta_0 X_i+(\alpha_1-\alpha_0)D_i +(\beta_1-\beta_0)X_i\times D_i+\gamma S_i+\delta D_i\times S_i+\varepsilon_i\] which is the usual linear model with an interaction between the score and the treatment, with two additional terms that account for the presence of two cutoffs. The assumption of separability is sufficient for the selection bias to be constant across cutoffs. More precisely, \begin{align*} \mathbbm{E}[Y_i(0)\mid X_i=x,C_i=\L]&=g_0(x)\\ \mathbbm{E}[Y_i(0)\mid X_i=x,C_i=\H]&=g_0(x)+\gamma_0\\ \Rightarrow B(x)&=\gamma_0,\quad \forall\, x \end{align*} In this setting, consider the case of many cutoffs is relatively straightforward. With $C_i\in\{c_0,c_1,...c_J\}:=\mathcal C$, the potential outcomes can be defined as: \begin{align*} Y_i(0)&=g_0(X_i)+\sum_{j=1}^J\gamma_{0j}\mathbbm 1(C_i=c_j)+\varepsilon_i\\ Y_i(1)&=g_{1j}(X_i)+\sum_{j=1}^J\gamma_{1j}\mathbbm 1(C_i=c_j)+\varepsilon_i \end{align*} with observed outcome: \[Y_i=g_0(X_i)+\sum_{j=1}^J\gamma_{0j}S_{ij}+(g_{1j}(X_i)-g_0(X_i))D_i+\sum_{j=1}^J\delta_j D_i\times S_{ij}+\varepsilon_i\] where $S_{ij}=\mathbbm 1(C_i=c_j)$ and $\delta_j=\gamma_{1j}-\gamma_{0j}$. As before, the above model implies that the selection bias does not depend on the running variable: \[B(x,c_j,c_k)=\gamma_{0j}-\gamma_{0k}\] The equation for the observed outcome can be rewritten as: \[Y_{ij}=\gamma_j+g(X_{ij})+\theta_jD_{ij}+\tau_j(X_{ij})D_{ij}+\varepsilon_{ij}\] where $Y_{ij}$ is the outcome for unit $i$ exposed to cutoff $c_j$ and $D_{ij}$ is equal to one if unit $i$ exposed to cutoff $c_j$ is treated, $D_{ij}=\mathbbm 1(X_i\ge c_j)\times \mathbbm 1(C_i=c_j)$. This model is similar to a one-way fixed effects model. \subsection{Example: linear case} Using the above ``fixed-effects notation'', suppose $g_0$ and $g_1$ are linear: \begin{align*} Y_{ij}(0)&=\gamma_{0j}+\beta_0 X_{ij}+\varepsilon^0_{ij}\\ Y_{ij}(1)&=\gamma_{1j}+\beta_{1j} X_{ij}+\varepsilon^1_{ij} \end{align*} where $Y_{ij}(d)$ is the potential outcome of unit $i$ facing cutoff $c_j$ under treatment $d$. As before, the fact that the slopes change with the treatment status but not with the cutoff is implied by separability between the score and the cutoff indicator. The observed outcome is: \[Y_{ij}=\gamma_{0j}+\beta_0X_{ij}+(\gamma_{1j}-\gamma_{0j})D_{ij}+(\beta_{1j}-\beta_0)X_{ij}\times D_{ij}+\varepsilon_{ij}\] with $\varepsilon_{ij}=\varepsilon^1_{ij}D_{ij}+\varepsilon^0_{ij}(1-D_{ij})$. Reparameterizing the model gives the estimating equation: \[Y_{ij}=\gamma_j+\beta X_{ij}+\delta_jD_{ij}+\theta_j X_{ij}\times D_{ij}+\varepsilon_{ij}\] which is a linear model including cutoff fixed effects, the running variable, the treatment variable with cutoff-varying coefficients and the interaction between the score and the treatment. In other words, this is the standard linear RD specification, but with different intercepts and slopes at each cutoff. Note that the coefficients for $X_{ij}$ do not vary with $j$. This captures the restriction that the slopes of the conditional expectations under no treatment are the same across cutoffs and also leads to a straightforward specification test. Under the linear specification, the treatment effect evaluated at $c_k$ for units facing cutoff $c_j$ with $c_k>c_j$ is given by: \[\tau_{c_j}(\bar{x})=\gamma_{1j}-\gamma_{0j}+(\beta_{1j}-\beta_0)\bar{x}\] and can be estimated as: \[\hat\tau_{c_j}(\bar{x})=\hat\delta_j+\hat\theta_j \bar{x}\] or simply as $\hat\delta_j$ if the running variable is appropriately re-centered. Clearly, assuming a linear specification would in principle allow one to estimate the effects not only at the cutoffs but also at any other point in the range of the score. The treatment effects away from the cutoffs, however, are not identified nonparametrically and their identification relies purely on the functional form assumption, which can make them less credible. The specification test mentioned above for the linear case consists on running the regression: \[Y_{ij}=\gamma_j+\beta_j X_{ij}+\delta_jD_{ij}+\theta_j X_{ij}\times D_{ij}+\varepsilon_{ij}\] and testing: \[H_0:\quad \beta_1=\beta_2=...=\beta_J.\] \section{Local Randomization Methods} Our core extrapolation ideas can be adapted to the local randomization RD framework of \cite{Cattaneo-Frandsen-Titiunik_2015_JCI} and \cite{Cattaneo-Titiunik-VazquezBare_2017_JPAM}. In this alternative framework, only units whose scores lay within a fixed (and small) neighborhood around the cutoff are considered, and their potential outcomes are regarded as fixed. The key source of randomness comes from the treatment assignment mechanism---the probability law placing units in control and treatment groups, and consequently the analysis proceeds as if the RD design was a randomized experiment within the neighborhood. See \cite{Rosenbaum_2010_Book} and \cite{Imbens-Rubin_2015_Book} for background on classical Fisher and Neyman approaches to the analysis of experiments. As in the continuity-based approach, the Multi-Cutoff RD design can be analyzed using local randomization methods by either normalizing-and-pooling all cutoffs or by studying each cutoff separately. However, to extrapolate away from an RD cutoff (i.e., outside the small neighborhood where local randomization is assumed to hold), further strong identifying assumptions are needed. To discuss these additional assumptions, we first formalize the local randomization (LR) framework for extrapolation in a Multi-Cutoff RD design. Recall that $\mathcal{C}=\{\L,\H\}$ for simplicity. Let $\mathcal{N}_x$ be a (non-empty) LR neighborhood around $x\in[\L,\H]$, that is, \[\mathcal{N}_x = [x-w , x+w],\qquad w>0,\] where the (half) window length may be different for each center point $x$. The other neighborhoods discussed below are defined analogously; for example, $\mathcal{N}_{\bar{x}} = [\bar{x}-w , \bar{x}+w]$ for some $w>0$, possibly different across neighborhoods. Let also $y_{ic}(d,x)$ be a non-random potential outcome for unit $i$ when facing cutoff $c$ with treatment assignment $d$ and running variable $x$. Consequently, in this Multi-Cutoff RD LR framework each unit has non-random potential outcomes $\{y_{i\L}(0,x),y_{i\L}(1,x),y_{i\H}(0,x),y_{i\H}(1,x)\}$, for each $x\in\mathcal{X}$. The observed outcome is $Y_i = y_{iC_i}(0,X_i) \mathbbm{1}(X_i< C_i) + y_{iC_i}(1,X_i) \mathbbm{1}(X_i\ge C_i)$ where $C_i\in\mathcal{C}$. Recall that our goal is to extrapolate the RD treatment effect to a point $\bar{x}\in(\L,\H]$ on the support of the running variable. \begin{assumption}[LR Extrapolation]\label{assu:LR} $ $ \begin{itemize} \item[\emph{(i)}] For all $i$ such that $X_i\in\mathcal{N}_\L$, \[\{y_{i\L}(0,x),y_{i\L}(1,x),y_{i\H}(0,x)\}=\{y_{i\L}(0,\L),y_{i\L}(1,\L),y_{i\H}(0,\L)\}\] for all $x\in\mathcal{N}_\L$, and are non-random. Furthermore, the treatment assignment mechanism is known. \item[\emph{(ii)}] For $\bar{x}\in(\L,\H]$ such that $\mathcal{N}_\L\cap\mathcal{N}_{\bar{x}}=\emptyset$ and for all $i$ such that $X_i\in\mathcal{N}_{\bar{x}}$, \[\{y_{i\L}(0,x),y_{i\L}(1,x),y_{i\H}(0,x)\}=\{y_{i\L}(0,\bar{x}),y_{i\L}(1,\bar{x}),y_{i\H}(0,\bar{x})\}\] for all $x\in\mathcal{N}_{\bar{x}}$, and are non-random. Furthermore, the treatment assignment mechanism is known. \item[\emph{(iii)}] There exists a constant $\Delta\in\mathbb{R}$ such that: \[y_{i\L}(0,\L) = y_{i\H}(0,\L) + \Delta,\qquad \text{for all $i$ such that} X_i\in\mathcal{N}_\L,\] and \[y_{i\L}(0,\bar{x}) = y_{i\H}(0,\bar{x}) + \Delta, \qquad \text{for all $i$ such that } X_i\in\mathcal{N}_{\bar{x}}.\] \end{itemize} \end{assumption} Assumption \ref{assu:LR}(i) is analogous to Assumption 1 in \cite{Cattaneo-Frandsen-Titiunik_2015_JCI} applied to the RD cutoff $c=\L$, except for the presence of one additional potential outcome, $y_{i\H}(0)$, which we will use for extrapolation in the Multi-Cutoff RD design. Likewise, Assumption \ref{assu:LR}(ii) postulates the existence of a LR neighborhood for the desired point of extrapolation $\bar{x}$. Finally, Assumption \ref{assu:LR}(iii) imposes a relationship between (the difference of) control potential outcomes in the LR neighborhood of $c=\L$ and (the difference of) control potential outcomes in the LR neighborhood of $c=\bar{x}$, which we will use to impute the missing control potential outcomes for units exposed to the low cutoff $c=\L$ but with scores within $\mathcal{N}_{\bar{x}}$. To conserve space and notation, we do not extend Assumption \ref{assu:LR} to allow for regression adjustments within the LR neighborhoods as in \cite{Cattaneo-Titiunik-VazquezBare_2017_JPAM}, but we do include the corresponding results in our empirical application. In the LR framework, extrapolation requires imputing both the assignment mechanism and the missing control potential outcomes $y_{i\L}(0,\bar{x})$ within $\mathcal{N}_{\bar{x}}$. As a consequence, extrapolation beyond the standard LR neighborhood $\mathcal{N}_{\L}$ requires very strong assumptions. Assumption \ref{assu:LR} provides a set of conditions that lead to valid extrapolation. The parameter of interest is the average effect of the treatment for units with $X_i\in\mathcal{N}_{\bar{x}}$: \[\tau_{\mathsf{LR}} = \frac{1}{N_{\bar{x}}}\sum_{X_i\in\mathcal{N}_{\bar{x}}} (y_{i\ell}(1,\bar{x})-y_{i\ell}(0,\bar{x}))\] where $N_{\bar{x}}$ is the number of units inside the window $\mathcal{N}_{\bar{x}}$ around $\bar{x}$. Under Assumption \ref{assu:LR}, this parameter equals: $\frac{1}{N_{\bar{x}}}\sum_{X_i\in\mathcal{N}_{\bar{x}}}(y_{i\ell}(1,\bar{x})-y_{i\H}(0,\bar{x}))-\Delta$, which is identifiable from the data. We implement this result as follows. First, we construct an estimate of $\Delta$ as the difference-in-means for control units facing cutoffs $\ell$ and $\H$ with $X_i\in\mathcal{N}_\L$, which we denote by $\hat{\Delta}$: \[\hat{\Delta}=\bar{Y}_{\ell}(0,\ell)-\bar{Y}_\H(0,\ell)\] where \[\bar{Y}_{\ell}(0,\ell)=\frac{1}{N^0_{\ell}(\ell)}\sum_{X_i\in \mathcal{N}_\ell} Y_i\mathbbm{1}(C_i=\ell)(1-D_i),\quad \bar{Y}_\H(0,\ell)=\frac{1}{N_{\H}(\ell)}\sum_{X_i\in \mathcal{N}_\ell} Y_i\mathbbm{1}(C_i=\H)\] and \[N^0_{\ell}(\ell)=\sum_{X_i\in \mathcal{N}_\ell} \mathbbm{1}(C_i=\ell)(1-D_i),\quad N_{\H}(\ell)=\sum_{X_i\in \mathcal{N}_\ell} \mathbbm{1}(C_i=\H).\] Second, we estimate the treatment effects as: \[\hat{\tau}_{\mathsf{LR}}=\bar{Y}_\ell(1,\bar{x})-\bar{Y}_\H(0,\bar{x})-\hat{\Delta}\] where \[\bar{Y}_\ell(1,\bar{x})=\frac{1}{N_{\ell}(\bar{x})}\sum_{X_i\in \mathcal{N}_{\bar{x}}} Y_i\mathbbm{1}(C_i=\ell),\quad \bar{Y}_\H(0,\bar{x})=\frac{1}{N_{\H}(\bar{x})}\sum_{X_i\in \mathcal{N}_{\bar{x}}} Y_i\mathbbm{1}(C_i=\H)\] and \[N_{\ell}(\bar{x})=\sum_{X_i\in \mathcal{N}_{\bar{x}}} \mathbbm{1}(C_i=\ell),\quad N_{\H}(\bar{x})=\sum_{X_i\in \mathcal{N}_{\bar{x}}} \mathbbm{1}(C_i=\H).\] Finally, for the assignment mechanism, we assume: \[\P[C_i=\H|X_i\in\mathcal{N}_c]=\frac{N_\H(c)}{N_{\ell}(c)+N_\H(c)},\quad \forall\, i:X_i\in\mathcal{N}_c,\, c\in\{\ell,\bar{x}\}\] and \[\P[D_i=0|C_i=\ell,X_i\in \mathcal{N}_\ell]=\frac{N^0_{\ell}(\ell)}{N_{\ell}(\ell)},\quad N_{\ell}(\ell)=\sum_{X_i\in\mathcal{N}_\ell}\mathbbm{1}(C_i=\ell)\] It is straightforward to show that under this assignment mechanism and Assumption \ref{assu:LR}, $\hat{\Delta}$ and $\hat{\tau}$ are unbiased for their corresponding parameters. Our approach is not the only way to develop LR methods for extrapolation, but for simplicity we focus on the above construction which mimics closely the continuity-based proposed in the previous sections. In this setting, inference can be conducted using Fisherian randomization inference by permuting the cutoff indicator $\mathbbm{1}(C_i=\ell)$ on the adjusted outcomes $Y_i^A=Y_i+\Delta\mathbbm{1}(C_i=\H)$ among units in $\mathcal{N}_{\bar{x}}$. However, the inference procedure needs to account for the fact that $\Delta$ is unknown and needs to be estimated. We propose two alternatives to deal with this issue. The first one, suggested by \citet{Berger-Boos_1994_JASA}, consists on constructing a $(1-\eta)$-level confidence interval for $\Delta$, $S_\eta$, and defining the p-value: \[p^*(\eta) = \sup_{\Delta\in S_\eta}p(\Delta)+\eta\] which can be shown to be valid in the sense that $\P[p^*(\eta) \le \alpha]\le \alpha$. Our second inference procedure, based on Neyman's sampling approach, consists on using the standard normal distribution to approximate the distribution of the studentized statistic: \[T=\frac{\hat{\tau}}{\sqrt{V_1+V_{\hat{\Delta}}}}\] where $V_1$ is the estimated variance of the difference in means $\bar{Y}_\ell(1,\bar{x})-\bar{Y}_\H(0,\bar{x})$ and $V_{\hat{\Delta}}$ is the estimated variance of $\hat{\Delta}$. \subsection{Empirical Application} We use our proposed LR methods to investigate the external validity of the ACCES program RD effects. As mentioned in the paper, our sample has observations exposed to two cutoffs, $\L = -850$ and $\H = -571$. We begin by extrapolating the effect to the point $\bar{x} = -650$; our focus is thus the effect of eligibility for ACCES on whether the student enrolls in a higher education program for the subpopulation exposed to cutoff 850 when their SABER 11 score is $650$. Table \ref{tab:results_LR} presents empirical results using the local randomization framework. We construct the neighborhoods $\mathcal{N}_\ell$ and $\mathcal{N}_{\bar{x}}$ using the 50 closest observations to the evaluation point of interest. To calculate $p^*(\eta)$, we construct a $99$ percent confidence interval for $\Delta$ based on the normal approximation, which can be justified using large sample approximations in either a fixed potential outcomes model (Neyman) or a standard repeated sampling model (superpopulation). We estimate $\hat{\tau}_{\mathsf{LR}}$ using a constant model and using a linear adjustment \citep[see][for details]{Cattaneo-Titiunik-VazquezBare_2017_JPAM}. Overall, the results are very similar to the ones obtained using the continuity-based approach. We find positive effects of around 20 percentage points that are significant at the 5 percent level using either Fisherian-based or Neyman-based inference. To assess robustness of the LR methods, Figure \ref{fig:LR_sensit} shows how the estimated effect and its corresponding randomization inference p-value change when varying the number of nearest neighbors used to construct $\mathcal{N}_\ell$ and $\mathcal{N}_{\bar{x}}$. The magnitude of the estimated effect remains stable when increasing the length of the window, particularly for the linear adjustment case which can help to reduce bias when the corresponding regression functions are not constant. In terms of inference, while the p-values we construct can be very conservative, we find significant effects at the 5 percent level when using around 45 observations in each neighborhood. \clearpage \begin{table} \begin{center} \caption{Empirical Results under Local Randomization \label{tab:results_LR}} \resizebox{\textwidth}{!}{\input{./inputs/table_results_LR.txt}} \end{center} \footnotesize Notes. Estimated effect under the local randomization framework. Randomization inference p-values for $\hat{\tau}_{\mathsf{LR}}$ constructed using the \cite{Berger-Boos_1994_JASA} method. Neyman-based p-values constructed using a large-sample normal approximation. Estimates calculated using a constant model based on difference in meansand a linear regression adjustment \citep[see][for details]{Cattaneo-Titiunik-VazquezBare_2017_JPAM}. ``Eff. $N$'' indicates the effective sample size, that is, the sample size within the local randomization neighborhood. \end{table} \begin{figure} \centering \caption{Sensitivity Analysis for Local Randomization}\label{fig:LR_sensit} \begin{subfigure}[b]{0.45\textwidth} \includegraphics[width=\textwidth]{./inputs/LR_sensitivity_cons.pdf} \caption{Constant Model \label{fig:sensit_cons}} \vspace{-.25in} \end{subfigure} \begin{subfigure}[b]{0.45\textwidth} \includegraphics[width=\textwidth]{./inputs/LR_sensitivity_lin.pdf} \caption{Linear Adjustment \label{fig:sensit_lin}} \vspace{-.25in} \end{subfigure} \begin{flushleft}\footnotesize Notes. The figure plots the estimated effect as a function of the number of nearest neighbors used around the cutoff for estimation. The left panel plots the estimates under a constant model. The right panel plots the estimates using a linear adjustment model. Hollow markers indicate p-value $\ge 0.15$. Light gray markers indicate p-value $<0.15$. Dark gray markers indicate p-value $<0.1$. Black markers indicate p-value $<0.05$. Randomization inference p-values constructed using the \cite{Berger-Boos_1994_JASA} method. \end{flushleft} \end{figure} \clearpage \section{Proofs and Derivations} \subsection{Proof of Theorem 1} Follows immediately under the stated assumptions by the derivation provided in the paper. \subsection{Proof of Theorem 2} We omit the $i$ subscript to simplify notation. The average observed outcomes are: \begin{align*} \mathbbm{E}[Y|X=x,C=c]&=\mathbbm{E}[Y(1)D(x,c)+Y(0)(1-D(x,c))|X=x,C=c]\\ &=\mathbbm{E}[(Y(1)-Y(0))D(x,c)|X=x,C=c]+\mathbbm{E}[Y(0)|X=x,C=c] \end{align*} The difference in outcomes for units facing cutoffs $l<h$ at $X=x\in(l,h)$ is: \begin{align*} \Delta(x)&=\mathbbm{E}[Y|X=x,C=l]-\mathbbm{E}[Y|X=x,C=h]\\ &=\mathbbm{E}[(Y(1)-Y(0))D(x,l)|X=x,C=l]-\mathbbm{E}[(Y(1)-Y(0))D(x,h)|X=x,C=h] \\ &\quad +\mathbbm{E}[Y(0)|X=x,C=l]-\mathbbm{E}[Y(0)|X=x,C=h] \end{align*} Assuming parallel regression functions under no treatment, the double difference recovers: \begin{align*} &\Delta(x)-\Delta(l)\\ &=\mathbbm{E}[Y|X=x,C=l]-\mathbbm{E}[Y|X=x,C=h]-\lim_{x\uparrow l}\mathbbm{E}[Y|X=x,C=l]+\mathbbm{E}[Y|X=l,C=h]\\ &=\mathbbm{E}[(Y(1)-Y(0))D(x,l)|X=x,C=l]-\mathbbm{E}[(Y(1)-Y(0))D^-(l,l)|X=l,C=l] \\ &\quad -\{\mathbbm{E}[(Y(1)-Y(0))D(x,h)|X=x,C=h]-\mathbbm{E}[(Y(1)-Y(0))D(l,h)|X=l,C=h]\} \end{align*} where $D^-(l,l)=\lim_{x\uparrow l}D(x,l)$. Note that in a sharp design, $D(x,l)=1$ and $D(x,h)=D(l,h)=D^-(l,l)=0$ giving our previous result. After adding and subtracting, \begin{align*} &\Delta(x)-\Delta(l)\\ &=\mathbbm{E}[Y|X=x,C=l]-\mathbbm{E}[Y|X=x,C=h]-\lim_{x\uparrow l}\mathbbm{E}[Y|X=x,C=l]+\mathbbm{E}[Y|X=l,C=h]\\ &=\mathbbm{E}[(Y(1)-Y(0))(D(x,l)-D^-(l,l))|X=x,C=l] \\ &\quad +\mathbbm{E}[(Y(1)-Y(0))D^-(l,l)|X=x,C=l] -\mathbbm{E}[(Y(1)-Y(0))D^-(l,l)|X=l,C=l] \\ &\quad -\{\mathbbm{E}[(Y(1)-Y(0))D(x,h)|X=x,C=h]-\mathbbm{E}[(Y(1)-Y(0))D(l,h)|X=l,C=h]\} \end{align*} Under one-sided non-compliance, units below the cutoff never get the treatment, so $D(x,h)=D(l,h)=D^-(l,l)=0$. In this case, \begin{align*} \Delta(x)-\Delta(l)&=\mathbbm{E}[(Y(1)-Y(0))D(x,l)|X=x,C=l]\\ &=\mathbbm{E}[Y(1)-Y(0)|X=x,C=l,D(x,l)=1]\P[D(x,l)=1|X=x,C=l] \end{align*} It follows that \begin{align*} \frac{\Delta(x)-\Delta(l)}{\mathbbm{E}[D|X=x,C=l]}&=\mathbbm{E}[Y(1)-Y(0)|X=x,C=l,D(x,l)=1] \end{align*} which in this case equals the (local) average effect on the compliers. \subsection{Proof of Theorem \ref{thm:condcov}} Following analogous steps to the derivation for the unconditional case, we obtain that: \begin{align*} \mathbbm{E}[\tau_i| X_i=\bar{x},Z_i=z,C_i=\L]&=\mathbbm{E}[Y_i| X_i=\bar{x},Z_i=z,C_i=\L]\\ \quad & - \mathbbm{E}[Y_i| X_i=\bar{x},Z_i=z,C_i=\H]-B(\L,z) \end{align*} and \[\tau_\L(\bar{x})=\mathbbm{E}\left\{\mathbbm{E}[\tau_i| X_i=\bar{x},Z_i,C_i=\L]| X_i=\bar{x},C_i=\L\right\}\] Define $p(x,z)=\P(C_i=\L| X_i=x,Z_i=z)$ and $S_i=\mathbbm{1}(C_i=\L)$. We have that: \begin{align*} \mathbbm{E}[Y_i| X_i=\bar{x},C_i=\L,Z_i]&=\mathbbm{E}\left[\left.\frac{Y_iS_i}{p(\bar{x},Z_i)}\right\vert X_i=\bar{x},Z_i\right]\\ \mathbbm{E}[Y_i| X_i=\L,C_i=\H,Z_i]&=\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)}{1-p(\L,Z_i)}\right\vert X_i=\L,Z_i\right] \end{align*} and similarly for the remaining two terms, we obtain, assuming that $p(x,z)$ is continuous in $x$ (and limits can be interchanged), \begin{align*} \mathbbm{E}[\tau_i | X_i=\bar{x},Z_i=z,C_i=\L]&=\mathbbm{E}\left[\left.\frac{Y_iS_i}{p(\bar{x},Z_i)}\right\vert X_i=\bar{x},Z_i\right]-\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)}{1-p(\bar{x},Z_i)}\right\vert X_i=\bar{x},Z_i\right]\\ & +\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)}{1-p(\L,Z_i)}\right\vert X_i=\L,Z_i\right]-\lim_{x\to \L^-}\mathbbm{E}\left[\left.\frac{Y_iS_i}{p(\L,Z_i)}\right\vert X_i=x,Z_i\right] \end{align*} To simplify the notation, let $\tau_c(x,z)=\mathbbm{E}[\tau_i| X_i=x,C_i=c,Z_i=z]$, $\tau_c(x)=\mathbbm{E}[\tau_i| X_i=x,C_i=c]$ and $p(x)=\P(C_i=\L| X_i=x)$. By Bayes' rule: \begin{align*} \tau_\L(\bar{x})&=\int \tau_\L(\bar{x},z) dF_{Z|X,C}(z|\bar{x},\L)\\ &=\int \tau_\L(\bar{x},z)\frac{p(\bar{x},z)}{p(\bar{x})}dF_{Z|X}(z|\bar{x})\\ &=\mathbbm{E}\left[\left.\tau_\L(\bar{x},Z_i)\frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=\bar{x}\right] \end{align*} Now replace $\tau_\L(\bar{x},Z_i)$ with its observed counterpart and split the outer expectation into the four summands. We have that: \begin{align*} \mathbbm{E}\left[\mathbbm{E}\left[\left.\left.\frac{Y_iS_i}{p(\bar{x},Z_i)}\right\vert X_i=\bar{x},Z_i\right]\frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=\bar{x}\right]&=\mathbbm{E}\left[\mathbbm{E}\left[\left.\left.\frac{Y_iS_i}{p(\bar{x})}\right\vert X_i=\bar{x},Z_i\right]\right\vert X_i=\bar{x}\right]\\ &=\mathbbm{E}\left[\left.\frac{Y_iS_i}{p(\bar{x})}\right\vert X_i=\bar{x}\right] \end{align*} and \begin{align*} &\mathbbm{E}\left[\mathbbm{E}\left[\left.\left.\frac{Y_i(1-S_i)}{1-p(\L,Z_i)}\right\vert X_i=\L,Z_i\right]\frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=\bar{x}\right]\\ &\qquad=\mathbbm{E}\left[\mathbbm{E}\left[\left.\left.\frac{Y_i(1-S_i)}{1-p(\L,Z_i)}\cdot \frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=\L,Z_i\right]\right\vert X_i=\bar{x}\right]\\ &\qquad=\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)}{p(\bar{x})}\cdot \frac{p(\bar{x},Z_i)}{1-p(\L,Z_i)}\cdot \frac{f_{Z|X}(Z_i|\bar{x})}{f_{Z|X}(Z_i|\L)}\right\vert X_i=\L\right] \\ &\qquad=\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)p(\bar{x},Z_i)}{p(\bar{x})(1-p(\L,Z_i))}\cdot \frac{f_{X|Z}(\bar{x}|Z_i)}{f_{X|Z}(\L|Z_i)}\cdot \frac{f_X(\L)}{f_X(\bar{x})}\right\vert X_i=\L\right] \end{align*} Similarly, \begin{align*} \mathbbm{E}\left[\mathbbm{E}\left[\left.\left.\frac{Y_i(1-S_i)}{1-p(\bar{x},Z_i)}\right\vert X_i=\bar{x},Z_i\right]\frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=\bar{x}\right]&=\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)}{1-p(\bar{x},Z_i)}\cdot \frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=x\right] \end{align*} and finally, under regularity conditions to interchange limits and expectations, \begin{align*} &\mathbbm{E}\left[\lim_{x\to \L^-}\mathbbm{E}\left[\left.\left.\frac{Y_iS_i}{p(\L,Z_i)}\right\vert X_i=x,Z_i\right]\frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=\bar{x}\right]\\ &\qquad=\lim_{x\to \L^-}\mathbbm{E}\left[\mathbbm{E}\left[\left.\left.\frac{Y_iS_i\cdot p(\bar{x},Z_i)}{p(\bar{x})p(\L,Z_i)}\right\vert X_i=x,Z_i\right]\right\vert X_i=\bar{x}\right]\\ &\qquad=\lim_{x\to \L^-}\mathbbm{E}\left[\left.\frac{Y_iS_i p(\bar{x},Z_i)}{p(\bar{x})p(\L,Z_i)}\cdot\frac{f_{Z|X}(Z_i|\H)}{f_{Z|X}(Z_i|\L)}\right\vert X_i=x\right]\\ &\qquad=\lim_{x\to \L^-}\mathbbm{E}\left[\left.\frac{Y_iS_i p(\bar{x},Z_i)}{p(\bar{x})p(\L,Z_i)}\cdot\frac{f_{X|Z}(\H|Z_i)}{f_{X|Z}(\L|Z_i)}\cdot \frac{f_X(\L)}{f_X(\H)}\right\vert X_i=x\right] \end{align*} Putting all the results together, \begin{align*} \tau_\L(\bar{x})&=\mathbbm{E}\left[\left.\frac{Y_iS_i}{p(\bar{x})}\right\vert X_i=\H\right]-\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)}{1-p(\bar{x},Z_i)}\cdot \frac{p(\bar{x},Z_i)}{p(\bar{x})}\right\vert X_i=x\right]\\ &\quad +\mathbbm{E}\left[\left.\frac{Y_i(1-S_i)p(\bar{x},Z_i)}{p(\bar{x})(1-p(\L,Z_i))}\cdot \frac{f_{X|Z}(\H|Z_i)}{f_{X|Z}(\L|Z_i)}\cdot \frac{f_X(\L)}{f_X(\H)}\right\vert X_i=\L\right] \\ &\quad -\lim_{x\to \L^-}\mathbbm{E}\left[\left.\frac{Y_iS_i p(\bar{x},Z_i)}{p(\bar{x})p(\L,Z_i)}\cdot\frac{f_{X|Z}(\H|Z_i)}{f_{X|Z}(\L|Z_i)}\cdot \frac{f_X(\L)}{f_X(\H)}\right\vert X_i=x\right]. \end{align*} \subsection{Proof of Theorem \ref{thm:extrapol2}} Follows immediately under the stated assumptions by the derivation provided in the paper. \newpage\onehalfspacing \bibliographystyle{jasa}
\section{Introduction}\label{section:INTRODUCTION} After a decade-long ubiquity of graphene, the electromagnetic (EM) response of this one-atom-thick honeycomb crystal of carbon atoms, in its current-carrying state, has only recently become the focus of increasing attention \cite{PhysRevB.81.115413,CHOI,PhysRevB.89.195447,Cheng:14,Behnaam15,2015arXiv151209044B,Duppen16,PhysRevB.94.035439,PhysRevLett.119.133901,2040-8986-19-6-065505,PhysRevB.97.085419,PhysRevB.97.165424}. Besides lattice effects \cite{PhysRevB.82.155412,PhysRevLett.106.045504} that are negligible in the optical limit, graphene is expected to exhibit an isotropic EM response. The presence of an in-plane field of uniaxial strain \cite{Pellegrino10,Pellegrino11,Martinez12} or a perpendicular magnetic field \cite{Crassee,Fialkovsky2012,Shimano,Zhou,Ellis,photonics2010013,PhysRevB.92.125426,Poumirol17}, however, breaks this isotropy and turns graphene into a birefringent optical medium. Faraday rotations up to $6^{\circ}$ have been achieved upon transmission of linearly-polarized THz radiation through graphene under a perpendicularly-applied magnetic field of $\mathrm{B}_{\! \perp}\!=\!7\hspace{0.08em}\mathrm{T}$ at temperatures of $5\hspace{0.08em}\mathrm{K}$ \cite{Crassee} and $250\hspace{0.08em}\mathrm{K}$ \cite{Poumirol17}$\phantom{}$. Such large magneto-optical rotations, however, mainly occur at frequencies lying within the far-infrared (THz) band of EM spectrum, i.e., $1\hspace{0.08em}\mathrm{meV} \! < \! \hbar\omega \! < \! 80\hspace{0.08em}\mathrm{meV}$ \cite{Crassee}. In addition, magneto-optical phenomena are not the most suitable tool to achieve optical non-reciprocity (ONR) in integrated Photonics mainly because the undesirable impact of the magnetic field on the functionality of the nearby optical or electronic components cannot be avoided in sub-micron scales \cite{Lipson,Kamal,Shiyue,2015arXiv151209044B}. The perpendicular static magnetic field also breaks the time reversal symmetry (TRS) of the nonlocal EM response of graphene leading to the emergence of edge magneto-plasmons \cite{Fet85,Wan12,Jin17}. Additionally, it has recently been shown that valley-selective population inversion in gapped Dirac materials (GDMs) such as biased bilayer graphene or transition metal dichalcogenides (TMDs) \cite{PhysRevLett.105.136805,Mak1489,SongKats} under optical pumping of circularly-polarized light yields a nonvanishing Berry flux, thus leading to broken TRS and the emergence of chiral (nonreciprocal) Berry plasmons (CBPs) \cite{Kum16,Son16}. The presence of DC current has been predicted to cause the EM response of graphene to lose its invariance under (i) rotation in the local (optical) limit \cite{PhysRevB.81.115413,PhysRevB.89.195447,Behnaam15,2015arXiv151209044B,Duppen16,PhysRevB.94.035439} and (ii) time reversal (TR) in the nonlocal limit leading to different plasmonic group velocities depending on the direction of the external DC current \cite{PhysRevB.89.195447,Behnaam15,Duppen16,2015arXiv151209044B,PhysRevB.97.085419}. In this work, we show (i) how the presence of DC electric current in doped graphene breaks the rotational symmetry, (ii) how the resulting anisotropy leads to the emergence of off-diagonal elements of the conductivity tensor, and (iii) how such off-diagonal elements bring about electro-optical phenomena such as Kerr/Faraday rotation within a frequency range which can be tuned up to mid-infrared via the application of the gate and drain-source voltages. This paper is structured as follows: Sec. \ref{section:EM_RESPONSE_OUT_OF_EQUILIBRIUM} provides details on the computation of the conductivity tensor of a driven $\pi$ electron gas and introduces the model to describe the nonequilibrium (NE) occupation of a driven electron gas. In Sec. \ref{section:THE_OPTICAL_RESPONSE}, we present analytic expressions for the optical conductivity of current-carrying graphene and discuss the scattering of light off current-carrying graphene. A summary, along with some concluding remarks, is given in Sec. \ref{section:SC}. Additional details are delivered through five appendices. \section{EM response out of equilibrium}\label{section:EM_RESPONSE_OUT_OF_EQUILIBRIUM} In this section, we will outline the basic steps of our theory by first defining the full response out of equilibrium. We will then introduce the shifted Fermi disk model which we shall use throughout this work. \subsection{The conductivity tensor of Dirac fermions}\label{subsection:CONDUCTIVITY_TENSOR} In response to an EM perturbation, of frequency $\omega$ and in-plane wavevector $\mathbf{q} = \mathrm{q}_{x} \hat{\mathbf{e}}_{x} + \mathrm{q}_{y} \hat{\mathbf{e}}_{y}$, given by $\mathbf{\mathbf{E}}(\mathbf{r},t)\!=\!\overline{\mathbf{\mathbf{E}}}(\mathbf{q},z,\omega) \, e^{i[\mathrm{q}_{x} x + \mathrm{q}_{y} y- \omega t]}$, the $\pi$ electron gas in graphene undergoes current density oscillations given by $\mathbf{\mathbf{J}}(\mathbf{r},t)\!=\!\overline{\mathbf{\mathbf{J}}}(\mathbf{q},\omega) \delta_{\tiny{\text{D}}}\!\left(z\right) e^{i[\mathrm{q}_{x} x + \mathrm{q}_{y} y - \omega t]}$, with $\delta_{\tiny{\text{D}}}$ being the Dirac delta function. Such EM response can be described through the surface conductivity tensor $\tensor{\sigma}(\mathbf{q},\omega)$ which is defined via $\overline{\mathbf{\mathbf{J}}}(\mathbf{q},\omega) \! = \! \tensor{\sigma}(\mathbf{q},\omega) \cdot \overline{\mathbf{\mathbf{E}}}(\mathbf{q},z\!=\!0,\omega)$. For an isotropic sample, the optical conductivity tensor has a scalar nature, i.e., $\tensor{\sigma}^{\0}(\mathrm{q}\!=\!0,\omega) \! = \! \sigma^{\0}\!(\omega) \tensor{\mathrm{I}}$, where $\tensor{\mathrm{I}} \!\! \equiv \! \hat{\mathbf{\mathbf{e}}}_{x}\hat{\mathbf{\mathbf{e}}}_{x} \! + \hat{\mathbf{\mathbf{e}}}_{y}\hat{\mathbf{\mathbf{e}}}_{y}$ denotes the dyadic unit tensor, and $\sigma^{\0}\!(\omega)$ denotes the equilibrium-state optical conductivity that has been extensively studied in the literature \cite{1367-2630-8-12-318,Falkovsky2007,PhysRevB.76.153410,PhysRevLett.100.117401,PhysRevLett.101.196405,Nair1308, 1742-6596-129-1-012004,PhysRevB.78.085432,PhysRevB.83.165113,PhysRevB.93.125413,Stauber15}. In the general case where no isotropy is assumed, the components of the optical conductivity tensor of $\pi$ electron gas $\sigma_{n,\overline{n}}(\mathbf{q},\omega) \! \equiv \! \hat{\mathbf{\mathbf{e}}}_{n} \! \cdot \tensor{\sigma}(\mathbf{q},\omega) \! \cdot \hat{\mathbf{\mathbf{e}}}_{\bar{n}}$ (where $n,\overline{n} \! = \! x,y$) should be obtained from the following summation over the first Brillouin zone (FBZ) \cite{Falkovsky2007,PhysRevB.93.125413}: \begin{equation}\label{CONDUCTIVITY_TENSOR} \sigma_{n,\overline{n}}(\mathbf{q},\omega) = 4 i g_{s} \gamma^{2} \sigma_{\!\text{u}} \sum_{\mathbf{k} \in \mathrm{FBZ}}{\mathrm{L}^{\mathbf{k},\mathbf{q}}_{n,\overline{n}}\left(\omega + i0^{\scriptscriptstyle{+}}\right)}, \end{equation} where $\sigma_{\!\text{u}} \! \equiv \! \frac{e^{2}}{4\hbar}$ is the unit in terms of which the conductivity data in this work will be presented, $e$ denotes the elementary electric charge, $g_{s}\!=\!2$ is the spin degeneracy, $\gamma$ is the slope of Dirac cones and \begin{equation}\label{CONDUCTIVITY_TENSOR_SUMMAND} \mathrm{L}^{\mathbf{k},\mathbf{q}}_{n,\overline{n}}\left(\omega\right) \equiv \sum_{s,\overline{s}=\pm}{ \frac{n_{\text{\tiny{F}}}[\mathrm{E}^{\overline{s}}_{\mathbf{k}+\mathbf{q}}] - n_{\text{\tiny{F}}}[\mathrm{E}^{s}_{\mathbf{k}}]}{\mathrm{E}^{\overline{s}}_{\mathbf{k}+\mathbf{q}} - \mathrm{E}^{s}_{\mathbf{k}} -\hbar\omega}\frac{\mathrm{F}_{\!n,\overline{n}}^{s\overline{s}}\! \left(\mathbf{k},\mathbf{q}\right)}{\mathrm{E}^{\overline{s}}_{\mathbf{k}+\mathbf{q}} - \mathrm{E}^{s}_{\mathbf{k}}}}, \end{equation} with $n_{\text{\tiny{F}}}[E]$ denoting the Fermi-Dirac (FD) distribution function \begin{equation}\label{Fermi-Dirac} n_{\text{\tiny{F}}}[E]=\left[1+\exp{\!\left(\frac{E-E_{\text{\tiny{F}}}}{k_{\text{\tiny{B}}}T_{e}}\right)}\right]^{-1}, \end{equation} where $k_{\text{\tiny{B}}}$, $T_{e}$ and $E_{\text{\tiny{F}}}$ respectively denote the Boltzmann constant, the temperature and the Fermi energy of the $\pi$ electron gas. The function $\mathrm{E}^{s}_{\mathbf{k}}$ yields the energy eigen-value of the $\ket{\mathbf{k},s}$ eigen-state of the conduction ($s\!=\!+1$) or valence ($s\!=\!-1$) band. In addition, $\mathrm{F}_{\!n,\overline{n}}^{s\overline{s}}\!\left(\mathbf{k},\mathbf{q}\right)$ denotes the band overlap integral corresponding to the intraband ($s\overline{s}\!=\!+1$) or interband ($s\overline{s}\!=\!-1$) transitions. The current-induced modification to the conductivity tensor $\Delta \tensor{\sigma} \equiv \tensor{\sigma}-\tensor{\sigma}^{\0}$ is the quantity of interest here and is solely determined by the eigen-states within a narrow neighborhood of the Fermi energy. To focus on these ``near-Fermi-level'' eigen-states, the summation over FBZ which yields $\Delta \tensor{\sigma}$ should be reduced into a polar integral around the Dirac point $\mathbf{k}_{D}$ via redefining the crystal momentum $\mathbf{k}$ to $\mathbf{k}+\mathbf{k}_{D}$ where $\mathbf{k}=\mathrm{k} \left[ \hat{\mathbf{\mathbf{e}}}_{x} \cos{\theta_{\mathbf{k}}} + \hat{\mathbf{\mathbf{e}}}_{y} \sin{\theta_{\mathbf{k}}} \right]$. The application of tight-binding (TB) model within the Dirac cone approximation \cite{PhysRevB.81.085409} yields $\mathrm{E}^{s}_{\mathbf{k}} \!\cong\! s \gamma \mathrm{k}$ ($\gamma \! \equiv \! \frac{3at}{2}$) with $t \! \approx \! 2.7\hspace{0.08em}\mathrm{eV}$ and $a \! \approx \! 0.142\hspace{0.08em}\mathrm{nm}$ being the nearest-neighbor hopping amplitude and carbon-carbon bond length. Without the negligible lattice effects \cite{PhysRevB.82.155412}, the TB model yields \begin{equation}\label{BAND_OVERLAP_INTEGRAL_TB} \mathrm{F}_{\!n,\overline{n}}^{s\overline{s}}\!\left(\mathbf{k},\mathbf{q}\right) \! \cong \! \bra{s,\mathbf{k}} \tau_{n} \! \ket{\mathbf{k}\!+\!\mathbf{q},\overline{s}} \bra{\overline{s},\mathbf{k}\!+\!\mathbf{q}} \tau_{\overline{n}} \! \ket{\mathbf{k},s}, \end{equation} where $\tau_{n}$ ($n\!=\!x,y$) denotes the $2 \! \times \! 2$ Pauli matrices \cite{1367-2630-8-12-318,VIGNALE,PhysRevB.80.075418}. Within the Dirac cone approximation, $\mathrm{F}_{\!n,\overline{n}}^{s\overline{s}}\! \left(\mathbf{k},\mathbf{q}\right)$ is specifically given by \cite{PhysRevB.80.075418,PhysRevB.82.155412}: \begin{eqnarray} &\displaystyle{2 \, \mathrm{F}_{\!x,x}^{s\overline{s}} \! \left(\mathbf{k},\mathbf{q}\right) \cong 1 + s\overline{s} \, \cos{[\theta_{\mathbf{k}}+\theta_{\mathbf{k}+\mathbf{q}}]}\,}\label{BAND_OVERLAP_INTEGRAL_XX} \\[0.5ex] &\displaystyle{2 \, \mathrm{F}_{\!x,y}^{s\overline{s}} \! \left(\mathbf{k},\mathbf{q}\right) = 2 \mathrm{F}_{\!y,x}^{s\overline{s}} \! \left(\mathbf{k},\mathbf{q}\right) \cong s\overline{s} \, \sin{[\theta_{\mathbf{k}}+\theta_{\mathbf{k}+\mathbf{q}}]}}\label{BAND_OVERLAP_INTEGRAL_XY} \\[0.5ex] &\displaystyle{2 \, \mathrm{F}_{\!y,y}^{s\overline{s}} \! \left(\mathbf{k},\mathbf{q}\right) \cong 1 - s\overline{s} \, \cos{[\theta_{\mathbf{k}}+\theta_{\mathbf{k}+\mathbf{q}}]}} . \label{BAND_OVERLAP_INTEGRAL_YY} \end{eqnarray} In the absence of DC electric current, $\tensor{\sigma}^{\0}(\omega)$ can be computed via plugging the FD distribution function with $E_{\text{\tiny{F}}}^{\0} \!=\! \pm \gamma \sqrt{\pi n_{s}}$ as its Fermi energy, denoted by $n_{\text{\tiny{F}}}^{\0}[E]$, into Eq. (\ref{CONDUCTIVITY_TENSOR}), with $n_{s}$ denoting the density of injected ($E^{\0}_{\text{\tiny{F}}}\!\!>\!0$) or depleted ($E^{\0}_{\text{\tiny{F}}}\!\!<\!0$) electrons. The application of drain-source voltage along graphene channel pushes the $\pi$ electron gas out of its equilibrium. As in Refs. \citenum{PhysRevB.81.115413,Behnaam15} and \citenum{Duppen16}, in this work the nonequilibrium (NE) conductivity is obtained via feeding the NE distribution of the driven $\pi$ electron gas into the expression given by Eq. (\ref{CONDUCTIVITY_TENSOR_SUMMAND}). \subsection{The shifted Fermi disk (SFD) model}\label{subsection:SFD} The NE distribution of current-carrying $\pi$ electron gas can, in principle, be obtained via solving the Boltzmann transport equation (BTE) \cite{Levinson,MAHAN_BTE,Vasko}. We instead employ the phenomenological shifted Fermi disk (SFD) model \cite{Meric,DONHEE,Hosang,Behnaam15} which simulates the DC flux with a shift of the Fermi disk $\mathbf{k}_{\text{shift}}$ with respect to the Dirac point which can be related to the external DC electric field $\mathbf{E}_{\text{\tiny{DC}}}$ via $\mathbf{k}_{\text{shift}}=-\frac{e}{\hbar} \tau_{\text{\tiny{DC}}}\mathbf{E}_{\text{\tiny{DC}}}$ with $\tau_{\text{\tiny{DC}}}$ being the $\mathrm{DC}$ relaxation time. The SFD model is a particle-conserving model, meaning that the size of the Fermi disk and therefore, the electron density, $n_{s}$, are not affected by $\mathbf{E}_{\text{\tiny{DC}}}$. This model formulates the NE Fermi energy as follows \cite{Behnaam15}: \begin{equation}\label{Nonequilibrium_EF} E_{\text{\tiny{F}}}(\theta_{\mathbf{k}},\theta_{d})=E_{\text{\tiny{F}}}^{\0} \left[ \beta_{d} \cos{\theta} + \left[1\!-\!\beta^{2}_{d} \sin^{2}{\!\theta}\right]^{\!\frac{1}{2}} \right], \end{equation} where $\beta_{d} \equiv \mathrm{k}_{\text{shift}}/k_{\text{\tiny{F}}}^{\0} \leq 1$ is a dimensionless parameter expressing the shift of the Fermi disk $\mathrm{k}_{\text{shift}}$ in reciprocal space in units of the Fermi wave vector $k_{\text{\tiny{F}}}^{\0} \! \equiv \! |E_{\text{\tiny{F}}}^{\0}|/\gamma$, and $\theta \equiv \theta_{\mathbf{k}}\!-\!\theta_{d}$ with $\theta_{d}$ being defined through \begin{equation}\label{DIMENSIONLESS_SHIFT_PARAMETER} \boldsymbol{\beta}_{\!d} \equiv \frac{\mathbf{k}_{\text{shift}}}{k_{\text{\tiny{F}}}^{\0}} \equiv \beta_{d} \left[ \hat{\mathbf{\mathbf{e}}}_{x} \cos{\theta_{d}} + \hat{\mathbf{\mathbf{e}}}_{y} \sin{\theta_{d}} \right]. \end{equation} The NE electronic occupation is then approximated by the FD distribution function $n_{\text{\tiny{F}}}[E]$ fed with an NE Fermi energy of $E_{\text{\tiny{F}}}(\theta_{\mathbf{k}},\theta_{d})$. Thus, the drift velocity, $\mathbf{v}_{\!d}\!=\!\left( \mathrm{v}_{\! d} / \mathrm{k}_{\text{shift}}\right) \, \mathbf{k}_{\text{shift}}$, reads as (see Appendix \ref{Appendix:A}): \begin{equation}\label{Drift_Velocity} \frac{\mathbf{v}_{\!d}}{v_{\text{\tiny{F}}}} = \frac{2\,\text{sgn}[E_{\text{\tiny{F}}}^{\0}]}{\pi} \boldsymbol{\beta}_{\!d} \int_{0}^{\pi} \left[1 \! - \! \beta^{2}_{d} \sin^{2}{\!\theta}\right]^{\!\frac{1}{2}} \! \cos^{2}{\!\theta} \, \mathrm{d}\theta, \end{equation} with $v_{\text{\tiny{F}}} \! \equiv \! \gamma / \hbar$ being referred to as Fermi velocity. Clearly, the NE electronic occupation, and therefore the ``linear'' response of the out-of-equilibrium system outlined in this work, contains non-linear terms in the external field $\mathbf{E}_{\text{\tiny{DC}}}$. In what follows, we suppress this ``non-linearity'' and are thus able to use the standard linear-response Kubo formalism. In the low-current limit, i.e., $\beta_{d} \!\ll \! 1$, Eq. (\ref{Drift_Velocity}) yields $\mathrm{v}_{\! d} \! \cong \! \beta_{d} v_{\text{\tiny{F}}}$ and therefore a current density of $\mathrm{J} \! \cong \! \beta_{d} n_{s} v_{\text{\tiny{F}}}$. Unlike the experimental fashion in which the results would be reported in terms of the pump current density or the drain-source voltage, the numerical results in this work are presented in terms of the parameter $\beta_{d}$. Within the framework of SFD model, the application of drain-source voltage does not affect the energy dispersion of $\pi$ electrons, $\mathrm{E}^{s}_{\mathbf{k}}$, but leads to an anisotropic quasi Fermi energy $E_{\text{\tiny{F}}}(\theta_{\mathbf{k}},\theta_{d})$. In contrast, Refs. \citenum{Bistritzer,Svintsov12,Svintsov13,Serov} and \citenum{Duppen16} adopted an approach in which the NE distribution function is obtained through feeding Eq. (\ref{Fermi-Dirac}) with an isotropic Fermi \textit{level} $E_{\text{\tiny{F}}}$ while the energy eigen-states are given by the ones of tilted Dirac cones (TDC) \cite{Kobayashi,Georbig,KAWARABAYASHI,Yasuhiro,Trescher} whose energy dispersion is given by $\mathrm{E}^{s,\mathbf{k}}_{\text{tilt}} \equiv \mathrm{E}^{s}_{\mathbf{k}}- \hbar \mathbf{v}_{\! d} \cdot \mathbf{k}$. The electron density resulting from this approach would be dependent on temperature and drift velocity. Thus, for a given local drift velocity and temperature, the Fermi level $E_{\text{\tiny{F}}}$ should be adjusted to obtain the desired local electron density. In the limit of $\mathrm{v}_{\! d} \ll v_{\text{\tiny{F}}}$, the SFD and TDC models yield the same result. However, these models are not reliable within the large current regime, i.e., $\mathrm{v}_{\! d} \sim v_{\text{\tiny{F}}}$, and the BTE should be solved numerically \cite{PhysRevB.84.125450}. \section{The optical response}\label{section:THE_OPTICAL_RESPONSE} \subsection{Analytic and Semi-analytic approximations}\label{subsec:ANAP} Applying the method introduced in Ref. \citenum{Behnaam15} to the conductivity integral given by Eq. (\ref{CONDUCTIVITY_TENSOR}) yields the following dyadic form for the optical conductivity tensor of the current-carrying $\pi$ electron gas (see Appendix \ref{Appendix:B}): \begin{equation}\label{OPTICAL_CONDUCTIVITY_OF_CURRENT_CARRYING_ELECTRN_GAS_IN_DYADIC_FORM} \tensor{\sigma}(\mathrm{q}\!=\!0,\omega) = \sigma_{\textsc{\tiny{L}}}(\omega) \, \hat{\mathbf{v}}_{\!d} \hat{\mathbf{v}}_{\!d} + \sigma_{\textsc{\tiny{T}}}(\omega) \left[\tensor{\mathrm{I}} \! - \! \hat{\mathbf{v}}_{\!d} \hat{\mathbf{v}}_{\!d} \right], \end{equation} where $\hat{\mathbf{v}}_{\!d} \equiv \mathbf{v}_{\!d}/\mathrm{v}_{\! d}$ and the function $\sigma_{\textsc{\tiny{L/T}}}(\omega)$ is referred to as the longitudinal/transverse optical conductivity. At $T_{e}\!=\!0\hspace{0.08em}\mathrm{K}$, $\sigma_{\!\mu=\textsc{\tiny{L}},\textsc{\tiny{T}}}(\omega)$ can be obtained from: \begin{equation}\label{LONGITUDINAL_AND_TRANSVERSE_COMPONENTS_OF_THE_CONDUCTIVITY_TENSOR} \tilde{\sigma}_{\! \mu}(\omega) = i \frac{g_{s}g_{v}}{4 \pi^{2}} \sum_{\zeta=\pm} \int_{0}^{\pi} \!\! \mathrm{K}_{\zeta}^{\Gamma}\!(\omega,\theta) \left[1 \! + \! \lambda_{\mu}^{\zeta} \cos{\!(2\theta)}\right] \mathrm{d}\theta, \end{equation} where $g_{v} \! = \! 2$ is the valley degeneracy, $\tilde{\sigma}_{\! \mu} (\omega) \! \equiv \! \sigma_{\! \mu}(\omega)/\sigma_{\text{u}}$ and $\lambda_{\, \textsc{\tiny{L/T}}}^{\zeta} \! = \! \pm \zeta$. The kernel functions $\mathrm{K}_{\pm}^{\Gamma}\! (\omega,\theta)$ in Eq. (\ref{LONGITUDINAL_AND_TRANSVERSE_COMPONENTS_OF_THE_CONDUCTIVITY_TENSOR}) are expressed in terms of the nonequilibrium Fermi wavevector $k_{\scriptscriptstyle{F}}(\theta) \equiv \gamma^{-1}\left|E_{\scriptscriptstyle{F}}(\theta,\theta_{d}\!=\!0)\right|$ as follows: \begin{eqnarray} &\displaystyle{\mathrm{K}_{\scriptscriptstyle{+}}^{\Gamma}(\omega,\theta)\equiv \! 4 \frac{\gamma \, k_{\scriptscriptstyle{F}}(\theta) }{\hbar \omega \! + \! i \Gamma}} \label{INTRABAND_KERNEL_FUNCTION} \\[1.0ex] &\displaystyle{\mathrm{K}_{\scriptscriptstyle{-}}^{\Gamma}(\omega,\theta) \equiv \ln{ \! \left(\frac{2\gamma \, k_{\scriptscriptstyle{F}}(\theta) - [\hbar \omega \! + \! i \Gamma]}{2\gamma \, k_{\scriptscriptstyle{F}}(\theta) + [\hbar \omega \! + \! i \Gamma]}\right) }},\label{INTERBAND_KERNEL_FUNCTION} \end{eqnarray} where the role of $\Gamma$ is to take account of the disorder-induced scattering of $\pi$ electrons in a phenomenological manner \cite{PhysRevB.83.165113}. The equilibrium-state optical conductivity of graphene at $T_{e}\!=\!0K$ \cite{1367-2630-8-12-318,Falkovsky2007}, denoted here by $\tilde{\sigma}^{\0}(\omega)$, can be recovered from Eq. (\ref{LONGITUDINAL_AND_TRANSVERSE_COMPONENTS_OF_THE_CONDUCTIVITY_TENSOR}) in the $\beta_{d} \to 0$ limit, \begin{equation}\label{EQUILIBRIUM_OPTICAL_CONDUCTIVITY} \tilde{\sigma}^{\0}(\omega)\! = \! i \frac{g_{s}g_{v}}{4 \pi} \! \left[ \frac{4 \gamma k_{\scriptscriptstyle{F}}^{\0} }{\hbar \omega \! + \! i \Gamma} \! + \! \ln{ \! \left(\! \frac{2 \gamma k_{\scriptscriptstyle{F}}^{\0} \! - \! [\hbar \omega \! + \! i \Gamma]}{2 \gamma k_{\scriptscriptstyle{F}}^{\0} \! + \! [\hbar \omega \! + \! i \Gamma]}\right) } \right]. \end{equation} The $\zeta\!=\!-1$ term in Eq. (\ref{LONGITUDINAL_AND_TRANSVERSE_COMPONENTS_OF_THE_CONDUCTIVITY_TENSOR}) corresponds to the interband optical conductivity whose intraband ($\zeta\!=\!+1$) counterpart is characterized as the ``Drude'' term, i.e., $\sigma^{\text{intra}} \! = \! \frac{i \hbar D}{\hbar \omega + i \Gamma}$, with the coefficient $D$, that is referred to as the Drude weight \cite{PhysRevB.83.165113,1367-2630-15-11-113050}, being altered in the presence of DC current. Thus, within the framework of SFD model, the longitudinal/transverse Drude weight of a current-carrying $\pi$ electron gas at $T_{e}\!=\!0\hspace{0.08em}\mathrm{K}$ is given by \begin{equation}\label{GENERAL_DRUDE_WEIGHT} D_{\textsc{\tiny{L/T}}} = \frac{D^{\0}}{\pi} \int_{0}^{\pi} \left[1 \! \pm \! \cos{\!(2\theta)}\right] \frac{k_{\text{\tiny{F}}}(\theta)}{k_{\text{\tiny{F}}}^{\0}} d\theta, \end{equation} with $D^{\0} \! = \!g_{s}g_{v} \sigma_{\!\text{u}} \frac{|E_{\text{\tiny{F}}}^{\0}|}{\pi\hbar}$ being the Drude weight at $\beta_{d}\!=\!0$ \cite{1367-2630-15-11-113050}. For large drift velocities, i.e., $\beta_d \! \to \! 1$, we have \begin{equation}\label{LIMITING_CASE} \frac{D_{\textsc{\tiny{L/T}}}}{D^{\0}} \! \to \! \frac{2}{\pi}\left[1 \pm \frac{1}{3}\right] \quad \Rightarrow \quad \frac{D_{\textsc{\tiny{L}}}}{D_{\textsc{\tiny{T}}}} \! \to \! 2, \end{equation} which is analogous to the case of Black Phosphorus in which the anisotropic response can be largely attributed to the considerable difference between the logitudinal and transverse Drude weights \cite{PhysRevLett.113.106802}. The expansion of the Drude weight for small drift current \begin{equation}\label{EXPANSION_OF_DRUDE_WEIGHT} \frac{D_{\textsc{\tiny{L/T}}}}{D^{\0}} = 1-\frac{\beta_{d}^{2}}{4}\left[1 \! \mp \! \frac{1}{2}\right] + \mathcal{O}(\beta_{d}^{4}) , \end{equation} indicates that the modification to the intraband optical conductivity is negligible in the low-current ($\beta_{d} \! \ll \! 1$) regime. The logarithmic divergence of the interband term, on the other hand, results in a pronounced modification within a frequency window centered at $\left| \omega \right| \! = \! 2 v_{\text{\tiny{F}}} k_{\text{\tiny{F}}}^{\0}$, in agreement with Pauli exclusion principle. At $T_{e}\!=\!0\hspace{0.08em}\mathrm{K}$, the real part of the low-frequency optical conductivity of driven $\pi$ electron gas in a clean sample of graphene, i.e., $\Gamma \! = \! 0$, is given by the following closed-form expression: \begin{equation}\label{ANALYTIC_SOLUTION_FOR_THE_REAL_PART OF_CONDUCTIVITY} \Re{[\tilde{\sigma}_{\textsc{\tiny{L/T}}}(\omega)]} =\frac{g_{s}g_{v}}{4\pi}\left[\vartheta \mp \cos{\vartheta} \left|\sin{\vartheta}\right|\right], \end{equation} with the angle $\vartheta$ being defined as (see Appendix \ref{Appendix:C}): \begin{align}\label{VARTHETA_DEFINITION} \vartheta \! \equiv \! \left\{ \begin{array}{cc} 0 & \;\;\qquad \left| \tilde{\omega} \right| \leq \tilde{\omega}_{\scriptscriptstyle{-}} \\[1.0ex] \!\!\! \arccos{\!\left[\frac{\tilde{\omega}_{\scriptscriptstyle{-}} \tilde{\omega}_{\scriptscriptstyle{+}} - \tilde{\omega}^{2}}{ 4 \left| \tilde{\omega} \right| \beta_{d}}\right]} &\qquad \tilde{\omega}_{\scriptscriptstyle{-}} \! \leq \left| \tilde{\omega} \right| \leq \tilde{\omega}_{\scriptscriptstyle{+}} \\[1.5ex] \pi & \;\;\qquad \left| \tilde{\omega} \right| \geq \tilde{\omega}_{\scriptscriptstyle{+}} \end{array} \right.\!\!\!\!, \end{align} where $\tilde{\omega} \equiv \hbar \omega / |E_{\text{\tiny{F}}}^{\0}|$ and $\tilde{\omega}_{\scriptscriptstyle{\pm}} \! \equiv 2 \left(1 \pm \beta_{d}\right)$. What is given by Eqs. (\ref{ANALYTIC_SOLUTION_FOR_THE_REAL_PART OF_CONDUCTIVITY}--\ref{VARTHETA_DEFINITION}) has a similar form to the one discussed in Ref. \citenum{Duppen16} wherein the choice of the NE distribution function obtained from the TDC results in an upper bound of the modification frequency range given by $\tilde{\omega}^{\text{\tiny{TDC}}}_{\scriptscriptstyle{+}} \equiv \frac{2}{1-(\mathrm{v}_{\! d}/v_{\text{\tiny{F}}})}$ which diverges in the $\mathrm{v}_{\! d} \! \to \! v_{\text{\tiny{F}}}$ limit. \subsection{The optical absorption spectra of current-carrying graphene}\label{subsec:OPT_ABS} The absorption spectrum of current-carrying graphene, similar to the equilibrium-state measurements in Refs. \citenum{PhysRevLett.101.196405} and \citenum{PhysRevB.83.165113}, may provide evidence on the modification given by Eq. (\ref{ANALYTIC_SOLUTION_FOR_THE_REAL_PART OF_CONDUCTIVITY}). The absorption of a normally-incident EM plane wave by an anisotropic two-dimensional electron gas, sandwiched in between two dielectrics, $A$, is formulated as follows (see Appendix \ref{Appendix:D}): \begin{equation}\label{OPTICAL_ABSORPTION_OF_ANISOTROPIC_2D_ELECTRON_GAS} A = 4 \pi \alpha \frac{\Re{[\tilde{\sigma}_{\textsc{\tiny{L}}}]} \cos^{2}{\! \phi } + \Re{[\tilde{\sigma}_{\textsc{\tiny{T}}}]} \sin^{2}{\! \phi}} {\sqrt{\frac{\mu^{r}_{1}}{\varepsilon^{r}_{1}}}\left[\sqrt{\frac{\varepsilon^{r}_{1}}{\mu^{r}_{1}}} + \sqrt{\frac{\varepsilon^{r}_{2}}{\mu^{r}_{2}}} \, \right]^{2}} + \mathcal{O}(\alpha^{2}), \end{equation} with $\alpha \equiv \frac{e^{2}}{4\pi \varepsilon_{\textsc{\tiny{0}}} \hbar c}$, $\varepsilon_{\textsc{\tiny{0}}}$, $c$, $\phi \equiv \theta_{\mathbf{i}}^{p} - \theta_{d}$, and $\varepsilon^{r}_{j}$ ($\mu^{r}_{j}$) being the fine structure constant, the permittivity of vacuum, the phase velocity of light in vacuum, the angle between the polarization of the normally-incident EM wave and the drift velocity, and the relative permittivity (permeability) of the $j$-th optical medium. The expression given by Eq. (\ref{OPTICAL_ABSORPTION_OF_ANISOTROPIC_2D_ELECTRON_GAS}) describes the case in which the transmitted (reflected) EM wave propagates through medium $2$ ($1$). \begin{figure} \begin{center} \includegraphics[clip,width=0.98\columnwidth]{NUMERIC_ANALYTIC_COMPARISON_OF_OPTICAL_ABSORPTION_1_1_1meV.eps}\\ \caption{(Color online) The absorption spectra of a suspended (i.e. $\varepsilon^{r}_{1,2} \! = \! \mu^{r}_{1,2} \! = \! 1$) current-carrying graphene sample at $T_{e}\! = \!0K$ as simulated by the SFD model for the two cases wherein the polarization of the normally incident EM wave is \textbf{(a)} parallel and \textbf{(b)} perpendicular to the drift velocity. The curves labeled as ``Numeric'' are generated via plugging the output of Eq. (\ref{LONGITUDINAL_AND_TRANSVERSE_COMPONENTS_OF_THE_CONDUCTIVITY_TENSOR}) into the Fresnel's coefficients, while their ``Analytic'' counterparts are the product of Eqs. (\ref{ANALYTIC_SOLUTION_FOR_THE_REAL_PART OF_CONDUCTIVITY}--\ref{OPTICAL_ABSORPTION_OF_ANISOTROPIC_2D_ELECTRON_GAS}).} \label{OPTICAL_ABSORPTION_OF_CURRENT_CARRYING_GRAPHENE} \end{center} \end{figure} \subsection{Current-induced Kerr and Faraday rotations}\label{subsec:KERR_FARADAY} Aside from its impact on the absorption spectra, the DC electric current converts the linear polarization of the incident (\textit{i}) EM wave into elliptic for the reflected (\textit{r}) and transmitted (\textit{t}) EM waves \cite{PhysRevB.81.115413}. The polarization angle of the \textit{r}-wave (\textit{t}-wave), denoted here by $\theta^{p}_{r}$ ($\theta^{p}_{t}$), is defined as the angle between the $x$-axis and the major axis of the ellipse that is being traced out by the tip of the electric-field vector of the \textit{r}-wave (\textit{t}-wave). Due to the current-induced birefringence, the polarization of the \textit{r}-wave (\textit{t}-wave) gets rotated with respect to that of the \textit{i}-wave: a phenomenon known as Kerr (Faraday) rotation that is quantitatively described via defining the Kerr (Faraday) rotation angle as $\theta_{\text{\tiny{K}}} \! \equiv \! \theta^{p}_{r} \! - \! \theta^{p}_{\mathbf{i}}$ ($\theta_{\text{\tiny{F}}} \! \equiv \! \theta^{p}_{t} \! - \! \theta^{p}_{\mathbf{i}}$). The Kerr rotation angle is given by (see Appendix \ref{Appendix:E}): \begin{equation}\label{KERR_ANGLE} \tan{[2\theta_{\text{\tiny{K}}}]}=\frac{\tan{[2\xi_{r}^{x}]} \cos{\psi_{r}}-\tan{[2\theta^{p}_{\mathbf{i}}]}}{1+\tan{[2\theta^{p}_{\mathbf{i}}]}\tan{[2\xi_{r}^{x}]} \cos{\psi_{r}}}, \end{equation} where $\psi_{r} \equiv \arg{\!\left( \!\textstyle{\frac{r_{xx}}{r_{yy}}}\!\right)}$ and $\tan{\xi_{r}^{x}} \equiv \frac{|r_{yy}|}{|r_{xx}|} \tan{\theta_{i}^{p}}$ with $r_{xx}$ and $r_{yy}$ being the Fresnel reflection coefficients, \begin{equation}\label{FRESNEL_REFLECTION_COEFFICIENTS_NORMAL_INCIDENCE_XX_AND_YY} r_{xx(yy)}=\frac{\sqrt{\frac{\varepsilon^{r}_{1}}{\mu^{r}_{1}}}-\sqrt{\frac{\varepsilon^{r}_{2}}{\mu^{r}_{2}}}-\pi\alpha \, \tilde{\sigma}_{\textsc{\tiny{L(T)}}}} {\sqrt{\frac{\varepsilon^{r}_{1}}{\mu^{r}_{1}}}+\sqrt{\frac{\varepsilon^{r}_{2}}{\mu^{r}_{2}}}+\pi\alpha \, \tilde{\sigma}_{\textsc{\tiny{L(T)}}}}. \end{equation} In addition, the Faraday rotation angle $\theta_{\text{\tiny{F}}}$ can be obtained via replacing the Fresnel reflection coefficients $r_{nn}$ ($n=x,y$) in Eq. (\ref{KERR_ANGLE}) with the Fresnel transmission coefficients $t_{nn}=1+r_{nn}$ (see Appendix \ref{Appendix:E}). As presented in Fig. \ref{KERR_ROTATION}-\textbf{(a)}, large Kerr rotation angles ($\theta_{\text{\tiny{K}}} \! \sim \! 10^{\circ}$) can be achieved with suspended graphene. The extremely small reflectance ($R \! \sim \! 10^{-4}$), however, hinders the observation of such large Kerr rotation angles. Nonetheless, a small enough difference between the permittivities of the surrounding dielectrics is expected to yield large Kerr rotation while the increased reflectance allows for measurements. On the other hand, Fig. \ref{KERR_ROTATION}-\textbf{(b)} presents small Kerr rotation angles $\theta_{\text{\tiny{K}}} \! \sim \! 0.1^{\circ}$ for the case of graphene lying on a hexagonal boron nitride (hBN) \cite{Dean,LeRoy,Woe14} substrate, while the reflectance is large ($R \! \sim \! 10 \%$). This indicates the high sensitivity of the Kerr rotation to the choice of the top and bottom dielectrics. However, as presented in Fig. \ref{FARADAY_ROTATION}, the Faraday rotation does not exhibit such sensitivity. \begin{figure} \begin{center} \includegraphics[clip,width=0.98\columnwidth]{KERR.eps}\\ \caption{(Color online) The Kerr rotation data obtained from Eqs. (\ref{LONGITUDINAL_AND_TRANSVERSE_COMPONENTS_OF_THE_CONDUCTIVITY_TENSOR}) and (\ref{KERR_ANGLE}) for a current-carrying $\pi$ electron gas at $T_{e}\!=\!0\hspace{0.08em}\mathrm{K}$ being contained by a disordered ($\Gamma \! = \! 5 \, meV$) sample of \textbf{(a)} suspended and \textbf{(b)} on-substrate graphene. Both panels present the maximal Kerr data corresponding to the geometry wherein the polarization of the normally-incident EM wave makes an angle of $\phi \equiv \theta_{\mathbf{i}}^{p} \! - \theta_{d} \! = \! 45^{\circ}$ with the drift velocity $\mathbf{v}_{\!d}$. The Kerr rotations in the upper/lower panel are reported in degrees/minutes.} \label{KERR_ROTATION} \end{center} \end{figure} \begin{figure} \begin{center} \includegraphics[clip,width=0.98\columnwidth ]{FARADAY.eps}\\ \caption{(Color online) Faraday rotation data with the same descriptions as those provided for Fig. \ref{KERR_ROTATION}.} \label{FARADAY_ROTATION} \end{center} \end{figure} As shown in Fig. \ref{FARADAY_ROTATION}, the Faraday rotation achieved through a single transmission is small; however, different experimental techniques could be implemented to obtain larger rotation angles through multiple transmissions. Our calculations indicate that a configuration in which graphene is sandwiched in between hBN dielectrics, i.e., $\varepsilon^{r}_{1,2} \! = \! 5 \mu^{r}_{1,2} \! = \! 5$, yields a minimum transmittance of $99\%$ which allows for trading off the total transmittance for a larger Faraday angle. The disorder-induced scattering of $\pi$ electrons, the Joule heating of current-carrying sample \cite{HEINZ,KWKIM,BAE_POP,KOZ} and the electron density fluctuation \cite{Yacoby8,LeRoy,Decker} in the area under the probe EM beam are the major factors which cause the smoothing of the logarithmic divergence of the interband optical conductivity, and therefore, hinder the observation of the electro-optical Kerr/Faraday rotations discussed here. The high precision of $10^{-5}\hspace{0.08em}\mathrm{rad}$ with which the Kerr rotations were measured in Ref. \citenum{Jieun} suggests that the rotations reported here, though as tiny as $1' \! \approx 291 \! \times \! 10^{-6}\hspace{0.08em}\mathrm{rad}$, are measurable. Since large amounts of DC current are expected to cause the longitudinal and transverse Drude weights to be considerably different, even for the case of identical surrounding dielectrics, the low-frequency electro-optical Kerr/Faraday rotations cannot be neglected out of the low-current regime. \section{Conclusions}\label{section:SC} We theoretically discussed the non-equilibrium (NE) response of a monolayer graphene that carries a DC current. Our analytical and numerical calculation results indicate that a DC-current-carrying monolayer graphene can exhibit larger Kerr rotations. For this calculation, we employ the phenomenological shifted Fermi disk (SFD) model. Future works may study the NE response of current-carrying graphene via feeding the conductivity integral [Eq. (\ref{CONDUCTIVITY_TENSOR})] with the NE electronic occupation obtained from numerical BTE solvers. Discussing the optical response, we find that local measurements of the Kerr/Faraday rotation angle or absorbance, within a tunable frequency window, can be exploited to determine the current density distribution throughout the whole channel. More specifically, this can be achieved through generating 2D Kerr maps of the current-carrying channel, as in Ref. \citenum{Jieun}, and then converting the Kerr maps into current maps. The numerical estimates presented in this work are specific to $T\!=\!0\hspace{0.08em}\mathrm{K}$ and are based on the SFD model, and therefore, are valid within the low-current regime. Nonetheless, the electro-optical phenomena discussed here are expected to be observable within the high-current regime, i.e., $\mathrm{v}_{\!d} \! \sim \! v_{\text{\tiny{F}}}$, provided that the tilt of the Fermi ``level'' induced by the drain-source voltage is larger than the thermal fluctuations, i.e., $\gamma \mathrm{k}_{\text{shift}} \! \gg \! k_{\text{\tiny{B}}}T_{e}$. In this case, the experimental measurements are expected to be in qualitative agreement with this work, but require a more realistic modeling to be numerically reproduced. \begin{acknowledgments} This research was funded by the National Research Foundation of Korea (Science Research Center Program, 2011-0030046) and Spain's Ministerio de Econom{\'i}a, Industria y Competitividad (FIS2017-82260-P, FIS2014-57432-P). M.S. would like to express his sincere gratitude towards his supervisor at POSTECH, Prof. Kwang S. Kim, for his support and valuable advice, and towards the members and staff of ICMM (Instituto de Ciencia de Materiales de Madrid) for their hospitality. \end{acknowledgments}
\section{A Personal Introduction} Although I am neither a professional historian nor philosopher, in the summer of 2000, I attended the Annual Meeting of the Canadian Society for the History and Philosophy of Mathematics at McMaster University in Ontario. Considering the subject of this paper, it is a remarkable coincidence that the first plenary talk of that conference was R\"{u}diger Thiele's announcement of finding the lost Hilbert's 24th problem. The following image is taken directly from the book of abstracts for that meeting \cite{CSHPM} \begin{center} {\includegraphics[width=11.5cm]{thiele.jpg}} \end{center} For reasons I can no longer recall, I also volunteered to be the Editor of that conference's Proceedings, and so I had the distinct pleasure of editing Prof. Thiele's contribution \cite{Thiele1}. At the same time, I was in the process of changing my mathematical research speciality, turning from differential equations to nonassociative algebra. One month after attending the aforementioned conference, I and two coauthors submitted a paper \cite{KKP} in which the main theorem was obtained via the assistance of OTTER, an automated theorem prover \cite{OTTER}. That paper changed my career, and since then nearly all of my research has used automated theorem proving to obtain results in mathematics. There are many automated theorem provers (ATPs) for an interested mathematician to choose from. The most popular ones include \textsc{Prover9} \cite{McCune}, \textsc{E} \cite{Schulz}, \textsc{Waldmeister} \cite{Hillenbrand} and \textsc{Vampire} \cite{Voronkov}. Most of my own experience has been with \textsc{Prover9} and in fact, only it and \textsc{E} have the necessary infrastructure to implement the proof simplification techniques I will describe later. Another advantage of \textsc{Prover9} for mathematicians is that its learning curve is less steep and unlike the others, its input language is easily readable by humans. Automated theorem provers search for proofs by generating and processing inferences much faster than humans can. If a proof of a goal is found, the prover reports a successful search and in most cases, presents the proof. An ATP proof consists of a sequence of clauses -- where each clause is a conjunction of atomic formulas ($n$-ary predicates applied to $n$ terms) or their negations -- and the justification for each clause, that is, the inferences used to derive the clause from its parents. An important point here is that an ATP will report the \emph{first} proof it finds. This is rarely an optimal proof by any measure of optimality. In particular, the first proof found is never (in my experience) a \emph{simple} proof. What exactly \emph{is} a ``simple'' proof and what makes one proof simpler than another? This is a deep question which I am not going to attempt to answer here. The most commonly used measure of simplicity \cite{ThieleWos,Veroff1,WosThiele} is \emph{proof length}, which is the number of inference steps. Thus efforts to find simpler proofs of theorems usually focus on finding \emph{shorter} proofs. I will follow the same path here: in this paper, simplification will mean looking for short proofs. By way of offering a caveat, let me mention some other measures (already discussed by Thiele and Wos \cite{ThieleWos,WosThiele}) which a fully developed theory of proof simplicity for ATP proofs should take into account. A proof can be visualized in various ways. The easiest is just to think of it as a sequence of clauses, and this is essentially how the ``simple equals short'' point of view sees them. However, they can also be visualized as directed graphs, where each vertex is a clause and there is an arrow from one clause to another if the first is an immediate parent of the second. In reality, a proof graph can be quite complex, with many paths coming out of the axiom clauses. Where those paths join up later in the proof are usually important clauses. Thus one measure of proof simplicity which deserves to be studied in more detail is the complexity of the proof graph, because generally speaking, a proof with fewer paths emanating from the axioms will be intuitively simpler than a proof with many such paths. It is worth noting, however, that this measure of simplicity is rather well correlated with proof length, because when the clauses in a proof are arranged in a sequence, fewer paths generally means fewer inference steps. Other measures of proof simplicity are related to the \emph{weights} of clauses. The weight of a clause is the number of symbols which occur in it, not counting parentheses. For instance, the associative law $(x\ \ast\ y)\ \ast\ z\ =\ x\ \ast\ (y\ \ast\ z)$ has weight $11$ (note that the equality symbol is counted). Generally speaking, a proof containing many clauses of high weight is less simple than a proof with fewer such clauses. So measures of proof simplicity might include the \emph{maximum} clause weight occuring in a proof or the \emph{average} clause weight of a proof, and so on. Automated theorem provers are resolution-based and as such, always prove goals by contradiction. (Resolution is an inference rule which can be seen as a generalization of modus ponens. It essentially takes two clauses which contain common literals, positive in one clause, negative in the other, and produces a new clause consisting of the remaining literals.) So for instance, if the universally quantified commutative law $x\ \ast\ y\ =\ y\ \ast\ x$ is the goal, \textsc{Prover9} will first convert this goal into a denial $c1\ \ast\ c2\ !=\ c2\ \ast\ c1$, which can be read as ``there exist $c1, c2$ such that $c1\ast c2$ is not equal to $c2\ast c1$.'' An ATP might derive a goal directly or it might partially reason backwards from the denial until some negative clause contradicts a positive clause. There is a general sense among mathematicians that forward proofs, going from the hypotheses to the conclusions, are ``better'' than backward proofs by contradiction, and especially better than proofs that mix the two. By extension, an ATP proof with a lot of backward steps might not be considered as ``good'' as a proof with very few, if any, such steps. Should a strictly forward proof be considered simpler? There is a delicate trade-off between all these measures. For example, suppose that one proof is precisely one clause shorter than another, but the slightly shorter proof has a significantly higher maximum clause weight. Is the shorter proof really ``simpler'' than the other one? An answer to this question is obviously context-dependent. In the spirit of Hilbert's own research programme, and what may have motivated his thinking for the cancelled 24th problem, finding simpler proofs seems to be something like a \emph{variational problem} where the constraints are based on some balance between the various possible measures of proof simplicity. In short, as Hilbert realized, the issue of proof simplicity is not so simple. The simplification technique I am going to describe in the rest of this paper still focuses on proof length. However, in my experience, the other measures I have mentioned tend to simplify as well (though this does not always happen). In order to make sense of the technique, I must first describe in the next section the given clause algorithm that underlies essentially most ATP systems. Following that, I will give a brief outline of Veroff's method of proof sketches \cite{Veroff2}. In the penultimate section I will discuss the proof simplification technique, and finally I will sum up with some concluding remarks. \section{The Given Clause Algorithm} In order to make sense of how I use \textsc{Prover9} for proof simplification, I must first discuss its main loop, the basics of which are the same for most ATPs. So let us assume all preprocessing has been completed, the user's input has been transformed into clauses, and the system is now ready to make inferences and search for a proof. There are three key objects in the inference process: \begin{itemize} \item the \emph{given clause} \item the \emph{SOS} (set of support) \item the \emph{usable list} \end{itemize} The \emph{given clause} is the important one here because it controls what inferences can be made. It will make more sense after I describe the other two objects. The \emph{SOS} is just the list of clauses that are waiting to be selected as given clauses. SOS clauses are not available for making primary inferences, but in some systems can be used to rewrite other clauses. The size of the SOS is the fundamental measure of the size of the search space: a large SOS is a sign of a complex search that may take a long time to find a proof. The \emph{usable list} is the list of clauses that are available for making primary inferences with the given clause. At each iteration of the main loop, a given clause is selected from the SOS, moved to the usable list, and then inferences are made using the given clause and other clauses already in the usable list. More precisely, the algorithm can be summarized as a while loop. \bigskip \noindent\texttt{while the SOS is not empty: \begin{enumerate} \item Select a given clause from SOS and move it to the usable list; \item Infer new clauses using the inference rules in effect; each new clause must have the given clause as one of its parents and members of the usable list as its other parents; \item process each new clause; \item append new clauses that pass the retention tests to the SOS. \end{enumerate} end of while loop.} \bigskip There are many retention tests. An obvious one is that if a newly generated clause is subsumed by a clause already on the SOS, then there is no reason to keep the new one. (One clause subsumes another if the variables of the first can be instantiated in such a way that it becomes a subclause of the second.) Others might be based on practical concerns; for instance, clauses of exceptionally high weight might be discarded to keep the size of the SOS manageable. The most important aspect of this loop is the selection of the given clause from the SOS. The choice of selection strategy very much determines how the search will go, and greatly affects the chances of the system finding a proof. An example is a \emph{breadth first} search. This just selects the oldest available clause in the SOS to be the given clause, where ``oldest'' means that it was kept in the SOS before all other clauses. Another example is a \emph{lightest first} search, which selects the clause of least weight among all clauses available in the SOS. If there are multiple clauses with the same weight, then the oldest among that subset is selected. Most hueristic strategies are a mix of the above: select an old clause, then a few light clauses, then an old clause, and so on. This is sometimes called a \emph{ratio strategy}, referring to the ratio of old clauses to light clauses. Prover9's default selection scheme works in a cycle of 9 steps: \begin{itemize} \item Select the oldest available clause \item Select the four lightest available ``false'' clauses \item Select the four lightest available ``true'' clauses \end{itemize} For this exposition, one may think of ``false'' as coming from reasoning backward from the denial and ``true'' as coming from strictly forward inferences. (This is not quite the precise meaning for \textsc{Prover9}, but the details are not important for what follows.) The values ``$1$ old, $4$ true, $4$ false'' were chosen by developer Bill McCune experimentally. In many equational problems, that is, \textsc{Prover9} jobs where equality is the only predicate, there are very few false clauses available, so the scheme effectively becomes ``$1$ old, $4$ true''. These default numbers can be easily changed by the user. Other ATPs such as \textsc{E} also allow customization of the given clause selection rules. \section{Proof Sketches and Hints} In this section I will describe a particularly powerful method for selecting given clauses which was developed by Veroff \cite{Veroff2}. This is called the method of \emph{proof sketches}. It was originally implemented in OTTER (as \emph{hint lists}), and is implemented in two current systems, \textsc{Prover9} (again as hint lists) and \textsc{E} (as watchlists). The general principles apply to any implementation. The basic idea behind proof sketches is the following: suppose the desired theorem is easier to prove in a special case than it is in a more general case. It might nevertheless hold that the proofs of the theorem in both the special and general cases have certain features in common. The idea is to try to ``guide'' the ATP system in the direction of the special case's proof, called a \emph{proof sketch}, as it searches for a proof in the general case. To make this a little more concrete, suppose the goal is a theorem about distributive lattices, and suppose further that the theorem is easy to prove in Boolean algebras. One might get the ATP to prove the theorem for Boolean algebras, extract the clauses from the proof, and then (informally speaking) have the ATP refer to that proof as it selects given clauses in the search for the more general case of distributive lattices. That is, any time a clause is available in the SOS which ``looks like'' a clause in the already found proof, that SOS clause should have high priority to be selected as a given clause. Again, think of a proof as a sequence of clauses: \[ C_1 , C_2, \ldots, C_i \ldots, C_j \ldots, C_n\,. \] Suppose that $C_i$ is an extra assumption in the target theory, not an assumption that one desires to have in the following. In the aforementioned example, $C_i$ might be a clause axiomatizing Boolean algebras among distributive lattices. Suppose further that clause $C_j$ has clause $C_i$ in its derivation history, meaning that $C_i$ is an ancestor of $C_j$. Now one of two things can happen. First, $C_j$ itself might be in the target theory, for instance, in our example, $C_j$ might hold in all distributive lattices even though in this particular proof, its derivation depended upon the extra assumption $C_i$. If this occurs, then to complete (part of) the proof of the general case, we need to find a new proof of $C_j$ which does not depend on $C_i$. Alternatively, $C_j$ itself might not be in the target theory, so in our example, $C_j$ might be true in Boolean algebras but not distributive lattices. In this case, we need to bridge the gap between the assumptions without $C_i$ and some clause occurring after $C_j$ which holds in the target theory. In either case, we have hopefully reduced a large problem to a smaller one, at least in principle. As mentioned above, the proof sketches strategy is implemented in two current ATP systems, \textsc{Prover9}'s hint list and \textsc{E}'s watchlist. The basic idea behind both implementations is essentially the same: when a new clause is generated, the ATP checks if the new clause \emph{matches} a \emph{hint} clause on the list. Here a clause is said to \emph{match} a hint if it subsumes it. When this occurs, the new clause is put immediately in the SOS and is marked as a \emph{hint matcher}. Now hints are assumed to be important clauses, notable milestones toward a proof, because they already occurred in another proof of a stronger theory. Thus the rest of the implementation of proof sketches is to give hint matchers higher priority in given clause selection by using the following rule: \emph{If there is a hint matcher in the SOS, select it as a given clause as soon as possible}. If there are multiple hint matchers in the SOS (and this usually happens in practice), then the rule has to be refined to allow the ATP to decide which hint matcher to select first. Both \textsc{Prover9} and \textsc{E} default to selecting hint matchers first by lowest weight and then by age. (In both case, the user can change this if desired.) Many of the successful applications of ATP systems to real mathematical problems have used proof sketches to find proofs. It has turned out to be a powerful technique in that regard. \section{Proof Simplification} Now let me turn the main theme: how proof sketches can be used in proof simplification. I will focus specifically on \textsc{Prover9} this time. Suppose that \textsc{Prover9} finds a proof, we extract a proof sketch from the proof into a hints list, and then run \textsc{Prover9} again \emph{without changing the input} or any other settings. Intuitively, we might expect \textsc{Prover9} to find the exact same proof as before. In practice, that is not what happens, and a moment's thought tells us why: the presence of the new hints means that hint matchers in the SOS are being selected as given clauses in a different order than before. The ``butterfly effect'' of this change to the selection of given clauses has sent the search off in a different direction. Let us call an ATP proof \emph{stable} if, when the proof's hints are used as a sketch, then leaving the input and all other settings unchanged, \textsc{Prover9} finds (essentially) the exact same proof. What years of experience have taught me is the following: \begin{center} \emph{The first proof an ATP finds is usually very complex and very unstable!} \end{center} To see what happens, let us look at a concrete example, which is essentially the main theorem of \cite{KKP}. Here is what the assumptions look like in \textsc{Prover9} syntax. \bigskip \begin{verbatim} e * x = x. x * e = x. x' * (x * y) = y. (x * y) * y' = x. T(x,y) = y' * (x * y). L(x,y,z) = (z * y)' * (z * (y * x)). R(x,y,z) = ((x * y) * z) * (y * z)'. T(x,y) * T(z,y) = T(x * z,y). L(x,y,z) * L(u,y,z) = L(x * u,y,z). R(x,y,z) * R(u,y,z) = R(x * u,y,z). \end{verbatim} It is not especially important here what these assumptions mean, because that is not what we are going to focus on. Here is the goal. \begin{verbatim} ((x * y) * x) * z = x * (y * (x * z)). \end{verbatim} If we run \textsc{Prover9} on this input using (almost) default settings, it finds a proof. Here are some of the basic statistics of the proof. \begin{verbatim} \end{verbatim} The length of the proof is the number of primary inferences. In this case, a unit equality problem, the only primary inference rule is paramodulation, which is essentially just equality substitution: when one side of one equation is inserted into terms of another equation. There are also secondary inferences which are rewrites. \textsc{Prover9} does not count these as part of the proof length by default, and for our purposes, this distinction is not important. The level of the proof is the length of the longest chain of inferences from the empty clause (reached when the contradiction is found) up to an input clause. The maximum clause weight has been discussed, but notice that it is a quite large number. The proof was found after 935 clauses had been selected as given. The time it took to find the proof is immaterial because that can vary considerably on different machines. For this demonstration, we are going to focus mostly on the length. We will consider one proof to be simpler than another if the former has shorter length than the latter. However, we will not completely ignore the other parameters, as will be seen shortly. We now extract the 470 steps of the proof into a hints list. (There is a utility so that this does not need to be done by hand.) We run \textsc{Prover9} again, changing nothing else in the input. Recall that now the search space is different: some clauses are going to be marked as hint matchers and selected as given clauses earlier than they were before. Here are the statistics from the second proof. \begin{verbatim} \end{verbatim} Notice that \emph{every} parameter dropped considerably. This new proof is not only simpler by the basic measure of length but also by the other measures as well. We can see that the hint matchers dominated the search by the fact that the proof was found after only 169 given clauses were generated. To focus on what I think is important here, I will no longer report the given clause number; it continues to drop, but does not change significantly after a few iterations of this procedure. We repeat the process, extracting the 265 clauses from this proof. In this demonstration we will discard the previous set of hints, but keeping it can also sometimes lead to interesting results. Here are the statistics from the third proof. \begin{verbatim} \end{verbatim} The drop in the parameters is not as dramatic as before, but we still have a simpler proof. Notice that the maximum clause weight, which started at 87, did not change in this iteration. We could continue in the same vein for a while, but what will happen eventually is that the proof lengths will no longer drop, but might in fact rise a bit. Generally speaking, what tends to happen is that proof lengths (and the other parameters) rise and fall. A stable proof might be found at some point or it might not. Instead, let me introduce another part of this general technique: squeezing the maximum clause weight. We reduce the allowed maximum clause weight of the search to 48. This means that any time \textsc{Prover9} generates a clause of weight greater than 48, it will be deleted instead of being put on the SOS. (We also have to set a flag that tells \textsc{Prover9} to apply this weight restriction to hint matchers; by default, it does not do so.) So what we expect to happen here is that the clause of weight 49 which showed up in the last two proofs will be generated but deleted before it has a chance to be selected as given. If all goes well, \textsc{Prover9} will find a proof that bypasses that clause. Here is the result. \begin{verbatim} \end{verbatim} Notice that we had a very significant drop in the proof length, and in fact, the maximum clause weight dropped well below our cutoff of 48. \textsc{Prover9} was forced to search among clauses of smaller weight and it paid off. Let us try again, reducing the maximum clause weight to 40. As before, we keep using each proof as a sketch for the next proof. \begin{verbatim} \end{verbatim} We see that we have lost ground, the previous proof is simpler than this one. Knowing that we can always fall back on the previous proof if need be, let us nevertheless continue with the current one, squeezing the maximum clause weight to 38. \begin{verbatim} \end{verbatim} At this point, we can continue to squeeze the maximum clause weight, but \textsc{Prover9} will always report 34. This is because two of the input clauses above have weight 34, and \textsc{Prover9} never applies weight restrictions to input clauses. Let us squeeze down to 33. \begin{verbatim} \end{verbatim} Here we are getting very close to the simplest proof we found above, but now a question is raised. The earlier simple proof is only 3 steps shorter than this one, but this one has a significantly smaller maximum clause weight (in fact, the noninput clauses have weight no greater than 33). Perhaps this proof should be considered to be simpler than the earlier one? Let us bypass this question by squeezing the maximum clause weight to 30. \begin{verbatim} \end{verbatim} Note that the level went up slightly, but the length is down quite a bit, so it is reasonable to say that this proof is simpler than any that came before. We continue in this same vein, with proof lengths going up and down. Squeezing the maximum clause weight below 24 turns out to cause \textsc{Prover9} not to find any proof at all, instead the SOS becomes empty. At that point, we just leave the maximum clause weight at 24 and continued iterating the basic procedure. Eventually we find a proof of length 150, level 40. Although the level has gone up, the drop in the length suggests that this proof is simpler than the previous one. The maximum clause weight is only one \textsc{Prover9} parameter we can tweak. We can also force \textsc{Prover9} to select hints by age instead of by weight, and this too shakes up the search space. I did this once and then reverted to the default selection scheme. After a couple of more iterations, \textsc{Prover9} found a proof of length 150, level 29. This is the simplest proof I was able to find in this casual hunt for one. There are many other things that can be done as well, for instance, force \textsc{Prover9} to select some clauses which do not match hints before it runs out of hint matchers. Another parameter that can be squeezed is the maximum number of variables. And there are others as well. All of them are worth trying. The whole process can be easily automated, of course. I carried out the above demonstration ``by hand'' to explain the basic technique, but there is no reason not to let the procedure run by itself for a long time and then see what is the simplest proof it found in the whole endeavor. I should also mention one point I ignored above in my efforts to simplify the exposition. As mentioned, \textsc{Prover9} does not count secondary inferences (rewrites) when it reports proof length. It is sometimes the case that although one reported proof length is less than another, the former proof will have steps with many more rewrites. This throws off the measure of simplicity. (This is an issue only for \textsc{Prover9}, not other ATP systems.) Some would argue that ideally, a simple proof should have no rewrites, with every step being a primary inference \cite{WosPieper}. \section{Final Remarks} In this paper I have described a technique that can be used to simplify proofs generated by automated theorem provers. This still begs important open questions already discussed earlier: what are some reasonable measures of simplicity of a proof? Within the context of a particular theory, how can two proofs be compared to decide which is the simpler? The techniques I have described have focused on one particular measurement: the length of a proof as determined by the number of inferences. Within that context, the simplification strategies described herein are certainly effective, but much more work is needed to address the broader questions.
\section{Introduction} Reinforcement learning (RL) has emerged as a popular method for training agents to perform complex tasks. In RL, the agent policy is trained by maximizing a reward function that is designed to align with the task. The rewards are extrinsic to the agent and specific to the environment they are defined for. Most of the success in RL has been achieved when this reward function is dense and well-shaped, e.g., a running ``score'' in a video game~\citep{mnih2015human}. However, designing a well-shaped reward function is a notoriously challenging engineering problem. An alternative to ``shaping'' an extrinsic reward is to supplement it with dense intrinsic rewards~\citep{oudeyer2009intrinsic}, that is, rewards that are generated by the agent itself. Examples of intrinsic reward include ``curiosity''~\citep{mohamed2015variational,schmidhuber1991possibility,singh2005intrinsically,houthooft2016vime,pathakICMl17curiosity} which uses prediction error as reward signal, and ``visitation counts''~\citep{bellemare2016unifying,pixelcnncount,poupart2006analytic,lopes2012exploration} which discourages the agent from revisiting the same states. The idea is that these intrinsic rewards will bridge the gaps between sparse extrinsic rewards by guiding the agent to efficiently explore the environment to find the next extrinsic reward. But what about scenarios with no extrinsic reward at all? This is not as strange as it sounds. Developmental psychologists talk about {\em intrinsic motivation} (i.e., curiosity) as the primary driver in the early stages of development~\citep{smith2005development,Ryan2000}: babies appear to employ goal-less exploration to learn skills that will be useful later on in life. There are plenty of other examples, from playing Minecraft to visiting your local zoo, where no extrinsic rewards are required. Indeed, there is evidence that pre-training an agent on a given environment using only intrinsic rewards allows it to learn much faster when fine-tuned to a novel task in a novel environment~\citep{pathakICMl17curiosity,pathakICLR18zeroshot}. Yet, so far, there has been no systematic study of learning with only intrinsic rewards. \begin{figure}[t] \centering \includegraphics[width=\linewidth]{figures/envfig_all.jpeg} \caption{\small A snapshot of the 54 environments investigated in the paper. We show that agents are able to make progress using no extrinsic reward, or end-of-episode signal, and only using curiosity. Video results, code and models at~\url{https://pathak22.github.io/large-scale-curiosity/}.} \label{fig:env} \vspace{-2mm} \end{figure} In this paper, we perform a large-scale empirical study of agents driven purely by intrinsic rewards across a range of diverse simulated environments. In particular, we choose the dynamics-based curiosity model of intrinsic reward presented in~\citet{pathakICMl17curiosity} because it is scalable and trivially parallelizable, making it ideal for large-scale experimentation. The central idea is to represent intrinsic reward as the error in predicting the consequence of the agent's action given its current state, i.e., the prediction error of learned forward-dynamics of the agent. We thoroughly investigate the dynamics-based curiosity across $54$ environments: video games, physics engine simulations, and virtual 3D navigation tasks, shown in Figure~\ref{fig:env}. To develop a better understanding of curiosity-driven learning, we further study the crucial factors that determine its performance. In particular, predicting future state in high dimensional raw observation space (e.g., images) is a challenging problem and, as shown by recent works~\citep{pathakICMl17curiosity,stadie2015incentivizing}, learning dynamics in an auxiliary feature space leads to improved results. However, how one should choose such an embedding space is a critical, yet open research problem. Through a systematic ablation, we examine the role of different ways to encode agent's observation such that an agent can perform well driven purely by its own curiosity. To ensure stable online training of dynamics, we argue that the desired embedding space should: (a) be {\em compact} in terms of dimensionality, (b) preserve {\em sufficient} information about the observation, and (c) be a {\em stationary} function of the observations. We show that encoding observations via a random network turn out to be a simple, yet effective technique for modeling curiosity across many popular RL benchmarks. This might suggest that many popular RL video game test-beds are not as visually sophisticated as commonly thought. Interestingly, we discover that although random features are sufficient for good performance at training, the learned features appear to generalize better (e.g., to novel game levels in Super Mario Bros.). In summary: (a) We perform a large-scale study of curiosity-driven exploration across a variety of environments including: the set of Atari games~\citep{bellemare13arcade}, Super Mario Bros., virtual 3D navigation in Unity~\citep{unity_ml}, multi-player Pong, and Roboschool~\citep{schulman2017proximal} environments. (b) We extensively investigate different feature spaces for learning the dynamics-based curiosity: random features, pixels, inverse-dynamics~\citep{pathakICMl17curiosity} and variational auto-encoders~\citep{kingma2013auto} and evaluate generalization to unseen environments. (c) We conclude by discussing some limitations of a direct prediction-error based curiosity formulation. We observe that if the agent itself is the source of stochasticity in the environment, it can reward itself without making any actual progress. We empirically demonstrate this limitation in a 3D navigation task where the agent controls different parts of the environment. \section{Dynamics-based Curiosity-driven Learning} Consider an agent that sees an observation $x_t$, takes an action $a_t$ and transitions to the next state with observation $x_{t+1}$. We want to incentivize this agent with a reward $r_t$ relating to how informative the transition was. To provide this reward, we use an exploration bonus involving the following elements: (a) a network to embed observations into representations $\phi(x)$, (b) a forward dynamics network to predict the representation of the next state conditioned on the previous observation and action $ p(\phi(x_{t+1}) | x_t, a_t)$. Given a transition tuple $\{x_t, x_{t+1}, a_t\}$, the exploration reward is then defined as $r_t = - \log p(\phi(x_{t+1}) | x_t, a_t)$, also called the \emph{surprisal}~\citep{josh_surprise}. An agent trained to maximize this reward will favor transitions with high prediction error, which will be higher in areas where the agent has spent less time, or in areas with complex dynamics. Such a dynamics-based curiosity has been shown to perform quite well across scenarios~\citep{pathakICMl17curiosity} especially when the dynamics are learned in an embedding space rather than raw observations. In this paper, we explore dynamics-based curiosity and use mean-squared error corresponding to a fixed-variance Gaussian density as surprisal, i.e., $\|f(x_t, a_t) - \phi(x_{t+1})\|^2_2$ where f is the learned dynamics model. However, any other density model could be used. \subsection{Feature spaces for forward dynamics} \label{feature_spaces} Consider the representation $\phi$ in the curiosity formulation above. If $\phi(x) = x$, the forward dynamics model makes predictions in the observation space. A good choice of feature space can make the prediction task more tractable and filter out irrelevant aspects of the observation space. But, what makes a good feature space for dynamics driven curiosity? We narrow down a few qualities that a good feature space should have: \begin{itemize} \item \emph{Compact}: The features should be easy to model by being low(er)-dimensional and filtering out irrelevant parts of the observation space. \item \emph{Sufficient}: The features should contain all the important information. Otherwise, the agent may fail to be rewarded for exploring some relevant aspect of the environment. \item \emph{Stable}: Non-stationary rewards make it difficult for reinforcement agents to learn. Exploration bonuses by necessity introduce non-stationarity since what is new and novel becomes old and boring with time. In a dynamics-based curiosity formulation, there are two sources of non-stationarity: the forward dynamics model is evolving over time as it is trained and the features are changing as they learn. The former is intrinsic to the method, and the latter should be minimized where possible \end{itemize} In this work, we systematically investigate the efficacy of a number of feature learning methods, summarized briefly as follows: \paragraph{Pixels} The simplest case is where $\phi(x) =x$ and we fit our forward dynamics model in the observation space. Pixels are sufficient, since no information has been thrown away, and stable since there is no feature learning component. However, learning from pixels is tricky because the observation space may be high-dimensional and complex. \paragraph{Random Features (RF)} The next simplest case is where we take our embedding network, a convolutional network, and fix it after random initialization. Because the network is fixed, the features are stable. The features can be made compact in dimensionality, but they are not constrained to be. However, random features may fail to be sufficient. \begin{wraptable}{r}{0.5\textwidth} \vspace{-3mm} \resizebox{0.9\linewidth}{!}{ \centering \begin{tabular}{c|cccc} \toprule & VAE & IDF & RF & Pixels \\ \midrule Stable & No & No & Yes & Yes \\ Compact & Yes & Yes & Maybe & No \\ Sufficient & Yes & Maybe & Maybe & Yes \\ \bottomrule \end{tabular}} \caption{\small Table summarizing the categorization of\\different kinds of feature spaces considered.\label{table:features}} \end{wraptable} \paragraph{Variational Autoencoders (VAE)} VAEs were introduced in~\citep{kingma2013auto,rezende2014stochastic} to fit latent variable generative models $p(x,z)$ for observed data $x$ and latent variable $z$ with prior $p(z)$ using variational inference. The method calls for an inference network $q(z|x)$ that approximates the posterior $p(z|x)$. This is a feedforward network that takes an observation as input and outputs a mean and variance vector describing a Gaussian distribution with diagonal covariance. We can then use the mapping to the mean as our embedding network $\phi$. These features will be a low-dimensional approximately sufficient summary of the observation, but they may still contain some irrelevant details such as noise, and the features will change over time as the VAE trains. \paragraph{Inverse Dynamics Features (IDF)} Given a transition $(s_t, s_{t+1}, a_t)$ the inverse dynamics task is to predict the action $a_t$ given the previous and next states $s_t$ and $s_{t+1}$. Features are learned using a common neural network $\phi$ to first embed $s_t$ and $s_{t+1}$. The intuition is that the features learned should correspond to aspects of the environment that are under the agent's immediate control. This feature learning method is easy to implement and in principle should be invariant to certain kinds of noise (see~\citep{pathakICMl17curiosity} for a discussion). A potential downside could be that the features learned may not be sufficient, that is they do not represent important aspects of the environment that the agent cannot immediately affect. A summary of these characteristics is provided in Table~\ref{table:features}. Note that the learned features are not stable because their distribution changes as learning progresses. One way to achieve stability could be to pre-train VAE or IDF networks. However, unless one has access to the internal state of the game, it is not possible to get a representative data of the game scenes to train the features. One way is to act randomly to collect data, but then it will be biased to where the agent started, and won't generalize further. Since all the features involve some trade-off of desirable properties, it becomes an empirical question as to how effective each of them is across environments. \subsection{Practical considerations in training an agent driven purely by curiosity} Deciding upon a feature space is only first part of the puzzle in implementing a practical system. Here, we detail the critical choices we made in the learning algorithm. Our goal was to reduce non-stationarity in order to make learning more stable and consistent across environments. Through the following considerations outlined below, we are able to get exploration to work reliably for different feature learning methods and environments with minimal changes to the hyper-parameters. \begin{itemize} \item \emph{PPO}. In general, we have found PPO algorithm~\citep{ppo} to be a robust learning algorithm that requires little hyper-parameter tuning, and hence, we stick to it for our experiments. \item \emph{Reward normalization}. Since the reward function is non-stationary, it is useful to normalize the scale of the rewards so that the value function can learn quickly. We did this by dividing the rewards by a running estimate of the standard deviation of the sum of discounted rewards. \item \emph{Advantage normalization}. While training with PPO, we normalize the advantages~\citep{sutton1998reinforcement} in a batch to have a mean of 0 and a standard deviation of 1. \item \emph{Observation normalization}. We run a random agent on our target environment for 10000 steps, then calculate the mean and standard deviation of the observation and use these to normalize the observations when training. This is useful to ensure that the features do not have very small variance at initialization and to have less variation across different environments. \item \emph{More actors}. The stability of the method is greatly increased by increasing the number of parallel actors (which affects the batch-size) used. We typically use 128 parallel runs of the same environment for data collection while training an agent. \item \emph{Normalizing the features}. In combining intrinsic and extrinsic rewards, we found it useful to ensure that the scale of the intrinsic reward was consistent across state space. We achieved this by using batch-normalization~\citep{ioffe2015batch} in the feature embedding network. \end{itemize} \subsection{`Death is not the end': discounted curiosity with infinite horizon} One important point is that the use of an end of episode signal, sometimes called a `done', can often leak information about the true reward function. If we don't remove the `done' signal, many of the Atari games become too simple. For example, a simple strategy of giving +1 artificial reward at every time-step when the agent is alive and 0 on death is sufficient to obtain a high score in some games, for instance, the Atari game `Breakout' where it will seek to maximize the episode length and hence its score. In the case of negative rewards, the agent will try to end the episode as quickly as possible. In light of this, if we want to study the behavior of pure exploration agents, we should not bias the agent. In the infinite horizon setting (i.e., the discounted returns are not truncated at the end of the episode and always bootstrapped using the value function), death is just another transition to the agent, to be avoided only if it is boring. Therefore, we removed `done' to separate the gains of an agent's exploration from merely that of the death signal. In practice, we do find that the agent avoids dying in the games since that brings it back to the beginning of the game, an area it has already seen many times and where it can predict the dynamics well. This subtlety has been neglected by previous works showing experiments without extrinsic rewards. \section{Experiments} In all of our experiments, both the policy and the embedding network work directly from pixels. For our implementation details including hyper-parameters and architectures, please refer to the Appendix~\ref{app:details}. Unless stated otherwise, all curves are the average of three runs with different seeds, and the shaded areas are standard errors of the mean. We have released the code and videos of a purely curious agent playing across all environments on the website~\footnote{\url{https://pathak22.github.io/large-scale-curiosity/}}. \begin{figure}[t] \centering \includegraphics[width=\linewidth]{figures/three_seeds_eprew_recent.png} \caption{\small A comparison of feature learning methods on 8 selected Atari games and the Super Mario Bros. These evaluation curves show the mean reward (with standard error) of agents trained purely by curiosity, without reward or an end-of-episode signal. We see that our purely curiosity-driven agent is able to gather rewards in these environments without using any extrinsic reward at training. Results on all of the Atari games are in the appendix in Figure~\ref{fig:atari_all_envs}. We find curiosity model trained on pixels does not work well across any environment and VAE features perform either same or worse than random and inverse dynamics features. Further, inverse dynamics-trained features perform better than random features in $55\%$ of the Atari games. An interesting outcome of this analysis is that random features for modeling curiosity are a simple, yet surprisingly strong baseline and likely to work well in half of the Atari games.} \label{fig:atari} \end{figure} \subsection{Curiosity-driven learning without extrinsic rewards} We begin by scaling up a pure curiosity-driven learning to a large number of environments without using any extrinsic rewards. We pick a total of $54$ diverse simulated environments, as shown in Figure~\ref{fig:env}, including $48$ Atari games, Super Mario Bros., $2$ Roboschool scenarios (learning Ant controller and Juggling), Two-player Pong, 2 Unity mazes (with and without a TV controlled by the agent). The goal of this large-scale analysis is to investigate the following questions: (a) What actually happens when you run a pure curiosity-driven agent on a variety of games without any extrinsic rewards? (b) What kinds of behaviors can you expect from these agents? (c) What is the effect of the different feature learning variants in dynamics-based curiosity on these behaviors? \paragraph{A) Atari Games} To answer these questions, we began with a collection of well-known Atari games and ran a suite of experiments with different feature learning methods. One way to measure how well a purely curious agent performs is to measure the extrinsic reward it is able to achieve, i.e. how good is the agent at playing the game. We show the evaluation curves of mean extrinsic reward in on 8 common Atari games in Figure~\ref{fig:atari} and all 48 Atari suite in Figure~\ref{fig:atari_all_envs} in the appendix. It is important to note that the extrinsic reward is only used for evaluation, not for training. However, this is just a proxy for pure exploration because the game rewards could be arbitrary and might not align at all with how the agent explores out of curiosity. The first thing to notice from the curves is: \emph{most of them are going up}. This shows that a pure curiosity-driven agent can learn to obtain external rewards even without using any extrinsic rewards during training. It is remarkable that agents with no extrinsic reward and no end of episode signal can learn to get scores comparable in some cases to learning with the extrinsic reward. For instance, in Breakout, the game score increases on hitting the ball with the paddle into bricks which disappear and give points when struck. The more times the bricks are struck in a row by the ball, the more complicated the pattern of bricks remaining becomes, making the agent more curious to explore further, hence, collecting points as a bi-product. Further, when the agent runs out of lives, the bricks are reset to a uniform structure again that has been seen by the agent many times before and is hence very predictable, so the agent tries to stay alive to be curious by avoiding reset by death. This is an unexpected result and might suggest that many popular RL test-beds do not need an external reward. This may be because game designers (similar to architects, urban planners, gardeners, etc.) are very good at setting up curriculums to guide agents through the task explaining the reason Curiosity-like objective decently aligns with the extrinsic reward in many human-designed environments~\citep{lazzaro2004we,costikyan2013uncertainty,hunicke2004mda,wouters2011role}. However, this is not always the case, and sometimes a curious agent can even do worse than random agent! This happens when the extrinsic reward has little correlation with the agent's exploration, or when the agent fails to explore efficiently (e.g. see games `Atlantis', `IceHockey' in Figure~\ref{fig:atari_all_envs}). We further encourage the reader to refer to the game-play videos of the agent available on the website for a better understanding of the learned skills. \textbf{Comparison of feature learning methods:} We compare four feature learning methods in Figure~\ref{fig:atari}: raw pixels, random features, inverse dynamics features and VAE features. Training dynamics on raw-pixels performs bad across all the environments, while encoding pixels into features does better. This is likely because it is hard to learn a good dynamics model in pixel space, and prediction errors may be dominated by small irrelevant details. Surprisingly, random features (RF) perform quite well across tasks and sometimes better than using learned features. One reason for good performance is that the random features are kept frozen (stable), the dynamics model learned on top of them has an easier time because of the stationarity of the target. In general, random features should work well in the domains where visual observations are simple enough, and random features can preserve enough information about the raw signal, for instance, Atari games. Interestingly, we find that while random features work well at training, IDF learned features appear to generalize better in Mario Bros. (see Section~\ref{sec:generalization} for details). The VAE method also performed well but was somewhat unstable, so we decided to use RF and IDF for further experiments. The detailed result in appendix Figure~\ref{fig:atari_all_envs} compares IDF vs. RF across the full Atari suite. To quantify the learned behaviors, we compared our curious agents to a randomly acting agent. We found that an IDF-curious agent collects more game reward than a random agent in $75\%$ of the Atari games, an RF-curious agent does better in $70\%$. Further, IDF does better than RF in $55\%$ of the games. Overall, random features and inverse dynamics features worked well in general. Further details in the appendix. \paragraph{B) Super Mario Bros.} We compare different feature learning methods in Mario Bros. in Figure~\ref{fig:atari}. Super Mario Bros has already been studied in the context of extrinsic reward free learning~\citep{pathakICMl17curiosity} in small-scale experiments, and so we were keen to see how far curiosity alone can push the agent. We use an efficient version of Mario simulator faster to scale up for longer training keeping observation space, actions, dynamics of the game intact. Due to 100x longer training and using PPO for optimization, our agent is able to pass several levels of the game, significantly improving over prior exploration results on Mario Bros. Could we further push the performance of a purely curious agent by making the underlying optimization more stable? One way is to scale up the batch-size. We do so by increasing the number of parallel threads for running environments from 128 to 2048. We show the comparison between training using 128 and 2048 parallel environment threads in Figure \ref{fig:mario_scale}. As apparent from the graph, training with large batch-size using 2048 parallel environment threads performs much better. In fact, the agent is able to explore much more of the game: {\em discovering 11 different levels of the game}, finding secret rooms and defeating bosses. Note that the x-axis in the figure is the number of gradient steps, not the number of frames, since the point of this large-scale experiment is not a claim about sample-efficiency, but performance with respect to training the agent. This result suggests that the performance of a purely curiosity-driven agent would improve as the training of base RL algorithm (which is PPO in our case) gets better. The video is on the website. \begin{figure} \centering \subfigure[Mario w/ large batch]{\label{fig:mario_scale}\includegraphics[width=0.31\textwidth]{figures/large_scale_mario_eprew_recent.png}} \quad \subfigure[Juggling (Roboschool)]{\label{fig:juggling}\includegraphics[width=0.31\textwidth]{figures/juggling_eprew_recent.png}} \quad \subfigure[Two-player Pong]{\label{fig:multipong}\includegraphics[width=0.31\textwidth]{figures/multiplayer_pong_eplen.png}} \caption{\small (a) Left: A comparison of the RF method on Mario with different batch sizes. Results are without using extrinsic reward. (b) Center: Number of ball bounces in the Juggling (Roboschool) environment. (c) Right: Mean episode length in the multiplayer Pong environment. The discontinuous jump on the graph corresponds to the agent reaching a limit of the environment - after a certain number of steps in the environment the Atari Pong emulator starts randomly cycling through background colors and becomes unresponsive to agent's actions} \end{figure} \paragraph{C) Roboschool Juggling} We modified the Pong environment from the Roboschool framework to only have one paddle and to have two balls. The action space is continuous with two-dimensions, and we discretized the action space into 5 bins per dimension giving a total of $25$ actions. Both the policy and embedding network are trained on pixel observation space (note: not state space). This environment is more difficult to control than the toy physics used in games, but the agent learns to intercept and strike the balls when it comes into its area. We monitored the number of bounces of the balls as a proxy for interaction with the environment, as shown in Figure \ref{fig:juggling}. See the video on the project website. \paragraph{D) Roboschool Ant Robot} We also explored using the Ant environment which consists of an Ant with 8 controllable joints on a track. We again discretized the action space and trained policy and embedding network on raw pixels (not state space). However, in this case, it was less easy to measure exploration because the extrinsic distance reward measures progress along the racetrack, but a purely curious agent is free to move in any direction. We find that a walking like behavior emerges purely out of a curiosity-driven training. We refer the reader to the result video showing that the agent is meaningfully interacting with the environment. \paragraph{E) Multi-agent curiosity in Two-player Pong} We have already seen that a purely curiosity-driven agent learns to play several Atari games without reward, but we wonder how much of that behavior is caused by the fact that the opposing player is a computer-agent with hardcoded strategy. What would happen if we were to make both the teams playing against each other to be curious? To find out, we take Two-player Pong game where both the sides (paddles of pong) of the game are controlled by curiosity-driven agents. We share the initial layers of both the agent and have different action heads, i.e., total action space is now the cross product of the actions of player 1 by the actions of player 2. Note that the extrinsic reward is meaningless in this context since the agent is playing both sides, so instead, we show the length of the episode. The results are shown in Figure \ref{fig:multipong}. We see from the episode length that the agent learns to have more and longer rallies over time, learning to play pong without any teacher -- purely by curiosity on both sides. In fact, {\em the game rallies eventually get so long that they break our Atari emulator} causing the colors to change radically, which crashes the policy as shown in the plot. \subsection{Generalization across novel levels in Super Mario Bros.} In the previous section, we showed that our purely curious agent can learn to explore efficiently and learn useful skills, e.g., game playing behaviour in games, walking behaviour in Ant etc. So far, these skills were shown in the environment where the agent was trained on. However, one advantage of developing reward-free learning is that one should then be able to utilize abundant ``unlabeled'' environments without reward functions by showing generalization to novel environments. To test this, we first pre-train our agent using curiosity only in the Level 1-1 of Mario Bros. We investigate how well RF and IDF-based curiosity agents generalize to novel levels of Mario. In Figure \ref{fig:mario_gen}, we show two examples of training on one level of Mario and finetuning on another testing level, and compare to learning on the testing level from scratch. The training signal in all the cases is only curiosity reward. In the first case, from Level 1-1 to Level 1-2, the global statistics of the environments match (both are `day' environment in games, i.e., blue background) but levels have different enemies, geometry and difficulty level. We see that there is strong transfer from for both methods in this scenario. However, the transfer performance is weaker in the second scenario from Level 1-1 to Level 1-3. This is so because the problem is considerably harder for the latter level pairing as there is a color scheme shift from day to night, as shown in Figure \ref{fig:mario_gen}. We further note that IDF-learned features transfer in both the cases and random features transfer in the first case, but do not transfer in the second scenario from day to night. These results might suggest that while random features perform well on training environments, learned features appear to generalize better to novel levels. However, this needs more analysis in the future across a large variety of environments. Overall, we find some promising evidence showing that skills learned by curiosity help our agent explore efficiently in novel environments. \label{sec:generalization} \begin{minipage}{\linewidth} \centering \begin{minipage}{0.55\linewidth} \begin{figure}[H] \includegraphics[width=\linewidth]{figures/mario_transfer_eprew_recent_non_fixed.pdf} \caption{\small Mario generalization experiments. On the left we show transfer results from Level 1-1 to Level 1-2, and on the right we show transfer results from Level 1-1 to Level 1-3. Underneath each plot is a map of the source and target environments. All agents are trained without extrinsic reward.} \label{fig:mario_gen} \end{figure} \end{minipage} \hspace{0.05\linewidth} \begin{minipage}{0.35\linewidth} \begin{figure}[H] \includegraphics[width=\linewidth]{figures/three_seeds_unitytv_extrinsic_eprew_recent.png} \caption{\small Mean extrinsic reward in the Unity environment while training with terminal extrinsic + curiosity reward. Note that the curve for extrinsic reward only training is constantly zero.} \label{fig:unity} \end{figure} \end{minipage} \end{minipage} \subsection{Curiosity with Sparse External Reward} \label{unity_experiments} In all our experiments so far, we have shown that our agents can learn useful skills without any extrinsic rewards driven purely by curiosity. However, in many scenarios, we might want the agent to perform some particular task of interest. This is usually conveyed to the agent by defining extrinsic rewards. When rewards are dense (e.g. game score at every frame), classic RL works well and intrinsic rewards generally should not help performance. However, designing dense rewards is a challenging engineering problem (see introduction for details). In this section, we evaluate how well curiosity can help an agent perform a task in presence of sparse, or just terminal, rewards. \textbf{Terminal reward setting}: For many real problems, e.g. navigation, the only terminal reward is available, a setting where classic RL typically performs poorly. Hence, we consider the 3D navigation in a maze designed in the Unity ML-agent framework with 9 rooms and a sparse terminal reward. There is a discrete action space consisting of: move forwards, look left 15 degrees, look right 15 degrees and no-op. The agent starts in the room-1, which is furthest away from room-9 which contains the goal of the agent. We compare an agent trained with extrinsic reward (+1 when the goal is reached, 0 otherwise) to an agent trained with extrinsic + intrinsic reward. Extrinsic only (classic RL) never finds the goal in all our trials which means it is impossible to get any meaningful gradients. Whereas extrinsic+intrinsic typically converges to getting the reward every time. Results in Figure \ref{fig:unity} show results for vanilla PPO, PPO + IDF-curiosity and PPO + RF-curiosity. \textbf{Sparse reward setting}: In preliminary experiments, we picked 5 Atari games which have sparse rewards (as categorized by~\citep{bellemare2016unifying}), and compared extrinsic (classic RL) vs. extrinsic+intrinsic (ours) reward performance. In 4 games out of 5, curiosity bonus improves performance (see Table~\ref{tab:extrinsic} in the appendix, the higher score is better). We would like to emphasize that this is not the focus of the paper, and these experiments are provided just for completeness. We just combined extrinsic (coefficient $1.0$) and intrinsic reward (coefficient $0.01$) directly without any tuning. We leave the question on how to optimally combine extrinsic and intrinsic rewards as a future direction. \section{Related Work} \textbf{Intrinsic Motivation:} A family of approaches to intrinsic motivation reward an agent based on prediction error \citep{schmidhuber_curiosity,stadie2015incentivizing,pathakICMl17curiosity,josh_surprise}, prediction uncertainty \citep{still2012information,houthooft2016vime}, or improvement \citep{schmidhuber1991curious, improvement1} of a forward dynamics model of the environment that gets trained along with the agent's policy. As a result the agent is driven to reach regions of the environment that are difficult to predict for the forward dynamics model, while the model improves its predictions in these regions. This adversarial and non-stationary dynamics can give rise to complex behaviors. Relatively little work has been done in this area on the pure exploration setting where there is no external reward. Of these mostly closely related are those that use a forward dynamics model of a feature space such as \citet{stadie2015incentivizing} where they use autoencoder features, and \citet{pathakICMl17curiosity} where they use features trained with an inverse dynamics task. These correspond roughly to the VAE and IDF methods detailed in Section \ref{feature_spaces}. Smoothed versions of state visitation counts can be used for intrinsic rewards \citep{bellemare2016unifying,fu2017ex2,pixelcnncount,rein_hashing}. Count-based methods have already shown very strong results when combining with extrinsic rewards such as setting the state of the art in the Atari game Montezuma's Revenge \citep{bellemare2016unifying}, and also showing significant exploration of the game without using the extrinsic reward. It is not yet clear in which situations count-based approaches should be preferred over dynamics-based approaches; we chose to focus on dynamics-based bonuses in this paper since we found them straightforward to scale and parallelize. In our preliminary experiments, we did not have sufficient success with already existing count-based implementations in scaling up for a large-scale study. Learning without extrinsic rewards or fitness functions has also been studied extensively in the evolutionary computing where it is referred to as `novelty search'~\citep{lehman2008exploiting,lehman2011abandoning,stanley2015greatness}. There the novelty of an event is often defined as the distance of the event to the nearest neighbor amongst previous events, using some statistics of the event to compute distances. One interesting finding from this literature is that often much more interesting solutions can be found by not solely optimizing for fitness. Other methods of exploration are designed to work in combination with maximizing a reward function, such as those utilizing uncertainty about value function estimates \citep{osband2016deep, chen2017ucb}, or those using perturbations of the policy for exploration \citep{fortunato2017noisy, plappert2017parameter}. \citet{schmidhuber2010formal} and \citet{oudeyer2009intrinsic, oudeyer2018computational} provide a great review of some of the earlier work on approaches to intrinsic motivation. Alternative methods of exploration include \citet{sukhbaatar2017intrinsic} where they utilize an adversarial game between two agents for exploration. In~\citet{gregor2017variational}, they optimize a quantity called empowerment which is a measurement of the control an agent has over the state. In a concurrent work, diversity is used as a measure to learn skills without reward functions~\citet{diyn}. \textbf{Random Features:} One of the findings in this paper is the surprising effectiveness of random features, and there is a substantial literature on random projections and more generally randomly initialized neural networks. Much of the literature has focused on using random features for classification \citep{saxe2011random, jarrett2009best, yang2015deep} where the typical finding is that whilst random features can work well for simpler problems, feature learning performs much better once the problem becomes sufficiently complex. Whilst we expect this pattern to also hold true for dynamics-based exploration, we have some preliminary evidence showing that learned features appear to generalize better to novel levels in Mario Bros. \section{Discussion} \vspace{-2mm} We have shown that our agents trained purely with a curiosity reward are able to learn useful behaviours: (a) Agent being able to play many atari games without using any rewards. (b) Mario being able to cross over over 11 levels without reward. (c) Walking like behavior emerged in the Ant environment. (d) Juggling like behavior in Robo-school environment (e) Rally-making behavior in Two-player Pong with curiosity-driven agent on both sides. But this is not always true as there are some Atari games where exploring the environment does not correspond to extrinsic reward. More generally, these results suggest that, in environments designed by humans, the extrinsic reward is perhaps often aligned with the objective of seeking novelty. The game designers set up curriculums to guide users while playing the game explaining the reason Curiosity-like objective decently aligns with the extrinsic reward in many human-designed games~\citep{costikyan2013uncertainty,hunicke2004mda,wouters2011role,lazzaro2004we}. \textbf{Limitation of prediction error based curiosity:} A more serious potential limitation is the handling of stochastic dynamics. If the transitions in the environment are random, then even with a perfect dynamics model, the expected reward will be the entropy of the transition, and the agent will seek out transitions with the highest entropy. Even if the environment is not truly random, unpredictability caused by a poor learning algorithm, an impoverished model class or partial observability can lead to exactly the same problem. We did not observe this effect in our experiments on games so we designed an environment to illustrate the point. \begin{wrapfigure}{r}{0.52\textwidth} \vspace{-4mm} \centering \includegraphics[width=\linewidth]{figures/three_seeds_unitytv_eprew_recent.png} \caption{We add a noisy TV to the unity environment in Section \ref{unity_experiments}. We compare IDF and RF with and without the TV.} \label{fig:noisy_tv} \vspace{-2mm} \end{wrapfigure} We return to the maze of Section \ref{unity_experiments} to empirically validate a common thought experiment called the noisy-TV problem. The idea is that local sources of entropy in an environment like a TV that randomly changes channels when an action is taken should prove to be an irresistible attraction to our agent. We take this thought experiment literally and add a TV to the maze along with an action to change the channel. In Figure \ref{fig:noisy_tv} we show how adding the noisy-TV affects the performance of IDF and RF. As expected the presence of the TV drastically slows down learning, but we note that if you run the experiment for long enough the agents do sometimes converge to getting the extrinsic reward consistently. We have shown empirically that stochasticity can be a problem, and so it is important for future work to address this issue in an efficient manner. \textbf{Future Work:} We have presented a simple and scalable approach that can learn nontrivial behaviors across a diverse range of environments without any reward function or end-of-episode signal. One surprising finding of this paper is that random features perform quite, but learned features appear to generalize better. Whilst we believe that learning features will become important once the environment is complex enough, we leave that up to future work to explore. Our wider goal, however, is to show that we can take advantage of many unlabeled (i.e., not having an engineered reward function) environments to improve performance on a task of interest. Given this goal, showing performance in environments with a generic reward function is just the first step, and future work could investigate transfer from unlabeled to labeled environments.\\ \textbf{Acknowledgments}\\\\ We would like to thank Chris Lu for helping with the Unity environment, Phillip Isola and Alex Nichols for feedback on the paper. We are grateful to the members of BAIR and OpenAI for fruitful discussions. DP is supported by the Facebook graduate fellowship. \small{ \bibliographystyle{abbrvnat}
\section{Introduction}\label{sec:introduction} Over the last decade, low rank regularization has attracted much attention due to its success in various fields, ranging from machine learning, computer version, data mining to deep learning. For all of them, the fundamental assumption is that the matrix we aim to learn lie near some low-dimensional subspaces. Generally, the algorithms using low rank regularization are based on the following formulation(or its variants): \begin{equation}\label{eq:1} \textstyle \min_{\bm X}\ \ \mathcal{L}(\bm X)+ \lambda rank(\bm X) \ \ s.t. \ \ \bm X \in \mathcal{C}\,. \end{equation} where $\mathcal{L}(\bm X)$ represents the loss term, $rank(\bm X)$ denotes the rank of $\bm X$, i.e., the regularization term, $\mathcal{C}$ represents the constraints over $\bm X$, and $\lambda$ is a regularization parameter. Optimizing the problem~\eqref{eq:1} inevitably involves solving a rank minimization problem. Matrix rank minimization, a pioneer of low rank regularization, is known to be an NP-hard problem. The most widely used method is looking for a heuristic which solves the original problem approximately but efficiently~\citep{fazel2002matrix}. Correspondingly, we can obtain an approximation of problem~\eqref{eq:1} as follows: \begin{equation}\label{eq:2} \textstyle \min_{\bm X}\ \ \mathcal{L}(\bm X)+ \lambda \mathcal{R}(\bm X) \ \ s.t. \ \ \bm X \in \mathcal{C}\,. \end{equation} where $\mathcal{R}(\bm X)$ represents the relaxation that we use to replace the original rank minimization problem, and the nuclear norm is the most widely used. The nuclear norm is proposed by~\citep{fazel2002matrix} and highlighted by~\citep{candes2011robust,DBLP:journals/tit/CandesT10}. Recently, much progress over formulation~\eqref{eq:2} and its variants has been made. Indeed, most of them along the following three directions. \begin{enumerate} \item Use the formulation~\eqref{eq:2} or its variants to solve some particular tasks, such as machine learning tasks including Matrix Completion ~\cite{DBLP:journals/tit/CandesT10,DBLP:conf/ijcai/NieHH17,DBLP:journals/corr/abs-1710-02004,DBLP:journals/corr/LinCM10,DBLP:conf/cvpr/LuTYL14,quanming2017large}, Subspace Clustering~\cite{DBLP:conf/ijcai/NieH16,DBLP:journals/pami/LiuLYSYM13,DBLP:journals/pami/YinGL16,DBLP:journals/tnn/ZhangXSY18,peng2015subspace}, and Multi-Task Learning~\cite{DBLP:conf/aaai/HanZ16,DBLP:journals/pami/ZhenYHL18,DBLP:conf/kdd/ChenZY11,DBLP:conf/icml/JiY09,DBLP:journals/tnn/DingF18}, and computer version tasks including Visual Tracking~\cite{DBLP:journals/ijcv/SuiTZW18}, $3$D Reconstruction~\cite{agudo2018image,DBLP:journals/ijcv/DaiLH14,DBLP:conf/cvpr/ZhuHTL14,DBLP:conf/cvpr/DaiLH12}, and Salient Object Detection~\cite{DBLP:journals/pami/PengLLHXM17,DBLP:conf/cvpr/ShenW12,DBLP:conf/bmvc/ZouKLR13,gao2014block}. \item Find a better approximation, i.e., a better regularizer $\mathcal{R}(\bm X)$ for original rank minimization problem. For instance, the TNN~(Truncated Nuclear Norm)~\cite{DBLP:journals/pami/HuZYLH13}, WNN~(Weighted Nuclear Norm)~\cite{DBLP:conf/cvpr/GuZZF14,DBLP:journals/ijcv/GuXMZFZ17,DBLP:conf/aaai/ZhongXLLC15}, Schatten-p norm~\cite{DBLP:journals/jmlr/MohanF12,DBLP:conf/aaai/NieHD12,shang2017bilinear,DBLP:conf/aaai/ShangLC16,DBLP:journals/tip/LuLY15}, and CNN~(Capped Nuclear Norm)~\cite{DBLP:conf/kdd/SunXY13}. \item Develop efficient optimization methods for solving the problem~\eqref{eq:2} and its variants, such as the IRW~(Iteratively Re-weighted method)~\cite{candes2008enhancing,ochs2015iteratively,daubechies2010iteratively}, ALM~(Augmented Lagrangian Method)~\cite{lin2010augmented}, ADMM~(Alternating Direction Method of Multipliers)~\cite{lu2018unified}, APG~(Accelerated Proximal Gradient) method~\cite{li2015accelerated,ghadimi2016accelerated,DBLP:journals/corr/abs-1708-00146,yao2016efficient}, Frank-Wolfe Algorithm~\cite{zhang2012accelerated}. \end{enumerate} For each of three directions presented above, a great many of efforts have been made. But the intersection between three groups is very slight. As presented in the rest of this paper, the nuclear norm is generally selected to serve as regularizer in solving practical issues due to its convexity, advantages in optimization and sound theoretical guarantee. Besides, ADMM method is generally used to solve the corresponding models due to its advantages in tackling complicated problems. In practice, however, the superiority of non-convex regularizers over nuclear norm has been verified in many traditional machine learning models, such as matrix completion~\cite{DBLP:journals/jmlr/MohanF12,DBLP:conf/aaai/NieHD12,shang2017bilinear,DBLP:conf/aaai/ShangLC16,DBLP:journals/tip/LuLY15,DBLP:journals/pami/HuZYLH13}, and robust PCA~\cite{DBLP:conf/kdd/SunXY13,DBLP:conf/aaai/ShangLC16}. Besides, numerous efficient optimization approaches over relaxed matrix rank minimization problems have been proposed, such as APG. Both of these two techniques are rarely seen in solving practical issues. Hence, taking a comprehensive survey for both theories and applications over low rank regularization is urgent. Note that some investigations have been made for low rank matrix learning. For instance, a survey for low-rank matrix learning and its applications in image analysis has been provided in~\cite{DBLP:journals/csur/ZhouYZY14}. Furthermore, the low rank matrix learning in the visual analysis has been summarized in~\cite{lin2017low,Lin2017A}. A discussion for optimization algorithms used in RPCA or its variants has been made in~\cite{ma2018efficient}. Nevertheless, both of them revolve around the nuclear norm regularization or matrix factorization method, and pay little attention to the non-convex regularization, which is the core of this paper. To construct a hub for low rank regularization, in this paper we summarize the main process over it along three directions mentioned above. In particular, considering that low rank regularizer is one of the most significant factors influencing the performance of algorithm, we provide a comprehensive comparison over several representatives including convex and non-convex relaxations. Extensive experimental results demonstrate that non-convex regularization can provide a large advantage over nuclear norm~(The experimental results can be found in supplementary materials). Such a result may be useful for promoting the application of non-convex regularization in solving practical issues. \textbf{Notations.} In this paper, the matrix is denoted by boldface capital letters, such as $\bm X$, and vector is denoted by lower-case letters, such as $\bm x$. In addition, we denote the $i$th singular value of $\bm X$ by $\sigma_i(\bm X)=\sigma_i$. \section{Application}\label{sec:2} Although a great many of algorithms have been developed for solving various tasks, most of them are actually the variants of several traditional machine learning models. According to the \emph{type} of desired matrix, we roughly grouped them into two categories: $1)$ the matrix we aim to learn is a \emph{data} matrix, such as Robust Principal Component Analysis and Robust Matrix Completion; $2)$ the matrix we aim to learn is a \emph{coefficient} matrix, such as Subspace Clustering and Multi-Task Learning. In this section, we first describe the details of these four representative models in Sect.\ref{sec:2.1}. And then, we show several practical issues solved by them or their variants in Sect.\ref{sec:2.2}. \subsection{Representative Machine Learning Models based on Low Rank Regularization}\label{sec:2.1} \subsubsection{Robust Principal Component Analysis} In most cases, the fundamental assumption for using low rank regularization is that the data we collected lie near some low-dimensional subspaces. For instance, users' records~(such as ratings for movies) in recommender systems, and images in computer version. In the real world, however, the data are generally corrupted by noise and outliers. Robust Principal Component Analysis (RPCA)~\citep{candes2011robust} is one of the most significant tools for recovering a low-rank matrix robustly from noisy observations, and it opens the door of using low rank regularization. Mathematically, the problem of RPCA can be solved by using the following formulation: \begin{equation}\label{eq:rpca} \textstyle \min_{\bm X}\ \ \|\bm X-\bm M\|_\ell + \lambda \mathcal{R}(\bm X)\,, \\ \end{equation} where $\bm M$ is the noisy observation matrix, $\|\bullet\|_\ell$ denotes the loss function which depends on the assumption over noise distribution. \subsubsection{Robust Matrix Completion} Robust Matrix Completion~(RMC) is one of the most important variants of RPCA, which considers a general case that some entries of input data matrix $\bm M$ are unknown, and the known entries are corrupted by noise. The goal of RMC is utilizing the known information to estimate the values of missing entries. The basic assumption used by RMC is that the complete matrix we aim to recover is low rank or approximately low rank. Correspondingly, the problem of RMC can be solved by using the following formulation: \begin{equation}\label{eq:rmc} \textstyle \min_{\bm X}\ \ \|\mathcal{P}_\Omega(\bm X-\bm M)\|_\ell + \lambda \mathcal{R}(\bm X) \\ \end{equation} where $\mathcal{P}_\Omega$ represents a projecting operator, $\Omega$ represents a set recording the indices of known entries. The entries of matrix $\mathcal{P}_\Omega(\bm X)$ are consistent with $\bm X$ on $\Omega$ and are $0$ on residuals. \subsubsection{Multi-Task Learning} Both RPCA and RMC are based on the assumption that the data matrix we aim to learn is low rank or approximately low rank. That is, the data we collected is relevant. The relatedness among \emph{different samples} further inspires researchers to explore the relatedness among \emph{different tasks}. Given $K$ relevant tasks $\{\mathcal{T}_i\}_{i=1}^K$ accompanied by feature matrix $\{\bm X_i\in R^{n_i\times d}\}_{i=1}^K$ and target vectors $\{\bm y_i\in R^{n_i\times 1}\}_{i=1}^K$, we can learn them simultaneously to improve the generalization performance of each one. Such a problem refers to Multi-Task Learning~(MTL). Suppose $\bm W\in R^{d\times K}$ is a weight matrix we aim to learn, where $i$th column $\bm w_i$ is the weight vector for task $\mathcal{T}_i$. The relatedness among $K$ tasks imply that the structure of $\bm W$ is low rank or approximately low rank~\cite{DBLP:journals/siamjo/PongTJY10}. Hence, a general model for MTL using low rank assumption is: \begin{equation}\label{eq:mtl} \textstyle \min_{\bm W} \sum_{i=1}^{K}\mathcal{L}_i(\bm X_i\bm w_i;\bm y_i)+\lambda \mathcal{R}(\bm W)\,, \end{equation} where $\mathcal{L}_i(\bullet)$ denotes the loss function used in $i$th task. \subsubsection{Subspace Clustering} Given a set of data points approximately drawn from a union of multiple subspaces, the goal of Subspace Clustering~(SC) is partitioning the data points into their respective subspaces. To this end, ~\cite{DBLP:journals/pami/LiuLYSYM13} proposed a Low-Rank Representation~(LRR) model, which seeks a low rank matrix $\bm Z$ consisting of the candidates of data points in a given dictionary $\bm D$. To obtain the matrix $\bm Z$, we need to solve a model as follows: \begin{equation}\label{eq:sc} \min_{\bm Z} \|\bm D\bm Z-\bm X\|_\ell +\lambda \mathcal{R}(\bm Z)\,. \end{equation} Here, the low rank matrix $\bm Z$ can be seen as a rough similarity matrix, and the final partitioning result can be obtained by conducting spectral clustering with a refined similarity matrix. \subsubsection{Summarization} For each model mentioned above, various variants have been developed. For instance, RPCA~\cite{DBLP:conf/kdd/SunXY13,DBLP:journals/pami/OhTBKK16,DBLP:journals/ijcv/GuXMZFZ17}, MC~\cite{DBLP:journals/tit/CandesT10,DBLP:conf/ijcai/NieHH17,DBLP:journals/corr/abs-1710-02004,DBLP:journals/corr/LinCM10,DBLP:conf/cvpr/LuTYL14,quanming2017large,DBLP:journals/cacm/CandesR12,chen2016matrix}, MTL~\cite{DBLP:journals/siamjo/PongTJY10,DBLP:conf/aaai/HanZ16,DBLP:journals/pami/ZhenYHL18,DBLP:conf/kdd/ChenZY11,DBLP:conf/icml/JiY09,DBLP:journals/tnn/DingF18,nie2018calibrated,kong2018probabilistic}, and SC~\cite{DBLP:conf/ijcai/NieH16,DBLP:journals/pami/LiuLYSYM13,DBLP:journals/pami/YinGL16,DBLP:journals/tnn/ZhangXSY18,peng2015subspace}. Nevertheless, the main differences between them are loss function or regularization term. A short discussion for loss function widely used in machine learning can be found in~\cite{nie2018investigation}. The details with respect to the regularization term will be discussed in next section. Furthermore, it is worth noting that in addition to the models mentioned above, the low rank regularization has achieved success on other fields including Component Analysis~\cite{DBLP:conf/cvpr/SagonasPLZ17,DBLP:journals/pami/PanagakisNZP16}, Compressive Sensing~\cite{DBLP:journals/tip/DongSLMH14}, Multi-View Learning~\cite{gao2015multi,DBLP:conf/aaai/LiuLTXW15,DBLP:conf/aaai/XiaPDY14,DBLP:conf/ijcai/WangZWLFP16}, Self-taught~\cite{li2018self}, Transfer Learning~\cite{DBLP:conf/aaai/DingSF14,DBLP:journals/ijcv/ShaoKF14}, Spectral Clustering~\cite{chen2014clustering}, Metric Learning~\cite{DBLP:conf/kdd/HuoNH16}, and so on. Indeed, most of them including LRR and MTL are derived from RPCA and MC. Recently, the progress achieved in RPCA and MC may be useful for further improving the performance of existing algorithms. \begin{table}[] \scriptsize \centering \caption{Practical issues solved by using Low Rank Regularization. More details with respect to constructed models and corresponding optimization methods can be found in references.} \label{my-label} \begin{tabular}{|c|c|c|} \hline Application & Regularizer $\mathcal{R}(\bm X)$ & Optimization \\ \hline\hline Face Analysis~\cite{xue2018side,DBLP:conf/iccv/XuePZ17,DBLP:journals/ijcv/SagonasPZP17,DBLP:conf/cvpr/SagonasPLZ17} & $\|\bm X\|_*$ & ADMM \\ \hline Person Re-Identification~\cite{su2018multi} & $\|\bm X\|_*$ & others \\ \hline Visual Tracking~\cite{DBLP:journals/ijcv/SuiTZW18,DBLP:journals/ijcv/SuiZ16} & $\|\bm X\|_*$ & others \\ \hline $3$D Reconstruction~\cite{agudo2018image,DBLP:journals/ijcv/DaiLH14,DBLP:conf/cvpr/ZhuHTL14,DBLP:conf/cvpr/DaiLH12} & $\|\bm X\|_*$ & ADMM \\ \hline Image denoising~\cite{DBLP:journals/ijcv/GuXMZFZ17,DBLP:conf/iccv/ChangYZ17,DBLP:journals/tip/HuangDXSB17,DBLP:conf/iccv/WangT13} & $\sum_{i=1}^{k} w_i\sigma_i$ & ADMM \\ \hline Structure Recovery~\cite{DBLP:conf/iccvw/GS17} & $\sum_{i=1}^{r} w_i\sigma_i$ & others \\\hline Video Desnowing and Deraining~\cite{DBLP:conf/cvpr/RenTHCT17} & $\|\bm X\|_*$ & AM \\ \hline Salient Object Detection~\cite{DBLP:journals/pami/PengLLHXM17,DBLP:conf/cvpr/ShenW12,DBLP:conf/bmvc/ZouKLR13,gao2014block} & $\|\bm X\|_*$ & ADMM \\ \hline Face Recognition~\cite{DBLP:journals/pami/YangLQTZX17,DBLP:conf/cvpr/LezamaQS17,li2014learning} & $\|\bm X\|_*$ & ADMM \\\hline High Dynamic Range Imaging~\cite{DBLP:journals/pami/OhLTK15,DBLP:journals/pami/OhTBKK16} & $\|\bm X\|_*$, $\sum_{i=k+1}^{r}\sigma_i$ & ADMM \\ \hline Head Pose Estimation~\cite{DBLP:conf/aaai/ZhaoDF16} & $\|\bm X\|_*$ & ADMM \\\hline Moving Object Detection~\cite{DBLP:conf/iccv/ShakeriZ17} & $\|\bm X\|_*$ & ADMM \\\hline Reflection Removal~\cite{DBLP:conf/cvpr/HanS17} & $\|\bm X\|_*$ & others \\\hline Zero-Shot Learning~\cite{DBLP:conf/cvpr/DingSF17} & $\sum_{i=r+1}^{k}\sigma_i$ & others \\\hline Speckle removal~\cite{DBLP:conf/cvpr/ZhuFBH17} & $\sum_{i=r+1}^{k}w_i\sigma_i$ & ADMM \\\hline Image Completion~\cite{DBLP:conf/eccv/LiLXSG16} & $\sum_{i=r+1}^{k}w_i\sigma_i$ & ADMM \\\hline Image Matching~\cite{DBLP:conf/iccv/ZhouZD15} & $\frac{1}{2}(\|\bm U\|_F^2+\|\bm V\|_F^2)$ & ADMM \\\hline Video Segmentation~\cite{li2015sold} & $\|\bm U\bm V\|_F^2$ & others \\\hline Image alignment~\cite{DBLP:journals/ijcv/PengZYM18,DBLP:conf/cvpr/SagonasPZP14,DBLP:journals/pami/PengGWXM12,DBLP:conf/cvpr/ZhaoCW11}& $\|\bm X|_*$ & ADMM \\\hline Image Restoration~\cite{DBLP:conf/iccv/LiCZGT15}& $\|\bm X|_*$ & ADMM \\\hline Image Classification~\cite{DBLP:journals/pami/CabralTCB15,DBLP:conf/iccv/ZhangGLXA13,DBLP:journals/tip/ZhangLZZY16,DBLP:conf/aaai/ZhuJWWCLH17,DBLP:conf/aaai/JiangGP14,DBLP:conf/cvpr/ZhangJD13}& $\|\bm X\|_*$ & ADMM \\ \hline AAM fitting~\cite{DBLP:conf/iccv/ChengSSL13}& $\|\bm X\|_*$ & ADMM\\ \hline Image Segmentation~\cite{cheng2011multi}& $\|\bm X\|_*$ & ADMM \\ \hline Motion Segmentation~\cite{DBLP:conf/iccv/LiuY11}& $\|\bm X\|_*$ & ADMM\\ \hline Colorization~\cite{DBLP:conf/aaai/YaoJ15,DBLP:conf/aaai/WangZ12}& $\|\bm X\|_*$ & ADMM\\ \hline photometric stereo~\cite{DBLP:conf/hsi/FanLQWDY16} & $\|X\|_*$ & ADMM \\ \hline Textures~\cite{DBLP:journals/ijcv/ZhangGLM12}& $\|\bm X\|_*$ & ADMM\\ \hline Deep Learning~\cite{DBLP:conf/eccv/DingSF16,DBLP:conf/nips/DenilSDRF13,DBLP:conf/cvpr/YuLWT17} & $\|\bm X\|_*$ & others \\ \hline Behavior Analysis~\cite{DBLP:journals/ijcv/GeorgakisPP18} & $\|\bm X\|_{Sp}$ & ADMM \\ \hline Heart Rate Estimation~\cite{DBLP:conf/cvpr/TulyakovARYCS16} & $\|\bm X\|_*$ & ADMM \\ \hline Text Models~\cite{DBLP:conf/nips/Shi13} & $\|\bm X\|_*$ & others \\ \hline Rank Aggregation~\cite{DBLP:conf/aaai/PanLLTY13} & $\|\bm X\|_*$ & ADMM \\ \hline \end{tabular} \setlength{\abovecaptionskip}{-10.cm} \setlength{\belowcaptionskip}{-5.cm} \end{table} \subsection{Practical Issues Solved by Using Low Rank Regularization}\label{sec:2.2} We provide a summarization for practical issues solved by using low rank regularization in Table~\ref{my-label}. Next, we describe the details of some representatives among them. \subsubsection{Background Subtraction} Video background subtraction is one of the most well known topics using low rank regularization. Suppose $\bm X$ is a data matrix, and its each column is a vectorized image. As illustrated in~\cite{candes2011robust}, the background component can be recovered by recovering a low rank matrix $\bm L$, and the foreground component, i.e., the moving object can be detected by learning a sparse matrix $\bm E$. In~\cite{candes2011robust}, such a problem was solved by solving a PCP model as follows: \begin{equation}\label{eq:bc} \textstyle \min_{\bm L,\bm E} \ \ \|\bm E\|_1 + \lambda\|\bm L\|_* \ \ s.t. \ \ \bm X = \bm L+\bm E\,. \end{equation} where the $\|\bm E\|_1$ is the the convex surrogate of $\|\bm E\|_0$. Subsequently, in order to achieve better splitting results, numerous improvements for Eq.~\eqref{eq:bc} have been made. In ~\cite{DBLP:journals/ijcv/GuXMZFZ17}, the nuclear norm is replaced by non-convex regularizers to achieve better low rank approximation. In order to cope with the nonrigid motion and dynamic background, a DECOLOR method~(DEtecting Contiguous Outliers in the LOw-rank Representation) is proposed in~\cite{DBLP:journals/pami/ZhouYY13}. Recently, Shakeri et al.~\cite{DBLP:conf/iccv/ShakeriZ17} construct a low-rank and invariant sparse decomposition model to reduce the effect caused by various illumination changes. Serving as one of the indices evaluating the performance of RPCA, background subtraction has received a great many of attentions, and a comprehensive survey for it can be found in~\cite{DBLP:journals/csr/BouwmansSJJZ17}~\footnote{BS library: https://github.com/andrewssobral/lrslibrary}. \subsubsection{Image Denoising} Image denoising, in essence, involves estimating the latent clean image from an noisy image, which is a fundamental problem in low level vision. The success of several state-of-the-art image denoising algorithms, such as~\cite{DBLP:journals/tip/DabovFKE07} is based on the exploitation of image nonlocal self-similarity, which refers to the assumption that for each local patch in a natural image, one can find some similar patches to it. Intuitively, by vectoring all similar patches as column vectors and stacking them as a matrix, one can obtain a matrix with low rank structure~\cite{DBLP:conf/accv/WangZL12}. Using low rank assumption, Gu et al.~\cite{DBLP:conf/cvpr/GuZZF14} propose a low rank approximation model to tackle the problem of image denoising. The proposed model based on weighted nuclear norm is as follows: \begin{equation}\label{eq:id} \begin{split} \min_{\bm X} &\ \ \|\bm X-\bm M\|_F^2 + \lambda\|\bm X\|_{w,*}\\ \end{split} \end{equation} where $\bm M$ refers to the noisy matrix stacked by all vectorized similar patches, $\|\bm X\|_{w,*} = \sum w_i\sigma_i$ is a non-convex relaxation for rank minimization. The Eq.~\eqref{eq:id} is also a variant of Eq.~\eqref{eq:rpca}. Similar models with different regularizers have been proposed in~\cite{DBLP:journals/tip/HuangDXSB17}, and a different model with similar regularizer has been developed in~\cite{yair2018multi,DBLP:conf/iccv/XuZ0F17}. \subsubsection{Image Alignment} Image Alignment~(IA) involves transforming various images into a common coordinate system. Stacking all transformed images as a matrix, the matrix may be a sum of a approximately low rank matrix $\bm L$, corresponding to aligned images, and sparse matrix $\bm E$, corresponding to noise or the differences among images. In praticular, the low rank component and noise component can be split via a RPCA model. In order to learn the transformation and aligned images simultaneously, Peng et al.~\cite{DBLP:journals/pami/PengGWXM12} introduce a transformation $\tau$ into RPCA and construct a novel model for IA problems: \begin{equation}\label{eq:IA} \textstyle \min_{\bm L,\bm E,\tau} \ \ \|\bm E\|_1 + \lambda\|\bm L\|_* \ \ s.t. \ \ \bm X \circ \tau= \bm L+\bm E\,, \end{equation} where $\tau$ denotes the transformation. Then, the method was improved by~\cite{DBLP:conf/iccv/ChengSSL13,DBLP:journals/ijcv/PengZYM18}. In practice, however, both of them select the nuclear norm serve as regularizer and the ADMM method to optimize the corresponding models. \subsubsection{Non-rigid Structure From Motion} Using low rank regularization to cope with the Non-rigid Structure From Motion~(NSFM) problems is introduced by~\cite{DBLP:conf/cvpr/DaiLH12}\footnote{The best paper of CVPR 2012.}. Assuming that the nonrigid $3$D shapes lie in a single low dimensional subspace, Dai et al. use the following model to estimate the $3D$ coordinates. \begin{equation}\label{eq:NSFM} \textstyle \min_{\bm X,\bm E} \ \ \|\bm X\|_*+\lambda\|\bm E\|_\ell \ \ s.t. \ \ \bm W = \bm R\bm X^\#+\bm E\,, \end{equation} where $\bm W$ consists of the $2D$ projected coordinates of all data points. In addition, the definitions of $\bm R$ and $\bm X^\#$ can be found in~\cite{DBLP:conf/cvpr/DaiLH12,DBLP:journals/ijcv/DaiLH14}. Obviously, such a formulation is derived from RPCA. Subsequently, in order to cope with the complex nonrigid motion that $3$D shapes lie in a union of multiple subspaces rather than a single subspace, Zhu et al. ~\cite{DBLP:conf/cvpr/ZhuHTL14} proposed a subspace clustering based model, which can learn the $3D$ structure $\bm X$ and a affinity matrix $\bm Z$, simultaneously. Recently, a more complicated case that the $2D$ point tracks contain multiple deforming objects is considered by~\cite{DBLP:conf/cvpr/AgudoM17,DBLP:journals/corr/KumarDL17,agudo2018image}, and a scalable dense NSFM is considered by~\cite{kumar2018scalable}. \subsubsection{Summarization} In addition to the issues mentioned above, low rank regularization has been also applied into other fields, including Visual Tracking~\cite{DBLP:journals/ijcv/SuiTZW18,DBLP:journals/ijcv/SuiZ16,DBLP:journals/ijcv/Zhang0AYG15}, salient object detection~\cite{DBLP:journals/pami/PengLLHXM17,DBLP:conf/cvpr/ShenW12,DBLP:conf/bmvc/ZouKLR13,gao2014block}, face analysis~\cite{xue2018side,DBLP:journals/ijcv/SagonasPZP17,DBLP:conf/cvpr/SagonasPLZ17}, Deep Leaning~\cite{DBLP:conf/eccv/DingSF16,lezama2018ole,DBLP:conf/cvpr/YuLWT17,DBLP:conf/icassp/SainathKSAR13,DBLP:conf/nips/DenilSDRF13} and so on. Acturally, most of the algorithms are the variants of RPCA, MC, or SC. Besides, observing the summarization reported in Table~\ref{my-label}, one can find that nuclear norm serving as regularizer and ADMM serving as optimization method is in general. The reasons mainly include: \begin{itemize} \item For regularizer, the nuclear norm is convex, and close-form solution exists in the following Nuclear Norm Proximal~(NNP) problem: \begin{small} \begin{equation}\label{eq:snuclear0} \begin{split} Prox_{\lambda\|\bullet\|_*}(\bm M)=arg \min_{\bm X}\frac{1}{2}\|\bm X-\bm M\|_F^2+\lambda\|\bm X\|_*\,. \end{split} \end{equation} \end{small} \item For optimization method, ADMM can tackle complicated problems with various constraints. \end{itemize} Both nuclear norm and ADMM perform well in previous studies, but the progress made in RPCA and MC brings up the question: Could we further improve the performance of existing algorithms by selecting new regularizers and optimization methods. Next, we will turn our attention to the regularizers replacing rank minimization. \begin{table}[] \scriptsize \centering \caption{A review for regularizers including convex and non-convex relaxations. $\gamma$ or $p$ refers to the parameter used in regularizer, and $\lambda$ represents the regularization parameter. } \label{TAB:REGULARIZER} \begin{tabular}{|c|c|} \hline Name & $\lambda R(\bm X)$ \\ \hline\hline Nuclear norm & $\sum_{i=1}^{k}\lambda\sigma_i$ \\ \hline Elastic-Net~\cite{DBLP:conf/cvpr/KimLO15} & $\sum_{i=1}^{k}\lambda(\sigma_i+\sigma_i^2)$ \\ \hline \hline Sp norm~\cite{DBLP:journals/jmlr/MohanF12,DBLP:conf/aaai/NieHD12,shang2017bilinear,DBLP:conf/aaai/ShangLC16,DBLP:journals/tip/LuLY15} & $\|\bm X\|_{Sp}^p= (\sum_{i=1}^{k}\lambda\sigma_i^p)$ \\ \hline TNN~\cite{DBLP:journals/pami/HuZYLH13} & $\sum_{i=r+1}^{k}\lambda\sigma_i$ \\ \hline PSN~\cite{oh2013partial}& $\sum_{i=r+1}^{k}\lambda\sigma_i$ \\ \hline WNN~\cite{DBLP:conf/cvpr/GuZZF14,DBLP:journals/ijcv/GuXMZFZ17,DBLP:conf/aaai/ZhongXLLC15} & $\sum_{i=r+1}^{k}\lambda w_i\sigma_i$ \\ \hline CNN~\cite{DBLP:conf/kdd/SunXY13,DBLP:conf/ijcai/NieHH17}& $\sum_{i=r+1}^{k}\lambda min(\sigma_i,\theta)$ \\ \hline Capped Sp~\cite{DBLP:conf/ijcai/NieHH17} & $ \sum_{i=r+1}^{k}\lambda min(\sigma_i^p,\theta)$($0<p<1$) \\ \hline $\gamma$-Nuclear norm~\cite{DBLP:conf/icdm/KangPC15} & $ \sum_{i=1}^{k}\frac{\lambda(1+\gamma)\sigma_i}{\gamma+\sigma_i}$ \\ \hline LNN~\cite{DBLP:conf/kdd/PengKLC15} & $ \sum_{i=1}^{k}\lambda log(\sigma_i+1)$ \\ \hline Logarithm~\cite{friedman2012fast,DBLP:conf/cvpr/LuTYL14} & $\sum_{i=1}^{k}\frac{\lambda log(\gamma \sigma_i+1)}{log(\gamma+1)}$ \\ \hline ETP~\cite{gao2011feasible,DBLP:conf/cvpr/LuTYL14} & $ \sum_{i=1}^{k}\frac{\lambda(1-exp(-\gamma \sigma_i))}{1-exp(-\gamma)}$ \\ \hline Geman~\cite{geman1995nonlinear,DBLP:conf/cvpr/LuTYL14} & $ \sum_{i=1}^{k}\frac{\lambda\sigma_i}{\sigma_i+\gamma}$ \\ \hline Laplace~\cite{trzasko2009highly,DBLP:conf/cvpr/LuTYL14} & $ \sum_{i=1}^{k}\lambda(1-exp(-\frac{\sigma_i}{\gamma}))$ \\ \hline MCP~\cite{zhang2010nearly,DBLP:conf/cvpr/LuTYL14} & $ \sum_{i=1}^{k} \left\{ \begin{array}{l} \lambda \sigma_i - \frac{\sigma_i }{{2\gamma }},\quad if\;\sigma_i < \gamma \lambda ,\\ \frac{{\gamma {\lambda ^2}}}{2},\quad \;\quad \;\;if\;\sigma_i \ge \gamma \lambda . \end{array} \right.$ \\ \hline SCAD~\cite{fan2001variable,DBLP:conf/cvpr/LuTYL14} & $ \sum_{i=1}^{k} \left\{ \begin{array}{l} \lambda x,\quad \quad \quad\quad\quad\quad \sigma_i \leq \lambda \\ \frac{{ - {\sigma_i^2} + 2\gamma \lambda \sigma_i - {\lambda ^2}}}{{2\left( {\gamma - 1} \right)}},\quad \lambda < \sigma_i \leq \lambda \gamma \\ \frac{{{\lambda ^2}\left( {\gamma + 1} \right)}}{2},\quad \quad \quad \quad \sigma_i > \lambda \gamma \end{array} \right.$ \\ \hline \end{tabular} \end{table} \section{Low Rank Relaxations}\label{sec:3} For matrix $\bm X$, suppose $\bm \sigma(\bm X)=(\sigma_1(\bm X),\ldots,\sigma_k(\bm X))$ is a ordered vector that consists of the singular values of $\bm X$. The matrix rank is equivalent to $\|\bm \sigma(\bm X)\|_{\ell_0}$, i.e., \begin{equation}\label{eq:rank} \textstyle rank(\bm X) = \sum_{i=1}^{k}(\sigma_i(\bm X))^0\,, \end{equation} where $\sigma_1(\bm X)\geq\sigma_2(\bm X),\ldots,\geq\sigma_r(\bm X)\geq0$. Similar to $\ell_0$-norm minimization, rank minimization is also a NP-hard problem. An alternative is selecting a relaxation to replace it. Here, we denote the relaxed regularizer by $ \mathcal{R}(\bm X) = \sum_{i=1}^{k}f(\sigma_i(\bm X))$, where $f(x)$ represents a relaxation function. According to the property of $f(x)$, we roughly divide some representative regularizaers used in previous studies into two groups: convex relaxations and non-convex relaxations. A summarization for both of them can be found in Table~\ref{TAB:REGULARIZER}. \subsection{Convex Relaxations} Nuclear norm, i.e., trace norm is the most widely used regularizer for matrix rank minimization, which corresponds to the function $f(x)=x$. The connection between nuclear norm and rank function is introduced by~\cite{fazel2001rank} where the authors show that nuclear norm is the convex envelope of rank function when $\sigma_1(\bm X)\leq 1$, where $\sigma_1(\bm X)$ denotes the largest singular values of matrix $\bm X$. As mentioned above, a dominant advantage of nuclear norm is its convexity. In addition, the close-form solution of problem~\eqref{eq:snuclear0} can be obtained directly via a singular value thresholding operator $\rho(x,\lambda)$~\cite{DBLP:journals/siamjo/CaiCS10}. \begin{equation}\label{eq:snn} \textstyle \hat{\bm X} = Prox^\lambda_{\|\bullet\|_*}(\bm M) = \bm U\rho(\bm S,\lambda)\bm V^T\,, \end{equation} where $\bm U\bm S\bm V^T=\bm M$ is the SVD of $\bm M$, and \begin{equation}\label{eq:snn2} \textstyle \rho(\bm S,\lambda)_{ii} = max(S_{ii}-\lambda,0)\,. \end{equation} The Eq.~\eqref{eq:snn2} shows that nuclear norm treats all singular values equally and shrink them with the same threshold $\lambda$. This, however, will introduce a bias to the matrix with small singular values. Recently, a particular convex regularizer was developed in~\cite{DBLP:journals/ijcv/LarssonO16}, which aims to find a convex approximation for function $rank(\bm X)+\lambda\|\bm X-\bm X_0\|_F^2$ rather than the rank function. So, the regularizer will be ignored in the rest of this paper. In addition, a Elastic-Net Regularization of Singular Values~(ERSV) has been proposed in~\cite{DBLP:conf/cvpr/KimLO15}, which corresponds to function $f(x)=x+\mu x^2$. \subsection{Non-Convex Relaxations} Although nuclear norm has achieved success in low rank matrix learning, it suffers a well-documented shortcoming that all singular values are simultaneously minimized. In practice, however, larger singular values generally quantify the main information we want to preserve. An alternative for nuclear norm is using non-convex relaxations. The advantages of non-convex relaxations over nuclear norm are first shown in~\cite{DBLP:journals/jmlr/MohanF12,DBLP:conf/aaai/NieHD12} for dealing with the matrix completion problems. In particular, both of them generalize the nuclear norm to Schatten-$p$ norm~\footnote{Actually, Schatten-$p$ norm refers to the Schatten-$p$ quasi norm when $0<p<1$.}. Considering that larger singular values should not be punished, Hu~\cite{DBLP:journals/pami/HuZYLH13} proposes a Truncated Nuclear Norm~(TNN) regularizer to cope with the matrix completion problem, which punish only the $n-r$ smallest singular values. A similar regularizer, namely Partial Sum Nuclear Norm~(PSNN), has been developed in~\cite{oh2013partial}. Indeed, both TNN and PSNN can be considered as special cases of Capped Nuclear Norm~(CNN) used in~\cite{DBLP:conf/kdd/SunXY13}. To alleviate rather than abandon the punishment on larger singular values, Gu et al.~\cite{DBLP:conf/cvpr/GuZZF14} propose a weighted nuclear norm: \begin{equation}\label{eq:tnn} \textstyle \|\bm X\|_{w*} = \sum_{i=1}^{k}w_i\sigma_i(\bm X)\,. \end{equation} where $\bm w = [w_1,w_2,\ldots,w_k]$ and $w_i\geq0$ is a weight value assigned to $\sigma_i(\bm X)$. Replacing the nuclear norm of NNP~\eqref{eq:snuclear0} by weighted nuclear norm, one can obtain a weighted nuclear norm proximal~(WNNP) operator: \begin{small} \begin{equation}\label{eq:wnuclear0} \textstyle Prox^\lambda_{\|\bullet\|_{w*}}(\bm M)= arg \min_{\bm X}\frac{1}{2}\|\bm X-\bm M\|_F^2+\lambda\|\bm X\|_{w*}\,. \end{equation} \end{small} It has been shown that when the entries of weight vector $\bm w$ are non-descending, the close-form solution of problem~\eqref{eq:wnuclear0} can be easily obtained by a weighted soft-thresholding operator defined as: \begin{equation}\label{stw} \textstyle \rho_{\bm w}(\bm S,\lambda)_{ii} = max(S_{ii}-w_i\lambda,0)\,. \end{equation} Here, $\rho_{\bm w}$ is a generalization of $\rho$. Furthermore, we have: \begin{equation}\label{eq:wnuclear} \textstyle \hat{\bm X} = Prox^\lambda_{\|\bullet\|_{w*}}(\bm M) = \bm U\rho_{\bm w}(\bm S,\lambda)\bm V^T\,. \end{equation} It is obvious that the punishment bias between larger values and small values can be alleviated by assigning small weights to former and larger weights to latter. Note that TNN, PSNN, and CNN can be considered as the special cases of WNN with weight vector: \begin{equation*} \bm w = [\underbrace{0,0,\ldots,0}_{r},\underbrace{1,\ldots,1}_{k-r}]\,. \end{equation*} In addition to the regularizers mentioned above, numerous non-convex regularizers derived from sparse learning have been proposed, such as $\gamma$-nuclear norm~\cite{DBLP:conf/icdm/KangPC15}, Log Nuclear Norm~(LNN)~\cite{DBLP:conf/kdd/PengKLC15}, ETP~\cite{gao2011feasible}, Logarithm~\cite{friedman2012fast}, Geman~\cite{geman1995nonlinear}, Laplace~\cite{trzasko2009highly}, MCP~\cite{zhang2010nearly}, and so on. The details of using them to tackle the matrix completion problems can be found in~\cite{DBLP:conf/cvpr/LuTYL14,DBLP:journals/jmlr/YaoK17,DBLP:journals/corr/abs-1708-00146,DBLP:conf/aaai/LuZXYL15}. A significant result reported in~\cite{DBLP:conf/aaai/LuZXYL15} is Generalized Singular Value Thresholding (GSVT) operator $Prox^\lambda_g(\bm M)$ defined as: \begin{small} \begin{equation}\label{eq:snuclear} \textstyle \hat{\bm X} = Prox^\lambda_{f}(\bm M) =arg \min_{\bm X}\frac{1}{2}\|\bm X-\bm M\|_F^2+\lambda\sum_{i=1}^{k}f(\sigma_i(\bm X))\,, \end{equation} \end{small} where $f(x)$ can be anyone continuous function satisfying the Assumption~\ref{Assumption1}. \begin{theorem}\label{Assumption1} Function $f(x)$ is concave, nondecreasing, and differentiable on $[o,+\infty)$. Besides, $f(0)=0$ and $\nabla f$ is convex. \end{theorem} Solving the problem~\eqref{eq:snuclear} is equivalent to solving the following problem with $b=\sigma_i(\bm M)$, and $i=1,2,\ldots,k$. \begin{equation}\label{eq:as} \textstyle Prox^\lambda_f(b) = arg \min_{x\geq0} g_b(x) = \lambda f(x) + \frac{1}{2}(x-b)^2\,. \end{equation} A general solver for finding the optimal solution of the problem~\eqref{eq:as} has been provided in~\cite{DBLP:conf/aaai/LuZXYL15}~\footnote{Codes: https://github.com/sudalvxin/2018-GSVT.git}. To demonstrate the difference between different regularizers including nuclear norm, we report the shrinkage results returned by them in Figure~\ref{Fig:1}, where the difference between $b$ and $Prox^\lambda_f(b)$ represents the shrink. Figure~\ref{Fig:1} shows that when $b$ takes a small value the shrinkage effect of different regularizers are similar. Nevertheless, when $b$ takes a large value the difference between non-convex regularizers and nuclear norm are significant. In particular, the shrink of non-convex relaxations on larger values are very small, which is contrast with the nuclear norm taking serious shrinks on larger singular values. Hence, using non-convex regularizers can preserve the main information of $\bm M$. In addition, one can find that non-convex relaxations prefer to generate $0$ singular values, i.e., the low rank solution when regularization parameter $\lambda$ takes the same value. Matrix factorization is another method for low-rank regularization, which represents the expected low rank matrix $\bm X$ with rank $r$ as $\bm X = \bm U\bm V^T$, where $\bm U\in R^{m\times r}$ and $\bm V\in R^{n\times r}$. Moreover, the equation~\eqref{eq:nuclear1} has been adopted by~\cite{cabral2013unifying} for dealing with matrix completion problem and~\cite{DBLP:conf/iccv/ZhouZD15} for dealing with Multi-Image Matching problem. \begin{equation}\label{eq:nuclear1} \textstyle \|\bm X\|_* = \min_{\bm A,\bm B:\bm A\bm B^T=\bm X}\frac{1}{2}(\|\bm A\|_F^2+\|\bm B\|_F^2) \end{equation} where $\bm A\in R^{m\times d}$, $\bm B\in R^{n\times d}$ and $d\geq r$. Recently, Shang et al.~\cite{shang2017bilinear} develop two variants of Eq.~\eqref{eq:nuclear1}, namely Double Nuclear norm penalty~($\|\bm X\|_{D-N}$) and Frobenius/nuclear hybrid norm penalty ($\|\bm X\|_{F-N}$). Both of them focus on the connection between Schatten-$p$ norm and matrix factorization. The superiorities of non-convex regularizers over nuclear norm have been shown in a great many of studies w.r.t RPCA and MC, but the following two reasons prevent it from solving practical issues. \begin{itemize} \item R.$1$: The resultant optimization problem is non-convex and much more challenging to be solved. \item R.$2$: Facing various non-convex regularizers the researchers may be confused about selecting a reasonable one for their algorithms. \end{itemize} For R.$1$, we in next section review several representative optimization methods used in low rank approximation, and provide a short discussion for them. For R.$2$, we provide a comprehensive comparison between several representative regularizers. \begin{figure}[t] \centering \subfloat[Log]{\includegraphics[width=0.33\linewidth]{Fig_Log} \label{Fig1a}} \subfloat[ETP]{\includegraphics[width=0.33\linewidth]{Fig_ETP} \label{Fig1b}} \subfloat[Laplace]{\includegraphics[width=0.33\linewidth]{Fig_laplace} \label{Fia1c}} \hfil \subfloat[$S_p$ with $p=0.1$]{\includegraphics[width=0.33\linewidth]{Fig_Sp1 \label{Fig1d}} \subfloat[$S_p$ with $p=0.5$]{\includegraphics[width=0.33\linewidth]{Fig_Sp2 \label{Fig1e}} \subfloat[nuclear norm]{\includegraphics[width=0.33\linewidth]{Fig_Sp3 \label{Fia1f}} \caption{Comparisons between $b$ and $Prox_f^\lambda(b)$ with $\lambda =1$, where $f$ represents the relaxation function that we select to replace the rank minimization problem. For ETP, we set $\gamma=1$. For Laplace, we set $\gamma=0.5$.} \label{Fig:1} \end{figure} \section{Optimization}\label{sec:4} Solving a problem with low rank regularization has drawn significant attention, and a great many of specialized optimization approaches have been proposed. Nevertheless, most of therm are developed for solving the RPCA or MC problems. In this section we review three representatives, and discuss their superiorities and deficiencies. Some traditional methods such as Frank–Wolfe Algorithm~\cite{zhang2012accelerated} and SDP are omitted due to the limitations for solving practical issues. Without specific description, our discussion is based on the following problem: \begin{equation}\label{eq:4.1} \min_{\bm X}\mathcal{F}(\bm X) \equiv \mathcal{L}(\bm X)+\lambda\sum_{i=1}^{k}f(\sigma_i(\bm X))\,. \end{equation} where $\mathcal{L}(\bm X)$ represents the loss function which depends on the specific task~\footnote{Without any specific description we suppose that $\mathcal{L}(\bm X)$ is convex and $L$-Lipschitz smooth.}. \subsection{Proximal Gradient Algorithm} Proximal Gradient algorithm~(PG) is one of the earliest first-order approaches for solving the problem~\eqref{eq:4.1} with nuclear norm regularizer~\cite{chen2009fast}. Suppose $f(x)=x$. Instead of directly solving the original problem $\mathcal{F}(\bm X)$, PG method aims to iteratively minimize a quadratic approximation of it~\cite{lin2017low}. The convergence rate of PG is $\mathcal{O}(\frac{1}{k})$. And it can be accelerated to $\mathcal{O}(\frac{1}{k^2})$ by incorporating Nesterov's technique~\cite{nesterov1983method}. Both PG and APG require that the relaxation function $f(x)$ is convex. Recently, the case that $f(x)$ or $\mathcal{L}(\bm X)$ is non-convex was considered by~\cite{li2015accelerated,ghadimi2016accelerated,DBLP:journals/corr/abs-1708-00146,yao2016efficient}. In~\cite{li2015accelerated}, the authors develope two APG-type algorithms, named monotone APG~(mAPG) and non-monotone APG~(nmAPG), respectively, which replace the descent condition used in~\cite{beck2009fast} by a sufficient descent condition. Subsequently, an Inexact Proximal Gradient algorithm~(IPG) was developed in~\cite{yao2016efficient} to reduce the computation cost caused by two proximal mappings, and a fast proximal algorithm was developed in~\cite{DBLP:journals/corr/abs-1708-00146} to reduce the computation cost caused by conducting SVT over a large scale matrix. Note that most of the existing PG-type algorithms are constructed for solving the problem that is unconstrained~(over desired matrix) and has only one variable to optimize~\footnote{In~\cite{DBLP:journals/corr/abs-1708-00146}, the authors extend it to cope with the problem involved two separable parameter blocks.}. Hence, although it has sound theoretical guarantee in terms of convergence, it is rarely used in solving the practical issues where various constraints must be considered and multiple variables must be optimized simultaneously. \subsection{Iteratively Re-Weighted Algorithm} The Iteratively Re-Weighted algorithm~(IRW), primitively designed for sparse learning problems~\cite{candes2008enhancing,ochs2015iteratively,daubechies2010iteratively}, is derived from the Majorization-Minimization~(MM) approaches~\cite{ochs2015iteratively}. The essence of MM is iteratively solving a convex optimization problem that is amenable to existing first-order methods. Iterative Reweighted Least Squares algorithms~(IRLS) proposed in~\cite{DBLP:journals/jmlr/MohanF12} is a seminal work using IRW to handle the rank minimization problem, and a similar algorithm was developed in~\cite{DBLP:conf/aaai/NieHD12}. Both of them aim to solve the matrix completion problems with Schatten-p norm~($0<p\leq 1$) regularizer. Then, a variant of IRW was developed in~\cite{wong2015matrix}, which is designed for optimizing a matrix completion model with celebrated Huber loss function and nuclear norm regularizer. In~\cite{DBLP:journals/tip/LuLY15}, IRW is generalized to deal with the subspace clustering problem where both the regularizer and the loss function can be non-convex. Recently, Nie et al.~\cite{nie2018calibrated} consider a more general case that $f(x)$ can be any concave function, and propose an efficient framework for solving the problem~\eqref{eq:4.1}. Theoretically, most of the studies show that the solution~(a limited point of solution sequence $\{\bm X_t\}$) provided by IRW is a stationary point of original problem. To the best of our knowledge, no works have been made for analysing the convergence speed of IRW. In addition, an Iteratively Reweighted Nuclear Norm~(IRNN) method has been proposed in~\cite{DBLP:conf/cvpr/LuTYL14}, which can be seen as a combination of PG and IRW. In $(k+1)$th iteration, IRNN updates the variable $\bm X^{k+1}$ by minimizing a surrogate function which is a relaxation of original objective function~\eqref{eq:4.1}. Indeed, the relaxing problem is constructed by linearizing the loss function $\mathcal{L}(\bm X)$ and regularization at $\bm X^k$. So, IRNN will converges slowly when the relaxation is very loose. Comparing to IRNN, IRW is more easy to implement and has no parameters needed to be tuned. But, the matrix returned by IRW is generally approximately low rank rather than exactly low rank. The reason is that without any Proximal operator was used in it. Similar to PG-type method, both IRNN and IRW are constructed for dealing with the problems with single variable. So, its feasibility in practical issues is also very limited. \subsection{Alternating Direction Method of Multipliers} As presented in Table~\ref{my-label}, ADMM occupies a dominant position in solving practical issues. The reason is that it can deal with various complicated problems with multiple non-separable variables accompanied by multiple equality constraints. For PG-type algorithm, the obstacle of solving the problem with constraints is that proximal operator is generally unsuitable to the subproblem with equality constraints and multiple non-separable variables. For IRNN or IRW, the obstacle is that the optimal solution of relaxing subproblem with equality constraints and the multiple non-separable variables cannot be solved directly. Nevertheless, in ADMM method, the low rank regularization over any one variable $\bm X_i$ can be transferred to a auxiliary variable $\bm C_i$. And, the subproblems involving $\bm C_i$ can be solved directly by using proximal operator~(SVT, WSVT or GSVT). It is worth noting that most theoretical analysis over ADMM are based on the assumption that original problem is convex. The theoretical analysis over ADMM for non-convex problems is not solid. In practice, however, it works well empirically. A practical variant of ADMM, namely Relaxed ADMM, was discussed in~\cite{fang2015generalized,xu2017adaptive}. Besides, a comprehensive survey and an useful tool for ADMM can be found in~\cite{lu2018unified}, where an unified optimization framework and theoretical analysis over ADMM for convex problems are provided. \subsection{Summarization} We have described three representative methods for solving the problems involving low rank regularization. We can find that both of them require that the close-form solution of subproblem can be obtained directly. PG can deal with the problems with single variable or multiple separable variables, and has convergence guarantee. IRW is generally suitable to the problems with single variable. For multiple variables problems, IRW can ensure the objective function value of original problem being monotonously decreasing when we use the alternating minimization method to update the variables in subproblem. Comparing with PG and IRW, ADMM is more suitable to complicated problem, but the convergence speed of it is generally slow. To compute the weighted matrix of $\bm X\in R^{m\times n}$, IRW generally need to compute the full SVD of $\bm X$ or the eigenvalue decomposition of $\bm X\bm X^T$~($\bm X^T\bm X$)~\cite{nie2018calibrated}. So, the time consuming of IRW on large scale data is very high. In the intermediate step, no matter which regularizer, both ADMM and PG have to solve a subproblem defined as Eq.~\eqref{eq:snuclear}. It is obvious that $i$th singular value of $\bm X$ is zero when $\sigma_i(\bm M)$ is smaller than a specific threshold. That is, only serval leading singular values and singular vectors of $\bm M$ are needed in SVT and GSVT~\cite{DBLP:journals/corr/abs-1708-00146}. Such that the computational complexity of SVT or GSVT can be reduced from $\mathcal{O}(mn^2)$ to $\mathcal{O}(mnr)$ by using PROPACK~\cite{larsen1998lanczos}, where $r$ represents the number of leading singular values. In addition, an useful tool for further reducing the time consuming of algorithm is using approximate SVT or GSVT ~\cite{DBLP:journals/corr/abs-1708-00146,oh2018fast}. \section{Experiments}\label{sec:5} \begin{figure}[t] \centering \subfloat{\includegraphics[width=0.24\linewidth]{I1}} \subfloat{\includegraphics[width=0.24\linewidth]{I2}} \subfloat{\includegraphics[width=0.24\linewidth]{I3}} \subfloat{\includegraphics[width=0.24\linewidth]{I4}} \hfil \subfloat{\includegraphics[width=0.24\linewidth]{I5}} \subfloat{\includegraphics[width=0.24\linewidth]{I6}} \subfloat{\includegraphics[width=0.24\linewidth]{I7}} \subfloat{\includegraphics[width=0.24\linewidth]{I8}} \caption{The $8$ test images used in this paper.} \label{Fig:original} \end{figure} A huge number of models based on low rank regularization have been developed for solving various problems in the past decade. In practice, however, loss function and regularization term are the main differences between them. In particular, the selection of loss function depends on the problem we aim to solve. Taking a comprehensive comparison for all problems beyond the scope of our ability. The main goal of this paper is promoting the application of non-convex regularizers in solving practical issues. Hence, in this section, we would like to take a comprehensive investigation for several non-convex regularizers listed in Table~\ref{TAB:REGULARIZER}. Our investigation is based on image denoising, a low level computer version problem solved by the following model: \begin{equation}\label{eq:image denoising} \min_{\bm X} \quad \|\bm X-\bm M\|_F^2+\lambda\sum_{i=1}^{k}f(\sigma_i(\bm X))\,. \end{equation} The reasons include: \begin{enumerate} \item As discussed above, the problem~\eqref{eq:image denoising} is a basic problem that we cannot avoid when deal with majority complicated models; \item The model~\eqref{eq:image denoising} has only one parameter needed to be tuned. Such that the results can be analysed conveniently. \item The structure of original matrix we aim to learn is approximately low rank. Recovering a approximately low rank rather than exactly low rank matrix is more reasonable for solving practical issues. \end{enumerate} In addition, note that the relaxation functions that we select, including: Weighted Nuclear Norm~(WNN), Log Nuclear Norm~(LNN), Truncated Nuclear Norm~(TNN), and Schatten-p norm with $p=1$, $p=0.5$, $=0.01$, respectively. Particularly, Nuclear Norm~(NN) is equivalent to the Schatten-p norm with $p=1$. For each regularizer we can obtain the solution of problem~\eqref{eq:image denoising} directly via SVT or GSVT. Here, we abandon the Capped Nuclear Norm, ETP, Laplace, Geman and so on, for all of them have additional parameters needed to be tuned. \begin{figure*}[t] \centering \subfloat[$\tau=0.01$]{\includegraphics[width=0.33\linewidth]{R1} \label{Fig1a}} \subfloat[$\tau=0.1$]{\includegraphics[width=0.33\linewidth]{R2} \label{Fig1b}} \subfloat[$\tau=1$]{\includegraphics[width=0.33\linewidth]{R3} \label{Fia1c}} \caption{A comprehensive comparison between different regularizers on image \emph{Peppers}. $R_0$ refers to the PSNR of input noisy image. $\{R_1,R_2,\ldots,R_6\}$ refer to the regularizers WNN, LNN, TNN, $S_p$ with $p=0.1$, $S_p$ with $p=0.5$, and NN~(Nuclear Norm, $S_p$ with $p=1$), respectively. Note that all regularizers, except for TNN, will shrink all singular values to zero when $\lambda$ takes a large value.} \label{Fig:2} \end{figure*} \begin{figure*}[t] \centering \subfloat[$\tau=0.01$]{\includegraphics[width=0.33\linewidth]{R4} \label{Fig1a}} \subfloat[$\tau=0.1$]{\includegraphics[width=0.33\linewidth]{R5} \label{Fig1b}} \subfloat[$\tau=1$]{\includegraphics[width=0.33\linewidth]{R6} \label{Fia1c}} \caption{A comprehensive comparison between different regularizers on image \emph{Lena}. $R_0$ refers to the PSNR of input noisy image.} \label{Fig:3} \end{figure*} \subsection{Experimental Setting} We select $8$ widely used images with size $256\times 256$ to evaluate the competing regularizers. The thumbnails are shown in Fig~\ref{Fig:original}. Similarly, we corrupt the original image by Gaussian noise with distribution $\mathcal{N}(0,\sigma^2)$. We use the codes provided by Gu et al.~\cite{DBLP:journals/ijcv/GuXMZFZ17}~\footnote{https://sites.google.com/site/shuhanggu/home}. For each patch, in~\cite{DBLP:journals/ijcv/GuXMZFZ17} the authors run $K$ iterations of this approximation process to enhance the quality of denoising. Nevertheless, in this paper to avoid introducing additional parameters used in iterations, we fix $K=1$ and other parameters as authors suggested. More implementation details over experiments can be found in~\cite{DBLP:journals/ijcv/GuXMZFZ17}. For all regularizers except for WNN we set $\lambda = \tau \eta \sqrt{n_p}\sigma^2$, where $n_p$ is the number of similar parts, $\sigma$ represents the noise level, $\tau$ controls the large scale range of varying $\lambda$, and $\eta$ controls the small scale range of varying $\lambda$. For WNN, we set $\lambda_w = C*\lambda$, where $C=\sqrt{2}$ as authors suggested. \textbf{Comparison~$1$.} In this test, we fix $\sigma=50$ and vary $\tau$ and $\eta$ in the sets $\mathcal{S}_\tau=\{0.1, 1 ,10\}$ and $\mathcal{S}_{\eta}=\{1,2,\ldots,9\}$, respectively. We select only \emph{Lena} and \emph{Peppers} two images to test. The PSNR results under different parameters for all competing regularizers are shown in Figure~\ref{Fig:2} and Figure~\ref{Fig:3}, respectively, where $R_0$ refers to the PSNR of input noisy image. $\{R_1,R_2,\ldots,R_6\}$ refer to the regularizers WNN, LNN, TNN, $S_p$ with $p=0.1$, $S_p$ with $p=0.5$, and nuclear norm, respectively. According to the definitions of SVT and GSVT, we can find that all regularizers, and especially nuclear norm, will shrink all singular values to zero when $\lambda$ takes a large value~(Under this case, we set $PSNR=1$ for visualization). The information delivered by Figure~\ref{Fig:2} and Figure~\ref{Fig:3} can be summarized as fellows: \begin{itemize} \item Non-convex regularizers outperforms nuclear norm in terms of the best result; \item We should select a smaller regularization parameter $\lambda$ for nuclear norm, for it prefers to shrink all singular values to zero when $\lambda$ takes a large value~(see the cases that $\tau>1$ and $\eta>5$). In practice, however, the shrink for larger singular values may be insufficient when $\lambda$ takes small value~(see the case that $\tau=0.01$ and $1\leq\eta \leq4$). Such a contradiction limits the performance of nuclear norm; \item TNN performs well even when $\lambda$ takes a large value, for it prevents the $r$ largest singular values from being shrinked. Nevertheless, two limitations of it cannot be ignored. First, the value of $r$ must be estimated. Second, the $r$ largest singular values generally carry noise information we want to remove, and preserving them may degenerate the performance of algorithm; \item We should select a larger regularization parameter $\lambda$ for non-convex regularizers. When $\lambda$ takes a small value, the shrink on all singular values is vary slight, so, the PSNRs of them are very close to original images. Comparing nuclear norm, non-convex regularizers can reduce the shrink on larger singular values and enhance the shrink on smaller singular values simultaneously. \end{itemize} In this test, we ignore the numerical difference~(PSNR values) between different non-convex regularizers, because such a difference can be compressed by carefully selecting regularization parameter for each regularizer. \begin{table*}[] \centering \begin{tabular}{|c|c|c|c|c|c|c|c|c|} \hline Noise & Image & WNN-I & WNN & LNN & TNN with $r=1$ & $S_p$ with $p=0.1$ & $S_p$ with $p=0.5$ & Nuclear Norm~(NN) \\ \hline \multirow{8}{*}{$\sigma=10$} & airplane & 34.732 & 34.352 & 34.130 & 30.146 & \textbf{34.495} & 31.527 & 30.194 \\ \cline{2-9} & boat & 33.727 & 33.186 & 33.309 & 30.023 & \textbf{33.512} & 31.090 & 30.051 \\ \cline{2-9} & couple & 33.735 & 33.247 & 33.240 & 30.019 & \textbf{33.551} & 31.006 & 30.036 \\ \cline{2-9} & fingerprint & 31.069 & 30.907 & 30.696 & 29.420 & \textbf{30.999} & 29.783 & 29.422 \\ \cline{2-9} & hill & 33.715 & 33.300 & 33.386 & 30.075 & \textbf{33.629} & 31.101 & 30.101 \\ \cline{2-9} & Lena & 35.721 & 35.308 & 35.026 & 30.282 & \textbf{35.496} & 31.724 & 30.318 \\ \cline{2-9} & man & 33.436 & 32.998 & 33.069 & 29.998 & \textbf{33.329} & 30.963 & 30.022 \\ \cline{2-9} & peppers & 35.965 & 35.593 & 35.149 & 30.292 & \textbf{35.736} & 31.714 & 30.323 \\ \hline\hline \multirow{8}{*}{$\sigma=30$} & airplane & 28.749 & 28.077 & 28.200 & \textbf{26.357} & 28.242 & 27.176 & 26.470 \\ \cline{2-9} & boat & 27.875 & 27.144 & \textbf{27.413} & 26.013 & 27.273 & 26.588 & 26.045 \\ \cline{2-9} & couple & 27.698 & 26.893 & \textbf{27.198} & 25.885 & 27.046 & 26.359 & 25.883 \\ \cline{2-9} & fingerprint & 24.919 & 24.637 & 24.776 & 24.193 & \textbf{24.790} & 24.221 & 24.117 \\ \cline{2-9} & hill & 28.472 & 27.759 & \textbf{28.013} & 26.436 & 27.868 & 27.025 & 26.492 \\ \cline{2-9} & Lena & 29.929 & 29.060 & 29.167 & 26.970 & \textbf{29.186} & 27.803 & 27.094 \\ \cline{2-9} & man & 27.897 & 27.337 & \textbf{27.535} & 26.089 & 27.471 & 26.589 & 26.119 \\ \cline{2-9} & peppers & 29.986 & 29.239 & 29.202 & 26.992 & \textbf{29.356} & 27.732 & 27.069 \\ \hline\hline \multirow{8}{*}{$\sigma=50$} & airplane & 26.193 & 25.407 & 25.408 & 24.811 & \textbf{25.471} & 25.3815 & 24.463 \\ \cline{2-9} & boat & 25.537 & 24.789 & \textbf{24.871} & 24.472 & 24.825 & 24.802 & 23.980 \\ \cline{2-9} & couple & 25.268 & 24.571 & \textbf{24.644} & 24.284 & 24.595 & 24.590 & 23.803 \\ \cline{2-9} & fingerprint & 22.662 & 22.383 & 22.361 & 21.871 & \textbf{22.442} & 22.367 & 21.419 \\ \cline{2-9} & hill & 26.349 & 25.572 & \textbf{25.615} & 25.432 & 25.587 & 25.570 & 24.962 \\ \cline{2-9} & Lena & 27.476 & 26.622 & 26.519 & 26.243 & \textbf{26.699} & 26.526 & 25.811 \\ \cline{2-9} & man & 25.710 & 25.075 & 25.098 & 24.782 & \textbf{25.128} & 25.053 & 24.316 \\ \cline{2-9} & peppers & 27.235 & 26.411 & 26.236 & 26.052 & \textbf{26.518} & 26.291 & 25.524 \\ \hline\hline \multirow{8}{*}{$\sigma=70$} & airplane & 24.550 & 23.684 & 23.481 & 23.068 & \textbf{23.967} & 23.772 & 22.464 \\ \cline{2-9} & boat & 24.144 & 23.228 & 23.120 & 22.945 & \textbf{23.406} & 23.180 & 22.221 \\ \cline{2-9} & couple & 23.907 & 23.079 & 22.945 & 22.844 & \textbf{23.279} & 23.053 & 22.036 \\ \cline{2-9} & fingerprint & 21.411 & 20.858 & 20.686 & 20.245 & \textbf{21.050} & 20.839 & 19.419 \\ \cline{2-9} & hill & 25.023 & 24.054 & 23.898 & 24.056 & \textbf{24.315} & 24.106 & 23.169 \\ \cline{2-9} & Lena & 26.011 & 24.699 & 24.420 & 24.573 & \textbf{25.122} & 24.929 & 23.626 \\ \cline{2-9} & man & 24.366 & 23.459 & 23.299 & 23.331 & \textbf{23.712} & 23.499 & 22.457 \\ \cline{2-9} & peppers & 25.360 & 24.277 & 23.942 & 24.155 & \textbf{24.729} & 24.584 & 23.132 \\ \hline\hline \multirow{8}{*}{$\sigma=100$} & airplane & 23.086 & 22.015 & 22.193 & 21.723 & \textbf{22.318} & 21.764 & 21.022 \\ \cline{2-9} & boat & 22.737 & 21.690 & 21.842 & 21.623 & \textbf{21.853} & 21.446 & 21.024 \\ \cline{2-9} & couple & 22.631 & 21.530 & \textbf{21.691} & 21.607 & 21.681 & 21.187 & 20.841 \\ \cline{2-9} & fingerprint & 20.079 & 19.253 & 19.384 & 18.991 & \textbf{19.417} & 18.687 & 17.982 \\ \cline{2-9} & hill & 23.597 & 22.406 & 22.605 & 22.583 & \textbf{22.609} & 22.051 & 21.795 \\ \cline{2-9} & Lena & 24.531 & 22.660 & 22.881 & 22.749 & \textbf{23.051} & 22.430 & 21.650 \\ \cline{2-9} & man & 23.016 & 21.832 & 22.017 & 21.981 & \textbf{22.067} & 21.531 & 21.051 \\ \cline{2-9} & peppers & 23.648 & 22.258 & 22.447 & 22.364 & \textbf{22.708} & 22.085 & 21.144 \\ \hline \end{tabular} \caption{Experimental results~(PSNR,dB) of alternative regularizers on the $8$ test images. Here, WNN-I refers to the algorithm proposed in~\cite{DBLP:journals/ijcv/GuXMZFZ17}, which iteratively conduct the reconstruction process on all patches. The best results~(without considering WNN-I) are highlighted in bold.}\label{tab:res} \end{table*} \textbf{Comparison~$2$.} In this test, for each regularizer we fix $\lambda$ as the value achieving the best performance in above test. More specifically, we fix $\tau\eta=5$ for WNN, $\tau\eta=2$ for LNN, $\tau\eta=0.03$ for TNN and nuclear norm, $\tau\eta=8$ for $S_p$ with $p=0.1$, $\tau\eta=0.5$ for $S_p$ with $p=0.5$. Besides, we select the WNN with multiple Iterations~(WNN-I) just like~\cite{DBLP:journals/ijcv/GuXMZFZ17} for baseline. Particularly, all parameters of the algorithm are selected as author suggested. The noise level is controlled by varying the parameter $\sigma$ in the set $\mathcal{S}_\sigma=\{10, 30, 50,70 ,100\}$. The PSNR results for alternative regularizers are reported in Table~\ref{tab:res}. The information delivered by Table~\ref{tab:res} can be summarized as follows: \begin{itemize} \item WNN-I achieves the best result in all cases due to conducting the reconstruction process iteratively. But, it provides only a small advantage over others that conduct only one iteration, especially the best one highlighted in bold. \item The performance of NN is the worst in most cases. Particularly, when $\sigma$ takes a small value, the difference between NN and TNN is very small, while other non-convex regularizers provide a large advantage over TNN and NN. \item The regularizer $S_p$ with $p=0.1$ achieves the best results in most cases, because the gap between its relaxation function and original rank minimization problem is very small. A natural idea is: using the regularizer $S_p$ with $p<0.1$ can generate a better result. In practice, however, we do not support to use such a regularizer, because it treats all singular values almost equally. For instance, $10^{0.01}\thickapprox 1.0233$ and $1000^{0.01}\thickapprox 1.0715$. \end{itemize} \section{Conclusion and Discussion}\label{sec:6} In this paper, we provided a comprehensive survey for low rank regularization including applications, regularizers, and optimization methods. Differing from previous investigations over low rank matrix learning, we pay more attention to the regularizers, especially the non-convex relaxations. Although the nuclear norm with solid theoretical guarantee has been widely used to solve various problems, the solution returned by it may deviate from the original problem significantly. And, such a deviation can be alleviated by using non-convex relaxations. In order to promote the application of non-convex relaxations in solving practical issues, we give a detailed summarization for non-convex regularizers used in previous studies, and discuss the properties of them. The relevant experimental results can be found in supplementary materials. It is worth mentioning that the theoretical research over non-convex regularizers is very limited. In practice, however, its advantages over nuclear norm has been shown in numerous experiments including the results reported in this paper. We believe that the difference between different non-convex regularizers is very slight in terms of performance. The most significant thing we need to consider is choosing a reasonable regularization parameter, and a larger value is generally required by non-convex regularizers. An inevitable thing of using low rank regularization~(without considering matrix factorization) is conducting SVD, which is time consuming for large scale data. So, introducing the techniques over approximate SVD is an important direction in the future~\cite{DBLP:journals/corr/abs-1708-00146}. Recently, more efforts have been made in tensor learning~\cite{chen2013generalized,li2016simultaneous,zhang2015low,yokota2018missing,ko2018fast,zare2018extension,yokota2017simultaneous,lu2018tensor,zhou2018tensorlrr,lu2018exact}. But most of them are based on the convex relaxations. The problem of tensor completion based on non-convex regularization is considered in~\cite{yao2018scalable}. Generalizing tensor learning based on non-convex regularizers to more practical issues may be interesting. \section{ACKNOWLEDGMENTS} The work was supported by National Science Foundation of China under Grant $61772427$, $61751202$ and $61761130079$. \bibliographystyle{IEEEtran}
\section{Introduction} \label{sec:intro} Our basic understanding of galaxy evolution and the build-up of stellar mass in galaxies throughout the history of the universe is founded in detailed measurements of the star-formation rate density\footnote{Throughout this work, densities in star formation rate, stellar mass, or gas mass refer to cosmic densities (i.e., the amount of material in galaxies per unit co-moving cosmic volume) unless stated otherwise.} as a function of cosmic time (or redshift), the ``star-formation history of the universe'', and measurements of the stellar mass density in galaxies at different cosmic epochs (see \citealt{md14} for a review). In-depth studies of significant samples of high-redshift galaxies appear to indicate that changes in this growth history at different epochs are largely driven by the cold molecular gas properties of galaxies (e.g., \citealt{daddi10a,tacconi13,tacconi18,genzel15,scoville16}), and the growth rate of dark matter halos (e.g., \citealt{genel10,bouche10,faucher11}). The cold gas constitutes the fuel for star formation (see \citealt{cw13} for a review), such that a higher gas content (e.g., driven by high gas accretion rates) or a higher efficiency of converting gas into stars (e.g., driven by galaxy mergers, or by ubiquitous shocks due to high gas flow rates) can lead to increased star-formation activity, and thus, to a more rapid growth of galaxies (e.g., \citealt{dave12}). To better understand how the gas supply in galaxies moderates the star-formation rate density in galaxies at early epochs, it is desirable to complement targeted studies with an integrated measurement of the cold molecular gas density in galaxies at the same epochs, i.e., the ``cold gas history of the universe''. Surveys of cold gas ideally target rotational lines of CO, the most common tracer of the molecular gas mass in galaxies, to measure the CO luminosity function at different cosmic epochs in a ``molecular deep field'' study. The distribution mean of the CO luminosity function then provides a reliable measurement of the cold molecular gas density at a given redshift (\citealt{cw13}; see, e.g., \citealt{scoville17} for an alternative approach). The first such efforts have recently been carried out in the {\em Hubble} Deep Field North (HDF-N) and the {\em Hubble} Ultra Deep Field (H-UDF) with the IRAM Plateau de Bure Interferometer (PdBI) and the Atacama Large Millimeter/submillimeter Array (ALMA; the ASPECS-Pilot program) at 3\,mm and 1\,mm wavelengths, covering fields $\sim$0.5 and $\sim$1\,arcmin$^2$ in size, respectively (see \citealt{decarli14,walter16}, and references therein). At $z$$\sim$2--3, near the peak of the cosmic star-formation rate density $\sim$10\,billion years ago, these studies cover {\rm CO}($J$=3$\to$2)\ and higher-$J$ lines. At $z$=5--7, i.e., in the first billion years after the Big Bang, these surveys cover {\rm CO}($J$=5$\to$4)\ and higher-$J$ lines. The most faithful tracer of total cold gas mass are low-$J$ CO lines, in particular, {\rm CO}($J$=1$\to$0)\ (see, e.g., \citealt{riechers06c,riechers11e,riechers11c,ivison11,aravena12,aravena14,daddi15,bolatto15,sharon16,saintonge17,harrington18}), for which the $\alpha_{\rm CO}$=$M_{\rm H_2}$/$L'_{\rm CO}$ conversion factor from CO luminosity ($L'_{\rm CO}$, in units of K\,\kms\,pc$^2$ ) to H$_2$ gas mass ($M_{\rm H_2}$, in units of $M_{\odot}$ ) has been calibrated locally (see \citealt{bolatto13} for a review), and for which no assumptions about gas excitation are required to derive the total CO luminosity. To complement the initial ``molecular deep field'' studies through improved statistical uncertainties measured over larger cosmic volumes and reduced calibration uncertainties due to gas excitation, we have carried out the VLA COLDz survey,\footnote{See {\tt coldz.astro.cornell.edu} for additional information.} ``blindly'' selecting galaxies through their cold gas content in the {\rm CO}($J$=1$\to$0)\ line at $z$$\sim$2--3, and in {\rm CO}($J$=2$\to$1)\ at $z$$\sim$5--7, over a $\sim$60\,arcmin$^2$ region. The detailed survey parameters, line search and statistical techniques, a catalog of line candidates, and an overview of accompanying papers are presented in the COLDz survey reference paper (\citealt{pavesi18}; hereafter: Paper I). This work focuses on the CO luminosity function measurements to result from the survey data, and the implied constraints on the evolution of the cosmic cold gas density in galaxies as a function of redshift. Section 2 provides a brief description of the data. Section 3 summarizes the selection of CO line candidates and the statistical methods used to characterize the survey parameters, before describing the CO luminosity function and cold gas density measurements. Section 4 provides a discussion of the results in the context of previous surveys and model predictions. Section 5 provides the main conclusions based on our measurements and analysis. We use a concordance, flat $\Lambda$CDM cosmology throughout, with $H_0$\eq69.6\,\ts km\ts s$^{-1}$\,Mpc$^{-1}$, $\Omega_{\rm M}$\eq0.286, and $\Omega_{\Lambda}$\eq0.714 (\citealt{bennett14}). \section{Data} \label{sec:data} The VLA was used to ``blindly'' observe redshifted {\rm CO}($J$=1$\to$0)\ and {\rm CO}($J$=2$\to$1)\ line emission (rest-frame frequencies:\ $\nu_{\rm rest}$=115.2712 and 230.5380\,GHz) at $z$$\sim$2.0--2.8 and $z$=4.9--6.7, respectively (VLA program IDs 13A-398 and 14A-214; PI:\ Riechers), covering a region corresponding to a total co-moving survey volume of $\sim$375,000\,Mpc$^3$ in both lines combined (see Table~\ref{t1} for details). Observations covered a 7-pointing mosaic in the COSMOS field (center position:\ J2000 10:00:20.7; +02:35:17.0), and a 57-pointing mosaic in the GOODS-North field (center position:\ J2000 12:36:59.0; +62:13:43.5), providing total survey areas of 8.9 and 50.9\,arcmin$^2$ at 31 and 30\,GHz, respectively.\footnote{The mosaicked images made from individual pointings were trimmed at the outer edges at the 30\% level of the peak sensitivity in each spectral channel.} Observations in COSMOS and GOODS-North covered the 30.969 to 39.033 and 29.981 to 38.001\,GHz frequency ranges in a single tuning with $\sim$8\,GHz bandwidth (dual polarization) each, respectively, using the Ka band receivers and the 3-bit samplers at a spectral resolution of 2\,MHz (17\,\ts km\ts s$^{-1}$\ at 35\,GHz). Observations were carried out for a total of 324\,hr between 2013 January 26 and 2015 December 18 under good to excellent weather conditions in the D and DnC array configurations, and in the D$\to$DnC and DnC$\to$C re-configurations, yielding approximately 93 and 122\,hr on source across all configurations and pointings in COSMOS and GOODS-North, respectively. This yields characteristic synthesized beam sizes of $\sim$3$''$ when imaging the data with natural baseline weighting after data calibration using the {\sc CASA} package, and approximately 3 times better point source sensitivity in the smaller COSMOS mosaic. The corresponding CO luminosity limits across the redshift range are shown in Fig.~\ref{f1}. More details on the observations and data reduction are given in Paper I. \begin{figure} \epsscale{1.15} \plotone{f1} \vspace{-2mm} \caption{Representative line luminosity detection sensitivity limits as a function of redshift reached by our observations in the COSMOS and GOODS-North fields, when adopting 5 times the rms noise at a line FHWM of 200\,\ts km\ts s$^{-1}$\ (see Paper I for variations between individual pointings). The corresponding sensitivity limits of the ALMA ASPECS-Pilot survey in the CO $J$=3$\to$2 to 7$\to$6 lines in the same redshift ranges are shown for comparison (\citealt{walter16}). ASPECS limits are scaled to {\rm CO}($J$=1$\to$0)\ line luminosity limits using the same, representative line excitation correction factors adopted by \cite{decarli16a} based on \cite{daddi15} up to {\rm CO}($J$=5$\to$4). For the higher-$J$ lines, we assume an intermediate excitation based on Fig.~10 of \cite{daddi15}, corresponding to brightness temperature ratios of $r_{65}$$\simeq$0.66 and $r_{75}$$\simeq$0.29 relative to the CO $J$=5$\to$4 line, respectively. For reference, colored points show all previous $z$$>$1 CO detections as compiled by \cite{cw13}, incorporating updates by \cite{sharon16}. Colors indicate different galaxy types (``dusty galaxies'' includes submillimeter galaxies, extremely red objects, and 24\,$\mu$m-selected galaxies, and ``color-selected galaxies'' includes Lyman-break, BzK, and BMBX galaxies, respectively). \label{f1}} \end{figure} \begin{table} \caption{Lines, redshift ranges, and volumes covered by the COLDz survey (see Fig.~\ref{f1} for luminosity limits across the survey volume).\label{t1}} \centering \begin{tabular}{ c c c c c c } \hline Transition & $\nu_{\rm rest}$ & $z_{\rm min}$ & $z_{\rm max}$ & $\langle z \rangle$ & Volume \\ & [GHz] & & & & [$\rm{Mpc}^3$] \\ \hline \multicolumn{6}{c}{COSMOS ``Deep'' Field ($\sim$9\,arcmin$^2$; $\sim$31--39\,GHz)}\\ {\rm CO}($J$=1$\to$0) & 115.271 & 1.953 & 2.723 & 2.354 & 20,189\\ {\rm CO}($J$=2$\to$1) & 230.538 & 4.906 & 6.445 & 5.684 & 30,398\\ \hline \multicolumn{6}{c}{GOODS-North ``Wide'' Field ($\sim$51\,arcmin$^2$; $\sim$30--38\,GHz)}\\ {\rm CO}($J$=1$\to$0) & 115.271 & 2.032 & 2.847 & 2.443 & 131,042\\ {\rm CO}($J$=2$\to$1) & 230.538 & 5.064 & 6.695 & 5.861 & 193,286\\ \hline \end{tabular} \tablecomments{The co-moving volume is calculated to the edges of the mosaics, and does not account for varying sensitivity across the mosaics, which is accounted for by the completeness correction.} \end{table} \section{Results and Analysis} \subsection{CO Line Candidates} Based on our matched filtering algorithm using three-dimensional spatial/spectral templates, we find 57 candidate {\rm CO}($J$=1$\to$0)\ and {\rm CO}($J$=2$\to$1)\ line emitters in our survey volume down to signal-to-noise ratio (SNR) limits of 5.25 and 5.50 in the COSMOS (26 candidates) and GOODS-North (31 candidates) fields, respectively (Paper I). These SNR limits are chosen to provide comparable ratios of line candidates with positive fluxes over noise spikes with negative fluxes at matching SNR between both fields. This misses at least one independently confirmed {\rm CO}($J$=2$\to$1)\ emitter, HDF\,850.1 at $z$=5.18 in the GOODS-North field (\citealt{walter12}), which has a SNR of 5.33. Including this source, 7 out of the 58 candidates are presently independently confirmed to be real {\rm CO}($J$=1$\to$0)\ (three sources in COSMOS, one in GOODS-North)\footnote{Sources are COLDz.COS.1 to 3 and COLDz.GN.3 (GN19) in Paper I.} or {\rm CO}($J$=2$\to$1)\ line emitters (one in COSMOS, two in GOODS-North)\footnote{Sources are COLDz.COS.0 (AzTEC-3), and COLDz.GN.0 (GN10) and 31 (HDF\,850.1) in Paper I.} through the detection of additional CO lines (see, e.g., Paper I; \citealt{riechers10a,riechers11c,riechers14b}; \citealt{walter12}). To remain robust against individual, potentially spurious candidates, all other line candidates are used only in the statistical analysis of the survey data in a probabilistic manner until independent confirmation is obtained. All candidates except the three independently-confirmed {\rm CO}($J$=2$\to$1)\ emitters are considered to be {\rm CO}($J$=1$\to$0)\ emitters unless stated otherwise.\footnote{This initial assumption is based on the expectation of a significantly lower space density of bright CO-emitting galaxies at $z$$\gtrsim$5 compared to $z$$<$3 in our current understanding. Alternative scenarios are also discussed below.} \subsection{Statistical Methods} A detailed description of the statistical properties of the candidate CO line emitter sample is given in Paper I. We here briefly summarize the main elements of the methods as relevant to the construction of the CO luminosity function. The main purpose of the statistical analysis is to determine the probability of each line candidate to be real, and the completeness of the line search as a function of line luminosity, spatial size, and velocity width. Furthermore, it is necessary to evaluate the probability function of the actual versus measured line luminosity. \subsubsection{Reliability Analysis:\ Purity Estimates} The reliability (or purity/fidelity) of each candidate CO emitter is given by its probability of corresponding to a real line source. The reliability analysis in this work employs Bayesian techniques based on the assumption of symmetry of the noise distribution in the data cubes around zero flux, identifying real signal as positive ``excess'' flux at a given SNR evaluated relative to the noise distribution as traced by negative flux features found with the same extraction methods. The posterior probability distributions for the rates of real sources and noise spikes (which provide estimates of the purity) are obtained by modeling the occurence rates of real sources and noise spikes as an inhomogenous Poisson process with different rate models in the SNR distribution. Purities are calculated from the posterior probability distributions as a function of the model parameters, which are sampled using a Markov Chain Monte Carlo (MCMC) technique (emcee; \citealt{foreman13}). The Poisson rate of the noise distribution is modeled as the tail of a Gaussian in SNR, based on negative flux features at SNR $\geq$4 in the data. The occurence rate of noise features is then measured by maximizing the likelihood of the noise model based on all negative features down to the above SNR limit. The real source rate is parameterized as a shallow power law increasing towards lower SNR values (based on the conservative assumption that faint sources are more common), normalized at a SNR of 6, with uniform, non-constraining priors on the slope and normalization. Given the simple parameterization as a slowly varying source rate, we include all candidates in the limited 5$<$SNR$<$9 range where most candidates are found in the analysis, after confirming that candidates with SNR$>$9 (which represent rare sources in our survey) are always assigned a purity of 100\%. COLDz.GN.3 (GN19) is the only independently confirmed {\rm CO}($J$=1$\to$0)\ emitter with a SNR$<$9, and thus, the only secure source considered in the statistical analysis that would be assigned a purity of $<$100\% by this method alone. Taking into account the additional information that confirms this source to be real, its purity however is known to be 100\% in practice. Thus, the latter, preferred value is adopted in the subsequent analysis. Following this change, all independently confirmed {\rm CO}($J$=1$\to$0)\ emitters have a purity of 100\%$\pm$0\% (see Paper I, Appendix F.1, for further details). \subsubsection{Artificial Source Analysis:\ Completeness and Flux Corrections} The line search and flux extraction methods employed by a ``blind'' survey, in combination with the observational parameters of the data cubes, determine the completeness of a survey. The choice of methods however may introduce biases in the measurements. A probabilistic analysis of artificial sources of varying fluxes and three-dimensional sizes (i.e., spatial extent and linewidth) injected into the data cubes\footnote{The data cubes are used to represent the noise properties, since the vast majority of resolution elements are void of signal.} and then re-extracted using the same methods as for real candidates is employed here to estimate survey completeness, and to account for potential biases. A statistical comparison of injected to extracted artificial source properties is used to correct the CO luminosity function for the completeness of our line search. This method is also used to correct the measured source fluxes feeding into the luminosity function in a probabilistic manner by estimating biases in the flux extraction procedure\footnote{Flux extraction relies on fitting Gaussian line profiles to aperture spectra extracted over a FWHM diameter determined from two-dimensional Gaussian size fitting to velocity-integrated line maps, and thus, is sensitive to the fitted size.} and uncertainties in the flux recovery. Using Bayes theorem, the size, line velocity width, and flux probability distributions found from the artificial source analysis are used in combination with a conservative prior on the fraction of resolved sources to find the probabilistic relationships between measured and real source sizes, line velocity widths, and fluxes. The completeness of the detection process is determined by measuring the fraction of the injected sources that are detected for a given set of source parameters (i.e., line flux, velocity width, and spatial size) as a function of SNR. This provides an estimate for the fraction of the objects at a given intrinsic line luminosity that are recovered at a given SNR threshold, and by accounting for variations of the sensitivity as a function of position and frequency in the mosaics, over what fraction of the survey volume they can be recovered. In the construction of the luminosity function, the probability-weighted completeness is determined by assuming for each luminosity bin that the frequency and line luminosity distributions are uniform within the bin, and no intrinsic spatial size and line velocity width distributions are assumed (i.e., the measured values of the candidates are adopted to determine completeness). Mean values, rather than ``per source'' completeness values of individual candidates, are adopted for each bin of the luminosity function, to minimize biases (see Paper I, Appendix F.3, for further details). \subsubsection{Construction of the CO Luminosity Function} The CO luminosity function is assembled by weighting the contribution of each line candidate to a given luminosity bin by its purity and, in a statistical manner (i.e., per luminosity bin, not per source), inversely by its completeness, using the total co-moving cosmic volume covered by the survey (which corresponds to an effective volume $V_{\rm max}$ for each candidate galaxy due to the completeness corrections and spatial variations of the survey sensitivity). Systematic uncertainties are estimated by calculating the luminosity function with random realizations of the flux and purity estimates (within their statistically well-defined distributions), and with different luminosity bin widths and boundary conditions. In each luminosity bin, the completeness is determined by averaging over 1000 random realizations (i.e., using a uniform prior) for each combination of spatial size and velocity width covered by the artificial sources, using randomly sampled redshifts to calculate the line fluxes as a basis for the completeness values. We then apply these values as a function of spatial size and velocity width to the probability distribution in these parameters for each candidate, effectively using the parameters as weights to the completeness. Systematic uncertainties are taken into account by calculating 10,000 Monte Carlo realizations of the luminosity function for every luminosity bin width and center (sampled in intervals of 0.1\,dex), varying purity values and flux assignments (which are drawn from log-normal distributions for different spatial sizes; see Paper I) for each candidate independently (i.e., allowing them to shift between adjacent luminosity bins) to simulate the uncertainty in their intrinsic fluxes. In the final analysis, luminosity bin widths of 0.5\,dex are adopted. A conservative 20\% uncertainty is added to measured fluxes to account for the uncertainty in flux calibration of the data.\footnote{This value is higher than the nominal precision of absolute flux calibration at the VLA, to account for the fact that some observing runs did not contain one of the ``standard'' primary flux calibrators (see Paper I for details). This conservative choice has only a minor impact on our results.} From the 10,000 realizations, median values and the scatter around the median are calculated for each luminosity bin. The scatter is expressed as the 95$^{\rm th}$ and 5$^{\rm th}$ percentiles for the upper and lower bounds, respectively. Statistical Poisson uncertainties are calculated for each luminosity bin as the relative uncertainty of 1/$\sqrt{N}$, where $N$ corresponds to the number of candidates in the bin (see Paper I, Appendix F.4, for further details). To further account for systematic uncertainties not fully captured by our statistical treatment, purities are utilized using two different methods. The first method (termed ``normal'' hereafter; Fig.~\ref{f2}, middle) draws the purity values for the MCMC sampling used to estimate the allowed range for the luminosity function as random numbers with a normal distribution around the computed values, with a standard deviation of the values themselves, truncated at zero and 100\% purity. This method is motivated by the modest number of line candidates in excess of the tail end of the noise distribution (see Paper I), which limits the precision of more direct methods of measuring the uncertainties. The second method (``uniform''; Fig.~\ref{f2}, left) more conservatively treats the purities as upper limits, and draws the purity values from a uniform distribution between zero and the computed values. This method is designed to account for the finding that a significant fraction of moderate significance line candidates do not show unambiguous multiwavelength counterparts (see Paper I), motivating a more conservative treatment of the purity prior. The results from these implementations are consistent within the uncertainties. In the following, we thus conservatively adopt a combination of both methods by assuming the outermost upper and lower bounds of the uncertainties between the two methods (Fig.~\ref{f2}, right). Given the limited survey statistics due to the moderate number of line candidates, luminosity function constraints are displayed in bins that are not statistically independent throughout, but which instead sample the luminosity function in luminosity bins of 0.5\,dex width, in steps of 0.1\,dex. Independent bins thus are recovered by only considering every fifth bin (see Table~\ref{ta1}). Since candidates are primarily taken into account in a probabilistic manner instead of on a per-candidate basis, this choice of partially redundant sampling does reveal additional information on the shape of the luminosity function, and shows trends more clearly than broader, more sparsely sampled bins. \begin{figure*} \epsscale{1.15} \plotone{f2} \vspace{-2mm} \caption{VLA COLDz {\rm CO}($J$=1$\to$0)\ luminosity function at $\langle$$z$$\rangle$=2.35 and 2.44 in the COSMOS ({\em top}) and GOODS-North ({\em middle}) fields (shaded boxes), respectively, and the combination of both fields, weighted by the statistical uncertainties in each field ({\em bottom}), showing the consistency between methods and fields. The {\em left} panels show the constraints obtained when conservatively assuming a uniform distribution between zero and the most likely values for the purities. The {\em middle column} panels show the constraints when assuming the most likely values for the purities and assigning 100\% uncertainty to these values, truncated at zero and 100\%. The {\em right} panels show the composite uncertainties merged from both methods, obtained by assuming the lowest and highest values covered by their respective uncertainty ranges in each bin. Bins have a width of 0.5\,dex in $L'_{\rm CO}$, and step through the covered luminosity range in steps of 0.1\,dex. As such, individual bins are not statistically independent. Error bars on the boxes indicate Poissonian uncertainties in each bin. Empty green boxes are the constraints on the {\rm CO}($J$=3$\to$2)\ luminosity function at $\langle$$z$$\rangle$=2.75 from the PdBI HDF-N survey (\citealt{walter14}). Empty orange boxes are the {\rm CO}($J$=3$\to$2)\ constraints at $\langle$$z$$\rangle$=2.61 from the ALMA ASPECS-Pilot survey (\citealt{decarli16a}). A constant {\rm CO}($J$=3$\to$2)/{\rm CO}($J$=1$\to$0)\ brightness temperature ratio of $r_{31}$=0.42 has been applied to correct the {\rm CO}($J$=3$\to$2)\ luminosities to {\rm CO}($J$=1$\to$0)\ luminosities for both these surveys. The gray line shows the $z$=0 luminosity function for comparison (updated from \citealt{saintonge17}; A.\ Saintonge, private communication). Dashed lines are semi-analytical and empirical model predictions (\citealt{lagos12,popping16,vallini16}). All except the COLDz data are the same in all panels. \label{f2}} \end{figure*} \begin{figure*} \epsscale{1.15} \plotone{f3} \vspace{-2mm} \caption{Comparison between the two COLDz survey fields and combined constraints on the {\rm CO}($J$=1$\to$0)\ luminosity function. {\em Left:} Same as Fig.~\ref{f2}, top and middle right, but showing the COSMOS and GOODS-North constraints overlaid with each other. {\em Middle:} Same as Fig.~\ref{f2}, bottom right, combining the measurement from both fields, for comparison. {\em Right:} Density of Schechter function fits to the combined data, as distributed according to the fit parameter distributions as obtained with the ABC method (shaded region). Darker colors represent higher probabilities. For reference, solid black lines show the median and 90\% confidence boundary of the implied luminosity function distributions (see Tab.~\ref{t2} for corresponding Schechter parameters). All except the COLDz data are the same as in Fig.~\ref{f2} in all panels. \label{f3}} \end{figure*} \begin{figure} \epsscale{1.15} \plotone{f4} \vspace{-2mm} \caption{VLA COLDz {\rm CO}($J$=2$\to$1)\ luminosity function at $\langle$$z$$\rangle$=5.68 and 5.86 in the COSMOS (blue and red arrows) and GOODS-North (orange arrows and red boxes) fields, respectively. The blue and orange arrows show upper limits under the unlikely assumption that any candidates not independently confirmed to be {\rm CO}($J$=1$\to$0)\ emission would correspond to {\rm CO}($J$=2$\to$1)\ emission, for the same binning in $L'_{\rm CO}$ as in Fig.~\ref{f2}. Red arrows and boxes consider only independently confirmed {\rm CO}($J$=2$\to$1)\ candidates. The dashed lines show model predictions. \label{f4}} \end{figure} \begin{table} \caption{Schechter function fit parameter constraints to the {\rm CO}($J$=1$\to$0)\ luminosity function at $z$=1.95--2.85 from COLDz. \label{t2}} \centering \begin{tabular}{ c c c c } \hline Parameter & 5$^{\rm th}$ percentile & 50$^{\rm th}$ percentile & 95$^{\rm th}$ percentile\\ \hline $\log L'^*_{\rm CO}$ & 10.22 & 10.70 & 11.33\\ $\log \Phi^*_{\rm CO}$ & --4.66 & --3.87 & --3.20\\ $\alpha$ &--0.78 & 0.08 & 0.99\\ \hline \end{tabular} \tablecomments{The CO luminosity function is defined as $\log \Phi_{\rm CO}=\log \Phi^*_{\rm CO}+ \alpha\,(\log L'_{\rm CO}-\log L'^*_{\rm CO})-L'_{\rm CO}/(L'^*_{\rm CO}\,{\rm ln\,10})+\log({\rm ln\,10})$. $L'$ is given in units of K\,\ts km\ts s$^{-1}$\,pc$^2$. $\Phi$ is given in units of Mpc$^{-3}$\,dex$^{-1}$.} \end{table} \subsection{COLDz CO Luminosity Function} \subsubsection{{\rm CO}($J$=1$\to$0)\ Luminosity Function} The estimates of the {\rm CO}($J$=1$\to$0)\ luminosity function, which include all candidates except independently confirmed {\rm CO}($J$=2$\to$1)\ emitters,\footnote{The level of the CO luminosity function is dominantly determined by independently-confirmed sources, such that unconfirmed candidates mainly contribute to the size of the uncertainty ranges. For reference, in the COSMOS field, 1, 2, or 3 secure detections in a bin correspond to log\,$\Phi_{\rm CO}$ [Mpc$^{-3}$\,dex$^{-1}$] =--4.00, --3.70, or --3.53, respectively. In the GOODS-North field, the same number of detections correspond to values of --4.82, --4.52, and --4.34, respectively.} are consistent\footnote{There are some apparent variations between the two fields within the uncertainties, e.g., around the $\log(L'_{\rm CO}$/K\,\kms\,pc$^2$ ) =10.5--11.0 bin, which are likely a reflection of cosmic variance.} between both survey fields (Fig.~\ref{f3}, left). We thus decided to merge the constraints from both fields through a weighted average in each bin (Fig.~\ref{f2}, bottom, and Fig.~\ref{f3}, middle). The data reveal the shape of the {\rm CO}($J$=1$\to$0)\ luminosity function at $z$$\sim$2.4, which resembles that of a Schechter function. While not a unique solution given current observational constraints, we obtain an estimate of the allowed range of Schechter parameters by fitting the characteristic parameters $L'^*_{\rm CO}$ and $\Phi^*_{\rm CO}$ and the power-law slope $\alpha$ to the data (Fig.~\ref{f3}, right and Table \ref{t2}). We adopt the Approximate Bayesian Computation (ABC) method (see, e.g., \citealt{cameron12,weyant13,ishida15}, and references therein) to derive posterior distributions of the Schechter parameters, in order to account for all selection effects affecting our measurement without having to specify an explicit equivalent likelihood function. We first assume uniform, unconstraining priors on the Schechter parameters (i.e., $L'^*_{\rm CO}$, $\Phi^*_{\rm CO}$, and $\alpha$) to describe the intrinsic distribution of the CO luminosity density. Following the ABC method, we then iteratively sample from these priors, randomly sampling galaxies with randomly assigned line widths and spatial sizes (according to the same prior distributions as assumed before) from the assumed distributions. Here, the number of galaxies is assumed to follow a Poisson distribution around the mean. We then correct for completeness and flux recovery in our line search to determine a mock observed sample of galaxies. We then compare this mock sample to observations by only including line candidates with probability equal to their purity, where purities are a random variable determined according to the ``normal'' and ``uniform'' methods described in Sect. 3.2.3. The decision criterion for a mock sample to provide a sufficient match to the observed sample, and thus, to retain an initial set of Schechter parameters for the posterior distribution, is to result in the same number of sources as observed, with line fluxes matching to within the 20\% flux calibration uncertainty. For each of the survey fields, the process is repeated until sufficient accepted samples are generated to accurately define the posterior distribution. The same procedure is repeated for both survey fields combined, requiring that the resulting data set can be represented by a single, common CO luminosity function.\footnote{For this last run, the number of mock sources was allowed to differ by one from the observed sample, which we expect to have a minor impact on the result.} In a final step, we merge the results from both purity methods by giving each method equal probability. The resulting model parameter posterior distributions are shown in Fig.~\ref{fb1}. As shown in Figs.~\ref{f3} and \ref{fb1}, uncertainties are dominated by the faint-end slope below the ``knee'', given the sensitivity of the survey. On the other hand, $L'^*_{\rm CO}$, $\Phi^*_{\rm CO}$ are constrained fairly reliably by the data, with a reasonable agreement within the uncertainties between the two survey fields. \subsubsection{{\rm CO}($J$=2$\to$1)\ Luminosity Function} For estimates of the {\rm CO}($J$=2$\to$1)\ luminosity function, we followed two approaches. The first approach excludes all candidates used to construct the {\rm CO}($J$=1$\to$0)\ luminosity function from our search, only leaving confirmed {\rm CO}($J$=2$\to$1)\ sources and upper limits as available constraints (see Paper I). We further exclude one of the {\rm CO}($J$=2$\to$1)\ sources, AzTEC-3 in the COSMOS field (\citealt{riechers10a,riechers14b,capak11}), because the field was chosen to include this source as a bright ``calibrator'' for the line search methods. Including this source thus would likely bias the measurement in its luminosity bin towards high values, under the reasonable assumption that a random $\sim$9\,arcmin$^2$ field would be unlikely to include a $z$$>$5 source as luminous as AzTEC-3. As lower and upper bounds on the uncertainties, the 5$^{\rm th}$ and 95$^{\rm th}$ percentiles of the Bayesian posterior for inferring a Poisson rate are adopted in GOODS-North (where sources are detected), and the 68$^{\rm th}$ percentile is adopted as an upper limit for the COSMOS field (where no secure CO $J$=2$\to$1 detections remain after the exclusion of AzTEC-3). The second approach assumes that all {\rm CO}($J$=1$\to$0)\ candidates that are not independently confirmed could potentially be {\rm CO}($J$=2$\to$1)\ emitters at higher redshifts. Although unlikely, this provides shallower but more detailed upper limits on the {\rm CO}($J$=2$\to$1)\ luminosity function in smaller luminosity bins. Estimates are weighted by purities and corrected for completeness, using the ``normal'' purity method, adopting the upper, 90$^{\rm th}$ percentile bounds as upper limits. The results from both methods are consistent with each other, and are shown together in Figure \ref{f4}. \begin{figure*}[th!] \epsscale{0.58} \plotone{f5a} \plotone{f5b} \vspace{-5.5mm} \caption{VLA COLDz measurements of the cold gas history of the universe (green boxes), i.e., the co-moving cosmic mass density of cold molecular gas as a function of redshift, showing that the gas density evolves. Vertical sizes indicate the uncertainties in each bin. In the $z$$\simeq$2--3 bin, the smaller solid box shows the constraints from both fields combined, and the larger dashed box shows the constraints from the COSMOS field only (both after merging the two purity methods), as an illustration of the impact of field-to-field variations. Assumptions for the measurement and uncertainties in the $z$=4.90--6.70 bin are the same as in Fig.~\ref{f4}. For reference, the gray point shows the measurement obtained when only including independently confirmed candidates, which is fully consistent with the measurement obtained from the complete statistical analysis. Empty green and orange boxes show the constraints from the same surveys as in Fig.~\ref{f2}, where different boxes correspond to estimates obtained in different CO transitions (\citealt{walter14,decarli16a}). The black point shows constraints at $z$=0 (\citealt{saintonge17}). {\em Left:} Dashed lines show model predictions (\citealt{obreschkow09,lagos11,popping14b,popping14a}). The gray shaded range shows empirical predictions based on an inversion of the $M_{\rm gas}$--SFR relation (e.g., \citealt{sargent12,sargent14}; scaled to $\alpha_{\rm CO}$=3.6\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ from its original effective value of $\sim$4.4\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$). The mangenta range shows estimates based on galaxy stellar mass functions using the dust-based interstellar medium mass scaling method as described by \cite{scoville17}. None of the measurements are extrapolated to account for the faint end of the molecular gas mass function that remained inaccessible to each survey. The red bar indicates the constraint obtained from intensity mapping by \cite{keating16}. No uncertainties are shown for this measurement, since they are dominated by model assumptions rather than statistical measurement errors. {\em Right:} Same data, but also showing the total star-formation rate density, multiplied by equivalent gas depletion timescales of 0.1, 0.5, and 1.0\,Gyr, for reference. Lighter shaded regions correspond to star-formation rate estimates based on ultraviolet stellar light measurements, with ``corrections'' for estimated losses due to dust extinction of the ultraviolet light applied. Darker shaded regions correspond to star-formation rate estimates based on direct measurements of the dust-obscured stellar light at infrared wavelengths (\citealt{bouwens16}, including infrared-bright sources from \citealt{magnelli13}; see, e.g., \citealt{md14} for further details on uncertainties of the star-formation rate density measurements). \label{f5}} \end{figure*} \begin{table*} \caption{Cold gas density evolution measurements from COLDz.\label{t3}} \centering \begin{tabular}{ c c c c } \hline Redshift range & Lower limit & Median & Upper limit\\ &(5$^{\rm th}$ percentile)&(50$^{\rm th}$ percentile) & (95$^{\rm th}$ percentile) \\ &$10^7\,M_\odot\,$Mpc$^{-3}$&$10^7\,M_\odot\,$Mpc$^{-3}$&$10^7\,M_\odot\,$Mpc$^{-3}$\\ \hline 1.95--2.85 & 1.1 & 2.7 & 5.6\\ 1.95--2.72 & 0.95$^{\rm a}$ & 3.5$^{\rm a}$ & 10.9$^{\rm a}$ \\ {\em 2.03--2.85} & {\em 0.30}$^{\rm b}$ & {\em 1.9}$^{\rm b}$ & {\em 7.3}$^{\rm b}$ \\ 4.90--6.70 & 0.14 & 0.47 & 1.1\\ & & & 4.0$^{\rm c}$\\ \hline \end{tabular} \vspace{0.1mm} $^{\rm a}$Measurement for the COSMOS field alone, after merging both purity methods.\\ $^{\rm b}$Measurement for the GOODS-North field alone, after merging both purity methods. These data alone do not fully sample the ``knee'' of the CO luminosity function.\\ $^{\rm c}$Less constraining upper limit obtained when making the (unlikely) assumption that all {\rm CO}($J$=1$\to$0)\ candidates not yet independently confirmed could, in principle, be {\rm CO}($J$=2$\to$1)\ emitters. \end{table*} \subsection{COLDz Cold Gas Density of the Universe} By integrating the measurements and upper limits obtained on the {\rm CO}($J$=1$\to$0)\ and {\rm CO}($J$=2$\to$1)\ luminosity functions across each of the full redshift intervals, we obtain estimates of the total CO luminosity density per unit volume. For the higher-redshift bin, we use the results from the two methods described above as a direct measurement and as a conservative upper limit, respectively. As done in previous work (e.g., \citealt{walter14,decarli16a}), we do not extrapolate the faint end of the luminosity function, but instead only include measurements down to the limit of our survey of log($L'_{\rm CO}$/K\,\kms\,pc$^2$ )$\simeq$9.5. Given the consistency of the COLDz data with a flat faint-end slope, and the moderate survey statistics, this assumption is not likely to dominate the uncertainty budget of our measurement, but more sensitive observations are required to fully assess the impact of this assumption.\footnote{For reference, integrating our best-fit model Schechter functions down only to log($L'_{\rm CO}$/K\,\kms\,pc$^2$ )=10.0 would result in a 0.07\,dex lower median value for the integrated {\rm CO}($J$=1$\to$0)\ luminosity density. Integrating down further to log($L'_{\rm CO}$/K\,\kms\,pc$^2$ )=8.0 or 9.0 would result in 0.044\,dex or 0.03\,dex higher values, respectively.} We then convert the measurements of the CO luminosity density to a molecular gas mass density by applying a ``standard'' conversion factor of $\alpha_{\rm CO}$=3.6\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ (e.g., \citealt{daddi10a}). This choice is motivated by the finding that the majority of the independently-confirmed {\rm CO}($J$=1$\to$0)\ emitters (with the exception of the major merger GN19) are consistent with the star-forming galaxy ``main sequence'' at $z$$\sim$2--3. We do not apply a separate correction to $\alpha_{\rm CO}$ for the {\rm CO}($J$=2$\to$1)-based measurement, since typical {\rm CO}($J$=2$\to$1)/{\rm CO}($J$=1$\to$0)\ line brightness temperature ratios for ``normal'' high-redshift galaxies are of order 90\% (e.g., \citealt{cw13}), and since the actual {\rm CO}($J$=2$\to$1)\ detections in our survey are all massive dust-obscured starburst galaxies. As such, the implied $\sim$10\% correction required is likely sub-dominant to the assumptions made for the choice of $\alpha_{\rm CO}$ (which also depends on other factors like metallicity; see \citealt{bolatto13} for a review). The choice of $\alpha_{\rm CO}$ will be re-evaluated in upcoming work, once dynamical mass estimates based on spatially-resolved measurements of individual line candidates are available, but we note that the choice of a smaller, ``starburst-like'' $\alpha_{\rm CO}$ of order unity would result in significantly lower cold gas density estimates. The resulting measurements of the cold gas density of the universe are shown in Fig.~\ref{f5} and summarized in Table~\ref{t3}. \section{Discussion} Due to improved statistics, the COLDz data provide the currently best constraints on the CO luminosity function at $z$$\sim$2--3 and $z$$\sim$5--7, and they allow for a measurement of the shape of the CO luminosity function in the $z$$\sim$2--3 bin. This provides the to date perhaps most solid constraints on the cosmic density of cold molecular gas in galaxies at these redshifts. \subsection{Comparison to Previous ``Blind'' CO Surveys} \subsubsection{CO Luminosity Function} The most similar measurements of the CO luminosity function to COLDz are those in the {\em Hubble} Deep Field North (HDF-N) and in the {\em Hubble} Ultra Deep Field (H-UDF; ASPECS-Pilot survey) over $\sim$0.5 and 1\,arcmin$^2$ size regions, covering the {\rm CO}($J$=3$\to$2)\ line at $\langle$$z$$\rangle$=2.75 and $\langle$$z$$\rangle$=2.61, respectively (\citealt{walter14,walter16,decarli14,decarli16a}). We consider the differences in redshift in these previous works to the $\sim$60\,arcmin$^2$ COLDz {\rm CO}($J$=1$\to$0)\ survey ($\langle$$z$$\rangle$=2.35 and 2.44 in the COSMOS and GOODS-North fields, respectively) presented here negligible compared to other sources of uncertainty, such that we directly compare these measurements in the following. The difference in line search methods and the luminosity function calculation yield perhaps more conservative uncertainty estimates for the COLDz constraints, but we have confirmed that we would obtain consistent results when adopting the same methods employed in the analysis of the ASPECS-Pilot survey (\citealt{decarli16a}). We thus adopt the measurements and uncertainties from the previous surveys without further modifications. As shown in Figures~\ref{f2} and \ref{f3}, we find that the measurements of all three surveys are consistent within the relative uncertainties. There may be tentative evidence that the COLDz measurements are somewhat lower than the ASPECS-Pilot measurements in the best-constrained common luminosity range at log($L'_{\rm CO}$/K\,\kms\,pc$^2$ )$\simeq$10.2--11.0 (Figs.~\ref{f2} and \ref{f3}). If real, this effect may be due to cosmic variance, or it could be an indication that {\rm CO}($J$=3$\to$2)-based surveys preferentially select galaxies with higher gas excitation, such that {\rm CO}($J$=3$\to$2)/{\rm CO}($J$=1$\to$0)\ brightness temperature ratio of $r_{31}$=0.42$\pm$0.07 assumed by \cite{decarli16a} to correct for the average gas excitation may be too low (which could then mimick such an effect in principle, depending on the intrinsic shape of the CO luminosity function).\footnote{For a sample of bright, observed-frame 850\,$\mu$m--selected galaxies, \cite{bothwell13} find a median $r_{31}$ of 0.52$\pm$0.09, but while there is source overlap, these galaxies are typically more intensely star-forming than the majority of sources found in the ``blind'' CO surveys. Also, the $\sim$20\%$\pm$20\% difference in $r_{31}$ is perhaps not sufficient to fully explain the observed effect.} The latter would be consistent with the finding of a high line ratio limit of $r_{31}$$>$0.7 for a candidate overlapping between the HDF-N and COLDz surveys (ID19; \citealt{decarli14}), and the lack of {\rm CO}($J$=1$\to$0)\ detections for other mid-$J$ CO candidates in the same field (see Paper I). Since some of these earlier candidates may be spurious, and given the limited statistics of the current surveys and the limited magnitude of the effect, additional data are required to further investigate the relevance of potential selection effects due to CO excitation. In particular, \cite{decarli16b} find that some confirmed sources in the ASPECS-Pilot survey appear to show comparatively low CO excitation, opposite to what would be expected in the case of a CO excitation-based selection bias. The full, extended ASPECS survey data expected from an ongoing ALMA Large Program will further constrain the contribution of cosmic variance to the observed effect. \subsubsection{Cold Gas Density of the Universe} The constraints on the evolution of the cold gas density with redshift resulting from the improved CO luminosity function measurements provided by COLDz are consistent with those from previous surveys within the relative uncertainties, and they extend the range of estimates to earlier cosmic epochs (Fig.~\ref{f5}; all CO surveys assume the same $\alpha_{\rm CO}$). As in the case of the CO luminosity function constraints, we adopt the measurements and uncertainties from previous works without further modifications. Due to differences in the methods used to determine and report uncertainties, caution is advised when comparing the constraints from different surveys at face value.\footnote{For the HDF-N measurements, the lower and upper limits of the boxes shown represent secure detections and all line candidates reported by \cite{walter14}, respectively, with Poissonian uncertainties due to the number of candidates added as error bars. For the ASPECS-Pilot measurements, box sizes indicate Poissonian errors, with a minor contribution due to flux errors and potential line misidentifications added (\citealt{decarli16a}). Both surveys adopt 1$\sigma$ uncertainty ranges, rather than the more conservative 90\% confidence intervals adopted for the COLDz measurements.} Previous surveys carried out at 3\,mm and 1\,mm did not provide estimates at $z$$>$4.5, since those redshifts are only covered in high-$J$ lines, where estimates of CO excitation as necessary to extrapolate the {\rm CO}($J$=1$\to$0)\ luminosity are increasingly uncertain. The COLDz measurements likely suggest a higher gas density at $z$$\sim$2--3 ($\rho$(H$_2$)=0.95--10.9$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$, with a preferred range of 1.1--5.6$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$)\footnote{For reference, the contribution from independently confirmed sources alone is $\rho$(H$_2$)=(2.8$\pm$1.4)$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$, which is consistent with the median value of the total of 2.7$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$. Paper I also reports a weak {\rm CO}($J$=1$\to$0)\ detection from stacking 34 individually-undetected $z$=2.0--2.8 galaxies with stellar masses of $M_{\star}$$>$10$^{10}$\,$M_{\odot}$\ in the GOODS-North field. As they are not detected individually, these galaxies are not part of the statistical sample used in this paper. If we were to include these sources, they would contribute an additional $\rho$(H$_2$)$\simeq$0.3$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$ in aggregate.} compared to $z$=0 ($\rho$(H$_2$)=1.1$^{+0.7}_{-0.5}$$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$; \citealt{saintonge17}; see also \citealt{keres03,boselli14})\footnote{We here and in Fig.~\ref{f5} adopt $\alpha_{\rm CO}$=3.6\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ for consistency. Adopting $\alpha_{\rm CO}$=6.5\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ as used by \cite{keres03} would result in a factor of 1.8 higher $\rho$(H$_2$).} by a factor of a few. This finding is consistent with what was reported by the ASPECS team within the relative uncertainties ($\rho$(H$_2$)=4.9--19$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$; \citealt{decarli16a}). These measurements are also in agreement with estimates based on galaxy stellar mass functions in COSMOS using the dust-based interstellar medium mass scaling method as described by \cite{scoville17}. Averaging their data at $z$=2.25 and 2.75, Scoville et al.\ suggest $\rho$(ISM)=3.8$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$ at $z$=2.5.\footnote{We here and in Fig.~\ref{f5} adopt $\alpha_{\rm CO}$=3.6\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ for consistency. Adopting $\alpha_{\rm CO}$=6.5\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ as used by \cite{scoville17} would result in a factor of 1.8 higher $\rho$(H$_2$).} The latter agrees to within $\sim$30\% with the median value of the COLDz measurement, and within $<$10\% with the median value measured in the COSMOS field alone. The COLDz results are also consistent with the constraints obtained from {\rm CO}($J$=1$\to$0)\ intensity mapping experiments at similar redshifts in the GOODS-North field ($\rho$(H$_2$)=9.2$^{+5.9}_{-3.3}$$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$ at $z$=2.3--3.3; \citealt{keating16}).\footnote{We here and in Fig.~\ref{f5} adopt $\alpha_{\rm CO}$=3.6\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ for consistency. Adopting $\alpha_{\rm CO}$=4.3\,$M_{\odot}$\,(K\,\ts km\ts s$^{-1}$\,pc$^{2}$)$^{-1}$ as used by \cite{keating16} would result in a factor of 1.2 higher $\rho$(H$_2$).} A comparison of these results is valuable in general, since CO intensity maps in principle may contain signal below the detection threshold of galaxy surveys, but we note that a quantitative comparison of the relative uncertainties is difficult. This is due to the fact that the intensity mapping constraints only measure the second raw moment of the luminosity function, and therefore cannot distinguish between contributions due to the characteristic luminosity and volume density to the measurement. Furthermore, the detailed interpretation of the nature of the intensity mapping signal in principle relies on assuming a scaling relation between dark matter halo mass and CO luminosity, which is currently not well constrained at $z$$\sim$2--3. We thus do not show formal error bars for this measurement in Fig.~\ref{f5}. The COLDz measurements are also consistent with a decrease in gas density from $z$$\sim$2--3 towards $z$$\sim$5--7 ($\rho$(H$_2$)=0.14--1.1$\times$10$^7$\,$M_{\odot}$\,Mpc$^{-3}$), possibly to below the present-day value. The redshift evolution of the cold gas history of the universe thus appears qualitatively similar to that of the star-formation history of the universe (e.g., \citealt{md14}), which is consistent with what is expected if a universal ``star-formation law'' between gas mass and star-formation rate (e.g., \citealt{cw13}) already exists at early epochs. \subsubsection{Gas Depletion Times} In combination, the cold gas mass and star-formation rate density evolution entail information about the evolution of galaxy gas depletion times as a function of redshift.\footnote{The analysis presented here concerns the redshift evolution of gas depletion times, and thus, does not further consider the potential range of values expected for different galaxy populations that contribute to the signal.} As shown in Fig.~\ref{f5}, simply multiplying the total star-formation rate density (\citealt{bouwens16}) by a characteristic gas depletion timescale (which, to first order, represents the ratio between molecular gas mass and star-formation rate, $M_{\rm H_2}$/SFR) of several hundred million years provides a reasonable match to the cold gas density relation at all redshifts currently probed within the uncertainties, although the data may tentatively prefer shorter depletion times towards higher redshifts. At $z$=0, a characteristic gas depletion timescale in the range of $\tau_{\rm dep}^{\rm ch}$=0.5--1\,Gyr is preferred with the adopted $\alpha_{\rm CO}$ conversion factor (see also discussion by \citealt{saintonge17}). Based on the COLDz measurements of $\rho$(H$_2$) at $z$=2.4 and adopting $\rho$(SFR)=0.15$\pm$0.05\,$M_{\odot}$\,yr$^{-1}$\,Mpc$^{-3}$ (e.g., \citealt{md14}), we find a characteristic gas depletion timescale of $\tau_{\rm dep}^{\rm ch}$=70--750\,Myr with 90\% confidence, with a median value of 200$\pm$70\,Myr. Since the star-formation rate density relation includes significantly less luminous galaxies than probed by current blind CO surveys, this may either indicate that low-luminosity galaxies below our $L'_{\rm CO}$ detection limit do not contribute dominantly to the total cold gas density (perhaps implying that the faint-end slope of the CO luminosity function is not steeply rising towards lower $L'_{\rm CO}$), or that the characteristic gas depletion timescales are longer than 200--500\,Myr when averaged over the entire galaxy population. Assuming substantially shorter gas depletion timescales (or, high star-formation efficiencies) appears to be inconsistent with the data, unless the characteristic $\alpha_{\rm CO}$ conversion factor is substantially lower than assumed. The COLDz measurements of $\rho$(H$_2$) at $z$=5.8 are consistent with characteristic gas depletion timescales of $\tau_{\rm dep}^{\rm ch}$$>$100\,Myr, with a factor of a few higher values allowed by the data within the uncertainties. Although not a unique conclusion based on the COLDz data given the remaining uncertainties, a shortening in gas depletion times despite the observed increase in cold molecular gas content in star-forming galaxies towards higher redshift would be consistent with similar findings based on targeted studies of {\rm CO}($J$=3$\to$2)\ emission and dust-based interstellar medium mass estimates (e.g., \citealt{genzel15,scoville17}), and thus, with an effective increase in star formation efficiency (i.e., SFR per unit $M_{\rm H_2}$) towards higher redshifts. \subsection{Comparison to Model Predictions} \subsubsection{CO Luminosity Function} Given the consistency between the COLDz data and previous surveys, we compare the new CO luminosity function measurements to predictions based on semi-analytical models (\citealt{lagos12,popping16}) and empirical estimates based on the infrared luminosity function of {\em Herschel}-selected galaxies under the assumption of a ``star-formation law'' (\citealt{vallini16}; Figs.~\ref{f2} to \ref{f4}; see, e.g., \citealt{lagos15,dave17,xie17} for additional model predictions). The measurements at $z$$\sim$2--3 appear to be inconsistent with the semi-analytical predictions (see \citealt{decarli16a} for a detailed comparison of both models), which place the characteristic luminosity $L'^*_{\rm CO}$ (``knee'') of the luminosity function at significantly lower luminosities than observed. This is consistent with the excess of bright sources compared to the predictions seen in the ASPECS-Pilot data alone in some luminosity bins (\citealt{decarli16a}), but the trend becomes clearer at the higher statistical significance of the COLDz measurements -- showing a significantly (by one to two orders of magnitude) higher characteristic luminosity than what is observed at $z$$\sim$0 (e.g., \citealt{keres03,boselli14,saintonge17}). These predictions also prefer a strong contribution from faint sources, which are not preferred by the data, but agree within the considerable uncertainties of the measurements at low luminosities. Qualitatively, the underprediction in the number of luminous CO emitters may be related to the finding that semi-analytical models tend to underpredict the star-formation rates of galaxies on the star-forming main sequence at similar redshifts (see, e.g., review by \citealt{sd15}). At $z$$\sim$5--7, the excess of bright sources compared to the semi-analytical predictions appears to be even more pronounced than at lower redshifts, but we caution that the most constraining measurement is based on a small number of sources only, and thus, needs to be put on a firmer statistical footing. On the other hand, the observations at $z$$\sim$2--3 appear to be consistent with the empirical predictions by \cite{vallini16}, and thus, with what is expected from estimates of dust-obscured star-formation activity at high redshift based on infrared luminosity functions. \subsubsection{Cold Gas Density of the Universe} The observational constraints on the evolution of the cold gas density with redshift remain in agreement with both semi-analytical (\citealt{obreschkow09,lagos11,lagos12,popping14b,popping14a}) and empirical (\citealt{sargent12,sargent14}) model predictions at $z$$\sim$2--3. Since most of the semi-analytical models include a varying $\alpha_{\rm CO}$ between individual galaxies, a simple interpretation of the consistency despite the disagreement in the luminosity function estimates remains challenging. In addition, the predictions do not account for the sensitivity limits of the CO surveys, or uncertainties due to cosmic variance. Given the differences in the CO luminosity functions between models and observations at high $z$, this effect could lead to up to a factor of a few difference in the corresponding gas densities at high redshift in principle. However, as discussed in Sect.~3.4, the impact of the sensitivity limits, which would bias the measurements towards lower values, appears to be relatively minor based on the preferred model Schechter function fits to the COLDz data. On the other hand, cosmic variance due to large-scale structure in the distribution of gas-rich galaxies (which is assumed to be uniform in our analysis) could bias the measurements either low or high. To obtain an approximate estimate of systematic uncertainties introduced by cosmic variance, we follow the prescription by \cite{driver10}, based on the distribution of galaxies near the characteristic stellar mass at a given redshift.\footnote{This method is based on a generalized expression (their equation 4) calibrated through an examination of galaxies within $\pm$1\,mag of the characteristic optical magnitude out to $z$$\sim$0.1 in the Sloan Digital Sky Survey (SDSS), which represent the most common galaxies at a given redshift. See {\tt cosmocalc.icrar.org} for additional details. The field sizes and {\rm CO}($J$=1$\to$0)\ redshift ranges in Table \ref{t1} are used for all calculations.} Including both Poisson uncertainty and cosmic variance scaled to the volume of the COLDz survey, we find a sample variance uncertainty of $\sim$30\%--40\% and $\sim$25\% for the COSMOS and GOODS-North fields, respectively. Alternatively, adapting results based on models of the evolution of the most massive galaxies (i.e., $M_\star$$>$10$^{11}$\,$M_\odot$) by \cite{moster11}\footnote{For our estimate, we have made use of the predictions provided for the H-UDF, since this field has a similar area as the COLDz COSMOS field. We have assumed $\langle z \rangle$=2.35 and $\Delta$$z$=0.8 in our calculations, and we adopt the values found for the $M_\star$=10$^{11.0}$--10$^{11.5}$\,$M_\odot$ bin.} yields an estimated uncertainty of $\sim$40\%--50\% based on cosmic variance alone for the smaller COSMOS field. These estimates are consistent with what is found from more detailed calculations based on the {\em IllustrisTNG} simulations (of order $\sim$30\%--50\% in the $z$$\sim$2--3 bin for both fields combined; G.\ Popping 2018, private communication). All estimates appear to suggest that uncertainties due to cosmic variance are subdominant to other sources of uncertainty, given the large volume of the COLDz survey due to the broad range in redshift covered and the comparatively large field size. This is also consistent with the broad distribution in redshift of the confirmed CO emitters and candidates in the COLDz survey volume (see, e.g., Paper I, Fig.~3).\footnote{The COSMOS field contains the AzTEC-3 protocluster region at $z$=5.3 (e.g., \citealt{capak11,riechers10a,riechers14b}), and thus, is biased in principle. However, only upper limits are reported in this field for the corresponding redshift bin, such that this does not impact the reported measurements.} In any case, if we were to conservatively correct down the model predictions by factors of $\sim$1.5--2 to account for the combined effects of sensitivity limits and cosmic variance, they would in fact move close to the median $\rho$(H$_2$) implied by the COLDz measurements. Taken at face value, the apparent agreement between the model predictions and COLDz data could indicate that there is no significant, or at least, no dominant contribution from sources far below the COLDz detection limit, such that steeply-rising faint-end slopes of the CO luminosity function towards lower $L'_{\rm CO}$ may be disfavored. This would also be consistent with the agreement between the COLDz measurement and intensity mapping constraints. If true, this could be related to lower metallicities towards fainter, low-mass galaxies, leading to disproportionally low CO luminosity per unit molecular gas mass (e.g., \citealt{genzel12,bolatto13}). Although not a unique explanation, this would be consistent with the finding of a lower median redshift of galaxies with low submillimeter continuum fluxes compared to brighter ones (implying low dust masses, and thus, likely low gas masses; \citealt{aravena16}), and with the apparent finding of a low dust content in lower stellar mass galaxies at $z$$>$2 (\citealt{bouwens16}). This would also be consistent with the finding that we do not detect {\rm CO}($J$=2$\to$1)\ emission from several known, modestly massive and star-forming Lyman-break galaxies at $z$$\sim$5.2--5.3 in our survey area (Paper I; see also \citealt{capak11,walter12,riechers14b}), which is compatible with a perhaps elevated $\alpha_{\rm CO}$ due to lower metallicity. All confirmed $z$$>$5 COLDz detections are massive, dust-obscured starburst galaxies with likely high metallicity. The observational constraints at $z$$\sim$5--7 are also in agreement with the model predictions, albeit lower than the Obreschkow et al.\ and Lagos et al.\ models unless some unconfirmed sources (which are taken into consideration for the upper limit shown) contribute to the signal. They are less secure than in the lower-redshift bin due to more limited statistics and because it is currently not possible to measure the characteristic CO luminosity at these redshifts, such that the fraction of the total cold gas density recovered down to the sensitivity limit of the survey is less certain than at lower redshifts. Nonetheless, this finding appears to be consistent with the assumption of an evolving $\alpha_{\rm CO}$ due to lower metallicity in fainter galaxies and towards higher redshifts, resulting in a steep drop in the gas volume density as traced by CO emission. Further observations are required to investigate if the drop in H$_2$ density towards very high redshift is as steep as observed in CO, or if the effect is enhanced due to metallicity affecting the strength of the CO signal.\footnote{The strength of the CO signal may also be reduced at the highest redshifts due to the increased temperature of the cosmic microwave background, relative to which the cold gas emission is detected. The importance of this effect strongly depends on the excitation of the gas traced by CO, in particular the kinetic gas temperature (e.g., \citealt{dacunha13}).} \section{Conclusions} We have used the ``blind'' molecular line scans over $\sim$60\,arcmin$^2$ in the COSMOS and GOODS-North survey fields taken as part of the VLA COLDz survey (Paper I) to measure the shape of the CO luminosity function at $z$$\sim$2--3 and to constrain it at $z$$\sim$5--7, utilizing {\rm CO}($J$=1$\to$0)\ and {\rm CO}($J$=2$\to$1)\ emission line galaxy candidates. We also provide constraints on the evolution of the cosmic molecular gas density out to $z$$\sim$7. We compare our findings to previous $\sim$0.5 and 1\,arcmin$^2$ surveys in the HDF-N and the H-UDF (ASPECS-Pilot) in higher-$J$ CO lines (\citealt{decarli14,walter16}), estimates based on galaxy stellar mass functions in COSMOS scaled using dust-based interstellar medium mass estimates (\citealt{scoville17}), and a CO intensity mapping study in GOODS-North (\citealt{keating16}), finding broad agreement within the relative uncertainties. The COLDz data provide the first solid measurement of the shape of the CO luminosity function at $z$$\sim$2--3, reaching below its ``knee'', and the first significant constraints at $z$$\sim$5--7. The characteristic CO luminosity at $z$$\sim$2--3 appears to be one to two orders of magnitude higher than at $z$=0 (\citealt{keres03,saintonge17}), which is consistent with the idea that the dominant star-forming galaxy populations $\sim$10\,billion years ago were significantly more gas-rich compared to present day. We also independently confirm an observed apparent excess of the space density of bright CO-emitting sources at high redshift compared to semi-analytical predictions, but our findings are consistent with empirical predictions based on the infrared luminosity function and observed star-formation rates of distant galaxies. Integrating the CO luminosity functions down to the sensitivity limit of our survey, we obtain robust estimates of the volume density of cold gas in galaxies at high redshift. Our measurement is consistent with a factor of a few increase from $z$$\sim$0 to $z$$\sim$2--3, and a decrease towards $z$$\sim$5--7 by about an order of magnitude (which may be less steep in practice if metallicity has an increasing effect on CO-based measurements towards the highest redshifts). This is consistent with semi-analytical and empirical model predictions and previous constraints from the ASPECS-Pilot survey (\citealt{decarli16a}), and with previous findings of increased gas fractions at $z$$>$1--2 (e.g., \citealt{daddi10a,tacconi13,tacconi18,scoville17}). The overall shape of the cosmic gas density evolution resembles that of the star-formation history of the universe, consistent with an underlying ``star-formation law'' relation out to the highest measured redshifts. This suggests that the star-formation history, to first order, follows the evolution of the molecular gas supply in galaxies, as regulated by the gas accretion efficiency and feedback processes. A more direct comparison of the star-formation rate and cold gas density relations as a function of cosmic time holds critical information about the true gas depletion timescales, and thus, the gas accretion rates required to maintain the ongoing build-up of stellar mass. The data appear broadly consistent with a characteristic gas depletion timescale of several hundred million years, but there may be tentative evidence for a shortening in gas depletion times despite the observed increase in cold molecular gas content in star-forming galaxies towards higher redshift. This finding would be consistent with previous, targeted investigations based on {\rm CO}($J$=3$\to$2)\ and dust-based interstellar medium mass estimates (e.g., \citealt{genzel15,scoville17}), and thus, with an effective increase in star formation efficiency in the dominant star-forming galaxy populations towards higher redshifts. While COLDz is the currently largest survey of its kind, the size of the volume probed and the number of line candidates found implies that larger areas need to be surveyed to greater depth in the future to more clearly address effects of cosmic variance and to reduce the error budget due to Poissonian fluctuations. Such studies will be possible with large investments of observing time at the VLA and ALMA in the coming years, until the next large leap in capabilities will become available with the construction of the Next Generation Very Large Array (ngVLA; e.g., \citealt{bolatto17,selina18}). \acknowledgments The authors thank Am\'elie Saintonge for sharing her updated Schechter fits to the local CO luminosity function prior to publication, Rychard Bouwens for sharing the data necessary to create Figure \ref{f5}, and Gerg\"o Popping for helpful input on the comparison of our results to models, and for providing some new and updated model results. We also thank the anonymous referee for a helpful report. D.R.\ and R.P.\ acknowledge support from the National Science Foundation under grant number AST-1614213 to Cornell University. J.A.H. acknowledges support of the VIDI research program with project number 639.042.611, which is (partly) financed by the Netherlands Organisation for Scientific Research (NWO). I.R.S. acknowledges support from the ERC Advanced Grant DUSTYGAL (321334), STFC (ST/P000541/1), and a Royal Society/Wolfson Merit Award. The National Radio Astronomy Observatory is a facility of the National Science Foundation operated under cooperative agreement by Associated Universities, Inc. \vspace{5mm} \facilities{VLA}
\section{Introduction}} \IEEEPARstart{T}{he} amount of labeled training samples is critical to the performance of machine learning models. However, in many real-world applications it is easy to obtain unlabeled data, but labeling them may be very costly or time-consuming. This is particularly true for affective computing \cite{Picard1997}. Affects are very subjective, subtle, and uncertain. So, usually multiple human assessors are needed to obtain the groundtruth affect label for each affective sample (video, audio, image, text, etc.). For example, 14-16 assessors were used to evaluate each video clip in the DEAP dataset \cite{Koelstra2012}, and six to 17 assessors were used for each utterance in the VAM corpus \cite{Grimm2008}. Many machine learning approaches have been proposed to alleviate the data labeling effort, including \cite{Harpale2012}: \begin{enumerate} \item \emph{Semi-supervised learning} \cite{Chapelle2006}, which uses typically a small amount of labeled data and a large amount of unlabeled data simultaneously in model training. \item \emph{Transfer learning} \cite{Pan2010}, which makes use of data or knowledge from similar or relevant tasks to help the learning in a new task, which typical has a small number of labeled samples. \item \emph{Multi-task learning} (MTL) \cite{Zhang2017}, in which multiple learning tasks are solved simultaneously, while exploiting commonalities and differences across them. \item \emph{Active learning} \cite{Settles2009,drwuSAL2018,drwuRSVP2016}, which optimally selects the most informative unlabeled samples to label, so that a good learning model could be built from a small number of labeled samples. \end{enumerate} The above four approaches are independent and complementary, so they could be combined for even better performance. For example, we have developed a collaborative filtering approach, which integrates transfer learning and active class selection, a variant of active learning, for reducing the calibration data requirement in brain-computer interface (BCI). We have also developed active weighted adaptation regularization \cite{drwuTNSRE2016}, which integrates active learning and domain adaptation, a specific form of transfer learning, for reducing the subject-specific calibration effort in BCI. Most recently, we have also developed an active semi-supervised transfer learning approach \cite{drwuSMC2017}, which integrates semi-supervised learning, transfer learning and active learning, for offline BCI calibration. The focus of this paper is MTL, which has been successfully used in many real-world applications, including affective computing. For example, Jiang et al. \cite{Jiang2015a} proposed a multi-task fuzzy system that uses simultaneously independent sample information from each task and the inter-task common hidden structure among multiple tasks to enhance the generalization performance. It demonstrated promising performance in real-world applications including glutamic acid fermentation process modeling, polymer test plant modeling, wine preferences modeling, concrete slump modeling, etc. Su et al. \cite{Su2018} proposed MTL with low rank attribute embedding to perform person re-identification on multi-cameras, and demonstrated that it significantly outperformed existing single-task and multi-task approaches. Abadi et al. \cite{Abadi2014} proposed MTL-based regression models to simultaneously learn the relationship between low-level audio-visual features and high-level valence/arousal ratings from a collection of movie scenes. They can better predict valence and arousal ratings than scene-specific models. Xia and Liu \cite{Xia2017} integrated MTL and deep belief network to leverage activation and valence information for acoustic emotion recognition. Zhang et al. \cite{Zhang2017a} treated corpus, domain, and gender as different tasks in cross-corpus MTL, and showed that it outperformed approaches that treat the tasks as either identical or independent. However, there have been very few approaches on integrating MTL and active learning. Reichart et al. \cite{Reichart2008} proposed multi-task active learning for linguistic annotations, which considers two annotation tasks (named entity and syntactic parse tree) and demonstrated promising performance. Zhang \cite{Zhang2010} studied multi-task active learning with output constraints, and demonstrated the effectiveness of the proposed framework in web information extraction and document classification. Li et al. \cite{Li2012b} proposed a multi-domain active learning approach for text classification, which jointly selects samples from multiple domains with duplicate information considered. Experiments on three real-world applications (sentiment classification, newsgroup classification and email spam filtering) showed that it outperformed several state-of-the-art single-task active learning approaches. Harpale \cite{Harpale2012} gave so far the most comprehensive study on multi-task active learning in his PhD Dissertation, which proposed approaches for homogeneous tasks, heterogeneous tasks, hierarchical classification, and collaborative filtering, and verified their performances in text classification, movie genre classification, image annotation, etc. The above review shows that among the small number of studies on multi-task active learning, only one was related to affective computing (text sentiment classification), and none had considered regression problems\footnote{Chapter~6 of \cite{Harpale2012} presented an aspect model with Bayesian active learning algorithm for regression problems and applied it to two movie rating applications, but it is single-task active learning instead of multi-task active learning.}. However, affect estimation is a very pertinent application because affects intrinsically have multiple dimensions, e.g., affects can be represented in the 2D space of arousal and valence \cite{Russell1980}, or in the 3D space of arousal, valence, and dominance \cite{Mehrabian1980}. This paper fills the gap by proposing two multi-task active learning for regression (ALR) approaches, which extend two ALR approaches we proposed earlier \cite{drwuiGS2018} from single-task learning to MTL. Experimental results on the VAM corpus \cite{Grimm2008} demonstrate the effectiveness of our proposed approaches. Moreover, our proposed multi-task ALR approaches are generic, and they can also be used in other application domains beyond affective computing. The remainder of this paper is organized as follows: Section~\ref{sect:MTALR} introduces two single-task ALR approaches based on greedy sampling, and their multi-task extensions. Section~\ref{sect:experiment} compares the performances of multi-task ALR with several state-of-the-art single-task ALR approaches on the VAM corpus. Section~\ref{sect:discussion} discusses why MTL should be preferred over single-task learning in affective computing. Section~\ref{sect:conclusions} draws conclusions and points out some future research directions. \section{MT-ALR Using Greedy Sampling} \label{sect:MTALR} This section extends two single-task ALR approaches we proposed recently \cite{drwuiGS2018} to MTL. \subsection{Single-task GSy} \label{sect:GSy} The GSy ALR approach, proposed in our recent work \cite{drwuiGS2018} for single-task regression, was inspired by the greedy sampling (GS) ALR approach proposed in \cite{Yu2010}. GS tries to select the most diverse samples in the \emph{input} space to label, whereas GSy aims to achieve diversity in the \emph{output} space. The basic idea of GSy is as follows. Given a pool of unlabeled samples, GSy first selects a few samples using GS in the \emph{input} space to build an initial regression model, and then in each subsequent iteration selects a new sample located furthest away from all previously selected samples in the \emph{output} space to achieve diversity among the selected samples. Implementation details are given next. Assume the pool consists of $N$ samples $\{\mathbf{x}_n\}_{n=1}^N$, initially none of which is labeled. Our goal is to select $K$ of them to label, and then construct an accurate regression model from them to estimate the outputs for the remaining $N-K$ samples. GSy selects the first sample as the one closest to the centroid of all $N$ samples (i.e., the one with the shortest average distance to the remaining $N-1$ samples), and the remaining $K-1$ samples incrementally. To achieve diversity in the output space, GSy needs to know first the outputs (labels) of all samples, either true or estimated. Let $K_0$ be the minimum number of labeled samples required to build a regression model (in this paper $K_0$ is set as the number of features in the input space). GSy first uses GS in the input space to select the first $K_0$ samples to label. Without loss of generality, assume the first $k$ ($k<K_0$) samples have already been selected. For each of the remaining $N-k$ unlabeled samples $\{\mathbf{x}_n\}_{n=k+1}^N$, GSy computes first its distance to each of the $k$ labeled samples: \begin{align} d_{nm}^{\mathbf{x}}=||\mathbf{x}_n-\mathbf{x}_m||,\quad m=1,...,k; n=k+1,...,N \label{eq:dnmx} \end{align} then $d_n^{\mathbf{x}}$, the shortest distance from $\mathbf{x}_n$ to all $k$ labeled samples: \begin{align} d_n^{\mathbf{x}}=\min_m d_{nm}^{\mathbf{x}},\quad n=k+1,...,N \label{eq:dnx} \end{align} and finally selects the sample with the maximum $d_n^{\mathbf{x}}$ to label. Once $K_0$ samples have been selected and labeled, a regression model can be constructed, and then GSy can select the remaining $K-K_0$ samples to achieve diversity in the output space. Without loss of generality, assume the first $k$ ($k\ge K_0$) samples have already been labeled with outputs $\{y_m\}_{m=1}^k$, and a regression model $f(\mathbf{x})$ has been constructed. For each of the remaining $N-k$ unlabeled samples $\{\mathbf{x}_n\}_{n=k+1}^N$, GSy computes first its distance to each of the $k$ outputs: \begin{align} d_{nm}^y=||f(\mathbf{x}_n)-y_m||,\quad m=1,...,k; n=k+1,...,N \label{eq:dnmy} \end{align} and $d_n^y$, the shortest distance from $f(\mathbf{x}_n)$ to $\{y_m\}_{m=1}^k$: \begin{align} d_n^y=\min_m d_{nm}^y,\quad n=k+1,...,N \label{eq:dny} \end{align} and then selects the sample with the maximum $d_n^y$ to label. For the completeness of this paper, the pseudo-code of single-task GSy, initially proposed in \cite{drwuiGS2018}, is shown in Algorithm~\ref{alg:GSy}. \begin{algorithm}[h] \KwIn{$N$ unlabeled samples, $\{\mathbf{x}_n\}_{n=1}^N$\; \hspace*{10mm} $K$, the maximum number of labels to query.} \KwOut{The regression model $f(\mathbf{x})$.} \tcp{Initialize the first selection} Set $Z=\{\mathbf{x}_n\}_{n=1}^N$, and $S=\emptyset$\; Identify $\mathbf{x}'$, the sample closest to the centroid of $Z$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the sample in $S$ as $\mathbf{x}_1$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=2}^N$\; \tcp{Select $K_0-1$ more samples incrementally using GS in the input space} Identify $K_0$, the minimum number of labeled samples required to construct $f(\mathbf{x})$\; \For{$k=1,...,K_0-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{x}}$ in (\ref{eq:dnx})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\;} Query to label the $K_0$ samples in $S$\; Construct the regression model $f(\mathbf{x})$ from $S$\; \tcp{Select $K-K_0$ more samples incrementally} \For{$k=K_0,...,K-1$}{ \For{$n=k,...,N$}{ Compute $d_n^y$ in (\ref{eq:dny})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^y$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Query to label $\mathbf{x}'$ in $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\; Update the regression model $f(\mathbf{x})$ using $S$.} \caption{GSy for single-task ALR \cite{drwuiGS2018}.} \label{alg:GSy} \end{algorithm} \subsection{Multi-Task GSy (MT-GSy)} \label{sect:MT-GSy} The original GSy was proposed for single-task learning, i.e., each sample in the input space has only one output (task). This subsection extends it to MTL. Let $P$ be the number of tasks (dimensionality of the output space), i.e., $\mathbf{y}_n=(y_{n,1},...,y_{n,P})^T$. Multi-task GSy (MT-GSy) tries to select samples can benefit all $P$ tasks simultaneously. MT-GSy first uses GSy to select and label $K_0$ samples. It then builds $P$ regression models $\{f_p(\mathbf{x})\}_{p=1}^P$, for the $P$ tasks, and next selects the remaining $K-K_0$ samples to achieve diversity in the $P$ output spaces simultaneously. Without loss of generality, assume the first $k$ ($k\ge K_0$) samples have already been labeled with outputs $\{\mathbf{y}_m\}_{m=1}^k$, and $P$ regression models $f_p(\mathbf{x})$ ($p=1,...,P$) have been built. For each of the remaining $N-k$ unlabeled samples $\{\mathbf{x}_n\}_{n=k+1}^N$, MT-GSy computes first its distance to each of the $k$ outputs, for each of the $P$ tasks: \begin{align} d_{nm,p}^\mathbf{y}=||f_p(\mathbf{x}_n)-y_m|| \label{eq:dnmyp} \end{align} where $m=1,...,k$, $n=k+1,...,N$, and $p=1,...,P$. MT-GSy then computes $d_n^\mathbf{y}$, the product of the shortest distances from $f_p(\mathbf{x}_n)$ to $\{y_{m,p}\}_{m=1}^k$, $p=1,...,P$: \begin{align} d_n^\mathbf{y}=\min_m \prod_{p=1}^P d_{nm,p}^\mathbf{y},\quad n=k+1,...,N \label{eq:dnyp} \end{align} and selects the sample with the maximum $d_n^\mathbf{y}$ to label. The pseudo-code of MT-GSy is given in Algorithm~\ref{alg:MT-GSy}. It's interesting to note that: \begin{enumerate} \item In (\ref{eq:dnyp}) we combine the $P$ $d_{nm,p}^\mathbf{y}$ using product instead of summation, to avoid the problem that different task outputs may have different scales, and hence a task with large outputs may dominate other tasks. \item MT-GSy degrades to the single-task GSy when $P=1$. \item We considered a simple multi-task setting that all tasks share the same inputs. More general settings that allow different tasks to have different inputs will be considered in our future research. \end{enumerate} \begin{algorithm}[h] \KwIn{$N$ unlabeled samples, $\{\mathbf{x}_n\}_{n=1}^N$\; \hspace*{10mm} $K$, the maximum number of labels to query.} \KwOut{$P$ regression models $f_p(\mathbf{x})$, $p=1,...,P$.} \tcp{Initialize the first selection} Set $Z=\{\mathbf{x}_n\}_{n=1}^N$, and $S=\emptyset$\; Identify $\mathbf{x}'$, the sample closest to the centroid of $Z$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the sample in $S$ as $\mathbf{x}_1$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=2}^N$\; \tcp{Select $K_0-1$ more samples incrementally using GS in the input space} Identify $K_0$, the minimum number of labeled samples required to construct $f(\mathbf{x})$\; \For{$k=1,...,K_0-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{x}}$ in (\ref{eq:dnx})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\;} Query to label the $K_0$ samples in $S$, for all $P$ tasks\; Construct $P$ regression models $f_p(\mathbf{x})$ from $S$, one for each task\; \tcp{Select $K-K_0$ more samples incrementally} \For{$k=K_0,...,K-1$}{ \For{$n=k,...,N$}{ Compute $d_n^\mathbf{y}$ in (\ref{eq:dnyp})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^\mathbf{y}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Query to label $\mathbf{x}'$ in $S$, for all $P$ tasks\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\; Update the $P$ regression models $f_p(\mathbf{x})$ using $S$.} \caption{MT-GSy for multi-task ALR.} \label{alg:MT-GSy} \end{algorithm} \subsection{Single-Task iGS} \label{sect:iGS} The improved greedy sampling (iGS) approach, proposed in our recent work \cite{drwuiGS2018} for single-task learning, considers the diversity in both the input and output spaces. Like the single-task GSy, initially the pool consists of $N$ unlabeled samples and zero labeled sample. In iGS we again set $K_0$ to be the number of features in the input space, and use GS in the input space to select the first $K_0$ samples to label. Assume the first $k$ samples have already been labeled with labels $\{y_n\}_{n=1}^k$. For each of the remaining $N-k$ unlabeled sample $\{\mathbf{x}_n\}_{n=k+1}^N$, iGS computes first its distance to each of the $k$ labeled samples in the input space: \begin{align} d_{nm}^{\mathbf{x}}=||\mathbf{x}_n-\mathbf{x}_m||,\quad m=1,...,k; n=k+1,...,N \label{eq:dnmx} \end{align} and $d_{nm}^y$ in (\ref{eq:dnmy}), and then $d_n^{\mathbf{x}y}$: \begin{align} d_n^{\mathbf{x}y}=\min_m d_{nm}^{\mathbf{x}}d_{nm}^y,\quad n=k+1,...,N \label{eq:dnxy} \end{align} Next, iGS selects the sample with the maximum $d_n^{\mathbf{x}y}$ to label. In summary, iGS uses the same procedure as GSy to select the first $K_0$ samples to build an initial regression model, and then in each subsequent iteration a new sample located furthest away from all previously selected samples in both the input and output spaces is selected to achieve balanced diversity among the selected samples. Its pseudo-code, originally proposed in \cite{drwuiGS2018}, is given in Algorithm~\ref{alg:iGS}, for the completeness of this paper. \begin{algorithm}[h] \KwIn{$N$ unlabeled samples, $\{\mathbf{x}_n\}_{n=1}^N$\; \hspace*{10mm} $K$, the maximum number of labels to query.} \KwOut{The regression model $f(\mathbf{x})$.} \tcp{Initialize the first selection} Set $Z=\{\mathbf{x}_n\}_{n=1}^N$, and $S=\emptyset$\; Identify $\mathbf{x}'$, the sample closest to the centroid of $Z$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the sample in $S$ as $\mathbf{x}_1$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=2}^N$\; \tcp{Select $K_0-1$ more samples incrementally using GS in the input space} Identify $K_0$, the minimum number of labeled samples required to construct $f(\mathbf{x})$\; \For{$k=1,...,K_0-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{x}}$ in (\ref{eq:dnx})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\;} Query to label the $K_0$ samples in $S$\; Construct the regression model $f(\mathbf{x})$ from $S$\; \tcp{Select $K-K_0$ more samples incrementally} \For{$k=K_0,...,K-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{x}y}$ in (\ref{eq:dnxy})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}y}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Query to label $\mathbf{x}'$ in $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\; Update the regression model $f(\mathbf{x})$ using $S$.} \caption{iGS for single-task ALR \cite{drwuiGS2018}.} \label{alg:iGS} \end{algorithm} \subsection{Multi-Task iGS (MT-iGS)} \label{sect:MT-iGS} This subsection extends the single-task iGS to multi-task iGS (MT-iGS). Similar to MT-GSy, here we again consider a simple multi-task setting that all $P$ tasks share the same inputs. MT-iGS first uses iGS to select and label the $K_0$ samples. It then builds $P$ regression models $\{f_p(\mathbf{x})\}_{p=1}^P$ for the $P$ tasks, and next selects the remaining $K-K_0$ samples to achieve diversity in both the input and output spaces. Without loss of generality, assume the first $k$ ($k\ge K_0$) samples have already been labeled with outputs $\{\mathbf{y}_m\}_{m=1}^k$, and $P$ regression models $f_p(\mathbf{x})$ ($p=1,...,P$) have been built. For each of the remaining $N-k$ unlabeled samples $\{\mathbf{x}_n\}_{n=k+1}^N$, MT-iGS computes $d_{nm}^{\mathbf{x}}$ in (\ref{eq:dnmx}) and $d_{nm,p}^\mathbf{y}$ in (\ref{eq:dnmyp}), and then $d_n^\mathbf{xy}$: \begin{align} d_n^\mathbf{xy}=\min_m d_{nm}^{\mathbf{x}}\prod_{p=1}^P d_{nm,p}^\mathbf{y},\quad n=k+1,...,N \label{eq:dnxyp} \end{align} and selects the sample with the maximum $d_n^\mathbf{xy}$ to label. The pseudo-code of MT-iGS is given in Algorithm~\ref{alg:MT-iGS}. \begin{algorithm}[h] \KwIn{$N$ unlabeled samples, $\{\mathbf{x}_n\}_{n=1}^N$\; \hspace*{10mm} $K$, the maximum number of labels to query.} \KwOut{$P$ regression models $f_p(\mathbf{x})$, $p=1,...,P$.} \tcp{Initialize the first selection} Set $Z=\{\mathbf{x}_n\}_{n=1}^N$, and $S=\emptyset$\; Identify $\mathbf{x}'$, the sample closest to the centroid of $Z$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the sample in $S$ as $\mathbf{x}_1$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=2}^N$\; \tcp{Select $K_0-1$ more samples incrementally using GS in the input space} Identify $K_0$, the minimum number of labeled samples required to construct $f(\mathbf{x})$\; \For{$k=1,...,K_0-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{x}}$ in (\ref{eq:dnx})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\;} Query to label the $K_0$ samples in $S$, for all $P$ tasks\; Construct $P$ regression models $f_p(\mathbf{x})$ from $S$, one for each task\; \tcp{Select $K-K_0$ more samples incrementally} \For{$k=K_0,...,K-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{xy}}$ in (\ref{eq:dnxyp})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}y}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Query to label $\mathbf{x}'$ in $S$, for all $P$ tasks\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\; Update the $P$ regression models $f_p(\mathbf{x})$ using $S$.} \caption{MT-iGS for multi-task ALR.} \label{alg:MT-iGS} \end{algorithm} Similar to MT-GSy, we can also note that: \begin{enumerate} \item In (\ref{eq:dnxyp}) we combine $d_{nm}^\mathbf{x}$ and the $P$ $d_{nm,p}^\mathbf{y}$ using product instead of summation, to avoid the problem that the inputs and different task outputs may have different scales, and hence one distance may dominate others. \item MT-iGS degrades to the single-task iGS when $P=1$. \end{enumerate} \section{Experiment} \label{sect:experiment} The VAM corpus \cite{Grimm2008} is used in this section to demonstrate the performances of MT-GSy and MT-iGS. \subsection{Dataset and Feature Extraction} The VAM corpus was released in ICME2008 \cite{Grimm2008} and has been used in many studies \cite{Grimm2007a,Grimm2007b,drwuICME2010,drwuInterSpeech2010}. It contains spontaneous speech with authentic emotions recorded from guests in a German TV talk-show \emph{Vera am Mittag} (\emph{Vera at Noon} in English). There are 947 emotional utterances from 47 speakers (11m/36f). Each sentence was evaluated by 6-17 listeners in the 3D space of valence, arousal and dominance, and the evaluations were merged by a weighted average to obtain the groundtruth emotion primitives in $[-1,1]$ \cite{Grimm2005b}. The same $46$ acoustic features extracted in our previous research \cite{drwuICME2010,drwuInterSpeech2010} were used again in this paper. They included nine pitch features, five duration features, six energy features, and 26 Mel Frequency Cepstral Coefficient (MFCC) features. Each feature was then normalized to mean 0 and standard deviation 1. \subsection{Sample Selection Algorithms} We compared the performances of nine sample selection algorithms: \begin{enumerate} \item Baseline 1 (BL1), which randomly selects all $K$ samples. \item Baseline 2 (BL2), which assumes all samples in the training pool are labeled, and uses them to build a regression model. BL2 represents the upper bound of the performance we could get given a specific training pool. \item Expected model change maximization (EMCM) \cite{Cai2013}, which selects the sample with the maximum expected model change to label. EMCM is for single-task learning. \item Query-by-Committee (QBC) \cite{RayChaudhuri1995}, which selects the sample with the maximum variance (computed from a committee of regression models) to label. QBC is for single-task learning. \item GSx, which was introduced in our recent research \cite{drwuiGS2018}. It is almost identical to the GS approach in \cite{Yu2010}, except that the first sample is selected as the one closest to the centroid of all $N$ unlabeled samples. Since GSx considers only the diversity in the input space, and in this paper all $P$ tasks share the same input space, it can be used in both single-task and MTL settings, without any modification. \item GSy, which has been introduced in Section~\ref{sect:GSy}. \item MT-GSy, which has been introduced in Section~\ref{sect:MT-GSy}. \item iGS, which has been introduced in Section~\ref{sect:iGS}. \item MT-iGS, which has been introduced in Section~\ref{sect:MT-iGS}. \end{enumerate} \subsection{Performance Evaluation Process} \label{sect:process} For the 947 samples in the VAM corpus, we first randomly selected 30\% as the training pool and the remaining 70\% as the test dataset, initialized the first $K_0$ labeled samples ($K_0$ is the dimensionality of the input space) either randomly (for BL, QBC and EMCM) or by GSy (for GSx, GSy, iGS, MT-GSy, and MT-iGS), identified one sample to label in each iteration by different algorithms, built linear regression models, and computed the root mean squared error (RMSE) and correlation coefficient (CC) as the performance measures on the test dataset. The iteration terminated when all samples in the training pool were selected. To obtain statistically meaningful results, we ran this evaluation process 100 times for each algorithm, each time with a randomly chosen training pool containing 30\% unlabeled samples. \subsection{Experimental Results} \label{sect:RR} First, ridge regression (RR) was used as the linear regression model, and $\lambda=10/K$ was used in its objective function $\underset{\boldsymbol{\beta}}{\operatorname{min}} (\| \mathbf{y}-\mathbf{X} \boldsymbol{\beta} \|^2 + \lambda \|\boldsymbol{\beta}\|^2)$. Given a fixed training pool, GSx will select a fixed sequence of samples to label because it only considers the diversity in the input space, regardless of how many tasks are there. MT-GSy (MT-iGS) also generates a fixed sequence of samples to label because it always considers all tasks simultaneously. However, each single-task ALR approach (EMCM, QBC, GSy and iGS) will give a different sequence of samples when a different task is considered. So, we compare the performances of the sample selection algorithms under three scenarios: 1) \emph{Valence} estimation is considered in the single-task ALR approaches; 2) \emph{Arousal} estimation is considered in the single-task ALR approaches; and, 3) \emph{Dominance} estimation is considered in the single-task ALR approaches. The results are shown in Figs.~\ref{fig:RR1}-\ref{fig:RR3}, respectively, where the RMSEs and CCs have been averaged over 100 runs. In each subfigure, the first column shows the results when the single-task ALR approaches focused on Valence estimation, the second column on Arousal estimation, and the third column on Dominance estimation. The last column shows the average across the first three columns. Observe from Fig.~\ref{fig:RR1} that: \begin{enumerate} \item Generally as $K$ increased, all eight sample selection algorithms (excluding BL2, which did not change with $K$) achieved better performance (smaller RMSE and larger CC), which is intuitive, because more labeled training samples generally result in a more reliable RR model. \item When $K=K_0=46$ (the first point in each subfigure of Fig.~\ref{fig:RR1}), the five GS based ALR approaches (GSx, GSy, iGS, MT-GSy and MT-iGS), which initialized the $K_0$ samples by considering the diversity in the input space, all had better performances than the other three approaches (BL1, EMCM and QBC), which initialized the $K_0$ samples randomly. \item For Valence estimation, which was the task that all single-task ALR approaches focused on, GSy and iGS achieved comparable performance as MT-GSy and MT-iGS; however, for the other two tasks (Arousal and Dominance estimations), MT-GSy and MT-iGS achieved better performances. \item When all three tasks are considered together (the last column of Fig.~\ref{fig:RR1}), on average all ALR approaches outperformed BL1, all GS based approaches outperformed EMCM and QBC, and both MT-iGS and MT-GSy outperformed their single-task counterparts. For a given $K$, the average performances were generally in the order of MT-iGS $>$ MT-GSy $>$ iGS $>$ GSy $>$ GSx $>$ EMCM $>$ QBC $>$ BL1. \end{enumerate} \begin{figure*}[htpb]\centering \includegraphics[width=.95\linewidth,clip]{RR1.eps} \caption{Performances of the sample selection algorithms, averaged over 100 runs, when the single-task ALR approaches focused on \emph{Valence} estimation. The last column shows the average RMSE and CC across the three tasks. RR was used as the regression model.} \label{fig:RR1} \end{figure*} Similar observations can also be made from Figs.~\ref{fig:RR2} and \ref{fig:RR3}, except that in Fig.~\ref{fig:RR2} MT-GSy and GSy (MT-iGS and iGS) had comparable performances on Arousal estimation, and in Fig.~\ref{fig:RR3} MT-GSy and GSy (MT-iGS and iGS) had comparable performances on Dominance estimation. \begin{figure*}[htpb]\centering \includegraphics[width=.95\linewidth,clip]{RR2.eps} \caption{Performances of the sample selection algorithms, averaged over 100 runs, when the single-task ALR approaches focused on \emph{Arousal} estimation. The last column shows the average RMSE and CC across the three tasks. RR was used as the regression model.} \label{fig:RR2} \end{figure*} \begin{figure*}[htpb]\centering \includegraphics[width=.95\linewidth,clip]{RR3.eps} \caption{Performances of the sample selection algorithms, averaged over 100 runs, when the single-task ALR approaches focused on \emph{Dominance} estimation. The last column shows the average RMSE and CC across the three tasks. RR was used as the regression model.} \label{fig:RR3} \end{figure*} To quantify the performance improvements of different ALR approaches over the random sampling approach (BL1), we picked $K=\{50,100,150,200,250\}$ and recorded the performances (RMSE and CC) of BL1, shown in the fourth column of Table~\ref{tab:imp}. Then, we also show the performances of the seven ALR approaches in Columns 5-11 of Table~\ref{tab:imp}, where the numbers in the parentheses representing the performance improvements over the corresponding BL1 performance, and the best two are marked in bold. For example, the first row shows that for Valence, using 50 samples, BL1 achieved an RMSE of 0.380, whereas EMCM achieved an RMSE of 0.356, representing a $(0.380-0.356)/0.380=6\%$ improvement. Table~\ref{tab:imp} shows that: \begin{enumerate} \item Given a specific $K$, all ALR approaches outperformed BL1 in both RMSE and CC. Among them, MT-GSy and MT-iGS almost always achieved the best performance. \item As $K$ increased, the performance improvement of ALR approaches decreased. This is because when $K$ becomes larger, the samples selected by different approaches, no matter ALR or BL1, overlap more, and hence the performance differences among them become smaller. \end{enumerate} These observations are consistent with those made from Figs.~\ref{fig:RR1}-\ref{fig:RR3}. \begin{table*}[htpb] \centering \setlength{\tabcolsep}{2mm} \caption{Performances and percentages of improvement (in the parentheses) when different ALR approaches are compared with BL1. The best two in each row are marked in bold.} \label{tab:imp} \begin{tabular}{c|c|cc|ccccccc} \hline Emotion & Performance & \multirow{2}{*}{K}&\multirow{2}{*}{BL1} & \multicolumn{7}{|c}{Performance and percentage improvement over BL1} \\ Primitive & Measure & & & EMCM & QBC & GSx & GSy & iGS & MT-GSy& MT-iGS \\ \hline \multirow{10}{*}{Valence} & \multirow{5}{*}{RMSE}& 50 & 0.380 & 0.356 (6\%) & 0.361 (5\%) & 0.326 (14\%) & 0.311 (18\%) & 0.310 (18\%) & \textbf{0.300 (21\%)} & \textbf{0.299 (21\%)} \\ & & 100 & 0.252 & 0.235 (7\%) & 0.237 (6\%) & 0.237 (6\%) & 0.232 (8\%) & 0.230 (9\%) & \textbf{0.226 (10\%)} & \textbf{0.225 (11\%)} \\ & & 150 & 0.226 & 0.217 (4\%) & 0.217 (4\%) & 0.219 (3\%) & 0.216 (4\%) & 0.216 (4\%) & \textbf{0.214 (5\%)} & \textbf{0.213 (6\%)} \\ & & 200 & 0.213 & 0.210 (2\%) & 0.210 (2\%) & 0.210 (1\%) & 0.210 (2\%) & 0.210 (2\%) & \textbf{0.209 (2\%)} & \textbf{0.208 (2\%)} \\ & & 250 & 0.207 & 0.206 (1\%) & 0.206 (1\%) & 0.206 (1\%) & 0.206 (1\%) &0.206 (1\%) & \textbf{0.206 (1\%)} & \textbf{0.205 (1\%)} \\ \cline{2-11} & \multirow{5}{*}{CC}& 50 & 0.354 & 0.371 (5\%) & 0.367 (4\%) & 0.424 (20\%) & 0.434 (23\%) & 0.437 (23\%) & \textbf{0.446 (26\%)} & \textbf{0.448 (26\%)} \\ & & 100 & 0.529 & 0.560 (6\%) & 0.553 (5\%) & 0.560 (6\%) & 0.561 (6\%) & 0.568 (7\%) & \textbf{0.574 (8\%)} & \textbf{0.579 (9\%)} \\ & & 150 & 0.581 & 0.604 (4\%) & 0.600 (3\%) & 0.597 (3\%) & 0.599 (3\%) & 0.603 (4\%) & \textbf{0.606 (4\%)} & \textbf{0.609 (5\%)} \\ & & 200 & 0.610 & 0.621 (2\%) & 0.619 (1\%) & 0.618 (1\%) & 0.618 (1\%) & 0.619 (1\%) & \textbf{0.622 (2\%)} & \textbf{0.623 (2\%)} \\ & & 250 & 0.626 & 0.630 (1\%) & 0.630 (1\%) & 0.629 (1\%) & 0.630 (1\%) & \textbf{0.631 (1\%)} & 0.630 (1\%) & \textbf{0.631 (1\%)} \\ \hline \multirow{10}{*}{Arousal} & \multirow{5}{*}{RMSE}& 50 & 0.374 & 0.350 (6\%) & 0.357 (4\%) & 0.330 (12\%) & 0.311 (17\%) & 0.308 (18\%) & \textbf{0.300 (20\%)} & \textbf{0.298 (20\%)} \\ & & 100 & 0.253 & 0.235 (7\%) & 0.236 (7\%) & 0.234 (7\%) & 0.235 (7\%) & 0.232 (8\%) & \textbf{0.226 (11\%)} & \textbf{0.225 (11\%)} \\ & & 150 & 0.224 & 0.217 (3\%) & 0.216 (4\%) & 0.216 (4\%) & 0.219 (2\%) & 0.217 (3\%) & \textbf{0.213 (5\%)} & \textbf{0.213 (5\%)} \\ & & 200 & 0.213 & 0.209 (2\%) & 0.209 (2\%) & 0.209 (2\%) & 0.210 (1\%) & 0.209 (2\%) & \textbf{0.208 (3\%)} & \textbf{0.208 (3\%)} \\ & & 250 & 0.207 & 0.205 (1\%) & 0.205 (1\%) & 0.205 (1\%) & 0.206 (1\%) & 0.205 (1\%) & \textbf{0.205 (1\%)} & \textbf{0.205 (1\%)} \\ \cline{2-11} & \multirow{5}{*}{CC}& 50 & 0.368 & 0.393 (7\%) & 0.379 (3\%) & 0.419 (14\%) & 0.436 (18\%) & 0.442 (20\%) & \textbf{0.447 (21\%)} & \textbf{0.449 (22\%)} \\ & & 100 & 0.529 & 0.559 (6\%) & 0.554 (5\%) & 0.567 (7\%) & 0.557 (5\%) & 0.564 (7\%) & \textbf{0.573 (8\%)} & \textbf{0.576 (9\%)} \\ & & 150 & 0.584 & 0.603 (3\%) & 0.599 (3\%) & 0.604 (3\%) & 0.593 (1\%) & 0.600 (3\%) & \textbf{0.606 (4\%)} & \textbf{0.608 (4\%)} \\ & & 200 & 0.609 & 0.620 (2\%) & 0.620 (2\%) & 0.621 (2\%) & 0.615 (1\%) & 0.619 (2\%) & \textbf{0.622 (2\%)} & \textbf{0.622 (2\%)} \\ & & 250 & 0.626 & 0.630 (1\%) & 0.630 (1\%) & 0.630 (1\%) & 0.628 (0\%) & 0.630 (1\%) & \textbf{0.631 (1\%)} & \textbf{0.631 (1\%)} \\ \hline \multirow{10}{*}{Dominance} & \multirow{5}{*}{RMSE} & 50 & 0.370 & 0.354 (4\%) & 0.359 (3\%) & 0.321 (13\%) & 0.304 (18\%) & 0.303 (18\%) & \textbf{0.296 (20\%)} & \textbf{0.296 (20\%)} \\ & & 100 & 0.251 & 0.236 (6\%) & 0.235 (6\%) & 0.235 (7\%) & 0.233 (7\%) & 0.231 (8\%) & \textbf{0.224 (11\%)} & \textbf{0.224 (11\%)} \\ & & 150 & 0.224 & 0.217 (3\%) & 0.217 (3\%) & 0.217 (3\%) & 0.217 (3\%) & 0.216 (4\%) & \textbf{0.213 (5\%)} & \textbf{0.213 (5\%)} \\ & & 200 & 0.213 & 0.209 (2\%) & 0.209 (2\%) & 0.209 (2\%) & 0.210 (2\%) & 0.210 (1\%) & \textbf{0.208 (2\%)} & \textbf{0.208 (2\%)} \\ & & 250 & 0.207 & 0.205 (1\%) &0.205 (1\%) & 0.205 (1\%) & 0.205 (1\%) & 0.206 (1\%) & \textbf{0.205 (1\%)} & \textbf{0.205 (1\%)} \\ \cline{2-11} & \multirow{5}{*}{CC} & 50 & 0.377 & 0.388 (3\%) & 0.384 (2\%) & 0.433 (15\%) & 0.445 (18\%) & 0.446 (18\%) & \textbf{0.453 (20\%)} & \textbf{0.454 (21\%)} \\ & & 100 & 0.536 & 0.560 (5\%) & 0.559 (4\%) & 0.566 (6\%) & 0.558 (4\%) & 0.566 (6\%) & \textbf{0.579 (8\%)} & \textbf{0.579 (8\%)} \\ & & 150 & 0.586 & 0.602 (3\%) & 0.600 (2\%) & 0.601 (3\%) & 0.597 (2\%) & 0.601 (3\%) & \textbf{0.607 (4\%)} & \textbf{0.608 (4\%)} \\ & & 200 & 0.611 &0.621 (2\%) & 0.619 (1\%) & 0.620 (2\%) & 0.616 (1\%) & 0.617 (1\%) & \textbf{0.621 (2\%)} & \textbf{0.623 (2\%)} \\ & & 250 & 0.626 &0.630 (1\%) & 0.630 (1\%) & 0.630 (1\%) & 0.629 (1\%) & 0.629 (1\%) & \textbf{0.630 (1\%)} & \textbf{0.631 (1\%)} \\ \hline \end{tabular} \end{table*} \subsection{ALR Saved the Number of Queries over BL1} The improved performances of ALR can also be verified by quantifying the numbers of saved queries over BL1, when a desired regression performance is needed. To do this, we first count the number of labeled samples required for BL1 to achieve $(100+\alpha)\%$ RMSE of BL2 ($\alpha=\{1,2,3,5,10\}$), and $(100-\alpha)\%$ CC of BL2, as shown in the fourth column of Table~\ref{tab:saved}. We then also count the number of samples required by different ALR approaches, and the corresponding saving over BL1, as shown in the remaining columns of Table~\ref{tab:saved}. For example, the first row shows that for Valence, to achieve 101\% ($\alpha=1$) RMSE of BL2, BL1 needed 261 labeled samples, whereas EMCM only needed 242 samples, representing a $(261-242)/261=8\%$ saving. Table~\ref{tab:saved} shows that: \begin{enumerate} \item All ALR approaches can save the number of queries over BL1. Among them, MT-GSy and MT-iGS, particularly MT-iGS, almost always saved the most number of queries. \item As $\alpha$ increased, the percentage of saving also increased for almost all ALR approaches, especially MT-GSy and MT-iGS. \end{enumerate} These observations are consistent with those made in the previous subsection. \begin{table*}[htpb] \centering \setlength{\tabcolsep}{2mm} \caption{Number of samples and percentages of saved queries (in the parentheses) when different ALR approaches are compared with BL1. The best two in each row are marked in bold.} \label{tab:saved} \begin{tabular}{c|c|cc|ccccccc} \hline Emotion & Performance & \multirow{2}{*}{$\alpha\%$} & No. BL1 & \multicolumn{7}{|c}{Number of samples and percentage saving over BL1} \\ Primitive & Measure & & Samples & EMCM & QBC & GSx & GSy & iGS & MT-GSy& MT-iGS \\ \hline \multirow{10}{*}{Valence} & \multirow{5}{*}{RMSE}& 1\% & 261 & \textbf{242 (8\%)} & 248 (5\%) & 247 (6\%) & 246 (6\%) & 242 (8\%) & 243 (7\%) & \textbf{233 (12\%)} \\ & & 2\% & 241 & 218 (11\%) & 217 (11\%) & 221 (9\%) & 218 (11\%) & 216 (12\%) & \textbf{207 (16\%)} & \textbf{202 (19\%)} \\ & & 3\% & 222 & 197 (13\%) & 197 (13\%) & 201 (10\%) & 194 (14\%) & 197 (13\%) & \textbf{183 (21\%)} & \textbf{179 (24\%)} \\ & & 5\% & 197 & 168 (17\%) & 168 (17\%) & 175 (13\%) & 164 (20\%) & 162 (22\%) & \textbf{148 (33\%)} & \textbf{144 (37\%)} \\ & & 10\% & 154 & 123 (25\%) & 126 (22\%) & 129 (19\%) & 118 (31\%) & 116 (33\%) & \textbf{106 (45\%)} & \textbf{101 (52\%)} \\ \cline{2-11} & \multirow{5}{*}{CC}& 1\% & 258 & \textbf{236 (9\%)} & 242 (7\%) & 242 (7\%) & 244 (6\%) & 238 (8\%) & 242 (7\%) & \textbf{230 (12\%)} \\ & & 2\% & 235 & 202 (16\%) & 211 (11\%) & 211 (11\%) & 215 (9\%) & 208 (13\%) & \textbf{201 (17\%)} & \textbf{194 (21\%)} \\ & & 3\% & 215 & 181 (19\%) & 187 (15\%) & 190 (13\%) & 189 (14\%) & 185 (16\%) & \textbf{175 (23\%)} & \textbf{172 (25\%)} \\ & & 5\% & 184 & 149 (23\%) & 154 (19\%) & 162 (14\%) & 157 (17\%) & 150 (23\%) & \textbf{144 (28\%)} & \textbf{135 (36\%)} \\ & & 10\% & 138 & 109 (27\%) & 115 (20\%) & 112 (23\%) & 110 (25\%) & 104 (33\%) & \textbf{98 (41\%)} & \textbf{93 (48\%)} \\ \hline \multirow{10}{*}{Arousal} & \multirow{5}{*}{RMSE}& 1\% & 261 & 239 (9\%) & \textbf{237 (10\%)} & 245 (7\%) & 252 (4\%) & 247 (6\%) & \textbf{231 (13\%)} & 238 (10\%) \\ & & 2\% & 242 & 213 (14\%) & 210 (15\%) & 216 (12\%) & 227 (7\%) & 220 (10\%) & \textbf{199 (22\%)} & \textbf{196 (23\%)} \\ & & 3\% & 225 & 193 (17\%) & 192 (17\%) & 196 (15\%) & 208 (8\%) & 197 (14\%) & \textbf{176 (28\%)} & \textbf{174 (29\%)} \\ & & 5\% & 196 & 165 (19\%) & 165 (19\%) & 167 (17\%) & 175 (12\%) & 161 (22\%) & \textbf{143 (37\%)} & \textbf{139 (41\%)} \\ & & 10\% & 152 & 125 (22\%) & 125 (22\%) & 126 (21\%) & 126 (21\%) & 116 (31\%) & \textbf{98 (55\%)} & \textbf{97 (57\%)} \\ \cline{2-11} & \multirow{5}{*}{CC}& 1\% & 261 & 235 (11\%) & 235 (11\%) & 242 (8\%) & 247 (6\%) & 241 (8\%) & \textbf{231 (13\%)} & \textbf{228 (14\%)} \\ & & 2\% & 241 & 202 (19\%) & 203 (19\%) & 208 (16\%) & 219 (10\%) & 210 (15\%) & \textbf{198 (22\%)} & \textbf{188 (28\%)} \\ & & 3\% & 223 & 181 (23\%) & 184 (21\%) & 186 (20\%) & 200 (12\%) & 188 (19\%) & \textbf{174 (28\%)} & \textbf{165 (35\%)} \\ & & 5\% & 185 & 147 (26\%) & 155 (19\%) & 155 (19\%) & 168 (10\%) & 152 (22\%) & \textbf{135 (37\%)} & \textbf{132 (40\%)} \\ & & 10\% & 136 & 110 (24\%) & 113 (20\%) & 105 (30\%) & 115 (18\%) & 105 (30\%) & \textbf{92 (48\%)} & \textbf{91 (49\%)} \\ \hline \multirow{10}{*}{Dominance} & \multirow{5}{*}{RMSE} & 1\% & 261 & 237 (10\%) & 238 (10\%) & 237 (10\%) & 249 (5\%) & 242 (8\%) & \textbf{232 (13\%)} & \textbf{235 (11\%)} \\ & & 2\% & 242 & 210 (15\%) & 212 (14\%) & 213 (14\%) & 221 (10\%) & 216 (12\%) & \textbf{204 (19\%)} & \textbf{201 (20\%)} \\ & & 3\% & 225 & 192 (17\%) & 194 (16\%) & 191 (18\%) & 204 (10\%) & 193 (17\%) & \textbf{182 (24\%)} & \textbf{180 (25\%)} \\ & & 5\% & 197 & 165 (19\%) & 166 (19\%) & 162 (22\%) & 174 (13\%) & 164 (20\%) & \textbf{148 (33\%)} & \textbf{146 (35\%)} \\ & & 10\% & 151 & 123 (23\%) & 127 (19\%) & 124 (22\%) & 126 (20\%) & 121 (25\%) & \textbf{106 (42\%)} & \textbf{103 (47\%)} \\ \cline{2-11} & \multirow{5}{*}{CC} & 1\% & 258 & 236 (9\%) & 239 (8\%) & 231 (12\%) & 248 (4\%) & 238 (8\%) & \textbf{226 (14\%)} & \textbf{229 (13\%)} \\ & & 2\% & 234 & 200 (17\%) & 210 (11\%) & 203 (15\%) & 219 (7\%) & 211 (11\%) & \textbf{196 (19\%)} & \textbf{196 (19\%)} \\ & & 3\% & 217 & 181 (20\%) & 190 (14\%) & 181 (20\%) & 197 (10\%) & 186 (17\%) & \textbf{175 (24\%)} & \textbf{173 (25\%)} \\ & & 5\% & 184 & 148 (24\%) & 159 (16\%) & 147 (25\%) & 167 (10\%) & 155 (19\%) & \textbf{143 (29\%)} & \textbf{139 (32\%)} \\ & & 10\% & 133 & 110 (21\%) & 116 (15\%) & 104 (28\%) & 113 (18\%) & 107 (24\%) & \textbf{96 (39\%)} & \textbf{95 (40\%)} \\ \hline \end{tabular} \end{table*} \subsection{Model Parameters from ALR Converged Faster} As BL2 used all samples in the training pool, the regression coefficients obtained from BL2 represented the global optimum. It's interesting to study how fast the model parameters from different approaches converged to the solution given by BL2. The mean absolute errors (MAEs) between the coefficients of BL2 and the other eight approaches for different $K$ are shown in Fig.~\ref{fig:Para}. To save space, we only show the results when single-task ALR approaches focused on \emph{Valence}. Fig.~\ref{fig:Para} shows that: \begin{enumerate} \item Generally as $K$ increased, the model parameters from all eight sample selection algorithms converged to the solution of BL2. \item When $K=K_0=46$ (the first point in each subfigure of Fig.~\ref{fig:Para}), the five GS based ALR approaches (GSx, GSy, iGS, MT-GSy and MT-iGS), which initialized the $K_0$ samples by considering the diversity in the input space, all had smaller MAEs than the other three approaches (BL, EMCM and QBC), which initialized the $K_0$ samples randomly. \item GSy and iGS achieved comparable MAEs with MT-GSy and MT-iGS on Valence estimation, because this was the task that GSy and iGS focused on; however, for the other two tasks (Arousal and Dominance estimations), MT-GSy and MT-iGS achieved smaller MAEs. \item When all three tasks are considered together (the last column of Fig.~\ref{fig:Para}), generally all ALR approaches converged faster than BL1, all GS based approaches converged faster than EMCM and QBC, and both MT-iGS and MT-GSy converged faster than their single-task counterparts. \end{enumerate} \begin{figure*}[htpb]\centering \includegraphics[width=.96\linewidth,clip]{Para1.eps} \caption{MAE between the regression coefficients of BL2 and the other eight approaches, when the single-task ALR approaches focused on \emph{Valence}. RR was used as the regression model.} \label{fig:Para} \end{figure*} \subsection{Sample Selection Results: Impact of Gender} The VAM dataset consists of 947 utterances, 196 of which are from males ($20.7\%$), and 751 from females ($79.3\%$). Male and female utterances have different feature standard deviations, as shown in Fig.~\ref{fig:stdGender}. For 27 of the 46 features, male utterances have larger standard deviations than female utterances. \begin{figure}[htpb]\centering \includegraphics[width=.8\linewidth,clip]{stdGender.eps} \caption{Feature standard deviations of male and female utterances.} \label{fig:stdGender} \end{figure} As the initial 46 samples from the GS based ALR approaches are selected based on the diversity in the feature space, and the male utterances have larger feature variations than the female utterances, we expect that more male utterances would be selected by the GS based ALR approaches in initialization than other approaches. Fig.~\ref{fig:pMale}, which shows the percentage of male utterances selected by different algorithms, confirms this. When $K=46$, BL1, EMCM and QBC selected about $20.7\%$ male utterances, which is the average percentage of male utterances in the dataset. However, all five GS based ALR approaches selected over $33\%$ male utterances, much larger than the average percentage. As $K$ increased, this percentage gradually decreased. Interestingly, the percentage of male utterances selected by EMCM and QBC first increased with $K$, and then gradually decreased. \begin{figure*}[htpb]\centering \includegraphics[width=.8\linewidth,clip]{pMale.eps} \caption{Percentage of male utterances selected by different algorithms, when the single-task ALR approaches focused on \emph{Valence}, \emph{Arousal}, and \emph{Dominance}, respectively. RR was used as the regression model.} \label{fig:pMale} \end{figure*} \subsection{Sample Selection Results: Impact of Emotion Primitive Values} To study how the values of the emotion primitives impacted the sample selection algorithms, we computed the standard deviation of the primitives of the selected samples, and show the results in Fig.~\ref{fig:stdY}, when the single-task ALR approaches focused on Valence. The samples selected by the five GS based ALR approaches generally had larger standard deviations than those by other approaches, especially when $K$ was small. This is intuitive, as GS tends to select the most diverse samples. The first $K_0$ samples selected by EMCM and QBC had the same standard deviation as those by BL1, as all of them were random. However, as $K$ increased, the standard deviation of the samples selected by EMCM and QBC increased rapidly and were much larger than that by BL1. The standard deviation of the samples selected by EMCM was larger than that by QBC, and the performance of EMCM was also slightly better than QBC (Table~\ref{tab:imp}). \begin{figure*}[htpb]\centering \includegraphics[width=\linewidth,clip]{stdY1.eps} \caption{Standard deviation (std) of the primitives of the selected samples, when the single-task ALR approaches focused on \emph{Valence}. RR was used as the regression model.} \label{fig:stdY} \end{figure*} \subsection{Impact of Features on Algorithm Performance} This subsection evaluates the performances of different ALR approaches w.r.t. different feature sets. We repeated the experiments in Section~\ref{sect:RR} using only the 26 MFCC features instead of all 46 features. To save space, here we only show the average results across the three tasks in Fig.~\ref{fig:MFCC}, when the single-task ALR approaches focused on Valence. The average performances of the algorithms are in the order of MT-iGS $>$ MT-GSy $>$ iGS $>$ GSy $>$ GSx $>$ EMCM $>$ QBC $>$ BL1. The RMSEs in Fig.~\ref{fig:MFCC} are similar to those in Fig.~\ref{fig:RR1}, but the CCs were generally smaller, i.e., reducing the number of features did not change the rank of the algorithms, but resulted in overall worse performances for all approaches. \begin{figure}[htpb]\centering \includegraphics[width=\linewidth,clip]{RRMFCC1.eps} \caption{Performances of the sample selection algorithms, when the single-task ALR approaches focused on \emph{Valence}. RR was used as the regression model, and only the 26 MFCC features were used.} \label{fig:MFCC} \end{figure} \subsection{Impact of Regression Models on Algorithm Performance} This subsection studies the stability of the proposed multi-task ALR approaches w.r.t. different regression models. To save space, we only present the results when the single-task ALR approaches focused on Valence. First, ordinary least square regression was used as the linear regression model. We ran the experiments as previously for RR, where the single-task ALR approaches focused on different tasks. The results are shown in Fig.~\ref{fig:RLS}. Again we can make similar observations as those for RR, although initially ordinary least square regression performed much worse than RR, as there were not enough training samples to adequately determine the coefficients of the features, and no regularization was done either on the coefficients. \begin{figure}[htpb]\centering \subfigure[]{\label{fig:RLS} \includegraphics[width=\linewidth,clip]{RLS1.eps}} \subfigure[]{\label{fig:LASSO} \includegraphics[width=\linewidth,clip]{LASSO1.eps}} \subfigure[]{\label{fig:EN} \includegraphics[width=\linewidth,clip]{EN1.eps}} \caption{Performances of the sample selection algorithms, when the single-task ALR approaches focused on \emph{Valence}. Different regression models were used. (a) Ordinary least square regression; (b) LASSO; (c) Elastic net.} \label{fig:algs} \end{figure} Next, LASSO was used as the linear regression model, where $\lambda=0.001$ in its objective function $ \underset{\boldsymbol{\beta}}{\operatorname{min}} (\| \mathbf{y}-\mathbf{X} \boldsymbol{\beta} \|^2 + \lambda \|\boldsymbol{\beta}\|_1)$. The average results are shown in Fig.~\ref{fig:LASSO}. Finally, elastic net was used as the linear regression model, where $\lambda_1=\lambda_2=0.0005$ in its objective function $\underset{\boldsymbol{\beta}}{\operatorname{min}} (\| \mathbf{y}-\mathbf{X} \boldsymbol{\beta} \|^2 + \lambda_1 \|\boldsymbol{\beta}\|_1) + \lambda_2 \|\boldsymbol{\beta}\|^2$. The average results are shown in Fig.~\ref{fig:EN}. For a given $K$, the performances were in the order of MT-iGS $\approx$ MT-GSy $>$ iGS $>$ GSy $>$ GSx $>$ EMCM $>$ QBC $>$ BL, consistent with those when RR was used as the regression model. \section{Discussion: Why MTL in Affective Computing} \label{sect:discussion} The previous section has presented extensive experiments and comprehensive analyses, showing that our proposed multi-task ALR approaches, MT-GSy and MT-iGS, outperformed their single-task counterparts, GSy and iGS, and also three other state-of-the-art single-task ALR approaches in the literature. However, a natural question that a user may ask is: Why should MTL be used in affective computing at the first place, instead of viewing each emotion primitive estimation as a separate problem and acquiring the labeled samples completely independently? Our argument is that usually it takes time to evaluate (label) an affective signal, whether it is text, image, utterance, video, or others. So, a multi-task labeling approach, i.e., evaluating a single affective signal and then assigning valence, arousal and dominance simultaneously to it, is much more efficient than the combination of three separate single-task approaches, i.e., first evaluating Signal~1 and assigning Valence to it, then evaluating a different Signal~2 and assigning Arousal to it, and finally evaluating another different Signal~3 and assigning Dominance to it. This is particularly true when the affective signals are long and time-consuming to evaluate, e.g., movies. To obtain a label each for valence, arousal and dominance, the multi-task approach requires the assessor to watch only one movie and then assign three primitive values, whereas the single-task approach needs the assessor to watch three different movies. The former is usually much faster, easier, and more user-friendly. A well-designed MTL algorithm, like MT-GSy or MT-iGS, lets one select a small number of most informative affective signals to label, and can achieve comparable performance as the combination of three optimal single-task algorithms, while saving a significant amount of evaluation time. As an example, we performed an experiment using RR and 26 MFCC features on the VAM dataset. A random 30\% pool was reserved for training, and the remaining 70\% for testing. $K$ increased from 26 to 150. The first 26 samples for GSy, iGS, MT-GSy and MT-iGS were selected using GSy and were the same for all four approaches. Then, MT-GSy and MT-iGS proceeded just as before, but we used GSy (iGS) to separately select the optimal samples for Valence, Arousal and Dominance. For each $K$, we counted the number of unique utterances selected by the multi-task and single-task approaches. For example, when $K=50$, MT-GSy and MT-iGS each selected 50 unique utterances, but separately running GSy on Valence, Arousal and Dominance estimations selected 150 utterances, of which 87 were unique. The results are shown in Fig.~\ref{fig:MTSTnum}. Clearly, the single-task ALR approaches used much more unique utterances than the multi-task ones. \begin{figure}[htpb]\centering \includegraphics[width=.7\linewidth,clip]{MTSTnum.eps} \caption{Number of unique utterances when each single-task ALR approach (GSy and iGS) was independently optimized for the three emotion primitives. RR was used as the regression model, and only the 26 MFCC features were used. The curves for MT-GSy and MT-iGS are identical.} \label{fig:MTSTnum} \end{figure} Fig.~\ref{fig:MTST} shows the estimation performances of the multi-task and single-task approaches, based on the samples selected in Fig.~\ref{fig:MTSTnum}. MT-iGS and MT-GSy achieved similar performances as three independent single-task GSy or iGS combined. \begin{figure*}[htpb]\centering \includegraphics[width=.9\linewidth,clip]{MTST.eps} \caption{Estimation performances when each single-task ALR approach (GSy and iGS) was independently optimized for the three emotion primitives. RR was used as the regression model, and only the 26 MFCC features were used.} \label{fig:MTST} \end{figure*} In summary, MTL can achieve similar estimation performances as optimizing multiple single-tasks separately, but can significantly reduce the number of unique utterances that an assessor needs to evaluate. So, MTL is advantageous and effective in affective computing. \section{Conclusions and Future Research} \label{sect:conclusions} Acquisition of labeled training samples for affective computing is usually costly and time-consuming, as multiple human assessors are needed to evaluate each affective sample. Particularly, for affect estimation in the 3D space of valence, arousal and dominance, each assessor has to perform the evaluations in three dimensions, which makes the labeling problem even more challenging. This paper has proposed two MT-ALR approaches, MT-GSy and MT-iGS, which select the most informative samples to label, by considering the three affect primitives simultaneously. Experimental results on the VAM corpus demonstrated that MT-GSy and MT-iGS outperformed random selection and several traditional single-task ALR approaches, i.e., better affect estimation performance can be achieved when MT-GSy or MT-iGS is used to select the affective samples to label. Or, in other words, when a desired performance (RMSE or CC) is needed, using MT-GSy or MT-iGS can save the number of labelling queries. Our future research directions include: \begin{enumerate} \item Extend MT-GSy and MT-iGS from regression to classification, as affects can also be classified simultaneously in multiple dimensions, e.g., paralinguistics in speech and language \cite{Schuller2013a}. \item Extend our MT-ALR approaches from offline pool-based regression to online streaming regression \cite{Settles2009}. \item Develop new MT-ALR approaches for nonlinear regression models, e.g., deep neural networks, as \cite{drwuiGS2018} shows that GSy and iGS do not perform well when nonlinear regression models are used. \item Consider the more general case that different tasks use different inputs, in contrast to the case in this paper that all tasks share the same inputs. \end{enumerate}